~/src/github.com/openstack-k8s-operators/openstack-operator ~/ci-framework-data/artifacts mkdir -p /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin test -s /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize || { curl -Ss "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash -s -- 5.6.0 /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin; } v5.6.0 kustomize installed to /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize test -s /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq || ( cd /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin &&\ wget https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz -O - |\ tar xz && mv yq_linux_amd64 /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq ) --2026-01-26 18:11:21-- https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz Resolving github.com (github.com)... 140.82.112.4 Connecting to github.com (github.com)|140.82.112.4|:443... connected. HTTP request sent, awaiting response... 302 Found Location: https://github.com/mikefarah/yq/releases/download/v4.50.1/yq_linux_amd64.tar.gz [following] --2026-01-26 18:11:22-- https://github.com/mikefarah/yq/releases/download/v4.50.1/yq_linux_amd64.tar.gz Reusing existing connection to github.com:443. HTTP request sent, awaiting response... 302 Found Location: https://release-assets.githubusercontent.com/github-production-release-asset/43225113/0fd7e0ae-cd85-4490-aaf7-017746e5450d?sp=r&sv=2018-11-09&sr=b&spr=https&se=2026-01-26T18%3A48%3A08Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2026-01-26T17%3A47%3A25Z&ske=2026-01-26T18%3A48%3A08Z&sks=b&skv=2018-11-09&sig=xmhJD2qmg1NK9kHExy4IR%2B9ZuvWqFbuCV%2BIbHp9J3Vs%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc2OTQ1MTM4MiwibmJmIjoxNzY5NDUxMDgyLCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.kvrG-IEhGCv2oseo4hceWNT53u0km6cYE0QsgNdN9aA&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream [following] --2026-01-26 18:11:22-- https://release-assets.githubusercontent.com/github-production-release-asset/43225113/0fd7e0ae-cd85-4490-aaf7-017746e5450d?sp=r&sv=2018-11-09&sr=b&spr=https&se=2026-01-26T18%3A48%3A08Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2026-01-26T17%3A47%3A25Z&ske=2026-01-26T18%3A48%3A08Z&sks=b&skv=2018-11-09&sig=xmhJD2qmg1NK9kHExy4IR%2B9ZuvWqFbuCV%2BIbHp9J3Vs%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc2OTQ1MTM4MiwibmJmIjoxNzY5NDUxMDgyLCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.kvrG-IEhGCv2oseo4hceWNT53u0km6cYE0QsgNdN9aA&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream Resolving release-assets.githubusercontent.com (release-assets.githubusercontent.com)... 185.199.108.133, 185.199.111.133, 185.199.110.133, ... Connecting to release-assets.githubusercontent.com (release-assets.githubusercontent.com)|185.199.108.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 5433510 (5.2M) [application/octet-stream] Saving to: ‘STDOUT’ 0K .......... .......... .......... .......... .......... 0% 36.1M 0s 50K .......... .......... .......... .......... .......... 1% 40.6M 0s 100K .......... .......... .......... .......... .......... 2% 377M 0s 150K .......... .......... .......... .......... .......... 3% 67.3M 0s 200K .......... .......... .......... .......... .......... 4% 87.2M 0s 250K .......... .......... .......... .......... .......... 5% 142M 0s 300K .......... .......... .......... .......... .......... 6% 211M 0s 350K .......... .......... .......... .......... .......... 7% 6.67M 0s 400K .......... .......... .......... .......... .......... 8% 414M 0s 450K .......... .......... .......... .......... .......... 9% 470M 0s 500K .......... .......... .......... .......... .......... 10% 379M 0s 550K .......... .......... .......... .......... .......... 11% 457M 0s 600K .......... .......... .......... .......... .......... 12% 403M 0s 650K .......... .......... .......... .......... .......... 13% 9.03M 0s 700K .......... .......... .......... .......... .......... 14% 320M 0s 750K .......... .......... .......... .......... .......... 15% 380M 0s 800K .......... .......... .......... .......... .......... 16% 381M 0s 850K .......... .......... .......... .......... .......... 16% 398M 0s 900K .......... .......... .......... .......... .......... 17% 9.45M 0s 950K .......... .......... .......... .......... .......... 18% 376M 0s 1000K .......... .......... .......... .......... .......... 19% 429M 0s 1050K .......... .......... .......... .......... .......... 20% 431M 0s 1100K .......... .......... .......... .......... .......... 21% 326M 0s 1150K .......... .......... .......... .......... .......... 22% 10.1M 0s 1200K .......... .......... .......... .......... .......... 23% 418M 0s 1250K .......... .......... .......... .......... .......... 24% 443M 0s 1300K .......... .......... .......... .......... .......... 25% 379M 0s 1350K .......... .......... .......... .......... .......... 26% 381M 0s 1400K .......... .......... .......... .......... .......... 27% 8.85M 0s 1450K .......... .......... .......... .......... .......... 28% 311M 0s 1500K .......... .......... .......... .......... .......... 29% 328M 0s 1550K .......... .......... .......... .......... .......... 30% 370M 0s 1600K .......... .......... .......... .......... .......... 31% 318M 0s 1650K .......... .......... .......... .......... .......... 32% 9.87M 0s 1700K .......... .......... .......... .......... .......... 32% 391M 0s 1750K .......... .......... .......... .......... .......... 33% 454M 0s 1800K .......... .......... .......... .......... .......... 34% 456M 0s 1850K .......... .......... .......... .......... .......... 35% 432M 0s 1900K .......... .......... .......... .......... .......... 36% 9.78M 0s 1950K .......... .......... .......... .......... .......... 37% 368M 0s 2000K .......... .......... .......... .......... .......... 38% 308M 0s 2050K .......... .......... .......... .......... .......... 39% 358M 0s 2100K .......... .......... .......... .......... .......... 40% 248M 0s 2150K .......... .......... .......... .......... .......... 41% 10.5M 0s 2200K .......... .......... .......... .......... .......... 42% 447M 0s 2250K .......... .......... .......... .......... .......... 43% 394M 0s 2300K .......... .......... .......... .......... .......... 44% 397M 0s 2350K .......... .......... .......... .......... .......... 45% 468M 0s 2400K .......... .......... .......... .......... .......... 46% 10.1M 0s 2450K .......... .......... .......... .......... .......... 47% 490M 0s 2500K .......... .......... .......... .......... .......... 48% 438M 0s 2550K .......... .......... .......... .......... .......... 48% 466M 0s 2600K .......... .......... .......... .......... .......... 49% 486M 0s 2650K .......... .......... .......... .......... .......... 50% 8.98M 0s 2700K .......... .......... .......... .......... .......... 51% 216M 0s 2750K .......... .......... .......... .......... .......... 52% 408M 0s 2800K .......... .......... .......... .......... .......... 53% 139M 0s 2850K .......... .......... .......... .......... .......... 54% 462M 0s 2900K .......... .......... .......... .......... .......... 55% 435M 0s 2950K .......... .......... .......... .......... .......... 56% 8.40M 0s 3000K .......... .......... .......... .......... .......... 57% 394M 0s 3050K .......... .......... .......... .......... .......... 58% 482M 0s 3100K .......... .......... .......... .......... .......... 59% 326M 0s 3150K .......... .......... .......... .......... .......... 60% 472M 0s 3200K .......... .......... .......... .......... .......... 61% 8.42M 0s 3250K .......... .......... .......... .......... .......... 62% 299M 0s 3300K .......... .......... .......... .......... .......... 63% 392M 0s 3350K .......... .......... .......... .......... .......... 64% 418M 0s 3400K .......... .......... .......... .......... .......... 65% 477M 0s 3450K .......... .......... .......... .......... .......... 65% 8.12M 0s 3500K .......... .......... .......... .......... .......... 66% 366M 0s 3550K .......... .......... .......... .......... .......... 67% 437M 0s 3600K .......... .......... .......... .......... .......... 68% 394M 0s 3650K .......... .......... .......... .......... .......... 69% 410M 0s 3700K .......... .......... .......... .......... .......... 70% 11.8M 0s 3750K .......... .......... .......... .......... .......... 71% 356M 0s 3800K .......... .......... .......... .......... .......... 72% 439M 0s 3850K .......... .......... .......... .......... .......... 73% 239M 0s 3900K .......... .......... .......... .......... .......... 74% 257M 0s 3950K .......... .......... .......... .......... .......... 75% 12.1M 0s 4000K .......... .......... .......... .......... .......... 76% 293M 0s 4050K .......... .......... .......... .......... .......... 77% 231M 0s 4100K .......... .......... .......... .......... .......... 78% 185M 0s 4150K .......... .......... .......... .......... .......... 79% 374M 0s 4200K .......... .......... .......... .......... .......... 80% 11.5M 0s 4250K .......... .......... .......... .......... .......... 81% 395M 0s 4300K .......... .......... .......... .......... .......... 81% 216M 0s 4350K .......... .......... .......... .......... .......... 82% 267M 0s 4400K .......... .......... .......... .......... .......... 83% 281M 0s 4450K .......... .......... .......... .......... .......... 84% 11.4M 0s 4500K .......... .......... .......... .......... .......... 85% 290M 0s 4550K .......... .......... .......... .......... .......... 86% 232M 0s 4600K .......... .......... .......... .......... .......... 87% 272M 0s 4650K .......... .......... .......... .......... .......... 88% 267M 0s 4700K .......... .......... .......... .......... .......... 89% 8.82M 0s 4750K .......... .......... .......... .......... .......... 90% 249M 0s 4800K .......... .......... .......... .......... .......... 91% 243M 0s 4850K .......... .......... .......... .......... .......... 92% 212M 0s 4900K .......... .......... .......... .......... .......... 93% 264M 0s 4950K .......... .......... .......... .......... .......... 94% 465M 0s 5000K .......... .......... .......... .......... .......... 95% 10.3M 0s 5050K .......... .......... .......... .......... .......... 96% 222M 0s 5100K .......... .......... .......... .......... .......... 97% 144M 0s 5150K .......... .......... .......... .......... .......... 97% 247M 0s 5200K .......... .......... .......... .......... .......... 98% 305M 0s 5250K .......... .......... .......... .......... .......... 99% 14.4M 0s 5300K ...... 100% 135M=0.1s 2026-01-26 18:11:22 (44.1 MB/s) - written to stdout [5433510/5433510] mkdir -p bindata/crds bindata/rbac bindata/operator /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/crd > bindata/crds/crds.yaml /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/default > bindata/operator/operator.yaml sed -i bindata/operator/operator.yaml -e "s|replicas:.*|replicas: {{ .OpenStackOperator.Deployment.Replicas }}|" sed -i bindata/operator/operator.yaml -e "/envCustom/c\\{{- range .OpenStackOperator.Deployment.Manager.Env }}\n - name: '{{ .Name }}'\n value: '{{ .Value }}'\n{{- end }}" sed -i bindata/operator/operator.yaml -e "/customLimits/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.Memory }}" sed -i bindata/operator/operator.yaml -e "/customRequests/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.Memory }}" sed -i bindata/operator/operator.yaml -e "/customTolerations/c\\ tolerations:\n{{- range .OpenStackOperator.Deployment.Tolerations }}\n - key: \"{{ .Key }}\"\n{{- if .Operator }}\n operator: \"{{ .Operator }}\"\n{{- end }}\n{{- if .Value }}\n value: \"{{ .Value }}\"\n{{- end }}\n{{- if .Effect }}\n effect: \"{{ .Effect }}\"\n{{- end }}\n{{- if .TolerationSeconds }}\n tolerationSeconds: {{ .TolerationSeconds }}\n{{- end }}\n{{- end }}" cp config/operator/managers.yaml bindata/operator/ cp config/operator/rabbit.yaml bindata/operator/ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/rbac > bindata/rbac/rbac.yaml /bin/bash hack/sync-bindata.sh + BINDATA_GIT_ADD= + OUT_DATA=bindata + EXTRACT_DIR=tmp/bindata + LOCAL_BINARIES=/home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin + mkdir -p tmp/bindata + mkdir -p bindata/crds ++ hack/pin-bundle-images.sh ++ tr , ' ' jq: error (at :1): Cannot iterate over null (null) + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/barbican-operator-bundle:806412094e64542180bbf85b6868ec93ce3a7fb0 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:ec4eb3e41fce06eb6cb87f3c670d7d7c5ffd9fdb228bfb9a39063ef1f09c458b Copying config sha256:830cd3847cbd8c3395b8904351c4d36df796deb1d0fc675e94956b7322c05249 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/830cd3847cbd8c3395b8904351c4d36df796deb1d0fc675e94956b7322c05249 tmp/bindata/tmp/ec4eb3e41fce06eb6cb87f3c670d7d7c5ffd9fdb228bfb9a39063ef1f09c458b tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/ec4eb3e41fce06eb6cb87f3c670d7d7c5ffd9fdb228bfb9a39063ef1f09c458b -C bindata// manifests/ manifests/barbican-operator-barbican-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/cinder-operator-bundle:60da1f2d9b83ec551e746910c4424cc2bee2d355 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:3cf9082fe9536e776b5a205a8d6ee9ec219d7910dd0c17b777a77a70d0ef7df1 Copying config sha256:dc75c1c411850d5348deffd1399fe8b7a0ff832bfb80dd14d96bc7e733a3fc47 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/3cf9082fe9536e776b5a205a8d6ee9ec219d7910dd0c17b777a77a70d0ef7df1 tmp/bindata/tmp/dc75c1c411850d5348deffd1399fe8b7a0ff832bfb80dd14d96bc7e733a3fc47 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/3cf9082fe9536e776b5a205a8d6ee9ec219d7910dd0c17b777a77a70d0ef7df1 -C bindata// manifests/ manifests/cinder-operator-cinder-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cindervolumes.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/designate-operator-bundle:be0d2af3215171d15789a345d71612740a9d1960 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:e98b59eb1ec0cfd5562d48335bf5e278a9dc7ff12f64f5587fe25fd122e76e67 Copying config sha256:fae80febc4765dfac06fdedc83031e16aae742dda734d8e2c0b31e29db31f64b Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/e98b59eb1ec0cfd5562d48335bf5e278a9dc7ff12f64f5587fe25fd122e76e67 tmp/bindata/tmp/fae80febc4765dfac06fdedc83031e16aae742dda734d8e2c0b31e29db31f64b tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/e98b59eb1ec0cfd5562d48335bf5e278a9dc7ff12f64f5587fe25fd122e76e67 -C bindata// manifests/ manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-designate-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://38.102.83.151:5001/openstack-k8s-operators/glance-operator-bundle:7d867f42a4dc7203a136b185df86902e33a899fe dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:1b73813f7bc0dec3428e3352b0abc1e063a7474b511cb4f5e73b2ea2e200257f Copying blob sha256:e3115c2d6984401ddd4cbb9c4f0e01b029bb0fbfa5d589c60afb9bb66bb6a927 Copying blob sha256:394f3774e6e4f304e9e014d4b82da30a8aa2d34f2eb56eab7a7c2b1963dbabb4 Copying config sha256:a252f85220c2d48f7bcc61393dc5f741d510e7c587b792cb93b2fa8e672004e9 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/1b73813f7bc0dec3428e3352b0abc1e063a7474b511cb4f5e73b2ea2e200257f tmp/bindata/tmp/394f3774e6e4f304e9e014d4b82da30a8aa2d34f2eb56eab7a7c2b1963dbabb4 tmp/bindata/tmp/a252f85220c2d48f7bcc61393dc5f741d510e7c587b792cb93b2fa8e672004e9 tmp/bindata/tmp/e3115c2d6984401ddd4cbb9c4f0e01b029bb0fbfa5d589c60afb9bb66bb6a927 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/1b73813f7bc0dec3428e3352b0abc1e063a7474b511cb4f5e73b2ea2e200257f -C bindata// tests/ tests/scorecard/ tests/scorecard/config.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/394f3774e6e4f304e9e014d4b82da30a8aa2d34f2eb56eab7a7c2b1963dbabb4 -C bindata// metadata/ metadata/annotations.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/e3115c2d6984401ddd4cbb9c4f0e01b029bb0fbfa5d589c60afb9bb66bb6a927 -C bindata// manifests/ manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-glance-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/heat-operator-bundle:5b3bf0296d6e9931922cd7439cbc3e80dc849222 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:fb03ec9faf241674f182a3ba2261797efcc3baa1d674b2da45cb6d23119931b3 Copying config sha256:1e2efd6b0e4add4de891bf8da6491d376d3340a8217f15c42513bacc547341c3 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/1e2efd6b0e4add4de891bf8da6491d376d3340a8217f15c42513bacc547341c3 tmp/bindata/tmp/fb03ec9faf241674f182a3ba2261797efcc3baa1d674b2da45cb6d23119931b3 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/fb03ec9faf241674f182a3ba2261797efcc3baa1d674b2da45cb6d23119931b3 -C bindata// manifests/ manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-heat-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/horizon-operator-bundle:be9fdcb15911205297f2ae051c07180c7ff1c79b dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:1fadb4474d1a89f783839ab8970c590c3ab741b36fcb49ce4fd292908f85704f Copying config sha256:40d2c410bac34b3cab2ffcefd112515fe1a9fe384429e6a41a806df70e6aae30 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/1fadb4474d1a89f783839ab8970c590c3ab741b36fcb49ce4fd292908f85704f tmp/bindata/tmp/40d2c410bac34b3cab2ffcefd112515fe1a9fe384429e6a41a806df70e6aae30 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/1fadb4474d1a89f783839ab8970c590c3ab741b36fcb49ce4fd292908f85704f -C bindata// manifests/ manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-horizon-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon.openstack.org_horizons.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/infra-operator-bundle:834dd78eceb9acbee610ca4b620e0e23cf28886c dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:0457318f3dae0246a66c3baa83c6b58b847d6c69352985c473aa363486db748b Copying config sha256:efd32e53d48120fa065393634871598daa8162875c8f3d344227ae7ef93d2fdb Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/0457318f3dae0246a66c3baa83c6b58b847d6c69352985c473aa363486db748b tmp/bindata/tmp/efd32e53d48120fa065393634871598daa8162875c8f3d344227ae7ef93d2fdb tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/0457318f3dae0246a66c3baa83c6b58b847d6c69352985c473aa363486db748b -C bindata// manifests/ manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-instanceha-instanceha-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/rabbitmq.openstack.org_rabbitmqpolicies.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_rabbitmqusers.yaml manifests/rabbitmq.openstack.org_rabbitmqvhosts.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/topology.openstack.org_topologies.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/ironic-operator-bundle:82e5723b1f919d4db75ec2b8c2432130bb73c054 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:c5c299dfcc0ddf0dd3e0dcffee1fa52204eb2b4546a90a32e8677d5ffac35798 Copying config sha256:23134380ded4f223007efb88e117d93ac34c8b834782fc79f4715665aad55190 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/23134380ded4f223007efb88e117d93ac34c8b834782fc79f4715665aad55190 tmp/bindata/tmp/c5c299dfcc0ddf0dd3e0dcffee1fa52204eb2b4546a90a32e8677d5ffac35798 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/c5c299dfcc0ddf0dd3e0dcffee1fa52204eb2b4546a90a32e8677d5ffac35798 -C bindata// manifests/ manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-ironic-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + cd bindata + xargs -I % sh -c 'cp % ./crds/' + grep -l CustomResourceDefinition manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml manifests/barbican-operator-barbican-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cindervolumes.yaml manifests/cinder-operator-cinder-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-designate-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-glance-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-heat-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/horizon.openstack.org_horizons.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-horizon-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-instanceha-instanceha-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-ironic-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/rabbitmq.openstack.org_rabbitmqpolicies.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_rabbitmqusers.yaml manifests/rabbitmq.openstack.org_rabbitmqvhosts.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/topology.openstack.org_topologies.yaml ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=barbican-operator + echo barbican-operator barbican-operator ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis - barbicankeystonelisteners - barbicans - barbicanworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis/finalizers - barbicankeystonelisteners/finalizers - barbicans/finalizers - barbicanworkers/finalizers verbs: - patch - update - apiGroups: - barbican.openstack.org resources: - barbicanapis/status - barbicankeystonelisteners/status - barbicans/status - barbicanworkers/status verbs: - get - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ barbican-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ barbican-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/cinder-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=cinder-operator + echo cinder-operator cinder-operator ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis - cinderbackups - cinders - cinderschedulers - cindervolumes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis/finalizers - cinderbackups/finalizers - cinders/finalizers - cinderschedulers/finalizers - cindervolumes/finalizers verbs: - patch - update - apiGroups: - cinder.openstack.org resources: - cinderapis/status - cinderbackups/status - cinders/status - cinderschedulers/status - cindervolumes/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ cinder-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ cinder-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=designate-operator + echo designate-operator designate-operator ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis - designatebackendbind9s - designatecentrals - designatemdnses - designateproducers - designates - designateunbounds - designateworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis/finalizers - designatebackendbind9s/finalizers - designatecentrals/finalizers - designatemdnses/finalizers - designateproducers/finalizers - designates/finalizers - designateunbounds/finalizers - designateworkers/finalizers verbs: - patch - update - apiGroups: - designate.openstack.org resources: - designateapis/status - designatebackendbind9s/status - designatecentrals/status - designatemdnses/status - designateproducers/status - designates/status - designateunbounds/status - designateworkers/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - operator.openshift.io resources: - networks verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ designate-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ designate-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=glance-operator + echo glance-operator glance-operator ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets/status verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinders verbs: - get - list - watch - apiGroups: - glance.openstack.org resources: - glanceapis - glances verbs: - create - delete - get - list - patch - update - watch - apiGroups: - glance.openstack.org resources: - glanceapis/finalizers - glances/finalizers verbs: - patch - update - apiGroups: - glance.openstack.org resources: - glanceapis/status - glances/status verbs: - get - patch - update - apiGroups: - horizon.openstack.org resources: - horizons verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ glance-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ glance-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=heat-operator + echo heat-operator heat-operator ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis - heatcfnapis - heatengines - heats verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis/finalizers - heatcfnapis/finalizers - heatengines/finalizers - heats/finalizers verbs: - patch - update - apiGroups: - heat.openstack.org resources: - heatapis/status - heatcfnapis/status - heatengines/status - heats/status verbs: - get - patch - update - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ heat-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ heat-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=horizon-operator + echo horizon-operator horizon-operator ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons/finalizers verbs: - patch - update - apiGroups: - horizon.openstack.org resources: - horizons/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis - keystoneendpoints - keystoneservices verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - hostmount-anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ horizon-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ horizon-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=infra-operator + echo infra-operator infra-operator ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org - cinder.openstack.org - designate.openstack.org - glance.openstack.org - heat.openstack.org - horizon.openstack.org - ironic.openstack.org - keystone.openstack.org - manila.openstack.org - neutron.openstack.org - nova.openstack.org - octavia.openstack.org - ovn.openstack.org - placement.openstack.org - swift.openstack.org - telemetry.openstack.org - watcher.openstack.org resources: - '\''*'\'' verbs: - get - list - apiGroups: - config.openshift.io resources: - networks verbs: - get - list - watch - apiGroups: - frrk8s.metallb.io resources: - frrconfigurations verbs: - create - delete - deletecollection - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas verbs: - create - delete - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas/finalizers verbs: - patch - update - apiGroups: - instanceha.openstack.org resources: - instancehas/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - create - delete - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - bgpconfigurations - dnsdata - dnsdatas - dnsmasqs - ipsets - reservations - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - network.openstack.org resources: - bgpconfigurations/finalizers verbs: - update - apiGroups: - network.openstack.org resources: - bgpconfigurations/status - dnsdata/status - dnsmasqs/status - ipsets/status - services/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - dnsdata/finalizers - dnsmasqs/finalizers - ipsets/finalizers - reservations/finalizers - services/finalizers verbs: - patch - update - apiGroups: - network.openstack.org resources: - netconfigs verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies - rabbitmqs - rabbitmqusers - rabbitmqvhosts - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies/finalizers - rabbitmqs/finalizers - rabbitmqusers/finalizers - rabbitmqvhosts/finalizers - transporturls/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies/status - rabbitmqs/status - rabbitmqusers/status - rabbitmqvhosts/status - transporturls/status verbs: - get - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises/finalizers verbs: - update - apiGroups: - redis.openstack.org resources: - redises/status verbs: - get - patch - update - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ infra-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + write_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator + local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml + local OPERATOR_NAME=infra-operator ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator MutatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=MutatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "MutatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' + MUTATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: mdnsmasq-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: minstanceha-v1beta1.kb.io rules: - apiGroups: - instanceha.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-instanceha-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: mipset-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: mmemcached-v1beta1.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: mnetconfig-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmq-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqpolicy-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqpolicy.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmquser-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmquser.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqvhost-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqvhost.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: mredis-v1beta1.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: mreservation-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-reservation' ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator ValidatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=ValidatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "ValidatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + VALIDATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: vdnsmasq-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: vinstanceha-v1beta1.kb.io rules: - apiGroups: - instanceha.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-instanceha-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: vipset-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: vmemcached-v1beta1.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: vnetconfig-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE - DELETE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmq-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqpolicy-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqpolicy.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmquser-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmquser.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqvhost-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqvhost.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: vredis-v1beta1.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: vreservation-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-reservation' + cat + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=ironic-operator + echo ironic-operator ironic-operator ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis - ironicconductors - ironicinspectors - ironicneutronagents - ironics verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis/finalizers - ironicconductors/finalizers - ironicinspectors/finalizers - ironicneutronagents/finalizers - ironics/finalizers verbs: - patch - update - apiGroups: - ironic.openstack.org resources: - ironicapis/status - ironicconductors/status - ironicinspectors/status - ironicneutronagents/status - ironics/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - operator.openshift.io resources: - ingresscontrollers verbs: - get - list - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ ironic-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ ironic-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + cat ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=BARBICAN_OPERATOR + echo BARBICAN_OPERATOR BARBICAN_OPERATOR + [[ BARBICAN_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/barbican-operator@sha256:c94116e32fb9af850accd9d7ae46765559eef3fbe2ba75472c1c1ac91b2c33fd + echo quay.io/openstack-k8s-operators/barbican-operator@sha256:c94116e32fb9af850accd9d7ae46765559eef3fbe2ba75472c1c1ac91b2c33fd quay.io/openstack-k8s-operators/barbican-operator@sha256:c94116e32fb9af850accd9d7ae46765559eef3fbe2ba75472c1c1ac91b2c33fd + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/cinder-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=CINDER_OPERATOR + echo CINDER_OPERATOR CINDER_OPERATOR + [[ CINDER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/cinder-operator@sha256:b916c87806b7eadd83e0ca890c3c24fb990fc5beb48ddc4537e3384efd3e62f7 + echo quay.io/openstack-k8s-operators/cinder-operator@sha256:b916c87806b7eadd83e0ca890c3c24fb990fc5beb48ddc4537e3384efd3e62f7 quay.io/openstack-k8s-operators/cinder-operator@sha256:b916c87806b7eadd83e0ca890c3c24fb990fc5beb48ddc4537e3384efd3e62f7 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=DESIGNATE_OPERATOR + echo DESIGNATE_OPERATOR DESIGNATE_OPERATOR + [[ DESIGNATE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/designate-operator@sha256:6c88312afa9673f7b72c558368034d7a488ead73080cdcdf581fe85b99263ece + echo quay.io/openstack-k8s-operators/designate-operator@sha256:6c88312afa9673f7b72c558368034d7a488ead73080cdcdf581fe85b99263ece quay.io/openstack-k8s-operators/designate-operator@sha256:6c88312afa9673f7b72c558368034d7a488ead73080cdcdf581fe85b99263ece + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=GLANCE_OPERATOR + echo GLANCE_OPERATOR GLANCE_OPERATOR + [[ GLANCE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=38.102.83.151:5001/openstack-k8s-operators/glance-operator:7d867f42a4dc7203a136b185df86902e33a899fe + echo 38.102.83.151:5001/openstack-k8s-operators/glance-operator:7d867f42a4dc7203a136b185df86902e33a899fe 38.102.83.151:5001/openstack-k8s-operators/glance-operator:7d867f42a4dc7203a136b185df86902e33a899fe + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HEAT_OPERATOR + echo HEAT_OPERATOR HEAT_OPERATOR + [[ HEAT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/heat-operator@sha256:2f9a2f064448faebbae58f52d564dc0e8e39bed0fc12bd6b9fe925e42f1b5492 + echo quay.io/openstack-k8s-operators/heat-operator@sha256:2f9a2f064448faebbae58f52d564dc0e8e39bed0fc12bd6b9fe925e42f1b5492 quay.io/openstack-k8s-operators/heat-operator@sha256:2f9a2f064448faebbae58f52d564dc0e8e39bed0fc12bd6b9fe925e42f1b5492 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HORIZON_OPERATOR + echo HORIZON_OPERATOR HORIZON_OPERATOR + [[ HORIZON_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/horizon-operator@sha256:3311e627bcb860d9443592a2c67078417318c9eb77d8ef4d07f9aa7027d46822 + echo quay.io/openstack-k8s-operators/horizon-operator@sha256:3311e627bcb860d9443592a2c67078417318c9eb77d8ef4d07f9aa7027d46822 quay.io/openstack-k8s-operators/horizon-operator@sha256:3311e627bcb860d9443592a2c67078417318c9eb77d8ef4d07f9aa7027d46822 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|-|_|g' ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=INFRA_OPERATOR + echo INFRA_OPERATOR INFRA_OPERATOR + [[ INFRA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/infra-operator@sha256:7137aa48f59841d0cc267a9afc5ea6b2924ba0670638dd3409307e412c021e96 + echo quay.io/openstack-k8s-operators/infra-operator@sha256:7137aa48f59841d0cc267a9afc5ea6b2924ba0670638dd3409307e412c021e96 quay.io/openstack-k8s-operators/infra-operator@sha256:7137aa48f59841d0cc267a9afc5ea6b2924ba0670638dd3409307e412c021e96 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=IRONIC_OPERATOR + echo IRONIC_OPERATOR IRONIC_OPERATOR + [[ IRONIC_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/ironic-operator@sha256:4d55bd6418df3f63f4d3fe47bebf3f5498a520b3e14af98fe16c85ef9fd54d5e + echo quay.io/openstack-k8s-operators/ironic-operator@sha256:4d55bd6418df3f63f4d3fe47bebf3f5498a520b3e14af98fe16c85ef9fd54d5e quay.io/openstack-k8s-operators/ironic-operator@sha256:4d55bd6418df3f63f4d3fe47bebf3f5498a520b3e14af98fe16c85ef9fd54d5e + cat + cat + cd .. + rm -Rf tmp/bindata + rm -Rf bindata/manifests + rm -Rf bindata/metadata + rm -Rf bindata/tests + [[ '' == \t\r\u\e ]] ~/ci-framework-data/artifacts