+ check_certificate_expiry + RAW_INVENTORY=/etc/kolla/inventory + source /home/zuul/kolla-ansible-venv/bin/activate ++ deactivate nondestructive ++ '[' -n '' ']' ++ '[' -n '' ']' ++ hash -r ++ '[' -n '' ']' ++ unset VIRTUAL_ENV ++ unset VIRTUAL_ENV_PROMPT ++ '[' '!' nondestructive = nondestructive ']' ++ '[' linux-gnu = cygwin ']' ++ '[' linux-gnu = msys ']' ++ export VIRTUAL_ENV=/home/zuul/kolla-ansible-venv ++ VIRTUAL_ENV=/home/zuul/kolla-ansible-venv ++ _OLD_VIRTUAL_PATH=/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin ++ PATH=/home/zuul/kolla-ansible-venv/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin ++ export PATH ++ '[' -n '' ']' ++ '[' -z '' ']' ++ _OLD_VIRTUAL_PS1= ++ PS1='(kolla-ansible-venv) ' ++ export PS1 ++ VIRTUAL_ENV_PROMPT='(kolla-ansible-venv) ' ++ export VIRTUAL_ENV_PROMPT ++ hash -r + kolla-ansible octavia-certificates -i /etc/kolla/inventory --check-expiry 7 -e ansible_python_interpreter=/home/zuul/kolla-ansible-venv/bin/python Checking if certificates expire within given number of days. [WARNING]: Invalid characters were found in group names but not replaced, use -vvvv to see details PLAY [Apply role octavia-certificates] ***************************************** TASK [Gathering Facts] ********************************************************* Monday 12 May 2025 13:09:35 +0000 (0:00:00.030) 0:00:00.030 ************ ok: [localhost] TASK [octavia-certificates : Check if any certificates are going to expire] **** Monday 12 May 2025 13:09:36 +0000 (0:00:00.840) 0:00:00.870 ************ included: /home/zuul/kolla-ansible-venv/share/kolla-ansible/ansible/roles/octavia-certificates/tasks/check_expiry.yml for localhost TASK [octavia-certificates : Show python lib/site paths] *********************** Monday 12 May 2025 13:09:36 +0000 (0:00:00.041) 0:00:00.911 ************ ok: [localhost] TASK [octavia-certificates : Check for cryptography] *************************** Monday 12 May 2025 13:09:36 +0000 (0:00:00.283) 0:00:01.195 ************ ok: [localhost] TASK [octavia-certificates : Print req_result] ********************************* Monday 12 May 2025 13:09:36 +0000 (0:00:00.204) 0:00:01.400 ************ ok: [localhost] => { "req_result": { "changed": false, "failed": false, "mismatched": {}, "not_found": [], "python": "/home/zuul/kolla-ansible-venv/bin/python", "python_system_path": [ "/tmp/ansible_community.general.python_requirements_info_payload_48zfrpy5/ansible_community.general.python_requirements_info_payload.zip", "/usr/lib64/python312.zip", "/usr/lib64/python3.12", "/usr/lib64/python3.12/lib-dynload", "/home/zuul/kolla-ansible-venv/lib64/python3.12/site-packages", "/home/zuul/kolla-ansible-venv/lib/python3.12/site-packages" ], "python_version": "3.12.5 (main, Apr 2 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-5)]", "python_version_info": { "major": 3, "micro": 5, "minor": 12, "releaselevel": "final", "serial": 0 }, "valid": {} } } TASK [octavia-certificates : Print crypt_result] ******************************* Monday 12 May 2025 13:09:36 +0000 (0:00:00.015) 0:00:01.416 ************ ok: [localhost] => { "crypt_result": { "changed": false, "failed": false, "mismatched": {}, "not_found": [], "python": "/home/zuul/kolla-ansible-venv/bin/python", "python_system_path": [ "/tmp/ansible_community.general.python_requirements_info_payload_gyfv60ye/ansible_community.general.python_requirements_info_payload.zip", "/usr/lib64/python312.zip", "/usr/lib64/python3.12", "/usr/lib64/python3.12/lib-dynload", "/home/zuul/kolla-ansible-venv/lib64/python3.12/site-packages", "/home/zuul/kolla-ansible-venv/lib/python3.12/site-packages" ], "python_version": "3.12.5 (main, Apr 2 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-5)]", "python_version_info": { "major": 3, "micro": 5, "minor": 12, "releaselevel": "final", "serial": 0 }, "valid": { "cryptography": { "desired": null, "installed": "43.0.3" } } } } TASK [octavia-certificates : Gather information on certificates] *************** Monday 12 May 2025 13:09:36 +0000 (0:00:00.015) 0:00:01.431 ************ ok: [localhost] => (item=server_ca.cert.pem) ok: [localhost] => (item=client_ca.cert.pem) ok: [localhost] => (item=client.cert-and-key.pem) TASK [octavia-certificates : Check whether certificates are valid within 7 days] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.831) 0:00:02.262 ************ ok: [localhost] => (item=server_ca.cert.pem) ok: [localhost] => (item=client_ca.cert.pem) ok: [localhost] => (item=client.cert-and-key.pem) TASK [octavia-certificates : Ensure server_ca and client_ca directories exist] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.036) 0:00:02.299 ************ skipping: [localhost] => (item=server_ca) skipping: [localhost] => (item=client_ca) skipping: [localhost] TASK [octavia-certificates : Copy openssl.cnf] ********************************* Monday 12 May 2025 13:09:37 +0000 (0:00:00.029) 0:00:02.328 ************ skipping: [localhost] TASK [octavia-certificates : Generate server_ca private key] ******************* Monday 12 May 2025 13:09:37 +0000 (0:00:00.029) 0:00:02.358 ************ skipping: [localhost] TASK [octavia-certificates : Create server_ca certificate] ********************* Monday 12 May 2025 13:09:37 +0000 (0:00:00.028) 0:00:02.387 ************ skipping: [localhost] TASK [octavia-certificates : Create client_ca index.txt] *********************** Monday 12 May 2025 13:09:37 +0000 (0:00:00.026) 0:00:02.413 ************ skipping: [localhost] TASK [octavia-certificates : Create client_ca serial] ************************** Monday 12 May 2025 13:09:37 +0000 (0:00:00.025) 0:00:02.438 ************ skipping: [localhost] TASK [octavia-certificates : Create client_ca private key] ********************* Monday 12 May 2025 13:09:37 +0000 (0:00:00.025) 0:00:02.464 ************ skipping: [localhost] TASK [octavia-certificates : Create client_ca certificate] ********************* Monday 12 May 2025 13:09:37 +0000 (0:00:00.025) 0:00:02.490 ************ skipping: [localhost] TASK [octavia-certificates : Create a key for the client certificate] ********** Monday 12 May 2025 13:09:37 +0000 (0:00:00.029) 0:00:02.520 ************ skipping: [localhost] TASK [octavia-certificates : Create the certificate request for the client certificate] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.026) 0:00:02.546 ************ skipping: [localhost] TASK [octavia-certificates : Sign the client certificate request] ************** Monday 12 May 2025 13:09:37 +0000 (0:00:00.027) 0:00:02.574 ************ skipping: [localhost] TASK [octavia-certificates : Create a concatenated client certificate and key file] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.025) 0:00:02.600 ************ skipping: [localhost] TASK [octavia-certificates : Ensure /etc/kolla/config/octavia directory exists] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.042) 0:00:02.642 ************ skipping: [localhost] TASK [octavia-certificates : Copy the to-be-deployed keys and certs to /etc/kolla/config/octavia] *** Monday 12 May 2025 13:09:37 +0000 (0:00:00.018) 0:00:02.660 ************ skipping: [localhost] => (item={'src': 'server_ca/server_ca.cert.pem', 'dest': 'server_ca.cert.pem'}) skipping: [localhost] => (item={'src': 'server_ca/server_ca.key.pem', 'dest': 'server_ca.key.pem'}) skipping: [localhost] => (item={'src': 'client_ca/client_ca.cert.pem', 'dest': 'client_ca.cert.pem'}) skipping: [localhost] => (item={'src': 'client_ca/client.cert-and-key.pem', 'dest': 'client.cert-and-key.pem'}) skipping: [localhost] PLAY RECAP ********************************************************************* localhost : ok=8 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 Monday 12 May 2025 13:09:37 +0000 (0:00:00.019) 0:00:02.679 ************ =============================================================================== Gathering Facts --------------------------------------------------------- 0.84s octavia-certificates : Gather information on certificates --------------- 0.83s octavia-certificates : Show python lib/site paths ----------------------- 0.28s octavia-certificates : Check for cryptography --------------------------- 0.20s octavia-certificates : Create a concatenated client certificate and key file --- 0.04s octavia-certificates : Check if any certificates are going to expire ---- 0.04s octavia-certificates : Check whether certificates are valid within 7 days --- 0.04s octavia-certificates : Copy openssl.cnf --------------------------------- 0.03s octavia-certificates : Create client_ca certificate --------------------- 0.03s octavia-certificates : Ensure server_ca and client_ca directories exist --- 0.03s octavia-certificates : Generate server_ca private key ------------------- 0.03s octavia-certificates : Create the certificate request for the client certificate --- 0.03s octavia-certificates : Create a key for the client certificate ---------- 0.03s octavia-certificates : Create server_ca certificate --------------------- 0.03s octavia-certificates : Sign the client certificate request -------------- 0.03s octavia-certificates : Create client_ca serial -------------------------- 0.03s octavia-certificates : Create client_ca private key --------------------- 0.03s octavia-certificates : Create client_ca index.txt ----------------------- 0.03s octavia-certificates : Copy the to-be-deployed keys and certs to /etc/kolla/config/octavia --- 0.02s octavia-certificates : Ensure /etc/kolla/config/octavia directory exists --- 0.02s Playbook run took 0 days, 0 hours, 0 minutes, 2 seconds + deactivate + '[' -n /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin ']' + PATH=/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin + export PATH + unset _OLD_VIRTUAL_PATH + '[' -n '' ']' + hash -r + '[' -n '' ']' + unset VIRTUAL_ENV + unset VIRTUAL_ENV_PROMPT + '[' '!' '' = nondestructive ']' + unset -f deactivate + . /etc/kolla/admin-openrc.sh +++ set +++ awk '{FS="="} /^OS_/ {print $1}' ++ export OS_PROJECT_DOMAIN_NAME=Default ++ OS_PROJECT_DOMAIN_NAME=Default ++ export OS_USER_DOMAIN_NAME=Default ++ OS_USER_DOMAIN_NAME=Default ++ export OS_PROJECT_NAME=admin ++ OS_PROJECT_NAME=admin ++ export OS_TENANT_NAME=admin ++ OS_TENANT_NAME=admin ++ export OS_USERNAME=admin ++ OS_USERNAME=admin ++ export OS_PASSWORD=G9M2j9U71gfoZ3FcyeMNPjmKf7tDnKQDQJqJS5hE ++ OS_PASSWORD=G9M2j9U71gfoZ3FcyeMNPjmKf7tDnKQDQJqJS5hE ++ export OS_AUTH_URL=http://192.0.2.10:5000 ++ OS_AUTH_URL=http://192.0.2.10:5000 ++ export OS_INTERFACE=internal ++ OS_INTERFACE=internal ++ export OS_ENDPOINT_TYPE=internalURL ++ OS_ENDPOINT_TYPE=internalURL ++ export OS_IDENTITY_API_VERSION=3 ++ OS_IDENTITY_API_VERSION=3 ++ export OS_REGION_NAME=RegionOne ++ OS_REGION_NAME=RegionOne ++ export OS_AUTH_PLUGIN=password ++ OS_AUTH_PLUGIN=password + . /home/zuul/openstackclient-venv/bin/activate ++ deactivate nondestructive ++ '[' -n '' ']' ++ '[' -n '' ']' ++ '[' -n /bin/bash -o -n '' ']' ++ hash -r ++ '[' -n '' ']' ++ unset VIRTUAL_ENV ++ '[' '!' nondestructive = nondestructive ']' ++ VIRTUAL_ENV=/home/zuul/openstackclient-venv ++ export VIRTUAL_ENV ++ _OLD_VIRTUAL_PATH=/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin ++ PATH=/home/zuul/openstackclient-venv/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin ++ export PATH ++ '[' -n '' ']' ++ '[' -z '' ']' ++ _OLD_VIRTUAL_PS1='(kolla-ansible-venv) ' ++ PS1='(openstackclient-venv) (kolla-ansible-venv) ' ++ export PS1 ++ '[' -n /bin/bash -o -n '' ']' ++ hash -r + test_octavia + register_amphora_image + amphora_url=https://tarballs.opendev.org/openstack/octavia/test-images/test-only-amphora-x64-haproxy-ubuntu-jammy.qcow2 + curl -o amphora.qcow2 https://tarballs.opendev.org/openstack/octavia/test-images/test-only-amphora-x64-haproxy-ubuntu-jammy.qcow2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 1 342M 1 6054k 0 0 6849k 0 0:00:51 --:--:-- 0:00:51 6841k 14 342M 14 51.0M 0 0 27.0M 0 0:00:12 0:00:01 0:00:11 27.0M 28 342M 28 96.2M 0 0 33.3M 0 0:00:10 0:00:02 0:00:08 33.3M 41 342M 41 141M 0 0 36.3M 0 0:00:09 0:00:03 0:00:06 36.3M 54 342M 54 186M 0 0 38.1M 0 0:00:08 0:00:04 0:00:04 38.1M 67 342M 67 231M 0 0 39.3M 0 0:00:08 0:00:05 0:00:03 45.1M 80 342M 80 274M 0 0 39.9M 0 0:00:08 0:00:06 0:00:02 44.7M 93 342M 93 320M 0 0 40.6M 0 0:00:08 0:00:07 0:00:01 44.7M 100 342M 100 342M 0 0 40.8M 0 0:00:08 0:00:08 --:--:-- 44.7M + . /etc/kolla/octavia-openrc.sh +++ set +++ awk '{FS="="} /^OS_/ {print $1}' ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_AUTH_PLUGIN ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_AUTH_URL ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_ENDPOINT_TYPE ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_IDENTITY_API_VERSION ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_INTERFACE ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_PASSWORD ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_PROJECT_DOMAIN_NAME ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_PROJECT_NAME ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_REGION_NAME ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_TENANT_NAME ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_USERNAME ++ for key in $( set | awk '{FS="="} /^OS_/ {print $1}' ) ++ unset OS_USER_DOMAIN_NAME ++ export OS_PROJECT_DOMAIN_NAME=Default ++ OS_PROJECT_DOMAIN_NAME=Default ++ export OS_USER_DOMAIN_NAME=Default ++ OS_USER_DOMAIN_NAME=Default ++ export OS_PROJECT_NAME=service ++ OS_PROJECT_NAME=service ++ export OS_USERNAME=octavia ++ OS_USERNAME=octavia ++ export OS_PASSWORD=okPHkEcXQDNRsuOLEKfvGMCVTAnAGNc9DX7W8cIL ++ OS_PASSWORD=okPHkEcXQDNRsuOLEKfvGMCVTAnAGNc9DX7W8cIL ++ export OS_AUTH_URL=http://192.0.2.10:5000 ++ OS_AUTH_URL=http://192.0.2.10:5000 ++ export OS_INTERFACE=internal ++ OS_INTERFACE=internal ++ export OS_ENDPOINT_TYPE=internalURL ++ OS_ENDPOINT_TYPE=internalURL + openstack image create amphora-x64-haproxy --file amphora.qcow2 --tag amphora --disk-format qcow2 --property hw_architecture=x86_64 --property hw_rng_model=virtio +------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | Field | Value | +------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ | checksum | b3f7d844ad33cdb3451961ee74147f39 | | container_format | bare | | created_at | 2025-05-12T13:09:47Z | | disk_format | qcow2 | | file | /v2/images/a2f575b6-85ee-4334-92ff-37f13e6f0f97/file | | id | a2f575b6-85ee-4334-92ff-37f13e6f0f97 | | min_disk | 0 | | min_ram | 0 | | name | amphora-x64-haproxy | | owner | e756e22eb1cb40219d1a0d457dfa40cd | | properties | hw_architecture='x86_64', hw_rng_model='virtio', os_hash_algo='sha512', os_hash_value='1a3b1f8a1f13ba033bf4d6eee90c797d32cdcf498c06ed6d16a5b89e05b27ce3f5e49cfb40fcfc3187f297ab17ec59e3b2639d2c10b47002ba09525effc11084', os_hidden='False', owner_specified.openstack.md5='', owner_specified.openstack.object='images/amphora-x64-haproxy', owner_specified.openstack.sha256='', stores='file' | | protected | False | | schema | /v2/schemas/image | | size | 358614016 | | status | active | | tags | amphora | | updated_at | 2025-05-12T13:09:49Z | | virtual_size | 2147483648 | | visibility | shared | +------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ + openstack loadbalancer list + openstack loadbalancer create --name lb --vip-subnet-id demo-subnet --wait Invalid formatter provided.