2025-06-12 06:56:15,701 p=13478 u=zuul n=ansible | Starting galaxy collection install process 2025-06-12 06:56:15,702 p=13478 u=zuul n=ansible | Process install dependency map 2025-06-12 06:56:27,968 p=13478 u=zuul n=ansible | Starting collection install process 2025-06-12 06:56:27,968 p=13478 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+eb833272' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2025-06-12 06:56:28,354 p=13478 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+eb833272 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2025-06-12 06:56:28,355 p=13478 u=zuul n=ansible | cifmw.general:1.0.0+eb833272 was installed successfully 2025-06-12 06:56:28,355 p=13478 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2025-06-12 06:56:28,405 p=13478 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2025-06-12 06:56:28,405 p=13478 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2025-06-12 06:56:28,406 p=13478 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2025-06-12 06:56:29,072 p=13478 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2025-06-12 06:56:29,073 p=13478 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2025-06-12 06:56:29,073 p=13478 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2025-06-12 06:56:29,118 p=13478 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2025-06-12 06:56:29,118 p=13478 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2025-06-12 06:56:29,118 p=13478 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2025-06-12 06:56:29,206 p=13478 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2025-06-12 06:56:29,206 p=13478 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2025-06-12 06:56:29,206 p=13478 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2025-06-12 06:56:29,227 p=13478 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2025-06-12 06:56:29,227 p=13478 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2025-06-12 06:56:29,227 p=13478 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2025-06-12 06:56:29,357 p=13478 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2025-06-12 06:56:29,357 p=13478 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2025-06-12 06:56:29,357 p=13478 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2025-06-12 06:56:29,468 p=13478 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2025-06-12 06:56:29,468 p=13478 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2025-06-12 06:56:29,468 p=13478 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2025-06-12 06:56:29,528 p=13478 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2025-06-12 06:56:29,528 p=13478 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2025-06-12 06:56:29,528 p=13478 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2025-06-12 06:56:29,544 p=13478 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2025-06-12 06:56:29,544 p=13478 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2025-06-12 06:56:29,544 p=13478 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2025-06-12 06:56:29,750 p=13478 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2025-06-12 06:56:29,750 p=13478 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2025-06-12 06:56:29,750 p=13478 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2025-06-12 06:56:29,977 p=13478 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2025-06-12 06:56:29,977 p=13478 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2025-06-12 06:56:29,977 p=13478 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2025-06-12 06:56:30,005 p=13478 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2025-06-12 06:56:30,005 p=13478 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2025-06-12 06:56:30,005 p=13478 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2025-06-12 06:56:30,031 p=13478 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2025-06-12 06:56:30,031 p=13478 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2025-06-12 06:56:30,031 p=13478 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2025-06-12 06:56:30,110 p=13478 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2025-06-12 06:56:30,110 p=13478 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2025-06-12 06:56:40,142 p=14991 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2025-06-12 06:56:40,177 p=14991 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2025-06-12 06:56:40,177 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:40 +0000 (0:00:00.038) 0:00:00.038 ********* 2025-06-12 06:56:41,053 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:41,068 p=14991 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2025-06-12 06:56:41,068 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.891) 0:00:00.929 ********* 2025-06-12 06:56:41,295 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:41,301 p=14991 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2025-06-12 06:56:41,301 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.232) 0:00:01.162 ********* 2025-06-12 06:56:41,317 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2025-06-12 06:56:41,357 p=14991 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2025-06-12 06:56:41,357 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.056) 0:00:01.218 ********* 2025-06-12 06:56:41,376 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:41,382 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-06-12 06:56:41,382 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.024) 0:00:01.243 ********* 2025-06-12 06:56:41,405 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:41,410 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2025-06-12 06:56:41,410 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.028) 0:00:01.272 ********* 2025-06-12 06:56:41,453 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:41,459 p=14991 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-06-12 06:56:41,459 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.049) 0:00:01.321 ********* 2025-06-12 06:56:41,640 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:41,645 p=14991 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-06-12 06:56:41,646 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.186) 0:00:01.507 ********* 2025-06-12 06:56:41,662 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:41,669 p=14991 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-06-12 06:56:41,669 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.023) 0:00:01.531 ********* 2025-06-12 06:56:41,688 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:41,695 p=14991 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-06-12 06:56:41,695 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.025) 0:00:01.556 ********* 2025-06-12 06:56:41,713 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:41,720 p=14991 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-06-12 06:56:41,720 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:41 +0000 (0:00:00.024) 0:00:01.581 ********* 2025-06-12 06:56:42,873 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:42,884 p=14991 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-06-12 06:56:42,884 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:42 +0000 (0:00:01.164) 0:00:02.745 ********* 2025-06-12 06:56:43,053 p=14991 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2025-06-12 06:56:43,198 p=14991 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2025-06-12 06:56:43,339 p=14991 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2025-06-12 06:56:43,348 p=14991 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2025-06-12 06:56:43,348 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:43 +0000 (0:00:00.464) 0:00:03.209 ********* 2025-06-12 06:56:44,113 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:44,119 p=14991 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2025-06-12 06:56:44,119 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:44 +0000 (0:00:00.771) 0:00:03.981 ********* 2025-06-12 06:56:45,325 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:45,331 p=14991 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2025-06-12 06:56:45,331 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:45 +0000 (0:00:01.211) 0:00:05.192 ********* 2025-06-12 06:56:53,266 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:53,272 p=14991 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2025-06-12 06:56:53,272 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:53 +0000 (0:00:07.941) 0:00:13.134 ********* 2025-06-12 06:56:53,821 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:53,828 p=14991 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2025-06-12 06:56:53,828 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:53 +0000 (0:00:00.555) 0:00:13.689 ********* 2025-06-12 06:56:53,844 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:53,851 p=14991 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2025-06-12 06:56:53,851 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:53 +0000 (0:00:00.023) 0:00:13.712 ********* 2025-06-12 06:56:54,602 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:54,608 p=14991 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2025-06-12 06:56:54,608 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:54 +0000 (0:00:00.756) 0:00:14.469 ********* 2025-06-12 06:56:54,637 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:54,643 p=14991 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2025-06-12 06:56:54,643 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:54 +0000 (0:00:00.034) 0:00:14.504 ********* 2025-06-12 06:56:54,669 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:54,675 p=14991 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2025-06-12 06:56:54,675 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:54 +0000 (0:00:00.032) 0:00:14.536 ********* 2025-06-12 06:56:54,702 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:54,708 p=14991 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2025-06-12 06:56:54,708 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:54 +0000 (0:00:00.032) 0:00:14.569 ********* 2025-06-12 06:56:55,208 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:55,214 p=14991 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-06-12 06:56:55,214 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.506) 0:00:15.075 ********* 2025-06-12 06:56:55,764 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:55,770 p=14991 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2025-06-12 06:56:55,770 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.555) 0:00:15.631 ********* 2025-06-12 06:56:55,785 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,790 p=14991 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2025-06-12 06:56:55,790 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.020) 0:00:15.652 ********* 2025-06-12 06:56:55,805 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,811 p=14991 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2025-06-12 06:56:55,811 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.020) 0:00:15.672 ********* 2025-06-12 06:56:55,825 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,831 p=14991 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2025-06-12 06:56:55,831 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.019) 0:00:15.692 ********* 2025-06-12 06:56:55,854 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:55,860 p=14991 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2025-06-12 06:56:55,860 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.029) 0:00:15.721 ********* 2025-06-12 06:56:55,872 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,878 p=14991 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2025-06-12 06:56:55,878 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.018) 0:00:15.740 ********* 2025-06-12 06:56:55,891 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,897 p=14991 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2025-06-12 06:56:55,897 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.018) 0:00:15.759 ********* 2025-06-12 06:56:55,909 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,915 p=14991 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2025-06-12 06:56:55,915 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.017) 0:00:15.777 ********* 2025-06-12 06:56:55,927 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,934 p=14991 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2025-06-12 06:56:55,934 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.018) 0:00:15.795 ********* 2025-06-12 06:56:55,946 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,953 p=14991 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2025-06-12 06:56:55,954 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.019) 0:00:15.815 ********* 2025-06-12 06:56:55,965 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:55,971 p=14991 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2025-06-12 06:56:55,971 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:55 +0000 (0:00:00.017) 0:00:15.832 ********* 2025-06-12 06:56:56,128 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:56,135 p=14991 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2025-06-12 06:56:56,135 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.164) 0:00:15.997 ********* 2025-06-12 06:56:56,314 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:56,320 p=14991 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2025-06-12 06:56:56,320 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.184) 0:00:16.182 ********* 2025-06-12 06:56:56,500 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:56,507 p=14991 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2025-06-12 06:56:56,507 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.186) 0:00:16.368 ********* 2025-06-12 06:56:56,525 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,531 p=14991 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2025-06-12 06:56:56,531 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.023) 0:00:16.392 ********* 2025-06-12 06:56:56,554 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,560 p=14991 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2025-06-12 06:56:56,561 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.029) 0:00:16.422 ********* 2025-06-12 06:56:56,583 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,588 p=14991 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2025-06-12 06:56:56,589 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.028) 0:00:16.450 ********* 2025-06-12 06:56:56,613 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,619 p=14991 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2025-06-12 06:56:56,619 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.030) 0:00:16.480 ********* 2025-06-12 06:56:56,642 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,648 p=14991 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2025-06-12 06:56:56,648 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.029) 0:00:16.509 ********* 2025-06-12 06:56:56,671 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:56:56,677 p=14991 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2025-06-12 06:56:56,677 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.028) 0:00:16.538 ********* 2025-06-12 06:56:56,938 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:56:56,944 p=14991 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2025-06-12 06:56:56,944 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:56 +0000 (0:00:00.267) 0:00:16.805 ********* 2025-06-12 06:56:57,126 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2025-06-12 06:56:57,289 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2025-06-12 06:56:57,449 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/kubernetes.repo) 2025-06-12 06:56:57,456 p=14991 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2025-06-12 06:56:57,456 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:57 +0000 (0:00:00.512) 0:00:17.318 ********* 2025-06-12 06:56:57,836 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:57,843 p=14991 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2025-06-12 06:56:57,843 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:57 +0000 (0:00:00.386) 0:00:17.704 ********* 2025-06-12 06:56:58,095 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:56:58,106 p=14991 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2025-06-12 06:56:58,106 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:58 +0000 (0:00:00.263) 0:00:17.967 ********* 2025-06-12 06:56:58,138 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2025-06-12 06:56:58,145 p=14991 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2025-06-12 06:56:58,145 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:58 +0000 (0:00:00.039) 0:00:18.007 ********* 2025-06-12 06:56:58,161 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2025-06-12 06:56:58,167 p=14991 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2025-06-12 06:56:58,167 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:56:58 +0000 (0:00:00.021) 0:00:18.029 ********* 2025-06-12 06:57:22,848 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:22,856 p=14991 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2025-06-12 06:57:22,856 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:22 +0000 (0:00:24.688) 0:00:42.717 ********* 2025-06-12 06:57:23,117 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:23,124 p=14991 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2025-06-12 06:57:23,124 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:23 +0000 (0:00:00.268) 0:00:42.985 ********* 2025-06-12 06:57:23,296 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:23,303 p=14991 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2025-06-12 06:57:23,303 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:23 +0000 (0:00:00.178) 0:00:43.164 ********* 2025-06-12 06:57:29,094 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:29,099 p=14991 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2025-06-12 06:57:29,100 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:05.796) 0:00:48.961 ********* 2025-06-12 06:57:29,121 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,127 p=14991 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2025-06-12 06:57:29,127 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.027) 0:00:48.988 ********* 2025-06-12 06:57:29,358 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:29,364 p=14991 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2025-06-12 06:57:29,364 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.236) 0:00:49.225 ********* 2025-06-12 06:57:29,624 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:29,630 p=14991 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2025-06-12 06:57:29,630 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.266) 0:00:49.492 ********* 2025-06-12 06:57:29,644 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,650 p=14991 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2025-06-12 06:57:29,650 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.020) 0:00:49.512 ********* 2025-06-12 06:57:29,663 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,669 p=14991 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2025-06-12 06:57:29,669 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.018) 0:00:49.530 ********* 2025-06-12 06:57:29,682 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,689 p=14991 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2025-06-12 06:57:29,689 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.019) 0:00:49.550 ********* 2025-06-12 06:57:29,702 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,708 p=14991 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2025-06-12 06:57:29,708 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.019) 0:00:49.569 ********* 2025-06-12 06:57:29,721 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,727 p=14991 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2025-06-12 06:57:29,727 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.018) 0:00:49.588 ********* 2025-06-12 06:57:29,743 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:29,751 p=14991 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2025-06-12 06:57:29,751 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:29 +0000 (0:00:00.023) 0:00:49.612 ********* 2025-06-12 06:57:29,955 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2025-06-12 06:57:30,124 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-06-12 06:57:30,282 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2025-06-12 06:57:30,457 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2025-06-12 06:57:30,622 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-06-12 06:57:30,634 p=14991 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2025-06-12 06:57:30,634 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:30 +0000 (0:00:00.883) 0:00:50.496 ********* 2025-06-12 06:57:30,741 p=14991 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-06-12 06:57:30,742 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:30 +0000 (0:00:00.107) 0:00:50.603 ********* 2025-06-12 06:57:30,933 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-06-12 06:57:31,079 p=14991 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2025-06-12 06:57:31,220 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2025-06-12 06:57:31,227 p=14991 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2025-06-12 06:57:31,227 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.485) 0:00:51.088 ********* 2025-06-12 06:57:31,259 p=14991 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2025-06-12 06:57:31,259 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.032) 0:00:51.120 ********* 2025-06-12 06:57:31,281 p=14991 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-06-12 06:57:31,283 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:31,289 p=14991 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2025-06-12 06:57:31,289 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.029) 0:00:51.150 ********* 2025-06-12 06:57:31,311 p=14991 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-06-12 06:57:31,313 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:31,323 p=14991 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2025-06-12 06:57:31,324 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.034) 0:00:51.185 ********* 2025-06-12 06:57:31,381 p=14991 u=zuul n=ansible | ok: [localhost] => (item={'DEPLOY_DIR': '/home/zuul/ci-framework-data/artifacts/edpm_compute', 'BMAAS_INSTANCE_MEMORY': 8192, 'BMAAS_INSTANCE_VCPUS': 6, 'BMAAS_INSTANCE_DISK_SIZE': 40, 'DATAPLANE_GROWVOLS_ARGS': '/=8GB /tmp=1GB /home=1GB /var=8GB', 'INSTALL_CERT_MANAGER': False}) 2025-06-12 06:57:31,389 p=14991 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2025-06-12 06:57:31,390 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.065) 0:00:51.251 ********* 2025-06-12 06:57:31,424 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:31,430 p=14991 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2025-06-12 06:57:31,430 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.040) 0:00:51.291 ********* 2025-06-12 06:57:31,968 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:31,975 p=14991 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2025-06-12 06:57:31,975 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:31 +0000 (0:00:00.545) 0:00:51.837 ********* 2025-06-12 06:57:32,158 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:32,166 p=14991 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2025-06-12 06:57:32,166 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.190) 0:00:52.027 ********* 2025-06-12 06:57:32,204 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:32,221 p=14991 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2025-06-12 06:57:32,221 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.055) 0:00:52.083 ********* 2025-06-12 06:57:32,573 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:32,579 p=14991 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2025-06-12 06:57:32,579 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.357) 0:00:52.441 ********* 2025-06-12 06:57:32,601 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:32,608 p=14991 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2025-06-12 06:57:32,608 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.028) 0:00:52.469 ********* 2025-06-12 06:57:32,624 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm 2025-06-12 06:57:32,631 p=14991 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2025-06-12 06:57:32,631 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.022) 0:00:52.492 ********* 2025-06-12 06:57:32,655 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/tests/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/tests/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: 6 BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.6 BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: '' BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/tests/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/tests/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/tests/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/tests/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/tests/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/tests/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/tests/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '1234567842' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_RETRIES: '5' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/tests/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/tests/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/tests/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12345678' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/tests/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: osp-secret SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/tests/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: tests/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' tripleo_deploy: 'export REGISTRY_PWD:' 2025-06-12 06:57:32,661 p=14991 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2025-06-12 06:57:32,661 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.030) 0:00:52.523 ********* 2025-06-12 06:57:32,948 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:32,956 p=14991 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2025-06-12 06:57:32,956 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.294) 0:00:52.817 ********* 2025-06-12 06:57:32,975 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp_with_retries - nncp_dns - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2025-06-12 06:57:32,983 p=14991 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2025-06-12 06:57:32,983 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:32 +0000 (0:00:00.026) 0:00:52.844 ********* 2025-06-12 06:57:33,331 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:33,339 p=14991 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2025-06-12 06:57:33,339 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:33 +0000 (0:00:00.356) 0:00:53.200 ********* 2025-06-12 06:57:33,357 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:33,371 p=14991 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2025-06-12 06:57:33,371 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:33 +0000 (0:00:00.032) 0:00:53.232 ********* 2025-06-12 06:57:35,030 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:35,037 p=14991 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2025-06-12 06:57:35,037 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:01.665) 0:00:54.898 ********* 2025-06-12 06:57:35,058 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:35,070 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2025-06-12 06:57:35,070 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.033) 0:00:54.931 ********* 2025-06-12 06:57:35,424 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:57:35,436 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:57:35,437 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.366) 0:00:55.298 ********* 2025-06-12 06:57:35,491 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:35,498 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:57:35,498 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.061) 0:00:55.360 ********* 2025-06-12 06:57:35,563 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:35,572 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:57:35,572 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.073) 0:00:55.433 ********* 2025-06-12 06:57:35,650 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2025-06-12 06:57:35,659 p=14991 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e operator_namespace={{ _operator_namespace }} -e namespace={{ _namespace}} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2025-06-12 06:57:35,660 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.087) 0:00:55.521 ********* 2025-06-12 06:57:35,698 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:35,705 p=14991 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2025-06-12 06:57:35,705 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.045) 0:00:55.566 ********* 2025-06-12 06:57:35,868 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:35,875 p=14991 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2025-06-12 06:57:35,875 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.170) 0:00:55.737 ********* 2025-06-12 06:57:35,888 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:57:35,895 p=14991 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2025-06-12 06:57:35,896 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:35 +0000 (0:00:00.020) 0:00:55.757 ********* 2025-06-12 06:57:36,044 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:36,051 p=14991 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2025-06-12 06:57:36,052 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:36 +0000 (0:00:00.155) 0:00:55.913 ********* 2025-06-12 06:57:36,068 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:36,075 p=14991 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2025-06-12 06:57:36,075 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:36 +0000 (0:00:00.023) 0:00:55.936 ********* 2025-06-12 06:57:36,231 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:36,238 p=14991 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2025-06-12 06:57:36,238 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:36 +0000 (0:00:00.162) 0:00:56.099 ********* 2025-06-12 06:57:36,400 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:57:36,410 p=14991 u=zuul n=ansible | TASK [run_hook : Run Download needed tools] ************************************ 2025-06-12 06:57:36,410 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:57:36 +0000 (0:00:00.172) 0:00:56.272 ********* 2025-06-12 06:57:36,452 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_download_needed.log 2025-06-12 06:58:05,972 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:05,978 p=14991 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-06-12 06:58:05,978 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:05 +0000 (0:00:29.567) 0:01:25.839 ********* 2025-06-12 06:58:06,124 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:06,131 p=14991 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2025-06-12 06:58:06,131 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.152) 0:01:25.992 ********* 2025-06-12 06:58:06,143 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:06,174 p=14991 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2025-06-12 06:58:06,190 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-06-12 06:58:06,190 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.059) 0:01:26.051 ********* 2025-06-12 06:58:06,225 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:06,232 p=14991 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2025-06-12 06:58:06,233 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.042) 0:01:26.094 ********* 2025-06-12 06:58:06,297 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure output directory exists path={{ cifmw_libvirt_manager_basedir }}/artifacts, state=directory, mode=0755] *** 2025-06-12 06:58:06,297 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.064) 0:01:26.158 ********* 2025-06-12 06:58:06,461 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:06,469 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Get vmx/svm extensions from /proc/cpuinfo _raw_params=egrep "(vmx|svm)" /proc/cpuinfo] *** 2025-06-12 06:58:06,469 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.171) 0:01:26.330 ********* 2025-06-12 06:58:06,621 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:06,628 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Check if KVM is enabled path=/dev/kvm] ***************** 2025-06-12 06:58:06,628 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.159) 0:01:26.489 ********* 2025-06-12 06:58:06,785 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:06,792 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Fail if KVM not enabled msg=['KVM is not enabled.', 'Set cifmw_libvirt_manager_enable_virtualization_module to true to enable it during the role execution']] *** 2025-06-12 06:58:06,792 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.163) 0:01:26.653 ********* 2025-06-12 06:58:06,806 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:06,814 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Check if VMX virtualization virtualization_to_enable=kvm_intel] *** 2025-06-12 06:58:06,814 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.021) 0:01:26.675 ********* 2025-06-12 06:58:06,826 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:06,833 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Check if SVM virtualization virtualization_to_enable=kvm_amd] *** 2025-06-12 06:58:06,833 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.019) 0:01:26.694 ********* 2025-06-12 06:58:06,849 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:06,857 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Enable VMX virtualization name={{ virtualization_to_enable }}, state=present, persistent=present] *** 2025-06-12 06:58:06,857 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.023) 0:01:26.718 ********* 2025-06-12 06:58:06,869 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:06,876 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Install packages required for using KVM name={{ cifmw_libvirt_manager_dependency_packages }}, state=present] *** 2025-06-12 06:58:06,876 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:06 +0000 (0:00:00.019) 0:01:26.737 ********* 2025-06-12 06:58:10,377 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:10,384 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Create rules.d polkit folder path={{ cifmw_libvirt_manager_polkit_rules_dir }}, state=directory, mode=0755] *** 2025-06-12 06:58:10,384 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:10 +0000 (0:00:03.507) 0:01:30.245 ********* 2025-06-12 06:58:10,565 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:10,574 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Enable UNIX socket PolicyKit auth src=80-libvirt-manage.rules.j2, dest={{ cifmw_libvirt_manager_polkit_rules_file }}, mode=0644] *** 2025-06-12 06:58:10,574 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:10 +0000 (0:00:00.190) 0:01:30.435 ********* 2025-06-12 06:58:10,971 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:10,979 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Restart service polkit service name=polkit, state=restarted] *** 2025-06-12 06:58:10,979 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:10 +0000 (0:00:00.404) 0:01:30.840 ********* 2025-06-12 06:58:11,597 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:11,605 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Remove directory for service override path=/etc/systemd/system/virtproxyd.service.d, state=absent] *** 2025-06-12 06:58:11,605 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:11 +0000 (0:00:00.626) 0:01:31.467 ********* 2025-06-12 06:58:11,789 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:11,797 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Reload systemctl and start/enable virtproxyd.service daemon_reload=True] *** 2025-06-12 06:58:11,797 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:11 +0000 (0:00:00.191) 0:01:31.658 ********* 2025-06-12 06:58:12,522 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:12,529 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure firewalld service is up name=firewalld, state=started, enabled=True] *** 2025-06-12 06:58:12,529 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:12 +0000 (0:00:00.732) 0:01:32.390 ********* 2025-06-12 06:58:13,025 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:13,032 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure libvirt modular driver daemons are started. _raw_params=drivers.yml] *** 2025-06-12 06:58:13,033 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:13 +0000 (0:00:00.503) 0:01:32.894 ********* 2025-06-12 06:58:13,102 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=qemu) 2025-06-12 06:58:13,105 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=interface) 2025-06-12 06:58:13,107 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=network) 2025-06-12 06:58:13,112 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=nodedev) 2025-06-12 06:58:13,114 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=nwfilter) 2025-06-12 06:58:13,117 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=secret) 2025-06-12 06:58:13,119 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=storage) 2025-06-12 06:58:13,121 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/libvirt_manager/tasks/drivers.yml for localhost => (item=proxy) 2025-06-12 06:58:13,132 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for qemu. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:13,132 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:13 +0000 (0:00:00.099) 0:01:32.994 ********* 2025-06-12 06:58:13,444 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:13,454 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for qemu. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:13,454 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:13 +0000 (0:00:00.321) 0:01:33.315 ********* 2025-06-12 06:58:13,778 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:13,787 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for qemu. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:13,787 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:13 +0000 (0:00:00.333) 0:01:33.648 ********* 2025-06-12 06:58:14,108 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:14,117 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for interface. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:14,117 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:14 +0000 (0:00:00.330) 0:01:33.979 ********* 2025-06-12 06:58:14,446 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:14,454 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for interface. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:14,454 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:14 +0000 (0:00:00.336) 0:01:34.316 ********* 2025-06-12 06:58:14,748 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:14,756 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for interface. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:14,756 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:14 +0000 (0:00:00.301) 0:01:34.617 ********* 2025-06-12 06:58:15,045 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:15,053 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for network. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:15,053 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:15 +0000 (0:00:00.296) 0:01:34.914 ********* 2025-06-12 06:58:15,346 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:15,355 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for network. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:15,355 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:15 +0000 (0:00:00.301) 0:01:35.216 ********* 2025-06-12 06:58:15,658 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:15,666 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for network. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:15,666 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:15 +0000 (0:00:00.311) 0:01:35.528 ********* 2025-06-12 06:58:15,961 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:15,970 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for nodedev. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:15,970 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:15 +0000 (0:00:00.303) 0:01:35.831 ********* 2025-06-12 06:58:16,266 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:16,274 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for nodedev. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:16,274 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:16 +0000 (0:00:00.303) 0:01:36.135 ********* 2025-06-12 06:58:16,563 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:16,571 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for nodedev. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:16,572 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:16 +0000 (0:00:00.297) 0:01:36.433 ********* 2025-06-12 06:58:16,865 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:16,873 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for nwfilter. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:16,873 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:16 +0000 (0:00:00.301) 0:01:36.734 ********* 2025-06-12 06:58:17,166 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:17,174 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for nwfilter. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:17,174 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:17 +0000 (0:00:00.301) 0:01:37.035 ********* 2025-06-12 06:58:17,463 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:17,471 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for nwfilter. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:17,471 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:17 +0000 (0:00:00.297) 0:01:37.333 ********* 2025-06-12 06:58:17,759 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:17,767 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for secret. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:17,767 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:17 +0000 (0:00:00.295) 0:01:37.628 ********* 2025-06-12 06:58:18,053 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:18,061 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for secret. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:18,061 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:18 +0000 (0:00:00.294) 0:01:37.922 ********* 2025-06-12 06:58:18,405 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:18,413 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for secret. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:18,413 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:18 +0000 (0:00:00.351) 0:01:38.274 ********* 2025-06-12 06:58:18,704 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:18,712 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for storage. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:18,712 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:18 +0000 (0:00:00.298) 0:01:38.573 ********* 2025-06-12 06:58:19,004 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:19,012 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for storage. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:19,012 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:19 +0000 (0:00:00.300) 0:01:38.873 ********* 2025-06-12 06:58:19,302 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:19,311 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for storage. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:19,311 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:19 +0000 (0:00:00.298) 0:01:39.172 ********* 2025-06-12 06:58:19,608 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:19,616 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-write socket is enabled for proxy. name=virt{{ driver_name }}d.socket, state=started, enabled=True] *** 2025-06-12 06:58:19,616 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:19 +0000 (0:00:00.305) 0:01:39.477 ********* 2025-06-12 06:58:19,907 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:19,915 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure read-only socket is enabled for proxy. name=virt{{ driver_name }}d-ro.socket, state=started, enabled=True] *** 2025-06-12 06:58:19,915 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:19 +0000 (0:00:00.298) 0:01:39.776 ********* 2025-06-12 06:58:20,217 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:20,225 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure admin socket is enabled for proxy. name=virt{{ driver_name }}d-admin.socket, state=started, enabled=True] *** 2025-06-12 06:58:20,225 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:20 +0000 (0:00:00.310) 0:01:40.086 ********* 2025-06-12 06:58:20,519 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:20,526 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Manage service for older releases name={{ cifmw_libvirt_manager_daemon }}, state=started, enabled=True] *** 2025-06-12 06:58:20,526 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:20 +0000 (0:00:00.300) 0:01:40.387 ********* 2025-06-12 06:58:20,542 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:20,548 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Get libvirt group users database=group, key=libvirt] *** 2025-06-12 06:58:20,548 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:20 +0000 (0:00:00.022) 0:01:40.410 ********* 2025-06-12 06:58:20,820 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:20,826 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Add user if not exists in libvirt group name={{ cifmw_libvirt_manager_user }}, groups=libvirt, append=True] *** 2025-06-12 06:58:20,826 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:20 +0000 (0:00:00.277) 0:01:40.688 ********* 2025-06-12 06:58:21,167 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:21,174 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Allow QEMU on home directory for the storage access path={{ ansible_user_dir }}, entity=qemu, etype=user, permissions=rx, state=present] *** 2025-06-12 06:58:21,174 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.347) 0:01:41.035 ********* 2025-06-12 06:58:21,460 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:21,467 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Inject system connection parameters in bashrc dest={{ ansible_user_dir }}/.bashrc, block=export LIBVIRT_DEFAULT_URI="qemu:///system"] *** 2025-06-12 06:58:21,467 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.293) 0:01:41.329 ********* 2025-06-12 06:58:21,616 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:21,623 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure we reload user env _raw_params=reset_connection] *** 2025-06-12 06:58:21,623 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.155) 0:01:41.484 ********* 2025-06-12 06:58:21,630 p=14991 u=zuul n=ansible | [WARNING]: Reset is not implemented for this connection 2025-06-12 06:58:21,640 p=14991 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2025-06-12 06:58:21,640 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.017) 0:01:41.502 ********* 2025-06-12 06:58:21,657 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:21,688 p=14991 u=zuul n=ansible | PLAY [Run cifmw_setup infra.yml] *********************************************** 2025-06-12 06:58:21,710 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-06-12 06:58:21,710 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.069) 0:01:41.571 ********* 2025-06-12 06:58:21,745 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:21,752 p=14991 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-06-12 06:58:21,752 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.042) 0:01:41.613 ********* 2025-06-12 06:58:21,900 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:21,907 p=14991 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2025-06-12 06:58:21,907 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.154) 0:01:41.768 ********* 2025-06-12 06:58:21,924 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:21,931 p=14991 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2025-06-12 06:58:21,931 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.024) 0:01:41.792 ********* 2025-06-12 06:58:21,948 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:21,955 p=14991 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2025-06-12 06:58:21,955 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.023) 0:01:41.816 ********* 2025-06-12 06:58:21,973 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:21,985 p=14991 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2025-06-12 06:58:21,985 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:21 +0000 (0:00:00.030) 0:01:41.847 ********* 2025-06-12 06:58:22,003 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:22,009 p=14991 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2025-06-12 06:58:22,009 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.024) 0:01:41.871 ********* 2025-06-12 06:58:22,161 p=14991 u=zuul n=ansible | TASK [rhol_crc : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2025-06-12 06:58:22,161 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.151) 0:01:42.023 ********* 2025-06-12 06:58:22,331 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-06-12 06:58:22,471 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-06-12 06:58:22,612 p=14991 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/bin) 2025-06-12 06:58:22,621 p=14991 u=zuul n=ansible | TASK [manage_secrets : Ensure directory tree exist path={{ cifmw_manage_secrets_basedir }}/secrets, state=directory, owner={{ cifmw_manage_secrets_owner }}, mode=0700] *** 2025-06-12 06:58:22,621 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.460) 0:01:42.483 ********* 2025-06-12 06:58:22,784 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:22,796 p=14991 u=zuul n=ansible | TASK [rhol_crc : Check for binary path={{ cifmw_rhol_crc_binary }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-06-12 06:58:22,796 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.175) 0:01:42.658 ********* 2025-06-12 06:58:22,940 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:22,947 p=14991 u=zuul n=ansible | TASK [rhol_crc : Get versions if binary is available _raw_params=get_versions.yml] *** 2025-06-12 06:58:22,947 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.150) 0:01:42.809 ********* 2025-06-12 06:58:22,969 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/rhol_crc/tasks/get_versions.yml for localhost 2025-06-12 06:58:22,979 p=14991 u=zuul n=ansible | TASK [rhol_crc : Get CRC binary version _raw_params={{ cifmw_rhol_crc_binary }} version] *** 2025-06-12 06:58:22,979 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:22 +0000 (0:00:00.031) 0:01:42.840 ********* 2025-06-12 06:58:23,686 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:23,694 p=14991 u=zuul n=ansible | TASK [rhol_crc : Extract versions crc_version={{ _crc_vers.stdout_lines | select('match', 'CRC') | first | regex_replace('^CRC version: ([0-9\.]+).*$', '\1') }}, crc_openshift_version={{ _crc_vers.stdout_lines | select ('match', 'OpenShift') | first | regex_replace('^OpenShift version: (.*)$', '\1') }}] *** 2025-06-12 06:58:23,694 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:23 +0000 (0:00:00.715) 0:01:43.555 ********* 2025-06-12 06:58:23,716 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:23,723 p=14991 u=zuul n=ansible | TASK [rhol_crc : Output found binary location and versions msg=Found crc at {{ cifmw_rhol_crc_binary }}, with version {{ crc_version }} (wants: {{ cifmw_rhol_crc_version }}) and serving OpenShift version {{ crc_openshift_version }}.] *** 2025-06-12 06:58:23,723 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:23 +0000 (0:00:00.029) 0:01:43.585 ********* 2025-06-12 06:58:23,738 p=14991 u=zuul n=ansible | ok: [localhost] => msg: 'Found crc at /usr/local/bin/crc, with version 2.48.0 (wants: 2.39.0) and serving OpenShift version 4.18.1.' 2025-06-12 06:58:23,745 p=14991 u=zuul n=ansible | TASK [rhol_crc : Get CRC VM availability command=info, uri=qemu:///system] ***** 2025-06-12 06:58:23,745 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:23 +0000 (0:00:00.021) 0:01:43.606 ********* 2025-06-12 06:58:24,073 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:24,080 p=14991 u=zuul n=ansible | TASK [rhol_crc : Set CRC status crc_bin_available={{ _crc_bin.stat.exists }}, crc_present={{ _domains is defined and 'crc' in _domains }}, crc_running={{ _domain is defined and 'crc' in _domains and _domains.crc.state == 'running' }}] *** 2025-06-12 06:58:24,080 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.334) 0:01:43.941 ********* 2025-06-12 06:58:24,101 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:24,108 p=14991 u=zuul n=ansible | TASK [rhol_crc : Fail if crc domain is already defined msg=The crc domain already exist. Set cifmw_rhol_crc_force_cleanup to true to force the cleanup. Interrupting tasks.] *** 2025-06-12 06:58:24,108 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.028) 0:01:43.970 ********* 2025-06-12 06:58:24,123 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,130 p=14991 u=zuul n=ansible | TASK [Ensure pull-secret is in place if we need to configure CRC name=manage_secrets, tasks_from=pull_secret.yml] *** 2025-06-12 06:58:24,130 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.022) 0:01:43.992 ********* 2025-06-12 06:58:24,172 p=14991 u=zuul n=ansible | TASK [manage_secrets : Assert we get needed data quiet=True, that=['cifmw_manage_secrets_pullsecret_file != None or cifmw_manage_secrets_pullsecret_content != None', 'not (cifmw_manage_secrets_pullsecret_file != None and cifmw_manage_secrets_pullsecret_content != None)'], msg=Please provide EITHER cifmw_manage_secrets_pullsecret_file OR cifmw_manage_secrets_pullsecret_content - not both. ] *** 2025-06-12 06:58:24,172 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.041) 0:01:44.033 ********* 2025-06-12 06:58:24,189 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:24,196 p=14991 u=zuul n=ansible | TASK [manage_secrets : Manage secret _raw_params=_push_secret.yml] ************* 2025-06-12 06:58:24,196 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.024) 0:01:44.058 ********* 2025-06-12 06:58:24,218 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/manage_secrets/tasks/_push_secret.yml for localhost 2025-06-12 06:58:24,227 p=14991 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_dest var=_secret_dest] ******************** 2025-06-12 06:58:24,227 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.030) 0:01:44.088 ********* 2025-06-12 06:58:24,244 p=14991 u=zuul n=ansible | ok: [localhost] => _secret_dest: /home/zuul/pull-secret.json 2025-06-12 06:58:24,251 p=14991 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_file var=_secret_file] ******************** 2025-06-12 06:58:24,251 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.024) 0:01:44.113 ********* 2025-06-12 06:58:24,266 p=14991 u=zuul n=ansible | ok: [localhost] => _secret_file: null 2025-06-12 06:58:24,273 p=14991 u=zuul n=ansible | TASK [manage_secrets : Debug _secret_content var=_secret_content] ************** 2025-06-12 06:58:24,273 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.021) 0:01:44.134 ********* 2025-06-12 06:58:24,288 p=14991 u=zuul n=ansible | ok: [localhost] => _secret_content: {} 2025-06-12 06:58:24,295 p=14991 u=zuul n=ansible | TASK [manage_secrets : Ensure parameter is an absolute path that=['_secret_file is ansible.builtin.abs'], msg={{ _secret_file }} must be an absolute path ] *** 2025-06-12 06:58:24,295 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.022) 0:01:44.157 ********* 2025-06-12 06:58:24,307 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,314 p=14991 u=zuul n=ansible | TASK [manage_secrets : Copy file to location dest={{ _secret_dest }}, src={{ _secret_file }}, mode=0600, owner={{ cifmw_manage_secrets_owner }}] *** 2025-06-12 06:58:24,314 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.019) 0:01:44.176 ********* 2025-06-12 06:58:24,326 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,333 p=14991 u=zuul n=ansible | TASK [manage_secrets : Create file from content] ******************************* 2025-06-12 06:58:24,334 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.019) 0:01:44.195 ********* 2025-06-12 06:58:24,350 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,365 p=14991 u=zuul n=ansible | TASK [rhol_crc : Get wanted RHOL/CRC version binary if needed _raw_params=binary.yml] *** 2025-06-12 06:58:24,365 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.031) 0:01:44.227 ********* 2025-06-12 06:58:24,378 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,385 p=14991 u=zuul n=ansible | TASK [rhol_crc : Setup sudoers file for sudo commands in RHOL/CRC setup _raw_params=sudoers_grant.yml] *** 2025-06-12 06:58:24,385 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.019) 0:01:44.247 ********* 2025-06-12 06:58:24,398 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,405 p=14991 u=zuul n=ansible | TASK [rhol_crc : Clean RHOL/CRC if wanted _raw_params=cleanup.yml] ************* 2025-06-12 06:58:24,405 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.019) 0:01:44.267 ********* 2025-06-12 06:58:24,418 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,425 p=14991 u=zuul n=ansible | TASK [rhol_crc : Set RHOL/CRC configuration options _raw_params=configuration.yml] *** 2025-06-12 06:58:24,425 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.020) 0:01:44.287 ********* 2025-06-12 06:58:24,440 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,447 p=14991 u=zuul n=ansible | TASK [rhol_crc : Setup RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} setup 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-setup.log] *** 2025-06-12 06:58:24,447 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.021) 0:01:44.308 ********* 2025-06-12 06:58:24,461 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:24,468 p=14991 u=zuul n=ansible | TASK [rhol_crc : Start RHOL/CRC _raw_params=set -o pipefail; {{ cifmw_rhol_crc_binary }} start 2>&1 | tee {{ cifmw_rhol_crc_basedir }}/logs/crc-start.log] *** 2025-06-12 06:58:24,468 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.021) 0:01:44.329 ********* 2025-06-12 06:58:24,920 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:24,927 p=14991 u=zuul n=ansible | TASK [rhol_crc : List VMs command=list_vms] ************************************ 2025-06-12 06:58:24,927 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:24 +0000 (0:00:00.458) 0:01:44.788 ********* 2025-06-12 06:58:25,126 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:25,133 p=14991 u=zuul n=ansible | TASK [rhol_crc : Output VMs var=_vm_list] ************************************** 2025-06-12 06:58:25,133 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.206) 0:01:44.995 ********* 2025-06-12 06:58:25,150 p=14991 u=zuul n=ansible | ok: [localhost] => _vm_list: changed: false failed: false list_vms: - crc 2025-06-12 06:58:25,158 p=14991 u=zuul n=ansible | TASK [rhol_crc : List networks command=list_nets] ****************************** 2025-06-12 06:58:25,158 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.024) 0:01:45.019 ********* 2025-06-12 06:58:25,461 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:25,468 p=14991 u=zuul n=ansible | TASK [rhol_crc : Output networks var=_net_list] ******************************** 2025-06-12 06:58:25,468 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.310) 0:01:45.329 ********* 2025-06-12 06:58:25,485 p=14991 u=zuul n=ansible | ok: [localhost] => _net_list: changed: false failed: false list_nets: - crc - default 2025-06-12 06:58:25,492 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Get virtual network information command=info, uri=qemu:///system] *** 2025-06-12 06:58:25,492 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.024) 0:01:45.354 ********* 2025-06-12 06:58:25,696 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:25,703 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Create network to bridge mapping _net_bridge_map={{ _net_bridge_map | default({}) | combine(_local_map, recursive=true) }}] *** 2025-06-12 06:58:25,703 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.210) 0:01:45.564 ********* 2025-06-12 06:58:25,728 p=14991 u=zuul n=ansible | ok: [localhost] => (item=crc) 2025-06-12 06:58:25,731 p=14991 u=zuul n=ansible | ok: [localhost] => (item=default) 2025-06-12 06:58:25,739 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Dump domain xml command=get_xml, name={{ vm_name }}, uri=qemu:///system] *** 2025-06-12 06:58:25,739 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.035) 0:01:45.600 ********* 2025-06-12 06:58:25,928 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:25,935 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Extract networks from XML xmlstring={{ _domain_xml.get_xml }}, xpath=/domain/devices/interface/source, content=attribute] *** 2025-06-12 06:58:25,935 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:25 +0000 (0:00:00.196) 0:01:45.796 ********* 2025-06-12 06:58:26,226 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:26,234 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Attach interface default on crc _raw_params=virsh -c qemu:///system attach-interface "{{ vm_name }}" --source "{{ _local_bridge_name }}" --type "{{ _type }}" --mac "{{ _lm_mac_address }}" --model virtio --config --persistent] *** 2025-06-12 06:58:26,235 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:26 +0000 (0:00:00.299) 0:01:46.096 ********* 2025-06-12 06:58:26,501 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:26,514 p=14991 u=zuul n=ansible | TASK [rhol_crc : Revoke permissions granted in sudoers file for CRC/RHOL setup name={{ cifmw_rhol_crc_sudoers_file_name }}, state=absent] *** 2025-06-12 06:58:26,514 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:26 +0000 (0:00:00.279) 0:01:46.375 ********* 2025-06-12 06:58:26,791 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:26,798 p=14991 u=zuul n=ansible | TASK [openshift_login : Assert we have needed parameters that=['cifmw_openshift_login_load_kubeconfig is defined', 'cifmw_openshift_login_load_kubeconfig is not none', 'cifmw_openshift_login_load_kubeadmin is defined', 'cifmw_openshift_login_load_kubeadmin is not none']] *** 2025-06-12 06:58:26,798 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:26 +0000 (0:00:00.284) 0:01:46.660 ********* 2025-06-12 06:58:26,830 p=14991 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-06-12 06:58:26,837 p=14991 u=zuul n=ansible | TASK [openshift_login : Stat kubeconfig path={{ cifmw_openshift_login_load_kubeconfig }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-06-12 06:58:26,837 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:26 +0000 (0:00:00.038) 0:01:46.698 ********* 2025-06-12 06:58:26,984 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:26,992 p=14991 u=zuul n=ansible | TASK [openshift_login : Stat kubeadmin path={{ cifmw_openshift_login_load_kubeadmin }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-06-12 06:58:26,992 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:26 +0000 (0:00:00.154) 0:01:46.853 ********* 2025-06-12 06:58:27,137 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:27,144 p=14991 u=zuul n=ansible | TASK [openshift_login : Assert files exist that=['_stat_config.stat.exists', '_stat_admin.stat.exists']] *** 2025-06-12 06:58:27,144 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.152) 0:01:47.005 ********* 2025-06-12 06:58:27,162 p=14991 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-06-12 06:58:27,169 p=14991 u=zuul n=ansible | TASK [openshift_login : Gather the password of the deployed cluster. src={{ cifmw_openshift_login_load_kubeadmin }}] *** 2025-06-12 06:58:27,169 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.024) 0:01:47.030 ********* 2025-06-12 06:58:27,430 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:27,437 p=14991 u=zuul n=ansible | TASK [openshift_login : Gather the deployed OCP configuration. path={{ cifmw_openshift_login_load_kubeconfig }}] *** 2025-06-12 06:58:27,437 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.268) 0:01:47.298 ********* 2025-06-12 06:58:27,581 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:27,588 p=14991 u=zuul n=ansible | TASK [openshift_login : Set the OpenShift platform access information. cifmw_openshift_api={{ kubeconf.clusters[0].cluster.server }}, cifmw_openshift_user=kubeadmin, cifmw_openshift_password={{ kubeadmin_password.content | b64decode }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_load_kubeconfig }}, cacheable=True] *** 2025-06-12 06:58:27,588 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.150) 0:01:47.449 ********* 2025-06-12 06:58:27,609 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:27,621 p=14991 u=zuul n=ansible | TASK [rhol_crc : Make sure kubeconfig file exists path={{ cifmw_rhol_crc_kubeconfig }}] *** 2025-06-12 06:58:27,621 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.033) 0:01:47.482 ********* 2025-06-12 06:58:27,635 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:27,641 p=14991 u=zuul n=ansible | TASK [rhol_crc : Warn the user that the kubeconfig files doesn't exist msg=The kubeconfig file was not found at {{ cifmw_rhol_crc_kubeconfig }}.] *** 2025-06-12 06:58:27,641 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.020) 0:01:47.503 ********* 2025-06-12 06:58:27,654 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:27,661 p=14991 u=zuul n=ansible | TASK [rhol_crc : Add crc creds in the user bashrc file dest=~/.bashrc, create=True, block=if command -v crc; then eval "$(crc oc-env --shell bash)" fi export KUBECONFIG="{{ cifmw_rhol_crc_kubeconfig }}", mode=0644] *** 2025-06-12 06:58:27,661 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.019) 0:01:47.522 ********* 2025-06-12 06:58:27,674 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:27,681 p=14991 u=zuul n=ansible | TASK [rhol_crc : Source bashrc and confirm crc login executable=/bin/bash, _raw_params=source ~/.bashrc oc whoami ] *** 2025-06-12 06:58:27,681 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.020) 0:01:47.543 ********* 2025-06-12 06:58:27,694 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:27,701 p=14991 u=zuul n=ansible | TASK [rhol_crc : Check bashrc results var=bashrc_result.stdout] **************** 2025-06-12 06:58:27,701 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.019) 0:01:47.562 ********* 2025-06-12 06:58:27,714 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:27,721 p=14991 u=zuul n=ansible | TASK [rhol_crc : Check if using systemd dnsmasq path={{ _dnsmasq_config }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-06-12 06:58:27,721 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:27 +0000 (0:00:00.020) 0:01:47.582 ********* 2025-06-12 06:58:28,940 p=14991 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2025-06-12 06:58:28,941 p=14991 u=zuul n=ansible | ok: [localhost -> crc(api.crc.testing)] 2025-06-12 06:58:28,948 p=14991 u=zuul n=ansible | TASK [rhol_crc : Configure dnsmasq listen-address to listen on both br-ex and ospbr path={{ _dnsmasq_config }}, insertafter=^listen-address=, line=listen-address={{ _crc_ip | ansible.utils.ipaddr('address') }}] *** 2025-06-12 06:58:28,948 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:28 +0000 (0:00:01.226) 0:01:48.809 ********* 2025-06-12 06:58:29,529 p=14991 u=zuul n=ansible | [WARNING]: Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually 2025-06-12 06:58:29,529 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2025-06-12 06:58:29,536 p=14991 u=zuul n=ansible | TASK [rhol_crc : Restart DNS in CRC VM name=dnsmasq, state=restarted] ********** 2025-06-12 06:58:29,536 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:29 +0000 (0:00:00.588) 0:01:49.397 ********* 2025-06-12 06:58:30,593 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] 2025-06-12 06:58:30,605 p=14991 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2025-06-12 06:58:30,605 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:01.068) 0:01:50.466 ********* 2025-06-12 06:58:30,623 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:30,629 p=14991 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2025-06-12 06:58:30,629 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.024) 0:01:50.491 ********* 2025-06-12 06:58:30,792 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:30,799 p=14991 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2025-06-12 06:58:30,799 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.169) 0:01:50.661 ********* 2025-06-12 06:58:30,824 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2025-06-12 06:58:30,835 p=14991 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-06-12 06:58:30,835 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.035) 0:01:50.696 ********* 2025-06-12 06:58:30,853 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:30,860 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2025-06-12 06:58:30,860 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.025) 0:01:50.721 ********* 2025-06-12 06:58:30,879 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:30,887 p=14991 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2025-06-12 06:58:30,887 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.027) 0:01:50.748 ********* 2025-06-12 06:58:30,905 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:30,913 p=14991 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2025-06-12 06:58:30,913 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.025) 0:01:50.774 ********* 2025-06-12 06:58:30,941 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:30,948 p=14991 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2025-06-12 06:58:30,948 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:30 +0000 (0:00:00.034) 0:01:50.809 ********* 2025-06-12 06:58:31,109 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:31,116 p=14991 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2025-06-12 06:58:31,116 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.168) 0:01:50.978 ********* 2025-06-12 06:58:31,138 p=14991 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-06-12 06:58:31,145 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2025-06-12 06:58:31,145 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.028) 0:01:51.006 ********* 2025-06-12 06:58:31,165 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:31,172 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2025-06-12 06:58:31,172 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.026) 0:01:51.033 ********* 2025-06-12 06:58:31,189 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:31,196 p=14991 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2025-06-12 06:58:31,196 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.024) 0:01:51.058 ********* 2025-06-12 06:58:31,213 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:31,221 p=14991 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2025-06-12 06:58:31,221 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.024) 0:01:51.082 ********* 2025-06-12 06:58:31,242 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:31,252 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2025-06-12 06:58:31,252 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.031) 0:01:51.113 ********* 2025-06-12 06:58:31,273 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2025-06-12 06:58:31,283 p=14991 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2025-06-12 06:58:31,283 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.030) 0:01:51.144 ********* 2025-06-12 06:58:31,296 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:31,303 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2025-06-12 06:58:31,303 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.020) 0:01:51.164 ********* 2025-06-12 06:58:31,346 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2025-06-12 06:58:31,745 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:31,752 p=14991 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2025-06-12 06:58:31,752 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.449) 0:01:51.614 ********* 2025-06-12 06:58:31,768 p=14991 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-06-12 06:58:31,776 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2025-06-12 06:58:31,776 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:31 +0000 (0:00:00.023) 0:01:51.637 ********* 2025-06-12 06:58:32,012 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:32,019 p=14991 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2025-06-12 06:58:32,019 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.243) 0:01:51.881 ********* 2025-06-12 06:58:32,042 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:32,048 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2025-06-12 06:58:32,048 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.029) 0:01:51.910 ********* 2025-06-12 06:58:32,282 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:32,289 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2025-06-12 06:58:32,289 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.240) 0:01:52.151 ********* 2025-06-12 06:58:32,518 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:32,524 p=14991 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2025-06-12 06:58:32,525 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.235) 0:01:52.386 ********* 2025-06-12 06:58:32,756 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:32,764 p=14991 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2025-06-12 06:58:32,764 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.239) 0:01:52.625 ********* 2025-06-12 06:58:32,793 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:32,799 p=14991 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2025-06-12 06:58:32,799 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:32 +0000 (0:00:00.035) 0:01:52.661 ********* 2025-06-12 06:58:33,134 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:33,141 p=14991 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2025-06-12 06:58:33,141 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:33 +0000 (0:00:00.341) 0:01:53.002 ********* 2025-06-12 06:58:33,292 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:33,300 p=14991 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2025-06-12 06:58:33,300 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:33 +0000 (0:00:00.158) 0:01:53.161 ********* 2025-06-12 06:58:33,653 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:33,665 p=14991 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2025-06-12 06:58:33,665 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:33 +0000 (0:00:00.365) 0:01:53.527 ********* 2025-06-12 06:58:33,822 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:33,829 p=14991 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2025-06-12 06:58:33,829 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:33 +0000 (0:00:00.163) 0:01:53.690 ********* 2025-06-12 06:58:33,851 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:33,861 p=14991 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2025-06-12 06:58:33,861 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:33 +0000 (0:00:00.031) 0:01:53.722 ********* 2025-06-12 06:58:34,658 p=14991 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2025-06-12 06:58:35,248 p=14991 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2025-06-12 06:58:35,259 p=14991 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2025-06-12 06:58:35,259 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:01.398) 0:01:55.120 ********* 2025-06-12 06:58:35,273 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,280 p=14991 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2025-06-12 06:58:35,280 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.020) 0:01:55.141 ********* 2025-06-12 06:58:35,298 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2025-06-12 06:58:35,299 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2025-06-12 06:58:35,300 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,307 p=14991 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2025-06-12 06:58:35,307 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.026) 0:01:55.168 ********* 2025-06-12 06:58:35,326 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,334 p=14991 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2025-06-12 06:58:35,334 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.027) 0:01:55.196 ********* 2025-06-12 06:58:35,353 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,360 p=14991 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2025-06-12 06:58:35,360 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.025) 0:01:55.221 ********* 2025-06-12 06:58:35,377 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,384 p=14991 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2025-06-12 06:58:35,384 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.024) 0:01:55.246 ********* 2025-06-12 06:58:35,402 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,409 p=14991 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2025-06-12 06:58:35,409 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.024) 0:01:55.270 ********* 2025-06-12 06:58:35,426 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,434 p=14991 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2025-06-12 06:58:35,434 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.024) 0:01:55.295 ********* 2025-06-12 06:58:35,450 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,457 p=14991 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2025-06-12 06:58:35,458 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.023) 0:01:55.319 ********* 2025-06-12 06:58:35,474 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:35,481 p=14991 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2025-06-12 06:58:35,481 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:35 +0000 (0:00:00.023) 0:01:55.342 ********* 2025-06-12 06:58:36,100 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:36,107 p=14991 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2025-06-12 06:58:36,107 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.625) 0:01:55.968 ********* 2025-06-12 06:58:36,128 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:36,135 p=14991 u=zuul n=ansible | TASK [openshift_setup : Metal3 tweaks _raw_params=metal3_config.yml] *********** 2025-06-12 06:58:36,135 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.028) 0:01:55.997 ********* 2025-06-12 06:58:36,157 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_setup/tasks/metal3_config.yml for localhost 2025-06-12 06:58:36,167 p=14991 u=zuul n=ansible | TASK [openshift_setup : Fetch Metal3 configuration name _raw_params=oc get Provisioning -o name] *** 2025-06-12 06:58:36,167 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.031) 0:01:56.028 ********* 2025-06-12 06:58:36,180 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:36,187 p=14991 u=zuul n=ansible | TASK [openshift_setup : Apply the patch to Metal3 Provisioning _raw_params=oc patch {{ _cifmw_openshift_setup_provisioning_name.stdout }} --type='json' -p='[{"op": "replace", "path": "/spec/watchAllNamespaces", "value": true}]'] *** 2025-06-12 06:58:36,187 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.020) 0:01:56.049 ********* 2025-06-12 06:58:36,201 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:36,208 p=14991 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2025-06-12 06:58:36,208 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.020) 0:01:56.069 ********* 2025-06-12 06:58:36,966 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:36,977 p=14991 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2025-06-12 06:58:36,977 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:36 +0000 (0:00:00.768) 0:01:56.838 ********* 2025-06-12 06:58:37,749 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:37,755 p=14991 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2025-06-12 06:58:37,755 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.778) 0:01:57.617 ********* 2025-06-12 06:58:37,770 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:37,778 p=14991 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2025-06-12 06:58:37,778 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.022) 0:01:57.639 ********* 2025-06-12 06:58:37,792 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:37,804 p=14991 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2025-06-12 06:58:37,805 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.026) 0:01:57.666 ********* 2025-06-12 06:58:37,821 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:37,829 p=14991 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2025-06-12 06:58:37,829 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.024) 0:01:57.690 ********* 2025-06-12 06:58:37,846 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:37,853 p=14991 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2025-06-12 06:58:37,853 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.024) 0:01:57.714 ********* 2025-06-12 06:58:37,976 p=14991 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2025-06-12 06:58:37,976 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:37 +0000 (0:00:00.123) 0:01:57.837 ********* 2025-06-12 06:58:38,131 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:38,138 p=14991 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2025-06-12 06:58:38,138 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:38 +0000 (0:00:00.162) 0:01:58.000 ********* 2025-06-12 06:58:38,753 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:38,760 p=14991 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2025-06-12 06:58:38,760 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:38 +0000 (0:00:00.621) 0:01:58.621 ********* 2025-06-12 06:58:38,781 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2025-06-12 06:58:38,791 p=14991 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2025-06-12 06:58:38,791 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:38 +0000 (0:00:00.031) 0:01:58.652 ********* 2025-06-12 06:58:39,525 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:39,532 p=14991 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2025-06-12 06:58:39,532 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:39 +0000 (0:00:00.741) 0:01:59.393 ********* 2025-06-12 06:58:54,337 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:58:54,354 p=14991 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2025-06-12 06:58:54,354 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:54 +0000 (0:00:14.822) 0:02:14.216 ********* 2025-06-12 06:58:54,370 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:58:54,379 p=14991 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2025-06-12 06:58:54,379 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:54 +0000 (0:00:00.024) 0:02:14.240 ********* 2025-06-12 06:58:54,994 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:58:55,001 p=14991 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2025-06-12 06:58:55,001 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:58:55 +0000 (0:00:00.622) 0:02:14.862 ********* 2025-06-12 06:59:25,787 p=14991 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2025-06-12 06:59:26,366 p=14991 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2025-06-12 06:59:26,954 p=14991 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2025-06-12 06:59:26,967 p=14991 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2025-06-12 06:59:26,967 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:26 +0000 (0:00:31.966) 0:02:46.829 ********* 2025-06-12 06:59:27,124 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:27,132 p=14991 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ lookup('env', 'HOME') }}/bin/cmctl, mode=0755] *** 2025-06-12 06:59:27,132 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:27 +0000 (0:00:00.164) 0:02:46.994 ********* 2025-06-12 06:59:28,675 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:28,683 p=14991 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ lookup('env', 'HOME') }}/bin/cmctl check api --wait=2m] *** 2025-06-12 06:59:28,683 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:28 +0000 (0:00:01.550) 0:02:48.544 ********* 2025-06-12 06:59:28,935 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:28,948 p=14991 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2025-06-12 06:59:28,949 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:28 +0000 (0:00:00.265) 0:02:48.810 ********* 2025-06-12 06:59:28,971 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:28,980 p=14991 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2025-06-12 06:59:28,980 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:28 +0000 (0:00:00.031) 0:02:48.842 ********* 2025-06-12 06:59:28,997 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,005 p=14991 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2025-06-12 06:59:29,005 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.024) 0:02:48.866 ********* 2025-06-12 06:59:29,022 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,029 p=14991 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2025-06-12 06:59:29,029 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.024) 0:02:48.890 ********* 2025-06-12 06:59:29,042 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,049 p=14991 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2025-06-12 06:59:29,049 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.019) 0:02:48.910 ********* 2025-06-12 06:59:29,065 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,072 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:29,072 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.023) 0:02:48.933 ********* 2025-06-12 06:59:29,118 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,126 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:29,126 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.053) 0:02:48.987 ********* 2025-06-12 06:59:29,191 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,202 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:29,202 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.076) 0:02:49.064 ********* 2025-06-12 06:59:29,268 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,304 p=14991 u=zuul n=ansible | PLAY [Build package playbook] ************************************************** 2025-06-12 06:59:29,321 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:29,321 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.119) 0:02:49.183 ********* 2025-06-12 06:59:29,368 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,375 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:29,375 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.053) 0:02:49.236 ********* 2025-06-12 06:59:29,441 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,450 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:29,450 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.075) 0:02:49.311 ********* 2025-06-12 06:59:29,516 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,528 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 06:59:29,528 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.077) 0:02:49.389 ********* 2025-06-12 06:59:29,563 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,570 p=14991 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2025-06-12 06:59:29,570 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.041) 0:02:49.431 ********* 2025-06-12 06:59:29,592 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,598 p=14991 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2025-06-12 06:59:29,598 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.028) 0:02:49.460 ********* 2025-06-12 06:59:29,609 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,621 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:29,621 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.022) 0:02:49.482 ********* 2025-06-12 06:59:29,668 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,675 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:29,675 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.053) 0:02:49.536 ********* 2025-06-12 06:59:29,741 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,749 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:29,749 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.074) 0:02:49.610 ********* 2025-06-12 06:59:29,815 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:29,848 p=14991 u=zuul n=ansible | PLAY [Build container playbook] ************************************************ 2025-06-12 06:59:29,865 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:29,865 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.115) 0:02:49.726 ********* 2025-06-12 06:59:29,912 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,919 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:29,919 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.054) 0:02:49.780 ********* 2025-06-12 06:59:29,986 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:29,993 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:29,993 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:29 +0000 (0:00:00.074) 0:02:49.855 ********* 2025-06-12 06:59:30,061 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,074 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 06:59:30,074 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.080) 0:02:49.935 ********* 2025-06-12 06:59:30,110 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,117 p=14991 u=zuul n=ansible | TASK [Nothing to do yet msg=No support for that step yet] ********************** 2025-06-12 06:59:30,117 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.043) 0:02:49.979 ********* 2025-06-12 06:59:30,131 p=14991 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2025-06-12 06:59:30,138 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:30,138 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.020) 0:02:50.000 ********* 2025-06-12 06:59:30,188 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,195 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:30,195 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.056) 0:02:50.056 ********* 2025-06-12 06:59:30,260 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,267 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:30,267 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.071) 0:02:50.128 ********* 2025-06-12 06:59:30,331 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,361 p=14991 u=zuul n=ansible | PLAY [Build operators playbook] ************************************************ 2025-06-12 06:59:30,379 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:30,379 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.111) 0:02:50.240 ********* 2025-06-12 06:59:30,427 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,433 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:30,434 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.054) 0:02:50.295 ********* 2025-06-12 06:59:30,500 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,508 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:30,508 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.074) 0:02:50.369 ********* 2025-06-12 06:59:30,573 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,585 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 06:59:30,585 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.076) 0:02:50.446 ********* 2025-06-12 06:59:30,623 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,630 p=14991 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-06-12 06:59:30,630 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.045) 0:02:50.491 ********* 2025-06-12 06:59:30,653 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2025-06-12 06:59:30,656 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2025-06-12 06:59:30,657 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,664 p=14991 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2025-06-12 06:59:30,664 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.034) 0:02:50.525 ********* 2025-06-12 06:59:30,683 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,691 p=14991 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2025-06-12 06:59:30,691 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.027) 0:02:50.553 ********* 2025-06-12 06:59:30,715 p=14991 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-06-12 06:59:30,716 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,723 p=14991 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2025-06-12 06:59:30,723 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.031) 0:02:50.584 ********* 2025-06-12 06:59:30,745 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,754 p=14991 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2025-06-12 06:59:30,754 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.030) 0:02:50.615 ********* 2025-06-12 06:59:30,776 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,783 p=14991 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2025-06-12 06:59:30,783 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.029) 0:02:50.645 ********* 2025-06-12 06:59:30,803 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,812 p=14991 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2025-06-12 06:59:30,812 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.028) 0:02:50.673 ********* 2025-06-12 06:59:30,832 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,839 p=14991 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2025-06-12 06:59:30,840 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.027) 0:02:50.701 ********* 2025-06-12 06:59:30,859 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,866 p=14991 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2025-06-12 06:59:30,866 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.026) 0:02:50.727 ********* 2025-06-12 06:59:30,887 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,894 p=14991 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2025-06-12 06:59:30,894 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.028) 0:02:50.756 ********* 2025-06-12 06:59:30,915 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:30,927 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:30,928 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.033) 0:02:50.789 ********* 2025-06-12 06:59:30,976 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:30,983 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:30,983 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:30 +0000 (0:00:00.055) 0:02:50.844 ********* 2025-06-12 06:59:31,086 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:31,093 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:31,094 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.110) 0:02:50.955 ********* 2025-06-12 06:59:31,244 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:31,275 p=14991 u=zuul n=ansible | PLAY [Deploy podified control plane] ******************************************* 2025-06-12 06:59:31,292 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 06:59:31,292 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.198) 0:02:51.153 ********* 2025-06-12 06:59:31,381 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:31,387 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 06:59:31,388 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.095) 0:02:51.249 ********* 2025-06-12 06:59:31,454 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:31,462 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-06-12 06:59:31,462 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.074) 0:02:51.323 ********* 2025-06-12 06:59:31,527 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:31,539 p=14991 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-06-12 06:59:31,540 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.077) 0:02:51.401 ********* 2025-06-12 06:59:31,550 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:31,555 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 06:59:31,555 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.015) 0:02:51.416 ********* 2025-06-12 06:59:31,590 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:31,597 p=14991 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2025-06-12 06:59:31,597 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.041) 0:02:51.458 ********* 2025-06-12 06:59:31,640 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2025-06-12 06:59:31,640 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.042) 0:02:51.501 ********* 2025-06-12 06:59:31,801 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:31,808 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2025-06-12 06:59:31,808 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:31 +0000 (0:00:00.167) 0:02:51.669 ********* 2025-06-12 06:59:32,418 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:32,425 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2025-06-12 06:59:32,425 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:32 +0000 (0:00:00.617) 0:02:52.286 ********* 2025-06-12 06:59:32,753 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:32,760 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2025-06-12 06:59:32,760 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:32 +0000 (0:00:00.334) 0:02:52.621 ********* 2025-06-12 06:59:33,367 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:33,376 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2025-06-12 06:59:33,376 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:33 +0000 (0:00:00.615) 0:02:53.237 ********* 2025-06-12 06:59:34,029 p=14991 u=zuul n=ansible | changed: [localhost -> controller(192.168.26.19)] => (item=controller) 2025-06-12 06:59:34,411 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=crc) 2025-06-12 06:59:34,555 p=14991 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2025-06-12 06:59:34,564 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2025-06-12 06:59:34,565 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:34 +0000 (0:00:01.188) 0:02:54.426 ********* 2025-06-12 06:59:34,592 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:34,600 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2025-06-12 06:59:34,600 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:34 +0000 (0:00:00.035) 0:02:54.461 ********* 2025-06-12 06:59:35,226 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:35,233 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2025-06-12 06:59:35,233 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:35 +0000 (0:00:00.633) 0:02:55.094 ********* 2025-06-12 06:59:35,255 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2025-06-12 06:59:35,264 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2025-06-12 06:59:35,264 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:35 +0000 (0:00:00.030) 0:02:55.125 ********* 2025-06-12 06:59:35,688 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=1) 2025-06-12 06:59:36,078 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=2) 2025-06-12 06:59:36,501 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=3) 2025-06-12 06:59:36,900 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=4) 2025-06-12 06:59:37,307 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=5) 2025-06-12 06:59:37,716 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=6) 2025-06-12 06:59:38,094 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=7) 2025-06-12 06:59:38,499 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=8) 2025-06-12 06:59:38,880 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=9) 2025-06-12 06:59:39,277 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=10) 2025-06-12 06:59:39,673 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=11) 2025-06-12 06:59:40,064 p=14991 u=zuul n=ansible | changed: [localhost -> crc(api.crc.testing)] => (item=12) 2025-06-12 06:59:40,075 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2025-06-12 06:59:40,075 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:40 +0000 (0:00:04.810) 0:02:59.936 ********* 2025-06-12 06:59:40,414 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:40,422 p=14991 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2025-06-12 06:59:40,422 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:40 +0000 (0:00:00.347) 0:03:00.283 ********* 2025-06-12 06:59:41,168 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:41,181 p=14991 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2025-06-12 06:59:41,181 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.758) 0:03:01.042 ********* 2025-06-12 06:59:41,196 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:41,203 p=14991 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2025-06-12 06:59:41,203 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.021) 0:03:01.064 ********* 2025-06-12 06:59:41,251 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2025-06-12 06:59:41,251 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.048) 0:03:01.112 ********* 2025-06-12 06:59:41,266 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:41,273 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2025-06-12 06:59:41,273 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.022) 0:03:01.135 ********* 2025-06-12 06:59:41,297 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 06:59:41,303 p=14991 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2025-06-12 06:59:41,303 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.030) 0:03:01.165 ********* 2025-06-12 06:59:41,317 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:41,323 p=14991 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2025-06-12 06:59:41,323 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.019) 0:03:01.185 ********* 2025-06-12 06:59:41,352 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2025-06-12 06:59:41,352 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.028) 0:03:01.213 ********* 2025-06-12 06:59:41,371 p=14991 u=zuul n=ansible | ok: [localhost] => make_input_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 06:59:41,378 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2025-06-12 06:59:41,378 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.025) 0:03:01.239 ********* 2025-06-12 06:59:41,391 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:41,399 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2025-06-12 06:59:41,400 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:41 +0000 (0:00:00.021) 0:03:01.261 ********* 2025-06-12 06:59:41,439 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run.log 2025-06-12 06:59:42,351 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2025-06-12 06:59:42,353 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 06:59:42,365 p=14991 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2025-06-12 06:59:42,365 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:42 +0000 (0:00:00.965) 0:03:02.226 ********* 2025-06-12 06:59:42,397 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2025-06-12 06:59:42,397 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:42 +0000 (0:00:00.032) 0:03:02.258 ********* 2025-06-12 06:59:42,416 p=14991 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 06:59:42,423 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2025-06-12 06:59:42,423 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:42 +0000 (0:00:00.026) 0:03:02.285 ********* 2025-06-12 06:59:42,437 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 06:59:42,444 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2025-06-12 06:59:42,444 p=14991 u=zuul n=ansible | Thursday 12 June 2025 06:59:42 +0000 (0:00:00.020) 0:03:02.305 ********* 2025-06-12 06:59:42,482 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run.log 2025-06-12 07:03:04,705 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2025-06-12 07:03:04,709 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:03:04,723 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2025-06-12 07:03:04,723 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:03:04 +0000 (0:03:22.278) 0:06:24.584 ********* 2025-06-12 07:04:05,750 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:04:05,761 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2025-06-12 07:04:05,761 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:05 +0000 (0:01:01.038) 0:07:25.623 ********* 2025-06-12 07:04:06,201 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:04:06,211 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2025-06-12 07:04:06,212 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:06 +0000 (0:00:00.450) 0:07:26.073 ********* 2025-06-12 07:04:07,246 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:04:07,257 p=14991 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2025-06-12 07:04:07,257 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:07 +0000 (0:00:01.045) 0:07:27.118 ********* 2025-06-12 07:04:07,314 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2025-06-12 07:04:07,315 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:07 +0000 (0:00:00.057) 0:07:27.176 ********* 2025-06-12 07:04:07,349 p=14991 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 07:04:07,358 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2025-06-12 07:04:07,358 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:07 +0000 (0:00:00.043) 0:07:27.220 ********* 2025-06-12 07:04:07,381 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:04:07,391 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2025-06-12 07:04:07,391 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:04:07 +0000 (0:00:00.032) 0:07:27.253 ********* 2025-06-12 07:04:07,441 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_openstack.log 2025-06-12 07:06:55,017 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2025-06-12 07:06:55,018 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:06:55,032 p=14991 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2025-06-12 07:06:55,032 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:02:47.641) 0:10:14.894 ********* 2025-06-12 07:06:55,049 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:06:55,059 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2025-06-12 07:06:55,059 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:00:00.026) 0:10:14.920 ********* 2025-06-12 07:06:55,076 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:06:55,085 p=14991 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2025-06-12 07:06:55,085 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:00:00.026) 0:10:14.947 ********* 2025-06-12 07:06:55,130 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2025-06-12 07:06:55,130 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:00:00.044) 0:10:14.991 ********* 2025-06-12 07:06:55,160 p=14991 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 07:06:55,169 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2025-06-12 07:06:55,169 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:00:00.038) 0:10:15.030 ********* 2025-06-12 07:06:55,191 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:06:55,199 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2025-06-12 07:06:55,199 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:55 +0000 (0:00:00.030) 0:10:15.061 ********* 2025-06-12 07:06:55,251 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run_openstack_deploy.log 2025-06-12 07:06:56,379 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2025-06-12 07:06:56,381 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:06:56,395 p=14991 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2025-06-12 07:06:56,395 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:56 +0000 (0:00:01.195) 0:10:16.256 ********* 2025-06-12 07:06:56,438 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2025-06-12 07:06:56,439 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:56 +0000 (0:00:00.043) 0:10:16.300 ********* 2025-06-12 07:06:56,467 p=14991 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 07:06:56,476 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2025-06-12 07:06:56,476 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:56 +0000 (0:00:00.037) 0:10:16.337 ********* 2025-06-12 07:06:56,495 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:06:56,505 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2025-06-12 07:06:56,505 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:06:56 +0000 (0:00:00.028) 0:10:16.366 ********* 2025-06-12 07:06:56,563 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run_netconfig.log 2025-06-12 07:07:01,865 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2025-06-12 07:07:01,866 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:07:01,879 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2025-06-12 07:07:01,879 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:01 +0000 (0:00:05.374) 0:10:21.740 ********* 2025-06-12 07:07:01,906 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2025-06-12 07:07:01,920 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2025-06-12 07:07:01,920 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:01 +0000 (0:00:00.041) 0:10:21.781 ********* 2025-06-12 07:07:01,935 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:07:01,943 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2025-06-12 07:07:01,943 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:01 +0000 (0:00:00.022) 0:10:21.804 ********* 2025-06-12 07:07:01,959 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:07:01,966 p=14991 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2025-06-12 07:07:01,966 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:01 +0000 (0:00:00.023) 0:10:21.827 ********* 2025-06-12 07:07:02,009 p=14991 u=zuul n=ansible | TASK [update_containers : Destination directory exists state=directory, recurse=True, path={{ cifmw_update_containers_dest_path | dirname }}] *** 2025-06-12 07:07:02,009 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:02 +0000 (0:00:00.043) 0:10:21.871 ********* 2025-06-12 07:07:03,186 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:07:03,193 p=14991 u=zuul n=ansible | TASK [update_containers : Generate update containers yaml file src=update_containers.j2, dest={{ cifmw_update_containers_dest_path }}, mode=0644] *** 2025-06-12 07:07:03,193 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:03 +0000 (0:00:01.184) 0:10:23.055 ********* 2025-06-12 07:07:03,565 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:07:03,573 p=14991 u=zuul n=ansible | TASK [update_containers : Update the containers _raw_params=oc apply -f {{ cifmw_update_containers_dest_path }}] *** 2025-06-12 07:07:03,573 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:03 +0000 (0:00:00.379) 0:10:23.434 ********* 2025-06-12 07:07:03,872 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:07:03,885 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2025-06-12 07:07:03,885 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:03 +0000 (0:00:00.312) 0:10:23.746 ********* 2025-06-12 07:07:03,901 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:07:03,914 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-06-12 07:07:03,914 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:03 +0000 (0:00:00.029) 0:10:23.776 ********* 2025-06-12 07:07:04,368 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:07:04,376 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2025-06-12 07:07:04,377 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:04 +0000 (0:00:00.462) 0:10:24.238 ********* 2025-06-12 07:07:04,406 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: osp-secret cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: osp-secret designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: osp-secret dns: template: options: - key: server values: - 192.168.122.1 override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: osp-secret storageRequest: 10G openstack-cell1: replicas: 1 secret: osp-secret storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: osp-secret storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: osp-secret horizon: apiOverride: route: {} template: replicas: 1 secret: osp-secret ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: osp-secret keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret manila: apiOverride: route: {} template: manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: osp-secret ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: osp-secret rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: osp-secret storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: osp-secret enabled: false heatInstance: heat ceilometer: enabled: true secret: osp-secret logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: persistent: pvcStorageRequest: 20G retention: 24h strategy: persistent 2025-06-12 07:07:04,414 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2025-06-12 07:07:04,414 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:04 +0000 (0:00:00.037) 0:10:24.275 ********* 2025-06-12 07:07:04,457 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_apply_the.log 2025-06-12 07:07:04,845 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:07:04,855 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2025-06-12 07:07:04,856 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:04 +0000 (0:00:00.441) 0:10:24.717 ********* 2025-06-12 07:07:04,869 p=14991 u=zuul n=ansible | Pausing for 30 seconds 2025-06-12 07:07:34,906 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:07:34,919 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2025-06-12 07:07:34,920 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:07:34 +0000 (0:00:30.064) 0:10:54.781 ********* 2025-06-12 07:13:13,457 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:13,467 p=14991 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2025-06-12 07:13:13,467 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:13 +0000 (0:05:38.547) 0:16:33.328 ********* 2025-06-12 07:13:13,525 p=14991 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2025-06-12 07:13:13,525 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:13 +0000 (0:00:00.057) 0:16:33.386 ********* 2025-06-12 07:13:13,835 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:13,843 p=14991 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2025-06-12 07:13:13,843 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:13 +0000 (0:00:00.317) 0:16:33.704 ********* 2025-06-12 07:13:13,864 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:13,871 p=14991 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2025-06-12 07:13:13,871 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:13 +0000 (0:00:00.028) 0:16:33.732 ********* 2025-06-12 07:13:14,233 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:14,240 p=14991 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2025-06-12 07:13:14,240 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.368) 0:16:34.101 ********* 2025-06-12 07:13:14,403 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:14,411 p=14991 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2025-06-12 07:13:14,411 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.170) 0:16:34.272 ********* 2025-06-12 07:13:14,447 p=14991 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2025-06-12 07:13:14,447 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.036) 0:16:34.309 ********* 2025-06-12 07:13:14,631 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:14,639 p=14991 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2025-06-12 07:13:14,639 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.191) 0:16:34.501 ********* 2025-06-12 07:13:14,656 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:14,663 p=14991 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2025-06-12 07:13:14,663 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.023) 0:16:34.524 ********* 2025-06-12 07:13:14,689 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:14,697 p=14991 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2025-06-12 07:13:14,697 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:14 +0000 (0:00:00.033) 0:16:34.558 ********* 2025-06-12 07:13:15,119 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:15,127 p=14991 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2025-06-12 07:13:15,127 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:15 +0000 (0:00:00.429) 0:16:34.988 ********* 2025-06-12 07:13:16,409 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:16,429 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2025-06-12 07:13:16,429 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:16 +0000 (0:00:01.301) 0:16:36.290 ********* 2025-06-12 07:13:16,723 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:16,731 p=14991 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2025-06-12 07:13:16,731 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:16 +0000 (0:00:00.302) 0:16:36.592 ********* 2025-06-12 07:13:17,110 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:17,123 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:13:17,123 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.392) 0:16:36.984 ********* 2025-06-12 07:13:17,182 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:17,189 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:13:17,189 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.066) 0:16:37.050 ********* 2025-06-12 07:13:17,258 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:17,267 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:13:17,267 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.077) 0:16:37.128 ********* 2025-06-12 07:13:17,334 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:17,365 p=14991 u=zuul n=ansible | PLAY [EDPM deployment on virtual baremetal] ************************************ 2025-06-12 07:13:17,383 p=14991 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-06-12 07:13:17,383 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.115) 0:16:37.244 ********* 2025-06-12 07:13:17,390 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:17,395 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 07:13:17,395 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.012) 0:16:37.256 ********* 2025-06-12 07:13:17,439 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:17,446 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2025-06-12 07:13:17,446 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.050) 0:16:37.307 ********* 2025-06-12 07:13:17,467 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:17,475 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2025-06-12 07:13:17,475 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.028) 0:16:37.336 ********* 2025-06-12 07:13:17,504 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:13:17,512 p=14991 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2025-06-12 07:13:17,512 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.036) 0:16:37.373 ********* 2025-06-12 07:13:17,552 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_baremetal_compute_env var=make_edpm_baremetal_compute_env] *** 2025-06-12 07:13:17,552 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.040) 0:16:37.414 ********* 2025-06-12 07:13:17,580 p=14991 u=zuul n=ansible | ok: [localhost] => make_edpm_baremetal_compute_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 07:13:17,587 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_baremetal_compute_params var=make_edpm_baremetal_compute_params] *** 2025-06-12 07:13:17,587 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.034) 0:16:37.448 ********* 2025-06-12 07:13:17,606 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:17,615 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_baremetal_compute output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup, script=make edpm_baremetal_compute, dry_run={{ make_edpm_baremetal_compute_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_baremetal_compute_env|default({})), **(make_edpm_baremetal_compute_params|default({}))) }}] *** 2025-06-12 07:13:17,615 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:17 +0000 (0:00:00.027) 0:16:37.476 ********* 2025-06-12 07:13:17,661 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_edpm_baremetal.log 2025-06-12 07:13:42,535 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_baremetal_compute_until | default(true) }} 2025-06-12 07:13:42,538 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:42,551 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2025-06-12 07:13:42,552 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:24.936) 0:17:02.413 ********* 2025-06-12 07:13:42,578 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:42,586 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2025-06-12 07:13:42,586 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:00.034) 0:17:02.447 ********* 2025-06-12 07:13:42,609 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:42,617 p=14991 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2025-06-12 07:13:42,617 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:00.030) 0:17:02.478 ********* 2025-06-12 07:13:42,665 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_baremetal_prep_env var=make_edpm_deploy_baremetal_prep_env] *** 2025-06-12 07:13:42,665 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:00.048) 0:17:02.526 ********* 2025-06-12 07:13:42,697 p=14991 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_baremetal_prep_env: BMAAS_INSTANCE_DISK_SIZE: 40 BMAAS_INSTANCE_MEMORY: 8192 BMAAS_INSTANCE_VCPUS: 6 CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=8GB DEPLOY_DIR: /home/zuul/ci-framework-data/artifacts/edpm_compute INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.crc/bin/oc:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin 2025-06-12 07:13:42,706 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_baremetal_prep_params var=make_edpm_deploy_baremetal_prep_params] *** 2025-06-12 07:13:42,706 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:00.041) 0:17:02.568 ********* 2025-06-12 07:13:42,734 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:42,743 p=14991 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_baremetal_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_baremetal_prep, dry_run={{ make_edpm_deploy_baremetal_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_baremetal_prep_env|default({})), **(make_edpm_deploy_baremetal_prep_params|default({}))) }}] *** 2025-06-12 07:13:42,743 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:42 +0000 (0:00:00.037) 0:17:02.605 ********* 2025-06-12 07:13:42,801 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_edpm_deploy_baremetal.log 2025-06-12 07:13:50,823 p=14991 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_baremetal_prep_until | default(true) }} 2025-06-12 07:13:50,826 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:50,845 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-06-12 07:13:50,845 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:50 +0000 (0:00:08.101) 0:17:10.707 ********* 2025-06-12 07:13:51,139 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:51,147 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2025-06-12 07:13:51,147 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.301) 0:17:11.008 ********* 2025-06-12 07:13:51,177 p=14991 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_baremetal_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {{ mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) }} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: '' kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment-ipam namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: baremetalSetTemplate: bmhLabelSelector: app: openstack bmhNamespace: openstack cloudUserName: cloud-admin ctlplaneInterface: enp1s0 env: - name: ANSIBLE_FORCE_COLOR value: 'True' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: cloud-admin ansibleVars: edpm_bootstrap_command: sudo dnf -y update edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_sshd_allowed_ranges: - 192.168.122.0/24 enable_debug: false gather_facts: false growvols_args: /=8GB /tmp=1GB /home=1GB /var=8GB image_prefix: openstack image_tag: current-podified registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret networks: - defaultRoute: true name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 nodes: edpm-compute-0: hostName: edpm-compute-0 preProvisioned: false services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2025-06-12 07:13:51,187 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2025-06-12 07:13:51,187 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.040) 0:17:11.048 ********* 2025-06-12 07:13:51,213 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:51,222 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-06-12 07:13:51,222 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.034) 0:17:11.083 ********* 2025-06-12 07:13:51,247 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:51,256 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-06-12 07:13:51,256 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.034) 0:17:11.117 ********* 2025-06-12 07:13:51,281 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:51,290 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-06-12 07:13:51,290 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.033) 0:17:11.151 ********* 2025-06-12 07:13:51,314 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:13:51,323 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2025-06-12 07:13:51,323 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.033) 0:17:11.184 ********* 2025-06-12 07:13:51,373 p=14991 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2025-06-12 07:13:51,665 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:51,674 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2025-06-12 07:13:51,674 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:51 +0000 (0:00:00.350) 0:17:11.535 ********* 2025-06-12 07:13:52,081 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:13:52,090 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2025-06-12 07:13:52,090 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:13:52 +0000 (0:00:00.416) 0:17:11.951 ********* 2025-06-12 07:17:29,559 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:17:29,567 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2025-06-12 07:17:29,568 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:17:29 +0000 (0:03:37.477) 0:20:49.429 ********* 2025-06-12 07:18:43,630 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:18:43,639 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2025-06-12 07:18:43,640 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:18:43 +0000 (0:01:14.071) 0:22:03.501 ********* 2025-06-12 07:22:23,877 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:22:23,884 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2025-06-12 07:22:23,884 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:22:23 +0000 (0:03:40.244) 0:25:43.746 ********* 2025-06-12 07:22:24,212 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:22:24,221 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2025-06-12 07:22:24,221 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:22:24 +0000 (0:00:00.336) 0:25:44.082 ********* 2025-06-12 07:22:24,250 p=14991 u=zuul n=ansible | ok: [localhost] => compute_nodes_output.stdout_lines: - NAME STATE CONSUMER ONLINE ERROR AGE - edpm-compute-baremetal-00 provisioned openstack-edpm-ipam true 8m42s 2025-06-12 07:22:24,258 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2025-06-12 07:22:24,258 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:22:24 +0000 (0:00:00.036) 0:25:44.119 ********* 2025-06-12 07:41:58,107 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:41:58,115 p=14991 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-06-12 07:41:58,115 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:41:58 +0000 (0:19:33.857) 0:45:17.977 ********* 2025-06-12 07:42:01,855 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:01,895 p=14991 u=zuul n=ansible | PLAY [EDPM deployment on pre-provisioned VMs] ********************************** 2025-06-12 07:42:01,915 p=14991 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-06-12 07:42:01,915 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:01 +0000 (0:00:03.799) 0:45:21.776 ********* 2025-06-12 07:42:01,922 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:01,927 p=14991 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 07:42:01,927 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:01 +0000 (0:00:00.012) 0:45:21.788 ********* 2025-06-12 07:42:01,972 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:01,982 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2025-06-12 07:42:01,982 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:01 +0000 (0:00:00.054) 0:45:21.843 ********* 2025-06-12 07:42:02,006 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,014 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2025-06-12 07:42:02,015 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.032) 0:45:21.876 ********* 2025-06-12 07:42:02,048 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2025-06-12 07:42:02,053 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2025-06-12 07:42:02,056 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2025-06-12 07:42:02,057 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,066 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2025-06-12 07:42:02,066 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.051) 0:45:21.927 ********* 2025-06-12 07:42:02,086 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,096 p=14991 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2025-06-12 07:42:02,096 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.030) 0:45:21.957 ********* 2025-06-12 07:42:02,113 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,121 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2025-06-12 07:42:02,121 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.024) 0:45:21.982 ********* 2025-06-12 07:42:02,142 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,149 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2025-06-12 07:42:02,149 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.028) 0:45:22.011 ********* 2025-06-12 07:42:02,171 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,179 p=14991 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2025-06-12 07:42:02,179 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.029) 0:45:22.040 ********* 2025-06-12 07:42:02,196 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,209 p=14991 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2025-06-12 07:42:02,209 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.030) 0:45:22.070 ********* 2025-06-12 07:42:02,226 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,233 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2025-06-12 07:42:02,233 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.023) 0:45:22.094 ********* 2025-06-12 07:42:02,251 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,260 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2025-06-12 07:42:02,261 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.027) 0:45:22.122 ********* 2025-06-12 07:42:02,282 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,290 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2025-06-12 07:42:02,290 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.029) 0:45:22.151 ********* 2025-06-12 07:42:02,308 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,315 p=14991 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2025-06-12 07:42:02,315 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.025) 0:45:22.177 ********* 2025-06-12 07:42:02,332 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,340 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2025-06-12 07:42:02,340 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.024) 0:45:22.202 ********* 2025-06-12 07:42:02,359 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,368 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2025-06-12 07:42:02,368 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.027) 0:45:22.229 ********* 2025-06-12 07:42:02,394 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,402 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-06-12 07:42:02,402 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.033) 0:45:22.263 ********* 2025-06-12 07:42:02,425 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,434 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-06-12 07:42:02,434 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.031) 0:45:22.295 ********* 2025-06-12 07:42:02,458 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,466 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2025-06-12 07:42:02,466 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.032) 0:45:22.327 ********* 2025-06-12 07:42:02,485 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,493 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2025-06-12 07:42:02,493 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.026) 0:45:22.354 ********* 2025-06-12 07:42:02,512 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,522 p=14991 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2025-06-12 07:42:02,523 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.029) 0:45:22.384 ********* 2025-06-12 07:42:02,542 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,551 p=14991 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2025-06-12 07:42:02,551 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.028) 0:45:22.412 ********* 2025-06-12 07:42:02,575 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,609 p=14991 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2025-06-12 07:42:02,610 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,612 p=14991 u=zuul n=ansible | [WARNING]: Could not match supplied host pattern, ignoring: computes 2025-06-12 07:42:02,612 p=14991 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2025-06-12 07:42:02,612 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,613 p=14991 u=zuul n=ansible | PLAY [Create local SSH keypair] ************************************************ 2025-06-12 07:42:02,620 p=14991 u=zuul n=ansible | TASK [Early stop ceph related work _raw_params=end_play] *********************** 2025-06-12 07:42:02,620 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.069) 0:45:22.481 ********* 2025-06-12 07:42:02,631 p=14991 u=zuul n=ansible | PLAY [Distribute SSH keypair to target nodes] ********************************** 2025-06-12 07:42:02,632 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,634 p=14991 u=zuul n=ansible | PLAY [Create Block Device on target nodes] ************************************* 2025-06-12 07:42:02,634 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,635 p=14991 u=zuul n=ansible | PLAY [Build Ceph spec and conf from gathered IPs of the target inventory group] *** 2025-06-12 07:42:02,642 p=14991 u=zuul n=ansible | TASK [Early stop ceph related work _raw_params=end_play] *********************** 2025-06-12 07:42:02,643 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.022) 0:45:22.504 ********* 2025-06-12 07:42:02,655 p=14991 u=zuul n=ansible | PLAY [Fetch network facts of all computes] ************************************* 2025-06-12 07:42:02,655 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,658 p=14991 u=zuul n=ansible | PLAY [Bootstrap Ceph and apply spec] ******************************************* 2025-06-12 07:42:02,659 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:42:02,659 p=14991 u=zuul n=ansible | PLAY [Render Ceph client configuration] **************************************** 2025-06-12 07:42:02,668 p=14991 u=zuul n=ansible | TASK [Early stop ceph related work _raw_params=end_play] *********************** 2025-06-12 07:42:02,668 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.025) 0:45:22.529 ********* 2025-06-12 07:42:02,680 p=14991 u=zuul n=ansible | PLAY [Continue HCI deploy] ***************************************************** 2025-06-12 07:42:02,695 p=14991 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2025-06-12 07:42:02,695 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.027) 0:45:22.557 ********* 2025-06-12 07:42:02,702 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,707 p=14991 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2025-06-12 07:42:02,707 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.012) 0:45:22.569 ********* 2025-06-12 07:42:02,731 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,738 p=14991 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2025-06-12 07:42:02,738 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.030) 0:45:22.600 ********* 2025-06-12 07:42:02,765 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:02,773 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:42:02,773 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.034) 0:45:22.634 ********* 2025-06-12 07:42:02,833 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:02,841 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:42:02,841 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.068) 0:45:22.703 ********* 2025-06-12 07:42:02,930 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:02,938 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:42:02,938 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:02 +0000 (0:00:00.096) 0:45:22.800 ********* 2025-06-12 07:42:03,013 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,048 p=14991 u=zuul n=ansible | PLAY [Validations workflow] **************************************************** 2025-06-12 07:42:03,065 p=14991 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2025-06-12 07:42:03,065 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.126) 0:45:22.926 ********* 2025-06-12 07:42:03,092 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,122 p=14991 u=zuul n=ansible | PLAY [Deploy VA] *************************************************************** 2025-06-12 07:42:03,147 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:42:03,147 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.082) 0:45:23.009 ********* 2025-06-12 07:42:03,171 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,180 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:42:03,180 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.032) 0:45:23.041 ********* 2025-06-12 07:42:03,203 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,214 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:42:03,214 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.033) 0:45:23.075 ********* 2025-06-12 07:42:03,292 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,305 p=14991 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2025-06-12 07:42:03,305 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.091) 0:45:23.166 ********* 2025-06-12 07:42:03,317 p=14991 u=zuul n=ansible | PLAY [Validations workflow] **************************************************** 2025-06-12 07:42:03,334 p=14991 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2025-06-12 07:42:03,334 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.028) 0:45:23.195 ********* 2025-06-12 07:42:03,356 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,385 p=14991 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2025-06-12 07:42:03,407 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:42:03,407 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.073) 0:45:23.268 ********* 2025-06-12 07:42:03,460 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:03,467 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:42:03,467 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.060) 0:45:23.329 ********* 2025-06-12 07:42:03,540 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:03,550 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:42:03,550 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.082) 0:45:23.411 ********* 2025-06-12 07:42:03,623 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:03,636 p=14991 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2025-06-12 07:42:03,636 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.086) 0:45:23.497 ********* 2025-06-12 07:42:03,686 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:03,697 p=14991 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2025-06-12 07:42:03,697 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:03 +0000 (0:00:00.061) 0:45:23.559 ********* 2025-06-12 07:42:08,450 p=14991 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2025-06-12 07:42:08,465 p=14991 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2025-06-12 07:42:08,465 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:08 +0000 (0:00:04.768) 0:45:28.327 ********* 2025-06-12 07:42:11,682 p=14991 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2025-06-12 07:42:14,256 p=14991 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2025-06-12 07:42:14,267 p=14991 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2025-06-12 07:42:14,268 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:14 +0000 (0:00:05.802) 0:45:34.129 ********* 2025-06-12 07:42:17,349 p=14991 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2025-06-12 07:42:17,360 p=14991 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-06-12 07:42:17,361 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:17 +0000 (0:00:03.093) 0:45:37.222 ********* 2025-06-12 07:42:17,498 p=14991 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2025-06-12 07:42:17,508 p=14991 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-06-12 07:42:17,508 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:17 +0000 (0:00:00.147) 0:45:37.369 ********* 2025-06-12 07:42:21,420 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:21,428 p=14991 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-06-12 07:42:21,428 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:21 +0000 (0:00:03.920) 0:45:41.290 ********* 2025-06-12 07:42:21,606 p=14991 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2025-06-12 07:42:21,613 p=14991 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-06-12 07:42:21,613 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:21 +0000 (0:00:00.184) 0:45:41.475 ********* 2025-06-12 07:42:26,394 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:26,402 p=14991 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2025-06-12 07:42:26,402 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:26 +0000 (0:00:04.788) 0:45:46.263 ********* 2025-06-12 07:42:26,490 p=14991 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2025-06-12 07:42:26,499 p=14991 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2025-06-12 07:42:26,500 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:26 +0000 (0:00:00.097) 0:45:46.361 ********* 2025-06-12 07:42:31,934 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:31,947 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:42:31,947 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:31 +0000 (0:00:05.447) 0:45:51.809 ********* 2025-06-12 07:42:31,997 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:32,005 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:42:32,005 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.057) 0:45:51.866 ********* 2025-06-12 07:42:32,074 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:32,084 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:42:32,084 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.078) 0:45:51.945 ********* 2025-06-12 07:42:32,156 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:32,175 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:42:32,175 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.091) 0:45:52.036 ********* 2025-06-12 07:42:32,223 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:32,232 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:42:32,232 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.056) 0:45:52.093 ********* 2025-06-12 07:42:32,305 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:32,315 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:42:32,315 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.082) 0:45:52.176 ********* 2025-06-12 07:42:32,387 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:32,401 p=14991 u=zuul n=ansible | TASK [tempest : Ensure podman is installed name=podman, state=present] ********* 2025-06-12 07:42:32,401 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:32 +0000 (0:00:00.086) 0:45:52.262 ********* 2025-06-12 07:42:33,570 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:33,578 p=14991 u=zuul n=ansible | TASK [tempest : Create tempest directories path={{ cifmw_tempest_artifacts_basedir }}, state=directory, mode=0755] *** 2025-06-12 07:42:33,578 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:01.177) 0:45:53.440 ********* 2025-06-12 07:42:33,770 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:33,778 p=14991 u=zuul n=ansible | TASK [tempest : Setup tempest tests _raw_params=tempest-tests.yml] ************* 2025-06-12 07:42:33,778 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.199) 0:45:53.640 ********* 2025-06-12 07:42:33,815 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/tempest-tests.yml for localhost 2025-06-12 07:42:33,827 p=14991 u=zuul n=ansible | TASK [tempest : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2025-06-12 07:42:33,828 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.049) 0:45:53.689 ********* 2025-06-12 07:42:33,855 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:33,864 p=14991 u=zuul n=ansible | TASK [tempest : Get list of tests to be executed yaml_file={{ cifmw_tempest_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_tempest_default_groups }}, job={{ cifmw_tempest_job_name | default(omit) }}] *** 2025-06-12 07:42:33,864 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.036) 0:45:53.725 ********* 2025-06-12 07:42:33,890 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:33,898 p=14991 u=zuul n=ansible | TASK [tempest : Creating include.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/include.txt, content={% for test in list_allowed.allowed_tests %}{{ test }} {% endfor %}] *** 2025-06-12 07:42:33,898 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.033) 0:45:53.759 ********* 2025-06-12 07:42:33,921 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:33,929 p=14991 u=zuul n=ansible | TASK [tempest : Show tests to be executed msg={{ list_allowed }}] ************** 2025-06-12 07:42:33,929 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.031) 0:45:53.790 ********* 2025-06-12 07:42:33,951 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:33,959 p=14991 u=zuul n=ansible | TASK [tempest : Copy list_skipped to artifacts dir mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml] *** 2025-06-12 07:42:33,959 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:33 +0000 (0:00:00.030) 0:45:53.820 ********* 2025-06-12 07:42:34,345 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:34,352 p=14991 u=zuul n=ansible | TASK [tempest : Get list of tests to be excluded yaml_file={{ cifmw_tempest_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_tempest_default_jobs }}] *** 2025-06-12 07:42:34,352 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:34 +0000 (0:00:00.392) 0:45:54.213 ********* 2025-06-12 07:42:34,786 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:34,795 p=14991 u=zuul n=ansible | TASK [tempest : Creating exclude.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/exclude.txt, content={% for test in list_skipped.skipped_tests %}{{ test }} {% endfor %}] *** 2025-06-12 07:42:34,796 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:34 +0000 (0:00:00.443) 0:45:54.657 ********* 2025-06-12 07:42:35,147 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:35,155 p=14991 u=zuul n=ansible | TASK [tempest : Show tests to be excluded msg={{ list_skipped.skipped_tests }}] *** 2025-06-12 07:42:35,156 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.359) 0:45:55.017 ********* 2025-06-12 07:42:35,183 p=14991 u=zuul n=ansible | ok: [localhost] => msg: - tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_mtu_sized_frames 2025-06-12 07:42:35,191 p=14991 u=zuul n=ansible | TASK [tempest : Creating include.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/include.txt, content={% for test in cifmw_tempest_tests_allowed %}{{ test }} {% endfor %}] *** 2025-06-12 07:42:35,192 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.036) 0:45:55.053 ********* 2025-06-12 07:42:35,566 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:35,574 p=14991 u=zuul n=ansible | TASK [tempest : Show tests to be executed msg={{ cifmw_tempest_tests_allowed }}] *** 2025-06-12 07:42:35,574 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.382) 0:45:55.436 ********* 2025-06-12 07:42:35,606 p=14991 u=zuul n=ansible | ok: [localhost] => msg: - tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops 2025-06-12 07:42:35,614 p=14991 u=zuul n=ansible | TASK [tempest : Creating exclude.txt mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/exclude.txt, content={% for test in cifmw_tempest_tests_skipped %}{{ test }} {% endfor %}] *** 2025-06-12 07:42:35,614 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.039) 0:45:55.476 ********* 2025-06-12 07:42:35,640 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:35,648 p=14991 u=zuul n=ansible | TASK [tempest : Show tests to be excluded msg={{ cifmw_tempest_tests_skipped }}] *** 2025-06-12 07:42:35,648 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.033) 0:45:55.510 ********* 2025-06-12 07:42:35,672 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:42:35,680 p=14991 u=zuul n=ansible | TASK [tempest : Create clouds.yaml _raw_params=create-clouds-file.yml] ********* 2025-06-12 07:42:35,680 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.031) 0:45:55.541 ********* 2025-06-12 07:42:35,723 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/create-clouds-file.yml for localhost 2025-06-12 07:42:35,740 p=14991 u=zuul n=ansible | TASK [tempest : Get keystone data _raw_params=oc get keystoneapi keystone -n openstack -o json] *** 2025-06-12 07:42:35,740 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:35 +0000 (0:00:00.060) 0:45:55.602 ********* 2025-06-12 07:42:36,041 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:36,050 p=14991 u=zuul n=ansible | TASK [tempest : Set keystone vars keystone_secret_name={{ _keystone_json_content['spec']['secret'] }}, keystone_passwd_select={{ _keystone_json_content['spec']['passwordSelectors']['admin'] }}, keystone_api={{ _keystone_json_content['status']['apiEndpoints']['public'] }}] *** 2025-06-12 07:42:36,050 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.309) 0:45:55.911 ********* 2025-06-12 07:42:36,081 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:36,089 p=14991 u=zuul n=ansible | TASK [tempest : Get credentials data _raw_params=oc get secret {{ keystone_secret_name }} -n openstack -o json] *** 2025-06-12 07:42:36,090 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.039) 0:45:55.951 ********* 2025-06-12 07:42:36,398 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:36,406 p=14991 u=zuul n=ansible | TASK [tempest : Get password data os_password={{ _os_password_data_json_content['data'][keystone_passwd_select] | ansible.builtin.b64decode }}] *** 2025-06-12 07:42:36,406 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.316) 0:45:56.268 ********* 2025-06-12 07:42:36,432 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:42:36,441 p=14991 u=zuul n=ansible | TASK [tempest : Get clouds.yaml src=clouds.yaml.j2, dest={{ cifmw_tempest_artifacts_basedir }}/clouds.yaml, mode=0644] *** 2025-06-12 07:42:36,441 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.035) 0:45:56.303 ********* 2025-06-12 07:42:36,823 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:36,833 p=14991 u=zuul n=ansible | TASK [tempest : Configure tempest _raw_params=configure-tempest.yml] *********** 2025-06-12 07:42:36,833 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.391) 0:45:56.694 ********* 2025-06-12 07:42:36,869 p=14991 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/tempest/tasks/configure-tempest.yml for localhost 2025-06-12 07:42:36,887 p=14991 u=zuul n=ansible | TASK [tempest : Create profile.yaml file content={{ _cifmw_tempest_tempestconf_profile_content | to_nice_yaml }}, dest={{ cifmw_tempest_artifacts_basedir }}/profile.yaml, mode=0644] *** 2025-06-12 07:42:36,887 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:36 +0000 (0:00:00.054) 0:45:56.749 ********* 2025-06-12 07:42:37,249 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:37,257 p=14991 u=zuul n=ansible | TASK [tempest : Copy CA bundle to cifmw_tempest_artifacts_basedir src=/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem, dest={{ cifmw_tempest_artifacts_basedir }}, mode=0444, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, remote_src=True] *** 2025-06-12 07:42:37,257 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:37 +0000 (0:00:00.370) 0:45:57.119 ********* 2025-06-12 07:42:37,500 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:37,510 p=14991 u=zuul n=ansible | TASK [tempest : Set proper permission for tempest directory _raw_params=podman unshare chown 42480:42480 -R {{ cifmw_tempest_artifacts_basedir }}] *** 2025-06-12 07:42:37,510 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:37 +0000 (0:00:00.252) 0:45:57.371 ********* 2025-06-12 07:42:37,782 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:42:37,792 p=14991 u=zuul n=ansible | TASK [tempest : Ensure we have tempest container image name={{ cifmw_tempest_image }}:{{ cifmw_tempest_image_tag }}] *** 2025-06-12 07:42:37,792 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:42:37 +0000 (0:00:00.281) 0:45:57.653 ********* 2025-06-12 07:43:21,129 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:43:21,139 p=14991 u=zuul n=ansible | TASK [tempest : Run tempest name=tempest, image={{ cifmw_tempest_image }}:{{ cifmw_tempest_image_tag }}, state=started, auto_remove={{ cifmw_tempest_remove_container }}, network=host, volume=['{{ cifmw_tempest_artifacts_basedir }}/:/var/lib/tempest/external_files:Z', '{{ cifmw_tempest_artifacts_basedir }}/tls-ca-bundle.pem:/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem:Z'], detach=False, dns={{ cifmw_tempest_dns_servers }}, env={'CONCURRENCY': '{{ cifmw_tempest_concurrency | default(omit) }}'}] *** 2025-06-12 07:43:21,139 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:43:21 +0000 (0:00:43.346) 0:46:41.000 ********* 2025-06-12 07:45:45,339 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:45:45,348 p=14991 u=zuul n=ansible | TASK [tempest : Change tempest directory permission back to original path={{ cifmw_tempest_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2025-06-12 07:45:45,348 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:45 +0000 (0:02:24.209) 0:49:05.210 ********* 2025-06-12 07:45:45,600 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:45:45,609 p=14991 u=zuul n=ansible | TASK [tempest : Save logs from podman mode=0644, dest={{ cifmw_tempest_artifacts_basedir }}/podman_tempest.log, content="{{ tempest_run_output.stdout }}" ] *** 2025-06-12 07:45:45,609 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:45 +0000 (0:00:00.260) 0:49:05.470 ********* 2025-06-12 07:45:46,012 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:45:46,022 p=14991 u=zuul n=ansible | TASK [tempest : Fail if podman container did not succeed that=['tempest_run_output.failed == false']] *** 2025-06-12 07:45:46,022 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.412) 0:49:05.883 ********* 2025-06-12 07:45:46,053 p=14991 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2025-06-12 07:45:46,067 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:45:46,067 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.044) 0:49:05.928 ********* 2025-06-12 07:45:46,124 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:45:46,132 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:45:46,133 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.065) 0:49:05.994 ********* 2025-06-12 07:45:46,219 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:45:46,234 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_tests _raw_params={{ hook.type }}.yml] *** 2025-06-12 07:45:46,234 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.101) 0:49:06.096 ********* 2025-06-12 07:45:46,314 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,333 p=14991 u=zuul n=ansible | TASK [compliance : Ensure compliance folder exists path={{ cifmw_compliance_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2025-06-12 07:45:46,333 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.098) 0:49:06.194 ********* 2025-06-12 07:45:46,358 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,367 p=14991 u=zuul n=ansible | TASK [compliance : Install the compliance operator and plugin _raw_params=install.yml] *** 2025-06-12 07:45:46,367 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.033) 0:49:06.228 ********* 2025-06-12 07:45:46,388 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,395 p=14991 u=zuul n=ansible | TASK [compliance : Run compliance scans and extract results _raw_params=run_suite_scan.yml] *** 2025-06-12 07:45:46,395 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.028) 0:49:06.257 ********* 2025-06-12 07:45:46,418 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=cis) 2025-06-12 07:45:46,420 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=e8) 2025-06-12 07:45:46,424 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=high) 2025-06-12 07:45:46,428 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=moderate) 2025-06-12 07:45:46,431 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=nerc-cip) 2025-06-12 07:45:46,435 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=pci-dss) 2025-06-12 07:45:46,437 p=14991 u=zuul n=ansible | skipping: [localhost] => (item=stig) 2025-06-12 07:45:46,438 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,446 p=14991 u=zuul n=ansible | TASK [compliance : Delete all resources created by the role _raw_params=cleanup.yml] *** 2025-06-12 07:45:46,446 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.050) 0:49:06.307 ********* 2025-06-12 07:45:46,464 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,497 p=14991 u=zuul n=ansible | PLAY [Run compliance scan for computes] **************************************** 2025-06-12 07:45:46,497 p=14991 u=zuul n=ansible | skipping: no hosts matched 2025-06-12 07:45:46,500 p=14991 u=zuul n=ansible | PLAY [Run hooks and inject status flag] **************************************** 2025-06-12 07:45:46,518 p=14991 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2025-06-12 07:45:46,519 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.072) 0:49:06.380 ********* 2025-06-12 07:45:46,565 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:45:46,572 p=14991 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2025-06-12 07:45:46,572 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.053) 0:49:06.433 ********* 2025-06-12 07:45:46,648 p=14991 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:45:46,658 p=14991 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_end _raw_params={{ hook.type }}.yml] **** 2025-06-12 07:45:46,658 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.086) 0:49:06.519 ********* 2025-06-12 07:45:46,735 p=14991 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:45:46,748 p=14991 u=zuul n=ansible | TASK [Inject success flag path={{ ansible_user_dir }}/cifmw-success, state=touch, mode=0644] *** 2025-06-12 07:45:46,748 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.089) 0:49:06.609 ********* 2025-06-12 07:45:46,925 p=14991 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:45:46,953 p=14991 u=zuul n=ansible | PLAY [Logging playbook] ******************************************************** 2025-06-12 07:45:46,976 p=14991 u=zuul n=ansible | TASK [Early exit if no tests _raw_params=end_play] ***************************** 2025-06-12 07:45:46,976 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.228) 0:49:06.838 ********* 2025-06-12 07:45:46,984 p=14991 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2025-06-12 07:45:46,984 p=14991 u=zuul n=ansible | localhost : ok=312 changed=112 unreachable=0 failed=0 skipped=174 rescued=0 ignored=0 2025-06-12 07:45:46,985 p=14991 u=zuul n=ansible | Thursday 12 June 2025 07:45:46 +0000 (0:00:00.008) 0:49:06.846 ********* 2025-06-12 07:45:46,985 p=14991 u=zuul n=ansible | =============================================================================== 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed 1173.86s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 338.55s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state - 220.24s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created - 217.48s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 202.28s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------ 167.64s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | tempest : Run tempest ------------------------------------------------- 144.21s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available -- 74.07s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 61.04s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | tempest : Ensure we have tempest container image ----------------------- 43.35s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 31.97s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.06s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | run_hook : Run Download needed tools ----------------------------------- 29.57s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | install_yamls_makes : Run edpm_baremetal_compute ----------------------- 24.94s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 24.69s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest -------------- 14.82s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_baremetal_prep -------------------- 8.10s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 7.94s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | os_net_setup : Delete existing subnet pools ----------------------------- 5.80s 2025-06-12 07:45:46,986 p=14991 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.80s 2025-06-12 07:46:19,205 p=53378 u=zuul n=ansible | PLAY [Logging playbook] ******************************************************** 2025-06-12 07:46:19,239 p=53378 u=zuul n=ansible | TASK [Early exit if no tests _raw_params=end_play] ***************************** 2025-06-12 07:46:19,239 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.049) 0:00:00.049 ********* 2025-06-12 07:46:19,249 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:19,256 p=53378 u=zuul n=ansible | TASK [Ensure cifmw_basedir param is set cifmw_basedir={{ ansible_user_dir }}/ci-framework-data] *** 2025-06-12 07:46:19,256 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.017) 0:00:00.066 ********* 2025-06-12 07:46:19,282 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:19,290 p=53378 u=zuul n=ansible | TASK [Check directory availabilty path={{ cifmw_basedir }}/artifacts/parameters] *** 2025-06-12 07:46:19,291 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.034) 0:00:00.101 ********* 2025-06-12 07:46:19,565 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:19,576 p=53378 u=zuul n=ansible | TASK [Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ****** 2025-06-12 07:46:19,576 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.285) 0:00:00.386 ********* 2025-06-12 07:46:19,620 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:19,631 p=53378 u=zuul n=ansible | TASK [Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2025-06-12 07:46:19,631 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.054) 0:00:00.441 ********* 2025-06-12 07:46:19,653 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:19,663 p=53378 u=zuul n=ansible | TASK [Set destination folder for the logs logfiles_dest_dir={{ ( cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data'), 'logs/', now(fmt='%Y-%m-%d_%H-%M') ) | path_join }}] *** 2025-06-12 07:46:19,663 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.032) 0:00:00.473 ********* 2025-06-12 07:46:19,686 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:19,727 p=53378 u=zuul n=ansible | TASK [artifacts : Verify if "success" flag exists after successful tests execution path={{ ansible_user_dir }}/cifmw-success] *** 2025-06-12 07:46:19,727 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.063) 0:00:00.537 ********* 2025-06-12 07:46:19,890 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:19,901 p=53378 u=zuul n=ansible | TASK [artifacts : Ensure we have at least minimal ansible facts gather_subset=min] *** 2025-06-12 07:46:19,901 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:19 +0000 (0:00:00.174) 0:00:00.711 ********* 2025-06-12 07:46:20,432 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:20,443 p=53378 u=zuul n=ansible | TASK [artifacts : Ensure base directory exists path={{ cifmw_artifacts_basedir }}/{{ item }}, state=directory, mode=0755] *** 2025-06-12 07:46:20,443 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:20 +0000 (0:00:00.542) 0:00:01.253 ********* 2025-06-12 07:46:20,705 p=53378 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2025-06-12 07:46:20,862 p=53378 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-06-12 07:46:20,874 p=53378 u=zuul n=ansible | TASK [artifacts : Load generated hook environment for further usage dir={{ cifmw_artifacts_basedir }}/artifacts, depth=1, files_matching=^(pre|post).*\.yml$] *** 2025-06-12 07:46:20,874 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:20 +0000 (0:00:00.430) 0:00:01.684 ********* 2025-06-12 07:46:20,911 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:20,922 p=53378 u=zuul n=ansible | TASK [artifacts : Gather parameter passed to the playbook mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-vars.yml, content={{ vars | to_nice_yaml }}] *** 2025-06-12 07:46:20,922 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:20 +0000 (0:00:00.047) 0:00:01.732 ********* 2025-06-12 07:46:21,522 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:46:21,533 p=53378 u=zuul n=ansible | TASK [artifacts : Gather facts mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-facts.yml, content={{ ansible_facts | to_nice_yaml }}] *** 2025-06-12 07:46:21,533 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:21 +0000 (0:00:00.611) 0:00:02.343 ********* 2025-06-12 07:46:21,914 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:46:21,926 p=53378 u=zuul n=ansible | TASK [artifacts : Copy some network configuration files _raw_params=cp /etc/resolv.conf /etc/hosts {{ cifmw_artifacts_basedir }}/artifacts/ cp -r /etc/NetworkManager/system-connections {{ cifmw_artifacts_basedir }}/artifacts/NetworkManager cp -r /etc/yum.repos.d {{ cifmw_artifacts_basedir }}/artifacts/yum_repos test -d /etc/ci/env && cp -r /etc/ci/env {{ cifmw_artifacts_basedir }}/artifacts/ci-env test -d /var/log/bmaas_console_logs && cp -r /var/log/bmaas_console_logs {{ cifmw_artifacts_basedir }}/logs ip ro ls > {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip rule ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip -j -p link ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt] *** 2025-06-12 07:46:21,926 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:21 +0000 (0:00:00.392) 0:00:02.736 ********* 2025-06-12 07:46:22,253 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:46:22,263 p=53378 u=zuul n=ansible | TASK [artifacts : Get installed packages list ] ******************************** 2025-06-12 07:46:22,263 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:22 +0000 (0:00:00.337) 0:00:03.073 ********* 2025-06-12 07:46:23,041 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:46:23,071 p=53378 u=zuul n=ansible | TASK [artifacts : Output package list mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/installed-packages.yml, content={{ ansible_facts.packages | to_nice_yaml }}] *** 2025-06-12 07:46:23,071 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:23 +0000 (0:00:00.808) 0:00:03.881 ********* 2025-06-12 07:46:23,492 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:46:23,525 p=53378 u=zuul n=ansible | TASK [artifacts : Cleanup unnecesary directories path={{ item }}, state=absent] *** 2025-06-12 07:46:23,525 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:23 +0000 (0:00:00.453) 0:00:04.335 ********* 2025-06-12 07:46:23,812 p=53378 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/operator) 2025-06-12 07:46:23,846 p=53378 u=zuul n=ansible | TASK [os_must_gather : Ensure directories are present path={{ cifmw_os_must_gather_output_dir }}/{{ item }}, state=directory, mode=0755] *** 2025-06-12 07:46:23,847 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:23 +0000 (0:00:00.321) 0:00:04.657 ********* 2025-06-12 07:46:24,016 p=53378 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-06-12 07:46:24,081 p=53378 u=zuul n=ansible | TASK [os_must_gather : Construct project change list zuul_change_list={{ zuul_change_list | default([]) + [item.project.short_name] }}, cacheable=True] *** 2025-06-12 07:46:24,081 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.234) 0:00:04.891 ********* 2025-06-12 07:46:24,115 p=53378 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'master', 'change_url': 'https://review.rdoproject.org/r/plugins/gitiles/rdo-jobs/+/None^!/', 'project': {'canonical_hostname': 'review.rdoproject.org', 'canonical_name': 'review.rdoproject.org/rdo-jobs', 'name': 'rdo-jobs', 'short_name': 'rdo-jobs', 'src_dir': 'src/review.rdoproject.org/rdo-jobs'}}) 2025-06-12 07:46:24,152 p=53378 u=zuul n=ansible | TASK [os_must_gather : Get git tag for image tagging chdir={{ cifmw_os_must_gather_repo_path }}, _raw_params=git show-ref --head --hash head] *** 2025-06-12 07:46:24,152 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.071) 0:00:04.962 ********* 2025-06-12 07:46:24,175 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:24,202 p=53378 u=zuul n=ansible | TASK [os_must_gather : Debug git show-ref msg={{ openstack_must_gather_tag }}] *** 2025-06-12 07:46:24,202 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.049) 0:00:05.012 ********* 2025-06-12 07:46:24,241 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:24,271 p=53378 u=zuul n=ansible | TASK [os_must_gather : Build openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-build, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-06-12 07:46:24,271 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.068) 0:00:05.081 ********* 2025-06-12 07:46:24,291 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:24,318 p=53378 u=zuul n=ansible | TASK [os_must_gather : Push openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-push, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2025-06-12 07:46:24,318 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.046) 0:00:05.128 ********* 2025-06-12 07:46:24,337 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:24,365 p=53378 u=zuul n=ansible | TASK [os_must_gather : Set cifmw_os_must_gather_image to new image tag cifmw_os_must_gather_image={{ cifmw_os_must_gather_image_registry }}/openstack-must-gather:{{ openstack_must_gather_tag.stdout }}] *** 2025-06-12 07:46:24,365 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.046) 0:00:05.175 ********* 2025-06-12 07:46:24,393 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:46:24,422 p=53378 u=zuul n=ansible | TASK [os_must_gather : Check for oc command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=command -v oc] *** 2025-06-12 07:46:24,422 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.057) 0:00:05.232 ********* 2025-06-12 07:46:24,464 p=53378 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_check_for_oc.log 2025-06-12 07:46:24,536 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:46:24,564 p=53378 u=zuul n=ansible | TASK [os_must_gather : Run openstack-must-gather command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=oc adm must-gather --image {{ cifmw_os_must_gather_image }} --timeout {{ cifmw_os_must_gather_timeout }} --host-network={{ cifmw_os_must_gather_host_network }} --dest-dir {{ cifmw_os_must_gather_output_dir }}/logs -- ADDITIONAL_NAMESPACES={{ cifmw_os_must_gather_additional_namespaces }} SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather &> {{ cifmw_os_must_gather_output_dir }}/logs/os_must_gather.log] *** 2025-06-12 07:46:24,564 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:46:24 +0000 (0:00:00.141) 0:00:05.374 ********* 2025-06-12 07:46:24,612 p=53378 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_openstack_must_gather.log 2025-06-12 07:54:00,558 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:00,584 p=53378 u=zuul n=ansible | TASK [os_must_gather : Get exact must-gather output folder name paths={{ cifmw_os_must_gather_output_dir }}/logs, patterns={{ cifmw_os_must_gather_image | ansible.builtin.split(':') | first | ansible.builtin.regex_replace('([.]|[/])', '-') ~ '*' }}, file_type=directory] *** 2025-06-12 07:54:00,584 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:00 +0000 (0:07:36.019) 0:07:41.394 ********* 2025-06-12 07:54:00,903 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:00,934 p=53378 u=zuul n=ansible | TASK [os_must_gather : Move must-gather folder name to a fixed name _raw_params=mv "{{ _must_gather_output_folder.files[0].path }}/" "{{ cifmw_os_must_gather_output_dir }}/logs/openstack-k8s-operators-openstack-must-gather" ] *** 2025-06-12 07:54:00,934 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:00 +0000 (0:00:00.349) 0:07:41.744 ********* 2025-06-12 07:54:01,139 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:01,188 p=53378 u=zuul n=ansible | TASK [artifacts : Create crc logs directory path={{ cifmw_artifacts_basedir }}/logs/crc, state=directory, mode=0755] *** 2025-06-12 07:54:01,188 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:01 +0000 (0:00:00.254) 0:07:41.998 ********* 2025-06-12 07:54:01,207 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:54:01,234 p=53378 u=zuul n=ansible | TASK [artifacts : Ensure controller knows CRC ssh keys _raw_params=ssh-keyscan {{ cifmw_artifacts_crc_host }} >> ~/.ssh/known_hosts] *** 2025-06-12 07:54:01,234 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:01 +0000 (0:00:00.046) 0:07:42.044 ********* 2025-06-12 07:54:01,252 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:54:01,279 p=53378 u=zuul n=ansible | TASK [artifacts : Recognize new keypair path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-06-12 07:54:01,279 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:01 +0000 (0:00:00.044) 0:07:42.089 ********* 2025-06-12 07:54:01,296 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:54:01,321 p=53378 u=zuul n=ansible | TASK [artifacts : Set fact if new keypair exists new_keypair_path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2025-06-12 07:54:01,321 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:01 +0000 (0:00:00.041) 0:07:42.131 ********* 2025-06-12 07:54:01,340 p=53378 u=zuul n=ansible | skipping: [localhost] 2025-06-12 07:54:01,367 p=53378 u=zuul n=ansible | TASK [artifacts : Prepare root ssh accesses output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=ssh -i {{ new_keypair_path | default(cifmw_artifacts_crc_sshkey) }} {{ cifmw_artifacts_crc_user }}@{{ cifmw_artifacts_crc_host }} < /tmp/{{ host_ip }}/ovs_vsctl_list_openvswitch.txt sudo ip netns > /tmp/{{ host_ip }}/ip_netns.txt sudo ip a > /tmp/{{ host_ip }}/network.txt sudo ip ro ls >> /tmp/{{ host_ip }}/network.txt sudo rpm -qa > /tmp/{{ host_ip }}/rpm_qa.txt sudo dnf list installed > /tmp/{{ host_ip }}/dnf_list_installed.txt sudo podman images --digests > /tmp/{{ host_ip }}/podman_images.txt sudo fips-mode-setup --check > /tmp/{{ host_ip }}/fips_check.txt mkdir -p /tmp/{{ host_ip }}/service_logs systemctl list-units | awk '/virt|edpm|ovs/ {print $1}' | egrep -v "sys|ovs-delete-transient-ports" | xargs -I {} sudo bash -c 'journalctl -u {} > /tmp/{{ host_ip }}/service_logs/{}.log' sudo ausearch -i | grep denied > /tmp/{{ host_ip }}/selinux-denials.log || true sudo journalctl -p warning -t kernel -o short -g DROPPING --no-pager &> /tmp/{{ host_ip }}/firewall-drops.txt || true EOF] *** 2025-06-12 07:54:02,048 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:02 +0000 (0:00:00.051) 0:07:42.858 ********* 2025-06-12 07:54:02,103 p=53378 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_generate_logs_on_edpm_vm_192.log 2025-06-12 07:54:09,096 p=53378 u=zuul n=ansible | changed: [localhost] => (item=192.168.122.100) 2025-06-12 07:54:09,125 p=53378 u=zuul n=ansible | TASK [artifacts : Copy logs to host machine from {{ item.split('/')[0] }} output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=rsync -a -e "ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i {{ ssh_key_file }}" {{ ssh_user }}@{{ host_ip }}:/tmp/{{ host_ip }} {{ cifmw_artifacts_basedir }}/logs/;] *** 2025-06-12 07:54:09,125 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:09 +0000 (0:00:07.077) 0:07:49.935 ********* 2025-06-12 07:54:09,181 p=53378 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_copy_logs_to_host_machine.log 2025-06-12 07:54:10,143 p=53378 u=zuul n=ansible | changed: [localhost] => (item=192.168.122.100) 2025-06-12 07:54:10,171 p=53378 u=zuul n=ansible | TASK [artifacts : Generate list of ansible logs to collect in home directory paths={{ ansible_user_dir }}, patterns=*ansible*.log] *** 2025-06-12 07:54:10,171 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:10 +0000 (0:00:01.046) 0:07:50.981 ********* 2025-06-12 07:54:10,335 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:10,389 p=53378 u=zuul n=ansible | TASK [artifacts : Copy ansible logs to logs directory src={{ item.path }}, dest={{ cifmw_artifacts_basedir }}/logs/, remote_src=True, mode=0644] *** 2025-06-12 07:54:10,389 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:10 +0000 (0:00:00.217) 0:07:51.199 ********* 2025-06-12 07:54:10,614 p=53378 u=zuul n=ansible | changed: [localhost] => (item={'path': '/home/zuul/ansible.log', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 1000, 'gid': 1000, 'size': 334571, 'inode': 4202630, 'dev': 64513, 'nlink': 1, 'atime': 1749711375.5546293, 'mtime': 1749714850.1704402, 'ctime': 1749714850.1704402, 'gr_name': 'zuul', 'pw_name': 'zuul', 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False}) 2025-06-12 07:54:10,647 p=53378 u=zuul n=ansible | TASK [artifacts : Ensure we have proper rights on the gathered content _raw_params=find {{ cifmw_artifacts_basedir }}/logs -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/logs -type d -exec chmod 0755 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type d -exec chmod 0755 '{}' \;] *** 2025-06-12 07:54:10,648 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:10 +0000 (0:00:00.258) 0:07:51.458 ********* 2025-06-12 07:54:15,624 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:15,652 p=53378 u=zuul n=ansible | TASK [artifacts : Mask secrets in yaml log files path={{ item }}, isdir=True] *** 2025-06-12 07:54:15,652 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:15 +0000 (0:00:05.004) 0:07:56.462 ********* 2025-06-12 07:54:16,000 p=53378 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2025-06-12 07:54:25,602 p=53378 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2025-06-12 07:54:25,652 p=53378 u=zuul n=ansible | TASK [env_op_images : Ensure directory is present path={{ cifmw_env_op_images_dir }}/{{ item }}, state=directory, mode=0755] *** 2025-06-12 07:54:25,653 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:25 +0000 (0:00:10.000) 0:08:06.463 ********* 2025-06-12 07:54:25,819 p=53378 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2025-06-12 07:54:25,983 p=53378 u=zuul n=ansible | ok: [localhost] => (item=logs) 2025-06-12 07:54:26,011 p=53378 u=zuul n=ansible | TASK [env_op_images : Check if OpenStackControlPlane is setup _raw_params=oc get OpenStackControlPlane -o=jsonpath='{.items[*].status.conditions[?(@.type=="Ready")].status}'] *** 2025-06-12 07:54:26,011 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:26 +0000 (0:00:00.358) 0:08:06.821 ********* 2025-06-12 07:54:26,340 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:26,367 p=53378 u=zuul n=ansible | TASK [env_op_images : Get images from the CSV _raw_params=oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o yaml] *** 2025-06-12 07:54:26,368 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:26 +0000 (0:00:00.356) 0:08:07.178 ********* 2025-06-12 07:54:26,706 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:26,735 p=53378 u=zuul n=ansible | TASK [env_op_images : Get the images name executable=/bin/bash, _raw_params=set -o pipefail; oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o json | jq -r ' [.items[]? | .spec.install.spec.deployments[]? | .spec.template.spec.containers[]? | .env[]? | select(.name? | test("^RELATED_IMAGE")) | select(.name | contains("MANAGER")) | {(.name): .value} ]' ] *** 2025-06-12 07:54:26,735 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:26 +0000 (0:00:00.367) 0:08:07.545 ********* 2025-06-12 07:54:27,061 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:27,089 p=53378 u=zuul n=ansible | TASK [env_op_images : Extract env variable name and images cifmw_openstack_service_images_content={{ _sa_images_content.stdout | from_json }}] *** 2025-06-12 07:54:27,089 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:27 +0000 (0:00:00.354) 0:08:07.899 ********* 2025-06-12 07:54:27,118 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:27,150 p=53378 u=zuul n=ansible | TASK [env_op_images : Get all the pods in openstack-operator namespace kind=Pod, namespace={{ ((csv_items | first).metadata.namespace) if csv_items | length > 0 else omit }}, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, field_selectors=['status.phase=Running']] *** 2025-06-12 07:54:27,150 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:27 +0000 (0:00:00.060) 0:08:07.960 ********* 2025-06-12 07:54:28,268 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:28,330 p=53378 u=zuul n=ansible | TASK [env_op_images : Retrieve openstack-operator-index pod cifmw_install_yamls_vars_content={'OPENSTACK_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}] *** 2025-06-12 07:54:28,330 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:28 +0000 (0:00:01.180) 0:08:09.140 ********* 2025-06-12 07:54:28,381 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:28,412 p=53378 u=zuul n=ansible | TASK [env_op_images : Get operator images and pods cifmw_openstack_operator_images_content={'RABBITMQ_OP_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}, selected_pods={{ pod_list.resources | rejectattr('metadata.generateName', 'contains', 'openstack-operator-index-') | rejectattr('metadata.generateName', 'contains', 'rabbitmq-cluster-operator-') | rejectattr('metadata.generateName', 'contains', 'watcher-operator-index-') }}] *** 2025-06-12 07:54:28,412 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:28 +0000 (0:00:00.081) 0:08:09.222 ********* 2025-06-12 07:54:28,673 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:28,717 p=53378 u=zuul n=ansible | TASK [env_op_images : Add operator images to the dictionary cifmw_openstack_operator_images_content={{ cifmw_openstack_operator_images_content | combine( { item.metadata.labels['openstack.org/operator-name'] | upper ~ '_OP_IMG': (item.status.containerStatuses | last).imageID } ) }}] *** 2025-06-12 07:54:28,717 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:28 +0000 (0:00:00.305) 0:08:09.528 ********* 2025-06-12 07:54:28,799 p=53378 u=zuul n=ansible | ok: [localhost] => (item=barbican-operator-controller-manager-766d964448-rt7mg) 2025-06-12 07:54:28,810 p=53378 u=zuul n=ansible | ok: [localhost] => (item=cinder-operator-controller-manager-79dd548bfc-vtd6v) 2025-06-12 07:54:28,823 p=53378 u=zuul n=ansible | ok: [localhost] => (item=designate-operator-controller-manager-857c4df5c7-nx7tm) 2025-06-12 07:54:28,838 p=53378 u=zuul n=ansible | ok: [localhost] => (item=glance-operator-controller-manager-99c888577-fp8lf) 2025-06-12 07:54:28,852 p=53378 u=zuul n=ansible | ok: [localhost] => (item=heat-operator-controller-manager-7c9bcf5497-dg5tg) 2025-06-12 07:54:28,865 p=53378 u=zuul n=ansible | ok: [localhost] => (item=horizon-operator-controller-manager-59d9945c6b-pknhl) 2025-06-12 07:54:28,878 p=53378 u=zuul n=ansible | ok: [localhost] => (item=infra-operator-controller-manager-7fc7845758-rskkx) 2025-06-12 07:54:28,892 p=53378 u=zuul n=ansible | ok: [localhost] => (item=ironic-operator-controller-manager-66557c6d47-bhpjm) 2025-06-12 07:54:28,905 p=53378 u=zuul n=ansible | ok: [localhost] => (item=keystone-operator-controller-manager-7f649d5cb5-sd8f8) 2025-06-12 07:54:28,918 p=53378 u=zuul n=ansible | ok: [localhost] => (item=manila-operator-controller-manager-6d9c888874-fnvkd) 2025-06-12 07:54:28,931 p=53378 u=zuul n=ansible | ok: [localhost] => (item=mariadb-operator-controller-manager-7f686c69b6-nmj49) 2025-06-12 07:54:28,944 p=53378 u=zuul n=ansible | ok: [localhost] => (item=neutron-operator-controller-manager-7f7867b68f-tnl7g) 2025-06-12 07:54:28,957 p=53378 u=zuul n=ansible | ok: [localhost] => (item=nova-operator-controller-manager-76df699c84-sbwgw) 2025-06-12 07:54:28,971 p=53378 u=zuul n=ansible | ok: [localhost] => (item=octavia-operator-controller-manager-85f95648d-r2k6q) 2025-06-12 07:54:28,984 p=53378 u=zuul n=ansible | ok: [localhost] => (item=openstack-baremetal-operator-controller-manager-689d549bdbf2g7r) 2025-06-12 07:54:29,002 p=53378 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-manager-7b75697c7-dqsh8) 2025-06-12 07:54:29,019 p=53378 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-operator-7c5db68fdd-mcjq4) 2025-06-12 07:54:29,030 p=53378 u=zuul n=ansible | ok: [localhost] => (item=ovn-operator-controller-manager-cff8d5985-rjr67) 2025-06-12 07:54:29,043 p=53378 u=zuul n=ansible | ok: [localhost] => (item=placement-operator-controller-manager-6cdb9775f8-44fw2) 2025-06-12 07:54:29,056 p=53378 u=zuul n=ansible | ok: [localhost] => (item=swift-operator-controller-manager-7cc856c6d5-rk5zk) 2025-06-12 07:54:29,069 p=53378 u=zuul n=ansible | ok: [localhost] => (item=telemetry-operator-controller-manager-b8c4c6559-p46vh) 2025-06-12 07:54:29,084 p=53378 u=zuul n=ansible | ok: [localhost] => (item=test-operator-controller-manager-855dfb94bc-z5qhc) 2025-06-12 07:54:29,247 p=53378 u=zuul n=ansible | TASK [env_op_images : Write images to file dest={{ cifmw_env_op_images_dir }}/artifacts/{{ cifmw_env_op_images_file }}, content={{ _content | to_nice_yaml }}, mode=0644] *** 2025-06-12 07:54:29,247 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:29 +0000 (0:00:00.529) 0:08:10.057 ********* 2025-06-12 07:54:29,654 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:29,714 p=53378 u=zuul n=ansible | TASK [Create a versioned log folder path={{ logfiles_dest_dir }}, state=directory, mode=0775] *** 2025-06-12 07:54:29,714 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:29 +0000 (0:00:00.466) 0:08:10.524 ********* 2025-06-12 07:54:29,896 p=53378 u=zuul n=ansible | changed: [localhost] 2025-06-12 07:54:29,924 p=53378 u=zuul n=ansible | TASK [Return a list of log files in home directory paths={{ ansible_user_dir }}, patterns=*.log] *** 2025-06-12 07:54:29,925 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:29 +0000 (0:00:00.210) 0:08:10.735 ********* 2025-06-12 07:54:30,082 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:30,113 p=53378 u=zuul n=ansible | TASK [Ensure ansible facts cache exists path={{ ansible_user_dir }}/ansible_facts_cache] *** 2025-06-12 07:54:30,113 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:30 +0000 (0:00:00.188) 0:08:10.923 ********* 2025-06-12 07:54:30,289 p=53378 u=zuul n=ansible | ok: [localhost] 2025-06-12 07:54:30,320 p=53378 u=zuul n=ansible | TASK [Copy logs to proper location src={{ item.path }}, dest={{ [ logfiles_dest_dir , item.path | basename ] | path_join }}, remote_src=True, mode=0666] *** 2025-06-12 07:54:30,320 p=53378 u=zuul n=ansible | Thursday 12 June 2025 07:54:30 +0000 (0:00:00.207) 0:08:11.130 ********* 2025-06-12 07:54:30,566 p=53378 u=zuul n=ansible | changed: [localhost] => (item={'path': '/home/zuul/crc-setup.log', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 1000, 'gid': 1000, 'size': 4108, 'inode': 4518807, 'dev': 64513, 'nlink': 1, 'atime': 1743544925.4788878, 'mtime': 1743545329.1409318, 'ctime': 1743545329.1409318, 'gr_name': 'zuul', 'pw_name': 'zuul', 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False}) 2025-06-12 07:54:30,757 p=53378 u=zuul n=ansible | changed: [localhost] => (item={'path': '/home/zuul/crc-start.log', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 1000, 'gid': 1000, 'size': 3767, 'inode': 4194437, 'dev': 64513, 'nlink': 1, 'atime': 1749710968.2473714, 'mtime': 1749710966.55435, 'ctime': 1749710966.55435, 'gr_name': 'zuul', 'pw_name': 'zuul', 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False})