home/zuul/zuul-output/0000755000175000017500000000000015133726347014135 5ustar zuulzuulhome/zuul/zuul-output/logs/0000755000175000017500000000000015133753434015076 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/0000755000175000017500000000000015133753426020374 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/logs/0000755000175000017500000000000015133753412021333 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/0000755000175000017500000000000015133753355025566 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/must-gather.logs0000644000175000017500000000232615133746124030713 0ustar zuulzuul[must-gather ] OUT 2026-01-20T18:41:24.364042804Z Using must-gather plug-in image: quay.io/openstack-k8s-operators/openstack-must-gather:latest When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: ClientVersion: 4.20.8 ClusterVersion: Stable at "4.18.1" ClusterOperators: clusteroperator/machine-config is degraded because Failed to resync 4.18.1 because: error during syncRequiredMachineConfigPools: [context deadline exceeded, error MachineConfigPool master is not ready, retrying. Status: (pool degraded: true total: 1, ready 0, updated: 0, unavailable: 1)] clusteroperator/cloud-credential is missing clusteroperator/cluster-autoscaler is missing clusteroperator/insights is missing clusteroperator/monitoring is missing clusteroperator/storage is missing [must-gather ] OUT 2026-01-20T18:41:24.38953483Z namespace/openshift-must-gather-mblc8 created [must-gather ] OUT 2026-01-20T18:41:24.398252119Z clusterrolebinding.rbac.authorization.k8s.io/must-gather-5fn5w created [must-gather ] OUT 2026-01-20T18:41:24.438739789Z pod for plug-in image quay.io/openstack-k8s-operators/openstack-must-gather:latest created home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/timestamp0000644000175000017500000000015515133746124027511 0ustar zuulzuul2026-01-20 17:55:34.783323348 +0000 UTC m=+0.330893160 2026-01-20 18:41:24.41380354 +0000 UTC m=+0.152011772 home/zuul/zuul-output/logs/ci-framework-data/logs/2026-01-20_17-55/0000755000175000017500000000000015133753355023125 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/logs/2026-01-20_17-55/ansible.log0000644000175000017500000177232215133753355025263 0ustar zuulzuul2026-01-20 16:39:21,782 p=30888 u=zuul n=ansible | Starting galaxy collection install process 2026-01-20 16:39:21,783 p=30888 u=zuul n=ansible | Process install dependency map 2026-01-20 16:39:42,117 p=30888 u=zuul n=ansible | Starting collection install process 2026-01-20 16:39:42,118 p=30888 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+5ef63bb0' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2026-01-20 16:39:42,759 p=30888 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+5ef63bb0 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2026-01-20 16:39:42,759 p=30888 u=zuul n=ansible | cifmw.general:1.0.0+5ef63bb0 was installed successfully 2026-01-20 16:39:42,760 p=30888 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2026-01-20 16:39:45,571 p=30888 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2026-01-20 16:39:45,572 p=30888 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2026-01-20 16:39:55,975 p=31524 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:56 +0000 (0:00:00.047) 0:00:00.047 ******* 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:56 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 16:39:57,102 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:01.118) 0:00:01.165 ******* 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:01.118) 0:00:01.163 ******* 2026-01-20 16:39:57,466 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,473 p=31524 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2026-01-20 16:39:57,474 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.353) 0:00:01.518 ******* 2026-01-20 16:39:57,474 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.353) 0:00:01.517 ******* 2026-01-20 16:39:57,496 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.081) 0:00:01.599 ******* 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.081) 0:00:01.598 ******* 2026-01-20 16:39:57,583 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:57,591 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 16:39:57,592 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.036) 0:00:01.636 ******* 2026-01-20 16:39:57,592 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.036) 0:00:01.635 ******* 2026-01-20 16:39:57,622 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.037) 0:00:01.673 ******* 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.037) 0:00:01.672 ******* 2026-01-20 16:39:57,725 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,731 p=31524 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-01-20 16:39:57,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.102) 0:00:01.776 ******* 2026-01-20 16:39:57,732 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.102) 0:00:01.775 ******* 2026-01-20 16:39:57,974 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.249) 0:00:02.026 ******* 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.249) 0:00:02.024 ******* 2026-01-20 16:39:58,010 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,019 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-01-20 16:39:58,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.038) 0:00:02.064 ******* 2026-01-20 16:39:58,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.038) 0:00:02.063 ******* 2026-01-20 16:39:58,046 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.100 ******* 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.098 ******* 2026-01-20 16:39:58,082 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,090 p=31524 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-01-20 16:39:58,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.135 ******* 2026-01-20 16:39:58,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.134 ******* 2026-01-20 16:39:59,697 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:39:59,712 p=31524 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 16:39:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:59 +0000 (0:00:01.621) 0:00:03.757 ******* 2026-01-20 16:39:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:59 +0000 (0:00:01.621) 0:00:03.756 ******* 2026-01-20 16:39:59,962 p=31524 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2026-01-20 16:40:00,165 p=31524 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2026-01-20 16:40:00,352 p=31524 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2026-01-20 16:40:00,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2026-01-20 16:40:00,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:00 +0000 (0:00:00.650) 0:00:04.407 ******* 2026-01-20 16:40:00,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:00 +0000 (0:00:00.650) 0:00:04.406 ******* 2026-01-20 16:40:01,609 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:01 +0000 (0:00:01.254) 0:00:05.662 ******* 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:01 +0000 (0:00:01.254) 0:00:05.660 ******* 2026-01-20 16:40:02,737 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:02 +0000 (0:00:01.127) 0:00:06.789 ******* 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:02 +0000 (0:00:01.127) 0:00:06.788 ******* 2026-01-20 16:40:12,352 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:12,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2026-01-20 16:40:12,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:12 +0000 (0:00:09.617) 0:00:16.407 ******* 2026-01-20 16:40:12,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:12 +0000 (0:00:09.617) 0:00:16.406 ******* 2026-01-20 16:40:13,271 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.916) 0:00:17.324 ******* 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.916) 0:00:17.322 ******* 2026-01-20 16:40:13,307 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.034) 0:00:17.358 ******* 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.034) 0:00:17.357 ******* 2026-01-20 16:40:13,986 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.681) 0:00:18.040 ******* 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.681) 0:00:18.039 ******* 2026-01-20 16:40:14,033 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.088 ******* 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.086 ******* 2026-01-20 16:40:14,081 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.135 ******* 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.133 ******* 2026-01-20 16:40:14,123 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.043) 0:00:18.178 ******* 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.043) 0:00:18.176 ******* 2026-01-20 16:40:14,629 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.504) 0:00:18.683 ******* 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.504) 0:00:18.681 ******* 2026-01-20 16:40:15,396 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.767) 0:00:19.450 ******* 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.767) 0:00:19.449 ******* 2026-01-20 16:40:15,427 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,435 p=31524 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2026-01-20 16:40:15,436 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.029) 0:00:19.480 ******* 2026-01-20 16:40:15,436 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.029) 0:00:19.479 ******* 2026-01-20 16:40:15,459 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.030) 0:00:19.511 ******* 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.030) 0:00:19.509 ******* 2026-01-20 16:40:15,485 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.538 ******* 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.536 ******* 2026-01-20 16:40:15,525 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.040) 0:00:19.578 ******* 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.040) 0:00:19.576 ******* 2026-01-20 16:40:15,553 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.606 ******* 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.604 ******* 2026-01-20 16:40:15,579 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,586 p=31524 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2026-01-20 16:40:15,587 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.025) 0:00:19.631 ******* 2026-01-20 16:40:15,587 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.025) 0:00:19.630 ******* 2026-01-20 16:40:15,603 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.024) 0:00:19.656 ******* 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.024) 0:00:19.654 ******* 2026-01-20 16:40:15,628 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.682 ******* 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.681 ******* 2026-01-20 16:40:15,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,670 p=31524 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2026-01-20 16:40:15,671 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.032) 0:00:19.715 ******* 2026-01-20 16:40:15,671 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.032) 0:00:19.714 ******* 2026-01-20 16:40:15,691 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.033) 0:00:19.748 ******* 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.033) 0:00:19.747 ******* 2026-01-20 16:40:15,720 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.776 ******* 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.774 ******* 2026-01-20 16:40:16,104 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.380) 0:00:20.157 ******* 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.380) 0:00:20.155 ******* 2026-01-20 16:40:16,323 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.219) 0:00:20.376 ******* 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.219) 0:00:20.374 ******* 2026-01-20 16:40:16,562 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.240) 0:00:20.617 ******* 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.240) 0:00:20.615 ******* 2026-01-20 16:40:17,269 p=31524 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.51:8766/gating.repo 2026-01-20 16:40:17,270 p=31524 u=zuul n=ansible | ...ignoring 2026-01-20 16:40:17,279 p=31524 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2026-01-20 16:40:17,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.707) 0:00:21.324 ******* 2026-01-20 16:40:17,280 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.707) 0:00:21.323 ******* 2026-01-20 16:40:17,313 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.042) 0:00:21.367 ******* 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.042) 0:00:21.365 ******* 2026-01-20 16:40:17,355 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2026-01-20 16:40:17,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.040) 0:00:21.407 ******* 2026-01-20 16:40:17,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.040) 0:00:21.406 ******* 2026-01-20 16:40:17,399 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,405 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2026-01-20 16:40:17,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.450 ******* 2026-01-20 16:40:17,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.449 ******* 2026-01-20 16:40:17,440 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.494 ******* 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.492 ******* 2026-01-20 16:40:17,485 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.045) 0:00:21.539 ******* 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.045) 0:00:21.537 ******* 2026-01-20 16:40:17,838 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.353) 0:00:21.892 ******* 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.353) 0:00:21.891 ******* 2026-01-20 16:40:19,484 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2026-01-20 16:40:20,055 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2026-01-20 16:40:20,065 p=31524 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2026-01-20 16:40:20,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:02.217) 0:00:24.110 ******* 2026-01-20 16:40:20,066 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:02.217) 0:00:24.109 ******* 2026-01-20 16:40:20,574 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.517) 0:00:24.627 ******* 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.517) 0:00:24.626 ******* 2026-01-20 16:40:20,934 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.363) 0:00:24.991 ******* 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.363) 0:00:24.990 ******* 2026-01-20 16:40:20,987 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2026-01-20 16:40:20,994 p=31524 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2026-01-20 16:40:20,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.047) 0:00:25.039 ******* 2026-01-20 16:40:20,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.047) 0:00:25.038 ******* 2026-01-20 16:40:21,013 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:21 +0000 (0:00:00.025) 0:00:25.065 ******* 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:21 +0000 (0:00:00.025) 0:00:25.064 ******* 2026-01-20 16:40:55,926 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:55,936 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2026-01-20 16:40:55,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:55 +0000 (0:00:34.915) 0:00:59.981 ******* 2026-01-20 16:40:55,937 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:55 +0000 (0:00:34.916) 0:00:59.980 ******* 2026-01-20 16:40:56,175 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.250) 0:01:00.232 ******* 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.250) 0:01:00.230 ******* 2026-01-20 16:40:56,389 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.211) 0:01:00.443 ******* 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.211) 0:01:00.442 ******* 2026-01-20 16:41:02,021 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:05.632) 0:01:06.075 ******* 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:05.632) 0:01:06.074 ******* 2026-01-20 16:41:02,066 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.042) 0:01:06.118 ******* 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.042) 0:01:06.116 ******* 2026-01-20 16:41:02,451 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.384) 0:01:06.503 ******* 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.384) 0:01:06.501 ******* 2026-01-20 16:41:02,874 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,880 p=31524 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2026-01-20 16:41:02,881 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.422) 0:01:06.925 ******* 2026-01-20 16:41:02,881 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.422) 0:01:06.924 ******* 2026-01-20 16:41:02,897 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.024) 0:01:06.949 ******* 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.024) 0:01:06.948 ******* 2026-01-20 16:41:02,921 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:06.976 ******* 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:06.974 ******* 2026-01-20 16:41:02,949 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,958 p=31524 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2026-01-20 16:41:02,959 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.027) 0:01:07.003 ******* 2026-01-20 16:41:02,959 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.027) 0:01:07.002 ******* 2026-01-20 16:41:02,976 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:07.030 ******* 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:07.028 ******* 2026-01-20 16:41:03,002 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.026) 0:01:07.056 ******* 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.026) 0:01:07.055 ******* 2026-01-20 16:41:03,035 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:03,042 p=31524 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2026-01-20 16:41:03,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.030) 0:01:07.087 ******* 2026-01-20 16:41:03,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.030) 0:01:07.086 ******* 2026-01-20 16:41:03,333 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2026-01-20 16:41:03,576 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2026-01-20 16:41:03,796 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2026-01-20 16:41:03,997 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2026-01-20 16:41:04,202 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:01.174) 0:01:08.261 ******* 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:01.174) 0:01:08.260 ******* 2026-01-20 16:41:04,378 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2026-01-20 16:41:04,379 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:00.161) 0:01:08.423 ******* 2026-01-20 16:41:04,379 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:00.161) 0:01:08.422 ******* 2026-01-20 16:41:04,630 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2026-01-20 16:41:04,826 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2026-01-20 16:41:05,003 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-01-20 16:41:05,011 p=31524 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2026-01-20 16:41:05,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.632) 0:01:09.056 ******* 2026-01-20 16:41:05,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.632) 0:01:09.055 ******* 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.035) 0:01:09.092 ******* 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.035) 0:01:09.090 ******* 2026-01-20 16:41:05,118 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.077) 0:01:09.170 ******* 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.077) 0:01:09.168 ******* 2026-01-20 16:41:05,172 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) => msg: | _repo_operator_name: watcher _repo_operator_info: [{'key': 'WATCHER_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, {'key': 'WATCHER_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'WATCHER_BRANCH': ''} 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.061) 0:01:09.231 ******* 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.061) 0:01:09.230 ******* 2026-01-20 16:41:05,234 p=31524 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2026-01-20 16:41:05,235 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.047) 0:01:09.279 ******* 2026-01-20 16:41:05,235 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.047) 0:01:09.278 ******* 2026-01-20 16:41:05,258 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.030) 0:01:09.310 ******* 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.030) 0:01:09.308 ******* 2026-01-20 16:41:05,294 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.348 ******* 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.346 ******* 2026-01-20 16:41:05,334 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.386 ******* 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.385 ******* 2026-01-20 16:41:05,369 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.424 ******* 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.423 ******* 2026-01-20 16:41:05,468 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.095) 0:01:09.520 ******* 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.095) 0:01:09.519 ******* 2026-01-20 16:41:05,518 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.048) 0:01:09.569 ******* 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.048) 0:01:09.567 ******* 2026-01-20 16:41:06,187 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.670) 0:01:10.239 ******* 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.670) 0:01:10.238 ******* 2026-01-20 16:41:06,389 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,398 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2026-01-20 16:41:06,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.204) 0:01:10.443 ******* 2026-01-20 16:41:06,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.204) 0:01:10.442 ******* 2026-01-20 16:41:06,433 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.050) 0:01:10.494 ******* 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.050) 0:01:10.492 ******* 2026-01-20 16:41:06,899 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.459) 0:01:10.953 ******* 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.459) 0:01:10.952 ******* 2026-01-20 16:41:06,941 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.039) 0:01:10.993 ******* 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.039) 0:01:10.992 ******* 2026-01-20 16:41:06,968 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:41:06,975 p=31524 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2026-01-20 16:41:06,976 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.026) 0:01:11.020 ******* 2026-01-20 16:41:06,976 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.026) 0:01:11.019 ******* 2026-01-20 16:41:07,010 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.044) 0:01:11.064 ******* 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.044) 0:01:11.063 ******* 2026-01-20 16:41:07,386 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:07,404 p=31524 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2026-01-20 16:41:07,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.384) 0:01:11.449 ******* 2026-01-20 16:41:07,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.384) 0:01:11.448 ******* 2026-01-20 16:41:07,431 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.035) 0:01:11.485 ******* 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.035) 0:01:11.483 ******* 2026-01-20 16:41:08,207 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:08,216 p=31524 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2026-01-20 16:41:08,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.776) 0:01:12.261 ******* 2026-01-20 16:41:08,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.776) 0:01:12.260 ******* 2026-01-20 16:41:08,245 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:08,261 p=31524 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2026-01-20 16:41:08,262 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.045) 0:01:12.306 ******* 2026-01-20 16:41:08,262 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.045) 0:01:12.305 ******* 2026-01-20 16:41:08,703 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.450) 0:01:12.757 ******* 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.450) 0:01:12.755 ******* 2026-01-20 16:41:08,742 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.043) 0:01:12.801 ******* 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.043) 0:01:12.799 ******* 2026-01-20 16:41:09,256 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.516) 0:01:13.318 ******* 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.516) 0:01:13.316 ******* 2026-01-20 16:41:09,347 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.083) 0:01:13.401 ******* 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.083) 0:01:13.399 ******* 2026-01-20 16:41:09,493 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.145) 0:01:13.546 ******* 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.145) 0:01:13.545 ******* 2026-01-20 16:41:09,660 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2026-01-20 16:41:09,677 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:41:09,677 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.175) 0:01:13.722 ******* 2026-01-20 16:41:09,678 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.175) 0:01:13.721 ******* 2026-01-20 16:41:09,739 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.072) 0:01:13.795 ******* 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.072) 0:01:13.794 ******* 2026-01-20 16:41:09,995 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.253) 0:01:14.049 ******* 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.253) 0:01:14.047 ******* 2026-01-20 16:41:10,024 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.032) 0:01:14.081 ******* 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.032) 0:01:14.079 ******* 2026-01-20 16:41:10,271 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,283 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:41:10,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.247) 0:01:14.328 ******* 2026-01-20 16:41:10,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.247) 0:01:14.327 ******* 2026-01-20 16:41:10,318 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,330 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:41:10,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.046) 0:01:14.375 ******* 2026-01-20 16:41:10,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.046) 0:01:14.374 ******* 2026-01-20 16:41:10,635 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,647 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:10,647 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.316) 0:01:14.692 ******* 2026-01-20 16:41:10,648 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.316) 0:01:14.691 ******* 2026-01-20 16:41:10,932 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,947 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2026-01-20 16:41:10,948 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.300) 0:01:14.992 ******* 2026-01-20 16:41:10,948 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.300) 0:01:14.991 ******* 2026-01-20 16:41:11,029 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2026-01-20 16:41:51,615 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:51,629 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2026-01-20 16:41:51,630 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:40.681) 0:01:55.674 ******* 2026-01-20 16:41:51,630 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:40.682) 0:01:55.673 ******* 2026-01-20 16:41:51,661 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:51,668 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:41:51,669 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.039) 0:01:55.713 ******* 2026-01-20 16:41:51,669 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.039) 0:01:55.712 ******* 2026-01-20 16:41:51,899 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.242) 0:01:55.955 ******* 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.242) 0:01:55.954 ******* 2026-01-20 16:41:51,932 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:51,970 p=31524 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2026-01-20 16:41:51,988 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:41:51,989 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.077) 0:01:56.033 ******* 2026-01-20 16:41:51,989 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.077) 0:01:56.032 ******* 2026-01-20 16:41:52,040 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.060) 0:01:56.094 ******* 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.060) 0:01:56.093 ******* 2026-01-20 16:41:52,075 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,086 p=31524 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2026-01-20 16:41:52,087 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.037) 0:01:56.131 ******* 2026-01-20 16:41:52,087 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.037) 0:01:56.130 ******* 2026-01-20 16:41:52,112 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,153 p=31524 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2026-01-20 16:41:52,198 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:41:52,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.111) 0:01:56.243 ******* 2026-01-20 16:41:52,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.111) 0:01:56.242 ******* 2026-01-20 16:41:52,350 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.171) 0:01:56.415 ******* 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.171) 0:01:56.413 ******* 2026-01-20 16:41:52,595 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.233) 0:01:56.649 ******* 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.233) 0:01:56.647 ******* 2026-01-20 16:41:52,697 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.100) 0:01:56.749 ******* 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.100) 0:01:56.748 ******* 2026-01-20 16:41:52,729 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.032) 0:01:56.782 ******* 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.032) 0:01:56.780 ******* 2026-01-20 16:41:52,767 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.045) 0:01:56.827 ******* 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.045) 0:01:56.825 ******* 2026-01-20 16:41:52,807 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,816 p=31524 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2026-01-20 16:41:52,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.034) 0:01:56.861 ******* 2026-01-20 16:41:52,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.034) 0:01:56.860 ******* 2026-01-20 16:41:52,842 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,850 p=31524 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2026-01-20 16:41:52,851 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.033) 0:01:56.895 ******* 2026-01-20 16:41:52,851 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.033) 0:01:56.894 ******* 2026-01-20 16:41:52,871 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,879 p=31524 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:52,880 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.028) 0:01:56.924 ******* 2026-01-20 16:41:52,880 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.028) 0:01:56.923 ******* 2026-01-20 16:41:53,081 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.211) 0:01:57.135 ******* 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.211) 0:01:57.134 ******* 2026-01-20 16:41:53,121 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.043) 0:01:57.178 ******* 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.043) 0:01:57.177 ******* 2026-01-20 16:41:53,158 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.214 ******* 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.213 ******* 2026-01-20 16:41:53,196 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.034) 0:01:57.248 ******* 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.034) 0:01:57.247 ******* 2026-01-20 16:41:53,231 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{********** cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.285 ******* 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.283 ******* 2026-01-20 16:41:53,279 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,287 p=31524 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2026-01-20 16:41:53,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.047) 0:01:57.332 ******* 2026-01-20 16:41:53,288 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.047) 0:01:57.331 ******* 2026-01-20 16:41:53,485 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.208) 0:01:57.541 ******* 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.208) 0:01:57.539 ******* 2026-01-20 16:41:53,555 p=31524 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.072) 0:01:57.614 ******* 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.072) 0:01:57.612 ******* 2026-01-20 16:41:53,594 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,602 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2026-01-20 16:41:53,602 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.647 ******* 2026-01-20 16:41:53,603 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.646 ******* 2026-01-20 16:41:53,626 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.682 ******* 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.681 ******* 2026-01-20 16:41:53,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,671 p=31524 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2026-01-20 16:41:53,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.716 ******* 2026-01-20 16:41:53,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.715 ******* 2026-01-20 16:41:53,699 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.752 ******* 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.751 ******* 2026-01-20 16:41:53,734 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.037) 0:01:57.789 ******* 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.037) 0:01:57.788 ******* 2026-01-20 16:41:53,763 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.029) 0:01:57.819 ******* 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.029) 0:01:57.817 ******* 2026-01-20 16:41:53,835 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2026-01-20 16:41:54,268 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:54,277 p=31524 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2026-01-20 16:41:54,278 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.503) 0:01:58.322 ******* 2026-01-20 16:41:54,278 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.503) 0:01:58.321 ******* 2026-01-20 16:41:54,300 p=31524 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.031) 0:01:58.353 ******* 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.031) 0:01:58.352 ******* 2026-01-20 16:41:54,670 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.370) 0:01:58.724 ******* 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.370) 0:01:58.722 ******* 2026-01-20 16:41:54,719 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.048) 0:01:58.772 ******* 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.048) 0:01:58.770 ******* 2026-01-20 16:41:55,046 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,055 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2026-01-20 16:41:55,056 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.328) 0:01:59.100 ******* 2026-01-20 16:41:55,056 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.328) 0:01:59.099 ******* 2026-01-20 16:41:55,377 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,385 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2026-01-20 16:41:55,386 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.330) 0:01:59.430 ******* 2026-01-20 16:41:55,386 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.330) 0:01:59.429 ******* 2026-01-20 16:41:55,744 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.368) 0:01:59.798 ******* 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.368) 0:01:59.797 ******* 2026-01-20 16:41:55,804 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.058) 0:01:59.856 ******* 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.058) 0:01:59.855 ******* 2026-01-20 16:41:56,309 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.508) 0:02:00.365 ******* 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.508) 0:02:00.364 ******* 2026-01-20 16:41:56,681 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:56,702 p=31524 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2026-01-20 16:41:56,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.381) 0:02:00.747 ******* 2026-01-20 16:41:56,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.381) 0:02:00.746 ******* 2026-01-20 16:41:57,204 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.515) 0:02:01.263 ******* 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.515) 0:02:01.261 ******* 2026-01-20 16:41:57,445 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.235) 0:02:01.499 ******* 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.235) 0:02:01.497 ******* 2026-01-20 16:41:57,490 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:57,502 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2026-01-20 16:41:57,503 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.048) 0:02:01.547 ******* 2026-01-20 16:41:57,503 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.048) 0:02:01.546 ******* 2026-01-20 16:41:58,661 p=31524 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2026-01-20 16:41:59,532 p=31524 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2026-01-20 16:41:59,549 p=31524 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2026-01-20 16:41:59,549 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:02.046) 0:02:03.594 ******* 2026-01-20 16:41:59,550 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:02.046) 0:02:03.593 ******* 2026-01-20 16:41:59,571 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.031) 0:02:03.626 ******* 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.031) 0:02:03.624 ******* 2026-01-20 16:41:59,614 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2026-01-20 16:41:59,615 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2026-01-20 16:41:59,616 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.045) 0:02:03.671 ******* 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.045) 0:02:03.670 ******* 2026-01-20 16:41:59,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,671 p=31524 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2026-01-20 16:41:59,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.044) 0:02:03.716 ******* 2026-01-20 16:41:59,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.044) 0:02:03.715 ******* 2026-01-20 16:41:59,701 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,712 p=31524 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2026-01-20 16:41:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.757 ******* 2026-01-20 16:41:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.756 ******* 2026-01-20 16:41:59,743 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.798 ******* 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.797 ******* 2026-01-20 16:41:59,780 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,788 p=31524 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2026-01-20 16:41:59,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.034) 0:02:03.833 ******* 2026-01-20 16:41:59,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.034) 0:02:03.832 ******* 2026-01-20 16:41:59,814 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.868 ******* 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.867 ******* 2026-01-20 16:41:59,852 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.037) 0:02:03.906 ******* 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.038) 0:02:03.905 ******* 2026-01-20 16:41:59,885 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.941 ******* 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.940 ******* 2026-01-20 16:42:00,816 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:00,826 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2026-01-20 16:42:00,826 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.929) 0:02:04.871 ******* 2026-01-20 16:42:00,827 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.929) 0:02:04.870 ******* 2026-01-20 16:42:00,856 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:00,867 p=31524 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2026-01-20 16:42:00,868 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.041) 0:02:04.912 ******* 2026-01-20 16:42:00,868 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.041) 0:02:04.911 ******* 2026-01-20 16:42:01,870 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:01 +0000 (0:00:01.017) 0:02:05.930 ******* 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:01 +0000 (0:00:01.017) 0:02:05.928 ******* 2026-01-20 16:42:03,170 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:03 +0000 (0:00:01.296) 0:02:07.226 ******* 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:03 +0000 (0:00:01.296) 0:02:07.225 ******* 2026-01-20 16:42:04,188 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:04,197 p=31524 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2026-01-20 16:42:04,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:01.015) 0:02:08.242 ******* 2026-01-20 16:42:04,198 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:01.015) 0:02:08.241 ******* 2026-01-20 16:42:04,218 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.030) 0:02:08.273 ******* 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.030) 0:02:08.271 ******* 2026-01-20 16:42:04,248 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.036) 0:02:08.309 ******* 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.036) 0:02:08.307 ******* 2026-01-20 16:42:04,289 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,299 p=31524 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2026-01-20 16:42:04,300 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.035) 0:02:08.344 ******* 2026-01-20 16:42:04,300 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.035) 0:02:08.343 ******* 2026-01-20 16:42:04,321 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.032) 0:02:08.377 ******* 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.032) 0:02:08.375 ******* 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.105) 0:02:08.483 ******* 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.105) 0:02:08.481 ******* 2026-01-20 16:42:04,653 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.224) 0:02:08.708 ******* 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.224) 0:02:08.706 ******* 2026-01-20 16:42:05,432 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.776) 0:02:09.485 ******* 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.776) 0:02:09.483 ******* 2026-01-20 16:42:05,468 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2026-01-20 16:42:05,484 p=31524 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2026-01-20 16:42:05,484 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.044) 0:02:09.529 ******* 2026-01-20 16:42:05,485 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.044) 0:02:09.528 ******* 2026-01-20 16:42:06,129 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:06 +0000 (0:00:00.653) 0:02:10.182 ******* 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:06 +0000 (0:00:00.653) 0:02:10.181 ******* 2026-01-20 16:42:09,965 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:03.879) 0:02:14.062 ******* 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:03.879) 0:02:14.060 ******* 2026-01-20 16:42:10,035 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.031) 0:02:14.094 ******* 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.031) 0:02:14.092 ******* 2026-01-20 16:42:10,886 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:10,895 p=31524 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2026-01-20 16:42:10,895 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.846) 0:02:14.940 ******* 2026-01-20 16:42:10,896 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.846) 0:02:14.939 ******* 2026-01-20 16:42:21,737 p=31524 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2026-01-20 16:42:22,563 p=31524 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2026-01-20 16:42:23,315 p=31524 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:12.497) 0:02:27.437 ******* 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:12.497) 0:02:27.436 ******* 2026-01-20 16:42:23,614 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:00.231) 0:02:27.669 ******* 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:00.231) 0:02:27.667 ******* 2026-01-20 16:42:24,807 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:24 +0000 (0:00:01.192) 0:02:28.861 ******* 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:24 +0000 (0:00:01.192) 0:02:28.860 ******* 2026-01-20 16:42:25,170 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:25,188 p=31524 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2026-01-20 16:42:25,189 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.371) 0:02:29.233 ******* 2026-01-20 16:42:25,189 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.371) 0:02:29.232 ******* 2026-01-20 16:42:25,211 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,221 p=31524 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2026-01-20 16:42:25,222 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.032) 0:02:29.266 ******* 2026-01-20 16:42:25,222 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.032) 0:02:29.265 ******* 2026-01-20 16:42:25,241 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.296 ******* 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.295 ******* 2026-01-20 16:42:25,273 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,283 p=31524 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2026-01-20 16:42:25,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.031) 0:02:29.328 ******* 2026-01-20 16:42:25,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.031) 0:02:29.327 ******* 2026-01-20 16:42:25,304 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.358 ******* 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.357 ******* 2026-01-20 16:42:25,347 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,363 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:25,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.049) 0:02:29.408 ******* 2026-01-20 16:42:25,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.049) 0:02:29.407 ******* 2026-01-20 16:42:25,426 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.070) 0:02:29.479 ******* 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.070) 0:02:29.477 ******* 2026-01-20 16:42:25,541 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.119) 0:02:29.598 ******* 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.119) 0:02:29.596 ******* 2026-01-20 16:42:25,709 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2026-01-20 16:42:25,722 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:25,723 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.169) 0:02:29.767 ******* 2026-01-20 16:42:25,723 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.169) 0:02:29.766 ******* 2026-01-20 16:42:25,784 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.072) 0:02:29.840 ******* 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.072) 0:02:29.838 ******* 2026-01-20 16:42:26,020 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.236) 0:02:30.077 ******* 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.236) 0:02:30.075 ******* 2026-01-20 16:42:26,053 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.032) 0:02:30.109 ******* 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.032) 0:02:30.108 ******* 2026-01-20 16:42:26,283 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.227) 0:02:30.336 ******* 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.227) 0:02:30.335 ******* 2026-01-20 16:42:26,312 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.028) 0:02:30.365 ******* 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.028) 0:02:30.363 ******* 2026-01-20 16:42:26,500 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,509 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:26,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.189) 0:02:30.554 ******* 2026-01-20 16:42:26,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.189) 0:02:30.553 ******* 2026-01-20 16:42:26,717 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.220) 0:02:30.775 ******* 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.220) 0:02:30.773 ******* 2026-01-20 16:42:26,795 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log 2026-01-20 16:42:40,417 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:40,445 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2026-01-20 16:42:40,445 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:13.715) 0:02:44.490 ******* 2026-01-20 16:42:40,446 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:13.715) 0:02:44.489 ******* 2026-01-20 16:42:40,477 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.044) 0:02:44.535 ******* 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.044) 0:02:44.533 ******* 2026-01-20 16:42:40,728 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.246) 0:02:44.781 ******* 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.245) 0:02:44.779 ******* 2026-01-20 16:42:40,763 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,788 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:40,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.052) 0:02:44.833 ******* 2026-01-20 16:42:40,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.052) 0:02:44.832 ******* 2026-01-20 16:42:40,854 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.074) 0:02:44.908 ******* 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.074) 0:02:44.906 ******* 2026-01-20 16:42:40,990 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.137) 0:02:45.045 ******* 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.137) 0:02:45.043 ******* 2026-01-20 16:42:41,128 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.145) 0:02:45.191 ******* 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.145) 0:02:45.189 ******* 2026-01-20 16:42:41,202 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,213 p=31524 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2026-01-20 16:42:41,213 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.067) 0:02:45.258 ******* 2026-01-20 16:42:41,214 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.067) 0:02:45.257 ******* 2026-01-20 16:42:41,241 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.036) 0:02:45.294 ******* 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.036) 0:02:45.293 ******* 2026-01-20 16:42:41,264 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.029) 0:02:45.323 ******* 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.029) 0:02:45.322 ******* 2026-01-20 16:42:41,343 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,353 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:41,354 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.074) 0:02:45.398 ******* 2026-01-20 16:42:41,354 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.074) 0:02:45.397 ******* 2026-01-20 16:42:41,458 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.113) 0:02:45.512 ******* 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.113) 0:02:45.510 ******* 2026-01-20 16:42:41,580 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.136) 0:02:45.649 ******* 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.136) 0:02:45.647 ******* 2026-01-20 16:42:41,665 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.068) 0:02:45.717 ******* 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.068) 0:02:45.716 ******* 2026-01-20 16:42:41,795 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.135) 0:02:45.853 ******* 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.135) 0:02:45.851 ******* 2026-01-20 16:42:41,926 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.133) 0:02:45.987 ******* 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.133) 0:02:45.985 ******* 2026-01-20 16:42:42,002 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,013 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2026-01-20 16:42:42,013 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.071) 0:02:46.058 ******* 2026-01-20 16:42:42,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.071) 0:02:46.057 ******* 2026-01-20 16:42:42,034 p=31524 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.030) 0:02:46.088 ******* 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.030) 0:02:46.087 ******* 2026-01-20 16:42:42,112 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.079) 0:02:46.167 ******* 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.079) 0:02:46.166 ******* 2026-01-20 16:42:42,252 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.141) 0:02:46.309 ******* 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.141) 0:02:46.307 ******* 2026-01-20 16:42:42,384 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.142) 0:02:46.451 ******* 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.142) 0:02:46.450 ******* 2026-01-20 16:42:42,471 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.075) 0:02:46.526 ******* 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.075) 0:02:46.525 ******* 2026-01-20 16:42:42,608 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,619 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:42,620 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.137) 0:02:46.664 ******* 2026-01-20 16:42:42,620 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.137) 0:02:46.663 ******* 2026-01-20 16:42:42,731 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,749 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:42,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.130) 0:02:46.794 ******* 2026-01-20 16:42:42,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.130) 0:02:46.793 ******* 2026-01-20 16:42:42,804 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.064) 0:02:46.858 ******* 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.064) 0:02:46.857 ******* 2026-01-20 16:42:42,843 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2026-01-20 16:42:42,849 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2026-01-20 16:42:42,849 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,859 p=31524 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2026-01-20 16:42:42,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.045) 0:02:46.904 ******* 2026-01-20 16:42:42,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.045) 0:02:46.903 ******* 2026-01-20 16:42:42,896 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.046) 0:02:46.950 ******* 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.046) 0:02:46.949 ******* 2026-01-20 16:42:42,998 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 16:42:42,999 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,007 p=31524 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2026-01-20 16:42:43,008 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.101) 0:02:47.052 ******* 2026-01-20 16:42:43,008 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.101) 0:02:47.051 ******* 2026-01-20 16:42:43,033 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.087 ******* 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.086 ******* 2026-01-20 16:42:43,070 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.123 ******* 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.122 ******* 2026-01-20 16:42:43,105 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.157 ******* 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.156 ******* 2026-01-20 16:42:43,138 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.192 ******* 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.190 ******* 2026-01-20 16:42:43,177 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.039) 0:02:47.231 ******* 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.039) 0:02:47.230 ******* 2026-01-20 16:42:43,220 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,231 p=31524 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:42:43,232 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.044) 0:02:47.276 ******* 2026-01-20 16:42:43,232 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.044) 0:02:47.275 ******* 2026-01-20 16:42:43,266 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,281 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:43,282 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.049) 0:02:47.326 ******* 2026-01-20 16:42:43,282 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.049) 0:02:47.325 ******* 2026-01-20 16:42:43,349 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,360 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:43,361 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.078) 0:02:47.405 ******* 2026-01-20 16:42:43,361 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.078) 0:02:47.404 ******* 2026-01-20 16:42:43,463 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.115) 0:02:47.521 ******* 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.115) 0:02:47.519 ******* 2026-01-20 16:42:43,586 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,607 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:43,607 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.131) 0:02:47.652 ******* 2026-01-20 16:42:43,608 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.131) 0:02:47.651 ******* 2026-01-20 16:42:43,667 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.068) 0:02:47.721 ******* 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.068) 0:02:47.719 ******* 2026-01-20 16:42:43,792 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.126) 0:02:47.848 ******* 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.126) 0:02:47.846 ******* 2026-01-20 16:42:43,965 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2026-01-20 16:42:43,974 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Kustomize OpenStack CR cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.182) 0:02:48.030 ******* 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.182) 0:02:48.029 ******* 2026-01-20 16:42:44,034 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.057) 0:02:48.087 ******* 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.057) 0:02:48.086 ******* 2026-01-20 16:42:44,265 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.231) 0:02:48.319 ******* 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.231) 0:02:48.317 ******* 2026-01-20 16:42:44,300 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.034) 0:02:48.353 ******* 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.034) 0:02:48.352 ******* 2026-01-20 16:42:44,511 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.211) 0:02:48.565 ******* 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.211) 0:02:48.563 ******* 2026-01-20 16:42:44,546 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.035) 0:02:48.600 ******* 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.035) 0:02:48.599 ******* 2026-01-20 16:42:44,744 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.198) 0:02:48.799 ******* 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.198) 0:02:48.797 ******* 2026-01-20 16:42:44,968 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Kustomize OpenStack CR] *********** 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.223) 0:02:49.022 ******* 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.223) 0:02:49.020 ******* 2026-01-20 16:42:45,032 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log 2026-01-20 16:42:47,059 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Kustomize OpenStack CR] ************** 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:02.091) 0:02:51.113 ******* 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:02.091) 0:02:51.112 ******* 2026-01-20 16:42:47,099 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,111 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:47,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.042) 0:02:51.156 ******* 2026-01-20 16:42:47,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.042) 0:02:51.155 ******* 2026-01-20 16:42:47,300 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.197) 0:02:51.354 ******* 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.197) 0:02:51.353 ******* 2026-01-20 16:42:47,336 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Create coo subscription cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.039) 0:02:51.394 ******* 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.039) 0:02:51.392 ******* 2026-01-20 16:42:47,414 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.073) 0:02:51.467 ******* 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.073) 0:02:51.466 ******* 2026-01-20 16:42:47,628 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,636 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:47,637 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.213) 0:02:51.681 ******* 2026-01-20 16:42:47,637 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.213) 0:02:51.680 ******* 2026-01-20 16:42:47,659 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.031) 0:02:51.712 ******* 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.031) 0:02:51.711 ******* 2026-01-20 16:42:47,872 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.215) 0:02:51.928 ******* 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.215) 0:02:51.926 ******* 2026-01-20 16:42:47,914 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.041) 0:02:51.969 ******* 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.041) 0:02:51.967 ******* 2026-01-20 16:42:48,135 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:48,144 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:48,144 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.220) 0:02:52.189 ******* 2026-01-20 16:42:48,145 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.220) 0:02:52.188 ******* 2026-01-20 16:42:48,360 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Create coo subscription] ************* 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.226) 0:02:52.415 ******* 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.226) 0:02:52.414 ******* 2026-01-20 16:42:48,431 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_create.log 2026-01-20 16:43:31,290 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Create coo subscription] **************** 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:42.934) 0:03:35.350 ******* 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:42.934) 0:03:35.348 ******* 2026-01-20 16:43:31,346 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.050) 0:03:35.400 ******* 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.050) 0:03:35.399 ******* 2026-01-20 16:43:31,564 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.217) 0:03:35.617 ******* 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.217) 0:03:35.616 ******* 2026-01-20 16:43:31,596 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.040) 0:03:35.658 ******* 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.040) 0:03:35.656 ******* 2026-01-20 16:43:31,675 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.071) 0:03:35.729 ******* 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.071) 0:03:35.728 ******* 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.121) 0:03:35.851 ******* 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.121) 0:03:35.850 ******* 2026-01-20 16:43:32,005 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.260) 0:03:36.112 ******* 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.260) 0:03:36.110 ******* 2026-01-20 16:43:32,908 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:32,916 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:43:32,917 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.849) 0:03:36.961 ******* 2026-01-20 16:43:32,917 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.849) 0:03:36.960 ******* 2026-01-20 16:43:33,330 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:33 +0000 (0:00:00.423) 0:03:37.384 ******* 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:33 +0000 (0:00:00.423) 0:03:37.383 ******* 2026-01-20 16:43:34,117 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:34 +0000 (0:00:00.789) 0:03:38.173 ******* 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:34 +0000 (0:00:00.789) 0:03:38.172 ******* 2026-01-20 16:43:34,424 p=31524 u=zuul n=ansible | changed: [localhost -> compute-0(38.102.83.181)] => (item=compute-0) 2026-01-20 16:43:34,694 p=31524 u=zuul n=ansible | changed: [localhost -> compute-1(38.102.83.192)] => (item=compute-1) 2026-01-20 16:43:35,664 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=crc) 2026-01-20 16:43:36,138 p=31524 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.129)] => (item=controller) 2026-01-20 16:43:36,350 p=31524 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2026-01-20 16:43:36,352 p=31524 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:02.232) 0:03:40.406 ******* 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:02.232) 0:03:40.405 ******* 2026-01-20 16:43:36,424 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:00.072) 0:03:40.478 ******* 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:00.072) 0:03:40.477 ******* 2026-01-20 16:43:37,309 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.885) 0:03:41.364 ******* 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.885) 0:03:41.362 ******* 2026-01-20 16:43:37,360 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2026-01-20 16:43:37,374 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2026-01-20 16:43:37,375 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.055) 0:03:41.419 ******* 2026-01-20 16:43:37,375 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.055) 0:03:41.418 ******* 2026-01-20 16:43:37,916 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=1) 2026-01-20 16:43:38,372 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=2) 2026-01-20 16:43:38,893 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=3) 2026-01-20 16:43:39,476 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=4) 2026-01-20 16:43:39,973 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=5) 2026-01-20 16:43:40,454 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=6) 2026-01-20 16:43:41,115 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=7) 2026-01-20 16:43:41,646 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=8) 2026-01-20 16:43:42,125 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=9) 2026-01-20 16:43:42,678 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=10) 2026-01-20 16:43:43,153 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=11) 2026-01-20 16:43:43,549 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=12) 2026-01-20 16:43:43,566 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2026-01-20 16:43:43,567 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:43 +0000 (0:00:06.191) 0:03:47.611 ******* 2026-01-20 16:43:43,567 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:43 +0000 (0:00:06.192) 0:03:47.610 ******* 2026-01-20 16:43:44,063 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:44,077 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2026-01-20 16:43:44,077 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:44 +0000 (0:00:00.510) 0:03:48.122 ******* 2026-01-20 16:43:44,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:44 +0000 (0:00:00.510) 0:03:48.121 ******* 2026-01-20 16:43:45,064 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:01.007) 0:03:49.130 ******* 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:01.007) 0:03:49.128 ******* 2026-01-20 16:43:45,117 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,126 p=31524 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2026-01-20 16:43:45,127 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.041) 0:03:49.171 ******* 2026-01-20 16:43:45,127 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.041) 0:03:49.170 ******* 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.158) 0:03:49.329 ******* 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.158) 0:03:49.328 ******* 2026-01-20 16:43:45,313 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.036) 0:03:49.366 ******* 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.036) 0:03:49.365 ******* 2026-01-20 16:43:45,357 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.045) 0:03:49.412 ******* 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.045) 0:03:49.410 ******* 2026-01-20 16:43:45,394 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.037) 0:03:49.449 ******* 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.037) 0:03:49.448 ******* 2026-01-20 16:43:45,465 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2026-01-20 16:43:45,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.060) 0:03:49.510 ******* 2026-01-20 16:43:45,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.060) 0:03:49.509 ******* 2026-01-20 16:43:45,500 p=31524 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.043) 0:03:49.554 ******* 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.043) 0:03:49.552 ******* 2026-01-20 16:43:45,534 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,543 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2026-01-20 16:43:45,543 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.034) 0:03:49.588 ******* 2026-01-20 16:43:45,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.034) 0:03:49.587 ******* 2026-01-20 16:43:45,604 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2026-01-20 16:43:47,113 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2026-01-20 16:43:47,117 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:01.593) 0:03:51.181 ******* 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:01.593) 0:03:51.180 ******* 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.065) 0:03:51.247 ******* 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.065) 0:03:51.245 ******* 2026-01-20 16:43:47,236 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_IMG: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:43:47,245 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2026-01-20 16:43:47,246 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.043) 0:03:51.290 ******* 2026-01-20 16:43:47,246 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.043) 0:03:51.289 ******* 2026-01-20 16:43:47,276 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.041) 0:03:51.331 ******* 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.041) 0:03:51.330 ******* 2026-01-20 16:43:47,361 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run.log 2026-01-20 16:45:57,601 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2026-01-20 16:45:57,606 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:45:57,633 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2026-01-20 16:45:57,633 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:45:57 +0000 (0:02:10.346) 0:06:01.678 ******* 2026-01-20 16:45:57,634 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:45:57 +0000 (0:02:10.346) 0:06:01.677 ******* 2026-01-20 16:46:28,496 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:28 +0000 (0:00:30.875) 0:06:32.553 ******* 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:28 +0000 (0:00:30.875) 0:06:32.552 ******* 2026-01-20 16:46:29,000 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:29 +0000 (0:00:00.501) 0:06:33.055 ******* 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:29 +0000 (0:00:00.501) 0:06:33.053 ******* 2026-01-20 16:46:30,066 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:01.070) 0:06:34.125 ******* 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:01.070) 0:06:34.124 ******* 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.090) 0:06:34.216 ******* 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.090) 0:06:34.214 ******* 2026-01-20 16:46:30,214 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:46:30,222 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2026-01-20 16:46:30,223 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.051) 0:06:34.267 ******* 2026-01-20 16:46:30,223 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.051) 0:06:34.266 ******* 2026-01-20 16:46:30,256 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.042) 0:06:34.309 ******* 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.042) 0:06:34.308 ******* 2026-01-20 16:46:30,331 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log 2026-01-20 16:47:51,847 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2026-01-20 16:47:51,850 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:51,866 p=31524 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2026-01-20 16:47:51,867 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:01:21.601) 0:07:55.911 ******* 2026-01-20 16:47:51,867 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:01:21.601) 0:07:55.910 ******* 2026-01-20 16:47:51,903 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.049) 0:07:55.960 ******* 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.049) 0:07:55.959 ******* 2026-01-20 16:47:51,944 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:51,954 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2026-01-20 16:47:51,955 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.038) 0:07:55.999 ******* 2026-01-20 16:47:51,955 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.038) 0:07:55.998 ******* 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.061) 0:07:56.061 ******* 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.061) 0:07:56.059 ******* 2026-01-20 16:47:52,051 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.044) 0:07:56.105 ******* 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.044) 0:07:56.104 ******* 2026-01-20 16:47:52,086 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.034) 0:07:56.140 ******* 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.034) 0:07:56.139 ******* 2026-01-20 16:47:52,154 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log 2026-01-20 16:47:53,562 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2026-01-20 16:47:53,564 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:53,580 p=31524 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2026-01-20 16:47:53,580 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:01.484) 0:07:57.625 ******* 2026-01-20 16:47:53,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:01.485) 0:07:57.624 ******* 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.065) 0:07:57.691 ******* 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.065) 0:07:57.689 ******* 2026-01-20 16:47:53,677 p=31524 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.040) 0:07:57.732 ******* 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.040) 0:07:57.730 ******* 2026-01-20 16:47:53,718 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:53,729 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2026-01-20 16:47:53,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.042) 0:07:57.774 ******* 2026-01-20 16:47:53,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.042) 0:07:57.773 ******* 2026-01-20 16:47:53,794 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log 2026-01-20 16:47:58,994 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2026-01-20 16:47:58,998 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:59,023 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2026-01-20 16:47:59,024 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:05.293) 0:08:03.068 ******* 2026-01-20 16:47:59,024 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:05.293) 0:08:03.067 ******* 2026-01-20 16:47:59,069 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.067) 0:08:03.136 ******* 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.067) 0:08:03.134 ******* 2026-01-20 16:47:59,129 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.048) 0:08:03.185 ******* 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.048) 0:08:03.183 ******* 2026-01-20 16:47:59,187 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.057) 0:08:03.242 ******* 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.057) 0:08:03.240 ******* 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | TASK [update_containers : Destination directory exists state=directory, recurse=True, path={{ cifmw_update_containers_dest_path | dirname }}] *** 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.061) 0:08:03.304 ******* 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.061) 0:08:03.302 ******* 2026-01-20 16:48:00,498 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | TASK [update_containers : Generate update containers yaml file src=update_containers.j2, dest={{ cifmw_update_containers_dest_path }}, mode=0644] *** 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:00 +0000 (0:00:01.250) 0:08:04.555 ******* 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:00 +0000 (0:00:01.250) 0:08:04.553 ******* 2026-01-20 16:48:01,000 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | TASK [update_containers : Update the containers _raw_params=oc apply -f {{ cifmw_update_containers_dest_path }}] *** 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.501) 0:08:05.056 ******* 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.501) 0:08:05.054 ******* 2026-01-20 16:48:01,417 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.425) 0:08:05.481 ******* 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.425) 0:08:05.480 ******* 2026-01-20 16:48:01,466 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:01,485 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:48:01,486 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.048) 0:08:05.530 ******* 2026-01-20 16:48:01,486 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.048) 0:08:05.529 ******* 2026-01-20 16:48:02,722 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:02,736 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2026-01-20 16:48:02,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:01.250) 0:08:06.781 ******* 2026-01-20 16:48:02,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:01.251) 0:08:06.780 ******* 2026-01-20 16:48:02,789 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: os**********et cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: os**********et designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: os**********et dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: os**********et storageRequest: 10G openstack-cell1: replicas: 1 secret: os**********et storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: os**********et storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: os**********et storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: os**********et enabled: false heatInstance: heat ceilometer: enabled: true secret: os**********et cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: '2024-11-18' version: v13 secret: name: cloudkitty-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: customMonitoringStack: alertmanagerConfig: disabled: true prometheusConfig: enableRemoteWriteReceiver: true persistentVolumeClaim: resources: requests: storage: 20G replicas: 1 scrapeInterval: 30s resourceSelector: matchLabels: service: metricStorage retention: 24h enabled: true watcher: enabled: true template: decisionengineServiceTemplate: customServiceConfig: |- [watcher_cluster_data_model_collectors.compute] period = 60 [watcher_cluster_data_model_collectors.storage] period = 60 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:00.064) 0:08:06.845 ******* 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:00.064) 0:08:06.844 ******* 2026-01-20 16:48:02,861 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2026-01-20 16:48:03,148 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:03 +0000 (0:00:00.355) 0:08:07.201 ******* 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:03 +0000 (0:00:00.355) 0:08:07.200 ******* 2026-01-20 16:48:03,186 p=31524 u=zuul n=ansible | Pausing for 30 seconds 2026-01-20 16:48:33,223 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:33 +0000 (0:00:30.079) 0:08:37.280 ******* 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:33 +0000 (0:00:30.079) 0:08:37.279 ******* 2026-01-20 16:53:47,744 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:05:14.530) 0:13:51.811 ******* 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:05:14.530) 0:13:51.810 ******* 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:00:00.134) 0:13:51.945 ******* 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:00:00.133) 0:13:51.944 ******* 2026-01-20 16:53:48,399 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.508) 0:13:52.454 ******* 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.508) 0:13:52.452 ******* 2026-01-20 16:53:48,444 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.043) 0:13:52.498 ******* 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.043) 0:13:52.496 ******* 2026-01-20 16:53:48,858 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.413) 0:13:52.911 ******* 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.413) 0:13:52.910 ******* 2026-01-20 16:53:49,069 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.211) 0:13:53.123 ******* 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.211) 0:13:53.121 ******* 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.069) 0:13:53.192 ******* 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.069) 0:13:53.190 ******* 2026-01-20 16:53:49,406 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.269) 0:13:53.462 ******* 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.269) 0:13:53.460 ******* 2026-01-20 16:53:49,443 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.036) 0:13:53.498 ******* 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.036) 0:13:53.496 ******* 2026-01-20 16:53:49,479 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.035) 0:13:53.533 ******* 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.035) 0:13:53.531 ******* 2026-01-20 16:53:50,034 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:50,057 p=31524 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-01-20 16:53:50,057 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:50 +0000 (0:00:00.568) 0:13:54.102 ******* 2026-01-20 16:53:50,058 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:50 +0000 (0:00:00.569) 0:13:54.101 ******* 2026-01-20 16:53:51,784 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:51,811 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2026-01-20 16:53:51,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:51 +0000 (0:00:01.754) 0:13:55.856 ******* 2026-01-20 16:53:51,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:51 +0000 (0:00:01.754) 0:13:55.855 ******* 2026-01-20 16:53:52,314 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:52,324 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2026-01-20 16:53:52,324 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.512) 0:13:56.369 ******* 2026-01-20 16:53:52,325 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.512) 0:13:56.368 ******* 2026-01-20 16:53:52,837 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:52,859 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:53:52,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.535) 0:13:56.904 ******* 2026-01-20 16:53:52,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.535) 0:13:56.903 ******* 2026-01-20 16:53:52,931 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.082) 0:13:56.987 ******* 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.082) 0:13:56.985 ******* 2026-01-20 16:53:53,071 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.143) 0:13:57.131 ******* 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.143) 0:13:57.129 ******* 2026-01-20 16:53:53,229 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}) 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Tune rabbitmq resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.155) 0:13:57.286 ******* 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.155) 0:13:57.285 ******* 2026-01-20 16:53:53,298 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.065) 0:13:57.352 ******* 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.065) 0:13:57.350 ******* 2026-01-20 16:53:53,540 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.243) 0:13:57.595 ******* 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.243) 0:13:57.594 ******* 2026-01-20 16:53:53,582 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.638 ******* 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.636 ******* 2026-01-20 16:53:53,791 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.207) 0:13:57.846 ******* 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.207) 0:13:57.844 ******* 2026-01-20 16:53:53,834 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.888 ******* 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.886 ******* 2026-01-20 16:53:54,043 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:54,066 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:53:54,066 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.223) 0:13:58.111 ******* 2026-01-20 16:53:54,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.223) 0:13:58.110 ******* 2026-01-20 16:53:54,283 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Tune rabbitmq resources] ************* 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.230) 0:13:58.341 ******* 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.230) 0:13:58.340 ******* 2026-01-20 16:53:54,376 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log 2026-01-20 16:53:58,200 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:58,211 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Tune rabbitmq resources] **************** 2026-01-20 16:53:58,212 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:03.914) 0:14:02.256 ******* 2026-01-20 16:53:58,212 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:03.914) 0:14:02.255 ******* 2026-01-20 16:53:58,266 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.065) 0:14:02.322 ******* 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.065) 0:14:02.320 ******* 2026-01-20 16:53:58,491 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:58,500 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:53:58,501 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.223) 0:14:02.545 ******* 2026-01-20 16:53:58,501 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.223) 0:14:02.544 ******* 2026-01-20 16:53:58,531 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.045) 0:14:02.591 ******* 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.045) 0:14:02.589 ******* 2026-01-20 16:53:58,712 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.197) 0:14:02.789 ******* 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.197) 0:14:02.787 ******* 2026-01-20 16:53:58,780 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,790 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2026-01-20 16:53:58,791 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.046) 0:14:02.835 ******* 2026-01-20 16:53:58,791 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.046) 0:14:02.834 ******* 2026-01-20 16:53:58,822 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,831 p=31524 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2026-01-20 16:53:58,832 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.040) 0:14:02.876 ******* 2026-01-20 16:53:58,832 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.040) 0:14:02.875 ******* 2026-01-20 16:53:58,863 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,874 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2026-01-20 16:53:58,875 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.042) 0:14:02.919 ******* 2026-01-20 16:53:58,875 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.042) 0:14:02.918 ******* 2026-01-20 16:53:58,905 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.041) 0:14:02.960 ******* 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.041) 0:14:02.959 ******* 2026-01-20 16:53:58,947 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.109) 0:14:03.070 ******* 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.109) 0:14:03.069 ******* 2026-01-20 16:53:59,074 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations={% if content_provider_registry_ip is defined or not cifmw_edpm_deploy_baremetal_bootc %} apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %} {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.130 ******* 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.128 ******* 2026-01-20 16:53:59,121 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.063) 0:14:03.194 ******* 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.063) 0:14:03.192 ******* 2026-01-20 16:53:59,188 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.048) 0:14:03.242 ******* 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.048) 0:14:03.241 ******* 2026-01-20 16:53:59,236 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.049) 0:14:03.292 ******* 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.049) 0:14:03.290 ******* 2026-01-20 16:53:59,288 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.050) 0:14:03.342 ******* 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.050) 0:14:03.341 ******* 2026-01-20 16:53:59,334 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.046) 0:14:03.389 ******* 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.046) 0:14:03.387 ******* 2026-01-20 16:53:59,379 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.042) 0:14:03.431 ******* 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.042) 0:14:03.430 ******* 2026-01-20 16:53:59,415 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,425 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2026-01-20 16:53:59,426 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.038) 0:14:03.470 ******* 2026-01-20 16:53:59,426 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.038) 0:14:03.469 ******* 2026-01-20 16:53:59,455 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.510 ******* 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.508 ******* 2026-01-20 16:53:59,514 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.569 ******* 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.568 ******* 2026-01-20 16:53:59,556 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.610 ******* 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.608 ******* 2026-01-20 16:53:59,594 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.649 ******* 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.648 ******* 2026-01-20 16:53:59,633 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.690 ******* 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.688 ******* 2026-01-20 16:53:59,674 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.729 ******* 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.728 ******* 2026-01-20 16:53:59,720 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.043) 0:14:03.773 ******* 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.043) 0:14:03.771 ******* 2026-01-20 16:53:59,757 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.833 ******* 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.060) 0:14:03.831 ******* 2026-01-20 16:53:59,859 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.082) 0:14:03.915 ******* 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.082) 0:14:03.913 ******* 2026-01-20 16:53:59,905 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.044) 0:14:03.959 ******* 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.044) 0:14:03.957 ******* 2026-01-20 16:53:59,961 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2026-01-20 16:53:59,973 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2026-01-20 16:53:59,982 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2026-01-20 16:53:59,984 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.079) 0:14:04.038 ******* 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.079) 0:14:04.037 ******* 2026-01-20 16:54:00,031 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.047) 0:14:04.086 ******* 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.047) 0:14:04.084 ******* 2026-01-20 16:54:00,075 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.129 ******* 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.127 ******* 2026-01-20 16:54:00,123 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.051) 0:14:04.181 ******* 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.051) 0:14:04.179 ******* 2026-01-20 16:54:00,168 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.044) 0:14:04.225 ******* 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.044) 0:14:04.224 ******* 2026-01-20 16:54:00,212 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,233 p=31524 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2026-01-20 16:54:00,234 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.052) 0:14:04.278 ******* 2026-01-20 16:54:00,234 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.052) 0:14:04.277 ******* 2026-01-20 16:54:00,263 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.321 ******* 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.320 ******* 2026-01-20 16:54:00,330 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:54:00,342 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2026-01-20 16:54:00,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.066) 0:14:04.387 ******* 2026-01-20 16:54:00,343 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.066) 0:14:04.386 ******* 2026-01-20 16:54:00,874 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.554) 0:14:04.941 ******* 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.554) 0:14:04.940 ******* 2026-01-20 16:54:00,956 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.075) 0:14:05.016 ******* 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.075) 0:14:05.015 ******* 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.077) 0:14:05.094 ******* 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.077) 0:14:05.092 ******* 2026-01-20 16:54:01,103 p=31524 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: c3923531bcda0b0811b2d5053f189beb DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 2 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.061) 0:14:05.156 ******* 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.061) 0:14:05.154 ******* 2026-01-20 16:54:01,143 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:01,153 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2026-01-20 16:54:01,154 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.042) 0:14:05.198 ******* 2026-01-20 16:54:01,154 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.042) 0:14:05.197 ******* 2026-01-20 16:54:01,222 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log 2026-01-20 16:54:09,668 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2026-01-20 16:54:09,671 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:09 +0000 (0:00:08.536) 0:14:13.735 ******* 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:09 +0000 (0:00:08.536) 0:14:13.733 ******* 2026-01-20 16:54:10,136 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.456) 0:14:14.191 ******* 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.456) 0:14:14.190 ******* 2026-01-20 16:54:10,189 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: | [libvirt] cpu_mode = custom cpu_models = Nehalem kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 199.204.44.24 edpm_container_registry_insecure_registries: - 38.102.83.51:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter enable_debug: false gather_facts: false image_prefix: openstack image_tag: c3923531bcda0b0811b2d5053f189beb neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2026-01-20 16:54:10,198 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-01-20 16:54:10,198 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.051) 0:14:14.243 ******* 2026-01-20 16:54:10,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.051) 0:14:14.242 ******* 2026-01-20 16:54:11,042 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:11 +0000 (0:00:00.853) 0:14:15.097 ******* 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:11 +0000 (0:00:00.853) 0:14:15.095 ******* 2026-01-20 16:54:12,006 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:12,030 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-01-20 16:54:12,030 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.978) 0:14:16.075 ******* 2026-01-20 16:54:12,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.978) 0:14:16.074 ******* 2026-01-20 16:54:12,918 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:12,936 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-01-20 16:54:12,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.905) 0:14:16.981 ******* 2026-01-20 16:54:12,937 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.905) 0:14:16.980 ******* 2026-01-20 17:18:16,958 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:16 +0000 (0:24:04.036) 0:38:21.017 ******* 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:16 +0000 (0:24:04.036) 0:38:21.016 ******* 2026-01-20 17:18:17,074 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_run_nova_manage_discover.log 2026-01-20 17:18:19,830 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:02.869) 0:38:23.887 ******* 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:02.869) 0:38:23.885 ******* 2026-01-20 17:18:19,876 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:19,927 p=31524 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.105) 0:38:23.992 ******* 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.105) 0:38:23.990 ******* 2026-01-20 17:18:19,969 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Install required packages name=['nfs-utils', 'iptables']] **** 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.031) 0:38:24.024 ******* 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.032) 0:38:24.022 ******* 2026-01-20 17:18:19,999 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Configure nfs to use v4 only path=/etc/nfs.conf, section=nfsd, option=vers3, value=n, backup=True, mode=0644] *** 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.055 ******* 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.054 ******* 2026-01-20 17:18:20,033 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Disable NFSv3-related services name={{ item }}, masked=True] *** 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.086 ******* 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.084 ******* 2026-01-20 17:18:20,064 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpc-statd.service) 2026-01-20 17:18:20,070 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.service) 2026-01-20 17:18:20,073 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.socket) 2026-01-20 17:18:20,074 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,081 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Ensure shared folder exist path=/data/{{ item }}, state=directory, mode=755] *** 2026-01-20 17:18:20,082 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.040) 0:38:24.126 ******* 2026-01-20 17:18:20,082 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.040) 0:38:24.125 ******* 2026-01-20 17:18:20,102 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Set nfs network vars _raw_params=oc get ipset {{ _nfs_host }} -n {{ _ipset_namespace }} -o jsonpath='{.status.reservations[?(@.network=="{{ _nfs_network_name }}")]}'] *** 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.157 ******* 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.156 ******* 2026-01-20 17:18:20,139 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Store nfs network vars dest={{ cifmw_basedir }}/artifacts/parameters/nfs-params.yml, content={{ { 'cifmw_nfs_ip': cifmw_nfs_network_out.stdout | from_json | json_query('address'), 'cifmw_nfs_network_range': cifmw_nfs_network_out.stdout | from_json | json_query('cidr') } | to_nice_yaml }}, mode=0644] *** 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.192 ******* 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.190 ******* 2026-01-20 17:18:20,174 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Generate nftables rules file content=add rule inet filter EDPM_INPUT tcp dport 2049 accept , dest={{ nftables_path }}/nfs-server.nft, mode=0666] *** 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.227 ******* 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.225 ******* 2026-01-20 17:18:20,202 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,210 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Update nftables.conf and include nfs rules at the bottom path={{ nftables_conf }}, line=include "{{ nftables_path }}/nfs-server.nft", insertafter=EOF] *** 2026-01-20 17:18:20,210 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.028) 0:38:24.255 ******* 2026-01-20 17:18:20,211 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.028) 0:38:24.254 ******* 2026-01-20 17:18:20,231 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,239 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Restart nftables service name=nftables, state=restarted] ***** 2026-01-20 17:18:20,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.284 ******* 2026-01-20 17:18:20,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.283 ******* 2026-01-20 17:18:20,260 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,270 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Configure the ip the nfs server should listen on path=/etc/nfs.conf, section=nfsd, option=host, value={{ cifmw_nfs_network_out.stdout | from_json | json_query('address') }}, backup=True, mode=0644] *** 2026-01-20 17:18:20,270 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.315 ******* 2026-01-20 17:18:20,271 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.314 ******* 2026-01-20 17:18:20,291 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Enable and restart nfs-server service name=nfs-server, state=restarted, enabled=True] *** 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.347 ******* 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.345 ******* 2026-01-20 17:18:20,325 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,334 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Add shares to /etc/exports path=/etc/exports, line=/data/{{ item }} {{ cifmw_nfs_network_out.stdout | from_json | json_query('cidr') }}(rw,sync,no_root_squash)] *** 2026-01-20 17:18:20,335 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.032) 0:38:24.379 ******* 2026-01-20 17:18:20,335 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.032) 0:38:24.378 ******* 2026-01-20 17:18:20,355 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Export the shares _raw_params=exportfs -a] ******************* 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.409 ******* 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.407 ******* 2026-01-20 17:18:20,385 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,421 p=31524 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2026-01-20 17:18:20,523 p=31524 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2026-01-20 17:18:20,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.159) 0:38:24.568 ******* 2026-01-20 17:18:20,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.159) 0:38:24.567 ******* 2026-01-20 17:18:20,537 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | TASK [Clear ceph target hosts facts _raw_params=clear_facts] ******************* 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.020) 0:38:24.589 ******* 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.020) 0:38:24.587 ******* 2026-01-20 17:18:20,553 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,602 p=31524 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.079) 0:38:24.669 ******* 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.079) 0:38:24.667 ******* 2026-01-20 17:18:20,674 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.057) 0:38:24.726 ******* 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.057) 0:38:24.725 ******* 2026-01-20 17:18:20,798 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.125) 0:38:24.852 ******* 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.125) 0:38:24.850 ******* 2026-01-20 17:18:20,921 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:20,952 p=31524 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.175) 0:38:25.028 ******* 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.175) 0:38:25.026 ******* 2026-01-20 17:18:21,005 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.031) 0:38:25.059 ******* 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.031) 0:38:25.057 ******* 2026-01-20 17:18:21,036 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.030) 0:38:25.089 ******* 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.030) 0:38:25.088 ******* 2026-01-20 17:18:21,112 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.074) 0:38:25.164 ******* 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.074) 0:38:25.163 ******* 2026-01-20 17:18:21,235 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.125) 0:38:25.290 ******* 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.125) 0:38:25.289 ******* 2026-01-20 17:18:21,390 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2026-01-20 17:18:21,399 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}) 2026-01-20 17:18:21,410 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 17:18:21,411 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.165) 0:38:25.455 ******* 2026-01-20 17:18:21,411 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.165) 0:38:25.454 ******* 2026-01-20 17:18:21,457 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.055) 0:38:25.511 ******* 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.055) 0:38:25.509 ******* 2026-01-20 17:18:21,731 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.277) 0:38:25.788 ******* 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.277) 0:38:25.787 ******* 2026-01-20 17:18:21,768 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.037) 0:38:25.826 ******* 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.037) 0:38:25.824 ******* 2026-01-20 17:18:21,986 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.219) 0:38:26.045 ******* 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.219) 0:38:26.044 ******* 2026-01-20 17:18:22,029 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.040) 0:38:26.086 ******* 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.040) 0:38:26.085 ******* 2026-01-20 17:18:22,247 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.216) 0:38:26.303 ******* 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.216) 0:38:26.301 ******* 2026-01-20 17:18:22,462 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.217) 0:38:26.520 ******* 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.217) 0:38:26.519 ******* 2026-01-20 17:18:22,537 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_run_hook_without_retry.log 2026-01-20 17:18:52,921 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:30.459) 0:38:56.980 ******* 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:30.460) 0:38:56.979 ******* 2026-01-20 17:18:52,964 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.038) 0:38:57.019 ******* 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.038) 0:38:57.017 ******* 2026-01-20 17:18:53,158 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.194) 0:38:57.213 ******* 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.194) 0:38:57.211 ******* 2026-01-20 17:18:53,188 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Patch Openstack Prometheus to enable admin API cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.031) 0:38:57.244 ******* 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.031) 0:38:57.243 ******* 2026-01-20 17:18:53,247 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.054) 0:38:57.299 ******* 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.054) 0:38:57.298 ******* 2026-01-20 17:18:53,452 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.205) 0:38:57.505 ******* 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.205) 0:38:57.503 ******* 2026-01-20 17:18:53,483 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.032) 0:38:57.537 ******* 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.032) 0:38:57.536 ******* 2026-01-20 17:18:53,691 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.210) 0:38:57.748 ******* 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.210) 0:38:57.746 ******* 2026-01-20 17:18:53,728 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,737 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 17:18:53,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.034) 0:38:57.782 ******* 2026-01-20 17:18:53,738 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.034) 0:38:57.781 ******* 2026-01-20 17:18:53,937 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.208) 0:38:57.991 ******* 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.208) 0:38:57.989 ******* 2026-01-20 17:18:54,139 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Patch Openstack Prometheus to enable admin API] *** 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.201) 0:38:58.192 ******* 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.201) 0:38:58.191 ******* 2026-01-20 17:18:54,205 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_015_run_hook_without_retry_patch.log 2026-01-20 17:18:56,058 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:56,077 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Patch Openstack Prometheus to enable admin API] *** 2026-01-20 17:18:56,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:01.929) 0:39:00.122 ******* 2026-01-20 17:18:56,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:01.929) 0:39:00.121 ******* 2026-01-20 17:18:56,102 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.036) 0:39:00.159 ******* 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.036) 0:39:00.157 ******* 2026-01-20 17:18:56,295 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.193) 0:39:00.352 ******* 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.193) 0:39:00.351 ******* 2026-01-20 17:18:56,329 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.041) 0:39:00.394 ******* 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.041) 0:39:00.392 ******* 2026-01-20 17:18:56,372 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.042) 0:39:00.436 ******* 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.042) 0:39:00.434 ******* 2026-01-20 17:18:56,411 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.030) 0:39:00.467 ******* 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.030) 0:39:00.465 ******* 2026-01-20 17:18:56,441 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.027) 0:39:00.494 ******* 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.027) 0:39:00.493 ******* 2026-01-20 17:18:56,574 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2026-01-20 17:18:56,575 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2026-01-20 17:18:56,576 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,598 p=31524 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2026-01-20 17:18:56,599 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.148) 0:39:00.643 ******* 2026-01-20 17:18:56,599 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.149) 0:39:00.642 ******* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | compute-0 : ok=0 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | localhost : ok=242 changed=80 unreachable=0 failed=0 skipped=158 rescued=0 ignored=1 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.014) 0:39:00.658 ******* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ----- 1444.04s 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 314.53s 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 130.35s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------- 81.60s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Create coo subscription ------------ 42.93s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 40.68s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 34.92s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 30.88s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 30.46s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.08s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters -- 13.72s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 12.50s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 9.62s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_prep ------------------------------ 8.54s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 6.19s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.63s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 5.29s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Tune rabbitmq resources ------------- 3.91s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 3.88s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped --- 2.87s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.016) 0:39:00.658 ******* 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_deploy ---------------------------------------------------------- 1451.03s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | edpm_prepare ---------------------------------------------------------- 380.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 229.38s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | run_hook -------------------------------------------------------------- 149.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 43.27s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 21.23s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 20.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ci_local_storage ------------------------------------------------------- 13.28s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 7.05s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_ca -------------------------------------------------------------- 4.65s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | openshift_login --------------------------------------------------------- 4.34s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 3.88s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 2.70s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | update_containers ------------------------------------------------------- 2.18s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_openstack_ca ---------------------------------------------------- 1.25s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 1.12s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | edpm_deploy_baremetal --------------------------------------------------- 1.04s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cifmw_nfs --------------------------------------------------------------- 0.58s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 0.49s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.47s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.41s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 0.36s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.35s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.meta ---------------------------------------------------- 0.12s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.08s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.07s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.04s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | total ---------------------------------------------------------------- 2340.61s 2026-01-20 17:18:58,644 p=36747 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 17:18:58,748 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.077) 0:00:00.123 ******* 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.077) 0:00:00.122 ******* 2026-01-20 17:18:58,873 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.124) 0:00:00.248 ******* 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.124) 0:00:00.247 ******* 2026-01-20 17:18:58,998 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.135) 0:00:00.383 ******* 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.135) 0:00:00.382 ******* 2026-01-20 17:18:59,068 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.061) 0:00:00.445 ******* 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.061) 0:00:00.444 ******* 2026-01-20 17:19:02,658 p=36747 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2026-01-20 17:19:02,673 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2026-01-20 17:19:02,674 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:02 +0000 (0:00:03.589) 0:00:04.034 ******* 2026-01-20 17:19:02,674 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:02 +0000 (0:00:03.589) 0:00:04.034 ******* 2026-01-20 17:19:05,522 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2026-01-20 17:19:08,520 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:08 +0000 (0:00:05.862) 0:00:09.897 ******* 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:08 +0000 (0:00:05.862) 0:00:09.896 ******* 2026-01-20 17:19:11,539 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:03.025) 0:00:12.922 ******* 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:03.025) 0:00:12.922 ******* 2026-01-20 17:19:11,642 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:00.093) 0:00:13.015 ******* 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:00.092) 0:00:13.015 ******* 2026-01-20 17:19:15,276 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:15,287 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:15,288 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:03.633) 0:00:16.648 ******* 2026-01-20 17:19:15,288 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:03.633) 0:00:16.648 ******* 2026-01-20 17:19:15,418 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:00.141) 0:00:16.790 ******* 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:00.141) 0:00:16.789 ******* 2026-01-20 17:19:20,718 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:05.298) 0:00:22.089 ******* 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:05.298) 0:00:22.088 ******* 2026-01-20 17:19:20,836 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:00.147) 0:00:22.237 ******* 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:00.147) 0:00:22.236 ******* 2026-01-20 17:19:26,579 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:05.722) 0:00:27.959 ******* 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:05.722) 0:00:27.958 ******* 2026-01-20 17:19:26,670 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.083) 0:00:28.042 ******* 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.083) 0:00:28.042 ******* 2026-01-20 17:19:26,789 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:26,800 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:26,800 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.119) 0:00:28.161 ******* 2026-01-20 17:19:26,801 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.119) 0:00:28.161 ******* 2026-01-20 17:19:26,908 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | TASK [Validate required variables are set that=['cifmw_fdp_update_target_package is defined', 'cifmw_fdp_update_target_package | length > 0', 'cifmw_fdp_update_repo_baseurl is defined', 'cifmw_fdp_update_repo_baseurl | length > 0'], fail_msg=Required variables are missing! You must set: - cifmw_fdp_update_target_package: Name of the RPM package to update - cifmw_fdp_update_repo_baseurl: Repository base URL containing the updated package , success_msg=Required variables validated successfully] *** 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.147) 0:00:28.309 ******* 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.147) 0:00:28.308 ******* 2026-01-20 17:19:26,966 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Validate parameters and initialize _raw_params=validate.yml] *** 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.031) 0:00:28.341 ******* 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.031) 0:00:28.340 ******* 2026-01-20 17:19:27,003 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,019 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Detect OpenShift registry URL _raw_params=detect_registry.yml] *** 2026-01-20 17:19:27,019 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.039) 0:00:28.380 ******* 2026-01-20 17:19:27,020 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.039) 0:00:28.380 ******* 2026-01-20 17:19:27,039 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,056 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Configure registry CA certificate _raw_params=configure_ca_cert.yml] *** 2026-01-20 17:19:27,057 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.037) 0:00:28.418 ******* 2026-01-20 17:19:27,057 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.037) 0:00:28.417 ******* 2026-01-20 17:19:27,076 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Authenticate with registry _raw_params=authenticate_registry.yml] *** 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.036) 0:00:28.454 ******* 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.036) 0:00:28.454 ******* 2026-01-20 17:19:27,151 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Fetch images to process _raw_params=fetch_images.yml] *** 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.070) 0:00:28.525 ******* 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.070) 0:00:28.524 ******* 2026-01-20 17:19:27,183 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Build and push updated images _raw_params=process_image.yml] *** 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.554 ******* 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.554 ******* 2026-01-20 17:19:27,211 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,221 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Display summary msg=['==========================================', 'Container image update complete', 'Target package: {{ cifmw_fdp_update_container_images_target_package }}', 'Images processed: {{ _cifmw_fdp_update_container_images_processed_images }}', "Updated: {{ _cifmw_fdp_update_container_images_updated_cr_keys | join(', ') if _cifmw_fdp_update_container_images_updated_cr_keys | length > 0 else 'None' }}", '==========================================']] *** 2026-01-20 17:19:27,222 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.028) 0:00:28.582 ******* 2026-01-20 17:19:27,222 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.028) 0:00:28.582 ******* 2026-01-20 17:19:27,242 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,251 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Cleanup temporary directory path={{ _cifmw_fdp_update_container_images_temp_dir }}, state=absent] *** 2026-01-20 17:19:27,251 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.612 ******* 2026-01-20 17:19:27,252 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.612 ******* 2026-01-20 17:19:27,269 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Validate parameters and initialize _raw_params=validate.yml] *** 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.035) 0:00:28.648 ******* 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.035) 0:00:28.647 ******* 2026-01-20 17:19:27,309 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,320 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Setup hypervisor firewall for registry access _raw_params=setup_hypervisor_firewall.yml] *** 2026-01-20 17:19:27,321 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.033) 0:00:28.681 ******* 2026-01-20 17:19:27,321 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.033) 0:00:28.681 ******* 2026-01-20 17:19:27,341 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Fetch EDPM NodeSets _raw_params=fetch_nodesets.yml] **** 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.713 ******* 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.712 ******* 2026-01-20 17:19:27,373 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Update container images _raw_params=update_container_images.yml] *** 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.744 ******* 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.744 ******* 2026-01-20 17:19:27,404 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Process each NodeSet _raw_params=process_nodeset.yml] *** 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.777 ******* 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.776 ******* 2026-01-20 17:19:27,431 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Deploy updates to EDPM nodes _raw_params=create_deployment.yml] *** 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.026) 0:00:28.804 ******* 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.026) 0:00:28.803 ******* 2026-01-20 17:19:27,464 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Display update summary msg=['EDPM Update Summary', 'Updated {{ _cifmw_fdp_update_edpm_updated_nodesets | length }} NodeSet(s): {{ _cifmw_fdp_update_edpm_updated_nodesets }}', 'Container images updated: {{ cifmw_fdp_update_edpm_containers_enabled }}', 'Host packages updated: {{ cifmw_fdp_update_edpm_packages_enabled }}']] *** 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.836 ******* 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.836 ******* 2026-01-20 17:19:27,497 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.040) 0:00:28.877 ******* 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.040) 0:00:28.877 ******* 2026-01-20 17:19:27,582 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.077) 0:00:28.955 ******* 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.077) 0:00:28.954 ******* 2026-01-20 17:19:27,703 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.119) 0:00:29.075 ******* 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.119) 0:00:29.074 ******* 2026-01-20 17:19:27,814 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | TASK [test_operator : Cleanup previous test-operator resources _raw_params=cleanup.yaml] *** 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.118) 0:00:29.193 ******* 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.118) 0:00:29.192 ******* 2026-01-20 17:19:27,852 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure test_operator folder exists path={{ cifmw_test_operator_artifacts_basedir }}, state=directory, mode=0755, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.030) 0:00:29.223 ******* 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.030) 0:00:29.223 ******* 2026-01-20 17:19:28,235 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:28,247 p=36747 u=zuul n=ansible | TASK [test_operator : Get openstack-operator csv information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, label_selectors=['operators.coreos.com/openstack-operator.openstack-operators'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2026-01-20 17:19:28,248 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.385) 0:00:29.609 ******* 2026-01-20 17:19:28,248 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.385) 0:00:29.608 ******* 2026-01-20 17:19:28,274 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | TASK [test_operator : Get full name of openstack-operator CSV openstack_operator_csv_name={{ csv_info.resources | map(attribute='metadata.name') | list | first }}] *** 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:29.647 ******* 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:29.647 ******* 2026-01-20 17:19:28,315 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,325 p=36747 u=zuul n=ansible | TASK [test_operator : Get index of test-operator image _raw_params=set -o pipefail; oc get ClusterServiceVersion {{ openstack_operator_csv_name }} -o json | jq '.spec.install.spec.deployments[0].spec.template.spec.containers[0].env | to_entries[] | select(.value.name == "RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL").key'] *** 2026-01-20 17:19:28,325 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.039) 0:00:29.686 ******* 2026-01-20 17:19:28,326 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.039) 0:00:29.686 ******* 2026-01-20 17:19:28,355 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | TASK [test_operator : Patch test-operator version in CSV kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, namespace={{ cifmw_test_operator_controller_namespace }}, name={{ openstack_operator_csv_name }}, patch=[{'path': '/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/{{ image_index.stdout }}/value', 'value': '{{ cifmw_test_operator_bundle }}', 'op': 'replace'}]] *** 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.044) 0:00:29.731 ******* 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.044) 0:00:29.731 ******* 2026-01-20 17:19:28,396 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | TASK [test_operator : Get test-operator-controller-manager pod information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Pod, label_selectors=['control-plane=controller-manager', 'openstack.org/operator-name=test'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.767 ******* 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.767 ******* 2026-01-20 17:19:28,431 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | TASK [test_operator : Get full name of test-operator-controller-manager pod test_operator_controller_name={{ pod_info.resources | map(attribute='metadata.name') | list | first }}] *** 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:29.803 ******* 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:29.802 ******* 2026-01-20 17:19:28,467 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,476 p=36747 u=zuul n=ansible | TASK [test_operator : Wait until the test-operator-controller-manager is reloaded kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ cifmw_test_operator_controller_namespace }}, kind=Pod] *** 2026-01-20 17:19:28,477 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:29.837 ******* 2026-01-20 17:19:28,477 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:29.837 ******* 2026-01-20 17:19:28,500 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | TASK [test_operator : Delete CRDs created by test-operator kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=CustomResourceDefinition, state=absent, api_version=v1, name={{ item }}, namespace={{ cifmw_test_operator_namespace }}, wait=True, wait_timeout=600] *** 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.874 ******* 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.873 ******* 2026-01-20 17:19:28,543 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=tempests.test.openstack.org) 2026-01-20 17:19:28,552 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=tobikoes.test.openstack.org) 2026-01-20 17:19:28,559 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=ansibletests.test.openstack.org) 2026-01-20 17:19:28,565 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=horizontests.test.openstack.org) 2026-01-20 17:19:28,566 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | TASK [test_operator : Clone test-operator repository and checkout into specified version repo=https://github.com/openstack-k8s-operators/test-operator.git, dest=/tmp/test-operator, refspec=+refs/pull/*:refs/heads/*, version={{ cifmw_test_operator_version }}, force=True] *** 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.102) 0:00:29.977 ******* 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.102) 0:00:29.976 ******* 2026-01-20 17:19:28,648 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | TASK [test_operator : Run make generate manifests install from /tmp/test-operator dir chdir=/tmp/test-operator, _raw_params=set -o pipefail; make generate manifests install] *** 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.042) 0:00:30.019 ******* 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.042) 0:00:30.018 ******* 2026-01-20 17:19:28,683 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | TASK [test_operator : Call test stages loop _raw_params=stages.yml] ************ 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:30.055 ******* 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:30.054 ******* 2026-01-20 17:19:28,745 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/stages.yml for localhost => (item={'name': 'tempest', 'type': 'tempest'}) 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | TASK [test_operator : Run stage tempest msg=Run stage {{ _stage_vars.name }}] *** 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.063) 0:00:30.118 ******* 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.063) 0:00:30.118 ******* 2026-01-20 17:19:28,780 p=36747 u=zuul n=ansible | ok: [localhost] => msg: Run stage tempest 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:30.152 ******* 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:30.152 ******* 2026-01-20 17:19:28,826 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.048) 0:00:30.201 ******* 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.048) 0:00:30.200 ******* 2026-01-20 17:19:28,866 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_test_hooks _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:30.240 ******* 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:30.239 ******* 2026-01-20 17:19:29,009 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | TASK [test_operator : Set empty stage vars dict stage_vars_dict={}] ************ 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.149) 0:00:30.389 ******* 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.149) 0:00:30.388 ******* 2026-01-20 17:19:29,049 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | TASK [test_operator : Include stage var file file={{ _stage_vars.test_vars_file | default('/dev/null') }}, name=_stage_var_file] *** 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.032) 0:00:30.422 ******* 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.032) 0:00:30.421 ******* 2026-01-20 17:19:29,084 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | TASK [test_operator : Merge file vars and test vars _stage_test_vars={{ file_vars | combine(test_vars) }}] *** 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.034) 0:00:30.456 ******* 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.034) 0:00:30.456 ******* 2026-01-20 17:19:29,119 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | TASK [test_operator : Overwrite global_vars with stage_vars stage_vars_dict={{ stage_vars_dict | combine({item.key: _stage_test_vars[item.key] | default(lookup('vars', item.key, default=omit)) }) }}] *** 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.033) 0:00:30.490 ******* 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.033) 0:00:30.489 ******* 2026-01-20 17:19:29,186 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_stages', 'value': [{'name': 'tempest', 'type': 'tempest'}]}) 2026-01-20 17:19:29,197 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_on_test_failure', 'value': True}) 2026-01-20 17:19:29,209 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_artifacts_basedir', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/tests/test_operator"}) 2026-01-20 17:19:29,216 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_namespace', 'value': 'openstack'}) 2026-01-20 17:19:29,223 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_namespace', 'value': 'openstack-operators'}) 2026-01-20 17:19:29,231 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_bundle', 'value': ''}) 2026-01-20 17:19:29,239 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_timeout', 'value': 3600}) 2026-01-20 17:19:29,247 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_logs_image', 'value': 'quay.io/quay/busybox'}) 2026-01-20 17:19:29,254 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_cleanup', 'value': False}) 2026-01-20 17:19:29,262 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_clean_last_run', 'value': False}) 2026-01-20 17:19:29,269 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_dry_run', 'value': False}) 2026-01-20 17:19:29,277 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_groups', 'value': ['default']}) 2026-01-20 17:19:29,285 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_jobs', 'value': ['default']}) 2026-01-20 17:19:29,292 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_fast', 'value': False}) 2026-01-20 17:19:29,299 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class_prefix', 'value': "{{ 'lvms-' if cifmw_use_lvms | default(false) | bool else '' }}"}) 2026-01-20 17:19:29,308 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class', 'value': '{{ cifmw_test_operator_storage_class_prefix }}local-storage'}) 2026-01-20 17:19:29,315 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_delete_logs_pod', 'value': False}) 2026-01-20 17:19:29,323 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_privileged', 'value': True}) 2026-01-20 17:19:29,331 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_selinux_level', 'value': 's0:c478,c978'}) 2026-01-20 17:19:29,347 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crs_path', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/test-operator-crs"}) 2026-01-20 17:19:29,355 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_log_pod_definition', 'value': {'apiVersion': 'v1', 'kind': 'Pod', 'metadata': {'name': 'test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'containers': [{'name': 'test-operator-logs-container', 'image': '{{ cifmw_test_operator_logs_image }}', 'command': ['sleep'], 'args': ['infinity'], 'volumeMounts': '{{ _test_operator_volume_mounts }}'}], 'volumes': '{{ _test_operator_volumes }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:29,362 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_registry', 'value': 'quay.io'}) 2026-01-20 17:19:29,370 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_namespace', 'value': 'podified-antelope-centos9'}) 2026-01-20 17:19:29,377 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_image_tag', 'value': 'current-podified'}) 2026-01-20 17:19:29,384 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_name', 'value': 'tempest-tests'}) 2026-01-20 17:19:29,392 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_concurrency', 'value': 1}) 2026-01-20 17:19:29,403 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_registry', 'value': "{{ content_provider_os_registry_url | split('/') | first }}"}) 2026-01-20 17:19:29,413 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_namespace', 'value': "{{ content_provider_os_registry_url | split('/') | last }}"}) 2026-01-20 17:19:29,421 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_container', 'value': 'openstack-tempest-all'}) 2026-01-20 17:19:29,430 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tempest_registry }}/{{ stage_vars_dict.cifmw_test_operator_tempest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tempest_container }}'}) 2026-01-20 17:19:29,437 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image_tag', 'value': 'watcher_latest'}) 2026-01-20 17:19:29,448 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_network_attachments', 'value': []}) 2026-01-20 17:19:29,456 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_include_override_scenario', 'value': False}) 2026-01-20 17:19:29,464 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_exclude_override_scenario', 'value': False}) 2026-01-20 17:19:29,472 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_workflow', 'value': []}) 2026-01-20 17:19:29,480 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_cleanup', 'value': False}) 2026-01-20 17:19:29,487 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_failed_tests', 'value': False}) 2026-01-20 17:19:29,496 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_override_status', 'value': False}) 2026-01-20 17:19:29,506 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_resources', 'value': {'requests': {}, 'limits': {}}}) 2026-01-20 17:19:29,514 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_debug', 'value': False}) 2026-01-20 17:19:29,549 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tempest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tempest_image }}:{{ stage_vars_dict.cifmw_test_operator_tempest_image_tag }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'parallel': '{{ stage_vars_dict.cifmw_test_operator_tempest_parallel | default(omit) }}', 'SSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_tempest_ssh_key_secret_name | default(omit) }}', 'configOverwrite': '{{ stage_vars_dict.cifmw_test_operator_tempest_config_overwrite | default(omit) }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tempest_network_attachments }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_configmaps_mounts | default(omit) }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tempest_resources | default(omit) }}', 'tempestRun': {'includeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_include_list | default('') }}\n", 'excludeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_exclude_list | default('') }}\n", 'expectedFailuresList': "{{ stage_vars_dict.cifmw_test_operator_tempest_expected_failures_list | default('') }}\n", 'concurrency': '{{ stage_vars_dict.cifmw_test_operator_tempest_concurrency }}', 'externalPlugin': '{{ stage_vars_dict.cifmw_test_operator_tempest_external_plugin | default([]) }}', 'extraRPMs': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_rpms | default([]) }}', 'extraImages': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_images | default([]) }}'}, 'tempestconfRun': '{{ cifmw_tempest_tempestconf_config_defaults | combine(stage_vars_dict.cifmw_test_operator_tempest_tempestconf_config | default({})) }}', 'cleanup': '{{ stage_vars_dict.cifmw_test_operator_tempest_cleanup | bool }}', 'rerunFailedTests': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_failed_tests | bool }}', 'rerunOverrideStatus': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_override_status | bool }}', 'timingDataUrl': '{{ stage_vars_dict.cifmw_test_operator_tempest_timing_data_url | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tempest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tempest_debug }}'}}}) 2026-01-20 17:19:29,556 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_name', 'value': 'tobiko-tests'}) 2026-01-20 17:19:29,565 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,573 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,585 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_container', 'value': 'openstack-tobiko'}) 2026-01-20 17:19:29,594 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tobiko_registry }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_container }}'}) 2026-01-20 17:19:29,601 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,610 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_testenv', 'value': 'scenario'}) 2026-01-20 17:19:29,618 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_version', 'value': 'master'}) 2026-01-20 17:19:29,624 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_pytest_addopts', 'value': None}) 2026-01-20 17:19:29,630 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_prevent_create', 'value': None}) 2026-01-20 17:19:29,637 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_num_processes', 'value': None}) 2026-01-20 17:19:29,645 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_advanced_image_url', 'value': 'https://github.com/openstack-k8s-operators/openstack-k8s-operators-ci/releases/download/v1.0.0/tobiko-custom-v1.0.0.qcow2'}) 2026-01-20 17:19:29,652 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_override_conf', 'value': {}}) 2026-01-20 17:19:29,659 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kubeconfig_secret', 'value': 'tobiko-secret'}) 2026-01-20 17:19:29,670 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_openstack_cmd', 'value': 'oc -n {{ cifmw_openstack_namespace }} exec openstackclient -- openstack'}) 2026-01-20 17:19:29,679 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_cleanup', 'value': False}) 2026-01-20 17:19:29,687 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keytype', 'value': "{{ cifmw_ssh_keytype | default('ecdsa') }}"}) 2026-01-20 17:19:29,695 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keysize', 'value': '{{ cifmw_ssh_keysize | default(521) }}'}) 2026-01-20 17:19:29,701 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_debug', 'value': False}) 2026-01-20 17:19:29,709 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_network_attachments', 'value': []}) 2026-01-20 17:19:29,718 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_workflow', 'value': []}) 2026-01-20 17:19:29,741 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tobiko', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tobiko_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'kubeconfigSecretName': '{{ stage_vars_dict.cifmw_test_operator_tobiko_kubeconfig_secret }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tobiko_image }}:{{ stage_vars_dict.cifmw_test_operator_tobiko_image_tag }}', 'testenv': '{{ stage_vars_dict.cifmw_test_operator_tobiko_testenv }}', 'version': '{{ stage_vars_dict.cifmw_test_operator_tobiko_version }}', 'patch': '{{ stage_vars_dict.cifmw_test_operator_tobiko_patch | default(omit) }}', 'pytestAddopts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts if stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts is not none else omit }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tobiko_debug }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tobiko_network_attachments }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tobiko_resources | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tobiko_workflow }}'}}}) 2026-01-20 17:19:29,747 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_name', 'value': 'ansibletest'}) 2026-01-20 17:19:29,755 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,763 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,771 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_container', 'value': 'openstack-ansible-tests'}) 2026-01-20 17:19:29,780 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_registry }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_container }}'}) 2026-01-20 17:19:29,788 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,795 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_compute_ssh_key_secret_name', 'value': 'dataplane-ansible-ssh-private-key-secret'}) 2026-01-20 17:19:29,803 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workload_ssh_key_secret_name', 'value': ''}) 2026-01-20 17:19:29,812 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_git_repo', 'value': ''}) 2026-01-20 17:19:29,830 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_playbook_path', 'value': ''}) 2026-01-20 17:19:29,845 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_collection', 'value': ''}) 2026-01-20 17:19:29,852 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_var_files', 'value': ''}) 2026-01-20 17:19:29,859 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_extra_vars', 'value': ''}) 2026-01-20 17:19:29,870 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_inventory', 'value': ''}) 2026-01-20 17:19:29,880 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_map', 'value': 'openstack-config'}) 2026-01-20 17:19:29,892 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_secret', 'value': 'openstack-config-secret'}) 2026-01-20 17:19:29,903 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_debug', 'value': False}) 2026-01-20 17:19:29,913 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workflow', 'value': []}) 2026-01-20 17:19:29,921 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_extra_configmaps_mounts', 'value': []}) 2026-01-20 17:19:29,943 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'AnsibleTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_image }}:{{ stage_vars_dict.cifmw_test_operator_ansibletest_image_tag }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_configmaps_mounts }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_mounts | default(omit) }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'computeSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_compute_ssh_key_secret_name }}', 'workloadSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workload_ssh_key_secret_name }}', 'ansibleGitRepo': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_git_repo }}', 'ansiblePlaybookPath': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_playbook_path }}', 'ansibleCollections': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_collection }}', 'ansibleVarFiles': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_var_files }}', 'ansibleExtraVars': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_extra_vars }}', 'ansibleInventory': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_inventory }}', 'openStackConfigMap': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_map }}', 'openStackConfigSecret': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_secret }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_debug }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:29,951 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_name', 'value': 'horizontest-tests'}) 2026-01-20 17:19:29,959 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,966 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,974 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_container', 'value': 'openstack-horizontest'}) 2026-01-20 17:19:29,982 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_horizontest_registry }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_container }}'}) 2026-01-20 17:19:29,990 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,998 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_username', 'value': 'admin'}) 2026-01-20 17:19:30,007 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_password', 'value': '12345678'}) 2026-01-20 17:19:30,013 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_dashboard_url', 'value': 'https://horizon-openstack.apps.ocp.openstack.lab/'}) 2026-01-20 17:19:30,021 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_auth_url', 'value': 'https://keystone-public-openstack.apps.ocp.openstack.lab'}) 2026-01-20 17:19:30,029 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_repo_url', 'value': 'https://review.opendev.org/openstack/horizon'}) 2026-01-20 17:19:30,037 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_repo_branch', 'value': 'master'}) 2026-01-20 17:19:30,044 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_url', 'value': 'http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img'}) 2026-01-20 17:19:30,051 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name', 'value': 'horizontest'}) 2026-01-20 17:19:30,059 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_user', 'value': 'horizontest'}) 2026-01-20 17:19:30,067 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_password', 'value': 'horizontest'}) 2026-01-20 17:19:30,074 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_flavor_name', 'value': 'm1.tiny'}) 2026-01-20 17:19:30,081 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_logs_directory_name', 'value': 'horizon'}) 2026-01-20 17:19:30,088 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_debug', 'value': False}) 2026-01-20 17:19:30,097 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_test_dir', 'value': '/var/lib/horizontest'}) 2026-01-20 17:19:30,104 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_extra_flag', 'value': 'not pagination'}) 2026-01-20 17:19:30,112 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name_xpath', 'value': "//span[@class='rcueicon rcueicon-folder-open']/ancestor::li"}) 2026-01-20 17:19:30,138 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'HorizonTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_horizontest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image }}:{{ stage_vars_dict.cifmw_test_operator_horizontest_image_tag }}', 'adminUsername': '{{ stage_vars_dict.cifmw_test_operator_horizontest_admin_username }}', 'adminPassword': '{{**********}}', 'dashboardUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_dashboard_url }}', 'authUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_auth_url }}', 'repoUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_repo_url }}', 'horizonRepoBranch': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_repo_branch }}', 'imageUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image_url }}', 'projectName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name }}', 'user': '{{ stage_vars_dict.cifmw_test_operator_horizontest_user }}', 'password': '{{**********}}', 'flavorName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_flavor_name }}', 'logsDirectoryName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_logs_directory_name }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_horizontest_debug }}', 'extraFlag': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_flag }}', 'projectNameXpath': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name_xpath }}', 'horizonTestDir': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_test_dir }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_horizontest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:30,145 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_external_plugin', 'value': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}]}) 2026-01-20 17:19:30,153 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_secret_name', 'value': 'test-operator-controller-priv-key'}) 2026-01-20 17:19:30,161 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_file_path', 'value': '~/.ssh/id_cifw'}) 2026-01-20 17:19:30,168 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_kind_name', 'value': 'Tempest'}) 2026-01-20 17:19:30,175 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kind_name', 'value': 'Tobiko'}) 2026-01-20 17:19:30,183 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_kind_name', 'value': 'AnsibleTest'}) 2026-01-20 17:19:30,192 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_kind_name', 'value': 'HorizonTest'}) 2026-01-20 17:19:30,200 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crd_group', 'value': 'test.openstack.org'}) 2026-01-20 17:19:30,207 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_crd_name', 'value': 'tempests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,215 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_crd_name', 'value': 'tobikoes.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,224 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_crd_name', 'value': 'ansibletests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,232 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_crd_name', 'value': 'horizontests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,242 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_name', 'value': 'test-operator-controller-manager'}) 2026-01-20 17:19:30,251 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_default_conf', 'value': {'DEFAULT': {'log_dir': '/var/lib/tobiko/tobiko', 'log_file': 'tobiko.log', 'debug': True}, 'testcase': {'timeout': 1800.0, 'test_runner_timeout': 14400.0}, 'advanced_vm': {'username': 'fedora', 'image_url': '{{ cifmw_test_operator_tobiko_advanced_image_url }}'}, 'keystone': {'interface': 'public'}, 'manila': {'share_protocol': 'cephfs'}}}) 2026-01-20 17:19:30,260 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_exclude_list', 'value': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n'}) 2026-01-20 17:19:30,269 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_include_list', 'value': 'watcher_tempest_plugin.*\n'}) 2026-01-20 17:19:30,286 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tempestconf_config', 'value': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}}) 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | TASK [test_operator : Override specific type config stage_vars_dict={{ stage_vars_dict | combine({_stage_config: _stage_test_vars[_stage_config] | default(lookup('vars', _stage_config, default=omit)) }) }}] *** 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:01.256) 0:00:31.746 ******* 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:01.256) 0:00:31.746 ******* 2026-01-20 17:19:30,513 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | TASK [test_operator : Call runner tempest _raw_params=runners/{{ _stage_vars.type }}_runner.yml] *** 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.139) 0:00:31.886 ******* 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.139) 0:00:31.885 ******* 2026-01-20 17:19:30,558 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/runners/tempest_runner.yml for localhost 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | TASK [test_operator : Run tempest job _raw_params=run-test-operator-job.yml] *** 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.053) 0:00:31.939 ******* 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.053) 0:00:31.939 ******* 2026-01-20 17:19:30,627 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/run-test-operator-job.yml for localhost 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable containing the test-operator CR test_operator_cr={{ test_operator_config }}] *** 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.062) 0:00:32.002 ******* 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.062) 0:00:32.001 ******* 2026-01-20 17:19:30,668 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:30,680 p=36747 u=zuul n=ansible | TASK [test_operator : Prepare test configuration - tempest _raw_params={{ test_operator_config_playbook }}] *** 2026-01-20 17:19:30,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.039) 0:00:32.041 ******* 2026-01-20 17:19:30,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.039) 0:00:32.041 ******* 2026-01-20 17:19:30,739 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/tempest-tests.yml for localhost 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | TASK [test_operator : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.078) 0:00:32.120 ******* 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.078) 0:00:32.119 ******* 2026-01-20 17:19:30,792 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,802 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of tests to be executed yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_test_operator_default_groups }}, job={{ cifmw_test_operator_instance_name | default(omit) }}] *** 2026-01-20 17:19:30,803 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.043) 0:00:32.163 ******* 2026-01-20 17:19:30,803 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.043) 0:00:32.163 ******* 2026-01-20 17:19:30,839 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,851 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'includeList': allowed_tests }}}, recursive=true) }}] *** 2026-01-20 17:19:30,852 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.049) 0:00:32.213 ******* 2026-01-20 17:19:30,852 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.049) 0:00:32.212 ******* 2026-01-20 17:19:30,890 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,902 p=36747 u=zuul n=ansible | TASK [test_operator : Copy list_skipped to artifacts dir dest={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml, mode=0644] *** 2026-01-20 17:19:30,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.050) 0:00:32.264 ******* 2026-01-20 17:19:30,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.050) 0:00:32.263 ******* 2026-01-20 17:19:30,931 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of tests to be excluded yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_test_operator_default_jobs }}] *** 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.040) 0:00:32.304 ******* 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.040) 0:00:32.303 ******* 2026-01-20 17:19:30,969 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,980 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'excludeList': skipped_tests }}}, recursive=true) }}] *** 2026-01-20 17:19:30,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.037) 0:00:32.341 ******* 2026-01-20 17:19:30,981 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.037) 0:00:32.341 ******* 2026-01-20 17:19:31,007 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | TASK [test_operator : Check that cifmw private key file exists path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.037) 0:00:32.379 ******* 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.037) 0:00:32.379 ******* 2026-01-20 17:19:31,386 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:31,408 p=36747 u=zuul n=ansible | TASK [test_operator : Slurp cifmw private key file path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2026-01-20 17:19:31,409 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.390) 0:00:32.769 ******* 2026-01-20 17:19:31,409 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.390) 0:00:32.769 ******* 2026-01-20 17:19:31,749 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:31,774 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure a secret for the cifmw private key file exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, wait=True, definition={'apiVersion': 'v1', 'kind': 'Secret', 'type': 'Opaque', 'metadata': {'name': '{{ cifmw_test_operator_controller_priv_key_secret_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'data': {'ssh-privatekey': '{{ private_key_file_content.content }}'}}] *** 2026-01-20 17:19:31,775 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.366) 0:00:33.136 ******* 2026-01-20 17:19:31,775 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.366) 0:00:33.135 ******* 2026-01-20 17:19:32,838 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | TASK [test_operator : Add SSHKeySecretName section to Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'SSHKeySecretName': cifmw_test_operator_controller_priv_key_secret_name }}, recursive=true) }}] *** 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:01.081) 0:00:34.217 ******* 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:01.081) 0:00:34.217 ******* 2026-01-20 17:19:32,896 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | TASK [test_operator : Add controller IP to the overrides section in Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestconfRun': {'overrides': (test_operator_cr.spec.tempestconfRun.overrides | default('')) + ' ' + 'whitebox_neutron_plugin_options.proxy_host_address ' + controller_ip }}}, recursive=true) }}] *** 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.053) 0:00:34.271 ******* 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.053) 0:00:34.270 ******* 2026-01-20 17:19:32,943 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | TASK [test_operator : Add controller IP to each workflow step overrides section - Create overriden_workflow overriden_workflow={{ overriden_workflow | default([]) + [_overriden_workflow_step] }}] *** 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.044) 0:00:34.316 ******* 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.044) 0:00:34.315 ******* 2026-01-20 17:19:32,972 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': overriden_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': overriden_workflow}) }}] *** 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.028) 0:00:34.344 ******* 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.028) 0:00:34.344 ******* 2026-01-20 17:19:33,013 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | TASK [test_operator : Remove resources until fix for bug 2088074 reaches openstack-tempest-all image no_resources_workflow={{ no_resources_workflow | default([]) + [_no_resources_workflow_step] }}] *** 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.386 ******* 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.385 ******* 2026-01-20 17:19:33,041 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,054 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': no_resources_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': no_resources_workflow}) }}] *** 2026-01-20 17:19:33,055 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.029) 0:00:34.415 ******* 2026-01-20 17:19:33,055 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.029) 0:00:34.415 ******* 2026-01-20 17:19:33,085 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | TASK [test_operator : Build tempest timing data URL (no workflow) test_operator_cr={{ test_operator_cr | combine({'spec': {'timingDataUrl': final_timing_data_url}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_timing_data_url': final_timing_data_url}) }}] *** 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.457 ******* 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.456 ******* 2026-01-20 17:19:33,132 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | TASK [test_operator : Add the full timing data url to workflow steps timing_data_url_workflow={{ timing_data_url_workflow | default([]) + [_timing_data_url_workflow_step] }}] *** 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.047) 0:00:34.505 ******* 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.047) 0:00:34.504 ******* 2026-01-20 17:19:33,163 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': timing_data_url_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': timing_data_url_workflow}) }}] *** 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.030) 0:00:34.536 ******* 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.030) 0:00:34.535 ******* 2026-01-20 17:19:33,205 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | TASK [test_operator : Print CR before applying msg={{ test_operator_cr }}] ***** 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.577 ******* 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.576 ******* 2026-01-20 17:19:33,248 p=36747 u=zuul n=ansible | ok: [localhost] => msg: apiVersion: test.openstack.org/v1beta1 kind: Tempest metadata: name: tempest-tests-tempest namespace: openstack spec: SELinuxLevel: s0:c478,c978 SSHKeySecretName: test-operator-controller-priv-key cleanup: false containerImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-tempest-all:watcher_latest debug: false networkAttachments: [] privileged: true rerunFailedTests: false rerunOverrideStatus: false resources: limits: {} requests: {} storageClass: local-storage tempestRun: concurrency: 1 excludeList: | watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* expectedFailuresList: |2+ externalPlugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git extraImages: [] extraRPMs: [] includeList: | watcher_tempest_plugin.* tempestconfRun: deployerInput: | [auth] tempest_roles = [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true [compute-feature-enabled] dhcp_domain = '' [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false [volume] catalog_type = volumev3 overrides: |- compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.129 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true whitebox_neutron_plugin_options.proxy_host_address 38.102.83.129 workflow: [] 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | TASK [test_operator : Make sure test-operator CR directory exists path={{ cifmw_test_operator_crs_path }}, state=directory, mode=0755] *** 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.619 ******* 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.618 ******* 2026-01-20 17:19:33,448 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:33,460 p=36747 u=zuul n=ansible | TASK [test_operator : Write test-operator CR to file content={{ test_operator_cr | to_nice_yaml }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml, mode=0644] *** 2026-01-20 17:19:33,461 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.202) 0:00:34.822 ******* 2026-01-20 17:19:33,461 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.202) 0:00:34.821 ******* 2026-01-20 17:19:34,009 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | TASK [test_operator : Start tests - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml] *** 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.568) 0:00:35.390 ******* 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.568) 0:00:35.389 ******* 2026-01-20 17:19:34,775 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:34,804 p=36747 u=zuul n=ansible | TASK [test_operator : Wait for the last Pod to be Completed - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['workflowStep={{ [(test_operator_workflow | length) - 1, 0] | max }}', 'instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:19:34,805 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.775) 0:00:36.165 ******* 2026-01-20 17:19:34,805 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.775) 0:00:36.165 ******* 2026-01-20 17:55:04,858 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | TASK [test_operator : Check whether timed out - tempest testpod_timed_out={{ testpod.attempts == (cifmw_test_operator_timeout / 10) | round | int }}] *** 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:35:30.068) 0:36:06.234 ******* 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:35:30.068) 0:36:06.233 ******* 2026-01-20 17:55:04,908 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | TASK [test_operator : Collect logs _raw_params=collect-logs.yaml] ************** 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.048) 0:36:06.282 ******* 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.048) 0:36:06.281 ******* 2026-01-20 17:55:04,965 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/collect-logs.yaml for localhost 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | TASK [test_operator : Reset volumes and volume_mounts to an empty list _test_operator_volumes=[], _test_operator_volume_mounts=[]] *** 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.075) 0:36:06.358 ******* 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.075) 0:36:06.357 ******* 2026-01-20 17:55:05,027 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,042 p=36747 u=zuul n=ansible | TASK [test_operator : Get information about PVCs that store the logs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=PersistentVolumeClaim, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:55:05,042 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.045) 0:36:06.403 ******* 2026-01-20 17:55:05,043 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.045) 0:36:06.403 ******* 2026-01-20 17:55:05,847 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | TASK [test_operator : Set up volume mounts and volumes for all PVCs _test_operator_volume_mounts={{ (_test_operator_volume_mounts | default([])) + [{ 'name': "logs-volume-" ~ index, 'mountPath': "/mnt/logs-{{ test_operator_instance_name }}-step-" ~ index }] }} , _test_operator_volumes={{ (_test_operator_volumes | default([])) + [{ 'name': "logs-volume-" ~ index, 'persistentVolumeClaim': { 'claimName': pvc.metadata.name } }] }} ] *** 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.816) 0:36:07.220 ******* 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.816) 0:36:07.219 ******* 2026-01-20 17:55:05,893 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-80b87', 'namespace': 'openstack', 'uid': 'afaa33e6-d1f8-451d-8d0a-3e6e7a1e63a0', 'resourceVersion': '63960', 'creationTimestamp': '2026-01-20T17:19:34Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '5cdabf65-2e87-4551-b2ae-e38f155bca26', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"5cdabf65-2e87-4551-b2ae-e38f155bca26"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage03-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | TASK [test_operator : Set log pod fact to process omitted vars _test_operator_log_pod={{ cifmw_test_operator_log_pod_definition }}] *** 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.269 ******* 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.268 ******* 2026-01-20 17:55:05,943 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,956 p=36747 u=zuul n=ansible | TASK [test_operator : Write log pod definition to file content={{ _test_operator_log_pod | to_nice_yaml }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml, mode=0644] *** 2026-01-20 17:55:05,956 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.317 ******* 2026-01-20 17:55:05,957 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.317 ******* 2026-01-20 17:55:06,467 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:06,482 p=36747 u=zuul n=ansible | TASK [test_operator : Start test-operator-logs-pod kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml] *** 2026-01-20 17:55:06,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:06 +0000 (0:00:00.525) 0:36:07.843 ******* 2026-01-20 17:55:06,483 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:06 +0000 (0:00:00.525) 0:36:07.843 ******* 2026-01-20 17:55:12,377 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure that the test-operator-logs-pod is Running kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, name=test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}, wait=True] *** 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:12 +0000 (0:00:05.911) 0:36:13.755 ******* 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:12 +0000 (0:00:05.911) 0:36:13.754 ******* 2026-01-20 17:55:13,194 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | TASK [test_operator : Get logs from test-operator-logs-pod _raw_params=oc cp -n {{ stage_vars_dict.cifmw_test_operator_namespace }} test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}:{{ pod_path }} {{ cifmw_test_operator_artifacts_basedir }} ] *** 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.811) 0:36:14.567 ******* 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.811) 0:36:14.566 ******* 2026-01-20 17:55:13,694 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-80b87', 'namespace': 'openstack', 'uid': 'afaa33e6-d1f8-451d-8d0a-3e6e7a1e63a0', 'resourceVersion': '63960', 'creationTimestamp': '2026-01-20T17:19:34Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '5cdabf65-2e87-4551-b2ae-e38f155bca26', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"5cdabf65-2e87-4551-b2ae-e38f155bca26"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage03-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of all pods kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod] *** 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.502) 0:36:15.069 ******* 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.502) 0:36:15.069 ******* 2026-01-20 17:55:15,531 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | TASK [test_operator : Get test results from all test pods (Success / Fail) kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:15 +0000 (0:00:02.090) 0:36:17.160 ******* 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:15 +0000 (0:00:02.090) 0:36:17.159 ******* 2026-01-20 17:55:16,640 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | TASK [test_operator : Get status from test pods pod_status={{ test_pod_results.resources | map(attribute='status.phase') | list | unique }}] *** 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.858) 0:36:18.019 ******* 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.858) 0:36:18.018 ******* 2026-01-20 17:55:16,689 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | TASK [test_operator : Check whether test pods finished successfully successful_execution={{ pod_status | length == 1 and pod_status | first == 'Succeeded' }}] *** 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.045) 0:36:18.064 ******* 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.045) 0:36:18.063 ******* 2026-01-20 17:55:16,734 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | TASK [test_operator : Fail fast if a pod did not succeed - tempest that=successful_execution] *** 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.044) 0:36:18.108 ******* 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.044) 0:36:18.107 ******* 2026-01-20 17:55:16,770 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | TASK [test_operator : Save result - tempest test_operator_results={{ test_operator_results | default({}) | combine({run_test_fw: successful_execution}) }}] *** 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.036) 0:36:18.144 ******* 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.036) 0:36:18.144 ******* 2026-01-20 17:55:16,811 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | TASK [test_operator : Delete test resources _raw_params=cleanup-run.yaml] ****** 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.185 ******* 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.184 ******* 2026-01-20 17:55:16,849 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.037) 0:36:18.222 ******* 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.037) 0:36:18.221 ******* 2026-01-20 17:55:16,890 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.041) 0:36:18.264 ******* 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.041) 0:36:18.263 ******* 2026-01-20 17:55:16,932 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_test_hooks _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.304 ******* 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.304 ******* 2026-01-20 17:55:17,121 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,141 p=36747 u=zuul n=ansible | TASK [test_operator : Fail when any tests failed that=['item.value'], success_msg={{ item.key }} tests passed, fail_msg={{ item.key }} tests failed] *** 2026-01-20 17:55:17,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.198) 0:36:18.503 ******* 2026-01-20 17:55:17,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.198) 0:36:18.502 ******* 2026-01-20 17:55:17,175 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'tempest', 'value': True}) => ansible_loop_var: item changed: false item: key: tempest value: true msg: tempest tests passed 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.053) 0:36:18.556 ******* 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.053) 0:36:18.555 ******* 2026-01-20 17:55:17,262 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.080) 0:36:18.636 ******* 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.080) 0:36:18.636 ******* 2026-01-20 17:55:17,460 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_tests _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.197) 0:36:18.834 ******* 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.197) 0:36:18.833 ******* 2026-01-20 17:55:17,733 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | TASK [compliance : Ensure compliance folder exists path={{ cifmw_compliance_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.287) 0:36:19.122 ******* 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.287) 0:36:19.121 ******* 2026-01-20 17:55:17,783 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,795 p=36747 u=zuul n=ansible | TASK [compliance : Install the compliance operator and plugin _raw_params=install.yml] *** 2026-01-20 17:55:17,796 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.034) 0:36:19.156 ******* 2026-01-20 17:55:17,796 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.034) 0:36:19.156 ******* 2026-01-20 17:55:17,816 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | TASK [compliance : Run compliance scans and extract results _raw_params=run_suite_scan.yml] *** 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.032) 0:36:19.189 ******* 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.032) 0:36:19.188 ******* 2026-01-20 17:55:17,854 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=cis) 2026-01-20 17:55:17,859 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=e8) 2026-01-20 17:55:17,863 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=high) 2026-01-20 17:55:17,867 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=moderate) 2026-01-20 17:55:17,873 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=nerc-cip) 2026-01-20 17:55:17,878 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=pci-dss) 2026-01-20 17:55:17,880 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=stig) 2026-01-20 17:55:17,881 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | TASK [compliance : Delete all resources created by the role _raw_params=cleanup.yml] *** 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.066) 0:36:19.255 ******* 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.065) 0:36:19.254 ******* 2026-01-20 17:55:17,917 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,966 p=36747 u=zuul n=ansible | PLAY [Run compliance scan for computes] **************************************** 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | TASK [compliance : Install openscap-scanner and security guide name=['openscap-scanner', 'scap-security-guide'], state=present] *** 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.165) 0:36:19.420 ******* 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.165) 0:36:19.420 ******* 2026-01-20 17:55:18,094 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | TASK [compliance : Create folder to hold scan results path={{ cifmw_compliance_compute_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.043) 0:36:19.464 ******* 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.043) 0:36:19.464 ******* 2026-01-20 17:55:18,133 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | TASK [compliance : Do compliance scans _raw_params=oscap xccdf eval --report {{ cifmw_compliance_compute_artifacts_basedir }}/{{ profile }}.html --profile {{ profile}} /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml] *** 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.038) 0:36:19.503 ******* 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.038) 0:36:19.502 ******* 2026-01-20 17:55:18,173 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=pci-dss) 2026-01-20 17:55:18,179 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=e8) 2026-01-20 17:55:18,185 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=stig) 2026-01-20 17:55:18,187 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | TASK [compliance : Set ownership on report files path={{ cifmw_compliance_compute_artifacts_basedir }}, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, recurse=True] *** 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.054) 0:36:19.557 ******* 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.054) 0:36:19.556 ******* 2026-01-20 17:55:18,217 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,283 p=36747 u=zuul n=ansible | PLAY [Run hooks and inject status flag] **************************************** 2026-01-20 17:55:18,312 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:18,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.116) 0:36:19.674 ******* 2026-01-20 17:55:18,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.116) 0:36:19.673 ******* 2026-01-20 17:55:18,376 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.072) 0:36:19.746 ******* 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.072) 0:36:19.746 ******* 2026-01-20 17:55:18,554 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_end _raw_params={{ hook.type }}.yml] **** 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.179) 0:36:19.926 ******* 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.179) 0:36:19.926 ******* 2026-01-20 17:55:18,739 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | TASK [Inject success flag path={{ ansible_user_dir }}/cifmw-success, state=touch, mode=0644] *** 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.205) 0:36:20.132 ******* 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.205) 0:36:20.131 ******* 2026-01-20 17:55:19,000 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:19,036 p=36747 u=zuul n=ansible | PLAY [Run log related tasks] *************************************************** 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.433 ******* 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.432 ******* 2026-01-20 17:55:19,136 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:19,150 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:19,151 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.078) 0:36:20.512 ******* 2026-01-20 17:55:19,151 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.078) 0:36:20.511 ******* 2026-01-20 17:55:19,436 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_logs _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.812 ******* 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.811 ******* 2026-01-20 17:55:19,703 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Ensure cifmw_basedir param is set cifmw_basedir={{ ansible_user_dir }}/ci-framework-data] *** 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.291) 0:36:21.104 ******* 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.291) 0:36:21.103 ******* 2026-01-20 17:55:19,769 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | TASK [Read artifacts parameters dir and set as facts name=cifmw_helpers, tasks_from=include_dir.yml] *** 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.040) 0:36:21.144 ******* 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.040) 0:36:21.144 ******* 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check directory is available path={{ included_dir | trim }}] *** 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.110) 0:36:21.255 ******* 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.110) 0:36:21.254 ******* 2026-01-20 17:55:20,136 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,161 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Find yaml files paths={{ included_dir | trim }}, patterns=*.yml,*.yaml, file_type=file, recurse=False] *** 2026-01-20 17:55:20,161 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.267) 0:36:21.522 ******* 2026-01-20 17:55:20,162 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.267) 0:36:21.522 ******* 2026-01-20 17:55:20,509 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Print available yaml files msg=Found yaml files to parse: {{ _yaml_files.files | map(attribute='path') | list }} ] *** 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.361) 0:36:21.884 ******* 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.361) 0:36:21.883 ******* 2026-01-20 17:55:20,559 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | Found yaml files to parse: ['/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml'] 2026-01-20 17:55:20,570 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create files on localhost and use include_vars] ********** 2026-01-20 17:55:20,571 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.047) 0:36:21.931 ******* 2026-01-20 17:55:20,571 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.047) 0:36:21.931 ******* 2026-01-20 17:55:20,622 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,627 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,632 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,637 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.079) 0:36:22.011 ******* 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.079) 0:36:22.010 ******* 2026-01-20 17:55:20,671 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.031) 0:36:22.042 ******* 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.031) 0:36:22.042 ******* 2026-01-20 17:55:20,903 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.232) 0:36:22.275 ******* 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.232) 0:36:22.274 ******* 2026-01-20 17:55:21,301 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.398) 0:36:22.674 ******* 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.398) 0:36:22.673 ******* 2026-01-20 17:55:21,489 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.192) 0:36:22.866 ******* 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.192) 0:36:22.866 ******* 2026-01-20 17:55:21,970 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.480) 0:36:23.347 ******* 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.480) 0:36:23.346 ******* 2026-01-20 17:55:22,041 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.072) 0:36:23.419 ******* 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.072) 0:36:23.418 ******* 2026-01-20 17:55:22,251 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:22,267 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:22,268 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.209) 0:36:23.628 ******* 2026-01-20 17:55:22,268 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.209) 0:36:23.628 ******* 2026-01-20 17:55:22,289 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.033) 0:36:23.662 ******* 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.033) 0:36:23.661 ******* 2026-01-20 17:55:22,505 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,518 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:22,519 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.217) 0:36:23.880 ******* 2026-01-20 17:55:22,519 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.217) 0:36:23.879 ******* 2026-01-20 17:55:22,703 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:22,773 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:22,774 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.254) 0:36:24.134 ******* 2026-01-20 17:55:22,774 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.254) 0:36:24.134 ******* 2026-01-20 17:55:22,961 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,972 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:22,972 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.198) 0:36:24.333 ******* 2026-01-20 17:55:22,973 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.198) 0:36:24.333 ******* 2026-01-20 17:55:23,389 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.427) 0:36:24.761 ******* 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.427) 0:36:24.760 ******* 2026-01-20 17:55:23,447 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.056) 0:36:24.818 ******* 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.056) 0:36:24.817 ******* 2026-01-20 17:55:23,642 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.196) 0:36:25.014 ******* 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.196) 0:36:25.013 ******* 2026-01-20 17:55:23,674 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.032) 0:36:25.046 ******* 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.032) 0:36:25.046 ******* 2026-01-20 17:55:23,894 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.220) 0:36:25.267 ******* 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.220) 0:36:25.266 ******* 2026-01-20 17:55:24,102 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.207) 0:36:25.474 ******* 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.207) 0:36:25.473 ******* 2026-01-20 17:55:24,277 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.175) 0:36:25.650 ******* 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.175) 0:36:25.649 ******* 2026-01-20 17:55:24,739 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.462) 0:36:26.112 ******* 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.462) 0:36:26.111 ******* 2026-01-20 17:55:24,800 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.060) 0:36:26.173 ******* 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.060) 0:36:26.172 ******* 2026-01-20 17:55:25,022 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.220) 0:36:26.394 ******* 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.220) 0:36:26.393 ******* 2026-01-20 17:55:25,057 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.035) 0:36:26.429 ******* 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.035) 0:36:26.429 ******* 2026-01-20 17:55:25,273 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.218) 0:36:26.648 ******* 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.218) 0:36:26.647 ******* 2026-01-20 17:55:25,520 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.244) 0:36:26.892 ******* 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.244) 0:36:26.891 ******* 2026-01-20 17:55:25,729 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.277) 0:36:27.169 ******* 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.277) 0:36:27.168 ******* 2026-01-20 17:55:26,234 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:26,244 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:26,245 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.436) 0:36:27.606 ******* 2026-01-20 17:55:26,245 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.436) 0:36:27.605 ******* 2026-01-20 17:55:26,282 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,294 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:26,295 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.050) 0:36:27.656 ******* 2026-01-20 17:55:26,295 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.050) 0:36:27.655 ******* 2026-01-20 17:55:26,496 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.222) 0:36:27.878 ******* 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.222) 0:36:27.877 ******* 2026-01-20 17:55:26,541 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:26,552 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Set destination folder for the logs logfiles_dest_dir={{ ( cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data'), 'logs/', now(fmt='%Y-%m-%d_%H-%M') ) | path_join }}] *** 2026-01-20 17:55:26,553 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.035) 0:36:27.914 ******* 2026-01-20 17:55:26,553 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.035) 0:36:27.913 ******* 2026-01-20 17:55:26,577 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | TASK [artifacts : Verify if "success" flag exists after successful tests execution path={{ ansible_user_dir }}/cifmw-success] *** 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.036) 0:36:27.950 ******* 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.036) 0:36:27.949 ******* 2026-01-20 17:55:26,778 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure we have at least minimal ansible facts gather_subset=min] *** 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.201) 0:36:28.151 ******* 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.201) 0:36:28.150 ******* 2026-01-20 17:55:27,419 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure base directory exists path={{ cifmw_artifacts_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.638) 0:36:28.790 ******* 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.638) 0:36:28.789 ******* 2026-01-20 17:55:27,633 p=36747 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2026-01-20 17:55:27,849 p=36747 u=zuul n=ansible | ok: [localhost] => (item=logs) 2026-01-20 17:55:27,862 p=36747 u=zuul n=ansible | TASK [artifacts : Load generated hook environment for further usage dir={{ cifmw_artifacts_basedir }}/artifacts, depth=1, files_matching=^(pre|post).*\.yml$] *** 2026-01-20 17:55:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.433) 0:36:29.223 ******* 2026-01-20 17:55:27,863 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.433) 0:36:29.223 ******* 2026-01-20 17:55:27,932 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | TASK [artifacts : Gather parameter passed to the playbook mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-vars.yml, content={{ vars | to_nice_yaml }}] *** 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.081) 0:36:29.305 ******* 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.081) 0:36:29.304 ******* 2026-01-20 17:55:30,291 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | TASK [artifacts : Gather facts mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-facts.yml, content={{ ansible_facts | to_nice_yaml }}] *** 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:02.356) 0:36:31.662 ******* 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:02.356) 0:36:31.661 ******* 2026-01-20 17:55:30,759 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | TASK [artifacts : Copy some network configuration files _raw_params=cp /etc/resolv.conf /etc/hosts {{ cifmw_artifacts_basedir }}/artifacts/ cp -r /etc/NetworkManager/system-connections {{ cifmw_artifacts_basedir }}/artifacts/NetworkManager cp -r /etc/yum.repos.d {{ cifmw_artifacts_basedir }}/artifacts/yum_repos test -d /etc/ci/env && cp -r /etc/ci/env {{ cifmw_artifacts_basedir }}/artifacts/ci-env test -d /var/log/bmaas_console_logs && cp -r /var/log/bmaas_console_logs {{ cifmw_artifacts_basedir }}/logs ip ro ls > {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip rule ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip -j -p link ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt] *** 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:00.475) 0:36:32.137 ******* 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:00.475) 0:36:32.137 ******* 2026-01-20 17:55:31,057 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | TASK [artifacts : Get installed packages list ] ******************************** 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:31 +0000 (0:00:00.292) 0:36:32.430 ******* 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:31 +0000 (0:00:00.292) 0:36:32.429 ******* 2026-01-20 17:55:32,098 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | TASK [artifacts : Output package list mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/installed-packages.yml, content={{ ansible_facts.packages | to_nice_yaml }}] *** 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:01.142) 0:36:33.573 ******* 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:01.142) 0:36:33.572 ******* 2026-01-20 17:55:32,709 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | TASK [artifacts : Cleanup unnecesary directories path={{ item }}, state=absent] *** 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:00.539) 0:36:34.112 ******* 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:00.539) 0:36:34.111 ******* 2026-01-20 17:55:33,101 p=36747 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/operator) 2026-01-20 17:55:33,147 p=36747 u=zuul n=ansible | TASK [os_must_gather : Ensure directories are present path={{ cifmw_os_must_gather_output_log_dir }}, state=directory, mode=0755] *** 2026-01-20 17:55:33,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.396) 0:36:34.508 ******* 2026-01-20 17:55:33,148 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.396) 0:36:34.508 ******* 2026-01-20 17:55:33,347 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | TASK [os_must_gather : Construct project change list zuul_change_list={{ zuul_change_list | default([]) + [item.project.short_name] }}, cacheable=True] *** 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.228) 0:36:34.737 ******* 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.228) 0:36:34.736 ******* 2026-01-20 17:55:33,421 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | TASK [os_must_gather : Get git tag for image tagging chdir={{ cifmw_os_must_gather_repo_path }}, _raw_params=git show-ref --head --hash head] *** 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.097) 0:36:34.834 ******* 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.097) 0:36:34.834 ******* 2026-01-20 17:55:33,502 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | TASK [os_must_gather : Debug git show-ref msg={{ openstack_must_gather_tag }}] *** 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.057) 0:36:34.892 ******* 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.057) 0:36:34.891 ******* 2026-01-20 17:55:33,562 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | TASK [os_must_gather : Build openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-build, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.058) 0:36:34.950 ******* 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.058) 0:36:34.950 ******* 2026-01-20 17:55:33,616 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | TASK [os_must_gather : Push openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-push, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.053) 0:36:35.004 ******* 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.053) 0:36:35.003 ******* 2026-01-20 17:55:33,668 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | TASK [os_must_gather : Set cifmw_os_must_gather_image to new image tag cifmw_os_must_gather_image={{ cifmw_os_must_gather_image_registry }}/openstack-must-gather:{{ openstack_must_gather_tag.stdout }}] *** 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.120) 0:36:35.124 ******* 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.120) 0:36:35.124 ******* 2026-01-20 17:55:33,795 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | TASK [os_must_gather : Check for oc command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=command -v oc] *** 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.063) 0:36:35.188 ******* 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.063) 0:36:35.187 ******* 2026-01-20 17:55:33,878 p=36747 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_016_check_for_oc.log 2026-01-20 17:55:33,963 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:33,993 p=36747 u=zuul n=ansible | TASK [os_must_gather : Check if kubeconfig exists path={{ cifmw_openshift_kubeconfig | default(cifmw_os_must_gather_kubeconfig) }}] *** 2026-01-20 17:55:33,994 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.166) 0:36:35.355 ******* 2026-01-20 17:55:33,994 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.166) 0:36:35.354 ******* 2026-01-20 17:55:34,240 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:34,270 p=36747 u=zuul n=ansible | TASK [os_must_gather : Run openstack-must-gather command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=timeout {{ shell_cmd_timeout }} oc adm must-gather --image {{ cifmw_os_must_gather_image }} --timeout {{ cifmw_os_must_gather_timeout }} --host-network={{ cifmw_os_must_gather_host_network }} --dest-dir {{ cifmw_os_must_gather_output_log_dir }} --volume-percentage={{ cifmw_os_must_gather_volume_percentage }} -- ADDITIONAL_NAMESPACES={{ cifmw_os_must_gather_additional_namespaces }} OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1 || { rc=$? if [ $rc -eq 124 ]; then echo "The must gather command did not finish on time!" echo "{{ shell_cmd_timeout }} seconds was not enough to finish the task." fi }] *** 2026-01-20 17:55:34,270 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:34 +0000 (0:00:00.276) 0:36:35.631 ******* 2026-01-20 17:55:34,271 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:34 +0000 (0:00:00.276) 0:36:35.631 ******* 2026-01-20 17:55:34,379 p=36747 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_017_run_openstack_must_gather.log 2026-01-20 18:40:34,493 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | TASK [os_must_gather : Find existing os-must-gather directories paths={{ cifmw_os_must_gather_output_log_dir }}, file_type=directory, depth=1] *** 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:45:00.262) 1:21:35.894 ******* 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:45:00.262) 1:21:35.894 ******* 2026-01-20 18:40:34,766 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | TASK [os_must_gather : Create a symlink to newest os-must-gather directory src={{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}, dest={{ cifmw_os_must_gather_output_log_dir }}/latest, state=link] *** 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.268) 1:21:36.163 ******* 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.268) 1:21:36.162 ******* 2026-01-20 18:40:34,837 p=36747 u=zuul n=ansible | fatal: [localhost]: FAILED! => msg: | The task includes an option with an undefined variable. The error was: Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined. Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined The error appears to be in '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/os_must_gather/tasks/main.yml': line 96, column 7, but may be elsewhere in the file depending on the exact syntax problem. The offending line appears to be: - name: Create a symlink to newest os-must-gather directory ^ here 2026-01-20 18:40:34,837 p=36747 u=zuul n=ansible | ...ignoring 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | TASK [artifacts : Create crc logs directory path={{ cifmw_artifacts_basedir }}/logs/crc, state=directory, mode=0755] *** 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.117) 1:21:36.281 ******* 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.117) 1:21:36.280 ******* 2026-01-20 18:40:34,939 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:34,970 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure controller knows CRC ssh keys _raw_params=ssh-keyscan {{ cifmw_artifacts_crc_host }} >> ~/.ssh/known_hosts] *** 2026-01-20 18:40:34,971 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.050) 1:21:36.332 ******* 2026-01-20 18:40:34,971 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.050) 1:21:36.331 ******* 2026-01-20 18:40:34,988 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | TASK [artifacts : Recognize new keypair path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.128) 1:21:36.460 ******* 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.128) 1:21:36.460 ******* 2026-01-20 18:40:35,116 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | TASK [artifacts : Set fact if new keypair exists new_keypair_path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.047) 1:21:36.508 ******* 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.047) 1:21:36.507 ******* 2026-01-20 18:40:35,165 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,199 p=36747 u=zuul n=ansible | TASK [artifacts : Prepare root ssh accesses output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=ssh -i {{ new_keypair_path | default(cifmw_artifacts_crc_sshkey) }} {{ cifmw_artifacts_crc_user }}@{{ cifmw_artifacts_crc_host }} < /tmp/{{ host_ip }}/ovs_vsctl_list_openvswitch.txt sudo ip netns > /tmp/{{ host_ip }}/ip_netns.txt sudo ip a > /tmp/{{ host_ip }}/network.txt sudo ip ro ls >> /tmp/{{ host_ip }}/network.txt sudo rpm -qa > /tmp/{{ host_ip }}/rpm_qa.txt sudo dnf list installed > /tmp/{{ host_ip }}/dnf_list_installed.txt sudo podman images --digests > /tmp/{{ host_ip }}/podman_images.txt sudo fips-mode-setup --check > /tmp/{{ host_ip }}/fips_check.txt mkdir -p /tmp/{{ host_ip }}/service_logs systemctl list-units | awk '/virt|edpm|ovs/ {print $1}' | egrep -v "sys|ovs-delete-transient-ports" | xargs -I {} sudo bash -c 'journalctl -u {} > /tmp/{{ host_ip }}/service_logs/{}.log' sudo ausearch -i | grep denied > /tmp/{{ host_ip }}/selinux-denials.log || true sudo journalctl -p warning -t kernel -o short -g DROPPING --no-pager &> /tmp/{{ host_ip }}/firewall-drops.txt || true EOF] *** 2026-01-20 18:40:35,719 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.084) 1:21:37.080 ******* 2026-01-20 18:40:35,719 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.084) 1:21:37.080 ******* 2026-01-20 18:40:35,749 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | TASK [artifacts : Copy logs to host machine from {{ item.split('/')[0] }} output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=rsync -a -e "ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i {{ ssh_key_file }}" {{ ssh_user }}@{{ host_ip }}:/tmp/{{ host_ip }} {{ cifmw_artifacts_basedir }}/logs/;] *** 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.061) 1:21:37.142 ******* 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.061) 1:21:37.141 ******* 2026-01-20 18:40:35,808 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | TASK [artifacts : Generate list of ansible logs to collect in home directory paths={{ ansible_user_dir }}, patterns=*ansible*.log] *** 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.059) 1:21:37.201 ******* 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.059) 1:21:37.200 ******* 2026-01-20 18:40:36,066 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | TASK [artifacts : Copy ansible logs to logs directory src={{ item.path }}, dest={{ cifmw_artifacts_basedir }}/logs/, remote_src=True, mode=0644] *** 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.345) 1:21:37.547 ******* 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.345) 1:21:37.546 ******* 2026-01-20 18:40:36,462 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'path': '/home/zuul/ansible.log', 'mode': '0644', 'isdir': False, 'ischr': False, 'isblk': False, 'isreg': True, 'isfifo': False, 'islnk': False, 'issock': False, 'uid': 1000, 'gid': 1000, 'size': 506884, 'inode': 4511951, 'dev': 64513, 'nlink': 1, 'atime': 1768927161.5800197, 'mtime': 1768934435.8390431, 'ctime': 1768934435.8390431, 'gr_name': 'zuul', 'pw_name': 'zuul', 'wusr': True, 'rusr': True, 'xusr': False, 'wgrp': False, 'rgrp': True, 'xgrp': False, 'woth': False, 'roth': True, 'xoth': False, 'isuid': False, 'isgid': False}) 2026-01-20 18:40:36,497 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure we have proper rights on the gathered content _raw_params=find {{ cifmw_artifacts_basedir }}/logs -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/logs -type d -exec chmod 0755 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type f -exec chmod 0644 '{}' \; find {{ cifmw_artifacts_basedir }}/artifacts -type d -exec chmod 0755 '{}' \;] *** 2026-01-20 18:40:36,497 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.311) 1:21:37.858 ******* 2026-01-20 18:40:36,497 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.311) 1:21:37.857 ******* 2026-01-20 18:40:37,527 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:37,559 p=36747 u=zuul n=ansible | TASK [artifacts : Mask secrets in yaml log files path={{ item }}, isdir=True] *** 2026-01-20 18:40:37,560 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:37 +0000 (0:00:01.062) 1:21:38.920 ******* 2026-01-20 18:40:37,560 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:37 +0000 (0:00:01.062) 1:21:38.920 ******* 2026-01-20 18:40:38,233 p=36747 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2026-01-20 18:40:40,973 p=36747 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2026-01-20 18:40:41,031 p=36747 u=zuul n=ansible | TASK [env_op_images : Ensure directory is present path={{ cifmw_env_op_images_dir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 18:40:41,031 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:41 +0000 (0:00:03.471) 1:21:42.392 ******* 2026-01-20 18:40:41,031 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:41 +0000 (0:00:03.471) 1:21:42.391 ******* 2026-01-20 18:40:41,247 p=36747 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2026-01-20 18:40:41,433 p=36747 u=zuul n=ansible | ok: [localhost] => (item=logs) 2026-01-20 18:40:41,482 p=36747 u=zuul n=ansible | TASK [env_op_images : Check if OpenStackControlPlane is setup _raw_params=oc get OpenStackControlPlane -o=jsonpath='{.items[*].status.conditions[?(@.type=="Ready")].status}'] *** 2026-01-20 18:40:41,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:41 +0000 (0:00:00.450) 1:21:42.843 ******* 2026-01-20 18:40:41,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:41 +0000 (0:00:00.451) 1:21:42.843 ******* 2026-01-20 18:40:41,941 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:42,045 p=36747 u=zuul n=ansible | TASK [env_op_images : Get images from the CSV _raw_params=oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o yaml] *** 2026-01-20 18:40:42,045 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.563) 1:21:43.406 ******* 2026-01-20 18:40:42,045 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.562) 1:21:43.406 ******* 2026-01-20 18:40:42,447 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:42,482 p=36747 u=zuul n=ansible | TASK [env_op_images : Get the images name executable=/bin/bash, _raw_params=set -o pipefail; oc get ClusterServiceVersion -l operators.coreos.com/openstack-operator.openstack-operators --all-namespaces -o json | jq -r ' [.items[]? | .spec.install.spec.deployments[]? | .spec.template.spec.containers[]? | .env[]? | select(.name? | test("^RELATED_IMAGE")) | select(.name | contains("MANAGER")) | {(.name): .value} ]' ] *** 2026-01-20 18:40:42,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.437) 1:21:43.843 ******* 2026-01-20 18:40:42,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.437) 1:21:43.843 ******* 2026-01-20 18:40:42,880 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:42,917 p=36747 u=zuul n=ansible | TASK [env_op_images : Extract env variable name and images cifmw_openstack_service_images_content={{ _sa_images_content.stdout | from_json }}] *** 2026-01-20 18:40:42,918 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.435) 1:21:44.279 ******* 2026-01-20 18:40:42,918 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.435) 1:21:44.278 ******* 2026-01-20 18:40:42,952 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:42,983 p=36747 u=zuul n=ansible | TASK [env_op_images : Get all pods from all namespaces to find openstack-operator-index kind=Pod, api_version=v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, field_selectors=['status.phase=Running']] *** 2026-01-20 18:40:42,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.065) 1:21:44.344 ******* 2026-01-20 18:40:42,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:42 +0000 (0:00:00.065) 1:21:44.343 ******* 2026-01-20 18:40:46,305 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:46,996 p=36747 u=zuul n=ansible | TASK [env_op_images : Retrieve openstack-operator-index pod cifmw_install_yamls_vars_content={'OPENSTACK_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}] *** 2026-01-20 18:40:46,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:46 +0000 (0:00:04.013) 1:21:48.357 ******* 2026-01-20 18:40:46,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:46 +0000 (0:00:04.013) 1:21:48.357 ******* 2026-01-20 18:40:47,228 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:47,281 p=36747 u=zuul n=ansible | TASK [env_op_images : Get all the pods in openstack-operator namespace kind=Pod, namespace={{ ((csv_items | first).metadata.namespace) if csv_items | length > 0 else omit }}, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, field_selectors=['status.phase=Running']] *** 2026-01-20 18:40:47,281 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:47 +0000 (0:00:00.284) 1:21:48.642 ******* 2026-01-20 18:40:47,281 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:47 +0000 (0:00:00.284) 1:21:48.641 ******* 2026-01-20 18:40:48,576 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:48,808 p=36747 u=zuul n=ansible | TASK [env_op_images : Get operator images and pods cifmw_openstack_operator_images_content={'RABBITMQ_OP_IMG': '{{ selected_pod.status.containerStatuses[0].imageID }}'}, selected_pods={{ pod_list.resources | rejectattr('metadata.generateName', 'contains', 'openstack-operator-index-') | rejectattr('metadata.generateName', 'contains', 'rabbitmq-cluster-operator-') | rejectattr('metadata.generateName', 'contains', 'watcher-operator-index-') }}] *** 2026-01-20 18:40:48,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:48 +0000 (0:00:01.527) 1:21:50.169 ******* 2026-01-20 18:40:48,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:48 +0000 (0:00:01.527) 1:21:50.168 ******* 2026-01-20 18:40:49,040 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:49,120 p=36747 u=zuul n=ansible | TASK [env_op_images : Add operator images to the dictionary cifmw_openstack_operator_images_content={{ cifmw_openstack_operator_images_content | combine( { item.metadata.labels['openstack.org/operator-name'] | upper ~ '_OP_IMG': (item.status.containerStatuses | last).imageID } ) }}] *** 2026-01-20 18:40:49,120 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:49 +0000 (0:00:00.312) 1:21:50.481 ******* 2026-01-20 18:40:49,120 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:49 +0000 (0:00:00.312) 1:21:50.480 ******* 2026-01-20 18:40:49,251 p=36747 u=zuul n=ansible | ok: [localhost] => (item=barbican-operator-controller-manager-7ddb5c749-7zdch) 2026-01-20 18:40:49,266 p=36747 u=zuul n=ansible | ok: [localhost] => (item=cinder-operator-controller-manager-9b68f5989-zgvcz) 2026-01-20 18:40:49,281 p=36747 u=zuul n=ansible | ok: [localhost] => (item=designate-operator-controller-manager-9f958b845-mj76w) 2026-01-20 18:40:49,308 p=36747 u=zuul n=ansible | ok: [localhost] => (item=glance-operator-controller-manager-c6994669c-bxm9j) 2026-01-20 18:40:49,327 p=36747 u=zuul n=ansible | ok: [localhost] => (item=heat-operator-controller-manager-594c8c9d5d-wm2kb) 2026-01-20 18:40:49,345 p=36747 u=zuul n=ansible | ok: [localhost] => (item=horizon-operator-controller-manager-77d5c5b54f-zs4nf) 2026-01-20 18:40:49,364 p=36747 u=zuul n=ansible | ok: [localhost] => (item=infra-operator-controller-manager-77c48c7859-zd75z) 2026-01-20 18:40:49,381 p=36747 u=zuul n=ansible | ok: [localhost] => (item=ironic-operator-controller-manager-78757b4889-7p5v4) 2026-01-20 18:40:49,395 p=36747 u=zuul n=ansible | ok: [localhost] => (item=keystone-operator-controller-manager-767fdc4f47-dwn52) 2026-01-20 18:40:49,411 p=36747 u=zuul n=ansible | ok: [localhost] => (item=manila-operator-controller-manager-864f6b75bf-wjrpf) 2026-01-20 18:40:49,428 p=36747 u=zuul n=ansible | ok: [localhost] => (item=mariadb-operator-controller-manager-c87fff755-qd2nk) 2026-01-20 18:40:49,443 p=36747 u=zuul n=ansible | ok: [localhost] => (item=neutron-operator-controller-manager-cb4666565-m7p7b) 2026-01-20 18:40:49,460 p=36747 u=zuul n=ansible | ok: [localhost] => (item=nova-operator-controller-manager-65849867d6-95tbl) 2026-01-20 18:40:49,477 p=36747 u=zuul n=ansible | ok: [localhost] => (item=octavia-operator-controller-manager-7fc9b76cf6-fk7x2) 2026-01-20 18:40:49,502 p=36747 u=zuul n=ansible | ok: [localhost] => (item=openstack-baremetal-operator-controller-manager-6b68b8b854r9sf9) 2026-01-20 18:40:49,527 p=36747 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-init-5c987874f9-t2thd) 2026-01-20 18:40:49,545 p=36747 u=zuul n=ansible | ok: [localhost] => (item=openstack-operator-controller-manager-7696897b84-8gt6d) 2026-01-20 18:40:49,558 p=36747 u=zuul n=ansible | ok: [localhost] => (item=ovn-operator-controller-manager-55db956ddc-vvwk8) 2026-01-20 18:40:49,574 p=36747 u=zuul n=ansible | ok: [localhost] => (item=placement-operator-controller-manager-686df47fcb-6rn8v) 2026-01-20 18:40:49,590 p=36747 u=zuul n=ansible | ok: [localhost] => (item=swift-operator-controller-manager-85dd56d4cc-dxnvv) 2026-01-20 18:40:49,605 p=36747 u=zuul n=ansible | ok: [localhost] => (item=telemetry-operator-controller-manager-5f8f495fcf-fdpgr) 2026-01-20 18:40:49,620 p=36747 u=zuul n=ansible | ok: [localhost] => (item=test-operator-controller-manager-7cd8bc9dbb-csd5m) 2026-01-20 18:40:49,640 p=36747 u=zuul n=ansible | ok: [localhost] => (item=watcher-operator-controller-manager-6db9b5db6c-29hz8) 2026-01-20 18:40:49,794 p=36747 u=zuul n=ansible | TASK [env_op_images : Write images to file dest={{ cifmw_env_op_images_dir }}/artifacts/{{ cifmw_env_op_images_file }}, content={{ _content | to_nice_yaml }}, mode=0644] *** 2026-01-20 18:40:49,794 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:49 +0000 (0:00:00.673) 1:21:51.155 ******* 2026-01-20 18:40:49,794 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:49 +0000 (0:00:00.673) 1:21:51.154 ******* 2026-01-20 18:40:50,303 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:50,366 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Create a versioned log folder path={{ logfiles_dest_dir }}, state=directory, mode=0775] *** 2026-01-20 18:40:50,367 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.572) 1:21:51.727 ******* 2026-01-20 18:40:50,367 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.572) 1:21:51.727 ******* 2026-01-20 18:40:50,576 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:50,762 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Return a list of log files in home directory paths={{ ansible_user_dir }}, patterns=*.log] *** 2026-01-20 18:40:50,762 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.395) 1:21:52.123 ******* 2026-01-20 18:40:50,763 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.395) 1:21:52.123 ******* 2026-01-20 18:40:50,960 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:50,991 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Ensure ansible facts cache exists path={{ ansible_user_dir }}/ansible_facts_cache] *** 2026-01-20 18:40:50,991 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.228) 1:21:52.352 ******* 2026-01-20 18:40:50,991 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:50 +0000 (0:00:00.228) 1:21:52.351 ******* 2026-01-20 18:40:51,233 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:51,265 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Copy logs to proper location src={{ item.path }}, dest={{ [ logfiles_dest_dir , item.path | basename ] | path_join }}, remote_src=True, mode=0666] *** 2026-01-20 18:40:51,265 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:51 +0000 (0:00:00.274) 1:21:52.626 ******* 2026-01-20 18:40:51,265 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:51 +0000 (0:00:00.274) 1:21:52.625 ******* home/zuul/zuul-output/logs/ci-framework-data/logs/2026-01-20_18-41/0000775000175000017500000000000015133753412023115 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log0000644000175000017500000002334115133730117031310 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Download tools] ********************************************************** TASK [download_tools : Install build dependencies name=['jq', 'skopeo', 'sqlite', 'httpd-tools', 'virt-install', 'gcc', 'python3-jinja2', 'xmlstarlet', 'openssl']] *** Tuesday 20 January 2026 16:41:11 +0000 (0:00:00.051) 0:00:00.051 ******* Tuesday 20 January 2026 16:41:11 +0000 (0:00:00.050) 0:00:00.050 ******* changed: [localhost] TASK [download_tools : Set opm download url suffix opm_url_suffix=latest/download] *** Tuesday 20 January 2026 16:41:17 +0000 (0:00:05.218) 0:00:05.270 ******* Tuesday 20 January 2026 16:41:17 +0000 (0:00:05.218) 0:00:05.269 ******* skipping: [localhost] TASK [download_tools : Set opm download url suffix opm_url_suffix=download/{{ opm_version }}] *** Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.061) 0:00:05.331 ******* Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.061) 0:00:05.330 ******* ok: [localhost] TASK [download_tools : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.043) 0:00:05.375 ******* Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.043) 0:00:05.374 ******* ok: [localhost] TASK [download_tools : Download opm url=https://github.com/operator-framework/operator-registry/releases/{{ opm_url_suffix }}/linux-amd64-opm, dest={{ lookup('env', 'HOME') }}/bin/opm, mode=0755, timeout=30] *** Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.427) 0:00:05.802 ******* Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.427) 0:00:05.801 ******* changed: [localhost] TASK [download_tools : Get version from sdk_version _sdk_version={{ sdk_version | regex_search('v(.*)', '\1') | first }}] *** Tuesday 20 January 2026 16:41:19 +0000 (0:00:01.552) 0:00:07.355 ******* Tuesday 20 January 2026 16:41:19 +0000 (0:00:01.552) 0:00:07.354 ******* ok: [localhost] TASK [download_tools : Set operator-sdk file for version < 1.3.0 _operator_sdk_file=operator-sdk-{{ sdk_version }}-x86_64-linux-gnu] *** Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.060) 0:00:07.416 ******* Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.060) 0:00:07.415 ******* skipping: [localhost] TASK [download_tools : Set operator-sdk file for version >= 1.3.0 _operator_sdk_file=operator-sdk_linux_amd64] *** Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.453 ******* Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.452 ******* ok: [localhost] TASK [download_tools : Download operator-sdk url=https://github.com/operator-framework/operator-sdk/releases/download/{{ sdk_version }}/{{ _operator_sdk_file }}, dest={{ lookup('env', 'HOME') }}/bin/operator-sdk, mode=0755, force=True, timeout=30] *** Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.490 ******* Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.490 ******* changed: [localhost] TASK [download_tools : Download and extract kustomize src=https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F{{ kustomize_version }}/kustomize_{{ kustomize_version }}_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True] *** Tuesday 20 January 2026 16:41:22 +0000 (0:00:02.818) 0:00:10.309 ******* Tuesday 20 January 2026 16:41:22 +0000 (0:00:02.818) 0:00:10.308 ******* changed: [localhost] TASK [download_tools : Download kubectl url=https://dl.k8s.io/release/{{ kubectl_version }}/bin/linux/amd64/kubectl, dest={{ lookup('env', 'HOME') }}/bin/kubectl, mode=0755, timeout=30] *** Tuesday 20 January 2026 16:41:23 +0000 (0:00:01.701) 0:00:12.011 ******* Tuesday 20 January 2026 16:41:23 +0000 (0:00:01.701) 0:00:12.010 ******* ok: [localhost] TASK [download_tools : Download kuttl url=https://github.com/kudobuilder/kuttl/releases/download/v{{ kuttl_version }}/kubectl-kuttl_{{ kuttl_version }}_linux_x86_64, dest={{ lookup('env', 'HOME') }}/bin/kubectl-kuttl, mode=0755, timeout=30] *** Tuesday 20 January 2026 16:41:24 +0000 (0:00:00.516) 0:00:12.527 ******* Tuesday 20 January 2026 16:41:24 +0000 (0:00:00.516) 0:00:12.526 ******* changed: [localhost] TASK [download_tools : Download chainsaw src=https://github.com/kyverno/chainsaw/releases/download/v{{ chainsaw_version }}/chainsaw_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, extra_opts=['--exclude', 'README.md', '--exclude', 'LICENSE']] *** Tuesday 20 January 2026 16:41:25 +0000 (0:00:00.748) 0:00:13.276 ******* Tuesday 20 January 2026 16:41:25 +0000 (0:00:00.748) 0:00:13.275 ******* changed: [localhost] TASK [download_tools : Download and extract yq src=https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, mode=0755] *** Tuesday 20 January 2026 16:41:28 +0000 (0:00:03.589) 0:00:16.865 ******* Tuesday 20 January 2026 16:41:28 +0000 (0:00:03.589) 0:00:16.864 ******* changed: [localhost] TASK [download_tools : Link yq_linux_amd64 as yq src={{ lookup('env', 'HOME') }}/bin/yq_linux_amd64, dest={{ lookup('env', 'HOME') }}/bin/yq, state=link] *** Tuesday 20 January 2026 16:41:30 +0000 (0:00:01.507) 0:00:18.373 ******* Tuesday 20 January 2026 16:41:30 +0000 (0:00:01.507) 0:00:18.372 ******* changed: [localhost] TASK [download_tools : Deinstall golang state=absent, name=['golang-bin', 'golang-src', 'golang']] *** Tuesday 20 January 2026 16:41:30 +0000 (0:00:00.216) 0:00:18.590 ******* Tuesday 20 January 2026 16:41:30 +0000 (0:00:00.216) 0:00:18.589 ******* ok: [localhost] TASK [download_tools : Delete old go version installed from upstream path={{ item }}, state=absent] *** Tuesday 20 January 2026 16:41:32 +0000 (0:00:02.165) 0:00:20.755 ******* Tuesday 20 January 2026 16:41:32 +0000 (0:00:02.165) 0:00:20.754 ******* ok: [localhost] => (item=/usr/local/go) ok: [localhost] => (item=/home/zuul/bin/go) ok: [localhost] => (item=/home/zuul/bin/gofmt) ok: [localhost] => (item=/usr/local/bin/go) ok: [localhost] => (item=/usr/local/bin/gofmt) TASK [download_tools : Download and extract golang src=https://golang.org/dl/go{{ go_version }}.linux-amd64.tar.gz, dest=/usr/local, remote_src=True, extra_opts=['--exclude', 'go/misc', '--exclude', 'go/pkg/linux_amd64_race', '--exclude', 'go/test']] *** Tuesday 20 January 2026 16:41:34 +0000 (0:00:01.654) 0:00:22.409 ******* Tuesday 20 January 2026 16:41:34 +0000 (0:00:01.654) 0:00:22.408 ******* changed: [localhost] TASK [download_tools : Set alternatives link to installed go version _raw_params=set -e update-alternatives --install /usr/local/bin/{{ item }} {{ item }} /usr/local/go/bin/{{ item }} 1 ] *** Tuesday 20 January 2026 16:41:49 +0000 (0:00:15.725) 0:00:38.135 ******* Tuesday 20 January 2026 16:41:49 +0000 (0:00:15.725) 0:00:38.134 ******* changed: [localhost] => (item=go) changed: [localhost] => (item=gofmt) TASK [download_tools : Clean bash cache msg=When move from rpm to upstream version, make sure to clean bash cache using `hash -d go`] *** Tuesday 20 January 2026 16:41:51 +0000 (0:00:01.477) 0:00:39.612 ******* Tuesday 20 January 2026 16:41:51 +0000 (0:00:01.477) 0:00:39.611 ******* ok: [localhost] => msg: When move from rpm to upstream version, make sure to clean bash cache using `hash -d go` PLAY RECAP ********************************************************************* localhost : ok=18 changed=10 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.056) 0:00:39.668 ******* =============================================================================== download_tools : Download and extract golang --------------------------- 15.73s download_tools : Install build dependencies ----------------------------- 5.22s download_tools : Download chainsaw -------------------------------------- 3.59s download_tools : Download operator-sdk ---------------------------------- 2.82s download_tools : Deinstall golang --------------------------------------- 2.17s download_tools : Download and extract kustomize ------------------------- 1.70s download_tools : Delete old go version installed from upstream ---------- 1.65s download_tools : Download opm ------------------------------------------- 1.55s download_tools : Download and extract yq -------------------------------- 1.51s download_tools : Set alternatives link to installed go version ---------- 1.48s download_tools : Download kuttl ----------------------------------------- 0.75s download_tools : Download kubectl --------------------------------------- 0.52s download_tools : Create $HOME/bin dir ----------------------------------- 0.43s download_tools : Link yq_linux_amd64 as yq ------------------------------ 0.22s download_tools : Set opm download url suffix ---------------------------- 0.06s download_tools : Get version from sdk_version --------------------------- 0.06s download_tools : Clean bash cache --------------------------------------- 0.06s download_tools : Set opm download url suffix ---------------------------- 0.04s download_tools : Set operator-sdk file for version >= 1.3.0 ------------- 0.04s download_tools : Set operator-sdk file for version < 1.3.0 -------------- 0.04s Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.056) 0:00:39.668 ******* =============================================================================== download_tools --------------------------------------------------------- 39.62s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------ 39.62s home/zuul/zuul-output/logs/ci-framework-data/logs/pre_infra_download_needed_tools.log0000644000175000017500000003675015133730117030426 0ustar zuulzuul2026-01-20 16:41:11,842 p=32411 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 16:41:11,842 p=32411 u=zuul n=ansible | PLAY [Download tools] ********************************************************** 2026-01-20 16:41:11,889 p=32411 u=zuul n=ansible | TASK [download_tools : Install build dependencies name=['jq', 'skopeo', 'sqlite', 'httpd-tools', 'virt-install', 'gcc', 'python3-jinja2', 'xmlstarlet', 'openssl']] *** 2026-01-20 16:41:11,889 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:11 +0000 (0:00:00.051) 0:00:00.051 ******* 2026-01-20 16:41:11,889 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:11 +0000 (0:00:00.050) 0:00:00.050 ******* 2026-01-20 16:41:17,087 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:17,107 p=32411 u=zuul n=ansible | TASK [download_tools : Set opm download url suffix opm_url_suffix=latest/download] *** 2026-01-20 16:41:17,108 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:05.218) 0:00:05.270 ******* 2026-01-20 16:41:17,108 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:05.218) 0:00:05.269 ******* 2026-01-20 16:41:17,153 p=32411 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:17,169 p=32411 u=zuul n=ansible | TASK [download_tools : Set opm download url suffix opm_url_suffix=download/{{ opm_version }}] *** 2026-01-20 16:41:17,169 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.061) 0:00:05.331 ******* 2026-01-20 16:41:17,169 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.061) 0:00:05.330 ******* 2026-01-20 16:41:17,200 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:17,212 p=32411 u=zuul n=ansible | TASK [download_tools : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2026-01-20 16:41:17,213 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.043) 0:00:05.375 ******* 2026-01-20 16:41:17,213 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.043) 0:00:05.374 ******* 2026-01-20 16:41:17,630 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:17,640 p=32411 u=zuul n=ansible | TASK [download_tools : Download opm url=https://github.com/operator-framework/operator-registry/releases/{{ opm_url_suffix }}/linux-amd64-opm, dest={{ lookup('env', 'HOME') }}/bin/opm, mode=0755, timeout=30] *** 2026-01-20 16:41:17,640 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.427) 0:00:05.802 ******* 2026-01-20 16:41:17,640 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:17 +0000 (0:00:00.427) 0:00:05.801 ******* 2026-01-20 16:41:19,176 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:19,193 p=32411 u=zuul n=ansible | TASK [download_tools : Get version from sdk_version _sdk_version={{ sdk_version | regex_search('v(.*)', '\1') | first }}] *** 2026-01-20 16:41:19,193 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:01.552) 0:00:07.355 ******* 2026-01-20 16:41:19,193 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:01.552) 0:00:07.354 ******* 2026-01-20 16:41:19,238 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:19,254 p=32411 u=zuul n=ansible | TASK [download_tools : Set operator-sdk file for version < 1.3.0 _operator_sdk_file=operator-sdk-{{ sdk_version }}-x86_64-linux-gnu] *** 2026-01-20 16:41:19,254 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.060) 0:00:07.416 ******* 2026-01-20 16:41:19,254 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.060) 0:00:07.415 ******* 2026-01-20 16:41:19,277 p=32411 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:19,291 p=32411 u=zuul n=ansible | TASK [download_tools : Set operator-sdk file for version >= 1.3.0 _operator_sdk_file=operator-sdk_linux_amd64] *** 2026-01-20 16:41:19,291 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.453 ******* 2026-01-20 16:41:19,291 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.452 ******* 2026-01-20 16:41:19,319 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:19,328 p=32411 u=zuul n=ansible | TASK [download_tools : Download operator-sdk url=https://github.com/operator-framework/operator-sdk/releases/download/{{ sdk_version }}/{{ _operator_sdk_file }}, dest={{ lookup('env', 'HOME') }}/bin/operator-sdk, mode=0755, force=True, timeout=30] *** 2026-01-20 16:41:19,329 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.490 ******* 2026-01-20 16:41:19,329 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:19 +0000 (0:00:00.037) 0:00:07.490 ******* 2026-01-20 16:41:22,133 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:22,147 p=32411 u=zuul n=ansible | TASK [download_tools : Download and extract kustomize src=https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F{{ kustomize_version }}/kustomize_{{ kustomize_version }}_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True] *** 2026-01-20 16:41:22,147 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:22 +0000 (0:00:02.818) 0:00:10.309 ******* 2026-01-20 16:41:22,147 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:22 +0000 (0:00:02.818) 0:00:10.308 ******* 2026-01-20 16:41:23,835 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:23,848 p=32411 u=zuul n=ansible | TASK [download_tools : Download kubectl url=https://dl.k8s.io/release/{{ kubectl_version }}/bin/linux/amd64/kubectl, dest={{ lookup('env', 'HOME') }}/bin/kubectl, mode=0755, timeout=30] *** 2026-01-20 16:41:23,849 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:23 +0000 (0:00:01.701) 0:00:12.011 ******* 2026-01-20 16:41:23,849 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:23 +0000 (0:00:01.701) 0:00:12.010 ******* 2026-01-20 16:41:24,348 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:24,365 p=32411 u=zuul n=ansible | TASK [download_tools : Download kuttl url=https://github.com/kudobuilder/kuttl/releases/download/v{{ kuttl_version }}/kubectl-kuttl_{{ kuttl_version }}_linux_x86_64, dest={{ lookup('env', 'HOME') }}/bin/kubectl-kuttl, mode=0755, timeout=30] *** 2026-01-20 16:41:24,365 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:24 +0000 (0:00:00.516) 0:00:12.527 ******* 2026-01-20 16:41:24,365 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:24 +0000 (0:00:00.516) 0:00:12.526 ******* 2026-01-20 16:41:25,101 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:25,113 p=32411 u=zuul n=ansible | TASK [download_tools : Download chainsaw src=https://github.com/kyverno/chainsaw/releases/download/v{{ chainsaw_version }}/chainsaw_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, extra_opts=['--exclude', 'README.md', '--exclude', 'LICENSE']] *** 2026-01-20 16:41:25,114 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:25 +0000 (0:00:00.748) 0:00:13.276 ******* 2026-01-20 16:41:25,114 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:25 +0000 (0:00:00.748) 0:00:13.275 ******* 2026-01-20 16:41:28,683 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:28,703 p=32411 u=zuul n=ansible | TASK [download_tools : Download and extract yq src=https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, mode=0755] *** 2026-01-20 16:41:28,703 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:28 +0000 (0:00:03.589) 0:00:16.865 ******* 2026-01-20 16:41:28,703 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:28 +0000 (0:00:03.589) 0:00:16.864 ******* 2026-01-20 16:41:30,198 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:30,211 p=32411 u=zuul n=ansible | TASK [download_tools : Link yq_linux_amd64 as yq src={{ lookup('env', 'HOME') }}/bin/yq_linux_amd64, dest={{ lookup('env', 'HOME') }}/bin/yq, state=link] *** 2026-01-20 16:41:30,211 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:30 +0000 (0:00:01.507) 0:00:18.373 ******* 2026-01-20 16:41:30,211 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:30 +0000 (0:00:01.507) 0:00:18.372 ******* 2026-01-20 16:41:30,417 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:30,427 p=32411 u=zuul n=ansible | TASK [download_tools : Deinstall golang state=absent, name=['golang-bin', 'golang-src', 'golang']] *** 2026-01-20 16:41:30,428 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:30 +0000 (0:00:00.216) 0:00:18.590 ******* 2026-01-20 16:41:30,428 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:30 +0000 (0:00:00.216) 0:00:18.589 ******* 2026-01-20 16:41:32,580 p=32411 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:32,593 p=32411 u=zuul n=ansible | TASK [download_tools : Delete old go version installed from upstream path={{ item }}, state=absent] *** 2026-01-20 16:41:32,593 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:32 +0000 (0:00:02.165) 0:00:20.755 ******* 2026-01-20 16:41:32,593 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:32 +0000 (0:00:02.165) 0:00:20.754 ******* 2026-01-20 16:41:33,391 p=32411 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/go) 2026-01-20 16:41:33,593 p=32411 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/bin/go) 2026-01-20 16:41:33,811 p=32411 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/bin/gofmt) 2026-01-20 16:41:34,040 p=32411 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/bin/go) 2026-01-20 16:41:34,236 p=32411 u=zuul n=ansible | ok: [localhost] => (item=/usr/local/bin/gofmt) 2026-01-20 16:41:34,247 p=32411 u=zuul n=ansible | TASK [download_tools : Download and extract golang src=https://golang.org/dl/go{{ go_version }}.linux-amd64.tar.gz, dest=/usr/local, remote_src=True, extra_opts=['--exclude', 'go/misc', '--exclude', 'go/pkg/linux_amd64_race', '--exclude', 'go/test']] *** 2026-01-20 16:41:34,247 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:34 +0000 (0:00:01.654) 0:00:22.409 ******* 2026-01-20 16:41:34,247 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:34 +0000 (0:00:01.654) 0:00:22.408 ******* 2026-01-20 16:41:49,948 p=32411 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:49,973 p=32411 u=zuul n=ansible | TASK [download_tools : Set alternatives link to installed go version _raw_params=set -e update-alternatives --install /usr/local/bin/{{ item }} {{ item }} /usr/local/go/bin/{{ item }} 1 ] *** 2026-01-20 16:41:49,973 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:49 +0000 (0:00:15.725) 0:00:38.135 ******* 2026-01-20 16:41:49,973 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:49 +0000 (0:00:15.725) 0:00:38.134 ******* 2026-01-20 16:41:50,406 p=32411 u=zuul n=ansible | changed: [localhost] => (item=go) 2026-01-20 16:41:51,439 p=32411 u=zuul n=ansible | changed: [localhost] => (item=gofmt) 2026-01-20 16:41:51,450 p=32411 u=zuul n=ansible | TASK [download_tools : Clean bash cache msg=When move from rpm to upstream version, make sure to clean bash cache using `hash -d go`] *** 2026-01-20 16:41:51,450 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:01.477) 0:00:39.612 ******* 2026-01-20 16:41:51,450 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:01.477) 0:00:39.611 ******* 2026-01-20 16:41:51,468 p=32411 u=zuul n=ansible | ok: [localhost] => msg: When move from rpm to upstream version, make sure to clean bash cache using `hash -d go` 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | localhost : ok=18 changed=10 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.056) 0:00:39.668 ******* 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | =============================================================================== 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download and extract golang --------------------------- 15.73s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Install build dependencies ----------------------------- 5.22s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download chainsaw -------------------------------------- 3.59s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download operator-sdk ---------------------------------- 2.82s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Deinstall golang --------------------------------------- 2.17s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download and extract kustomize ------------------------- 1.70s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Delete old go version installed from upstream ---------- 1.65s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download opm ------------------------------------------- 1.55s 2026-01-20 16:41:51,506 p=32411 u=zuul n=ansible | download_tools : Download and extract yq -------------------------------- 1.51s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Set alternatives link to installed go version ---------- 1.48s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Download kuttl ----------------------------------------- 0.75s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Download kubectl --------------------------------------- 0.52s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Create $HOME/bin dir ----------------------------------- 0.43s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Link yq_linux_amd64 as yq ------------------------------ 0.22s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Set opm download url suffix ---------------------------- 0.06s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Get version from sdk_version --------------------------- 0.06s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Clean bash cache --------------------------------------- 0.06s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Set opm download url suffix ---------------------------- 0.04s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Set operator-sdk file for version >= 1.3.0 ------------- 0.04s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools : Set operator-sdk file for version < 1.3.0 -------------- 0.04s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.056) 0:00:39.668 ******* 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | =============================================================================== 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | download_tools --------------------------------------------------------- 39.62s 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 16:41:51,507 p=32411 u=zuul n=ansible | total ------------------------------------------------------------------ 39.62s home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_015_run_hook_without_retry_patch.log0000644000175000017500000000351415133734377032511 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Enable Prometheus Admin API] ********************************************* TASK [Patch prometheuses.monitoring.rhobs metric-storage to enable Admin API _raw_params=oc patch prometheuses.monitoring.rhobs metric-storage --namespace=openstack --type=merge -p '{"spec":{"enableAdminAPI":true}}'] *** Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.068) 0:00:00.068 ******* Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.067) 0:00:00.067 ******* changed: [localhost] TASK [Wait for prometheuses.monitoring.rhobs metric-storage associated pod to be redeployed _raw_params=oc wait pod prometheus-metric-storage-0 --for=condition=Ready -n openstack --timeout=1m] *** Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.566) 0:00:00.635 ******* Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.566) 0:00:00.633 ******* changed: [localhost] PLAY RECAP ********************************************************************* localhost : ok=2 changed=2 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.494) 0:00:01.130 ******* =============================================================================== Patch prometheuses.monitoring.rhobs metric-storage to enable Admin API --- 0.57s Wait for prometheuses.monitoring.rhobs metric-storage associated pod to be redeployed --- 0.49s Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.495) 0:00:01.128 ******* =============================================================================== ansible.builtin.command ------------------------------------------------- 1.06s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------- 1.06s home/zuul/zuul-output/logs/ci-framework-data/logs/post_deploy_patch_openstack_prometheus_to_.log0000644000175000017500000000556715133734377032767 0ustar zuulzuul2026-01-20 17:18:54,850 p=36676 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 17:18:54,851 p=36676 u=zuul n=ansible | PLAY [Enable Prometheus Admin API] ********************************************* 2026-01-20 17:18:54,902 p=36676 u=zuul n=ansible | TASK [Patch prometheuses.monitoring.rhobs metric-storage to enable Admin API _raw_params=oc patch prometheuses.monitoring.rhobs metric-storage --namespace=openstack --type=merge -p '{"spec":{"enableAdminAPI":true}}'] *** 2026-01-20 17:18:54,902 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.068) 0:00:00.068 ******* 2026-01-20 17:18:54,902 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.067) 0:00:00.067 ******* 2026-01-20 17:18:55,458 p=36676 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:55,468 p=36676 u=zuul n=ansible | TASK [Wait for prometheuses.monitoring.rhobs metric-storage associated pod to be redeployed _raw_params=oc wait pod prometheus-metric-storage-0 --for=condition=Ready -n openstack --timeout=1m] *** 2026-01-20 17:18:55,468 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.566) 0:00:00.635 ******* 2026-01-20 17:18:55,469 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.566) 0:00:00.633 ******* 2026-01-20 17:18:55,925 p=36676 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | localhost : ok=2 changed=2 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.494) 0:00:01.130 ******* 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | Patch prometheuses.monitoring.rhobs metric-storage to enable Admin API --- 0.57s 2026-01-20 17:18:55,963 p=36676 u=zuul n=ansible | Wait for prometheuses.monitoring.rhobs metric-storage associated pod to be redeployed --- 0.49s 2026-01-20 17:18:55,964 p=36676 u=zuul n=ansible | Tuesday 20 January 2026 17:18:55 +0000 (0:00:00.495) 0:00:01.128 ******* 2026-01-20 17:18:55,964 p=36676 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:55,964 p=36676 u=zuul n=ansible | ansible.builtin.command ------------------------------------------------- 1.06s 2026-01-20 17:18:55,964 p=36676 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 17:18:55,964 p=36676 u=zuul n=ansible | total ------------------------------------------------------------------- 1.06s home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_001_fetch_openshift.log0000644000175000017500000000035215133730122027616 0ustar zuulzuulWARNING: Using insecure TLS client config. Setting this option is not supported! Login successful. You have access to 65 projects, the list has been suppressed. You can list all projects with 'oc projects' Using project "default". home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log0000644000175000017500000003335315133730200032460 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Sync repos for controller to compute for periodic jobs and gating repo] *** TASK [Gathering Facts ] ******************************************************** Tuesday 20 January 2026 16:42:27 +0000 (0:00:00.016) 0:00:00.016 ******* Tuesday 20 January 2026 16:42:27 +0000 (0:00:00.015) 0:00:00.015 ******* ok: [compute-0] ok: [compute-1] TASK [Check for gating repo on controller path={{ cifmw_basedir }}/artifacts/repositories/gating.repo] *** Tuesday 20 January 2026 16:42:30 +0000 (0:00:02.500) 0:00:02.516 ******* Tuesday 20 January 2026 16:42:30 +0000 (0:00:02.500) 0:00:02.515 ******* ok: [compute-0 -> controller(38.102.83.129)] ok: [compute-1 -> controller(38.102.83.129)] TASK [Copy repositories from controller to computes dest=/etc/yum.repos.d/, src={{ cifmw_basedir }}/artifacts/repositories/, mode=0755] *** Tuesday 20 January 2026 16:42:31 +0000 (0:00:01.775) 0:00:04.292 ******* Tuesday 20 January 2026 16:42:31 +0000 (0:00:01.775) 0:00:04.291 ******* changed: [compute-0] changed: [compute-1] PLAY [Build dataset hook] ****************************************************** TASK [Load parameters dir={{ item }}, ignore_unknown_extensions=True, extensions=['yaml', 'yml']] *** Tuesday 20 January 2026 16:42:36 +0000 (0:00:05.004) 0:00:09.297 ******* Tuesday 20 January 2026 16:42:36 +0000 (0:00:05.004) 0:00:09.296 ******* ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) ok: [localhost] => (item=/etc/ci/env) TASK [Ensure CRC hostname is set _crc_hostname={{ cifmw_crc_hostname | default('crc') }}] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.188) 0:00:09.485 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.188) 0:00:09.484 ******* ok: [localhost] TASK [Check we have some compute in inventory computes_len={{ groups['computes'] | default([]) | length }}] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.063) 0:00:09.548 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.063) 0:00:09.547 ******* ok: [localhost] TASK [Ensure that the isolated net was configured for crc that=['crc_ci_bootstrap_networks_out is defined', 'crc_ci_bootstrap_networks_out[_crc_hostname] is defined', "crc_ci_bootstrap_networks_out[_crc_hostname]['default'] is defined"]] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.057) 0:00:09.606 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.057) 0:00:09.605 ******* ok: [localhost] => changed: false msg: All assertions passed TASK [Ensure we have needed bits for compute when needed that=['crc_ci_bootstrap_networks_out[_first_compute] is defined', "crc_ci_bootstrap_networks_out[_first_compute]['default'] is defined"]] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.051) 0:00:09.657 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.051) 0:00:09.656 ******* ok: [localhost] => changed: false msg: All assertions passed TASK [Set facts for further usage within the framework cifmw_edpm_prepare_extra_vars={'NNCP_INTERFACE': '{{ crc_ci_bootstrap_networks_out[_crc_hostname].default.iface }}', 'NNCP_DNS_SERVER': "{{\n cifmw_nncp_dns_server |\n default(crc_ci_bootstrap_networks_out[_crc_hostname].default.ip) |\n split('/') | first\n}}", 'NETWORK_MTU': '{{ crc_ci_bootstrap_networks_out[_crc_hostname].default.mtu }}'}] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.070) 0:00:09.727 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.070) 0:00:09.726 ******* ok: [localhost] TASK [Ensure the kustomizations dirs exists path={{ cifmw_basedir }}/artifacts/manifests/kustomizations/{{ item }}, state=directory, mode=0755] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.052) 0:00:09.780 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.052) 0:00:09.779 ******* changed: [localhost] => (item=dataplane) changed: [localhost] => (item=controlplane) TASK [Create OpenStackControlPlane CR Kustomization dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ namespace }} patches: - target: kind: OpenStackControlPlane patch: |- - op: replace path: /spec/dns/template/options value: [ { "key": "server", "values": [ "192.168.122.10" ] }, { "key": "no-negcache", "values": [] } ], mode=0644] *** Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.572) 0:00:10.353 ******* Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.572) 0:00:10.352 ******* changed: [localhost] TASK [Set specific fact for compute accesses cifmw_edpm_deploy_extra_vars={{ edpm_install_yamls_vars }}] *** Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.793) 0:00:11.146 ******* Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.793) 0:00:11.146 ******* ok: [localhost] TASK [Create EDPM CR Kustomization mode=0644, dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ namespace }} patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% for compute_node in groups['computes'] %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/hostName value: "{{compute_node}}" {% endfor %} - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/neutron_public_interface_name value: "{{ crc_ci_bootstrap_networks_out[_first_compute].default.iface | default('') }}" {% for compute_node in groups['computes'] %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/networks/0/defaultRoute value: false {% endfor %} {% for compute_node in groups['computes'] if compute_node != _first_compute %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/ansible/ansibleHost value: >- {{ crc_ci_bootstrap_networks_out[compute_node].default.ip4 | default(crc_ci_bootstrap_networks_out[compute_node].default.ip) | ansible.utils.ipaddr('address') }} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/networks/0/fixedIP value: >- {{ crc_ci_bootstrap_networks_out[compute_node].default.ip4 | default(crc_ci_bootstrap_networks_out[compute_node].default.ip) | ansible.utils.ipaddr('address') }} {% endfor %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_os_net_config_mappings value: net_config_data_lookup: edpm-compute: nic2: "{{ crc_ci_bootstrap_networks_out[_first_compute].default.iface | default('ens7') }}" - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_debug value: true - op: add path: /spec/env value: {} - op: add path: /spec/env value: - name: "ANSIBLE_VERBOSITY" value: "2" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_template value: |- {%- raw %} --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} {% endraw %} - op: replace path: /spec/nodeTemplate/ansible/ansibleUser value: "{{ hostvars[_first_compute].ansible_user | default('zuul') }}" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/ctlplane_dns_nameservers value: {% for dns_server in dns_servers %} - "{{ dns_server }}" {% endfor %} {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_sshd_allowed_ranges value: ["0.0.0.0/0"] {% if cifmw_hook_fetch_compute_facts_edpm_cmd is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: |- {{ cifmw_hook_fetch_compute_facts_edpm_cmd | indent( width=8) }} {% endif %} {% if cifmw_edpm_telemetry_enabled_exporters is defined and cifmw_edpm_telemetry_enabled_exporters | length > 0 %} - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_telemetry_enabled_exporters value: {% for exporter in cifmw_edpm_telemetry_enabled_exporters %} - "{{ exporter }}" {% endfor %} {% endif %}] *** Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.142) 0:00:11.289 ******* Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.142) 0:00:11.288 ******* changed: [localhost] TASK [Ensure we know about the private host keys _raw_params=ssh-keyscan {{ cifmw_edpm_deploy_extra_vars.DATAPLANE_COMPUTE_IP }} >> ~/.ssh/known_hosts ] *** Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.544) 0:00:11.834 ******* Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.544) 0:00:11.833 ******* changed: [localhost] TASK [Save compute info dest={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml, content={{ file_content | to_nice_yaml }}, mode=0644] *** Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.413) 0:00:12.248 ******* Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.413) 0:00:12.247 ******* changed: [localhost] PLAY RECAP ********************************************************************* compute-0 : ok=3 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 compute-1 : ok=3 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 localhost : ok=12 changed=5 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.540) 0:00:12.789 ******* =============================================================================== Copy repositories from controller to computes --------------------------- 5.00s Gathering Facts --------------------------------------------------------- 2.50s Check for gating repo on controller ------------------------------------- 1.78s Create OpenStackControlPlane CR Kustomization --------------------------- 0.79s Ensure the kustomizations dirs exists ----------------------------------- 0.57s Create EDPM CR Kustomization -------------------------------------------- 0.54s Save compute info ------------------------------------------------------- 0.54s Ensure we know about the private host keys ------------------------------ 0.41s Load parameters --------------------------------------------------------- 0.19s Set specific fact for compute accesses ---------------------------------- 0.14s Ensure we have needed bits for compute when needed ---------------------- 0.07s Ensure CRC hostname is set ---------------------------------------------- 0.06s Check we have some compute in inventory --------------------------------- 0.06s Set facts for further usage within the framework ------------------------ 0.05s Ensure that the isolated net was configured for crc --------------------- 0.05s Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.541) 0:00:12.788 ******* =============================================================================== ansible.builtin.copy ---------------------------------------------------- 6.89s gather_facts ------------------------------------------------------------ 2.50s ansible.builtin.stat ---------------------------------------------------- 1.78s ansible.builtin.file ---------------------------------------------------- 0.57s ansible.builtin.shell --------------------------------------------------- 0.41s ansible.builtin.set_fact ------------------------------------------------ 0.32s ansible.builtin.include_vars -------------------------------------------- 0.19s ansible.builtin.assert -------------------------------------------------- 0.12s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------ 12.77s home/zuul/zuul-output/logs/ci-framework-data/logs/post_infra_fetch_nodes_facts_and_save_the.log0000644000175000017500000004537215133730200032424 0ustar zuulzuul2026-01-20 16:42:27,519 p=33581 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 16:42:27,520 p=33581 u=zuul n=ansible | PLAY [Sync repos for controller to compute for periodic jobs and gating repo] *** 2026-01-20 16:42:27,532 p=33581 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2026-01-20 16:42:27,532 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:27 +0000 (0:00:00.016) 0:00:00.016 ******* 2026-01-20 16:42:27,532 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:27 +0000 (0:00:00.015) 0:00:00.015 ******* 2026-01-20 16:42:28,912 p=33581 u=zuul n=ansible | ok: [compute-0] 2026-01-20 16:42:29,997 p=33581 u=zuul n=ansible | ok: [compute-1] 2026-01-20 16:42:30,033 p=33581 u=zuul n=ansible | TASK [Check for gating repo on controller path={{ cifmw_basedir }}/artifacts/repositories/gating.repo] *** 2026-01-20 16:42:30,033 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:30 +0000 (0:00:02.500) 0:00:02.516 ******* 2026-01-20 16:42:30,033 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:30 +0000 (0:00:02.500) 0:00:02.515 ******* 2026-01-20 16:42:31,768 p=33581 u=zuul n=ansible | ok: [compute-0 -> controller(38.102.83.129)] 2026-01-20 16:42:31,802 p=33581 u=zuul n=ansible | ok: [compute-1 -> controller(38.102.83.129)] 2026-01-20 16:42:31,808 p=33581 u=zuul n=ansible | TASK [Copy repositories from controller to computes dest=/etc/yum.repos.d/, src={{ cifmw_basedir }}/artifacts/repositories/, mode=0755] *** 2026-01-20 16:42:31,808 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:31 +0000 (0:00:01.775) 0:00:04.292 ******* 2026-01-20 16:42:31,808 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:31 +0000 (0:00:01.775) 0:00:04.291 ******* 2026-01-20 16:42:36,582 p=33581 u=zuul n=ansible | changed: [compute-0] 2026-01-20 16:42:36,728 p=33581 u=zuul n=ansible | changed: [compute-1] 2026-01-20 16:42:36,778 p=33581 u=zuul n=ansible | PLAY [Build dataset hook] ****************************************************** 2026-01-20 16:42:36,813 p=33581 u=zuul n=ansible | TASK [Load parameters dir={{ item }}, ignore_unknown_extensions=True, extensions=['yaml', 'yml']] *** 2026-01-20 16:42:36,813 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:36 +0000 (0:00:05.004) 0:00:09.297 ******* 2026-01-20 16:42:36,813 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:36 +0000 (0:00:05.004) 0:00:09.296 ******* 2026-01-20 16:42:36,924 p=33581 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-01-20 16:42:36,931 p=33581 u=zuul n=ansible | ok: [localhost] => (item=/etc/ci/env) 2026-01-20 16:42:37,002 p=33581 u=zuul n=ansible | TASK [Ensure CRC hostname is set _crc_hostname={{ cifmw_crc_hostname | default('crc') }}] *** 2026-01-20 16:42:37,002 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.188) 0:00:09.485 ******* 2026-01-20 16:42:37,002 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.188) 0:00:09.484 ******* 2026-01-20 16:42:37,053 p=33581 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:37,065 p=33581 u=zuul n=ansible | TASK [Check we have some compute in inventory computes_len={{ groups['computes'] | default([]) | length }}] *** 2026-01-20 16:42:37,065 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.063) 0:00:09.548 ******* 2026-01-20 16:42:37,065 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.063) 0:00:09.547 ******* 2026-01-20 16:42:37,111 p=33581 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:37,122 p=33581 u=zuul n=ansible | TASK [Ensure that the isolated net was configured for crc that=['crc_ci_bootstrap_networks_out is defined', 'crc_ci_bootstrap_networks_out[_crc_hostname] is defined', "crc_ci_bootstrap_networks_out[_crc_hostname]['default'] is defined"]] *** 2026-01-20 16:42:37,122 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.057) 0:00:09.606 ******* 2026-01-20 16:42:37,122 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.057) 0:00:09.605 ******* 2026-01-20 16:42:37,157 p=33581 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:42:37,173 p=33581 u=zuul n=ansible | TASK [Ensure we have needed bits for compute when needed that=['crc_ci_bootstrap_networks_out[_first_compute] is defined', "crc_ci_bootstrap_networks_out[_first_compute]['default'] is defined"]] *** 2026-01-20 16:42:37,174 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.051) 0:00:09.657 ******* 2026-01-20 16:42:37,174 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.051) 0:00:09.656 ******* 2026-01-20 16:42:37,227 p=33581 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:42:37,244 p=33581 u=zuul n=ansible | TASK [Set facts for further usage within the framework cifmw_edpm_prepare_extra_vars={'NNCP_INTERFACE': '{{ crc_ci_bootstrap_networks_out[_crc_hostname].default.iface }}', 'NNCP_DNS_SERVER': "{{\n cifmw_nncp_dns_server |\n default(crc_ci_bootstrap_networks_out[_crc_hostname].default.ip) |\n split('/') | first\n}}", 'NETWORK_MTU': '{{ crc_ci_bootstrap_networks_out[_crc_hostname].default.mtu }}'}] *** 2026-01-20 16:42:37,244 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.070) 0:00:09.727 ******* 2026-01-20 16:42:37,244 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.070) 0:00:09.726 ******* 2026-01-20 16:42:37,283 p=33581 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:37,296 p=33581 u=zuul n=ansible | TASK [Ensure the kustomizations dirs exists path={{ cifmw_basedir }}/artifacts/manifests/kustomizations/{{ item }}, state=directory, mode=0755] *** 2026-01-20 16:42:37,296 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.052) 0:00:09.780 ******* 2026-01-20 16:42:37,296 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.052) 0:00:09.779 ******* 2026-01-20 16:42:37,646 p=33581 u=zuul n=ansible | changed: [localhost] => (item=dataplane) 2026-01-20 16:42:37,855 p=33581 u=zuul n=ansible | changed: [localhost] => (item=controlplane) 2026-01-20 16:42:37,869 p=33581 u=zuul n=ansible | TASK [Create OpenStackControlPlane CR Kustomization dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ namespace }} patches: - target: kind: OpenStackControlPlane patch: |- - op: replace path: /spec/dns/template/options value: [ { "key": "server", "values": [ "192.168.122.10" ] }, { "key": "no-negcache", "values": [] } ], mode=0644] *** 2026-01-20 16:42:37,869 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.572) 0:00:10.353 ******* 2026-01-20 16:42:37,869 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:37 +0000 (0:00:00.572) 0:00:10.352 ******* 2026-01-20 16:42:38,652 p=33581 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:38,663 p=33581 u=zuul n=ansible | TASK [Set specific fact for compute accesses cifmw_edpm_deploy_extra_vars={{ edpm_install_yamls_vars }}] *** 2026-01-20 16:42:38,663 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.793) 0:00:11.146 ******* 2026-01-20 16:42:38,663 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.793) 0:00:11.146 ******* 2026-01-20 16:42:38,793 p=33581 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:38,806 p=33581 u=zuul n=ansible | TASK [Create EDPM CR Kustomization mode=0644, dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: {{ namespace }} patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% for compute_node in groups['computes'] %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/hostName value: "{{compute_node}}" {% endfor %} - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/neutron_public_interface_name value: "{{ crc_ci_bootstrap_networks_out[_first_compute].default.iface | default('') }}" {% for compute_node in groups['computes'] %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/networks/0/defaultRoute value: false {% endfor %} {% for compute_node in groups['computes'] if compute_node != _first_compute %} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/ansible/ansibleHost value: >- {{ crc_ci_bootstrap_networks_out[compute_node].default.ip4 | default(crc_ci_bootstrap_networks_out[compute_node].default.ip) | ansible.utils.ipaddr('address') }} - op: replace path: /spec/nodes/edpm-{{ compute_node }}/networks/0/fixedIP value: >- {{ crc_ci_bootstrap_networks_out[compute_node].default.ip4 | default(crc_ci_bootstrap_networks_out[compute_node].default.ip) | ansible.utils.ipaddr('address') }} {% endfor %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_os_net_config_mappings value: net_config_data_lookup: edpm-compute: nic2: "{{ crc_ci_bootstrap_networks_out[_first_compute].default.iface | default('ens7') }}" - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_debug value: true - op: add path: /spec/env value: {} - op: add path: /spec/env value: - name: "ANSIBLE_VERBOSITY" value: "2" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_template value: |- {%- raw %} --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} {% endraw %} - op: replace path: /spec/nodeTemplate/ansible/ansibleUser value: "{{ hostvars[_first_compute].ansible_user | default('zuul') }}" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/ctlplane_dns_nameservers value: {% for dns_server in dns_servers %} - "{{ dns_server }}" {% endfor %} {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_sshd_allowed_ranges value: ["0.0.0.0/0"] {% if cifmw_hook_fetch_compute_facts_edpm_cmd is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: |- {{ cifmw_hook_fetch_compute_facts_edpm_cmd | indent( width=8) }} {% endif %} {% if cifmw_edpm_telemetry_enabled_exporters is defined and cifmw_edpm_telemetry_enabled_exporters | length > 0 %} - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_telemetry_enabled_exporters value: {% for exporter in cifmw_edpm_telemetry_enabled_exporters %} - "{{ exporter }}" {% endfor %} {% endif %}] *** 2026-01-20 16:42:38,806 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.142) 0:00:11.289 ******* 2026-01-20 16:42:38,806 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:38 +0000 (0:00:00.142) 0:00:11.288 ******* 2026-01-20 16:42:39,337 p=33581 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:39,351 p=33581 u=zuul n=ansible | TASK [Ensure we know about the private host keys _raw_params=ssh-keyscan {{ cifmw_edpm_deploy_extra_vars.DATAPLANE_COMPUTE_IP }} >> ~/.ssh/known_hosts ] *** 2026-01-20 16:42:39,351 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.544) 0:00:11.834 ******* 2026-01-20 16:42:39,351 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.544) 0:00:11.833 ******* 2026-01-20 16:42:39,752 p=33581 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:39,764 p=33581 u=zuul n=ansible | TASK [Save compute info dest={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml, content={{ file_content | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:42:39,764 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.413) 0:00:12.248 ******* 2026-01-20 16:42:39,764 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:39 +0000 (0:00:00.413) 0:00:12.247 ******* 2026-01-20 16:42:40,273 p=33581 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | compute-0 : ok=3 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | compute-1 : ok=3 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | localhost : ok=12 changed=5 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.540) 0:00:12.789 ******* 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | =============================================================================== 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Copy repositories from controller to computes --------------------------- 5.00s 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Gathering Facts --------------------------------------------------------- 2.50s 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Check for gating repo on controller ------------------------------------- 1.78s 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Create OpenStackControlPlane CR Kustomization --------------------------- 0.79s 2026-01-20 16:42:40,305 p=33581 u=zuul n=ansible | Ensure the kustomizations dirs exists ----------------------------------- 0.57s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Create EDPM CR Kustomization -------------------------------------------- 0.54s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Save compute info ------------------------------------------------------- 0.54s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Ensure we know about the private host keys ------------------------------ 0.41s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Load parameters --------------------------------------------------------- 0.19s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Set specific fact for compute accesses ---------------------------------- 0.14s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Ensure we have needed bits for compute when needed ---------------------- 0.07s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Ensure CRC hostname is set ---------------------------------------------- 0.06s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Check we have some compute in inventory --------------------------------- 0.06s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Set facts for further usage within the framework ------------------------ 0.05s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Ensure that the isolated net was configured for crc --------------------- 0.05s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.541) 0:00:12.788 ******* 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | =============================================================================== 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.copy ---------------------------------------------------- 6.89s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 2.50s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.stat ---------------------------------------------------- 1.78s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.57s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.shell --------------------------------------------------- 0.41s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.set_fact ------------------------------------------------ 0.32s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.19s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ansible.builtin.assert -------------------------------------------------- 0.12s 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 16:42:40,306 p=33581 u=zuul n=ansible | total ------------------------------------------------------------------ 12.77s home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log0000644000175000017500000000413715133730206031623 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Kustomize ControlPlane for horizon service] ****************************** TASK [Ensure the kustomizations dir exists path={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane, state=directory, mode=0755] *** Tuesday 20 January 2026 16:42:45 +0000 (0:00:00.083) 0:00:00.083 ******* Tuesday 20 January 2026 16:42:45 +0000 (0:00:00.081) 0:00:00.081 ******* ok: [localhost] TASK [Create kustomize yaml to enable Horizon dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: {{ namespace }} patches: - target: kind: OpenStackControlPlane patch: |- - op: add path: /spec/horizon/enabled value: true - op: add path: /spec/horizon/template/memcachedInstance value: memcached, mode=0644] *** Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.377) 0:00:00.461 ******* Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.377) 0:00:00.459 ******* changed: [localhost] PLAY RECAP ********************************************************************* localhost : ok=2 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.753) 0:00:01.214 ******* =============================================================================== Create kustomize yaml to enable Horizon --------------------------------- 0.75s Ensure the kustomizations dir exists ------------------------------------ 0.38s Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.753) 0:00:01.212 ******* =============================================================================== ansible.builtin.copy ---------------------------------------------------- 0.75s ansible.builtin.file ---------------------------------------------------- 0.38s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------- 1.13s home/zuul/zuul-output/logs/ci-framework-data/logs/pre_deploy_80_kustomize_openstack_cr.log0000644000175000017500000000627515133730206031362 0ustar zuulzuul2026-01-20 16:42:45,749 p=34064 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 16:42:45,750 p=34064 u=zuul n=ansible | PLAY [Kustomize ControlPlane for horizon service] ****************************** 2026-01-20 16:42:45,810 p=34064 u=zuul n=ansible | TASK [Ensure the kustomizations dir exists path={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane, state=directory, mode=0755] *** 2026-01-20 16:42:45,810 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:45 +0000 (0:00:00.083) 0:00:00.083 ******* 2026-01-20 16:42:45,810 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:45 +0000 (0:00:00.081) 0:00:00.081 ******* 2026-01-20 16:42:46,173 p=34064 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:46,188 p=34064 u=zuul n=ansible | TASK [Create kustomize yaml to enable Horizon dest={{ cifmw_basedir }}/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml, content=apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: {{ namespace }} patches: - target: kind: OpenStackControlPlane patch: |- - op: add path: /spec/horizon/enabled value: true - op: add path: /spec/horizon/template/memcachedInstance value: memcached, mode=0644] *** 2026-01-20 16:42:46,188 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.377) 0:00:00.461 ******* 2026-01-20 16:42:46,188 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.377) 0:00:00.459 ******* 2026-01-20 16:42:46,897 p=34064 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:46,941 p=34064 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 16:42:46,941 p=34064 u=zuul n=ansible | localhost : ok=2 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.753) 0:00:01.214 ******* 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | =============================================================================== 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | Create kustomize yaml to enable Horizon --------------------------------- 0.75s 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | Ensure the kustomizations dir exists ------------------------------------ 0.38s 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | Tuesday 20 January 2026 16:42:46 +0000 (0:00:00.753) 0:00:01.212 ******* 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | =============================================================================== 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | ansible.builtin.copy ---------------------------------------------------- 0.75s 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.38s 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 16:42:46,942 p=34064 u=zuul n=ansible | total ------------------------------------------------------------------- 1.13s home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_004_run_hook_without_retry_create.log0000644000175000017500000000513515133730263032642 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Deploy cluster-observability-operator] *********************************** TASK [Create the COO subscription _raw_params=oc create -f - < Or undo this operation with: git switch - Turn off this advice by setting config variable advice.detachedHead to false HEAD is now at 11e5091 Merge pull request #516 from lmiccini/transport_user_permissions cp /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr bash scripts/gen-service-kustomize.sh +++ dirname scripts/gen-service-kustomize.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only ++ set -e + '[' -z openstack ']' + '[' -z NetConfig ']' + '[' -z osp-secret ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + '[' -n '' ']' + REPLACEMENTS= + IMAGE=unused + IMAGE_PATH=containerImage + STORAGE_REQUEST=10G + INTERFACE_MTU=1500 + VLAN_START=20 + VLAN_STEP=1 + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ~/ci-framework-data/artifacts/manifests/openstack/infra/cr ~/src/github.com/openstack-k8s-operators/install_yamls + cat + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + IFS=, + read -ra IMAGES + IFS=, + read -ra IMAGE_PATHS + '[' 1 '!=' 1 ']' + (( i=0 )) + (( i < 1 )) + SPEC_PATH=containerImage + SPEC_VALUE=unused + '[' unused '!=' unused ']' + (( i++ )) + (( i < 1 )) + '[' -n '' ']' + '[' NetConfig == OpenStackControlPlane ']' + '[' NetConfig == Galera ']' + '[' NetConfig == NetConfig ']' + '[' -z true ']' + IPV6_SUBNET_INDEX=1 + VLAN_INTERNALAPI=20 + VLAN_STORAGE=21 + VLAN_TENANT=22 + VLAN_STORAGEMGMT=23 + cat + '[' -n true ']' + cat + REPLACEMENTS=' - source: kind: ConfigMap name: vlan-config fieldPath: data.internalapi targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=internalapi].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storage targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storage].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storagemgmt targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storagemgmt].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.tenant targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=tenant].subnets.0.vlan' + '[' -z true ']' + '[' -n '' ']' + '[' -n '' ']' + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ NetConfig == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + '[' -n ' - source: kind: ConfigMap name: vlan-config fieldPath: data.internalapi targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=internalapi].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storage targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storage].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.storagemgmt targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=storagemgmt].subnets.0.vlan - source: kind: ConfigMap name: vlan-config fieldPath: data.tenant targets: - select: kind: NetConfig fieldPaths: - spec.networks.[name=tenant].subnets.0.vlan' ']' + cat + kustomization_add_resources + echo merge config dir merge config dir ++ find . -type f -name '*.yaml' ++ grep -v kustomization + yamls='./network_v1beta1_netconfig.yaml ./vlan-config.yaml' + for y in ${yamls[@]} + kustomize edit add resource ./network_v1beta1_netconfig.yaml + for y in ${yamls[@]} + kustomize edit add resource ./vlan-config.yaml + popd ~/src/github.com/openstack-k8s-operators/install_yamls make wait make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-wait.sh + TIMEOUT=500s +++ dirname scripts/operator-wait.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + '[' -z openstack-operators ']' + '[' -z infra ']' + '[' infra = rabbitmq ']' + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + timeout 500s bash -c 'until [ "$(bash ./get-operator-status.sh)" == "Succeeded" ]; do sleep 5; done' + '[' -z openstack-operators ']' + '[' -z infra ']' + '[' infra = rabbitmq-cluster ']' + DEPL_NAME=infra-operator-controller-manager ++ oc get -n openstack-operators deployment infra-operator-controller-manager -o json ++ jq -e .status.availableReplicas + REPLICAS=1 + '[' 1 '!=' 1 ']' + echo Succeeded + exit 0 + rc=0 + popd ~/src/github.com/openstack-k8s-operators/install_yamls + exit 0 make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' bash scripts/operator-deploy-resources.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr ']' + NEXT_WAIT_TIME=0 + '[' 0 -eq 15 ']' + oc apply -f - + oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr netconfig.network.openstack.org/netconfig created + '[' 0 -lt 15 ']' ~/ci-framework-data/artifacts home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_016_check_for_oc.log0000644000175000017500000000002215133740625027063 0ustar zuulzuul/home/zuul/bin/oc home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_017_run_openstack_must_gather.log0000644000175000017500000041247715133746042031761 0ustar zuulzuul[must-gather ] OUT 2026-01-20T17:55:34.589864841Z Using must-gather plug-in image: quay.io/openstack-k8s-operators/openstack-must-gather:latest When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: ClientVersion: 4.20.8 ClusterVersion: Stable at "4.18.1" ClusterOperators: clusteroperator/machine-config is degraded because Failed to resync 4.18.1 because: error during syncRequiredMachineConfigPools: [context deadline exceeded, error MachineConfigPool master is not ready, retrying. Status: (pool degraded: true total: 1, ready 0, updated: 0, unavailable: 1)] clusteroperator/cloud-credential is missing clusteroperator/cluster-autoscaler is missing clusteroperator/insights is missing clusteroperator/monitoring is missing clusteroperator/storage is missing [must-gather ] OUT 2026-01-20T17:55:34.762168409Z namespace/openshift-must-gather-rvzk2 created [must-gather ] OUT 2026-01-20T17:55:34.774944767Z clusterrolebinding.rbac.authorization.k8s.io/must-gather-wjx85 created [must-gather ] OUT 2026-01-20T17:55:34.911210362Z pod for plug-in image quay.io/openstack-k8s-operators/openstack-must-gather:latest created [must-gather-l4p9s] POD 2026-01-20T17:55:40.634252392Z [disk usage checker] Started [must-gather-l4p9s] POD 2026-01-20T17:55:40.669450638Z [disk usage checker] Volume usage percentage: current = 49 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:55:43.266319861Z Trigger GMR for Service cinder [must-gather-l4p9s] POD 2026-01-20T17:55:43.483307816Z Trigger GMR for Nova services [must-gather-l4p9s] POD 2026-01-20T17:55:44.718222677Z Will retrieve SOS reports from nodes crc [must-gather-l4p9s] POD 2026-01-20T17:55:44.723697066Z Journal size limit not set or invalid: ignoring [must-gather-l4p9s] POD 2026-01-20T17:55:44.723757338Z Generating SOS Report for crc [must-gather-l4p9s] POD 2026-01-20T17:55:44.909038120Z Starting pod/crc-debug-4pkqc ... [must-gather-l4p9s] POD 2026-01-20T17:55:44.909038120Z To use host binaries, run `chroot /host` [must-gather-l4p9s] POD 2026-01-20T17:55:44.973240774Z Generating SOS Report for EDPM compute-0 [must-gather-l4p9s] POD 2026-01-20T17:55:44.976965685Z Generating SOS Report for EDPM compute-1 [must-gather-l4p9s] POD 2026-01-20T17:55:45.155330660Z Warning: Permanently added '192.168.122.100' (ED25519) to the list of known hosts. [must-gather-l4p9s] POD 2026-01-20T17:55:45.238461307Z Warning: Permanently added '192.168.122.101' (ED25519) to the list of known hosts. [must-gather-l4p9s] POD 2026-01-20T17:55:45.679019444Z [disk usage checker] Volume usage percentage: current = 49 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | ID | Binary | Host | Zone | Status | State | Updated At | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | 5d90735d-086f-475c-823c-8c0bb92b035e | nova-conductor | nova-cell0-conductor-0 | internal | enabled | up | 2026-01-20T17:55:42.000000 | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | d1f00796-2488-4315-b45c-da54aa012ec9 | nova-scheduler | nova-scheduler-0 | internal | enabled | up | 2026-01-20T17:55:42.000000 | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | 09e93910-e75b-4a22-b069-0ba46aa5595d | nova-conductor | nova-cell1-conductor-0 | internal | enabled | up | 2026-01-20T17:55:45.000000 | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | a768df7c-f5d8-48e7-b78f-676555f549b4 | nova-compute | compute-0.ctlplane.example.com | nova | enabled | up | 2026-01-20T17:55:43.000000 | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z | 82d77c60-2a58-4ced-9a5e-cff2a0829378 | nova-compute | compute-1.ctlplane.example.com | nova | enabled | up | 2026-01-20T17:55:44.000000 | [must-gather-l4p9s] POD 2026-01-20T17:55:46.196549240Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-l4p9s] POD 2026-01-20T17:55:46.433362952Z OMC mode: Collecting OLM resources (subscriptions, CSVs, etc.) in OMC format [must-gather-l4p9s] POD 2026-01-20T17:55:47.014357562Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.014357562Z sos report (version 4.10.1) [must-gather-l4p9s] POD 2026-01-20T17:55:47.014357562Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.047360899Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.047360899Z sos report (version 4.10.1) [must-gather-l4p9s] POD 2026-01-20T17:55:47.047360899Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z This command will collect diagnostic and configuration information from [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z this CentOS Linux system and installed applications. [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z An archive containing the collected information will be generated in [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z /var/tmp/sos-osp/sos.1bn8sl3y and may be provided to a CentOS support [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z representative. [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z Any information provided to CentOS will be treated in accordance with [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z the published support policies at: [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z Community Website : https://www.centos.org/ [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z The generated archive may contain data considered sensitive and its [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z content should be reviewed by the originating organization before being [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z passed to any third party. [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z No changes will be made to system configuration. [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.419709032Z Setting up archive ... [must-gather-l4p9s] POD 2026-01-20T17:55:47.437480485Z Setting up plugins ... [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z This command will collect diagnostic and configuration information from [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z this CentOS Linux system and installed applications. [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z An archive containing the collected information will be generated in [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z /var/tmp/sos-osp/sos.0xcn9gcd and may be provided to a CentOS support [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z representative. [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z Any information provided to CentOS will be treated in accordance with [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z the published support policies at: [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z Community Website : https://www.centos.org/ [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z The generated archive may contain data considered sensitive and its [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z content should be reviewed by the originating organization before being [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z passed to any third party. [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z No changes will be made to system configuration. [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z Setting up archive ... [must-gather-l4p9s] POD 2026-01-20T17:55:47.463134621Z Setting up plugins ... [must-gather-l4p9s] POD 2026-01-20T17:55:47.618275946Z Gathering data for ns/openstack... [must-gather-l4p9s] POD 2026-01-20T17:55:50.191821145Z [plugin:networking] skipped command 'ip -s macsec show': required kmods missing: macsec. Use '--allow-system-changes' to enable collection. [must-gather-l4p9s] POD 2026-01-20T17:55:50.340704360Z [plugin:openstack_neutron] Could not open conf file /etc/neutron/plugins/ml2/ml2_conf.ini: [Errno 2] No such file or directory: '/etc/neutron/plugins/ml2/ml2_conf.ini' [must-gather-l4p9s] POD 2026-01-20T17:55:50.340704360Z Not all environment variables set. Source the environment file for the user intended to connect to the OpenStack environment. [must-gather-l4p9s] POD 2026-01-20T17:55:50.550748735Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:55:50.665519662Z [plugin:networking] skipped command 'ip -s macsec show': required kmods missing: macsec. Use '--allow-system-changes' to enable collection. [must-gather-l4p9s] POD 2026-01-20T17:55:50.691268311Z [disk usage checker] Volume usage percentage: current = 49 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:55:50.841324016Z [plugin:openstack_neutron] Could not open conf file /etc/neutron/plugins/ml2/ml2_conf.ini: [Errno 2] No such file or directory: '/etc/neutron/plugins/ml2/ml2_conf.ini' [must-gather-l4p9s] POD 2026-01-20T17:55:50.841324016Z Not all environment variables set. Source the environment file for the user intended to connect to the OpenStack environment. [must-gather-l4p9s] POD 2026-01-20T17:55:50.884324345Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:55:51.119877923Z [plugin:systemd] skipped command 'systemd-resolve --status': required services missing: systemd-resolved. [must-gather-l4p9s] POD 2026-01-20T17:55:51.119877923Z [plugin:systemd] skipped command 'systemd-resolve --statistics': required services missing: systemd-resolved. [must-gather-l4p9s] POD 2026-01-20T17:55:51.472857770Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:55:51.501223201Z Gathering secrets in namespace openstack [must-gather-l4p9s] POD 2026-01-20T17:55:51.545857553Z Running plugins. Please wait ... [must-gather-l4p9s] POD 2026-01-20T17:55:51.545857553Z [must-gather-l4p9s] POD 2026-01-20T17:55:51.547218689Z Starting 1/77 anaconda [Running: anaconda] [must-gather-l4p9s] POD 2026-01-20T17:55:51.548499255Z Starting 2/77 anacron [Running: anaconda anacron] [must-gather-l4p9s] POD 2026-01-20T17:55:51.551320271Z Starting 4/77 auditd [Running: anaconda anacron auditd] [must-gather-l4p9s] POD 2026-01-20T17:55:51.552267217Z Starting 3/77 ata [Running: anaconda anacron auditd ata] [must-gather-l4p9s] POD 2026-01-20T17:55:51.555310419Z Starting 5/77 block [Running: anaconda anacron auditd block] [must-gather-l4p9s] POD 2026-01-20T17:55:51.559428952Z Starting 6/77 boot [Running: anaconda auditd block boot] [must-gather-l4p9s] POD 2026-01-20T17:55:51.568837007Z [plugin:systemd] skipped command 'systemd-resolve --status': required services missing: systemd-resolved. [must-gather-l4p9s] POD 2026-01-20T17:55:51.568919739Z [plugin:systemd] skipped command 'systemd-resolve --statistics': required services missing: systemd-resolved. [must-gather-l4p9s] POD 2026-01-20T17:55:51.615278039Z Starting 7/77 buildah [Running: auditd block boot buildah] [must-gather-l4p9s] POD 2026-01-20T17:55:51.694687415Z Starting 8/77 ceph_common [Running: block boot buildah ceph_common] [must-gather-l4p9s] POD 2026-01-20T17:55:51.794508197Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:55:51.824671825Z Starting 9/77 cgroups [Running: block boot buildah cgroups] [must-gather-l4p9s] POD 2026-01-20T17:55:52.052349840Z Running plugins. Please wait ... [must-gather-l4p9s] POD 2026-01-20T17:55:52.052349840Z [must-gather-l4p9s] POD 2026-01-20T17:55:52.056040840Z Starting 2/77 anacron [Running: anacron] [must-gather-l4p9s] POD 2026-01-20T17:55:52.057030276Z Starting 3/77 ata [Running: anacron ata] [must-gather-l4p9s] POD 2026-01-20T17:55:52.058131897Z Starting 4/77 auditd [Running: anacron auditd] [must-gather-l4p9s] POD 2026-01-20T17:55:52.059305078Z Starting 1/77 anaconda [Running: anacron auditd anaconda] [must-gather-l4p9s] POD 2026-01-20T17:55:52.060676826Z Starting 5/77 block [Running: anacron auditd anaconda block] [must-gather-l4p9s] POD 2026-01-20T17:55:52.064149360Z Starting 6/77 boot [Running: auditd anaconda block boot] [must-gather-l4p9s] POD 2026-01-20T17:55:52.149243391Z Starting 7/77 buildah [Running: auditd block boot buildah] [must-gather-l4p9s] POD 2026-01-20T17:55:52.178690741Z Starting 10/77 chrony [Running: boot buildah cgroups chrony] [must-gather-l4p9s] POD 2026-01-20T17:55:52.198132490Z Starting 11/77 console [Running: boot cgroups chrony console] [must-gather-l4p9s] POD 2026-01-20T17:55:52.239265016Z Starting 8/77 ceph_common [Running: block boot buildah ceph_common] [must-gather-l4p9s] POD 2026-01-20T17:55:52.373584484Z Starting 9/77 cgroups [Running: block boot buildah cgroups] [must-gather-l4p9s] POD 2026-01-20T17:55:52.419456851Z Starting 12/77 containers_common [Running: boot cgroups chrony containers_common] [must-gather-l4p9s] POD 2026-01-20T17:55:52.420146419Z Starting 13/77 coredump [Running: boot cgroups containers_common coredump] [must-gather-l4p9s] POD 2026-01-20T17:55:52.426421060Z Starting 14/77 cron [Running: boot cgroups containers_common cron] [must-gather-l4p9s] POD 2026-01-20T17:55:52.454228995Z Starting 15/77 crypto [Running: boot cgroups cron crypto] [must-gather-l4p9s] POD 2026-01-20T17:55:52.459775886Z Starting 16/77 dbus [Running: boot cgroups crypto dbus] [must-gather-l4p9s] POD 2026-01-20T17:55:52.525927663Z Starting 17/77 devicemapper [Running: boot cgroups crypto devicemapper] [must-gather-l4p9s] POD 2026-01-20T17:55:52.673520931Z Starting 18/77 devices [Running: boot cgroups devicemapper devices] [must-gather-l4p9s] POD 2026-01-20T17:55:52.741775965Z Starting 19/77 dnf [Running: boot cgroups devices dnf] [must-gather-l4p9s] POD 2026-01-20T17:55:52.762782785Z Starting 10/77 chrony [Running: block boot cgroups chrony] [must-gather-l4p9s] POD 2026-01-20T17:55:52.762782785Z Starting 11/77 console [Running: boot cgroups chrony console] [must-gather-l4p9s] POD 2026-01-20T17:55:52.789289406Z Starting 20/77 filesys [Running: boot cgroups dnf filesys] [must-gather-l4p9s] POD 2026-01-20T17:55:52.984943400Z Starting 12/77 containers_common [Running: boot cgroups chrony containers_common] [must-gather-l4p9s] POD 2026-01-20T17:55:53.011652085Z Starting 13/77 coredump [Running: boot cgroups chrony coredump] [must-gather-l4p9s] POD 2026-01-20T17:55:53.015720306Z Starting 14/77 cron [Running: boot cgroups chrony cron] [must-gather-l4p9s] POD 2026-01-20T17:55:53.057193962Z Starting 15/77 crypto [Running: boot cgroups cron crypto] [must-gather-l4p9s] POD 2026-01-20T17:55:53.060846282Z Starting 16/77 dbus [Running: boot cgroups crypto dbus] [must-gather-l4p9s] POD 2026-01-20T17:55:53.132531018Z Starting 17/77 devicemapper [Running: boot cgroups crypto devicemapper] [must-gather-l4p9s] POD 2026-01-20T17:55:53.228395412Z Starting 21/77 firewall_tables [Running: boot cgroups dnf firewall_tables] [must-gather-l4p9s] POD 2026-01-20T17:55:53.297811717Z Starting 18/77 devices [Running: boot cgroups crypto devices] [must-gather-l4p9s] POD 2026-01-20T17:55:53.307101721Z Starting 19/77 dnf [Running: boot cgroups devices dnf] [must-gather-l4p9s] POD 2026-01-20T17:55:53.410510658Z Starting 22/77 hardware [Running: boot cgroups dnf hardware] [must-gather-l4p9s] POD 2026-01-20T17:55:53.413199461Z Starting 20/77 filesys [Running: boot cgroups dnf filesys] [must-gather-l4p9s] POD 2026-01-20T17:55:53.912179865Z Starting 21/77 firewall_tables [Running: boot cgroups dnf firewall_tables] [must-gather-l4p9s] POD 2026-01-20T17:55:54.071624905Z Starting 22/77 hardware [Running: boot cgroups dnf hardware] [must-gather-l4p9s] POD 2026-01-20T17:55:54.453779065Z Starting 23/77 host [Running: boot cgroups dnf host] [must-gather-l4p9s] POD 2026-01-20T17:55:54.510093025Z Starting 24/77 i18n [Running: boot dnf host i18n] [must-gather-l4p9s] POD 2026-01-20T17:55:54.542326749Z Starting 25/77 iscsi [Running: boot dnf host iscsi] [must-gather-l4p9s] POD 2026-01-20T17:55:54.628710926Z Starting 26/77 kdump [Running: boot dnf host kdump] [must-gather-l4p9s] POD 2026-01-20T17:55:54.728705512Z Starting 27/77 kernel [Running: boot dnf kdump kernel] [must-gather-l4p9s] POD 2026-01-20T17:55:55.064475952Z Starting 23/77 host [Running: boot dnf hardware host] [must-gather-l4p9s] POD 2026-01-20T17:55:55.150133698Z Starting 24/77 i18n [Running: boot dnf host i18n] [must-gather-l4p9s] POD 2026-01-20T17:55:55.216363718Z Starting 25/77 iscsi [Running: boot dnf host iscsi] [must-gather-l4p9s] POD 2026-01-20T17:55:55.278221608Z Starting 26/77 kdump [Running: boot dnf host kdump] [must-gather-l4p9s] POD 2026-01-20T17:55:55.381987636Z Starting 27/77 kernel [Running: boot dnf kdump kernel] [must-gather-l4p9s] POD 2026-01-20T17:55:55.705522594Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:55:56.627927577Z Starting 28/77 keyutils [Running: boot dnf kdump keyutils] [must-gather-l4p9s] POD 2026-01-20T17:55:56.650309755Z Starting 29/77 krb5 [Running: boot dnf kdump krb5] [must-gather-l4p9s] POD 2026-01-20T17:55:56.665147328Z Starting 30/77 kvm [Running: boot dnf krb5 kvm] [must-gather-l4p9s] POD 2026-01-20T17:55:56.686557150Z Starting 31/77 ldap [Running: boot dnf kvm ldap] [must-gather-l4p9s] POD 2026-01-20T17:55:56.715201637Z Starting 32/77 libraries [Running: boot dnf kvm libraries] [must-gather-l4p9s] POD 2026-01-20T17:55:56.715201637Z Starting 33/77 libvirt [Running: boot dnf kvm libvirt] [must-gather-l4p9s] POD 2026-01-20T17:55:56.806451356Z Starting 34/77 login [Running: boot dnf kvm login] [must-gather-l4p9s] POD 2026-01-20T17:55:57.146251605Z Starting 35/77 logrotate [Running: boot dnf kvm logrotate] [must-gather-l4p9s] POD 2026-01-20T17:55:57.184894535Z Starting 36/77 logs [Running: boot dnf kvm logs] [must-gather-l4p9s] POD 2026-01-20T17:55:57.298236283Z Starting 28/77 keyutils [Running: boot dnf kdump keyutils] [must-gather-l4p9s] POD 2026-01-20T17:55:57.322518223Z Starting 29/77 krb5 [Running: boot dnf kdump krb5] [must-gather-l4p9s] POD 2026-01-20T17:55:57.332274828Z Starting 30/77 kvm [Running: boot dnf krb5 kvm] [must-gather-l4p9s] POD 2026-01-20T17:55:57.358215913Z Starting 31/77 ldap [Running: boot dnf kvm ldap] [must-gather-l4p9s] POD 2026-01-20T17:55:57.379616483Z Starting 32/77 libraries [Running: boot dnf kvm libraries] [must-gather-l4p9s] POD 2026-01-20T17:55:57.383655964Z Starting 33/77 libvirt [Running: boot dnf kvm libvirt] [must-gather-l4p9s] POD 2026-01-20T17:55:57.455773362Z Starting 34/77 login [Running: boot dnf kvm login] [must-gather-l4p9s] POD 2026-01-20T17:55:57.512687658Z Starting 37/77 lvm2 [Running: dnf kvm logs lvm2] [must-gather-l4p9s] POD 2026-01-20T17:55:57.767198051Z Starting 35/77 logrotate [Running: boot dnf kvm logrotate] [must-gather-l4p9s] POD 2026-01-20T17:55:57.815675038Z Starting 36/77 logs [Running: boot dnf kvm logs] [must-gather-l4p9s] POD 2026-01-20T17:55:57.819205563Z Starting 38/77 md [Running: dnf kvm logs md] [must-gather-l4p9s] POD 2026-01-20T17:55:57.844999204Z Starting 39/77 memory [Running: dnf kvm logs memory] [must-gather-l4p9s] POD 2026-01-20T17:55:57.982284552Z Starting 37/77 lvm2 [Running: dnf kvm logs lvm2] [must-gather-l4p9s] POD 2026-01-20T17:55:58.018390283Z Starting 40/77 multipath [Running: dnf kvm logs multipath] [must-gather-l4p9s] POD 2026-01-20T17:55:58.127528538Z Starting 41/77 networking [Running: dnf kvm logs networking] [must-gather-l4p9s] POD 2026-01-20T17:55:58.269845103Z Starting 38/77 md [Running: dnf kvm logs md] [must-gather-l4p9s] POD 2026-01-20T17:55:58.297415142Z Starting 39/77 memory [Running: dnf kvm logs memory] [must-gather-l4p9s] POD 2026-01-20T17:55:58.461244552Z Starting 40/77 multipath [Running: dnf kvm logs multipath] [must-gather-l4p9s] POD 2026-01-20T17:55:58.552295485Z Starting 41/77 networking [Running: dnf kvm logs networking] [must-gather-l4p9s] POD 2026-01-20T17:55:59.376481641Z Starting 42/77 networkmanager [Running: dnf logs networking networkmanager] [must-gather-l4p9s] POD 2026-01-20T17:55:59.437342754Z Starting 43/77 nfs [Running: dnf networking networkmanager nfs] [must-gather-l4p9s] POD 2026-01-20T17:55:59.915135251Z Trying to pull registry.redhat.io/rhel9/support-tools:latest... [must-gather-l4p9s] POD 2026-01-20T17:55:59.915135251Z Starting 44/77 numa [Running: dnf networking networkmanager numa] [must-gather-l4p9s] POD 2026-01-20T17:56:00.043115937Z Starting 45/77 nvme [Running: dnf networking networkmanager nvme] [must-gather-l4p9s] POD 2026-01-20T17:56:00.096946739Z Starting 42/77 networkmanager [Running: dnf kvm networking networkmanager] [must-gather-l4p9s] POD 2026-01-20T17:56:00.137552212Z Starting 46/77 openhpi [Running: dnf networking networkmanager openhpi] [must-gather-l4p9s] POD 2026-01-20T17:56:00.138401465Z Starting 47/77 openstack_edpm [Running: dnf networking networkmanager openstack_edpm] [must-gather-l4p9s] POD 2026-01-20T17:56:00.149105816Z Starting 48/77 openstack_neutron [Running: dnf networking networkmanager openstack_neutron] [must-gather-l4p9s] POD 2026-01-20T17:56:00.151447400Z Starting 49/77 openstack_nova [Running: dnf networking networkmanager openstack_nova] [must-gather-l4p9s] POD 2026-01-20T17:56:00.172175662Z Starting 50/77 openvswitch [Running: dnf networking networkmanager openvswitch] [must-gather-l4p9s] POD 2026-01-20T17:56:00.207190044Z Starting 43/77 nfs [Running: dnf networking networkmanager nfs] [must-gather-l4p9s] POD 2026-01-20T17:56:00.645220031Z Starting 44/77 numa [Running: dnf networking networkmanager numa] [must-gather-l4p9s] POD 2026-01-20T17:56:00.712904289Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:00.761188230Z Starting 45/77 nvme [Running: dnf networking networkmanager nvme] [must-gather-l4p9s] POD 2026-01-20T17:56:00.848530104Z Starting 46/77 openhpi [Running: dnf networking networkmanager openhpi] [must-gather-l4p9s] POD 2026-01-20T17:56:00.849217342Z Starting 47/77 openstack_edpm [Running: dnf networking networkmanager openstack_edpm] [must-gather-l4p9s] POD 2026-01-20T17:56:00.870534270Z Starting 48/77 openstack_neutron [Running: dnf networking networkmanager openstack_neutron] [must-gather-l4p9s] POD 2026-01-20T17:56:00.873159262Z Starting 49/77 openstack_nova [Running: dnf networking networkmanager openstack_nova] [must-gather-l4p9s] POD 2026-01-20T17:56:00.878584409Z Starting 50/77 openvswitch [Running: dnf networking networkmanager openvswitch] [must-gather-l4p9s] POD 2026-01-20T17:56:01.080248046Z Starting 51/77 ovn_host [Running: dnf networking openvswitch ovn_host] [must-gather-l4p9s] POD 2026-01-20T17:56:01.191807017Z Starting 52/77 pam [Running: dnf networking openvswitch pam] [must-gather-l4p9s] POD 2026-01-20T17:56:01.351652248Z Starting 53/77 pci [Running: dnf networking openvswitch pci] [must-gather-l4p9s] POD 2026-01-20T17:56:01.419726227Z Starting 54/77 podman [Running: dnf networking openvswitch podman] [must-gather-l4p9s] POD 2026-01-20T17:56:01.461331057Z Getting image source signatures [must-gather-l4p9s] POD 2026-01-20T17:56:01.696392072Z Starting 51/77 ovn_host [Running: dnf networking openvswitch ovn_host] [must-gather-l4p9s] POD 2026-01-20T17:56:01.829156218Z Starting 52/77 pam [Running: dnf networking openvswitch pam] [must-gather-l4p9s] POD 2026-01-20T17:56:01.966728755Z Starting 53/77 pci [Running: dnf networking openvswitch pci] [must-gather-l4p9s] POD 2026-01-20T17:56:02.026994511Z Checking if image destination supports signatures [must-gather-l4p9s] POD 2026-01-20T17:56:02.026994511Z Copying blob sha256:b98104ab0e1239a911fc1ca3c8589101c7fa3eb521b2c4b1fb1120038f55fbe9 [must-gather-l4p9s] POD 2026-01-20T17:56:02.026994511Z Copying blob sha256:34b5c851d9cf523f162ceb72c260f1c6d1e556f8f4422e15258572766f2afc28 [must-gather-l4p9s] POD 2026-01-20T17:56:02.027048982Z Starting 54/77 podman [Running: dnf networking openvswitch podman] [must-gather-l4p9s] POD 2026-01-20T17:56:03.422412232Z Starting 55/77 process [Running: dnf networking podman process] [must-gather-l4p9s] POD 2026-01-20T17:56:03.872251381Z Starting 55/77 process [Running: dnf networking podman process] [must-gather-l4p9s] POD 2026-01-20T17:56:03.888663296Z Starting 56/77 processor [Running: dnf networking process processor] [must-gather-l4p9s] POD 2026-01-20T17:56:04.382175751Z Starting 57/77 python [Running: dnf process processor python] [must-gather-l4p9s] POD 2026-01-20T17:56:04.552781984Z Starting 58/77 release [Running: process processor python release] [must-gather-l4p9s] POD 2026-01-20T17:56:04.608283642Z Starting 59/77 rpm [Running: process processor python rpm] [must-gather-l4p9s] POD 2026-01-20T17:56:04.818391519Z Starting 56/77 processor [Running: dnf podman process processor] [must-gather-l4p9s] POD 2026-01-20T17:56:04.833052807Z Starting 57/77 python [Running: dnf process processor python] [must-gather-l4p9s] POD 2026-01-20T17:56:05.152327609Z Starting 60/77 sar [Running: process processor rpm sar] [must-gather-l4p9s] POD 2026-01-20T17:56:05.152966986Z Starting 61/77 scsi [Running: process processor rpm scsi] [must-gather-l4p9s] POD 2026-01-20T17:56:05.172704212Z Starting 62/77 selinux [Running: process processor scsi selinux] [must-gather-l4p9s] POD 2026-01-20T17:56:05.472663019Z Copying config sha256:907c6f8a1bbc29560332663e8e9c85244e317088310a19891a847689ebec5226 [must-gather-l4p9s] POD 2026-01-20T17:56:05.487407669Z Writing manifest to image destination [must-gather-l4p9s] POD 2026-01-20T17:56:05.487407669Z Storing signatures [must-gather-l4p9s] POD 2026-01-20T17:56:05.558187402Z 907c6f8a1bbc29560332663e8e9c85244e317088310a19891a847689ebec5226 [must-gather-l4p9s] POD 2026-01-20T17:56:05.569655974Z Starting 63/77 services [Running: processor scsi selinux services] [must-gather-l4p9s] POD 2026-01-20T17:56:05.579807669Z .toolboxrc file detected, overriding defaults... [must-gather-l4p9s] POD 2026-01-20T17:56:05.582964776Z Starting 58/77 release [Running: dnf processor python release] [must-gather-l4p9s] POD 2026-01-20T17:56:05.601050146Z Starting 59/77 rpm [Running: dnf processor python rpm] [must-gather-l4p9s] POD 2026-01-20T17:56:05.629474348Z Starting 60/77 sar [Running: processor python rpm sar] [must-gather-l4p9s] POD 2026-01-20T17:56:05.630172897Z Starting 61/77 scsi [Running: processor python rpm scsi] [must-gather-l4p9s] POD 2026-01-20T17:56:05.657494569Z Starting 64/77 ssh [Running: processor selinux services ssh] [must-gather-l4p9s] POD 2026-01-20T17:56:05.688223794Z Starting 65/77 sudo [Running: processor selinux ssh sudo] [must-gather-l4p9s] POD 2026-01-20T17:56:05.694198956Z Starting 66/77 sunrpc [Running: processor selinux ssh sunrpc] [must-gather-l4p9s] POD 2026-01-20T17:56:05.698566885Z Starting 62/77 selinux [Running: processor rpm scsi selinux] [must-gather-l4p9s] POD 2026-01-20T17:56:05.705534314Z Starting 67/77 system [Running: processor selinux sunrpc system] [must-gather-l4p9s] POD 2026-01-20T17:56:05.725261460Z Checking if there is a newer version of registry.redhat.io/rhel9/support-tools available... [must-gather-l4p9s] POD 2026-01-20T17:56:05.725394733Z Starting 68/77 systemd [Running: processor selinux system systemd] [must-gather-l4p9s] POD 2026-01-20T17:56:05.725513376Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:06.050556196Z Starting 63/77 services [Running: processor rpm selinux services] [must-gather-l4p9s] POD 2026-01-20T17:56:06.053302560Z Starting 64/77 ssh [Running: processor selinux services ssh] [must-gather-l4p9s] POD 2026-01-20T17:56:06.110566805Z Starting 65/77 sudo [Running: processor selinux services sudo] [must-gather-l4p9s] POD 2026-01-20T17:56:06.118288995Z Starting 66/77 sunrpc [Running: processor selinux services sunrpc] [must-gather-l4p9s] POD 2026-01-20T17:56:06.149492763Z Starting 67/77 system [Running: processor selinux services system] [must-gather-l4p9s] POD 2026-01-20T17:56:06.180919926Z Starting 68/77 systemd [Running: processor selinux system systemd] [must-gather-l4p9s] POD 2026-01-20T17:56:08.021251232Z Starting 69/77 sysvipc [Running: processor selinux systemd sysvipc] [must-gather-l4p9s] POD 2026-01-20T17:56:08.068022902Z Starting 70/77 tpm2 [Running: processor selinux systemd tpm2] [must-gather-l4p9s] POD 2026-01-20T17:56:08.186476449Z Starting 71/77 tuned [Running: processor selinux systemd tuned] [must-gather-l4p9s] POD 2026-01-20T17:56:08.266587136Z Starting 69/77 sysvipc [Running: processor selinux systemd sysvipc] [must-gather-l4p9s] POD 2026-01-20T17:56:08.317696924Z Starting 70/77 tpm2 [Running: processor selinux systemd tpm2] [must-gather-l4p9s] POD 2026-01-20T17:56:08.454812398Z Starting 71/77 tuned [Running: processor selinux systemd tuned] [must-gather-l4p9s] POD 2026-01-20T17:56:08.934751643Z Spawning a container 'toolbox-osp' with image 'registry.redhat.io/rhel9/support-tools' [must-gather-l4p9s] POD 2026-01-20T17:56:08.934751643Z Detected RUN label in the container image. Using that as the default... [must-gather-l4p9s] POD 2026-01-20T17:56:09.143308108Z Starting 72/77 udev [Running: processor selinux systemd udev] [must-gather-l4p9s] POD 2026-01-20T17:56:09.212833785Z Starting 73/77 unbound [Running: processor selinux systemd unbound] [must-gather-l4p9s] POD 2026-01-20T17:56:09.213310849Z Starting 74/77 vhostmd [Running: processor selinux systemd vhostmd] [must-gather-l4p9s] POD 2026-01-20T17:56:09.214027538Z Starting 75/77 virsh [Running: processor selinux systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:09.345787747Z Starting 72/77 udev [Running: processor selinux systemd udev] [must-gather-l4p9s] POD 2026-01-20T17:56:09.377033956Z Starting 73/77 unbound [Running: processor selinux systemd unbound] [must-gather-l4p9s] POD 2026-01-20T17:56:09.377585000Z Starting 74/77 vhostmd [Running: processor selinux systemd vhostmd] [must-gather-l4p9s] POD 2026-01-20T17:56:09.378356811Z Starting 75/77 virsh [Running: processor selinux systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:09.498881775Z a78e0f6b4ecc441418d9663ab6234d9593110a891db8469c2ee69f8437e30615 [must-gather-l4p9s] POD 2026-01-20T17:56:09.546235721Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:10.284008940Z toolbox-osp [must-gather-l4p9s] POD 2026-01-20T17:56:10.451774917Z sos report --batch --all-logs --only-plugins block,cifs,crio,devicemapper,devices,firewall_tables,firewalld,iscsi,lvm2,memory,multipath,nfs,nis,nvme,podman,process,processor,selinux,scsi,udev,logs,crypto --tmp-dir=/var/tmp/sos-osp; exit [must-gather-l4p9s] POD 2026-01-20T17:56:10.654709049Z Starting 76/77 xen [Running: processor systemd virsh xen] [must-gather-l4p9s] POD 2026-01-20T17:56:10.654709049Z Finishing plugins [Running: processor systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:10.654709049Z Starting 77/77 xfs [Running: processor systemd virsh xfs] [must-gather-l4p9s] POD 2026-01-20T17:56:10.665420960Z Starting 76/77 xen [Running: processor systemd virsh xen] [must-gather-l4p9s] POD 2026-01-20T17:56:10.665568494Z Finishing plugins [Running: processor systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:10.666012246Z Starting 77/77 xfs [Running: processor systemd virsh xfs] [must-gather-l4p9s] POD 2026-01-20T17:56:10.754882430Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:10.883860553Z Finishing plugins [Running: processor systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:10.920200830Z Finishing plugins [Running: processor systemd virsh] [must-gather-l4p9s] POD 2026-01-20T17:56:11.363888380Z Finishing plugins [Running: processor systemd] [must-gather-l4p9s] POD 2026-01-20T17:56:11.570760009Z Finishing plugins [Running: processor systemd] [must-gather-l4p9s] POD 2026-01-20T17:56:11.894406130Z Gathering data for ns/metallb-system... [must-gather-l4p9s] POD 2026-01-20T17:56:12.017851443Z Finishing plugins [Running: processor] [must-gather-l4p9s] POD 2026-01-20T17:56:12.238937638Z Finishing plugins [Running: processor] [must-gather-l4p9s] POD 2026-01-20T17:56:12.747581523Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:13.904384843Z [?2004l temporary directory /var/tmp/sos-osp does not exist or is not writable [must-gather-l4p9s] POD 2026-01-20T17:56:13.929553517Z exit [must-gather-l4p9s] POD 2026-01-20T17:56:13.931805298Z [must-gather-l4p9s] POD 2026-01-20T17:56:14.371911452Z tar: Removing leading `/' from member names [must-gather-l4p9s] POD 2026-01-20T17:56:14.371911452Z tar: /var/log/pods/*/*.log.*: Warning: Cannot stat: No such file or directory [must-gather-l4p9s] POD 2026-01-20T17:56:14.512149561Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:15.135233394Z [must-gather-l4p9s] POD 2026-01-20T17:56:15.135233394Z Finished running plugins [must-gather-l4p9s] POD 2026-01-20T17:56:15.135233394Z [must-gather-l4p9s] POD 2026-01-20T17:56:15.623694792Z [must-gather-l4p9s] POD 2026-01-20T17:56:15.623694792Z Finished running plugins [must-gather-l4p9s] POD 2026-01-20T17:56:15.625249333Z [must-gather-l4p9s] POD 2026-01-20T17:56:15.765831502Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:16.103495023Z tar: Removing leading `/' from hard link targets [must-gather-l4p9s] POD 2026-01-20T17:56:16.910888493Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:20.782341275Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:25.789308570Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:30.801619530Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z Creating compressed archive... [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z Your sos report has been generated and saved in: [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z /var/tmp/sos-osp/sosreport-compute-0-2026-01-20-arvdqla.tar.xz [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z Size 16.93MiB [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z Owner root [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z sha256 f3a0d91f2bc6aeab489dbd09079f5204a39cceb12a0e7f0c2217a862a8a3c94a [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z Please send this file to your support representative. [must-gather-l4p9s] POD 2026-01-20T17:56:31.440626876Z [must-gather-l4p9s] POD 2026-01-20T17:56:31.455272793Z Retrieving SOS Report for compute-0 [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z Creating compressed archive... [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z Your sos report has been generated and saved in: [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z /var/tmp/sos-osp/sosreport-compute-1-2026-01-20-pyfdebp.tar.xz [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z Size 16.83MiB [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z Owner root [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z sha256 9aa90aee9aac25944267eb927d9e19f7f7a73759915ad163c71eba8b591f5400 [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z Please send this file to your support representative. [must-gather-l4p9s] POD 2026-01-20T17:56:32.055152917Z [must-gather-l4p9s] POD 2026-01-20T17:56:32.074127512Z Retrieving SOS Report for compute-1 [must-gather-l4p9s] POD 2026-01-20T17:56:32.652802510Z Finished retrieving SOS Report for compute-0 [must-gather-l4p9s] POD 2026-01-20T17:56:33.039318378Z Finished retrieving SOS Report for compute-1 [must-gather-l4p9s] POD 2026-01-20T17:56:34.489864396Z Error while masking key: prometheus.yaml.gz, for file: /must-gather/namespaces/openstack/secrets/metric-storage/prometheus-metric-storage.yaml [must-gather-l4p9s] POD 2026-01-20T17:56:35.526821361Z Gathering data for ns/openstack-operators... [must-gather-l4p9s] POD 2026-01-20T17:56:35.705774861Z Gathering secrets in namespace openstack-operators [must-gather-l4p9s] POD 2026-01-20T17:56:35.829400500Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:36.303662441Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:36.782842066Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:36.929781236Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:38.514982432Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:40.285756158Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:40.835854420Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:42.039837091Z Gathering data for ns/openshift-machine-api... [must-gather-l4p9s] POD 2026-01-20T17:56:42.440269857Z Gathering secrets in namespace openshift-machine-api [must-gather-l4p9s] POD 2026-01-20T17:56:42.534461416Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:43.132399786Z [must-gather-l4p9s] POD 2026-01-20T17:56:43.132399786Z Removing debug pod ... [must-gather-l4p9s] POD 2026-01-20T17:56:43.221789554Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:43.306553307Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:43.577790343Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:43.868926441Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:44.157162810Z Retrieving SOS Report for crc [must-gather-l4p9s] POD 2026-01-20T17:56:45.847141122Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:48.553939011Z Starting pod/crc-debug-kggcf ... [must-gather-l4p9s] POD 2026-01-20T17:56:48.553939011Z To use host binaries, run `chroot /host` [must-gather-l4p9s] POD 2026-01-20T17:56:50.142416136Z [must-gather-l4p9s] POD 2026-01-20T17:56:50.142416136Z Removing debug pod ... [must-gather-l4p9s] POD 2026-01-20T17:56:50.758000166Z Gathering data for ns/cert-manager... [must-gather-l4p9s] POD 2026-01-20T17:56:50.862100223Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:51.144754030Z Gathering secrets in namespace cert-manager [must-gather-l4p9s] POD 2026-01-20T17:56:51.362802592Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:51.832654034Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:52.174328644Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:52.270886277Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:52.459124940Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:55.875401669Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:56:56.580291605Z Gathering data for ns/openshift-nmstate... [must-gather-l4p9s] POD 2026-01-20T17:56:56.965670832Z Gathering secrets in namespace openshift-nmstate [must-gather-l4p9s] POD 2026-01-20T17:56:57.069481982Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:56:57.684054004Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:57.838711365Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:57.977518475Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:56:58.275758225Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:00.891890982Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:02.303481583Z Gathering data for ns/openshift-operators... [must-gather-l4p9s] POD 2026-01-20T17:57:02.618416576Z Gathering secrets in namespace openshift-operators [must-gather-l4p9s] POD 2026-01-20T17:57:02.785708500Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:57:03.834534797Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:04.252266014Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:04.494519194Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:04.614290337Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:05.898866117Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:09.522955221Z Gathering data for ns/metallb-system... [must-gather-l4p9s] POD 2026-01-20T17:57:09.898369878Z Gathering secrets in namespace metallb-system [must-gather-l4p9s] POD 2026-01-20T17:57:10.707309310Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:10.908728491Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:10.971480475Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:11.216537931Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:12.126581868Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:57:13.371194564Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:15.580452949Z Gathering data for ns/openshift-marketplace... [must-gather-l4p9s] POD 2026-01-20T17:57:15.921156773Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:15.949359209Z Gathering secrets in namespace openshift-marketplace [must-gather-l4p9s] POD 2026-01-20T17:57:16.752606516Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:16.955370053Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:17.174991689Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:17.690279904Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:57:19.806288377Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:20.932127747Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:21.221691061Z Gathering data for ns/openshift-operators... [must-gather-l4p9s] POD 2026-01-20T17:57:21.548018805Z Gathering secrets in namespace openshift-operators [must-gather-l4p9s] POD 2026-01-20T17:57:21.737626704Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:57:22.664836748Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:22.885972604Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:23.004903445Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:23.340235793Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:25.939932772Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:27.810866678Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:27.999138452Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:28.097665259Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:28.105551992Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:28.112543833Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:29.201240912Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:29.406452497Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:29.479216773Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:29.586343432Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:29.619088712Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:30.730310413Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:30.856178452Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:30.893414464Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:30.949836187Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:31.006766593Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:31.186156245Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:32.079454938Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:32.300421910Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:32.376227729Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:32.570221408Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:32.674029657Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:33.646226593Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:33.684412471Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:33.765284917Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:33.954032583Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:34.199670866Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.225277292Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.291193102Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.335376472Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.494595817Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.737408882Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:35.958267791Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:36.657861192Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:36.688167126Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:37.945021963Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:38.191610251Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:38.432402501Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:38.564379106Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:40.014664877Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:40.145049158Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:40.715366709Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:40.892125520Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:40.965472112Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:41.028063941Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:43.646706227Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:43.765102982Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:43.801575063Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:43.814759241Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:43.877425083Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:44.105069577Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:44.976925867Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:45.067986240Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:45.323405768Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:45.372934183Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:45.715530059Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:45.983327002Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:46.801946046Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:47.408703337Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:47.552794720Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:47.716845126Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:47.747200861Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:47.789433628Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:48.049377588Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:48.210115294Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.352141223Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.630538164Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.680159222Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.711601276Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.740070919Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:49.754490580Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.022172742Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:51.217513448Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.295876747Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.483872873Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.496825384Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.534476287Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.620238106Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.721636171Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.729307278Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:51.801745716Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:53.601097628Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:53.742780817Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:53.841990211Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:53.894066166Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:53.943273523Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:54.111341898Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:54.115538741Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:54.222842875Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:54.227033240Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:56.037554955Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:57:56.337486721Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:56.366094318Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:56.430803097Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:56.444058276Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:56.456218347Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:57.818247231Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:57.839160148Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:57.853105447Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:57.874274442Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:57.995486234Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.387149164Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.477457166Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.692053955Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.817809611Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.826607470Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.863112631Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:57:59.954532444Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.047884421Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:01.350907691Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.401475765Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.412581326Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.544690244Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.753713052Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:01.912545345Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:02.166950885Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:02.598510337Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:02.821302559Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:02.984289456Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:03.475941969Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:03.503984390Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:03.508439312Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:03.565851500Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:03.570000564Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:04.854942334Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:04.959692009Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:05.741607476Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:05.758337481Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:05.780629416Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:06.072120474Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:07.480378393Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:07.669370136Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:08.173366025Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:08.347475744Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:08.524067611Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:08.649893798Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:08.953558647Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:09.203821484Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:09.342216472Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:11.097756585Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:11.353949014Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:11.834775743Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:11.969859022Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.247944336Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.623348072Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.658481226Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.667941553Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.693649991Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:12.745647383Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:14.096004900Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:14.120311801Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:14.135184064Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:14.135559866Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:14.209857323Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:15.518032654Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:15.650890343Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:15.674764881Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:15.681429572Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:15.698029303Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:16.110439164Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:17.019031303Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:17.144709467Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:17.171030081Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:17.214202144Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:17.262242379Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:18.398406698Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:18.483535961Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:18.513937356Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:18.612504104Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:18.721402882Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:19.815323563Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:19.912284017Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:20.013404444Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:20.026441497Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:20.132717664Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:21.128366287Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:21.145225565Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:21.379415955Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:21.396815279Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:21.483522484Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:21.546336040Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:22.720983874Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:23.132350097Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:23.488978783Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:23.602292702Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:23.964578791Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:24.030275206Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:24.238193843Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:24.374625469Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:25.464026838Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:25.856174109Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:25.930598281Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:26.137587343Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:26.308443633Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:26.398401827Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:27.321800288Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:27.369638227Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:27.597455234Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:28.037214379Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:28.076086384Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:28.137138743Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:28.309559485Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:28.975561775Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:29.416347447Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:29.599456131Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:30.029765298Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:30.104689813Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:30.392260584Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:30.788985339Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:31.127674579Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:31.143341765Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:31.455627976Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:31.695610005Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:31.822161262Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:32.466978315Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:32.613692261Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.022122323Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.160056211Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.200502489Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.222756863Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.300027792Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:33.393470760Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:34.474751189Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:34.720648918Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:34.730325040Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:34.833421611Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:34.884762605Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:36.010845960Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:36.216283111Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:36.438171418Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:36.636555006Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:36.859508491Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:37.041684859Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:37.820222815Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:38.092134961Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:38.399933821Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:39.497523813Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:39.572584382Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:39.576116167Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:39.600430018Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:39.646337995Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:40.906326608Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:41.131021400Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:41.206473770Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:41.456274354Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:41.577259950Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:41.627115555Z Gathering data for ns/openshift-operators... [must-gather-l4p9s] POD 2026-01-20T17:58:41.809621892Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:41.863193546Z Gathering data for ns/cert-manager... [must-gather-l4p9s] POD 2026-01-20T17:58:42.139620175Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:42.194052853Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:58:42.380385524Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-l4p9s] POD 2026-01-20T17:58:42.614568235Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:42.661785227Z Gathering data for ns/metallb-system... [must-gather-l4p9s] POD 2026-01-20T17:58:42.772551116Z Gathering data for ns/openstack-operators... [must-gather-l4p9s] POD 2026-01-20T17:58:43.355675714Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:43.525615400Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:43.756929392Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:44.971187153Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:44.995974217Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:46.467511555Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:47.029848449Z Gathering data for ns/cert-manager... [must-gather-l4p9s] POD 2026-01-20T17:58:47.711068421Z Gathering data for ns/openshift-machine-api... [must-gather-l4p9s] POD 2026-01-20T17:58:47.929971267Z Gathering data for ns/openshift-nmstate... [must-gather-l4p9s] POD 2026-01-20T17:58:48.449722744Z Gathering data for ns/openstack-operators... [must-gather-l4p9s] POD 2026-01-20T17:58:49.898352690Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:51.478333434Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:58:52.619283163Z Gathering data for ns/openshift-monitoring... [must-gather-l4p9s] POD 2026-01-20T17:58:53.100623727Z Gathering data for ns/openshift-multus... [must-gather-l4p9s] POD 2026-01-20T17:58:55.250248803Z Wrote inspect data to /must-gather. [must-gather-l4p9s] POD 2026-01-20T17:58:56.486734267Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:01.497755652Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:06.512587589Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:11.527584753Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:16.547167859Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:21.566149000Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:27.442155509Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:32.455268800Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:37.463346902Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:42.949971747Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:47.957726220Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:52.967128627Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T17:59:57.976550984Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:03.661864971Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:08.668865362Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:13.681747833Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:18.695259792Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:23.705340518Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:29.237921083Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:34.249211041Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:39.258213137Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:44.270874363Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:49.284590417Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:54.297732356Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:00:59.308162001Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:04.319696126Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:09.331582461Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:14.347490354Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:19.358297140Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:24.370942284Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:29.381838952Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:34.389585074Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:39.399496345Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:44.410598299Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:49.421151196Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:54.436570087Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:01:59.449172441Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:05.232762637Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:10.243484900Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:15.252297501Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:20.263966110Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:25.278156687Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:30.289366524Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:35.302538583Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:40.835504508Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:45.845474231Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:50.858268010Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:02:55.871724267Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:00.884224909Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:05.895129017Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:10.905780757Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:15.915640047Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:20.923707078Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:25.932100827Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:30.940544258Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:35.950404728Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:41.738797765Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:46.761844493Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:51.762923993Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:03:56.774351956Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:01.783115805Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:06.791606168Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:11.803216675Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:16.814382330Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:21.825995037Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:26.842485956Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:31.856184880Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:36.866463971Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:41.876414463Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:46.975618560Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:51.985646595Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:04:56.996389638Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:02.008829768Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:07.018888732Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:12.030911100Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:17.041383537Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:22.052999054Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:27.062565795Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:32.070894343Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:37.083365184Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:42.094136118Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:47.104702286Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:52.114110593Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:05:57.123397308Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:02.135547239Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:07.146643582Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:12.153999383Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:17.162290770Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:22.173063554Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:27.182980046Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:32.193129862Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:37.203743823Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:42.213590511Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:47.223591285Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:52.236184349Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:06:57.251698592Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:02.265647152Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:07.277514606Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:12.289241876Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:17.303586368Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:22.322756761Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:27.336726422Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:32.357206920Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:37.366443292Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:42.436126118Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:47.449675137Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:52.459564008Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:07:57.469480598Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:02.478191317Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:07.493860884Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:12.573792988Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:17.582639650Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:22.590503784Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:27.600528929Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:32.612056444Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:37.621575504Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:42.633928581Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:47.645632810Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:52.656682292Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:08:57.671139937Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:02.677953313Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:07.686496507Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:12.696911242Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:17.711782977Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:22.724160245Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:27.746318139Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:32.759046856Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:37.771810185Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:42.785050196Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:47.796929430Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:52.806713628Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:09:57.821738288Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:02.831964277Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:07.842958297Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:12.852192030Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:17.861388721Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:22.869427691Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:27.879303801Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:32.887861415Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:37.896576343Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:42.906830344Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:47.914838952Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:52.927708274Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:10:57.936243568Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:02.948410700Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:07.961033924Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:12.971727526Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:17.984611768Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:22.996386859Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:28.010763281Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:33.024811965Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:38.036293788Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:43.047632778Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:48.092167990Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:53.114379714Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:11:58.125301253Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:03.135640516Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:08.212695541Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:13.223043793Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:18.246765580Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:23.258727517Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:28.272811991Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:33.286024511Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:38.297921896Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:43.308638729Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:48.318408876Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:53.356905684Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:12:58.366835095Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:03.377442805Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:08.387148390Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:13.401358028Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:18.411126894Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:23.422084554Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:28.434820041Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:33.447451646Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:38.459463464Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:43.469582560Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:48.479833681Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:53.492908097Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:13:58.504009881Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:03.513888921Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:08.523239757Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:13.533684522Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:18.543348457Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:23.551779546Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:28.563970320Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:33.583674586Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:38.596785194Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:43.607613840Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:48.619334880Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:53.631542273Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:14:58.642383720Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:03.656010571Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:08.669349675Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:13.689494254Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:18.702239452Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:23.714273540Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:28.725210969Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:33.735983384Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:38.749268446Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:43.760248106Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:48.773123228Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:53.791169450Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:15:58.799443526Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:03.810753564Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:08.820850751Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:13.832115109Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:18.843727156Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:23.859885556Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:28.870767563Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:33.879781990Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:38.889578757Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:43.897051532Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:48.912121673Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:53.921905810Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:16:58.929174744Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:03.944137270Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:08.973714933Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:13.976712975Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:18.984908538Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:23.995035614Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:29.002653530Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:34.031344659Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:39.046604854Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:44.068114408Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:49.079717274Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:54.090262050Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:17:59.099438479Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:04.108880956Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:09.122912797Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:14.136795393Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:19.148783830Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:24.161933077Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:29.174516838Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:34.184254243Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:39.193882815Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:44.202194261Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:49.213394095Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:54.228200948Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:18:59.241179950Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:04.251166732Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:09.260921178Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:14.272441029Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:19.288685690Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:24.301052056Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:29.310311348Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:34.323886777Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:39.335770900Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:44.355279349Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:49.366744390Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:54.377586535Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:19:59.387295368Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:04.399100109Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:09.410271143Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:14.421553689Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:19.435308003Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:24.445825207Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:29.455091330Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:34.466678363Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:39.485246308Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:44.500577945Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:49.514628826Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:54.524625319Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:20:59.548159797Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:04.561340355Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:09.571118772Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:14.585568014Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:19.593191571Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:24.603731238Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:29.614463199Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:34.645399199Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:39.654796744Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:44.662758661Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:49.672962649Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:54.683535426Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:21:59.696424536Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:04.704637939Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:09.717634573Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:14.725990380Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:19.745389536Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:24.755430019Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:29.769237905Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:34.778991920Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:39.791255733Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:44.810335681Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:49.829257494Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:54.835116524Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:22:59.845954259Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:04.855601191Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:09.865457749Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:14.876300463Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:19.887823006Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:24.898876947Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:29.911329145Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:34.923233508Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:39.939643194Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:44.950641643Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:49.962262079Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:54.976789033Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:23:59.994845153Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:05.007871808Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:10.020975763Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:15.031968602Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:20.038909681Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:25.049524900Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:30.056612202Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:35.065736800Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:40.073044279Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:45.097056961Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:50.108650456Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:24:55.206175893Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:00.217869211Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:05.228355265Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:10.247887736Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:15.265930336Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:20.278302883Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:25.290340430Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:30.299944981Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:35.312772599Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:40.324438766Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:45.332857605Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:50.339397663Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:25:55.350785292Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:00.359644363Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:05.373972052Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:10.388524888Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:15.401137661Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:20.410887656Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:25.422051429Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:30.435423512Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:35.444613751Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:40.458650963Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:45.472659944Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:50.482139181Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:26:55.493863730Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:00.505251879Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:05.515717924Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:10.527393611Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:15.537138676Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:20.551827264Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:25.564651243Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:30.575809506Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:35.587285078Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:40.598427161Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:45.610193540Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:50.622822364Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:27:55.631785417Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:00.662479730Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:05.698907218Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:10.707555324Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:15.715921522Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:20.879368217Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:25.889840062Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:30.900465359Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:35.911006556Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:40.921842141Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:45.933693943Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:50.945027551Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:28:55.956372918Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:00.971569772Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:05.985500999Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:10.999711215Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:16.015709970Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:21.027538462Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:26.049584851Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:31.064067744Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:36.176962147Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:41.183898456Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:46.191581015Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:51.203275913Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:29:56.216888152Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:01.246662031Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:06.276555622Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:11.291006814Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:16.300383549Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:21.310310240Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:26.336106368Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:31.349291516Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:36.360301545Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:41.371532951Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:46.382622982Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:51.394600128Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:30:56.407667742Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:01.416596085Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:06.431533622Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:11.445711227Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:16.456647883Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:21.469236696Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:26.480870812Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:31.493184647Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:36.529577955Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:41.541271103Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:46.556526917Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:51.577525347Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:31:56.585545485Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:01.611343105Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:06.619416825Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:11.627601207Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:16.637054325Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:21.652227757Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:26.661939630Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:31.671652744Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:36.679414366Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:41.687326881Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:46.695774731Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:51.707131669Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:32:56.714978862Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:01.737502414Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:06.746635622Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:11.757042165Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:16.768153487Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:21.780356159Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:26.791498911Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:31.804470724Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:36.815039501Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:41.826374269Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:46.839569178Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:51.863545439Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:33:56.876927443Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:01.889029441Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:06.901042718Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:11.921344469Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:16.929512952Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:21.941606527Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:26.966235670Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:31.981925702Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:36.994610263Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:42.004292283Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:47.021758563Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:52.034962648Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:34:57.043922999Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:02.174265194Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:07.183783680Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:12.193068589Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:17.251568943Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:22.266138544Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:27.277539691Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:32.371133467Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:37.371964629Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:42.384615620Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:47.393926470Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:52.406422226Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:35:57.419802466Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:02.432121486Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:07.445021633Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:12.456739018Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:17.468252097Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:22.477406523Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:27.492606813Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:32.506258719Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:37.521045807Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:42.534277743Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:47.544760915Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:52.579029807Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:36:57.605341364Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:02.600121693Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:07.614567642Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:12.617116661Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:17.625208916Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:22.639591973Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:27.651016800Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:32.661922003Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:37.676489725Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:42.687823390Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:47.702063583Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:52.711351533Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:37:57.724520666Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:02.738054711Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:07.750832254Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:12.761378367Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:17.771534390Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:22.779787722Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:27.791429425Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:32.799847401Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:37.808182645Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:42.822113050Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:47.838836659Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:52.850219335Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:38:57.864258042Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:02.888843994Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:07.900120076Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:12.910642478Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:17.988377269Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:23.005310984Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:28.024528830Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:33.034153720Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:38.047955330Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:43.065585215Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:48.076009164Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:53.085400546Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:39:58.103495493Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:03.116664017Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:08.129124111Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:13.140719123Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:18.149802087Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:23.159925790Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:28.170479094Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-l4p9s] POD 2026-01-20T18:40:33.181329325Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 The must gather command did not finish on time! 2700.0 seconds was not enough to finish the task. home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_013_run_nova_manage_discover.log0000644000175000017500000000330315133734333031515 0ustar zuulzuul+ oc rsh --namespace=openstack nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose 2026-01-20 17:18:19.070 841 WARNING oslo_policy.policy [None req-6c1868d2-f520-4a0e-9498-ec794d9e330c - - - - - -] JSON formatted policy_file support is deprecated since Victoria release. You need to use YAML format which will be default in future. You can use ``oslopolicy-convert-json-to-yaml`` tool to convert existing JSON-formatted policy file to YAML-formatted in backward compatible way: https://docs.openstack.org/oslo.policy/latest/cli/oslopolicy-convert-json-to-yaml.html. 2026-01-20 17:18:19.070 841 WARNING oslo_policy.policy [None req-6c1868d2-f520-4a0e-9498-ec794d9e330c - - - - - -] JSON formatted policy_file support is deprecated since Victoria release. You need to use YAML format which will be default in future. You can use ``oslopolicy-convert-json-to-yaml`` tool to convert existing JSON-formatted policy file to YAML-formatted in backward compatible way: https://docs.openstack.org/oslo.policy/latest/cli/oslopolicy-convert-json-to-yaml.html. Found 2 cell mappings. Skipping cell0 since it does not contain hosts. Getting computes from cell 'cell1': b53385a4-6266-4299-b7c3-993640766ced Checking host mapping for compute host 'compute-0.ctlplane.example.com': a079b688-36f9-4c80-ac3f-be6d0aed3b74 Creating host mapping for compute host 'compute-0.ctlplane.example.com': a079b688-36f9-4c80-ac3f-be6d0aed3b74 Checking host mapping for compute host 'compute-1.ctlplane.example.com': 7a702809-b226-4e49-b818-ff2a9a3b4d28 Creating host mapping for compute host 'compute-1.ctlplane.example.com': 7a702809-b226-4e49-b818-ff2a9a3b4d28 Found 2 unmapped computes in cell: b53385a4-6266-4299-b7c3-993640766ced home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_014_run_hook_without_retry.log0000644000175000017500000002331015133734374031322 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [Download tools] ********************************************************** TASK [download_tools : Install build dependencies name=['jq', 'skopeo', 'sqlite', 'httpd-tools', 'virt-install', 'gcc', 'python3-jinja2', 'xmlstarlet', 'openssl']] *** Tuesday 20 January 2026 17:18:23 +0000 (0:00:00.044) 0:00:00.044 ******* Tuesday 20 January 2026 17:18:23 +0000 (0:00:00.044) 0:00:00.044 ******* ok: [localhost] TASK [download_tools : Set opm download url suffix opm_url_suffix=latest/download] *** Tuesday 20 January 2026 17:18:25 +0000 (0:00:01.963) 0:00:02.008 ******* Tuesday 20 January 2026 17:18:25 +0000 (0:00:01.963) 0:00:02.007 ******* skipping: [localhost] TASK [download_tools : Set opm download url suffix opm_url_suffix=download/{{ opm_version }}] *** Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.044 ******* Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.043 ******* ok: [localhost] TASK [download_tools : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.080 ******* Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.080 ******* ok: [localhost] TASK [download_tools : Download opm url=https://github.com/operator-framework/operator-registry/releases/{{ opm_url_suffix }}/linux-amd64-opm, dest={{ lookup('env', 'HOME') }}/bin/opm, mode=0755, timeout=30] *** Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.381) 0:00:02.461 ******* Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.381) 0:00:02.461 ******* ok: [localhost] TASK [download_tools : Get version from sdk_version _sdk_version={{ sdk_version | regex_search('v(.*)', '\1') | first }}] *** Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.872) 0:00:03.334 ******* Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.872) 0:00:03.333 ******* ok: [localhost] TASK [download_tools : Set operator-sdk file for version < 1.3.0 _operator_sdk_file=operator-sdk-{{ sdk_version }}-x86_64-linux-gnu] *** Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.055) 0:00:03.389 ******* Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.055) 0:00:03.388 ******* skipping: [localhost] TASK [download_tools : Set operator-sdk file for version >= 1.3.0 _operator_sdk_file=operator-sdk_linux_amd64] *** Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.034) 0:00:03.423 ******* Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.034) 0:00:03.422 ******* ok: [localhost] TASK [download_tools : Download operator-sdk url=https://github.com/operator-framework/operator-sdk/releases/download/{{ sdk_version }}/{{ _operator_sdk_file }}, dest={{ lookup('env', 'HOME') }}/bin/operator-sdk, mode=0755, force=True, timeout=30] *** Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.035) 0:00:03.458 ******* Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.035) 0:00:03.457 ******* ok: [localhost] TASK [download_tools : Download and extract kustomize src=https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F{{ kustomize_version }}/kustomize_{{ kustomize_version }}_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True] *** Tuesday 20 January 2026 17:18:28 +0000 (0:00:01.398) 0:00:04.857 ******* Tuesday 20 January 2026 17:18:28 +0000 (0:00:01.398) 0:00:04.856 ******* ok: [localhost] TASK [download_tools : Download kubectl url=https://dl.k8s.io/release/{{ kubectl_version }}/bin/linux/amd64/kubectl, dest={{ lookup('env', 'HOME') }}/bin/kubectl, mode=0755, timeout=30] *** Tuesday 20 January 2026 17:18:29 +0000 (0:00:01.332) 0:00:06.189 ******* Tuesday 20 January 2026 17:18:29 +0000 (0:00:01.333) 0:00:06.189 ******* ok: [localhost] TASK [download_tools : Download kuttl url=https://github.com/kudobuilder/kuttl/releases/download/v{{ kuttl_version }}/kubectl-kuttl_{{ kuttl_version }}_linux_x86_64, dest={{ lookup('env', 'HOME') }}/bin/kubectl-kuttl, mode=0755, timeout=30] *** Tuesday 20 January 2026 17:18:29 +0000 (0:00:00.421) 0:00:06.611 ******* Tuesday 20 January 2026 17:18:29 +0000 (0:00:00.421) 0:00:06.610 ******* ok: [localhost] TASK [download_tools : Download chainsaw src=https://github.com/kyverno/chainsaw/releases/download/v{{ chainsaw_version }}/chainsaw_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, extra_opts=['--exclude', 'README.md', '--exclude', 'LICENSE']] *** Tuesday 20 January 2026 17:18:30 +0000 (0:00:00.540) 0:00:07.152 ******* Tuesday 20 January 2026 17:18:30 +0000 (0:00:00.540) 0:00:07.151 ******* ok: [localhost] TASK [download_tools : Download and extract yq src=https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, mode=0755] *** Tuesday 20 January 2026 17:18:32 +0000 (0:00:02.527) 0:00:09.680 ******* Tuesday 20 January 2026 17:18:32 +0000 (0:00:02.527) 0:00:09.679 ******* ok: [localhost] TASK [download_tools : Link yq_linux_amd64 as yq src={{ lookup('env', 'HOME') }}/bin/yq_linux_amd64, dest={{ lookup('env', 'HOME') }}/bin/yq, state=link] *** Tuesday 20 January 2026 17:18:34 +0000 (0:00:01.203) 0:00:10.883 ******* Tuesday 20 January 2026 17:18:34 +0000 (0:00:01.203) 0:00:10.883 ******* ok: [localhost] TASK [download_tools : Deinstall golang state=absent, name=['golang-bin', 'golang-src', 'golang']] *** Tuesday 20 January 2026 17:18:34 +0000 (0:00:00.250) 0:00:11.134 ******* Tuesday 20 January 2026 17:18:34 +0000 (0:00:00.250) 0:00:11.133 ******* ok: [localhost] TASK [download_tools : Delete old go version installed from upstream path={{ item }}, state=absent] *** Tuesday 20 January 2026 17:18:35 +0000 (0:00:01.425) 0:00:12.560 ******* Tuesday 20 January 2026 17:18:35 +0000 (0:00:01.425) 0:00:12.559 ******* changed: [localhost] => (item=/usr/local/go) ok: [localhost] => (item=/home/zuul/bin/go) ok: [localhost] => (item=/home/zuul/bin/gofmt) changed: [localhost] => (item=/usr/local/bin/go) changed: [localhost] => (item=/usr/local/bin/gofmt) TASK [download_tools : Download and extract golang src=https://golang.org/dl/go{{ go_version }}.linux-amd64.tar.gz, dest=/usr/local, remote_src=True, extra_opts=['--exclude', 'go/misc', '--exclude', 'go/pkg/linux_amd64_race', '--exclude', 'go/test']] *** Tuesday 20 January 2026 17:18:37 +0000 (0:00:02.117) 0:00:14.677 ******* Tuesday 20 January 2026 17:18:37 +0000 (0:00:02.117) 0:00:14.676 ******* changed: [localhost] TASK [download_tools : Set alternatives link to installed go version _raw_params=set -e update-alternatives --install /usr/local/bin/{{ item }} {{ item }} /usr/local/go/bin/{{ item }} 1 ] *** Tuesday 20 January 2026 17:18:52 +0000 (0:00:14.206) 0:00:28.884 ******* Tuesday 20 January 2026 17:18:52 +0000 (0:00:14.206) 0:00:28.883 ******* changed: [localhost] => (item=go) changed: [localhost] => (item=gofmt) TASK [download_tools : Clean bash cache msg=When move from rpm to upstream version, make sure to clean bash cache using `hash -d go`] *** Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.643) 0:00:29.527 ******* Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.643) 0:00:29.527 ******* ok: [localhost] => msg: When move from rpm to upstream version, make sure to clean bash cache using `hash -d go` PLAY RECAP ********************************************************************* localhost : ok=18 changed=3 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.064) 0:00:29.592 ******* =============================================================================== download_tools : Download and extract golang --------------------------- 14.21s download_tools : Download chainsaw -------------------------------------- 2.53s download_tools : Delete old go version installed from upstream ---------- 2.12s download_tools : Install build dependencies ----------------------------- 1.96s download_tools : Deinstall golang --------------------------------------- 1.43s download_tools : Download operator-sdk ---------------------------------- 1.40s download_tools : Download and extract kustomize ------------------------- 1.33s download_tools : Download and extract yq -------------------------------- 1.20s download_tools : Download opm ------------------------------------------- 0.87s download_tools : Set alternatives link to installed go version ---------- 0.64s download_tools : Download kuttl ----------------------------------------- 0.54s download_tools : Download kubectl --------------------------------------- 0.42s download_tools : Create $HOME/bin dir ----------------------------------- 0.38s download_tools : Link yq_linux_amd64 as yq ------------------------------ 0.25s download_tools : Clean bash cache --------------------------------------- 0.06s download_tools : Get version from sdk_version --------------------------- 0.06s download_tools : Set opm download url suffix ---------------------------- 0.04s download_tools : Set opm download url suffix ---------------------------- 0.04s download_tools : Set operator-sdk file for version >= 1.3.0 ------------- 0.04s download_tools : Set operator-sdk file for version < 1.3.0 -------------- 0.03s Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.065) 0:00:29.592 ******* =============================================================================== download_tools --------------------------------------------------------- 29.55s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------ 29.55s home/zuul/zuul-output/logs/ci-framework-data/logs/post_deploy_download_needed_tools.log0000644000175000017500000003671715133734374031036 0ustar zuulzuul2026-01-20 17:18:23,215 p=36415 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 17:18:23,216 p=36415 u=zuul n=ansible | PLAY [Download tools] ********************************************************** 2026-01-20 17:18:23,256 p=36415 u=zuul n=ansible | TASK [download_tools : Install build dependencies name=['jq', 'skopeo', 'sqlite', 'httpd-tools', 'virt-install', 'gcc', 'python3-jinja2', 'xmlstarlet', 'openssl']] *** 2026-01-20 17:18:23,256 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:23 +0000 (0:00:00.044) 0:00:00.044 ******* 2026-01-20 17:18:23,256 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:23 +0000 (0:00:00.044) 0:00:00.044 ******* 2026-01-20 17:18:25,203 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:25,219 p=36415 u=zuul n=ansible | TASK [download_tools : Set opm download url suffix opm_url_suffix=latest/download] *** 2026-01-20 17:18:25,220 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:01.963) 0:00:02.008 ******* 2026-01-20 17:18:25,220 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:01.963) 0:00:02.007 ******* 2026-01-20 17:18:25,245 p=36415 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:25,256 p=36415 u=zuul n=ansible | TASK [download_tools : Set opm download url suffix opm_url_suffix=download/{{ opm_version }}] *** 2026-01-20 17:18:25,256 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.044 ******* 2026-01-20 17:18:25,256 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.043 ******* 2026-01-20 17:18:25,281 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:25,292 p=36415 u=zuul n=ansible | TASK [download_tools : Create $HOME/bin dir path={{ lookup('env', 'HOME') }}/bin, state=directory, mode=0755] *** 2026-01-20 17:18:25,292 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.080 ******* 2026-01-20 17:18:25,292 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.036) 0:00:02.080 ******* 2026-01-20 17:18:25,663 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:25,673 p=36415 u=zuul n=ansible | TASK [download_tools : Download opm url=https://github.com/operator-framework/operator-registry/releases/{{ opm_url_suffix }}/linux-amd64-opm, dest={{ lookup('env', 'HOME') }}/bin/opm, mode=0755, timeout=30] *** 2026-01-20 17:18:25,673 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.381) 0:00:02.461 ******* 2026-01-20 17:18:25,673 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:25 +0000 (0:00:00.381) 0:00:02.461 ******* 2026-01-20 17:18:26,534 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:26,545 p=36415 u=zuul n=ansible | TASK [download_tools : Get version from sdk_version _sdk_version={{ sdk_version | regex_search('v(.*)', '\1') | first }}] *** 2026-01-20 17:18:26,545 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.872) 0:00:03.334 ******* 2026-01-20 17:18:26,545 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.872) 0:00:03.333 ******* 2026-01-20 17:18:26,585 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:26,600 p=36415 u=zuul n=ansible | TASK [download_tools : Set operator-sdk file for version < 1.3.0 _operator_sdk_file=operator-sdk-{{ sdk_version }}-x86_64-linux-gnu] *** 2026-01-20 17:18:26,600 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.055) 0:00:03.389 ******* 2026-01-20 17:18:26,600 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.055) 0:00:03.388 ******* 2026-01-20 17:18:26,622 p=36415 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:26,635 p=36415 u=zuul n=ansible | TASK [download_tools : Set operator-sdk file for version >= 1.3.0 _operator_sdk_file=operator-sdk_linux_amd64] *** 2026-01-20 17:18:26,635 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.034) 0:00:03.423 ******* 2026-01-20 17:18:26,635 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.034) 0:00:03.422 ******* 2026-01-20 17:18:26,659 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:26,670 p=36415 u=zuul n=ansible | TASK [download_tools : Download operator-sdk url=https://github.com/operator-framework/operator-sdk/releases/download/{{ sdk_version }}/{{ _operator_sdk_file }}, dest={{ lookup('env', 'HOME') }}/bin/operator-sdk, mode=0755, force=True, timeout=30] *** 2026-01-20 17:18:26,670 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.035) 0:00:03.458 ******* 2026-01-20 17:18:26,670 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:26 +0000 (0:00:00.035) 0:00:03.457 ******* 2026-01-20 17:18:28,058 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:28,068 p=36415 u=zuul n=ansible | TASK [download_tools : Download and extract kustomize src=https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F{{ kustomize_version }}/kustomize_{{ kustomize_version }}_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True] *** 2026-01-20 17:18:28,068 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:28 +0000 (0:00:01.398) 0:00:04.857 ******* 2026-01-20 17:18:28,068 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:28 +0000 (0:00:01.398) 0:00:04.856 ******* 2026-01-20 17:18:29,387 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:29,401 p=36415 u=zuul n=ansible | TASK [download_tools : Download kubectl url=https://dl.k8s.io/release/{{ kubectl_version }}/bin/linux/amd64/kubectl, dest={{ lookup('env', 'HOME') }}/bin/kubectl, mode=0755, timeout=30] *** 2026-01-20 17:18:29,401 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:29 +0000 (0:00:01.332) 0:00:06.189 ******* 2026-01-20 17:18:29,402 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:29 +0000 (0:00:01.333) 0:00:06.189 ******* 2026-01-20 17:18:29,813 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:29,823 p=36415 u=zuul n=ansible | TASK [download_tools : Download kuttl url=https://github.com/kudobuilder/kuttl/releases/download/v{{ kuttl_version }}/kubectl-kuttl_{{ kuttl_version }}_linux_x86_64, dest={{ lookup('env', 'HOME') }}/bin/kubectl-kuttl, mode=0755, timeout=30] *** 2026-01-20 17:18:29,823 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:29 +0000 (0:00:00.421) 0:00:06.611 ******* 2026-01-20 17:18:29,823 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:29 +0000 (0:00:00.421) 0:00:06.610 ******* 2026-01-20 17:18:30,352 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:30,363 p=36415 u=zuul n=ansible | TASK [download_tools : Download chainsaw src=https://github.com/kyverno/chainsaw/releases/download/v{{ chainsaw_version }}/chainsaw_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, extra_opts=['--exclude', 'README.md', '--exclude', 'LICENSE']] *** 2026-01-20 17:18:30,363 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:30 +0000 (0:00:00.540) 0:00:07.152 ******* 2026-01-20 17:18:30,364 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:30 +0000 (0:00:00.540) 0:00:07.151 ******* 2026-01-20 17:18:32,881 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:32,891 p=36415 u=zuul n=ansible | TASK [download_tools : Download and extract yq src=https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz, dest={{ lookup('env', 'HOME') }}/bin/, remote_src=True, mode=0755] *** 2026-01-20 17:18:32,891 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:32 +0000 (0:00:02.527) 0:00:09.680 ******* 2026-01-20 17:18:32,891 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:32 +0000 (0:00:02.527) 0:00:09.679 ******* 2026-01-20 17:18:34,082 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:34,095 p=36415 u=zuul n=ansible | TASK [download_tools : Link yq_linux_amd64 as yq src={{ lookup('env', 'HOME') }}/bin/yq_linux_amd64, dest={{ lookup('env', 'HOME') }}/bin/yq, state=link] *** 2026-01-20 17:18:34,095 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:34 +0000 (0:00:01.203) 0:00:10.883 ******* 2026-01-20 17:18:34,095 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:34 +0000 (0:00:01.203) 0:00:10.883 ******* 2026-01-20 17:18:34,298 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:34,346 p=36415 u=zuul n=ansible | TASK [download_tools : Deinstall golang state=absent, name=['golang-bin', 'golang-src', 'golang']] *** 2026-01-20 17:18:34,346 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:34 +0000 (0:00:00.250) 0:00:11.134 ******* 2026-01-20 17:18:34,346 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:34 +0000 (0:00:00.250) 0:00:11.133 ******* 2026-01-20 17:18:35,761 p=36415 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:35,771 p=36415 u=zuul n=ansible | TASK [download_tools : Delete old go version installed from upstream path={{ item }}, state=absent] *** 2026-01-20 17:18:35,771 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:35 +0000 (0:00:01.425) 0:00:12.560 ******* 2026-01-20 17:18:35,771 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:35 +0000 (0:00:01.425) 0:00:12.559 ******* 2026-01-20 17:18:36,978 p=36415 u=zuul n=ansible | changed: [localhost] => (item=/usr/local/go) 2026-01-20 17:18:37,181 p=36415 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/bin/go) 2026-01-20 17:18:37,423 p=36415 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/bin/gofmt) 2026-01-20 17:18:37,630 p=36415 u=zuul n=ansible | changed: [localhost] => (item=/usr/local/bin/go) 2026-01-20 17:18:37,834 p=36415 u=zuul n=ansible | changed: [localhost] => (item=/usr/local/bin/gofmt) 2026-01-20 17:18:37,889 p=36415 u=zuul n=ansible | TASK [download_tools : Download and extract golang src=https://golang.org/dl/go{{ go_version }}.linux-amd64.tar.gz, dest=/usr/local, remote_src=True, extra_opts=['--exclude', 'go/misc', '--exclude', 'go/pkg/linux_amd64_race', '--exclude', 'go/test']] *** 2026-01-20 17:18:37,889 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:37 +0000 (0:00:02.117) 0:00:14.677 ******* 2026-01-20 17:18:37,889 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:37 +0000 (0:00:02.117) 0:00:14.676 ******* 2026-01-20 17:18:52,076 p=36415 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:52,096 p=36415 u=zuul n=ansible | TASK [download_tools : Set alternatives link to installed go version _raw_params=set -e update-alternatives --install /usr/local/bin/{{ item }} {{ item }} /usr/local/go/bin/{{ item }} 1 ] *** 2026-01-20 17:18:52,096 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:14.206) 0:00:28.884 ******* 2026-01-20 17:18:52,096 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:14.206) 0:00:28.883 ******* 2026-01-20 17:18:52,509 p=36415 u=zuul n=ansible | changed: [localhost] => (item=go) 2026-01-20 17:18:52,724 p=36415 u=zuul n=ansible | changed: [localhost] => (item=gofmt) 2026-01-20 17:18:52,739 p=36415 u=zuul n=ansible | TASK [download_tools : Clean bash cache msg=When move from rpm to upstream version, make sure to clean bash cache using `hash -d go`] *** 2026-01-20 17:18:52,739 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.643) 0:00:29.527 ******* 2026-01-20 17:18:52,739 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.643) 0:00:29.527 ******* 2026-01-20 17:18:52,755 p=36415 u=zuul n=ansible | ok: [localhost] => msg: When move from rpm to upstream version, make sure to clean bash cache using `hash -d go` 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | localhost : ok=18 changed=3 unreachable=0 failed=0 skipped=2 rescued=0 ignored=0 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.064) 0:00:29.592 ******* 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download and extract golang --------------------------- 14.21s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download chainsaw -------------------------------------- 2.53s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Delete old go version installed from upstream ---------- 2.12s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Install build dependencies ----------------------------- 1.96s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Deinstall golang --------------------------------------- 1.43s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download operator-sdk ---------------------------------- 1.40s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download and extract kustomize ------------------------- 1.33s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download and extract yq -------------------------------- 1.20s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download opm ------------------------------------------- 0.87s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Set alternatives link to installed go version ---------- 0.64s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download kuttl ----------------------------------------- 0.54s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Download kubectl --------------------------------------- 0.42s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Create $HOME/bin dir ----------------------------------- 0.38s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Link yq_linux_amd64 as yq ------------------------------ 0.25s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Clean bash cache --------------------------------------- 0.06s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Get version from sdk_version --------------------------- 0.06s 2026-01-20 17:18:52,804 p=36415 u=zuul n=ansible | download_tools : Set opm download url suffix ---------------------------- 0.04s 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | download_tools : Set opm download url suffix ---------------------------- 0.04s 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | download_tools : Set operator-sdk file for version >= 1.3.0 ------------- 0.04s 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | download_tools : Set operator-sdk file for version < 1.3.0 -------------- 0.03s 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.065) 0:00:29.592 ******* 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | download_tools --------------------------------------------------------- 29.55s 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 17:18:52,805 p=36415 u=zuul n=ansible | total ------------------------------------------------------------------ 29.55s home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_000_check_for_oc.log0000644000175000017500000000002215133746123027053 0ustar zuulzuul/home/zuul/bin/oc home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_000_run_openstack_must_gather.log0000644000175000017500000041243515133753340031742 0ustar zuulzuul[must-gather ] OUT 2026-01-20T18:41:24.363836827Z Using must-gather plug-in image: quay.io/openstack-k8s-operators/openstack-must-gather:latest When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: ClientVersion: 4.20.8 ClusterVersion: Stable at "4.18.1" ClusterOperators: clusteroperator/machine-config is degraded because Failed to resync 4.18.1 because: error during syncRequiredMachineConfigPools: [context deadline exceeded, error MachineConfigPool master is not ready, retrying. Status: (pool degraded: true total: 1, ready 0, updated: 0, unavailable: 1)] clusteroperator/cloud-credential is missing clusteroperator/cluster-autoscaler is missing clusteroperator/insights is missing clusteroperator/monitoring is missing clusteroperator/storage is missing [must-gather ] OUT 2026-01-20T18:41:24.38953483Z namespace/openshift-must-gather-mblc8 created [must-gather ] OUT 2026-01-20T18:41:24.398252119Z clusterrolebinding.rbac.authorization.k8s.io/must-gather-5fn5w created [must-gather ] OUT 2026-01-20T18:41:24.438739789Z pod for plug-in image quay.io/openstack-k8s-operators/openstack-must-gather:latest created [must-gather-x8rsq] POD 2026-01-20T18:41:25.574378983Z [disk usage checker] Started [must-gather-x8rsq] POD 2026-01-20T18:41:25.598670756Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:28.419608551Z Trigger GMR for Service cinder [must-gather-x8rsq] POD 2026-01-20T18:41:28.625499828Z Trigger GMR for Nova services [must-gather-x8rsq] POD 2026-01-20T18:41:29.767803844Z Will retrieve SOS reports from nodes crc [must-gather-x8rsq] POD 2026-01-20T18:41:29.771815882Z Generating SOS Report for crc [must-gather-x8rsq] POD 2026-01-20T18:41:29.771876303Z Journal size limit not set or invalid: ignoring [must-gather-x8rsq] POD 2026-01-20T18:41:29.966112786Z Starting pod/crc-debug-mffrp ... [must-gather-x8rsq] POD 2026-01-20T18:41:29.966112786Z To use host binaries, run `chroot /host` [must-gather-x8rsq] POD 2026-01-20T18:41:29.969816766Z Generating SOS Report for EDPM compute-0 [must-gather-x8rsq] POD 2026-01-20T18:41:29.973186977Z Generating SOS Report for EDPM compute-1 [must-gather-x8rsq] POD 2026-01-20T18:41:30.271222201Z Warning: Permanently added '192.168.122.100' (ED25519) to the list of known hosts. [must-gather-x8rsq] POD 2026-01-20T18:41:30.327728671Z Warning: Permanently added '192.168.122.101' (ED25519) to the list of known hosts. [must-gather-x8rsq] POD 2026-01-20T18:41:30.613221717Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | ID | Binary | Host | Zone | Status | State | Updated At | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | 5d90735d-086f-475c-823c-8c0bb92b035e | nova-conductor | nova-cell0-conductor-0 | internal | enabled | up | 2026-01-20T18:41:23.000000 | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | d1f00796-2488-4315-b45c-da54aa012ec9 | nova-scheduler | nova-scheduler-0 | internal | enabled | up | 2026-01-20T18:41:23.000000 | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | 09e93910-e75b-4a22-b069-0ba46aa5595d | nova-conductor | nova-cell1-conductor-0 | internal | enabled | up | 2026-01-20T18:41:25.000000 | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | a768df7c-f5d8-48e7-b78f-676555f549b4 | nova-compute | compute-0.ctlplane.example.com | nova | enabled | up | 2026-01-20T18:41:24.000000 | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z | 82d77c60-2a58-4ced-9a5e-cff2a0829378 | nova-compute | compute-1.ctlplane.example.com | nova | enabled | up | 2026-01-20T18:41:24.000000 | [must-gather-x8rsq] POD 2026-01-20T18:41:31.296910012Z +--------------------------------------+----------------+--------------------------------+----------+---------+-------+----------------------------+ [must-gather-x8rsq] POD 2026-01-20T18:41:31.521311136Z OMC mode: Collecting OLM resources (subscriptions, CSVs, etc.) in OMC format [must-gather-x8rsq] POD 2026-01-20T18:41:31.910784399Z [must-gather-x8rsq] POD 2026-01-20T18:41:31.910784399Z sos report (version 4.10.1) [must-gather-x8rsq] POD 2026-01-20T18:41:31.910784399Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.158280084Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.158280084Z sos report (version 4.10.1) [must-gather-x8rsq] POD 2026-01-20T18:41:32.158280084Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z This command will collect diagnostic and configuration information from [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z this CentOS Linux system and installed applications. [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z An archive containing the collected information will be generated in [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z /var/tmp/sos-osp/sos.e72mgbx1 and may be provided to a CentOS support [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z representative. [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z Any information provided to CentOS will be treated in accordance with [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z the published support policies at: [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z Community Website : https://www.centos.org/ [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z The generated archive may contain data considered sensitive and its [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z content should be reviewed by the originating organization before being [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z passed to any third party. [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z No changes will be made to system configuration. [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.246221718Z Setting up archive ... [must-gather-x8rsq] POD 2026-01-20T18:41:32.248040348Z Setting up plugins ... [must-gather-x8rsq] POD 2026-01-20T18:41:32.506756294Z Gathering data for ns/openstack... [must-gather-x8rsq] POD 2026-01-20T18:41:32.544891970Z toolbox-osp [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z This command will collect diagnostic and configuration information from [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z this CentOS Linux system and installed applications. [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z An archive containing the collected information will be generated in [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z /var/tmp/sos-osp/sos.0m31drwg and may be provided to a CentOS support [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z representative. [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z Any information provided to CentOS will be treated in accordance with [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z the published support policies at: [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z Community Website : https://www.centos.org/ [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z The generated archive may contain data considered sensitive and its [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z content should be reviewed by the originating organization before being [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z passed to any third party. [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z No changes will be made to system configuration. [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z [must-gather-x8rsq] POD 2026-01-20T18:41:32.551850767Z Setting up archive ... [must-gather-x8rsq] POD 2026-01-20T18:41:32.564001794Z Setting up plugins ... [must-gather-x8rsq] POD 2026-01-20T18:41:32.709520357Z Trying to pull registry.redhat.io/rhel9/support-tools:latest... [must-gather-x8rsq] POD 2026-01-20T18:41:33.196608565Z Getting image source signatures [must-gather-x8rsq] POD 2026-01-20T18:41:33.788853900Z Checking if image destination supports signatures [must-gather-x8rsq] POD 2026-01-20T18:41:33.789403335Z Copying blob sha256:b98104ab0e1239a911fc1ca3c8589101c7fa3eb521b2c4b1fb1120038f55fbe9 [must-gather-x8rsq] POD 2026-01-20T18:41:33.789403335Z Copying blob sha256:34b5c851d9cf523f162ceb72c260f1c6d1e556f8f4422e15258572766f2afc28 [must-gather-x8rsq] POD 2026-01-20T18:41:33.789403335Z Copying config sha256:907c6f8a1bbc29560332663e8e9c85244e317088310a19891a847689ebec5226 [must-gather-x8rsq] POD 2026-01-20T18:41:33.804501071Z Writing manifest to image destination [must-gather-x8rsq] POD 2026-01-20T18:41:33.804501071Z Storing signatures [must-gather-x8rsq] POD 2026-01-20T18:41:33.818919939Z 907c6f8a1bbc29560332663e8e9c85244e317088310a19891a847689ebec5226 [must-gather-x8rsq] POD 2026-01-20T18:41:33.853219171Z .toolboxrc file detected, overriding defaults... [must-gather-x8rsq] POD 2026-01-20T18:41:34.005676350Z Checking if there is a newer version of registry.redhat.io/rhel9/support-tools available... [must-gather-x8rsq] POD 2026-01-20T18:41:34.641445106Z [plugin:networking] skipped command 'ip -s macsec show': required kmods missing: macsec. Use '--allow-system-changes' to enable collection. [must-gather-x8rsq] POD 2026-01-20T18:41:34.739914264Z [plugin:openstack_neutron] Could not open conf file /etc/neutron/plugins/ml2/ml2_conf.ini: [Errno 2] No such file or directory: '/etc/neutron/plugins/ml2/ml2_conf.ini' [must-gather-x8rsq] POD 2026-01-20T18:41:34.739914264Z Not all environment variables set. Source the environment file for the user intended to connect to the OpenStack environment. [must-gather-x8rsq] POD 2026-01-20T18:41:35.329589100Z [plugin:systemd] skipped command 'systemd-resolve --status': required services missing: systemd-resolved. [must-gather-x8rsq] POD 2026-01-20T18:41:35.329589100Z [plugin:systemd] skipped command 'systemd-resolve --statistics': required services missing: systemd-resolved. [must-gather-x8rsq] POD 2026-01-20T18:41:35.425428557Z [plugin:networking] skipped command 'ip -s macsec show': required kmods missing: macsec. Use '--allow-system-changes' to enable collection. [must-gather-x8rsq] POD 2026-01-20T18:41:35.599812967Z [plugin:openstack_neutron] Could not open conf file /etc/neutron/plugins/ml2/ml2_conf.ini: [Errno 2] No such file or directory: '/etc/neutron/plugins/ml2/ml2_conf.ini' [must-gather-x8rsq] POD 2026-01-20T18:41:35.599812967Z Not all environment variables set. Source the environment file for the user intended to connect to the OpenStack environment. [must-gather-x8rsq] POD 2026-01-20T18:41:35.621480179Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:35.699236500Z Running plugins. Please wait ... [must-gather-x8rsq] POD 2026-01-20T18:41:35.699236500Z [must-gather-x8rsq] POD 2026-01-20T18:41:35.700563255Z Starting 2/77 anacron [Running: anacron] [must-gather-x8rsq] POD 2026-01-20T18:41:35.701698566Z Starting 1/77 anaconda [Running: anacron anaconda] [must-gather-x8rsq] POD 2026-01-20T18:41:35.702325493Z Starting 3/77 ata [Running: anacron anaconda ata] [must-gather-x8rsq] POD 2026-01-20T18:41:35.702949380Z Starting 4/77 auditd [Running: anacron anaconda auditd] [must-gather-x8rsq] POD 2026-01-20T18:41:35.703300699Z Starting 5/77 block [Running: anacron anaconda auditd block] [must-gather-x8rsq] POD 2026-01-20T18:41:35.706216287Z Starting 6/77 boot [Running: anaconda auditd block boot] [must-gather-x8rsq] POD 2026-01-20T18:41:35.755207635Z Starting 7/77 buildah [Running: auditd block boot buildah] [must-gather-x8rsq] POD 2026-01-20T18:41:35.821835307Z Starting 8/77 ceph_common [Running: block boot buildah ceph_common] [must-gather-x8rsq] POD 2026-01-20T18:41:35.951220236Z Starting 9/77 cgroups [Running: block boot buildah cgroups] [must-gather-x8rsq] POD 2026-01-20T18:41:36.033463077Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:41:36.247949805Z Starting 10/77 chrony [Running: block boot cgroups chrony] [must-gather-x8rsq] POD 2026-01-20T18:41:36.283002647Z [plugin:systemd] skipped command 'systemd-resolve --status': required services missing: systemd-resolved. [must-gather-x8rsq] POD 2026-01-20T18:41:36.283002647Z [plugin:systemd] skipped command 'systemd-resolve --statistics': required services missing: systemd-resolved. [must-gather-x8rsq] POD 2026-01-20T18:41:36.317056474Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:41:36.439139056Z Starting 11/77 console [Running: block boot cgroups console] [must-gather-x8rsq] POD 2026-01-20T18:41:36.465667170Z Starting 12/77 containers_common [Running: boot cgroups console containers_common] [must-gather-x8rsq] POD 2026-01-20T18:41:36.487936759Z Starting 13/77 coredump [Running: boot cgroups console coredump] [must-gather-x8rsq] POD 2026-01-20T18:41:36.490893008Z Starting 14/77 cron [Running: boot cgroups console cron] [must-gather-x8rsq] POD 2026-01-20T18:41:36.526211217Z Starting 15/77 crypto [Running: boot cgroups console crypto] [must-gather-x8rsq] POD 2026-01-20T18:41:36.623073102Z Starting 16/77 dbus [Running: boot cgroups crypto dbus] [must-gather-x8rsq] POD 2026-01-20T18:41:36.677254239Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:41:36.677958478Z Starting 17/77 devicemapper [Running: boot cgroups crypto devicemapper] [must-gather-x8rsq] POD 2026-01-20T18:41:36.688386228Z Gathering secrets in namespace openstack [must-gather-x8rsq] POD 2026-01-20T18:41:36.721823497Z Running plugins. Please wait ... [must-gather-x8rsq] POD 2026-01-20T18:41:36.721823497Z [must-gather-x8rsq] POD 2026-01-20T18:41:36.723857763Z Starting 1/77 anaconda [Running: anaconda] [must-gather-x8rsq] POD 2026-01-20T18:41:36.724144210Z Starting 2/77 anacron [Running: anaconda anacron] [must-gather-x8rsq] POD 2026-01-20T18:41:36.730379738Z Starting 4/77 auditd [Running: anaconda anacron auditd] [must-gather-x8rsq] POD 2026-01-20T18:41:36.730379738Z Starting 3/77 ata [Running: anaconda anacron auditd ata] [must-gather-x8rsq] POD 2026-01-20T18:41:36.730379738Z Starting 5/77 block [Running: anaconda anacron auditd block] [must-gather-x8rsq] POD 2026-01-20T18:41:36.732976067Z Starting 6/77 boot [Running: anaconda auditd block boot] [must-gather-x8rsq] POD 2026-01-20T18:41:36.767975929Z Starting 18/77 devices [Running: boot cgroups devicemapper devices] [must-gather-x8rsq] POD 2026-01-20T18:41:36.793273779Z Starting 7/77 buildah [Running: auditd block boot buildah] [must-gather-x8rsq] POD 2026-01-20T18:41:36.848812412Z Starting 19/77 dnf [Running: boot cgroups devices dnf] [must-gather-x8rsq] POD 2026-01-20T18:41:36.868800189Z Starting 8/77 ceph_common [Running: block boot buildah ceph_common] [must-gather-x8rsq] POD 2026-01-20T18:41:36.871139942Z Starting 20/77 filesys [Running: boot cgroups dnf filesys] [must-gather-x8rsq] POD 2026-01-20T18:41:36.892031985Z Spawning a container 'toolbox-osp' with image 'registry.redhat.io/rhel9/support-tools' [must-gather-x8rsq] POD 2026-01-20T18:41:36.892031985Z Detected RUN label in the container image. Using that as the default... [must-gather-x8rsq] POD 2026-01-20T18:41:36.976066494Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:41:36.998840357Z Starting 9/77 cgroups [Running: block boot buildah cgroups] [must-gather-x8rsq] POD 2026-01-20T18:41:37.078368345Z bb7ab73d2b8744d16c1ee65133f958f0a32e7457edfafff8380395d8bd70aebf [must-gather-x8rsq] POD 2026-01-20T18:41:37.298878405Z Starting 21/77 firewall_tables [Running: boot cgroups dnf firewall_tables] [must-gather-x8rsq] POD 2026-01-20T18:41:37.402997674Z Starting 10/77 chrony [Running: boot buildah cgroups chrony] [must-gather-x8rsq] POD 2026-01-20T18:41:37.437837892Z Starting 11/77 console [Running: boot cgroups chrony console] [must-gather-x8rsq] POD 2026-01-20T18:41:37.446638988Z Starting 22/77 hardware [Running: boot cgroups dnf hardware] [must-gather-x8rsq] POD 2026-01-20T18:41:37.622229679Z Starting 12/77 containers_common [Running: boot cgroups console containers_common] [must-gather-x8rsq] POD 2026-01-20T18:41:37.635032123Z Starting 13/77 coredump [Running: boot cgroups containers_common coredump] [must-gather-x8rsq] POD 2026-01-20T18:41:37.639889674Z Starting 14/77 cron [Running: boot cgroups containers_common cron] [must-gather-x8rsq] POD 2026-01-20T18:41:37.641345953Z Starting 15/77 crypto [Running: boot cgroups cron crypto] [must-gather-x8rsq] POD 2026-01-20T18:41:37.679489109Z Starting 16/77 dbus [Running: boot cgroups crypto dbus] [must-gather-x8rsq] POD 2026-01-20T18:41:37.761639608Z Starting 17/77 devicemapper [Running: boot cgroups crypto devicemapper] [must-gather-x8rsq] POD 2026-01-20T18:41:37.925631557Z Starting 18/77 devices [Running: boot cgroups crypto devices] [must-gather-x8rsq] POD 2026-01-20T18:41:37.945188453Z Starting 19/77 dnf [Running: boot cgroups devices dnf] [must-gather-x8rsq] POD 2026-01-20T18:41:38.060110943Z Starting 20/77 filesys [Running: boot cgroups dnf filesys] [must-gather-x8rsq] POD 2026-01-20T18:41:38.462251346Z Starting 21/77 firewall_tables [Running: boot cgroups dnf firewall_tables] [must-gather-x8rsq] POD 2026-01-20T18:41:38.494246437Z Starting 23/77 host [Running: boot cgroups dnf host] [must-gather-x8rsq] POD 2026-01-20T18:41:38.523944025Z Starting 24/77 i18n [Running: boot dnf host i18n] [must-gather-x8rsq] POD 2026-01-20T18:41:38.551184028Z Starting 25/77 iscsi [Running: boot dnf host iscsi] [must-gather-x8rsq] POD 2026-01-20T18:41:38.601205563Z Starting 22/77 hardware [Running: boot cgroups dnf hardware] [must-gather-x8rsq] POD 2026-01-20T18:41:38.676205720Z Starting 26/77 kdump [Running: boot dnf host kdump] [must-gather-x8rsq] POD 2026-01-20T18:41:38.763389704Z Starting 27/77 kernel [Running: boot dnf kdump kernel] [must-gather-x8rsq] POD 2026-01-20T18:41:38.850633600Z toolbox-osp [must-gather-x8rsq] POD 2026-01-20T18:41:39.017357622Z sos report --batch --all-logs --only-plugins block,cifs,crio,devicemapper,devices,firewall_tables,firewalld,iscsi,lvm2,memory,multipath,nfs,nis,nvme,podman,process,processor,selinux,scsi,udev,logs,crypto --tmp-dir=/var/tmp/sos-osp; exit [must-gather-x8rsq] POD 2026-01-20T18:41:39.662094360Z Starting 23/77 host [Running: boot cgroups dnf host] [must-gather-x8rsq] POD 2026-01-20T18:41:39.692730624Z Starting 24/77 i18n [Running: boot dnf host i18n] [must-gather-x8rsq] POD 2026-01-20T18:41:39.713067891Z Starting 25/77 iscsi [Running: boot dnf host iscsi] [must-gather-x8rsq] POD 2026-01-20T18:41:39.809658667Z Starting 26/77 kdump [Running: boot dnf host kdump] [must-gather-x8rsq] POD 2026-01-20T18:41:39.929327706Z Starting 27/77 kernel [Running: boot dnf kdump kernel] [must-gather-x8rsq] POD 2026-01-20T18:41:40.501934093Z Starting 28/77 keyutils [Running: boot dnf kernel keyutils] [must-gather-x8rsq] POD 2026-01-20T18:41:40.518751186Z Starting 29/77 krb5 [Running: boot dnf kernel krb5] [must-gather-x8rsq] POD 2026-01-20T18:41:40.569039288Z Starting 30/77 kvm [Running: boot dnf kernel kvm] [must-gather-x8rsq] POD 2026-01-20T18:41:40.633805579Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:40.698255272Z Starting 31/77 ldap [Running: boot dnf kvm ldap] [must-gather-x8rsq] POD 2026-01-20T18:41:40.714531580Z Starting 32/77 libraries [Running: boot dnf kvm libraries] [must-gather-x8rsq] POD 2026-01-20T18:41:40.715393274Z Starting 33/77 libvirt [Running: boot dnf kvm libvirt] [must-gather-x8rsq] POD 2026-01-20T18:41:40.781294266Z Starting 34/77 login [Running: boot dnf kvm login] [must-gather-x8rsq] POD 2026-01-20T18:41:41.041030650Z Starting 35/77 logrotate [Running: boot dnf kvm logrotate] [must-gather-x8rsq] POD 2026-01-20T18:41:41.086758550Z Starting 36/77 logs [Running: boot dnf kvm logs] [must-gather-x8rsq] POD 2026-01-20T18:41:41.464988200Z Starting 37/77 lvm2 [Running: dnf kvm logs lvm2] [must-gather-x8rsq] POD 2026-01-20T18:41:41.801999922Z Starting 38/77 md [Running: dnf kvm logs md] [must-gather-x8rsq] POD 2026-01-20T18:41:41.823611843Z Starting 39/77 memory [Running: dnf kvm logs memory] [must-gather-x8rsq] POD 2026-01-20T18:41:41.830653323Z Starting 28/77 keyutils [Running: boot dnf kdump keyutils] [must-gather-x8rsq] POD 2026-01-20T18:41:41.851028521Z Starting 29/77 krb5 [Running: boot dnf keyutils krb5] [must-gather-x8rsq] POD 2026-01-20T18:41:41.863152046Z Starting 30/77 kvm [Running: boot dnf krb5 kvm] [must-gather-x8rsq] POD 2026-01-20T18:41:41.883041871Z Starting 31/77 ldap [Running: boot dnf kvm ldap] [must-gather-x8rsq] POD 2026-01-20T18:41:41.904959231Z Starting 32/77 libraries [Running: boot dnf kvm libraries] [must-gather-x8rsq] POD 2026-01-20T18:41:41.905467784Z Starting 33/77 libvirt [Running: boot dnf kvm libvirt] [must-gather-x8rsq] POD 2026-01-20T18:41:41.974485650Z Starting 40/77 multipath [Running: dnf kvm logs multipath] [must-gather-x8rsq] POD 2026-01-20T18:41:41.982452485Z Starting 34/77 login [Running: boot dnf kvm login] [must-gather-x8rsq] POD 2026-01-20T18:41:42.048649125Z Starting 41/77 networking [Running: dnf kvm logs networking] [must-gather-x8rsq] POD 2026-01-20T18:41:42.326424334Z Starting 35/77 logrotate [Running: boot dnf kvm logrotate] [must-gather-x8rsq] POD 2026-01-20T18:41:42.327737979Z [?2004l temporary directory /var/tmp/sos-osp does not exist or is not writable [must-gather-x8rsq] POD 2026-01-20T18:41:42.365646679Z exit [must-gather-x8rsq] POD 2026-01-20T18:41:42.367896668Z Starting 36/77 logs [Running: boot dnf kvm logs] [must-gather-x8rsq] POD 2026-01-20T18:41:42.378278038Z [must-gather-x8rsq] POD 2026-01-20T18:41:42.659972813Z Starting 37/77 lvm2 [Running: dnf kvm logs lvm2] [must-gather-x8rsq] POD 2026-01-20T18:41:42.941831271Z tar: Removing leading `/' from member names [must-gather-x8rsq] POD 2026-01-20T18:41:42.941831271Z tar: /var/log/pods/*/*.log.*: Warning: Cannot stat: No such file or directory [must-gather-x8rsq] POD 2026-01-20T18:41:42.946720383Z Starting 38/77 md [Running: dnf kvm logs md] [must-gather-x8rsq] POD 2026-01-20T18:41:42.966698460Z Starting 39/77 memory [Running: dnf kvm logs memory] [must-gather-x8rsq] POD 2026-01-20T18:41:43.130602928Z Starting 40/77 multipath [Running: dnf kvm logs multipath] [must-gather-x8rsq] POD 2026-01-20T18:41:43.215271644Z Starting 41/77 networking [Running: dnf kvm logs networking] [must-gather-x8rsq] POD 2026-01-20T18:41:43.322488397Z Starting 42/77 networkmanager [Running: dnf logs networking networkmanager] [must-gather-x8rsq] POD 2026-01-20T18:41:43.572759868Z Starting 43/77 nfs [Running: dnf networking networkmanager nfs] [must-gather-x8rsq] POD 2026-01-20T18:41:43.973155564Z Starting 44/77 numa [Running: dnf networking networkmanager numa] [must-gather-x8rsq] POD 2026-01-20T18:41:44.055283903Z Starting 45/77 nvme [Running: dnf networking networkmanager nvme] [must-gather-x8rsq] POD 2026-01-20T18:41:44.133813944Z Starting 46/77 openhpi [Running: dnf networking networkmanager openhpi] [must-gather-x8rsq] POD 2026-01-20T18:41:44.134007559Z Starting 47/77 openstack_edpm [Running: dnf networking networkmanager openstack_edpm] [must-gather-x8rsq] POD 2026-01-20T18:41:44.149609238Z Starting 48/77 openstack_neutron [Running: dnf networking networkmanager openstack_neutron] [must-gather-x8rsq] POD 2026-01-20T18:41:44.165628779Z Starting 49/77 openstack_nova [Running: dnf networking networkmanager openstack_nova] [must-gather-x8rsq] POD 2026-01-20T18:41:44.173452030Z Starting 50/77 openvswitch [Running: dnf networking networkmanager openvswitch] [must-gather-x8rsq] POD 2026-01-20T18:41:44.639282286Z Starting 42/77 networkmanager [Running: dnf logs networking networkmanager] [must-gather-x8rsq] POD 2026-01-20T18:41:44.650327273Z Starting 51/77 ovn_host [Running: dnf networking openvswitch ovn_host] [must-gather-x8rsq] POD 2026-01-20T18:41:44.735056371Z Starting 52/77 pam [Running: dnf networking openvswitch pam] [must-gather-x8rsq] POD 2026-01-20T18:41:44.825007131Z Starting 53/77 pci [Running: dnf networking openvswitch pci] [must-gather-x8rsq] POD 2026-01-20T18:41:44.865217872Z Starting 43/77 nfs [Running: dnf networking networkmanager nfs] [must-gather-x8rsq] POD 2026-01-20T18:41:44.867410451Z tar: Removing leading `/' from hard link targets [must-gather-x8rsq] POD 2026-01-20T18:41:44.876506215Z Starting 54/77 podman [Running: dnf networking openvswitch podman] [must-gather-x8rsq] POD 2026-01-20T18:41:45.266981775Z Starting 44/77 numa [Running: dnf networking networkmanager numa] [must-gather-x8rsq] POD 2026-01-20T18:41:45.377306102Z Starting 45/77 nvme [Running: dnf networking networkmanager nvme] [must-gather-x8rsq] POD 2026-01-20T18:41:45.463263713Z Starting 46/77 openhpi [Running: dnf networking networkmanager openhpi] [must-gather-x8rsq] POD 2026-01-20T18:41:45.467619050Z Starting 47/77 openstack_edpm [Running: dnf networking networkmanager openstack_edpm] [must-gather-x8rsq] POD 2026-01-20T18:41:45.472184163Z Starting 48/77 openstack_neutron [Running: dnf networking networkmanager openstack_neutron] [must-gather-x8rsq] POD 2026-01-20T18:41:45.488278165Z Starting 49/77 openstack_nova [Running: dnf networking networkmanager openstack_nova] [must-gather-x8rsq] POD 2026-01-20T18:41:45.493170467Z Starting 50/77 openvswitch [Running: dnf networking networkmanager openvswitch] [must-gather-x8rsq] POD 2026-01-20T18:41:45.639597954Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:46.227288647Z Starting 51/77 ovn_host [Running: dnf networking openvswitch ovn_host] [must-gather-x8rsq] POD 2026-01-20T18:41:46.396419696Z Starting 52/77 pam [Running: dnf networking openvswitch pam] [must-gather-x8rsq] POD 2026-01-20T18:41:46.517208684Z Starting 53/77 pci [Running: dnf networking openvswitch pci] [must-gather-x8rsq] POD 2026-01-20T18:41:46.677827282Z Starting 54/77 podman [Running: dnf networking openvswitch podman] [must-gather-x8rsq] POD 2026-01-20T18:41:46.727244322Z Starting 55/77 process [Running: dnf networking podman process] [must-gather-x8rsq] POD 2026-01-20T18:41:46.861044929Z Starting 56/77 processor [Running: dnf networking process processor] [must-gather-x8rsq] POD 2026-01-20T18:41:47.349951026Z Starting 57/77 python [Running: dnf process processor python] [must-gather-x8rsq] POD 2026-01-20T18:41:47.858231483Z Starting 58/77 release [Running: dnf process processor release] [must-gather-x8rsq] POD 2026-01-20T18:41:47.897828808Z Starting 59/77 rpm [Running: dnf process processor rpm] [must-gather-x8rsq] POD 2026-01-20T18:41:48.025651995Z Starting 60/77 sar [Running: process processor rpm sar] [must-gather-x8rsq] POD 2026-01-20T18:41:48.027380952Z Starting 61/77 scsi [Running: process processor rpm scsi] [must-gather-x8rsq] POD 2026-01-20T18:41:48.330105792Z Starting 55/77 process [Running: dnf networking podman process] [must-gather-x8rsq] POD 2026-01-20T18:41:48.385162292Z Starting 62/77 selinux [Running: process processor scsi selinux] [must-gather-x8rsq] POD 2026-01-20T18:41:48.411729507Z Starting 63/77 services [Running: process processor selinux services] [must-gather-x8rsq] POD 2026-01-20T18:41:48.489139769Z Starting 64/77 ssh [Running: process processor selinux ssh] [must-gather-x8rsq] POD 2026-01-20T18:41:48.520162953Z Starting 65/77 sudo [Running: process processor selinux sudo] [must-gather-x8rsq] POD 2026-01-20T18:41:48.528158417Z Starting 66/77 sunrpc [Running: process processor selinux sunrpc] [must-gather-x8rsq] POD 2026-01-20T18:41:48.548120945Z Starting 67/77 system [Running: process processor selinux system] [must-gather-x8rsq] POD 2026-01-20T18:41:48.670253799Z Starting 68/77 systemd [Running: processor selinux system systemd] [must-gather-x8rsq] POD 2026-01-20T18:41:48.696734771Z Starting 56/77 processor [Running: dnf networking process processor] [must-gather-x8rsq] POD 2026-01-20T18:41:48.874411528Z Starting 57/77 python [Running: dnf process processor python] [must-gather-x8rsq] POD 2026-01-20T18:41:49.403813744Z Starting 58/77 release [Running: dnf process processor release] [must-gather-x8rsq] POD 2026-01-20T18:41:49.459579284Z Starting 59/77 rpm [Running: dnf process processor rpm] [must-gather-x8rsq] POD 2026-01-20T18:41:49.568539084Z Starting 60/77 sar [Running: process processor rpm sar] [must-gather-x8rsq] POD 2026-01-20T18:41:49.569630673Z Starting 61/77 scsi [Running: process processor rpm scsi] [must-gather-x8rsq] POD 2026-01-20T18:41:49.908677200Z Starting 62/77 selinux [Running: process processor scsi selinux] [must-gather-x8rsq] POD 2026-01-20T18:41:50.013594371Z Starting 63/77 services [Running: process processor selinux services] [must-gather-x8rsq] POD 2026-01-20T18:41:50.088431973Z Starting 64/77 ssh [Running: process processor selinux ssh] [must-gather-x8rsq] POD 2026-01-20T18:41:50.122213892Z Starting 65/77 sudo [Running: process processor selinux sudo] [must-gather-x8rsq] POD 2026-01-20T18:41:50.128930843Z Starting 66/77 sunrpc [Running: process processor selinux sunrpc] [must-gather-x8rsq] POD 2026-01-20T18:41:50.164427267Z Starting 67/77 system [Running: process processor selinux system] [must-gather-x8rsq] POD 2026-01-20T18:41:50.275217916Z Starting 68/77 systemd [Running: processor selinux system systemd] [must-gather-x8rsq] POD 2026-01-20T18:41:50.653778315Z [disk usage checker] Volume usage percentage: current = 50 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:50.807447508Z Starting 69/77 sysvipc [Running: processor selinux systemd sysvipc] [must-gather-x8rsq] POD 2026-01-20T18:41:50.849629702Z Starting 70/77 tpm2 [Running: processor selinux systemd tpm2] [must-gather-x8rsq] POD 2026-01-20T18:41:50.948459009Z Starting 71/77 tuned [Running: processor selinux systemd tuned] [must-gather-x8rsq] POD 2026-01-20T18:41:51.651798973Z Starting 72/77 udev [Running: processor selinux systemd udev] [must-gather-x8rsq] POD 2026-01-20T18:41:51.677200296Z Starting 73/77 unbound [Running: processor selinux systemd unbound] [must-gather-x8rsq] POD 2026-01-20T18:41:51.677542035Z Starting 74/77 vhostmd [Running: processor selinux systemd vhostmd] [must-gather-x8rsq] POD 2026-01-20T18:41:51.678192872Z Starting 75/77 virsh [Running: processor selinux systemd virsh] [must-gather-x8rsq] POD 2026-01-20T18:41:52.314866752Z Starting 69/77 sysvipc [Running: processor selinux systemd sysvipc] [must-gather-x8rsq] POD 2026-01-20T18:41:52.356909183Z Starting 70/77 tpm2 [Running: processor selinux systemd tpm2] [must-gather-x8rsq] POD 2026-01-20T18:41:52.483013153Z Starting 71/77 tuned [Running: processor selinux systemd tuned] [must-gather-x8rsq] POD 2026-01-20T18:41:53.274007484Z Starting 72/77 udev [Running: processor selinux systemd udev] [must-gather-x8rsq] POD 2026-01-20T18:41:53.299704615Z Starting 73/77 unbound [Running: processor selinux systemd unbound] [must-gather-x8rsq] POD 2026-01-20T18:41:53.300204328Z Starting 74/77 vhostmd [Running: processor selinux systemd vhostmd] [must-gather-x8rsq] POD 2026-01-20T18:41:53.300606569Z Starting 75/77 virsh [Running: processor selinux systemd virsh] [must-gather-x8rsq] POD 2026-01-20T18:41:53.546986234Z Starting 76/77 xen [Running: processor systemd virsh xen] [must-gather-x8rsq] POD 2026-01-20T18:41:53.547122328Z Finishing plugins [Running: processor systemd virsh] [must-gather-x8rsq] POD 2026-01-20T18:41:53.547644411Z Starting 77/77 xfs [Running: processor systemd virsh xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:53.551716751Z Finishing plugins [Running: processor systemd xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:53.556201141Z Finishing plugins [Running: processor xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:53.769299282Z Finishing plugins [Running: processor] [must-gather-x8rsq] POD 2026-01-20T18:41:55.113208890Z Starting 76/77 xen [Running: processor systemd virsh xen] [must-gather-x8rsq] POD 2026-01-20T18:41:55.113208890Z Finishing plugins [Running: processor systemd virsh] [must-gather-x8rsq] POD 2026-01-20T18:41:55.113208890Z Starting 77/77 xfs [Running: processor systemd virsh xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:55.253044420Z Finishing plugins [Running: processor systemd xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:55.307236897Z Finishing plugins [Running: processor xfs] [must-gather-x8rsq] POD 2026-01-20T18:41:55.349625107Z Finishing plugins [Running: processor] [must-gather-x8rsq] POD 2026-01-20T18:41:55.663612060Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:41:56.925526703Z Gathering data for ns/metallb-system... [must-gather-x8rsq] POD 2026-01-20T18:41:58.065162798Z [must-gather-x8rsq] POD 2026-01-20T18:41:58.065162798Z Finished running plugins [must-gather-x8rsq] POD 2026-01-20T18:41:58.065272121Z [must-gather-x8rsq] POD 2026-01-20T18:41:59.981286972Z [must-gather-x8rsq] POD 2026-01-20T18:41:59.981286972Z Finished running plugins [must-gather-x8rsq] POD 2026-01-20T18:41:59.982953757Z [must-gather-x8rsq] POD 2026-01-20T18:42:00.682190029Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:01.242121816Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:04.419972788Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:05.698973211Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:07.687516003Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:10.711042575Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:10.787188713Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:14.290313352Z Creating compressed archive... [must-gather-x8rsq] POD 2026-01-20T18:42:14.290313352Z [must-gather-x8rsq] POD 2026-01-20T18:42:14.290313352Z Your sos report has been generated and saved in: [must-gather-x8rsq] POD 2026-01-20T18:42:14.290313352Z /var/tmp/sos-osp/sosreport-compute-0-2026-01-20-hjtltoh.tar.xz [must-gather-x8rsq] POD 2026-01-20T18:42:14.290313352Z [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z Size 17.60MiB [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z Owner root [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z sha256 202b35dff01e114f156108a449a82d1c2fc790c71a8bb46e9f237159f162b4ca [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z Please send this file to your support representative. [must-gather-x8rsq] POD 2026-01-20T18:42:14.290469046Z [must-gather-x8rsq] POD 2026-01-20T18:42:14.312024825Z Retrieving SOS Report for compute-0 [must-gather-x8rsq] POD 2026-01-20T18:42:14.868950821Z Finished retrieving SOS Report for compute-0 [must-gather-x8rsq] POD 2026-01-20T18:42:15.723259153Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:15.802021231Z [must-gather-x8rsq] POD 2026-01-20T18:42:15.802021231Z Removing debug pod ... [must-gather-x8rsq] POD 2026-01-20T18:42:16.831099894Z Retrieving SOS Report for crc [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z Creating compressed archive... [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z Your sos report has been generated and saved in: [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z /var/tmp/sos-osp/sosreport-compute-1-2026-01-20-tfwgcil.tar.xz [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z Size 17.51MiB [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z Owner root [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z sha256 4de3d29cd411135304b6da627b8111c97e8e4f8f24003e88a17aa9cc43c6754f [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z Please send this file to your support representative. [must-gather-x8rsq] POD 2026-01-20T18:42:18.009701805Z [must-gather-x8rsq] POD 2026-01-20T18:42:18.035720546Z Retrieving SOS Report for compute-1 [must-gather-x8rsq] POD 2026-01-20T18:42:18.677171294Z Finished retrieving SOS Report for compute-1 [must-gather-x8rsq] POD 2026-01-20T18:42:20.742259484Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:21.752162630Z Starting pod/crc-debug-smv5m ... [must-gather-x8rsq] POD 2026-01-20T18:42:21.752162630Z To use host binaries, run `chroot /host` [must-gather-x8rsq] POD 2026-01-20T18:42:22.174377354Z Error while masking key: prometheus.yaml.gz, for file: /must-gather/namespaces/openstack/secrets/metric-storage/prometheus-metric-storage.yaml [must-gather-x8rsq] POD 2026-01-20T18:42:22.579129668Z Gathering data for ns/openstack-operators... [must-gather-x8rsq] POD 2026-01-20T18:42:22.779170717Z [must-gather-x8rsq] POD 2026-01-20T18:42:22.779170717Z Removing debug pod ... [must-gather-x8rsq] POD 2026-01-20T18:42:22.993135470Z Gathering secrets in namespace openstack-operators [must-gather-x8rsq] POD 2026-01-20T18:42:23.602485106Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:23.967151672Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:24.134448290Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:25.756255741Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:25.830163278Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:27.954364687Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:30.253954503Z Gathering data for ns/openshift-machine-api... [must-gather-x8rsq] POD 2026-01-20T18:42:30.533287685Z Gathering secrets in namespace openshift-machine-api [must-gather-x8rsq] POD 2026-01-20T18:42:30.716576373Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:30.769527477Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:31.329468704Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:31.593223476Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:31.749535320Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:31.993589132Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:35.777491221Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:36.441812015Z Gathering data for ns/cert-manager... [must-gather-x8rsq] POD 2026-01-20T18:42:36.825149333Z Gathering secrets in namespace cert-manager [must-gather-x8rsq] POD 2026-01-20T18:42:36.887624503Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:37.704819157Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:37.791791836Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:38.134095200Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:38.328017684Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:40.787994293Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:42.157184691Z Gathering data for ns/openshift-nmstate... [must-gather-x8rsq] POD 2026-01-20T18:42:42.697407068Z Gathering secrets in namespace openshift-nmstate [must-gather-x8rsq] POD 2026-01-20T18:42:42.894621410Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:43.629659246Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:43.780491422Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:44.048589191Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:44.111209515Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:45.794453878Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:48.991224489Z Gathering data for ns/openshift-operators... [must-gather-x8rsq] POD 2026-01-20T18:42:49.371478104Z Gathering secrets in namespace openshift-operators [must-gather-x8rsq] POD 2026-01-20T18:42:49.513772309Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:50.215538460Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:50.421221521Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:50.538813933Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:50.776006641Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:50.800623663Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:55.253998914Z Gathering data for ns/metallb-system... [must-gather-x8rsq] POD 2026-01-20T18:42:55.664538334Z Gathering secrets in namespace metallb-system [must-gather-x8rsq] POD 2026-01-20T18:42:55.816262293Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:42:56.428694502Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:56.994437835Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:57.214154843Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:42:58.121571293Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:42:59.520485720Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:00.823347414Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:01.762958800Z Gathering data for ns/openshift-marketplace... [must-gather-x8rsq] POD 2026-01-20T18:43:02.147482490Z Gathering secrets in namespace openshift-marketplace [must-gather-x8rsq] POD 2026-01-20T18:43:02.899212704Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:03.439141573Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:03.607158331Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:05.396798994Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:43:05.835903472Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:07.865365654Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:08.849556289Z Gathering data for ns/openshift-operators... [must-gather-x8rsq] POD 2026-01-20T18:43:09.205783318Z Gathering secrets in namespace openshift-operators [must-gather-x8rsq] POD 2026-01-20T18:43:09.400706749Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:43:10.314999345Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:10.646729995Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:10.768474749Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:10.846792054Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:11.071045745Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:15.868576020Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:16.156825371Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:16.294730239Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:16.406638078Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:16.448156055Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:16.815975385Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:17.794372395Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:18.082172923Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:18.229652449Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:18.246234125Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:18.286719933Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:19.261851575Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:19.609231756Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:19.703206493Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:19.751855461Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:19.779039732Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:20.793178692Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:20.876161114Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:21.109987681Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:21.169716077Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:21.256230394Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:21.703657305Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:22.358138224Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:23.026548247Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:23.089177992Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:23.136169835Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:23.488834808Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:24.024699648Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:24.633200361Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:24.787975122Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:24.850567475Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:25.185930643Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:25.511793765Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:25.887386485Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:26.035447997Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:27.919345105Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:28.094024852Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:28.315374234Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:28.644331160Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:29.907606320Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:30.134711477Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:30.506065622Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:30.824434863Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:30.897688793Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:30.993957561Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.222281551Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.243139582Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.250693035Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.341211499Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.560969659Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:34.576710571Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:35.786188775Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:35.790019017Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:35.904767083Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:36.081471064Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:36.350561320Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:36.790260484Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:37.963886122Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:38.840514165Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:38.852640772Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:38.976668467Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:39.114953965Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:39.134057499Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:39.360280792Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:39.702806522Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.082446161Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:41.246183834Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.431190689Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.477871144Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.495973030Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.531640770Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:41.577944624Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.444344913Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.468577374Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.496045812Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.572170739Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.740676560Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.778112497Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.783517913Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.795806293Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:43.884245531Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:45.966178034Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.030196356Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.112286173Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:46.231735975Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.237506561Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.298473770Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.354619410Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.445678418Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.621605019Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:46.803236763Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:48.327892381Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:48.332553766Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:48.337978562Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:48.370157507Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:48.378017819Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:49.896891241Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:49.946473465Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:49.972463763Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:49.991109735Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:49.996408698Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:51.136861484Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:51.783044819Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.121141421Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.151409605Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.155573807Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.203521356Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.268709630Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:52.272633095Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:53.931894402Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:53.965010693Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:53.992626145Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:54.000363234Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:54.147790207Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:54.305810947Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:54.651185844Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.038922121Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.417930562Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.551976896Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.798636409Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.818628956Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.837309479Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.841258565Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:55.919451238Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:56.144772226Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:43:57.310230715Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:57.371912654Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:57.390965906Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:57.521428695Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:57.609221895Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:58.820120326Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:59.219545137Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:59.442949485Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:59.589459464Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:43:59.960433779Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:00.041024446Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:00.347347674Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:00.516939414Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:00.787704405Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:01.160804047Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:02.324646113Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:02.649135448Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:02.766696880Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:03.967826678Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:03.974865877Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:03.981377083Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:03.988730640Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:04.008637925Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:04.009696134Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:05.447968029Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:05.505354542Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:05.574958084Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:05.645453230Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:05.699268517Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:06.166896761Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:06.947771139Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:06.973278975Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:07.128192020Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:07.181427692Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:07.273351284Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:08.447832545Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:08.639815238Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:08.755583931Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:08.849761093Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:08.882385810Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:09.949363391Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:10.260925369Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:10.323833401Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:10.327719155Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:10.538780831Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:11.175883342Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:11.659831226Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:11.747839102Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:11.809335216Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:11.911207355Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:12.161356182Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:13.104639046Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:13.181458723Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:13.366166649Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:13.531561917Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:13.730769503Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:14.473780903Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:15.182660684Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:15.603892862Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:15.675295902Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:15.851315095Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:16.037824060Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:16.187188417Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:16.355038930Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:16.529751628Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:17.348302518Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:17.846966338Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:17.913004684Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:18.516918402Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:18.602374181Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.501367055Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.843570727Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.849009843Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.867430569Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.872501494Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:19.927237416Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:20.252150493Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:21.194411720Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:21.354566087Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:21.413746949Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:21.420214733Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:21.431041774Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:21.783815130Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:22.855672672Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:22.917513774Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:22.940982386Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:22.973379037Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:23.356205671Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:24.494235693Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:24.514586860Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:24.607753266Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:24.678105757Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:25.006515148Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:25.012940841Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:25.019363404Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:25.122956700Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:25.279850448Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:26.214178062Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:26.471319147Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:26.480395300Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:26.518726751Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:26.598627990Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:26.730233638Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:28.349165641Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:28.421541058Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:28.972275147Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:29.447923257Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:29.938588662Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:30.048068066Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:30.331672861Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:30.683757829Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:31.235230478Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:31.929969819Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:32.232313489Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:32.236529073Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:32.244216660Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:32.252777940Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:33.636351715Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:34.121818368Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:34.160064347Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:34.506843011Z Gathering data for ns/openshift-operators... [must-gather-x8rsq] POD 2026-01-20T18:44:34.676157725Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:34.692927876Z Gathering data for ns/cert-manager... [must-gather-x8rsq] POD 2026-01-20T18:44:35.198844489Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:44:35.330453968Z Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ [must-gather-x8rsq] POD 2026-01-20T18:44:35.452185592Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:35.488682294Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:35.765250071Z Gathering data for ns/metallb-system... [must-gather-x8rsq] POD 2026-01-20T18:44:35.846251758Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:36.013820154Z Gathering data for ns/openstack-operators... [must-gather-x8rsq] POD 2026-01-20T18:44:36.239857672Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:36.782656269Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:37.175622745Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:37.281725648Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:38.572189478Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:38.926235179Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:41.248095054Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:42.792884143Z Gathering data for ns/openshift-nmstate... [must-gather-x8rsq] POD 2026-01-20T18:44:43.184113523Z Gathering data for ns/cert-manager... [must-gather-x8rsq] POD 2026-01-20T18:44:44.056975544Z Gathering data for ns/openshift-machine-api... [must-gather-x8rsq] POD 2026-01-20T18:44:45.163011936Z Gathering data for ns/openstack-operators... [must-gather-x8rsq] POD 2026-01-20T18:44:45.166537340Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:46.262935363Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:49.473360911Z Gathering data for ns/openshift-monitoring... [must-gather-x8rsq] POD 2026-01-20T18:44:50.084368941Z Gathering data for ns/openshift-multus... [must-gather-x8rsq] POD 2026-01-20T18:44:51.275406578Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:44:52.400004498Z Wrote inspect data to /must-gather. [must-gather-x8rsq] POD 2026-01-20T18:44:56.288389857Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:01.296733131Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:06.317627553Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:11.325845003Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:16.335743500Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:21.344738992Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:26.355654705Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:31.364651987Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:36.387752958Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:41.395028033Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:46.412172084Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:51.423035917Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:45:56.432615324Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:01.444194465Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:06.455312254Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:11.464235544Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:16.471294964Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:21.482753072Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:26.492698989Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:31.503860489Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:36.516824898Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:41.529330424Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:46.544048440Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:51.555293392Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:46:56.567854910Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:01.578167827Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:06.589640696Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:11.596962282Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:16.605731318Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:21.613666461Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:26.623761362Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:31.634604914Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:36.643584385Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:41.672156103Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:46.728161169Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:51.741768005Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:47:56.754837296Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:01.772772767Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:06.782862259Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:11.794004378Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:16.802695941Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:21.810147632Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:26.820776118Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:31.829405189Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:36.836918182Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:41.846625202Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:46.857587627Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:51.897133731Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:48:56.907854999Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:01.922177924Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:06.939764377Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:11.947408572Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:16.960930396Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:21.968382736Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:26.975467617Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:31.987695596Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:36.995165576Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:42.001986840Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:47.010749086Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:52.017242799Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:49:57.024831152Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:02.033718531Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:07.046936107Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:12.055419025Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:17.065469225Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:22.085117643Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:27.094766353Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:32.106352475Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:37.114666889Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:42.123031384Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:47.132643712Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:52.141821488Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:50:57.150277336Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:02.158989380Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:07.169576434Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:12.178789962Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:17.195781739Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:22.203820464Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:27.212035965Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:32.222149230Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:37.229904573Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:42.238946260Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:47.248004688Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:52.257124478Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:51:57.266941098Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:02.281904654Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:07.294021644Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:12.306756660Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:17.325518119Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:22.336251162Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:27.346562054Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:32.359145886Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:37.367409493Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:42.376654476Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:47.386798724Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:52.396279883Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:52:57.404693734Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:02.418906440Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:07.427253299Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:12.434956200Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:17.443053533Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:22.451356761Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:27.459958207Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:32.468499192Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:37.480415576Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:42.490013348Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:47.499121618Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:52.507020505Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:53:57.515949770Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:02.524420692Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:07.536700567Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:12.546034072Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:17.556127887Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:22.564462566Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:27.578405836Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:32.585582033Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:37.594105327Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:42.613436761Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:47.638744815Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:52.649477767Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:54:57.657276252Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:02.667297206Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:07.674915036Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:12.683574233Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:17.692505168Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:22.702514672Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:27.710266535Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:32.718598654Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:37.733963041Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:42.747186651Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:47.750430694Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:52.763260403Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:55:57.777062588Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:02.783777763Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:07.790446696Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:12.798608810Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:17.806750364Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:22.816783087Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:27.831073856Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:32.839776835Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:37.847500758Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:42.856896985Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:47.880072681Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:52.887921267Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:56:57.897872569Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:02.906155637Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:07.913322574Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:12.930051958Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:17.939561388Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:22.948749430Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:27.956286608Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:32.963748373Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:37.972252836Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:42.979049724Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:48.000555556Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:53.009205893Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:57:58.018555469Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:03.028365707Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:08.044257159Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:13.053227695Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:18.061289817Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:23.068255469Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:28.094897468Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:33.106046342Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:38.114180936Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:43.128390272Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:48.138609941Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:53.145361897Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:58:58.155496994Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:03.168950320Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:08.181574364Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:13.191414993Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:18.201838867Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:23.217505212Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:28.234048951Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:33.253945370Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:38.263964843Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:43.275768075Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:48.285461111Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:53.293291476Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T18:59:58.304186713Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:03.315545253Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:08.327885549Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:13.338299804Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:18.344380663Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:23.359981216Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:28.368827498Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:33.380822495Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:38.395316369Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:43.407961673Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:48.419218220Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:53.563712557Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:00:58.580627666Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:04.299221513Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:09.307116260Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:14.315797087Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:19.326667354Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:24.335511907Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:29.343729392Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:34.354324762Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:39.370463070Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:44.380809983Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:49.398140253Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:54.404327784Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:01:59.415611662Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:04.426666263Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:09.434433417Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:14.449706742Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:19.461890203Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:24.471289051Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:29.488901858Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:34.499733273Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:39.510375134Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:44.522013121Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:49.531446879Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:54.539523901Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:02:59.549204306Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:04.561753499Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:09.574064654Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:14.583461181Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:19.593166486Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:24.608873063Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:29.620452399Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:34.633133104Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:39.643332113Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:44.655254547Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:49.662868196Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:54.676355654Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:03:59.682847323Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:04.694622834Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:09.706760125Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:14.726199431Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:19.748887144Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:24.756145204Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:29.765132590Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:34.773041338Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:39.783259557Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:44.792882171Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:49.801643651Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:54.814000518Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:04:59.822526281Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:04.836615725Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:09.844764668Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:14.855611294Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:19.876200981Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:24.882611658Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:29.895324155Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:34.908292527Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:39.921155077Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:44.932138136Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:49.943117796Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:54.954149187Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:05:59.966128084Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:04.980145575Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:09.992255475Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:15.006756768Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:20.020462481Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:25.028335027Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:30.039817781Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:35.047667247Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:40.055919964Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:45.065113536Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:50.079653390Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:06:55.114149960Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:00.113417126Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:05.124179069Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:10.132005495Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:15.141821233Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:20.154160339Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:25.169233159Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:30.177478254Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:35.634533194Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:40.645743230Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:45.659331020Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:50.667249278Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:07:55.678543296Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:00.688522709Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:05.698688165Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:10.709687905Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:15.720985154Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:20.731634925Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:25.741073723Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:30.752158386Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:35.757943276Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:40.770828397Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:45.783146807Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:50.788732967Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:08:55.796377303Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:00.803638037Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:05.820967903Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:10.836088849Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:15.843573490Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:20.857047181Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:25.867614165Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:30.877698065Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:35.887299714Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:40.895486053Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:45.903490728Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:50.920338511Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:09:55.931955643Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:00.942320421Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:05.951769836Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:10.960142220Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:15.968038362Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:20.982734636Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:25.992776427Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:31.003902674Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:36.011642393Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:41.020637124Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:46.434761001Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:51.547925921Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:10:56.557653732Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:01.566379876Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:06.577359131Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:11.585625473Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:16.595117018Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:21.604521670Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:26.614184209Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:32.036363802Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:37.046674239Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:42.056863163Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:47.445175135Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:52.458345377Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:11:57.467277657Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:02.477062370Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:07.935458086Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:12.947403657Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:17.961883055Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:22.971183585Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:27.980233218Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:33.530018769Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:38.541785545Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:43.556328856Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:48.568498432Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:53.614452238Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:12:58.639380396Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:03.648771208Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:08.662063545Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:13.696135200Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:19.246541078Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:24.340118433Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:29.942125617Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:34.952209488Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:39.962160655Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:44.972104023Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:49.982032730Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:13:54.992922242Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:00.008371117Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:05.017690297Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:10.025501827Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:15.034577920Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:20.044934638Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:25.228254964Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:30.237071090Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:35.257267183Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:40.269150352Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:45.276196070Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:50.297359748Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:14:55.308692723Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:00.316224106Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:05.325426083Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:10.933412898Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:15.943661423Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:20.953126408Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:25.963716151Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:30.972622981Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:36.130744358Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:41.141106508Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:46.157691453Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:51.168978817Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:15:56.179327974Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:01.198321474Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:06.211469187Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:11.221624250Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:16.230365665Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:21.939225590Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:26.949838725Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:32.042287879Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:37.050809458Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:42.059355327Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:47.731298100Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:52.741365871Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:16:57.749970443Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:02.762951551Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:07.770394561Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:12.787280715Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:17.799131073Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:22.817417644Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:27.819654224Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:33.051100712Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:37.977821863Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:42.984349838Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:48.003782340Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:53.429533258Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:17:58.436554497Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:03.836388349Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:08.859540571Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:14.263424192Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:19.286783610Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:24.731759315Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:29.740185061Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:34.752504092Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:39.767972598Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:44.779268771Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:49.792198158Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:54.800315306Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:18:59.810438757Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:04.818247548Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:09.834345179Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:14.846134246Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:20.431200685Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:25.440576606Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:30.448133070Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:35.456244917Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:40.465419254Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:45.474285352Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:50.482257165Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:19:55.495725997Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:00.506942508Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:05.514539232Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:10.521261874Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:15.529686269Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:20.630254671Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:25.641566565Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:30.935312317Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:35.943489706Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:41.340831382Z [disk usage checker] Volume usage percentage: current = 52 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:46.349301829Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:51.731681372Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:20:56.745683118Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:01.761232376Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:06.773898706Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:11.781061948Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:16.791449127Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:21.803702026Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:27.039539972Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:32.050752633Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:37.061105151Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:42.068277124Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:47.330629652Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:52.340049785Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:21:57.360023291Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:02.367621205Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:07.374376956Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:12.381148198Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:17.404722192Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:22.579064455Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:27.603748028Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:32.618398811Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:37.625885762Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:42.660011479Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:47.667993173Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:53.254055239Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:22:58.265036593Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:03.833262041Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:08.846652051Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:13.854138631Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:18.864395797Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:23.871524028Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:28.881218098Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:33.896783646Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:38.903932548Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:43.911976994Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:49.135325774Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:54.143824583Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:23:59.151686114Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:04.160010388Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:09.168905416Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:14.177898807Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:19.187097764Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:24.196124236Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:29.732589640Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:34.748127818Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:39.758527796Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:44.771027163Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:49.782763868Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:54.793727521Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:24:59.803392081Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:04.812223908Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:09.822754051Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:14.834615369Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:19.844426923Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:24.854356599Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:29.862069677Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:34.873410830Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:40.440422155Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:45.449359288Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:50.457151612Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:25:55.469237673Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:26:00.487370357Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:26:05.495418599Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:26:10.505871436Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:26:15.515601963Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 [must-gather-x8rsq] POD 2026-01-20T19:26:20.523487931Z [disk usage checker] Volume usage percentage: current = 51 ; allowed = 80 The must gather command did not finish on time! 2700.0 seconds was not enough to finish the task. home/zuul/zuul-output/logs/ci-framework-data/logs/ansible.log0000644000175000017500000173671015133753355023500 0ustar zuulzuul2026-01-20 16:39:21,782 p=30888 u=zuul n=ansible | Starting galaxy collection install process 2026-01-20 16:39:21,783 p=30888 u=zuul n=ansible | Process install dependency map 2026-01-20 16:39:42,117 p=30888 u=zuul n=ansible | Starting collection install process 2026-01-20 16:39:42,118 p=30888 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+5ef63bb0' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general' 2026-01-20 16:39:42,759 p=30888 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+5ef63bb0 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general 2026-01-20 16:39:42,759 p=30888 u=zuul n=ansible | cifmw.general:1.0.0+5ef63bb0 was installed successfully 2026-01-20 16:39:42,760 p=30888 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman' 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully 2026-01-20 16:39:42,835 p=30888 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general' 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | community.general:10.0.1 was installed successfully 2026-01-20 16:39:43,796 p=30888 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix' 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully 2026-01-20 16:39:43,856 p=30888 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils' 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully 2026-01-20 16:39:43,975 p=30888 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt' 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully 2026-01-20 16:39:44,003 p=30888 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto' 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully 2026-01-20 16:39:44,189 p=30888 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core' 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully 2026-01-20 16:39:44,439 p=30888 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon' 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully 2026-01-20 16:39:44,527 p=30888 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template' 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully 2026-01-20 16:39:44,548 p=30888 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos' 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully 2026-01-20 16:39:44,849 p=30888 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios' 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully 2026-01-20 16:39:45,209 p=30888 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx' 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully 2026-01-20 16:39:45,248 p=30888 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd' 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | community.okd:4.0.0 was installed successfully 2026-01-20 16:39:45,293 p=30888 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@' 2026-01-20 16:39:45,571 p=30888 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@ 2026-01-20 16:39:45,572 p=30888 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully 2026-01-20 16:39:55,975 p=31524 u=zuul n=ansible | PLAY [Remove status flag] ****************************************************** 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | TASK [Gathering Facts ] ******************************************************** 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:56 +0000 (0:00:00.047) 0:00:00.047 ******* 2026-01-20 16:39:56,002 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:56 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 16:39:57,102 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] *** 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:01.118) 0:00:01.165 ******* 2026-01-20 16:39:57,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:01.118) 0:00:01.163 ******* 2026-01-20 16:39:57,466 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,473 p=31524 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] *** 2026-01-20 16:39:57,474 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.353) 0:00:01.518 ******* 2026-01-20 16:39:57,474 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.353) 0:00:01.517 ******* 2026-01-20 16:39:57,496 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ******** 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.081) 0:00:01.599 ******* 2026-01-20 16:39:57,555 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.081) 0:00:01.598 ******* 2026-01-20 16:39:57,583 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:57,591 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 16:39:57,592 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.036) 0:00:01.636 ******* 2026-01-20 16:39:57,592 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.036) 0:00:01.635 ******* 2026-01-20 16:39:57,622 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{ hostvars[inventory_hostname] | dict2items | selectattr("key", "match", "^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") | list | items2dict }}] *** 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.037) 0:00:01.673 ******* 2026-01-20 16:39:57,629 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.037) 0:00:01.672 ******* 2026-01-20 16:39:57,725 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,731 p=31524 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-01-20 16:39:57,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.102) 0:00:01.776 ******* 2026-01-20 16:39:57,732 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.102) 0:00:01.775 ******* 2026-01-20 16:39:57,974 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.249) 0:00:02.026 ******* 2026-01-20 16:39:57,981 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:57 +0000 (0:00:00.249) 0:00:02.024 ******* 2026-01-20 16:39:58,010 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,019 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-01-20 16:39:58,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.038) 0:00:02.064 ******* 2026-01-20 16:39:58,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.038) 0:00:02.063 ******* 2026-01-20 16:39:58,046 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.100 ******* 2026-01-20 16:39:58,055 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.098 ******* 2026-01-20 16:39:58,082 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:39:58,090 p=31524 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-01-20 16:39:58,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.135 ******* 2026-01-20 16:39:58,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:58 +0000 (0:00:00.035) 0:00:02.134 ******* 2026-01-20 16:39:59,697 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:39:59,712 p=31524 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 16:39:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:59 +0000 (0:00:01.621) 0:00:03.757 ******* 2026-01-20 16:39:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:39:59 +0000 (0:00:01.621) 0:00:03.756 ******* 2026-01-20 16:39:59,962 p=31524 u=zuul n=ansible | changed: [localhost] => (item=tmp) 2026-01-20 16:40:00,165 p=31524 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories) 2026-01-20 16:40:00,352 p=31524 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup) 2026-01-20 16:40:00,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] *** 2026-01-20 16:40:00,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:00 +0000 (0:00:00.650) 0:00:04.407 ******* 2026-01-20 16:40:00,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:00 +0000 (0:00:00.650) 0:00:04.406 ******* 2026-01-20 16:40:01,609 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] *** 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:01 +0000 (0:00:01.254) 0:00:05.662 ******* 2026-01-20 16:40:01,617 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:01 +0000 (0:00:01.254) 0:00:05.660 ******* 2026-01-20 16:40:02,737 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] *** 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:02 +0000 (0:00:01.127) 0:00:06.789 ******* 2026-01-20 16:40:02,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:02 +0000 (0:00:01.127) 0:00:06.788 ******* 2026-01-20 16:40:12,352 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:12,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] *** 2026-01-20 16:40:12,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:12 +0000 (0:00:09.617) 0:00:16.407 ******* 2026-01-20 16:40:12,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:12 +0000 (0:00:09.617) 0:00:16.406 ******* 2026-01-20 16:40:13,271 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] *** 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.916) 0:00:17.324 ******* 2026-01-20 16:40:13,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.916) 0:00:17.322 ******* 2026-01-20 16:40:13,307 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] *** 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.034) 0:00:17.358 ******* 2026-01-20 16:40:13,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.034) 0:00:17.357 ******* 2026-01-20 16:40:13,986 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] *** 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.681) 0:00:18.040 ******* 2026-01-20 16:40:13,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:13 +0000 (0:00:00.681) 0:00:18.039 ******* 2026-01-20 16:40:14,033 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] *** 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.088 ******* 2026-01-20 16:40:14,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.086 ******* 2026-01-20 16:40:14,081 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] *** 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.135 ******* 2026-01-20 16:40:14,090 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.047) 0:00:18.133 ******* 2026-01-20 16:40:14,123 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] *** 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.043) 0:00:18.178 ******* 2026-01-20 16:40:14,133 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.043) 0:00:18.176 ******* 2026-01-20 16:40:14,629 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }} , dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.504) 0:00:18.683 ******* 2026-01-20 16:40:14,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:14 +0000 (0:00:00.504) 0:00:18.681 ******* 2026-01-20 16:40:15,396 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] *** 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.767) 0:00:19.450 ******* 2026-01-20 16:40:15,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.767) 0:00:19.449 ******* 2026-01-20 16:40:15,427 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,435 p=31524 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] *** 2026-01-20 16:40:15,436 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.029) 0:00:19.480 ******* 2026-01-20 16:40:15,436 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.029) 0:00:19.479 ******* 2026-01-20 16:40:15,459 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] *** 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.030) 0:00:19.511 ******* 2026-01-20 16:40:15,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.030) 0:00:19.509 ******* 2026-01-20 16:40:15,485 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] *** 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.538 ******* 2026-01-20 16:40:15,493 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.536 ******* 2026-01-20 16:40:15,525 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] *** 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.040) 0:00:19.578 ******* 2026-01-20 16:40:15,533 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.040) 0:00:19.576 ******* 2026-01-20 16:40:15,553 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] *** 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.606 ******* 2026-01-20 16:40:15,561 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.604 ******* 2026-01-20 16:40:15,579 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,586 p=31524 u=zuul n=ansible | TASK [Download the RPM name=krb_request] *************************************** 2026-01-20 16:40:15,587 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.025) 0:00:19.631 ******* 2026-01-20 16:40:15,587 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.025) 0:00:19.630 ******* 2026-01-20 16:40:15,603 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{ cifmw_repo_setup_rhos_release_rpm if cifmw_repo_setup_rhos_release_rpm is not url else cifmw_krb_request_out.path }}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] *** 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.024) 0:00:19.656 ******* 2026-01-20 16:40:15,611 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.024) 0:00:19.654 ******* 2026-01-20 16:40:15,628 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] *** 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.682 ******* 2026-01-20 16:40:15,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.026) 0:00:19.681 ******* 2026-01-20 16:40:15,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,670 p=31524 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] *** 2026-01-20 16:40:15,671 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.032) 0:00:19.715 ******* 2026-01-20 16:40:15,671 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.032) 0:00:19.714 ******* 2026-01-20 16:40:15,691 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \ -t {{ cifmw_repo_setup_output }}] *** 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.033) 0:00:19.748 ******* 2026-01-20 16:40:15,704 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.033) 0:00:19.747 ******* 2026-01-20 16:40:15,720 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] *** 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.776 ******* 2026-01-20 16:40:15,731 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:15 +0000 (0:00:00.027) 0:00:19.774 ******* 2026-01-20 16:40:16,104 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo ] *** 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.380) 0:00:20.157 ******* 2026-01-20 16:40:16,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.380) 0:00:20.155 ******* 2026-01-20 16:40:16,323 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail source /etc/ci/mirror_info.sh sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo ] *** 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.219) 0:00:20.376 ******* 2026-01-20 16:40:16,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.219) 0:00:20.374 ******* 2026-01-20 16:40:16,562 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] *** 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.240) 0:00:20.617 ******* 2026-01-20 16:40:16,572 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:16 +0000 (0:00:00.240) 0:00:20.615 ******* 2026-01-20 16:40:17,269 p=31524 u=zuul n=ansible | fatal: [localhost]: FAILED! => changed: false elapsed: 0 msg: 'Status code was -1 and not [200]: Request failed: ' redirected: false status: -1 url: http://38.102.83.51:8766/gating.repo 2026-01-20 16:40:17,270 p=31524 u=zuul n=ansible | ...ignoring 2026-01-20 16:40:17,279 p=31524 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo] baseurl=http://{{ content_provider_registry_ip }}:8766/ enabled=1 gpgcheck=0 priority=1 , dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] *** 2026-01-20 16:40:17,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.707) 0:00:21.324 ******* 2026-01-20 16:40:17,280 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.707) 0:00:21.323 ******* 2026-01-20 16:40:17,313 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] *** 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.042) 0:00:21.367 ******* 2026-01-20 16:40:17,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.042) 0:00:21.365 ******* 2026-01-20 16:40:17,355 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,362 p=31524 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] *** 2026-01-20 16:40:17,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.040) 0:00:21.407 ******* 2026-01-20 16:40:17,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.040) 0:00:21.406 ******* 2026-01-20 16:40:17,399 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,405 p=31524 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] *** 2026-01-20 16:40:17,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.450 ******* 2026-01-20 16:40:17,406 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.449 ******* 2026-01-20 16:40:17,440 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | TASK [repo_setup : Lower the priority of componennt repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}//{{ _comp_repo }}, regexp=priority=1, replace=priority=2] *** 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.494 ******* 2026-01-20 16:40:17,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.043) 0:00:21.492 ******* 2026-01-20 16:40:17,485 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] *** 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.045) 0:00:21.539 ******* 2026-01-20 16:40:17,494 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.045) 0:00:21.537 ******* 2026-01-20 16:40:17,838 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] *** 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.353) 0:00:21.892 ******* 2026-01-20 16:40:17,848 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:17 +0000 (0:00:00.353) 0:00:21.891 ******* 2026-01-20 16:40:19,484 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo) 2026-01-20 16:40:20,055 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo) 2026-01-20 16:40:20,065 p=31524 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] *** 2026-01-20 16:40:20,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:02.217) 0:00:24.110 ******* 2026-01-20 16:40:20,066 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:02.217) 0:00:24.109 ******* 2026-01-20 16:40:20,574 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] *** 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.517) 0:00:24.627 ******* 2026-01-20 16:40:20,583 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.517) 0:00:24.626 ******* 2026-01-20 16:40:20,934 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] *** 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.363) 0:00:24.991 ******* 2026-01-20 16:40:20,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.363) 0:00:24.990 ******* 2026-01-20 16:40:20,987 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml) 2026-01-20 16:40:20,994 p=31524 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] ********* 2026-01-20 16:40:20,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.047) 0:00:25.039 ******* 2026-01-20 16:40:20,995 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:20 +0000 (0:00:00.047) 0:00:25.038 ******* 2026-01-20 16:40:21,013 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_ci_setup_packages: - bash-completion - ca-certificates - git-core - make - tar - tmux - python3-pip 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] *** 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:21 +0000 (0:00:00.025) 0:00:25.065 ******* 2026-01-20 16:40:21,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:21 +0000 (0:00:00.025) 0:00:25.064 ******* 2026-01-20 16:40:55,926 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:55,936 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] *** 2026-01-20 16:40:55,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:55 +0000 (0:00:34.915) 0:00:59.981 ******* 2026-01-20 16:40:55,937 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:55 +0000 (0:00:34.916) 0:00:59.980 ******* 2026-01-20 16:40:56,175 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] *** 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.250) 0:01:00.232 ******* 2026-01-20 16:40:56,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.250) 0:01:00.230 ******* 2026-01-20 16:40:56,389 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] *** 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.211) 0:01:00.443 ******* 2026-01-20 16:40:56,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:40:56 +0000 (0:00:00.211) 0:01:00.442 ******* 2026-01-20 16:41:02,021 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:05.632) 0:01:06.075 ******* 2026-01-20 16:41:02,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:05.632) 0:01:06.074 ******* 2026-01-20 16:41:02,066 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | TASK [ci_setup : Create completion file] *************************************** 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.042) 0:01:06.118 ******* 2026-01-20 16:41:02,073 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.042) 0:01:06.116 ******* 2026-01-20 16:41:02,451 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then source ~/.oc_completion fi] *** 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.384) 0:01:06.503 ******* 2026-01-20 16:41:02,458 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.384) 0:01:06.501 ******* 2026-01-20 16:41:02,874 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:02,880 p=31524 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] **** 2026-01-20 16:41:02,881 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.422) 0:01:06.925 ******* 2026-01-20 16:41:02,881 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.422) 0:01:06.924 ******* 2026-01-20 16:41:02,897 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{ cifmw_ci_setup_rhel_rhsm_default_repos + (cifmw_ci_setup_rhel_rhsm_extra_repos | default([])) }}] *** 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.024) 0:01:06.949 ******* 2026-01-20 16:41:02,905 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.024) 0:01:06.948 ******* 2026-01-20 16:41:02,921 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] *** 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:06.976 ******* 2026-01-20 16:41:02,931 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:06.974 ******* 2026-01-20 16:41:02,949 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,958 p=31524 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] *** 2026-01-20 16:41:02,959 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.027) 0:01:07.003 ******* 2026-01-20 16:41:02,959 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.027) 0:01:07.002 ******* 2026-01-20 16:41:02,976 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] *** 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:07.030 ******* 2026-01-20 16:41:02,985 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:02 +0000 (0:00:00.026) 0:01:07.028 ******* 2026-01-20 16:41:03,002 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] *** 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.026) 0:01:07.056 ******* 2026-01-20 16:41:03,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.026) 0:01:07.055 ******* 2026-01-20 16:41:03,035 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:03,042 p=31524 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] *** 2026-01-20 16:41:03,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.030) 0:01:07.087 ******* 2026-01-20 16:41:03,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:03 +0000 (0:00:00.030) 0:01:07.086 ******* 2026-01-20 16:41:03,333 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr) 2026-01-20 16:41:03,576 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs) 2026-01-20 16:41:03,796 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp) 2026-01-20 16:41:03,997 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes) 2026-01-20 16:41:04,202 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] *** 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:01.174) 0:01:08.261 ******* 2026-01-20 16:41:04,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:01.174) 0:01:08.260 ******* 2026-01-20 16:41:04,378 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] *** 2026-01-20 16:41:04,379 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:00.161) 0:01:08.423 ******* 2026-01-20 16:41:04,379 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:04 +0000 (0:00:00.161) 0:01:08.422 ******* 2026-01-20 16:41:04,630 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts) 2026-01-20 16:41:04,826 p=31524 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks) 2026-01-20 16:41:05,003 p=31524 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters) 2026-01-20 16:41:05,011 p=31524 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] *** 2026-01-20 16:41:05,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.632) 0:01:09.056 ******* 2026-01-20 16:41:05,012 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.632) 0:01:09.055 ******* 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] *** 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.035) 0:01:09.092 ******* 2026-01-20 16:41:05,047 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.035) 0:01:09.090 ******* 2026-01-20 16:41:05,118 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }} _repo_operator_info: {{ _repo_operator_info }} cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }} ] *** 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.077) 0:01:09.170 ******* 2026-01-20 16:41:05,125 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.077) 0:01:09.168 ******* 2026-01-20 16:41:05,172 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) => msg: | _repo_operator_name: watcher _repo_operator_info: [{'key': 'WATCHER_REPO', 'value': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator'}, {'key': 'WATCHER_BRANCH', 'value': ''}] cifmw_install_yamls_operators_repo: {'WATCHER_REPO': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator', 'WATCHER_BRANCH': ''} 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] *** 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.061) 0:01:09.231 ******* 2026-01-20 16:41:05,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.061) 0:01:09.230 ******* 2026-01-20 16:41:05,234 p=31524 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] *** 2026-01-20 16:41:05,235 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.047) 0:01:09.279 ******* 2026-01-20 16:41:05,235 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.047) 0:01:09.278 ******* 2026-01-20 16:41:05,258 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] *** 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.030) 0:01:09.310 ******* 2026-01-20 16:41:05,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.030) 0:01:09.308 ******* 2026-01-20 16:41:05,294 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] *** 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.348 ******* 2026-01-20 16:41:05,303 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.346 ******* 2026-01-20 16:41:05,334 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] *** 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.386 ******* 2026-01-20 16:41:05,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.385 ******* 2026-01-20 16:41:05,369 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{ _install_yamls_override_vars | default({}) | combine(item, recursive=True) }}] *** 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.037) 0:01:09.424 ******* 2026-01-20 16:41:05,380 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.038) 0:01:09.423 ******* 2026-01-20 16:41:05,468 p=31524 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False}) 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{ _install_yamls_override_vars.keys() | map('upper') | zip(_install_yamls_override_vars.values()) | items2dict(key_name=0, value_name=1) | combine({ 'OUT': cifmw_install_yamls_manifests_dir, 'OUTPUT_DIR': cifmw_install_yamls_edpm_dir, 'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref, 'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main') }) | combine(install_yamls_operators_repos) }}, cacheable=True] *** 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.095) 0:01:09.520 ******* 2026-01-20 16:41:05,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.095) 0:01:09.519 ******* 2026-01-20 16:41:05,518 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] *** 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.048) 0:01:09.569 ******* 2026-01-20 16:41:05,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:05 +0000 (0:00:00.048) 0:01:09.567 ******* 2026-01-20 16:41:06,187 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] *** 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.670) 0:01:10.239 ******* 2026-01-20 16:41:06,194 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.670) 0:01:10.238 ******* 2026-01-20 16:41:06,389 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,398 p=31524 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] *** 2026-01-20 16:41:06,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.204) 0:01:10.443 ******* 2026-01-20 16:41:06,399 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.204) 0:01:10.442 ******* 2026-01-20 16:41:06,433 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %} export {{ k }}={{ v }} {% endfor %}, mode=0644] *** 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.050) 0:01:10.494 ******* 2026-01-20 16:41:06,449 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.050) 0:01:10.492 ******* 2026-01-20 16:41:06,899 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] *** 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.459) 0:01:10.953 ******* 2026-01-20 16:41:06,909 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.459) 0:01:10.952 ******* 2026-01-20 16:41:06,941 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] *** 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.039) 0:01:10.993 ******* 2026-01-20 16:41:06,949 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.039) 0:01:10.992 ******* 2026-01-20 16:41:06,968 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:41:06,975 p=31524 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] *** 2026-01-20 16:41:06,976 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.026) 0:01:11.020 ******* 2026-01-20 16:41:06,976 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:06 +0000 (0:00:00.026) 0:01:11.019 ******* 2026-01-20 16:41:07,010 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] *** 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.044) 0:01:11.064 ******* 2026-01-20 16:41:07,020 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.044) 0:01:11.063 ******* 2026-01-20 16:41:07,386 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:07,404 p=31524 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] ***** 2026-01-20 16:41:07,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.384) 0:01:11.449 ******* 2026-01-20 16:41:07,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.384) 0:01:11.448 ******* 2026-01-20 16:41:07,431 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_generate_makes: changed: false debug: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile: - all - help - cleanup - deploy_cleanup - wait - crc_storage - crc_storage_cleanup - crc_storage_release - crc_storage_with_retries - crc_storage_cleanup_with_retries - operator_namespace - namespace - namespace_cleanup - input - input_cleanup - crc_bmo_setup - crc_bmo_cleanup - openstack_prep - openstack - openstack_wait - openstack_init - openstack_cleanup - openstack_repo - openstack_deploy_prep - openstack_deploy - openstack_wait_deploy - openstack_deploy_cleanup - openstack_update_run - update_services - update_system - openstack_patch_version - edpm_deploy_generate_keys - edpm_patch_ansible_runner_image - edpm_deploy_prep - edpm_deploy_cleanup - edpm_deploy - edpm_deploy_baremetal_prep - edpm_deploy_baremetal - edpm_wait_deploy_baremetal - edpm_wait_deploy - edpm_register_dns - edpm_nova_discover_hosts - openstack_crds - openstack_crds_cleanup - edpm_deploy_networker_prep - edpm_deploy_networker_cleanup - edpm_deploy_networker - infra_prep - infra - infra_cleanup - dns_deploy_prep - dns_deploy - dns_deploy_cleanup - netconfig_deploy_prep - netconfig_deploy - netconfig_deploy_cleanup - memcached_deploy_prep - memcached_deploy - memcached_deploy_cleanup - keystone_prep - keystone - keystone_cleanup - keystone_deploy_prep - keystone_deploy - keystone_deploy_cleanup - barbican_prep - barbican - barbican_cleanup - barbican_deploy_prep - barbican_deploy - barbican_deploy_validate - barbican_deploy_cleanup - mariadb - mariadb_cleanup - mariadb_deploy_prep - mariadb_deploy - mariadb_deploy_cleanup - placement_prep - placement - placement_cleanup - placement_deploy_prep - placement_deploy - placement_deploy_cleanup - glance_prep - glance - glance_cleanup - glance_deploy_prep - glance_deploy - glance_deploy_cleanup - ovn_prep - ovn - ovn_cleanup - ovn_deploy_prep - ovn_deploy - ovn_deploy_cleanup - neutron_prep - neutron - neutron_cleanup - neutron_deploy_prep - neutron_deploy - neutron_deploy_cleanup - cinder_prep - cinder - cinder_cleanup - cinder_deploy_prep - cinder_deploy - cinder_deploy_cleanup - rabbitmq_prep - rabbitmq - rabbitmq_cleanup - rabbitmq_deploy_prep - rabbitmq_deploy - rabbitmq_deploy_cleanup - ironic_prep - ironic - ironic_cleanup - ironic_deploy_prep - ironic_deploy - ironic_deploy_cleanup - octavia_prep - octavia - octavia_cleanup - octavia_deploy_prep - octavia_deploy - octavia_deploy_cleanup - designate_prep - designate - designate_cleanup - designate_deploy_prep - designate_deploy - designate_deploy_cleanup - nova_prep - nova - nova_cleanup - nova_deploy_prep - nova_deploy - nova_deploy_cleanup - mariadb_kuttl_run - mariadb_kuttl - kuttl_db_prep - kuttl_db_cleanup - kuttl_common_prep - kuttl_common_cleanup - keystone_kuttl_run - keystone_kuttl - barbican_kuttl_run - barbican_kuttl - placement_kuttl_run - placement_kuttl - cinder_kuttl_run - cinder_kuttl - neutron_kuttl_run - neutron_kuttl - octavia_kuttl_run - octavia_kuttl - designate_kuttl - designate_kuttl_run - ovn_kuttl_run - ovn_kuttl - infra_kuttl_run - infra_kuttl - ironic_kuttl_run - ironic_kuttl - ironic_kuttl_crc - heat_kuttl_run - heat_kuttl - heat_kuttl_crc - ansibleee_kuttl_run - ansibleee_kuttl_cleanup - ansibleee_kuttl_prep - ansibleee_kuttl - glance_kuttl_run - glance_kuttl - manila_kuttl_run - manila_kuttl - swift_kuttl_run - swift_kuttl - horizon_kuttl_run - horizon_kuttl - openstack_kuttl_run - openstack_kuttl - mariadb_chainsaw_run - mariadb_chainsaw - horizon_prep - horizon - horizon_cleanup - horizon_deploy_prep - horizon_deploy - horizon_deploy_cleanup - heat_prep - heat - heat_cleanup - heat_deploy_prep - heat_deploy - heat_deploy_cleanup - ansibleee_prep - ansibleee - ansibleee_cleanup - baremetal_prep - baremetal - baremetal_cleanup - ceph_help - ceph - ceph_cleanup - rook_prep - rook - rook_deploy_prep - rook_deploy - rook_crc_disk - rook_cleanup - lvms - nmstate - nncp - nncp_cleanup - netattach - netattach_cleanup - metallb - metallb_config - metallb_config_cleanup - metallb_cleanup - loki - loki_cleanup - loki_deploy - loki_deploy_cleanup - netobserv - netobserv_cleanup - netobserv_deploy - netobserv_deploy_cleanup - manila_prep - manila - manila_cleanup - manila_deploy_prep - manila_deploy - manila_deploy_cleanup - telemetry_prep - telemetry - telemetry_cleanup - telemetry_deploy_prep - telemetry_deploy - telemetry_deploy_cleanup - telemetry_kuttl_run - telemetry_kuttl - swift_prep - swift - swift_cleanup - swift_deploy_prep - swift_deploy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validate_marketplace - redis_deploy_prep - redis_deploy - redis_deploy_cleanup - set_slower_etcd_profile /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile: - help - download_tools - nfs - nfs_cleanup - crc - crc_cleanup - crc_scrub - crc_attach_default_interface - crc_attach_default_interface_cleanup - ipv6_lab_network - ipv6_lab_network_cleanup - ipv6_lab_nat64_router - ipv6_lab_nat64_router_cleanup - ipv6_lab_sno - ipv6_lab_sno_cleanup - ipv6_lab - ipv6_lab_cleanup - attach_default_interface - attach_default_interface_cleanup - network_isolation_bridge - network_isolation_bridge_cleanup - edpm_baremetal_compute - edpm_compute - edpm_compute_bootc - edpm_ansible_runner - edpm_computes_bgp - edpm_compute_repos - edpm_compute_cleanup - edpm_networker - edpm_networker_cleanup - edpm_deploy_instance - tripleo_deploy - standalone_deploy - standalone_sync - standalone - standalone_cleanup - standalone_snapshot - standalone_revert - cifmw_prepare - cifmw_cleanup - bmaas_network - bmaas_network_cleanup - bmaas_route_crc_and_crc_bmaas_networks - bmaas_route_crc_and_crc_bmaas_networks_cleanup - bmaas_crc_attach_network - bmaas_crc_attach_network_cleanup - bmaas_crc_baremetal_bridge - bmaas_crc_baremetal_bridge_cleanup - bmaas_baremetal_net_nad - bmaas_baremetal_net_nad_cleanup - bmaas_metallb - bmaas_metallb_cleanup - bmaas_virtual_bms - bmaas_virtual_bms_cleanup - bmaas_sushy_emulator - bmaas_sushy_emulator_cleanup - bmaas_sushy_emulator_wait - bmaas_generate_nodes_yaml - bmaas - bmaas_cleanup failed: false success: true 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, content={{ { 'cifmw_install_yamls_environment': cifmw_install_yamls_environment, 'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults } | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.035) 0:01:11.485 ******* 2026-01-20 16:41:07,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:07 +0000 (0:00:00.035) 0:01:11.483 ******* 2026-01-20 16:41:08,207 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:08,216 p=31524 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] *** 2026-01-20 16:41:08,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.776) 0:01:12.261 ******* 2026-01-20 16:41:08,217 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.776) 0:01:12.260 ******* 2026-01-20 16:41:08,245 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:08,261 p=31524 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] *** 2026-01-20 16:41:08,262 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.045) 0:01:12.306 ******* 2026-01-20 16:41:08,262 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.045) 0:01:12.305 ******* 2026-01-20 16:41:08,703 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] *** 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.450) 0:01:12.757 ******* 2026-01-20 16:41:08,712 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.450) 0:01:12.755 ******* 2026-01-20 16:41:08,742 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] *** 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.043) 0:01:12.801 ******* 2026-01-20 16:41:08,756 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:08 +0000 (0:00:00.043) 0:01:12.799 ******* 2026-01-20 16:41:09,256 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.516) 0:01:13.318 ******* 2026-01-20 16:41:09,273 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.516) 0:01:13.316 ******* 2026-01-20 16:41:09,347 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.083) 0:01:13.401 ******* 2026-01-20 16:41:09,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.083) 0:01:13.399 ******* 2026-01-20 16:41:09,493 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.145) 0:01:13.546 ******* 2026-01-20 16:41:09,502 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.145) 0:01:13.545 ******* 2026-01-20 16:41:09,660 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2026-01-20 16:41:09,677 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:41:09,677 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.175) 0:01:13.722 ******* 2026-01-20 16:41:09,678 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.175) 0:01:13.721 ******* 2026-01-20 16:41:09,739 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.072) 0:01:13.795 ******* 2026-01-20 16:41:09,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:09 +0000 (0:00:00.072) 0:01:13.794 ******* 2026-01-20 16:41:09,995 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.253) 0:01:14.049 ******* 2026-01-20 16:41:10,004 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.253) 0:01:14.047 ******* 2026-01-20 16:41:10,024 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.032) 0:01:14.081 ******* 2026-01-20 16:41:10,036 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.032) 0:01:14.079 ******* 2026-01-20 16:41:10,271 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,283 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:41:10,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.247) 0:01:14.328 ******* 2026-01-20 16:41:10,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.247) 0:01:14.327 ******* 2026-01-20 16:41:10,318 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,330 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:41:10,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.046) 0:01:14.375 ******* 2026-01-20 16:41:10,331 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.046) 0:01:14.374 ******* 2026-01-20 16:41:10,635 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,647 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:10,647 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.316) 0:01:14.692 ******* 2026-01-20 16:41:10,648 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.316) 0:01:14.691 ******* 2026-01-20 16:41:10,932 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:10,947 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2026-01-20 16:41:10,948 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.300) 0:01:14.992 ******* 2026-01-20 16:41:10,948 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:10 +0000 (0:00:00.300) 0:01:14.991 ******* 2026-01-20 16:41:11,029 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log 2026-01-20 16:41:51,615 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:51,629 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2026-01-20 16:41:51,630 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:40.681) 0:01:55.674 ******* 2026-01-20 16:41:51,630 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:40.682) 0:01:55.673 ******* 2026-01-20 16:41:51,661 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:51,668 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:41:51,669 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.039) 0:01:55.713 ******* 2026-01-20 16:41:51,669 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.039) 0:01:55.712 ******* 2026-01-20 16:41:51,899 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.242) 0:01:55.955 ******* 2026-01-20 16:41:51,911 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.242) 0:01:55.954 ******* 2026-01-20 16:41:51,932 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:51,970 p=31524 u=zuul n=ansible | PLAY [Prepare host virtualization] ********************************************* 2026-01-20 16:41:51,988 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:41:51,989 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.077) 0:01:56.033 ******* 2026-01-20 16:41:51,989 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:51 +0000 (0:00:00.077) 0:01:56.032 ******* 2026-01-20 16:41:52,040 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] *************** 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.060) 0:01:56.094 ******* 2026-01-20 16:41:52,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.060) 0:01:56.093 ******* 2026-01-20 16:41:52,075 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,086 p=31524 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ****** 2026-01-20 16:41:52,087 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.037) 0:01:56.131 ******* 2026-01-20 16:41:52,087 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.037) 0:01:56.130 ******* 2026-01-20 16:41:52,112 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,153 p=31524 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] *** 2026-01-20 16:41:52,198 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:41:52,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.111) 0:01:56.243 ******* 2026-01-20 16:41:52,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.111) 0:01:56.242 ******* 2026-01-20 16:41:52,350 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.171) 0:01:56.415 ******* 2026-01-20 16:41:52,370 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.171) 0:01:56.413 ******* 2026-01-20 16:41:52,595 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] *** 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.233) 0:01:56.649 ******* 2026-01-20 16:41:52,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.233) 0:01:56.647 ******* 2026-01-20 16:41:52,697 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] *** 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.100) 0:01:56.749 ******* 2026-01-20 16:41:52,705 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.100) 0:01:56.748 ******* 2026-01-20 16:41:52,729 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{ _net_env_def_slurp['content'] | b64decode | from_yaml }}, cacheable=True] *** 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.032) 0:01:56.782 ******* 2026-01-20 16:41:52,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.032) 0:01:56.780 ******* 2026-01-20 16:41:52,767 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] ***************************************** 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.045) 0:01:56.827 ******* 2026-01-20 16:41:52,782 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.045) 0:01:56.825 ******* 2026-01-20 16:41:52,807 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,816 p=31524 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] *********************************************** 2026-01-20 16:41:52,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.034) 0:01:56.861 ******* 2026-01-20 16:41:52,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.034) 0:01:56.860 ******* 2026-01-20 16:41:52,842 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,850 p=31524 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] ************** 2026-01-20 16:41:52,851 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.033) 0:01:56.895 ******* 2026-01-20 16:41:52,851 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.033) 0:01:56.894 ******* 2026-01-20 16:41:52,871 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:52,879 p=31524 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:52,880 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.028) 0:01:56.924 ******* 2026-01-20 16:41:52,880 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:52 +0000 (0:00:00.028) 0:01:56.923 ******* 2026-01-20 16:41:53,081 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] ***************** 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.211) 0:01:57.135 ******* 2026-01-20 16:41:53,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.211) 0:01:57.134 ******* 2026-01-20 16:41:53,121 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.043) 0:01:57.178 ******* 2026-01-20 16:41:53,134 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.043) 0:01:57.177 ******* 2026-01-20 16:41:53,158 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] *** 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.214 ******* 2026-01-20 16:41:53,170 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.213 ******* 2026-01-20 16:41:53,196 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] *** 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.034) 0:01:57.248 ******* 2026-01-20 16:41:53,204 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.034) 0:01:57.247 ******* 2026-01-20 16:41:53,231 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{ cifmw_openshift_login_kubeconfig | default(cifmw_openshift_kubeconfig) | default( ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else cifmw_openshift_login_kubeconfig_default_path ) | trim }}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{************ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] *** 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.285 ******* 2026-01-20 16:41:53,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.283 ******* 2026-01-20 16:41:53,279 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,287 p=31524 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] *** 2026-01-20 16:41:53,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.047) 0:01:57.332 ******* 2026-01-20 16:41:53,288 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.047) 0:01:57.331 ******* 2026-01-20 16:41:53,485 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or ( (cifmw_openshift_login_user is defined) and (cifmw_openshift_login_password is defined) and (cifmw_openshift_login_api is defined) ), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] *** 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.208) 0:01:57.541 ******* 2026-01-20 16:41:53,496 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.208) 0:01:57.539 ******* 2026-01-20 16:41:53,555 p=31524 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] *** 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.072) 0:01:57.614 ******* 2026-01-20 16:41:53,569 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.072) 0:01:57.612 ******* 2026-01-20 16:41:53,594 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,602 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{ ( cifmw_openshift_login_kubeconfig_content_b64.content | b64decode | from_yaml ). users | default([]) | selectattr('user.client-certificate-data', 'defined') | map(attribute="name") | map("split", "/") | map("first") }}, cacheable=True] *** 2026-01-20 16:41:53,602 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.647 ******* 2026-01-20 16:41:53,603 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.646 ******* 2026-01-20 16:41:53,626 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{ (cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) + (cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first) }}, cifmw_openshift_login_cert_login=True, cacheable=True] *** 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.682 ******* 2026-01-20 16:41:53,638 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.035) 0:01:57.681 ******* 2026-01-20 16:41:53,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,671 p=31524 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{ 0 if cifmw_openshift_login_retries_cnt is undefined else cifmw_openshift_login_retries_cnt|int + 1 }}] *** 2026-01-20 16:41:53,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.716 ******* 2026-01-20 16:41:53,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.033) 0:01:57.715 ******* 2026-01-20 16:41:53,699 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] ***************** 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.752 ******* 2026-01-20 16:41:53,708 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.036) 0:01:57.751 ******* 2026-01-20 16:41:53,734 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] *** 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.037) 0:01:57.789 ******* 2026-01-20 16:41:53,745 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.037) 0:01:57.788 ******* 2026-01-20 16:41:53,763 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] *** 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.029) 0:01:57.819 ******* 2026-01-20 16:41:53,774 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:53 +0000 (0:00:00.029) 0:01:57.817 ******* 2026-01-20 16:41:53,835 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log 2026-01-20 16:41:54,268 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:54,277 p=31524 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] *** 2026-01-20 16:41:54,278 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.503) 0:01:58.322 ******* 2026-01-20 16:41:54,278 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.503) 0:01:58.321 ******* 2026-01-20 16:41:54,300 p=31524 u=zuul n=ansible | ok: [localhost] => changed: false msg: All assertions passed 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] *** 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.031) 0:01:58.353 ******* 2026-01-20 16:41:54,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.031) 0:01:58.352 ******* 2026-01-20 16:41:54,670 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{ (not cifmw_openshift_login_new_token_out.skipped | default(false)) | ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout) }}, cacheable=True] *** 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.370) 0:01:58.724 ******* 2026-01-20 16:41:54,679 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.370) 0:01:58.722 ******* 2026-01-20 16:41:54,719 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] *** 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.048) 0:01:58.772 ******* 2026-01-20 16:41:54,727 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:54 +0000 (0:00:00.048) 0:01:58.770 ******* 2026-01-20 16:41:55,046 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,055 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] *** 2026-01-20 16:41:55,056 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.328) 0:01:59.100 ******* 2026-01-20 16:41:55,056 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.328) 0:01:59.099 ******* 2026-01-20 16:41:55,377 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,385 p=31524 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] **** 2026-01-20 16:41:55,386 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.330) 0:01:59.430 ******* 2026-01-20 16:41:55,386 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.330) 0:01:59.429 ******* 2026-01-20 16:41:55,744 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment | combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig}) ) if cifmw_install_yamls_environment is defined else omit }}, cacheable=True] *** 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.368) 0:01:59.798 ******* 2026-01-20 16:41:55,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.368) 0:01:59.797 ******* 2026-01-20 16:41:55,804 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] *** 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.058) 0:01:59.856 ******* 2026-01-20 16:41:55,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:55 +0000 (0:00:00.058) 0:01:59.855 ******* 2026-01-20 16:41:56,309 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml] *** 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.508) 0:02:00.365 ******* 2026-01-20 16:41:56,321 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.508) 0:02:00.364 ******* 2026-01-20 16:41:56,681 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:56,702 p=31524 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{ cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml | combine( { 'cifmw_install_yamls_environment': { 'KUBECONFIG': cifmw_openshift_login_kubeconfig } }, recursive=true) | to_nice_yaml }}, dest={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/parameters/install-yamls-params.yml, mode=0600] *** 2026-01-20 16:41:56,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.381) 0:02:00.747 ******* 2026-01-20 16:41:56,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:56 +0000 (0:00:00.381) 0:02:00.746 ******* 2026-01-20 16:41:57,204 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.515) 0:02:01.263 ******* 2026-01-20 16:41:57,218 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.515) 0:02:01.261 ******* 2026-01-20 16:41:57,445 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{ (( ([cifmw_install_yamls_defaults['NAMESPACE']] + ([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else []) ) if cifmw_install_yamls_defaults is defined else [] ) + cifmw_openshift_setup_create_namespaces) | unique }}] *** 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.235) 0:02:01.499 ******* 2026-01-20 16:41:57,454 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.235) 0:02:01.497 ******* 2026-01-20 16:41:57,490 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:41:57,502 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] *** 2026-01-20 16:41:57,503 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.048) 0:02:01.547 ******* 2026-01-20 16:41:57,503 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:57 +0000 (0:00:00.048) 0:02:01.546 ******* 2026-01-20 16:41:58,661 p=31524 u=zuul n=ansible | changed: [localhost] => (item=openstack) 2026-01-20 16:41:59,532 p=31524 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators) 2026-01-20 16:41:59,549 p=31524 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] *** 2026-01-20 16:41:59,549 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:02.046) 0:02:03.594 ******* 2026-01-20 16:41:59,550 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:02.046) 0:02:03.593 ******* 2026-01-20 16:41:59,571 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] *** 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.031) 0:02:03.626 ******* 2026-01-20 16:41:59,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.031) 0:02:03.624 ******* 2026-01-20 16:41:59,614 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=openstack) 2026-01-20 16:41:59,615 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators) 2026-01-20 16:41:59,616 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] *** 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.045) 0:02:03.671 ******* 2026-01-20 16:41:59,627 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.045) 0:02:03.670 ******* 2026-01-20 16:41:59,662 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,671 p=31524 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] *** 2026-01-20 16:41:59,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.044) 0:02:03.716 ******* 2026-01-20 16:41:59,672 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.044) 0:02:03.715 ******* 2026-01-20 16:41:59,701 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,712 p=31524 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] ************** 2026-01-20 16:41:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.757 ******* 2026-01-20 16:41:59,713 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.756 ******* 2026-01-20 16:41:59,743 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] *** 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.798 ******* 2026-01-20 16:41:59,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.041) 0:02:03.797 ******* 2026-01-20 16:41:59,780 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,788 p=31524 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] *** 2026-01-20 16:41:59,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.034) 0:02:03.833 ******* 2026-01-20 16:41:59,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.034) 0:02:03.832 ******* 2026-01-20 16:41:59,814 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] *** 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.868 ******* 2026-01-20 16:41:59,824 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.867 ******* 2026-01-20 16:41:59,852 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] *** 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.037) 0:02:03.906 ******* 2026-01-20 16:41:59,862 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.038) 0:02:03.905 ******* 2026-01-20 16:41:59,885 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] *** 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.941 ******* 2026-01-20 16:41:59,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:41:59 +0000 (0:00:00.035) 0:02:03.940 ******* 2026-01-20 16:42:00,816 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:00,826 p=31524 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] *** 2026-01-20 16:42:00,826 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.929) 0:02:04.871 ******* 2026-01-20 16:42:00,827 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.929) 0:02:04.870 ******* 2026-01-20 16:42:00,856 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:00,867 p=31524 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] *** 2026-01-20 16:42:00,868 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.041) 0:02:04.912 ******* 2026-01-20 16:42:00,868 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:00 +0000 (0:00:00.041) 0:02:04.911 ******* 2026-01-20 16:42:01,870 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] *** 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:01 +0000 (0:00:01.017) 0:02:05.930 ******* 2026-01-20 16:42:01,885 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:01 +0000 (0:00:01.017) 0:02:05.928 ******* 2026-01-20 16:42:03,170 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] *** 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:03 +0000 (0:00:01.296) 0:02:07.226 ******* 2026-01-20 16:42:03,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:03 +0000 (0:00:01.296) 0:02:07.225 ******* 2026-01-20 16:42:04,188 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:04,197 p=31524 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] *** 2026-01-20 16:42:04,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:01.015) 0:02:08.242 ******* 2026-01-20 16:42:04,198 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:01.015) 0:02:08.241 ******* 2026-01-20 16:42:04,218 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] *** 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.030) 0:02:08.273 ******* 2026-01-20 16:42:04,228 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.030) 0:02:08.271 ******* 2026-01-20 16:42:04,248 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] *********************** 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.036) 0:02:08.309 ******* 2026-01-20 16:42:04,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.036) 0:02:08.307 ******* 2026-01-20 16:42:04,289 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,299 p=31524 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] ************************************** 2026-01-20 16:42:04,300 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.035) 0:02:08.344 ******* 2026-01-20 16:42:04,300 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.035) 0:02:08.343 ******* 2026-01-20 16:42:04,321 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] ********************* 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.032) 0:02:08.377 ******* 2026-01-20 16:42:04,332 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.032) 0:02:08.375 ******* 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] *** 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.105) 0:02:08.483 ******* 2026-01-20 16:42:04,438 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.105) 0:02:08.481 ******* 2026-01-20 16:42:04,653 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] *** 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.224) 0:02:08.708 ******* 2026-01-20 16:42:04,663 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:04 +0000 (0:00:00.224) 0:02:08.706 ******* 2026-01-20 16:42:05,432 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] *** 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.776) 0:02:09.485 ******* 2026-01-20 16:42:05,440 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.776) 0:02:09.483 ******* 2026-01-20 16:42:05,468 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost 2026-01-20 16:42:05,484 p=31524 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] *** 2026-01-20 16:42:05,484 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.044) 0:02:09.529 ******* 2026-01-20 16:42:05,485 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:05 +0000 (0:00:00.044) 0:02:09.528 ******* 2026-01-20 16:42:06,129 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] *** 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:06 +0000 (0:00:00.653) 0:02:10.182 ******* 2026-01-20 16:42:06,138 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:06 +0000 (0:00:00.653) 0:02:10.181 ******* 2026-01-20 16:42:09,965 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] *** 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:03.879) 0:02:14.062 ******* 2026-01-20 16:42:10,017 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:03.879) 0:02:14.060 ******* 2026-01-20 16:42:10,035 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] *** 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.031) 0:02:14.094 ******* 2026-01-20 16:42:10,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.031) 0:02:14.092 ******* 2026-01-20 16:42:10,886 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:10,895 p=31524 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] *** 2026-01-20 16:42:10,895 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.846) 0:02:14.940 ******* 2026-01-20 16:42:10,896 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:10 +0000 (0:00:00.846) 0:02:14.939 ******* 2026-01-20 16:42:21,737 p=31524 u=zuul n=ansible | ok: [localhost] => (item=cainjector) 2026-01-20 16:42:22,563 p=31524 u=zuul n=ansible | ok: [localhost] => (item=webhook) 2026-01-20 16:42:23,315 p=31524 u=zuul n=ansible | ok: [localhost] => (item=cert-manager) 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] *** 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:12.497) 0:02:27.437 ******* 2026-01-20 16:42:23,393 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:12.497) 0:02:27.436 ******* 2026-01-20 16:42:23,614 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] *** 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:00.231) 0:02:27.669 ******* 2026-01-20 16:42:23,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:23 +0000 (0:00:00.231) 0:02:27.667 ******* 2026-01-20 16:42:24,807 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] *** 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:24 +0000 (0:00:01.192) 0:02:28.861 ******* 2026-01-20 16:42:24,817 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:24 +0000 (0:00:01.192) 0:02:28.860 ******* 2026-01-20 16:42:25,170 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:25,188 p=31524 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] **************** 2026-01-20 16:42:25,189 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.371) 0:02:29.233 ******* 2026-01-20 16:42:25,189 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.371) 0:02:29.232 ******* 2026-01-20 16:42:25,211 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,221 p=31524 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ******************************** 2026-01-20 16:42:25,222 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.032) 0:02:29.266 ******* 2026-01-20 16:42:25,222 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.032) 0:02:29.265 ******* 2026-01-20 16:42:25,241 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] ******************* 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.296 ******* 2026-01-20 16:42:25,252 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.295 ******* 2026-01-20 16:42:25,273 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,283 p=31524 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************ 2026-01-20 16:42:25,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.031) 0:02:29.328 ******* 2026-01-20 16:42:25,284 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.031) 0:02:29.327 ******* 2026-01-20 16:42:25,304 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************ 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.358 ******* 2026-01-20 16:42:25,314 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.030) 0:02:29.357 ******* 2026-01-20 16:42:25,347 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:25,363 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:25,363 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.049) 0:02:29.408 ******* 2026-01-20 16:42:25,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.049) 0:02:29.407 ******* 2026-01-20 16:42:25,426 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.070) 0:02:29.479 ******* 2026-01-20 16:42:25,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.070) 0:02:29.477 ******* 2026-01-20 16:42:25,541 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.119) 0:02:29.598 ******* 2026-01-20 16:42:25,553 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.119) 0:02:29.596 ******* 2026-01-20 16:42:25,709 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'}) 2026-01-20 16:42:25,722 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:25,723 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.169) 0:02:29.767 ******* 2026-01-20 16:42:25,723 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.169) 0:02:29.766 ******* 2026-01-20 16:42:25,784 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.072) 0:02:29.840 ******* 2026-01-20 16:42:25,795 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:25 +0000 (0:00:00.072) 0:02:29.838 ******* 2026-01-20 16:42:26,020 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.236) 0:02:30.077 ******* 2026-01-20 16:42:26,032 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.236) 0:02:30.075 ******* 2026-01-20 16:42:26,053 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.032) 0:02:30.109 ******* 2026-01-20 16:42:26,065 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.032) 0:02:30.108 ******* 2026-01-20 16:42:26,283 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.227) 0:02:30.336 ******* 2026-01-20 16:42:26,292 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.227) 0:02:30.335 ******* 2026-01-20 16:42:26,312 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.028) 0:02:30.365 ******* 2026-01-20 16:42:26,320 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.028) 0:02:30.363 ******* 2026-01-20 16:42:26,500 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,509 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:26,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.189) 0:02:30.554 ******* 2026-01-20 16:42:26,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.189) 0:02:30.553 ******* 2026-01-20 16:42:26,717 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] *** 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.220) 0:02:30.775 ******* 2026-01-20 16:42:26,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:26 +0000 (0:00:00.220) 0:02:30.773 ******* 2026-01-20 16:42:26,795 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log 2026-01-20 16:42:40,417 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:40,445 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] *** 2026-01-20 16:42:40,445 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:13.715) 0:02:44.490 ******* 2026-01-20 16:42:40,446 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:13.715) 0:02:44.489 ******* 2026-01-20 16:42:40,477 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.044) 0:02:44.535 ******* 2026-01-20 16:42:40,490 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.044) 0:02:44.533 ******* 2026-01-20 16:42:40,728 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.246) 0:02:44.781 ******* 2026-01-20 16:42:40,736 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.245) 0:02:44.779 ******* 2026-01-20 16:42:40,763 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,788 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:40,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.052) 0:02:44.833 ******* 2026-01-20 16:42:40,789 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.052) 0:02:44.832 ******* 2026-01-20 16:42:40,854 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.074) 0:02:44.908 ******* 2026-01-20 16:42:40,863 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:40 +0000 (0:00:00.074) 0:02:44.906 ******* 2026-01-20 16:42:40,990 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.137) 0:02:45.045 ******* 2026-01-20 16:42:41,000 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.137) 0:02:45.043 ******* 2026-01-20 16:42:41,128 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.145) 0:02:45.191 ******* 2026-01-20 16:42:41,146 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.145) 0:02:45.189 ******* 2026-01-20 16:42:41,202 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,213 p=31524 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%} - "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z" - "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z" {% endfor -%} - "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z" - "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro" - "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro" ] *** 2026-01-20 16:42:41,213 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.067) 0:02:45.258 ******* 2026-01-20 16:42:41,214 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.067) 0:02:45.257 ******* 2026-01-20 16:42:41,241 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] *** 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.036) 0:02:45.294 ******* 2026-01-20 16:42:41,250 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.036) 0:02:45.293 ******* 2026-01-20 16:42:41,264 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.029) 0:02:45.323 ******* 2026-01-20 16:42:41,279 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.029) 0:02:45.322 ******* 2026-01-20 16:42:41,343 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,353 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:41,354 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.074) 0:02:45.398 ******* 2026-01-20 16:42:41,354 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.074) 0:02:45.397 ******* 2026-01-20 16:42:41,458 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.113) 0:02:45.512 ******* 2026-01-20 16:42:41,467 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.113) 0:02:45.510 ******* 2026-01-20 16:42:41,580 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.136) 0:02:45.649 ******* 2026-01-20 16:42:41,604 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.136) 0:02:45.647 ******* 2026-01-20 16:42:41,665 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.068) 0:02:45.717 ******* 2026-01-20 16:42:41,673 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.068) 0:02:45.716 ******* 2026-01-20 16:42:41,795 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.135) 0:02:45.853 ******* 2026-01-20 16:42:41,808 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.135) 0:02:45.851 ******* 2026-01-20 16:42:41,926 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.133) 0:02:45.987 ******* 2026-01-20 16:42:41,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:41 +0000 (0:00:00.133) 0:02:45.985 ******* 2026-01-20 16:42:42,002 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,013 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ******** 2026-01-20 16:42:42,013 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.071) 0:02:46.058 ******* 2026-01-20 16:42:42,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.071) 0:02:46.057 ******* 2026-01-20 16:42:42,034 p=31524 u=zuul n=ansible | ok: [localhost] => msg: No support for that step yet 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.030) 0:02:46.088 ******* 2026-01-20 16:42:42,044 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.030) 0:02:46.087 ******* 2026-01-20 16:42:42,112 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.079) 0:02:46.167 ******* 2026-01-20 16:42:42,123 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.079) 0:02:46.166 ******* 2026-01-20 16:42:42,252 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.141) 0:02:46.309 ******* 2026-01-20 16:42:42,264 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.141) 0:02:46.307 ******* 2026-01-20 16:42:42,384 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.142) 0:02:46.451 ******* 2026-01-20 16:42:42,407 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.142) 0:02:46.450 ******* 2026-01-20 16:42:42,471 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.075) 0:02:46.526 ******* 2026-01-20 16:42:42,482 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.075) 0:02:46.525 ******* 2026-01-20 16:42:42,608 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,619 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:42,620 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.137) 0:02:46.664 ******* 2026-01-20 16:42:42,620 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.137) 0:02:46.663 ******* 2026-01-20 16:42:42,731 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,749 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:42:42,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.130) 0:02:46.794 ******* 2026-01-20 16:42:42,750 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.130) 0:02:46.793 ******* 2026-01-20 16:42:42,804 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.064) 0:02:46.858 ******* 2026-01-20 16:42:42,814 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.064) 0:02:46.857 ******* 2026-01-20 16:42:42,843 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=artifacts) 2026-01-20 16:42:42,849 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=logs) 2026-01-20 16:42:42,849 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,859 p=31524 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] *** 2026-01-20 16:42:42,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.045) 0:02:46.904 ******* 2026-01-20 16:42:42,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.045) 0:02:46.903 ******* 2026-01-20 16:42:42,896 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] *** 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.046) 0:02:46.950 ******* 2026-01-20 16:42:42,906 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:42 +0000 (0:00:00.046) 0:02:46.949 ******* 2026-01-20 16:42:42,998 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 16:42:42,999 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,007 p=31524 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] *** 2026-01-20 16:42:43,008 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.101) 0:02:47.052 ******* 2026-01-20 16:42:43,008 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.101) 0:02:47.051 ******* 2026-01-20 16:42:43,033 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] *** 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.087 ******* 2026-01-20 16:42:43,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.086 ******* 2026-01-20 16:42:43,070 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] *** 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.123 ******* 2026-01-20 16:42:43,079 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.035) 0:02:47.122 ******* 2026-01-20 16:42:43,105 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] *** 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.157 ******* 2026-01-20 16:42:43,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.156 ******* 2026-01-20 16:42:43,138 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] *************** 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.192 ******* 2026-01-20 16:42:43,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.034) 0:02:47.190 ******* 2026-01-20 16:42:43,177 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] *********** 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.039) 0:02:47.231 ******* 2026-01-20 16:42:43,187 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.039) 0:02:47.230 ******* 2026-01-20 16:42:43,220 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,231 p=31524 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:42:43,232 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.044) 0:02:47.276 ******* 2026-01-20 16:42:43,232 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.044) 0:02:47.275 ******* 2026-01-20 16:42:43,266 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,281 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:43,282 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.049) 0:02:47.326 ******* 2026-01-20 16:42:43,282 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.049) 0:02:47.325 ******* 2026-01-20 16:42:43,349 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,360 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:43,361 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.078) 0:02:47.405 ******* 2026-01-20 16:42:43,361 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.078) 0:02:47.404 ******* 2026-01-20 16:42:43,463 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.115) 0:02:47.521 ******* 2026-01-20 16:42:43,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.115) 0:02:47.519 ******* 2026-01-20 16:42:43,586 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:43,607 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:42:43,607 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.131) 0:02:47.652 ******* 2026-01-20 16:42:43,608 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.131) 0:02:47.651 ******* 2026-01-20 16:42:43,667 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.068) 0:02:47.721 ******* 2026-01-20 16:42:43,676 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.068) 0:02:47.719 ******* 2026-01-20 16:42:43,792 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.126) 0:02:47.848 ******* 2026-01-20 16:42:43,803 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.126) 0:02:47.846 ******* 2026-01-20 16:42:43,965 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2026-01-20 16:42:43,974 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for 80 Kustomize OpenStack CR cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.182) 0:02:48.030 ******* 2026-01-20 16:42:43,986 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:43 +0000 (0:00:00.182) 0:02:48.029 ******* 2026-01-20 16:42:44,034 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.057) 0:02:48.087 ******* 2026-01-20 16:42:44,043 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.057) 0:02:48.086 ******* 2026-01-20 16:42:44,265 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.231) 0:02:48.319 ******* 2026-01-20 16:42:44,274 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.231) 0:02:48.317 ******* 2026-01-20 16:42:44,300 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.034) 0:02:48.353 ******* 2026-01-20 16:42:44,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.034) 0:02:48.352 ******* 2026-01-20 16:42:44,511 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.211) 0:02:48.565 ******* 2026-01-20 16:42:44,520 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.211) 0:02:48.563 ******* 2026-01-20 16:42:44,546 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.035) 0:02:48.600 ******* 2026-01-20 16:42:44,556 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.035) 0:02:48.599 ******* 2026-01-20 16:42:44,744 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.198) 0:02:48.799 ******* 2026-01-20 16:42:44,754 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.198) 0:02:48.797 ******* 2026-01-20 16:42:44,968 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 80 Kustomize OpenStack CR] *********** 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.223) 0:02:49.022 ******* 2026-01-20 16:42:44,977 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:44 +0000 (0:00:00.223) 0:02:49.020 ******* 2026-01-20 16:42:45,032 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log 2026-01-20 16:42:47,059 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - 80 Kustomize OpenStack CR] ************** 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:02.091) 0:02:51.113 ******* 2026-01-20 16:42:47,069 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:02.091) 0:02:51.112 ******* 2026-01-20 16:42:47,099 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,111 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:47,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.042) 0:02:51.156 ******* 2026-01-20 16:42:47,112 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.042) 0:02:51.155 ******* 2026-01-20 16:42:47,300 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.197) 0:02:51.354 ******* 2026-01-20 16:42:47,309 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.197) 0:02:51.353 ******* 2026-01-20 16:42:47,336 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Create coo subscription cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.039) 0:02:51.394 ******* 2026-01-20 16:42:47,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.039) 0:02:51.392 ******* 2026-01-20 16:42:47,414 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.073) 0:02:51.467 ******* 2026-01-20 16:42:47,423 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.073) 0:02:51.466 ******* 2026-01-20 16:42:47,628 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,636 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:42:47,637 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.213) 0:02:51.681 ******* 2026-01-20 16:42:47,637 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.213) 0:02:51.680 ******* 2026-01-20 16:42:47,659 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.031) 0:02:51.712 ******* 2026-01-20 16:42:47,668 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.031) 0:02:51.711 ******* 2026-01-20 16:42:47,872 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.215) 0:02:51.928 ******* 2026-01-20 16:42:47,883 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.215) 0:02:51.926 ******* 2026-01-20 16:42:47,914 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.041) 0:02:51.969 ******* 2026-01-20 16:42:47,924 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:47 +0000 (0:00:00.041) 0:02:51.967 ******* 2026-01-20 16:42:48,135 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:48,144 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:42:48,144 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.220) 0:02:52.189 ******* 2026-01-20 16:42:48,145 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.220) 0:02:52.188 ******* 2026-01-20 16:42:48,360 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Create coo subscription] ************* 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.226) 0:02:52.415 ******* 2026-01-20 16:42:48,371 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:42:48 +0000 (0:00:00.226) 0:02:52.414 ******* 2026-01-20 16:42:48,431 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_create.log 2026-01-20 16:43:31,290 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Create coo subscription] **************** 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:42.934) 0:03:35.350 ******* 2026-01-20 16:43:31,305 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:42.934) 0:03:35.348 ******* 2026-01-20 16:43:31,346 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.050) 0:03:35.400 ******* 2026-01-20 16:43:31,356 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.050) 0:03:35.399 ******* 2026-01-20 16:43:31,564 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.217) 0:03:35.617 ******* 2026-01-20 16:43:31,573 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.217) 0:03:35.616 ******* 2026-01-20 16:43:31,596 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.040) 0:03:35.658 ******* 2026-01-20 16:43:31,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.040) 0:03:35.656 ******* 2026-01-20 16:43:31,675 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | TASK [Configure Storage Class name=ci_local_storage] *************************** 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.071) 0:03:35.729 ******* 2026-01-20 16:43:31,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.071) 0:03:35.728 ******* 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create role needed directories path={{ cifmw_cls_manifests_dir }}, state=directory, mode=0755] *** 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.121) 0:03:35.851 ******* 2026-01-20 16:43:31,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:31 +0000 (0:00:00.121) 0:03:35.850 ******* 2026-01-20 16:43:32,005 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create the cifmw_cls_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cls_namespace }}, kind=Namespace, state=present] *** 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.260) 0:03:36.112 ******* 2026-01-20 16:43:32,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.260) 0:03:36.110 ******* 2026-01-20 16:43:32,908 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:32,916 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Save storage manifests as artifacts dest={{ cifmw_cls_manifests_dir }}/storage-class.yaml, content={{ cifmw_cls_storage_manifest | to_nice_yaml }}, mode=0644] *** 2026-01-20 16:43:32,917 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.849) 0:03:36.961 ******* 2026-01-20 16:43:32,917 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:32 +0000 (0:00:00.849) 0:03:36.960 ******* 2026-01-20 16:43:33,330 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Get k8s nodes kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Node] *** 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:33 +0000 (0:00:00.423) 0:03:37.384 ******* 2026-01-20 16:43:33,340 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:33 +0000 (0:00:00.423) 0:03:37.383 ******* 2026-01-20 16:43:34,117 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Fetch hostnames for all hosts _raw_params=hostname] *** 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:34 +0000 (0:00:00.789) 0:03:38.173 ******* 2026-01-20 16:43:34,129 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:34 +0000 (0:00:00.789) 0:03:38.172 ******* 2026-01-20 16:43:34,424 p=31524 u=zuul n=ansible | changed: [localhost -> compute-0(38.102.83.181)] => (item=compute-0) 2026-01-20 16:43:34,694 p=31524 u=zuul n=ansible | changed: [localhost -> compute-1(38.102.83.192)] => (item=compute-1) 2026-01-20 16:43:35,664 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=crc) 2026-01-20 16:43:36,138 p=31524 u=zuul n=ansible | changed: [localhost -> controller(38.102.83.129)] => (item=controller) 2026-01-20 16:43:36,350 p=31524 u=zuul n=ansible | changed: [localhost] => (item=localhost) 2026-01-20 16:43:36,352 p=31524 u=zuul n=ansible | [WARNING]: Platform linux on host localhost is using the discovered Python interpreter at /usr/bin/python3.9, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.15/reference_appendices/interpreter_discovery.html for more information. 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Set the hosts k8s ansible hosts cifmw_ci_local_storage_k8s_hosts={{ _host_map | selectattr("key", "in", k8s_nodes_hostnames) | map(attribute="value") | list }}, cifmw_ci_local_storage_k8s_hostnames={{ k8s_nodes_hostnames }}] *** 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:02.232) 0:03:40.406 ******* 2026-01-20 16:43:36,362 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:02.232) 0:03:40.405 ******* 2026-01-20 16:43:36,424 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Apply the storage class manifests kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage-class.yaml] *** 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:00.072) 0:03:40.478 ******* 2026-01-20 16:43:36,434 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:36 +0000 (0:00:00.072) 0:03:40.477 ******* 2026-01-20 16:43:37,309 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Create directories on worker node _raw_params=worker_node_dirs.yml] *** 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.885) 0:03:41.364 ******* 2026-01-20 16:43:37,319 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.885) 0:03:41.362 ******* 2026-01-20 16:43:37,360 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_local_storage/tasks/worker_node_dirs.yml for localhost => (item=crc) 2026-01-20 16:43:37,374 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Perform action in the PV directory path={{ [ cifmw_cls_local_storage_name, 'pv'+ ("%02d" | format(item | int)) ] | path_join }}, state={{ 'directory' if cifmw_cls_action == 'create' else 'absent' }}, mode=0775] *** 2026-01-20 16:43:37,375 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.055) 0:03:41.419 ******* 2026-01-20 16:43:37,375 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:37 +0000 (0:00:00.055) 0:03:41.418 ******* 2026-01-20 16:43:37,916 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=1) 2026-01-20 16:43:38,372 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=2) 2026-01-20 16:43:38,893 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=3) 2026-01-20 16:43:39,476 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=4) 2026-01-20 16:43:39,973 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=5) 2026-01-20 16:43:40,454 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=6) 2026-01-20 16:43:41,115 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=7) 2026-01-20 16:43:41,646 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=8) 2026-01-20 16:43:42,125 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=9) 2026-01-20 16:43:42,678 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=10) 2026-01-20 16:43:43,153 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=11) 2026-01-20 16:43:43,549 p=31524 u=zuul n=ansible | changed: [localhost -> crc(38.102.83.143)] => (item=12) 2026-01-20 16:43:43,566 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Generate pv related storage manifest file src=storage.yaml.j2, dest={{ cifmw_cls_manifests_dir }}/storage.yaml, mode=0644] *** 2026-01-20 16:43:43,567 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:43 +0000 (0:00:06.191) 0:03:47.611 ******* 2026-01-20 16:43:43,567 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:43 +0000 (0:00:06.192) 0:03:47.610 ******* 2026-01-20 16:43:44,063 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:44,077 p=31524 u=zuul n=ansible | TASK [ci_local_storage : Apply pv related storage manifest file kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cls_manifests_dir }}/storage.yaml] *** 2026-01-20 16:43:44,077 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:44 +0000 (0:00:00.510) 0:03:48.122 ******* 2026-01-20 16:43:44,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:44 +0000 (0:00:00.510) 0:03:48.121 ******* 2026-01-20 16:43:45,064 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | TASK [Configure LVMS Storage Class name=ci_lvms_storage] *********************** 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:01.007) 0:03:49.130 ******* 2026-01-20 16:43:45,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:01.007) 0:03:49.128 ******* 2026-01-20 16:43:45,117 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,126 p=31524 u=zuul n=ansible | TASK [Run edpm_prepare name=edpm_prepare] ************************************** 2026-01-20 16:43:45,127 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.041) 0:03:49.171 ******* 2026-01-20 16:43:45,127 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.041) 0:03:49.170 ******* 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={'OPENSTACK_BRANCH': '', "GIT_CLONE_OPTS'": '-l', "OPENSTACK_REPO'": '{{ operators_build_output[cifmw_operator_build_meta_name].git_src_dir }}'}] *** 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.158) 0:03:49.329 ******* 2026-01-20 16:43:45,285 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.158) 0:03:49.328 ******* 2026-01-20 16:43:45,313 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set install_yamls Makefile environment variables cifmw_edpm_prepare_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) | combine(cifmw_edpm_prepare_extra_vars | default({})) }}, cifmw_edpm_prepare_make_openstack_env={% if cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output %} OPENSTACK_IMG: {{ operators_build_output[cifmw_operator_build_meta_name].image_catalog }} {% endif %} , cifmw_edpm_prepare_make_openstack_deploy_prep_env=CLEANUP_DIR_CMD: "true" , cifmw_edpm_prepare_operators_build_output={{ operators_build_output }}] *** 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.036) 0:03:49.366 ******* 2026-01-20 16:43:45,322 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.036) 0:03:49.365 ******* 2026-01-20 16:43:45,357 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | TASK [Prepare storage in CRC name=install_yamls_makes, tasks_from=make_crc_storage] *** 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.045) 0:03:49.412 ******* 2026-01-20 16:43:45,367 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.045) 0:03:49.410 ******* 2026-01-20 16:43:45,394 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | TASK [Prepare inputs name=install_yamls_makes, tasks_from=make_input] ********** 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.037) 0:03:49.449 ******* 2026-01-20 16:43:45,405 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.037) 0:03:49.448 ******* 2026-01-20 16:43:45,465 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_env var=make_input_env] *********** 2026-01-20 16:43:45,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.060) 0:03:49.510 ******* 2026-01-20 16:43:45,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.060) 0:03:49.509 ******* 2026-01-20 16:43:45,500 p=31524 u=zuul n=ansible | ok: [localhost] => make_input_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_input_params var=make_input_params] ***** 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.043) 0:03:49.554 ******* 2026-01-20 16:43:45,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.043) 0:03:49.552 ******* 2026-01-20 16:43:45,534 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:45,543 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run input output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make input, dry_run={{ make_input_dryrun|default(false)|bool }}, extra_args={{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}] *** 2026-01-20 16:43:45,543 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.034) 0:03:49.588 ******* 2026-01-20 16:43:45,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:45 +0000 (0:00:00.034) 0:03:49.587 ******* 2026-01-20 16:43:45,604 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_005_run.log 2026-01-20 16:43:47,113 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_input_until | default(true) }} 2026-01-20 16:43:47,117 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | TASK [OpenStack meta-operator installation name=install_yamls_makes, tasks_from=make_openstack] *** 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:01.593) 0:03:51.181 ******* 2026-01-20 16:43:47,137 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:01.593) 0:03:51.180 ******* 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_env var=make_openstack_env] *** 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.065) 0:03:51.247 ******* 2026-01-20 16:43:47,202 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.065) 0:03:51.245 ******* 2026-01-20 16:43:47,236 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_IMG: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:43:47,245 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_params var=make_openstack_params] *** 2026-01-20 16:43:47,246 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.043) 0:03:51.290 ******* 2026-01-20 16:43:47,246 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.043) 0:03:51.289 ******* 2026-01-20 16:43:47,276 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack, dry_run={{ make_openstack_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}] *** 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.041) 0:03:51.331 ******* 2026-01-20 16:43:47,287 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:43:47 +0000 (0:00:00.041) 0:03:51.330 ******* 2026-01-20 16:43:47,361 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_006_run.log 2026-01-20 16:45:57,601 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_until | default(true) }} 2026-01-20 16:45:57,606 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:45:57,633 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack subscription creation _raw_params=oc get sub openstack-operator --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} -o=jsonpath='{.status.installplan.name}'] *** 2026-01-20 16:45:57,633 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:45:57 +0000 (0:02:10.346) 0:06:01.678 ******* 2026-01-20 16:45:57,634 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:45:57 +0000 (0:02:10.346) 0:06:01.677 ******* 2026-01-20 16:46:28,496 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack operator to get installed _raw_params=oc wait InstallPlan {{ cifmw_edpm_prepare_wait_installplan_out.stdout }} --namespace={{ cifmw_install_yamls_defaults['OPERATOR_NAMESPACE'] }} --for=jsonpath='{.status.phase}'=Complete --timeout=20m] *** 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:28 +0000 (0:00:30.875) 0:06:32.553 ******* 2026-01-20 16:46:28,509 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:28 +0000 (0:00:30.875) 0:06:32.552 ******* 2026-01-20 16:46:29,000 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Check if the OpenStack initialization CRD exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, kind=CustomResourceDefinition, name=openstacks.operator.openstack.org] *** 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:29 +0000 (0:00:00.501) 0:06:33.055 ******* 2026-01-20 16:46:29,010 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:29 +0000 (0:00:00.501) 0:06:33.053 ******* 2026-01-20 16:46:30,066 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | TASK [OpenStack meta-operator initialization, if necessary name=install_yamls_makes, tasks_from=make_openstack_init] *** 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:01.070) 0:06:34.125 ******* 2026-01-20 16:46:30,080 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:01.070) 0:06:34.124 ******* 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_env var=make_openstack_init_env] *** 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.090) 0:06:34.216 ******* 2026-01-20 16:46:30,171 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.090) 0:06:34.214 ******* 2026-01-20 16:46:30,214 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_init_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:46:30,222 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_init_params var=make_openstack_init_params] *** 2026-01-20 16:46:30,223 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.051) 0:06:34.267 ******* 2026-01-20 16:46:30,223 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.051) 0:06:34.266 ******* 2026-01-20 16:46:30,256 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_init output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_init, dry_run={{ make_openstack_init_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}] *** 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.042) 0:06:34.309 ******* 2026-01-20 16:46:30,265 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:46:30 +0000 (0:00:00.042) 0:06:34.308 ******* 2026-01-20 16:46:30,331 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log 2026-01-20 16:47:51,847 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_init_until | default(true) }} 2026-01-20 16:47:51,850 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:51,866 p=31524 u=zuul n=ansible | TASK [Update OpenStack Services containers Env name=set_openstack_containers] *** 2026-01-20 16:47:51,867 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:01:21.601) 0:07:55.911 ******* 2026-01-20 16:47:51,867 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:01:21.601) 0:07:55.910 ******* 2026-01-20 16:47:51,903 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set facts for baremetal UEFI image url cifmw_update_containers_edpm_image_url={{ cifmw_build_images_output['images']['edpm-hardened-uefi']['image'] }}, cacheable=True] *** 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.049) 0:07:55.960 ******* 2026-01-20 16:47:51,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.049) 0:07:55.959 ******* 2026-01-20 16:47:51,944 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:51,954 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack control plane CR name=install_yamls_makes, tasks_from=make_openstack_deploy_prep] *** 2026-01-20 16:47:51,955 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.038) 0:07:55.999 ******* 2026-01-20 16:47:51,955 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:51 +0000 (0:00:00.038) 0:07:55.998 ******* 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_env var=make_openstack_deploy_prep_env] *** 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.061) 0:07:56.061 ******* 2026-01-20 16:47:52,016 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.061) 0:07:56.059 ******* 2026-01-20 16:47:52,051 p=31524 u=zuul n=ansible | ok: [localhost] => make_openstack_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' CLEANUP_DIR_CMD: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_openstack_deploy_prep_params var=make_openstack_deploy_prep_params] *** 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.044) 0:07:56.105 ******* 2026-01-20 16:47:52,061 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.044) 0:07:56.104 ******* 2026-01-20 16:47:52,086 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run openstack_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make openstack_deploy_prep, dry_run={{ make_openstack_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}] *** 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.034) 0:07:56.140 ******* 2026-01-20 16:47:52,095 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:52 +0000 (0:00:00.034) 0:07:56.139 ******* 2026-01-20 16:47:52,154 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log 2026-01-20 16:47:53,562 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_openstack_deploy_prep_until | default(true) }} 2026-01-20 16:47:53,564 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:53,580 p=31524 u=zuul n=ansible | TASK [Deploy NetConfig name=install_yamls_makes, tasks_from=make_netconfig_deploy] *** 2026-01-20 16:47:53,580 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:01.484) 0:07:57.625 ******* 2026-01-20 16:47:53,581 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:01.485) 0:07:57.624 ******* 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_env var=make_netconfig_deploy_env] *** 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.065) 0:07:57.691 ******* 2026-01-20 16:47:53,646 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.065) 0:07:57.689 ******* 2026-01-20 16:47:53,677 p=31524 u=zuul n=ansible | ok: [localhost] => make_netconfig_deploy_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_netconfig_deploy_params var=make_netconfig_deploy_params] *** 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.040) 0:07:57.732 ******* 2026-01-20 16:47:53,687 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.040) 0:07:57.730 ******* 2026-01-20 16:47:53,718 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:47:53,729 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run netconfig_deploy output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make netconfig_deploy, dry_run={{ make_netconfig_deploy_dryrun|default(false)|bool }}, extra_args={{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}] *** 2026-01-20 16:47:53,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.042) 0:07:57.774 ******* 2026-01-20 16:47:53,730 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:53 +0000 (0:00:00.042) 0:07:57.773 ******* 2026-01-20 16:47:53,794 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log 2026-01-20 16:47:58,994 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_netconfig_deploy_until | default(true) }} 2026-01-20 16:47:58,998 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:47:59,023 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Kustomize and deploy OpenStackControlPlane _raw_params=kustomize_and_deploy.yml] *** 2026-01-20 16:47:59,024 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:05.293) 0:08:03.068 ******* 2026-01-20 16:47:59,024 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:05.293) 0:08:03.067 ******* 2026-01-20 16:47:59,069 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/edpm_prepare/tasks/kustomize_and_deploy.yml for localhost 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name _ctlplane_name=controlplane] ************ 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.067) 0:08:03.136 ******* 2026-01-20 16:47:59,091 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.067) 0:08:03.134 ******* 2026-01-20 16:47:59,129 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Set vars related to update_containers content provider cifmw_update_containers_registry={{ content_provider_os_registry_url | split('/') | first }}, cifmw_update_containers_org={{ content_provider_os_registry_url | split('/') | last }}, cifmw_update_containers_tag={{ content_provider_dlrn_md5_hash }}, cifmw_update_containers_openstack=True] *** 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.048) 0:08:03.185 ******* 2026-01-20 16:47:59,140 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.048) 0:08:03.183 ******* 2026-01-20 16:47:59,187 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | TASK [Prepare OpenStackVersion CR name=update_containers] ********************** 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.057) 0:08:03.242 ******* 2026-01-20 16:47:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.057) 0:08:03.240 ******* 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | TASK [update_containers : Destination directory exists state=directory, recurse=True, path={{ cifmw_update_containers_dest_path | dirname }}] *** 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.061) 0:08:03.304 ******* 2026-01-20 16:47:59,259 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:47:59 +0000 (0:00:00.061) 0:08:03.302 ******* 2026-01-20 16:48:00,498 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | TASK [update_containers : Generate update containers yaml file src=update_containers.j2, dest={{ cifmw_update_containers_dest_path }}, mode=0644] *** 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:00 +0000 (0:00:01.250) 0:08:04.555 ******* 2026-01-20 16:48:00,510 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:00 +0000 (0:00:01.250) 0:08:04.553 ******* 2026-01-20 16:48:01,000 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | TASK [update_containers : Update the containers _raw_params=oc apply -f {{ cifmw_update_containers_dest_path }}] *** 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.501) 0:08:05.056 ******* 2026-01-20 16:48:01,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.501) 0:08:05.054 ******* 2026-01-20 16:48:01,417 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Controlplane name kustomization _ctlplane_name_kustomizations=[{'apiVersion': 'kustomize.config.k8s.io/v1beta1', 'kind': 'Kustomization', 'patches': [{'target': {'kind': 'OpenStackControlPlane'}, 'patch': '- op: replace\n path: /metadata/name\n value: {{ _ctlplane_name }}'}]}]] *** 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.425) 0:08:05.481 ******* 2026-01-20 16:48:01,437 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.425) 0:08:05.480 ******* 2026-01-20 16:48:01,466 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:01,485 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Perform kustomizations to the OpenStackControlPlane CR target_path={{ cifmw_edpm_prepare_openstack_crs_path }}, sort_ascending=False, kustomizations={{ cifmw_edpm_prepare_kustomizations + _ctlplane_name_kustomizations + (cifmw_edpm_prepare_extra_kustomizations | default([])) }}, kustomizations_paths={{ [ ( [ cifmw_edpm_prepare_manifests_dir, 'kustomizations', 'controlplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:48:01,486 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.048) 0:08:05.530 ******* 2026-01-20 16:48:01,486 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:01 +0000 (0:00:00.048) 0:08:05.529 ******* 2026-01-20 16:48:02,722 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:02,736 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Log the CR that is about to be applied var=cifmw_edpm_prepare_crs_kustomize_result] *** 2026-01-20 16:48:02,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:01.250) 0:08:06.781 ******* 2026-01-20 16:48:02,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:01.251) 0:08:06.780 ******* 2026-01-20 16:48:02,789 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_prepare_crs_kustomize_result: changed: true count: 5 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml result: - apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: os**********et cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: os**********et designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: os**********et dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: os**********et storageRequest: 10G openstack-cell1: replicas: 1 secret: os**********et storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: os**********et storage: storageClass: '' storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: os**********et storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: os**********et enabled: false heatInstance: heat ceilometer: enabled: true secret: os**********et cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: '2024-11-18' version: v13 secret: name: cloudkitty-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: customMonitoringStack: alertmanagerConfig: disabled: true prometheusConfig: enableRemoteWriteReceiver: true persistentVolumeClaim: resources: requests: storage: 20G replicas: 1 scrapeInterval: 30s resourceSelector: matchLabels: service: metricStorage retention: 24h enabled: true watcher: enabled: true template: decisionengineServiceTemplate: customServiceConfig: |- [watcher_cluster_data_model_collectors.compute] period = 60 [watcher_cluster_data_model_collectors.storage] period = 60 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Apply the OpenStackControlPlane CR output_dir={{ cifmw_edpm_prepare_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_prepare_crs_kustomize_result.output_path }}] *** 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:00.064) 0:08:06.845 ******* 2026-01-20 16:48:02,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:02 +0000 (0:00:00.064) 0:08:06.844 ******* 2026-01-20 16:48:02,861 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log 2026-01-20 16:48:03,148 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for control plane to change its status seconds={{ cifmw_edpm_prepare_wait_controplane_status_change_sec }}] *** 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:03 +0000 (0:00:00.355) 0:08:07.201 ******* 2026-01-20 16:48:03,156 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:03 +0000 (0:00:00.355) 0:08:07.200 ******* 2026-01-20 16:48:03,186 p=31524 u=zuul n=ansible | Pausing for 30 seconds 2026-01-20 16:48:33,223 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for OpenStack controlplane to be deployed _raw_params=oc wait OpenStackControlPlane {{ _ctlplane_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_prepare_timeout }}m] *** 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:33 +0000 (0:00:30.079) 0:08:37.280 ******* 2026-01-20 16:48:33,236 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:48:33 +0000 (0:00:30.079) 0:08:37.279 ******* 2026-01-20 16:53:47,744 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | TASK [Extract and install OpenStackControlplane CA role=install_openstack_ca] *** 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:05:14.530) 0:13:51.811 ******* 2026-01-20 16:53:47,766 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:05:14.530) 0:13:51.810 ******* 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Get CA bundle data with retries] ****************** 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:00:00.134) 0:13:51.945 ******* 2026-01-20 16:53:47,900 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:47 +0000 (0:00:00.133) 0:13:51.944 ******* 2026-01-20 16:53:48,399 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Set _ca_bundle fact if CA returned from OCP] ****** 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.508) 0:13:52.454 ******* 2026-01-20 16:53:48,409 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.508) 0:13:52.452 ******* 2026-01-20 16:53:48,444 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Creating tls-ca-bundle.pem from CA bundle dest={{ cifmw_install_openstack_ca_file_full_path }}, content={{ _ca_bundle }}, mode=0644] *** 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.043) 0:13:52.498 ******* 2026-01-20 16:53:48,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.043) 0:13:52.496 ******* 2026-01-20 16:53:48,858 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | TASK [install_openstack_ca : Check if OpenStackControlplane CA file is present path={{ cifmw_install_openstack_ca_file_full_path }}, get_attributes=False, get_checksum=False, get_mime=False] *** 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.413) 0:13:52.911 ******* 2026-01-20 16:53:48,866 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:48 +0000 (0:00:00.413) 0:13:52.910 ******* 2026-01-20 16:53:49,069 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | TASK [Call install_ca role to inject OpenStackControlplane CA file if present role=install_ca] *** 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.211) 0:13:53.123 ******* 2026-01-20 16:53:49,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.211) 0:13:53.121 ******* 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] *** 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.069) 0:13:53.192 ******* 2026-01-20 16:53:49,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.069) 0:13:53.190 ******* 2026-01-20 16:53:49,406 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] *** 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.269) 0:13:53.462 ******* 2026-01-20 16:53:49,417 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.269) 0:13:53.460 ******* 2026-01-20 16:53:49,443 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] *** 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.036) 0:13:53.498 ******* 2026-01-20 16:53:49,453 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.036) 0:13:53.496 ******* 2026-01-20 16:53:49,479 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] *** 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.035) 0:13:53.533 ******* 2026-01-20 16:53:49,488 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:49 +0000 (0:00:00.035) 0:13:53.531 ******* 2026-01-20 16:53:50,034 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:50,057 p=31524 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] *************** 2026-01-20 16:53:50,057 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:50 +0000 (0:00:00.568) 0:13:54.102 ******* 2026-01-20 16:53:50,058 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:50 +0000 (0:00:00.569) 0:13:54.101 ******* 2026-01-20 16:53:51,784 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:51,811 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Extract keystone endpoint host _raw_params=oc get keystoneapi keystone --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o jsonpath='{ .status.apiEndpoints.public }'] *** 2026-01-20 16:53:51,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:51 +0000 (0:00:01.754) 0:13:55.856 ******* 2026-01-20 16:53:51,812 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:51 +0000 (0:00:01.754) 0:13:55.855 ******* 2026-01-20 16:53:52,314 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:52,324 p=31524 u=zuul n=ansible | TASK [edpm_prepare : Wait for keystone endpoint to exist in DNS url={{ _cifmw_edpm_prepare_keystone_endpoint_out.stdout | trim }}, status_code={{ _keystone_response_codes }}, validate_certs={{ cifmw_edpm_prepare_verify_tls }}] *** 2026-01-20 16:53:52,324 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.512) 0:13:56.369 ******* 2026-01-20 16:53:52,325 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.512) 0:13:56.368 ******* 2026-01-20 16:53:52,837 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:52,859 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 16:53:52,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.535) 0:13:56.904 ******* 2026-01-20 16:53:52,860 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.535) 0:13:56.903 ******* 2026-01-20 16:53:52,931 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.082) 0:13:56.987 ******* 2026-01-20 16:53:52,942 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:52 +0000 (0:00:00.082) 0:13:56.985 ******* 2026-01-20 16:53:53,071 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ctlplane_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.143) 0:13:57.131 ******* 2026-01-20 16:53:53,086 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.143) 0:13:57.129 ******* 2026-01-20 16:53:53,229 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Tune rabbitmq resources', 'type': 'playbook', 'source': 'rabbitmq_tuning.yml'}) 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Tune rabbitmq resources cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.155) 0:13:57.286 ******* 2026-01-20 16:53:53,242 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.155) 0:13:57.285 ******* 2026-01-20 16:53:53,298 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.065) 0:13:57.352 ******* 2026-01-20 16:53:53,307 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.065) 0:13:57.350 ******* 2026-01-20 16:53:53,540 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.243) 0:13:57.595 ******* 2026-01-20 16:53:53,551 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.243) 0:13:57.594 ******* 2026-01-20 16:53:53,582 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.638 ******* 2026-01-20 16:53:53,593 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.636 ******* 2026-01-20 16:53:53,791 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.207) 0:13:57.846 ******* 2026-01-20 16:53:53,801 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.207) 0:13:57.844 ******* 2026-01-20 16:53:53,834 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.888 ******* 2026-01-20 16:53:53,843 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:53 +0000 (0:00:00.042) 0:13:57.886 ******* 2026-01-20 16:53:54,043 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:54,066 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 16:53:54,066 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.223) 0:13:58.111 ******* 2026-01-20 16:53:54,067 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.223) 0:13:58.110 ******* 2026-01-20 16:53:54,283 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Tune rabbitmq resources] ************* 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.230) 0:13:58.341 ******* 2026-01-20 16:53:54,297 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:54 +0000 (0:00:00.230) 0:13:58.340 ******* 2026-01-20 16:53:54,376 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log 2026-01-20 16:53:58,200 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:58,211 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Tune rabbitmq resources] **************** 2026-01-20 16:53:58,212 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:03.914) 0:14:02.256 ******* 2026-01-20 16:53:58,212 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:03.914) 0:14:02.255 ******* 2026-01-20 16:53:58,266 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.065) 0:14:02.322 ******* 2026-01-20 16:53:58,277 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.065) 0:14:02.320 ******* 2026-01-20 16:53:58,491 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:58,500 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 16:53:58,501 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.223) 0:14:02.545 ******* 2026-01-20 16:53:58,501 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.223) 0:14:02.544 ******* 2026-01-20 16:53:58,531 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.045) 0:14:02.591 ******* 2026-01-20 16:53:58,546 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.045) 0:14:02.589 ******* 2026-01-20 16:53:58,712 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define minimal set of repo variables when not running on Zuul _install_yamls_repos={{ ( { 'OPENSTACK_REPO': operators_build_output[cifmw_operator_build_meta_name].git_src_dir, 'OPENSTACK_BRANCH': '', 'GIT_CLONE_OPTS': '-l', } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}] *** 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.197) 0:14:02.789 ******* 2026-01-20 16:53:58,744 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.197) 0:14:02.787 ******* 2026-01-20 16:53:58,780 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,790 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Set install_yamls Makefile environment variables cifmw_edpm_deploy_baremetal_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine(_install_yamls_repos | default({})) }}, cifmw_edpm_deploy_baremetal_make_openstack_env={{ cifmw_edpm_deploy_baremetal_make_openstack_env | default({}) | combine( { 'OPENSTACK_IMG': operators_build_output[cifmw_operator_build_meta_name].image_catalog, } if (cifmw_operator_build_meta_name is defined and cifmw_operator_build_meta_name in operators_build_output) else {} ) }}, cifmw_edpm_deploy_baremetal_operators_build_output={{ operators_build_output }}] *** 2026-01-20 16:53:58,791 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.046) 0:14:02.835 ******* 2026-01-20 16:53:58,791 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.046) 0:14:02.834 ******* 2026-01-20 16:53:58,822 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,831 p=31524 u=zuul n=ansible | TASK [Create virtual baremetal name=install_yamls_makes, tasks_from=make_edpm_baremetal_compute] *** 2026-01-20 16:53:58,832 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.040) 0:14:02.876 ******* 2026-01-20 16:53:58,832 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.040) 0:14:02.875 ******* 2026-01-20 16:53:58,863 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,874 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create the config file mode=0644, content={{ cifmw_edpm_deploy_baremetal_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_baremetal_nova_extra_config_file }}] *** 2026-01-20 16:53:58,875 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.042) 0:14:02.919 ******* 2026-01-20 16:53:58,875 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.042) 0:14:02.918 ******* 2026-01-20 16:53:58,905 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_baremetal_common_env={{ cifmw_edpm_deploy_baremetal_common_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_baremetal_nova_extra_config_file }) }}, cacheable=True] *** 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.041) 0:14:02.960 ******* 2026-01-20 16:53:58,916 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:00.041) 0:14:02.959 ******* 2026-01-20 16:53:58,947 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_baremetal_prep] *** 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.109) 0:14:03.070 ******* 2026-01-20 16:53:59,026 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.109) 0:14:03.069 ******* 2026-01-20 16:53:59,074 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations={% if content_provider_registry_ip is defined or not cifmw_edpm_deploy_baremetal_bootc %} apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- {% if content_provider_registry_ip is defined %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["{{ content_provider_registry_ip }}:5001"] {% endif %} {% if not cifmw_edpm_deploy_baremetal_bootc %} - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_bootstrap_command value: sudo dnf -y update {% endif %} {% endif %}, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_baremetal_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.130 ******* 2026-01-20 16:53:59,085 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.128 ******* 2026-01-20 16:53:59,121 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Log the CR that is about to be applied var=cifmw_edpm_deploy_baremetal_crs_kustomize_result] *** 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.063) 0:14:03.194 ******* 2026-01-20 16:53:59,149 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.063) 0:14:03.192 ******* 2026-01-20 16:53:59,188 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Create repo-setup-downstream OpenStackDataPlaneService _raw_params=oc apply -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -f "{{ cifmw_installyamls_repos }}/devsetup/edpm/services/dataplane_v1beta1_openstackdataplaneservice_reposetup_downstream.yaml"] *** 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.048) 0:14:03.242 ******* 2026-01-20 16:53:59,197 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.048) 0:14:03.241 ******* 2026-01-20 16:53:59,236 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Get list of services defined under OpenStackDataPlaneNodeSet resource _raw_params=yq '.spec.services[]' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.049) 0:14:03.292 ******* 2026-01-20 16:53:59,247 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.049) 0:14:03.290 ******* 2026-01-20 16:53:59,288 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to add "repo-setup-downstream" service _raw_params=yq -i '.spec.services = ["repo-setup-downstream"] + .spec.services' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.050) 0:14:03.342 ******* 2026-01-20 16:53:59,298 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.050) 0:14:03.341 ******* 2026-01-20 16:53:59,334 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Patch OpenStackDataPlaneNodeSet resource to replace "repo-setup" with "repo-setup-downstream" service _raw_params=yq -i '(.spec.services[] | select(. == "repo-setup")) |= "repo-setup-downstream"' {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.046) 0:14:03.389 ******* 2026-01-20 16:53:59,344 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.046) 0:14:03.387 ******* 2026-01-20 16:53:59,379 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Apply the OpenStackDataPlaneNodeSet CR output_dir={{ cifmw_edpm_deploy_baremetal_basedir }}/artifacts, script=oc apply -f {{ cifmw_edpm_deploy_baremetal_crs_kustomize_result.output_path }}] *** 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.042) 0:14:03.431 ******* 2026-01-20 16:53:59,387 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.042) 0:14:03.430 ******* 2026-01-20 16:53:59,415 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,425 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for Ironic to be ready _raw_params=oc wait pod -l name=ironic -n baremetal-operator-system --for=condition=Ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_ironic_timeout_mins }}m] *** 2026-01-20 16:53:59,426 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.038) 0:14:03.470 ******* 2026-01-20 16:53:59,426 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.038) 0:14:03.469 ******* 2026-01-20 16:53:59,455 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server pod to be created _raw_params=oc get po -l osp-provisionserver/name=openstack-edpm-ipam-provisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} -o name] *** 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.510 ******* 2026-01-20 16:53:59,465 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.508 ******* 2026-01-20 16:53:59,514 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStack Provision Server deployment to be available _raw_params=oc wait deployment openstack-edpm-ipam-provisionserver-openstackprovisionserver -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for condition=Available --timeout={{ cifmw_edpm_deploy_baremetal_wait_provisionserver_timeout_mins }}m] *** 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.569 ******* 2026-01-20 16:53:59,525 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.568 ******* 2026-01-20 16:53:59,556 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for baremetal nodes to reach 'provisioned' state _raw_params=oc wait bmh --all -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=jsonpath='{.status.provisioning.state}'=provisioned --timeout={{ cifmw_edpm_deploy_baremetal_wait_bmh_timeout_mins }}m] *** 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.610 ******* 2026-01-20 16:53:59,565 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.608 ******* 2026-01-20 16:53:59,594 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Register the list of compute nodes _raw_params=oc get bmh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }}] *** 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.649 ******* 2026-01-20 16:53:59,605 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.648 ******* 2026-01-20 16:53:59,633 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Print the list of compute nodes var=compute_nodes_output.stdout_lines] *** 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.690 ******* 2026-01-20 16:53:59,645 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.040) 0:14:03.688 ******* 2026-01-20 16:53:59,674 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Wait for OpenStackDataPlaneNodeSet to be deployed _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=ready --timeout={{ cifmw_edpm_deploy_baremetal_wait_dataplane_timeout_mins }}m] *** 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.729 ******* 2026-01-20 16:53:59,685 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.039) 0:14:03.728 ******* 2026-01-20 16:53:59,720 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | TASK [edpm_deploy_baremetal : Run nova-manage discover_hosts to ensure compute nodes are mapped _raw_params=oc rsh -n {{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose] *** 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.043) 0:14:03.773 ******* 2026-01-20 16:53:59,728 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.043) 0:14:03.771 ******* 2026-01-20 16:53:59,757 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.059) 0:14:03.833 ******* 2026-01-20 16:53:59,788 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.060) 0:14:03.831 ******* 2026-01-20 16:53:59,859 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Set compute config and common environment facts compute_config={{ cifmw_libvirt_manager_configuration['vms']['compute'] }}, cifmw_libvirt_manager_common_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path }) }}, cacheable=True] *** 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.082) 0:14:03.915 ******* 2026-01-20 16:53:59,870 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.082) 0:14:03.913 ******* 2026-01-20 16:53:59,905 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure needed directories exist path={{ item }}, state=directory, mode=0755] *** 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.044) 0:14:03.959 ******* 2026-01-20 16:53:59,914 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.044) 0:14:03.957 ******* 2026-01-20 16:53:59,961 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/workload) 2026-01-20 16:53:59,973 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/edpm_compute) 2026-01-20 16:53:59,982 p=31524 u=zuul n=ansible | skipping: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/openstack/cr/) 2026-01-20 16:53:59,984 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure image is available _raw_params=get_image.yml] *** 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.079) 0:14:04.038 ******* 2026-01-20 16:53:59,994 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:53:59 +0000 (0:00:00.079) 0:14:04.037 ******* 2026-01-20 16:54:00,031 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | TASK [Create EDPM compute VMs name=install_yamls_makes, tasks_from=make_edpm_compute.yml] *** 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.047) 0:14:04.086 ******* 2026-01-20 16:54:00,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.047) 0:14:04.084 ******* 2026-01-20 16:54:00,075 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Catch compute IPs _raw_params=virsh -c qemu:///system -q domifaddr --source arp --domain edpm-compute-{{ item }}] *** 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.129 ******* 2026-01-20 16:54:00,084 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.127 ******* 2026-01-20 16:54:00,123 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Ensure we get SSH host={{ item.stdout.split()[-1].split('/')[0] }}, port=22, timeout=60] *** 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.051) 0:14:04.181 ******* 2026-01-20 16:54:00,136 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.051) 0:14:04.179 ******* 2026-01-20 16:54:00,168 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | TASK [libvirt_manager : Output CR for extra computes dest={{ cifmw_libvirt_manager_basedir }}/artifacts/{{ cifmw_install_yamls_defaults['NAMESPACE'] }}/cr/99-cifmw-computes-{{ item }}.yaml, src=kustomize_compute.yml.j2, mode=0644] *** 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.044) 0:14:04.225 ******* 2026-01-20 16:54:00,181 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.044) 0:14:04.224 ******* 2026-01-20 16:54:00,212 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,233 p=31524 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 1 name=hci_prepare, tasks_from=phase1.yml] *** 2026-01-20 16:54:00,234 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.052) 0:14:04.278 ******* 2026-01-20 16:54:00,234 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.052) 0:14:04.277 ******* 2026-01-20 16:54:00,263 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Set EDPM related vars cifmw_edpm_deploy_env={{ cifmw_install_yamls_environment | combine({'PATH': cifmw_path}) | combine({'DATAPLANE_REGISTRY_URL': cifmw_edpm_deploy_registry_url }) | combine({'DATAPLANE_CONTAINER_TAG': cifmw_repo_setup_full_hash | default(cifmw_install_yamls_defaults['DATAPLANE_CONTAINER_TAG']) }) | combine(cifmw_edpm_deploy_extra_vars | default({})) | combine(_install_yamls_repos | default({})) }}, cacheable=True] *** 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.321 ******* 2026-01-20 16:54:00,276 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.042) 0:14:04.320 ******* 2026-01-20 16:54:00,330 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:54:00,342 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Create the config file mode=0644, content={{ cifmw_edpm_deploy_nova_compute_extra_config }}, dest={{ _cifmw_edpm_deploy_nova_extra_config_file }}] *** 2026-01-20 16:54:00,342 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.066) 0:14:04.387 ******* 2026-01-20 16:54:00,343 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.066) 0:14:04.386 ******* 2026-01-20 16:54:00,874 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Define DATAPLANE_EXTRA_NOVA_CONFIG_FILE cifmw_edpm_deploy_env={{ cifmw_edpm_deploy_env | default({}) | combine({'DATAPLANE_EXTRA_NOVA_CONFIG_FILE': _cifmw_edpm_deploy_nova_extra_config_file }) }}, cacheable=True] *** 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.554) 0:14:04.941 ******* 2026-01-20 16:54:00,897 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.554) 0:14:04.940 ******* 2026-01-20 16:54:00,956 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | TASK [Prepare OpenStack Dataplane NodeSet CR name=install_yamls_makes, tasks_from=make_edpm_deploy_prep] *** 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.075) 0:14:05.016 ******* 2026-01-20 16:54:00,972 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:00 +0000 (0:00:00.075) 0:14:05.015 ******* 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_env var=make_edpm_deploy_prep_env] *** 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.077) 0:14:05.094 ******* 2026-01-20 16:54:01,049 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.077) 0:14:05.092 ******* 2026-01-20 16:54:01,103 p=31524 u=zuul n=ansible | ok: [localhost] => make_edpm_deploy_prep_env: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_TAG: c3923531bcda0b0811b2d5053f189beb DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /home/zuul/ci-framework-data/nova-extra-config.conf DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 2 INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm PATH: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin SSH_KEY_FILE: /home/zuul/.ssh/id_cifw WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Debug make_edpm_deploy_prep_params var=make_edpm_deploy_prep_params] *** 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.061) 0:14:05.156 ******* 2026-01-20 16:54:01,111 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.061) 0:14:05.154 ******* 2026-01-20 16:54:01,143 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 16:54:01,153 p=31524 u=zuul n=ansible | TASK [install_yamls_makes : Run edpm_deploy_prep output_dir={{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts, chdir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls, script=make edpm_deploy_prep, dry_run={{ make_edpm_deploy_prep_dryrun|default(false)|bool }}, extra_args={{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}] *** 2026-01-20 16:54:01,154 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.042) 0:14:05.198 ******* 2026-01-20 16:54:01,154 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:01 +0000 (0:00:00.042) 0:14:05.197 ******* 2026-01-20 16:54:01,222 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log 2026-01-20 16:54:09,668 p=31524 u=zuul n=ansible | [WARNING]: conditional statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ make_edpm_deploy_prep_until | default(true) }} 2026-01-20 16:54:09,671 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Perform kustomizations to the OpenStackDataPlaneNodeSet CR target_path={{ cifmw_edpm_deploy_openstack_crs_path }}, sort_ascending=False, kustomizations_paths={{ [ ( [ cifmw_edpm_deploy_manifests_dir, 'kustomizations', 'dataplane' ] | ansible.builtin.path_join ) ] }}] *** 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:09 +0000 (0:00:08.536) 0:14:13.735 ******* 2026-01-20 16:54:09,690 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:09 +0000 (0:00:08.536) 0:14:13.733 ******* 2026-01-20 16:54:10,136 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Log the CR that is about to be applied var=cifmw_edpm_deploy_crs_kustomize_result] *** 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.456) 0:14:14.191 ******* 2026-01-20 16:54:10,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.456) 0:14:14.190 ******* 2026-01-20 16:54:10,189 p=31524 u=zuul n=ansible | ok: [localhost] => cifmw_edpm_deploy_crs_kustomize_result: changed: true count: 2 failed: false kustomizations_paths: - /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yaml - /home/zuul/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yaml output_path: /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yaml result: - apiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack - apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack - apiVersion: v1 data: 25-nova-extra.conf: | [libvirt] cpu_mode = custom cpu_models = Nehalem kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam - apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: '2' networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 199.204.44.24 edpm_container_registry_insecure_registries: - 38.102.83.51:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter enable_debug: false gather_facts: false image_prefix: openstack image_tag: c3923531bcda0b0811b2d5053f189beb neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true 2026-01-20 16:54:10,198 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Apply dataplane resources but ignore DataPlaneDeployment kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | rejectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-01-20 16:54:10,198 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.051) 0:14:14.243 ******* 2026-01-20 16:54:10,199 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:10 +0000 (0:00:00.051) 0:14:14.242 ******* 2026-01-20 16:54:11,042 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneNodeSet become SetupReady _raw_params=oc wait OpenStackDataPlaneNodeSet {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=SetupReady --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:11 +0000 (0:00:00.853) 0:14:15.097 ******* 2026-01-20 16:54:11,052 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:11 +0000 (0:00:00.853) 0:14:15.095 ******* 2026-01-20 16:54:12,006 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:12,030 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Apply DataPlaneDeployment resource kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, definition={{ lookup('file', cifmw_edpm_deploy_crs_kustomize_result.output_path) | from_yaml_all | selectattr('kind', 'search', cifmw_edpm_deploy_step2_kind) }}] *** 2026-01-20 16:54:12,030 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.978) 0:14:16.075 ******* 2026-01-20 16:54:12,031 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.978) 0:14:16.074 ******* 2026-01-20 16:54:12,918 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:54:12,936 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready _raw_params=oc wait OpenStackDataPlaneDeployment {{ cr_name }} --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} --for=condition=Ready --timeout={{ cifmw_edpm_deploy_timeout }}m] *** 2026-01-20 16:54:12,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.905) 0:14:16.981 ******* 2026-01-20 16:54:12,937 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 16:54:12 +0000 (0:00:00.905) 0:14:16.980 ******* 2026-01-20 17:18:16,958 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | TASK [edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped output_dir={{ cifmw_basedir }}/artifacts, executable=/bin/bash, script=set -xe oc rsh --namespace={{ cifmw_install_yamls_defaults['NAMESPACE'] }} nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose ] *** 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:16 +0000 (0:24:04.036) 0:38:21.017 ******* 2026-01-20 17:18:16,973 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:16 +0000 (0:24:04.036) 0:38:21.016 ******* 2026-01-20 17:18:17,074 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_013_run_nova_manage_discover.log 2026-01-20 17:18:19,830 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | TASK [Validate EDPM name=install_yamls_makes, tasks_from=make_edpm_deploy_instance] *** 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:02.869) 0:38:23.887 ******* 2026-01-20 17:18:19,842 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:02.869) 0:38:23.885 ******* 2026-01-20 17:18:19,876 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:19,927 p=31524 u=zuul n=ansible | PLAY [Deploy NFS server on target nodes] *************************************** 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.105) 0:38:23.992 ******* 2026-01-20 17:18:19,947 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.105) 0:38:23.990 ******* 2026-01-20 17:18:19,969 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Install required packages name=['nfs-utils', 'iptables']] **** 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.031) 0:38:24.024 ******* 2026-01-20 17:18:19,979 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:19 +0000 (0:00:00.032) 0:38:24.022 ******* 2026-01-20 17:18:19,999 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Configure nfs to use v4 only path=/etc/nfs.conf, section=nfsd, option=vers3, value=n, backup=True, mode=0644] *** 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.055 ******* 2026-01-20 17:18:20,011 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.054 ******* 2026-01-20 17:18:20,033 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Disable NFSv3-related services name={{ item }}, masked=True] *** 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.086 ******* 2026-01-20 17:18:20,041 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.084 ******* 2026-01-20 17:18:20,064 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpc-statd.service) 2026-01-20 17:18:20,070 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.service) 2026-01-20 17:18:20,073 p=31524 u=zuul n=ansible | skipping: [compute-0] => (item=rpcbind.socket) 2026-01-20 17:18:20,074 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,081 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Ensure shared folder exist path=/data/{{ item }}, state=directory, mode=755] *** 2026-01-20 17:18:20,082 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.040) 0:38:24.126 ******* 2026-01-20 17:18:20,082 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.040) 0:38:24.125 ******* 2026-01-20 17:18:20,102 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Set nfs network vars _raw_params=oc get ipset {{ _nfs_host }} -n {{ _ipset_namespace }} -o jsonpath='{.status.reservations[?(@.network=="{{ _nfs_network_name }}")]}'] *** 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.157 ******* 2026-01-20 17:18:20,113 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.156 ******* 2026-01-20 17:18:20,139 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Store nfs network vars dest={{ cifmw_basedir }}/artifacts/parameters/nfs-params.yml, content={{ { 'cifmw_nfs_ip': cifmw_nfs_network_out.stdout | from_json | json_query('address'), 'cifmw_nfs_network_range': cifmw_nfs_network_out.stdout | from_json | json_query('cidr') } | to_nice_yaml }}, mode=0644] *** 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.192 ******* 2026-01-20 17:18:20,147 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.190 ******* 2026-01-20 17:18:20,174 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Generate nftables rules file content=add rule inet filter EDPM_INPUT tcp dport 2049 accept , dest={{ nftables_path }}/nfs-server.nft, mode=0666] *** 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.227 ******* 2026-01-20 17:18:20,182 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.034) 0:38:24.225 ******* 2026-01-20 17:18:20,202 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,210 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Update nftables.conf and include nfs rules at the bottom path={{ nftables_conf }}, line=include "{{ nftables_path }}/nfs-server.nft", insertafter=EOF] *** 2026-01-20 17:18:20,210 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.028) 0:38:24.255 ******* 2026-01-20 17:18:20,211 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.028) 0:38:24.254 ******* 2026-01-20 17:18:20,231 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,239 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Restart nftables service name=nftables, state=restarted] ***** 2026-01-20 17:18:20,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.284 ******* 2026-01-20 17:18:20,240 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.283 ******* 2026-01-20 17:18:20,260 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,270 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Configure the ip the nfs server should listen on path=/etc/nfs.conf, section=nfsd, option=host, value={{ cifmw_nfs_network_out.stdout | from_json | json_query('address') }}, backup=True, mode=0644] *** 2026-01-20 17:18:20,270 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.315 ******* 2026-01-20 17:18:20,271 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.030) 0:38:24.314 ******* 2026-01-20 17:18:20,291 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Enable and restart nfs-server service name=nfs-server, state=restarted, enabled=True] *** 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.347 ******* 2026-01-20 17:18:20,302 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.031) 0:38:24.345 ******* 2026-01-20 17:18:20,325 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,334 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Add shares to /etc/exports path=/etc/exports, line=/data/{{ item }} {{ cifmw_nfs_network_out.stdout | from_json | json_query('cidr') }}(rw,sync,no_root_squash)] *** 2026-01-20 17:18:20,335 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.032) 0:38:24.379 ******* 2026-01-20 17:18:20,335 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.032) 0:38:24.378 ******* 2026-01-20 17:18:20,355 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | TASK [cifmw_nfs : Export the shares _raw_params=exportfs -a] ******************* 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.409 ******* 2026-01-20 17:18:20,364 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.029) 0:38:24.407 ******* 2026-01-20 17:18:20,385 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,421 p=31524 u=zuul n=ansible | PLAY [Clear ceph target hosts facts to force refreshing in HCI deployments] **** 2026-01-20 17:18:20,523 p=31524 u=zuul n=ansible | TASK [Early end if architecture deploy _raw_params=end_play] ******************* 2026-01-20 17:18:20,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.159) 0:38:24.568 ******* 2026-01-20 17:18:20,524 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.159) 0:38:24.567 ******* 2026-01-20 17:18:20,537 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | TASK [Clear ceph target hosts facts _raw_params=clear_facts] ******************* 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.020) 0:38:24.589 ******* 2026-01-20 17:18:20,544 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.020) 0:38:24.587 ******* 2026-01-20 17:18:20,553 p=31524 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:18:20,602 p=31524 u=zuul n=ansible | PLAY [Deploy ceph using hooks] ************************************************* 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.079) 0:38:24.669 ******* 2026-01-20 17:18:20,624 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.079) 0:38:24.667 ******* 2026-01-20 17:18:20,674 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.057) 0:38:24.726 ******* 2026-01-20 17:18:20,682 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.057) 0:38:24.725 ******* 2026-01-20 17:18:20,798 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_ceph _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.125) 0:38:24.852 ******* 2026-01-20 17:18:20,807 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.125) 0:38:24.850 ******* 2026-01-20 17:18:20,921 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:20,952 p=31524 u=zuul n=ansible | PLAY [Continue HCI deploy, deploy architecture and validate workflow] ********** 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | TASK [Prepare for HCI deploy phase 2 name=hci_prepare, tasks_from=phase2.yml] *** 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.175) 0:38:25.028 ******* 2026-01-20 17:18:20,983 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:20 +0000 (0:00:00.175) 0:38:25.026 ******* 2026-01-20 17:18:21,005 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | TASK [Continue HCI deployment name=edpm_deploy] ******************************** 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.031) 0:38:25.059 ******* 2026-01-20 17:18:21,014 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.031) 0:38:25.057 ******* 2026-01-20 17:18:21,036 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.030) 0:38:25.089 ******* 2026-01-20 17:18:21,045 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.030) 0:38:25.088 ******* 2026-01-20 17:18:21,112 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.074) 0:38:25.164 ******* 2026-01-20 17:18:21,120 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.074) 0:38:25.163 ******* 2026-01-20 17:18:21,235 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.125) 0:38:25.290 ******* 2026-01-20 17:18:21,245 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.125) 0:38:25.289 ******* 2026-01-20 17:18:21,390 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'type': 'playbook', 'inventory': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'}) 2026-01-20 17:18:21,399 p=31524 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Patch Openstack Prometheus to enable admin API', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml'}) 2026-01-20 17:18:21,410 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 17:18:21,411 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.165) 0:38:25.455 ******* 2026-01-20 17:18:21,411 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.165) 0:38:25.454 ******* 2026-01-20 17:18:21,457 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.055) 0:38:25.511 ******* 2026-01-20 17:18:21,466 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.055) 0:38:25.509 ******* 2026-01-20 17:18:21,731 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.277) 0:38:25.788 ******* 2026-01-20 17:18:21,743 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.277) 0:38:25.787 ******* 2026-01-20 17:18:21,768 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.037) 0:38:25.826 ******* 2026-01-20 17:18:21,781 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:21 +0000 (0:00:00.037) 0:38:25.824 ******* 2026-01-20 17:18:21,986 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.219) 0:38:26.045 ******* 2026-01-20 17:18:22,001 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.219) 0:38:26.044 ******* 2026-01-20 17:18:22,029 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.040) 0:38:26.086 ******* 2026-01-20 17:18:22,042 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.040) 0:38:26.085 ******* 2026-01-20 17:18:22,247 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.216) 0:38:26.303 ******* 2026-01-20 17:18:22,258 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.216) 0:38:26.301 ******* 2026-01-20 17:18:22,462 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] *************** 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.217) 0:38:26.520 ******* 2026-01-20 17:18:22,476 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:22 +0000 (0:00:00.217) 0:38:26.519 ******* 2026-01-20 17:18:22,537 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_014_run_hook_without_retry.log 2026-01-20 17:18:52,921 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ****************** 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:30.459) 0:38:56.980 ******* 2026-01-20 17:18:52,936 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:30.460) 0:38:56.979 ******* 2026-01-20 17:18:52,964 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.038) 0:38:57.019 ******* 2026-01-20 17:18:52,974 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:52 +0000 (0:00:00.038) 0:38:57.017 ******* 2026-01-20 17:18:53,158 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.194) 0:38:57.213 ******* 2026-01-20 17:18:53,168 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.194) 0:38:57.211 ******* 2026-01-20 17:18:53,188 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | TASK [run_hook : Set playbook path for Patch Openstack Prometheus to enable admin API cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] *** 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.031) 0:38:57.244 ******* 2026-01-20 17:18:53,200 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.031) 0:38:57.243 ******* 2026-01-20 17:18:53,247 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] *********************** 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.054) 0:38:57.299 ******* 2026-01-20 17:18:53,255 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.054) 0:38:57.298 ******* 2026-01-20 17:18:53,452 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] *** 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.205) 0:38:57.505 ******* 2026-01-20 17:18:53,460 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.205) 0:38:57.503 ******* 2026-01-20 17:18:53,483 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{ (cifmw_basedir, 'artifacts/parameters') | path_join }}, file_type=file, patterns=*.yml] *** 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.032) 0:38:57.537 ******* 2026-01-20 17:18:53,492 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.032) 0:38:57.536 ******* 2026-01-20 17:18:53,691 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] *** 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.210) 0:38:57.748 ******* 2026-01-20 17:18:53,703 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.210) 0:38:57.746 ******* 2026-01-20 17:18:53,728 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,737 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] *** 2026-01-20 17:18:53,737 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.034) 0:38:57.782 ******* 2026-01-20 17:18:53,738 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.034) 0:38:57.781 ******* 2026-01-20 17:18:53,937 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] *** 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.208) 0:38:57.991 ******* 2026-01-20 17:18:53,946 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:53 +0000 (0:00:00.208) 0:38:57.989 ******* 2026-01-20 17:18:54,139 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Patch Openstack Prometheus to enable admin API] *** 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.201) 0:38:58.192 ******* 2026-01-20 17:18:54,148 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:54 +0000 (0:00:00.201) 0:38:58.191 ******* 2026-01-20 17:18:54,205 p=31524 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_015_run_hook_without_retry_patch.log 2026-01-20 17:18:56,058 p=31524 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:18:56,077 p=31524 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Patch Openstack Prometheus to enable admin API] *** 2026-01-20 17:18:56,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:01.929) 0:39:00.122 ******* 2026-01-20 17:18:56,078 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:01.929) 0:39:00.121 ******* 2026-01-20 17:18:56,102 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.036) 0:39:00.159 ******* 2026-01-20 17:18:56,114 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.036) 0:39:00.157 ******* 2026-01-20 17:18:56,295 p=31524 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] *** 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.193) 0:39:00.352 ******* 2026-01-20 17:18:56,308 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.193) 0:39:00.351 ******* 2026-01-20 17:18:56,329 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | TASK [Run validations name=validations] **************************************** 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.041) 0:39:00.394 ******* 2026-01-20 17:18:56,349 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.041) 0:39:00.392 ******* 2026-01-20 17:18:56,372 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.042) 0:39:00.436 ******* 2026-01-20 17:18:56,391 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.042) 0:39:00.434 ******* 2026-01-20 17:18:56,411 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.030) 0:39:00.467 ******* 2026-01-20 17:18:56,422 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.030) 0:39:00.465 ******* 2026-01-20 17:18:56,441 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.027) 0:39:00.494 ******* 2026-01-20 17:18:56,450 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.027) 0:39:00.493 ******* 2026-01-20 17:18:56,574 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'name': '80 Kustomize OpenStack CR', 'type': 'playbook', 'source': 'control_plane_horizon.yml'}) 2026-01-20 17:18:56,575 p=31524 u=zuul n=ansible | skipping: [localhost] => (item={'name': 'Create coo subscription', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml'}) 2026-01-20 17:18:56,576 p=31524 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:56,598 p=31524 u=zuul n=ansible | TASK [Early end if not architecture deploy _raw_params=end_play] *************** 2026-01-20 17:18:56,599 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.148) 0:39:00.643 ******* 2026-01-20 17:18:56,599 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.149) 0:39:00.642 ******* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | compute-0 : ok=0 changed=0 unreachable=0 failed=0 skipped=14 rescued=0 ignored=0 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | localhost : ok=242 changed=80 unreachable=0 failed=0 skipped=158 rescued=0 ignored=1 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.014) 0:39:00.658 ******* 2026-01-20 17:18:56,613 p=31524 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | edpm_deploy : Wait for OpenStackDataPlaneDeployment become Ready ----- 1444.04s 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | edpm_prepare : Wait for OpenStack controlplane to be deployed --------- 314.53s 2026-01-20 17:18:56,614 p=31524 u=zuul n=ansible | install_yamls_makes : Run openstack ----------------------------------- 130.35s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run openstack_init ------------------------------- 81.60s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Create coo subscription ------------ 42.93s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 40.68s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 34.92s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_prepare : Wait for OpenStack subscription creation ---------------- 30.88s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 30.46s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_prepare : Wait for control plane to change its status ------------- 30.08s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters -- 13.72s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 12.50s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 9.62s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run edpm_deploy_prep ------------------------------ 8.54s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_local_storage : Perform action in the PV directory ------------------- 6.19s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.63s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | install_yamls_makes : Run netconfig_deploy ------------------------------ 5.29s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | run_hook : Run hook without retry - Tune rabbitmq resources ------------- 3.91s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 3.88s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_deploy : Run nova-manage discover_hosts to ensure compute nodes are mapped --- 2.87s 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | Tuesday 20 January 2026 17:18:56 +0000 (0:00:00.016) 0:39:00.658 ******* 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | =============================================================================== 2026-01-20 17:18:56,615 p=31524 u=zuul n=ansible | edpm_deploy ---------------------------------------------------------- 1451.03s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | edpm_prepare ---------------------------------------------------------- 380.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_yamls_makes --------------------------------------------------- 229.38s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | run_hook -------------------------------------------------------------- 149.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 43.27s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 21.23s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 20.75s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ci_local_storage ------------------------------------------------------- 13.28s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 7.05s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_ca -------------------------------------------------------------- 4.65s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | openshift_login --------------------------------------------------------- 4.34s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 3.88s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 2.70s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | update_containers ------------------------------------------------------- 2.18s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | install_openstack_ca ---------------------------------------------------- 1.25s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 1.12s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | edpm_deploy_baremetal --------------------------------------------------- 1.04s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | cifmw_nfs --------------------------------------------------------------- 0.58s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 0.49s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.47s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.41s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | libvirt_manager --------------------------------------------------------- 0.36s 2026-01-20 17:18:56,616 p=31524 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.35s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.meta ---------------------------------------------------- 0.12s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.08s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.07s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.04s 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 17:18:56,617 p=31524 u=zuul n=ansible | total ---------------------------------------------------------------- 2340.61s 2026-01-20 17:18:58,644 p=36747 u=zuul n=ansible | PLAY [Run Post-deployment admin setup steps, test, and compliance scan] ******** 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 17:18:58,684 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.045) 0:00:00.045 ******* 2026-01-20 17:18:58,748 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.077) 0:00:00.123 ******* 2026-01-20 17:18:58,762 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.077) 0:00:00.122 ******* 2026-01-20 17:18:58,873 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.124) 0:00:00.248 ******* 2026-01-20 17:18:58,887 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:58 +0000 (0:00:00.124) 0:00:00.247 ******* 2026-01-20 17:18:58,998 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] *** 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.135) 0:00:00.383 ******* 2026-01-20 17:18:59,022 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.135) 0:00:00.382 ******* 2026-01-20 17:18:59,068 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnets _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet list --network {{ item.0.name }} -c Name -f value | grep -c {{ item.1.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet delete {{ item.1.name }} fi ] *** 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.061) 0:00:00.445 ******* 2026-01-20 17:18:59,084 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:18:59 +0000 (0:00:00.061) 0:00:00.444 ******* 2026-01-20 17:19:02,658 p=36747 u=zuul n=ansible | changed: [localhost] => (item=[{'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}, {'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]) 2026-01-20 17:19:02,673 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing subnet pools _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack subnet pool delete {{ item.name }} fi ] *** 2026-01-20 17:19:02,674 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:02 +0000 (0:00:03.589) 0:00:04.034 ******* 2026-01-20 17:19:02,674 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:02 +0000 (0:00:03.589) 0:00:04.034 ******* 2026-01-20 17:19:05,522 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv4', 'default_prefix_length': 26, 'prefixes': '10.1.0.0/20', 'is_default': True, 'is_shared': True}) 2026-01-20 17:19:08,520 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'shared-pool-ipv6', 'default_prefix_length': 64, 'prefixes': 'fdfe:381f:8400::/56', 'is_default': True, 'is_shared': True}) 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | TASK [os_net_setup : Delete existing networks _raw_params=set -euxo pipefail if [ $(oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network list -c Name -f value | grep -c {{ item.name }}) != 0 ];then oc exec -n {{ cifmw_os_net_setup_namespace }} openstackclient -- openstack network delete {{ item.name }} fi ] *** 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:08 +0000 (0:00:05.862) 0:00:09.897 ******* 2026-01-20 17:19:08,536 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:08 +0000 (0:00:05.862) 0:00:09.896 ******* 2026-01-20 17:19:11,539 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'name': 'public', 'external': True, 'shared': False, 'is_default': True, 'provider_network_type': 'flat', 'provider_physical_network': 'datacentre', 'availability_zone_hints': [], 'subnets': [{'name': 'public_subnet', 'cidr': '192.168.122.0/24', 'allocation_pool_start': '192.168.122.171', 'allocation_pool_end': '192.168.122.250', 'gateway_ip': '192.168.122.1', 'enable_dhcp': True}]}) 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print network creation commands msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:03.025) 0:00:12.922 ******* 2026-01-20 17:19:11,561 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:03.025) 0:00:12.922 ******* 2026-01-20 17:19:11,642 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack network create \ --external \ --default \ --provider-network-type flat \ --provider-physical-network datacentre \ --no-share \ public 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create networks _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:00.093) 0:00:13.015 ******* 2026-01-20 17:19:11,654 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:11 +0000 (0:00:00.092) 0:00:13.015 ******* 2026-01-20 17:19:15,276 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:15,287 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print subnet command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:15,288 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:03.633) 0:00:16.648 ******* 2026-01-20 17:19:15,288 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:03.633) 0:00:16.648 ******* 2026-01-20 17:19:15,418 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet create \ --allocation-pool start=192.168.122.171,end=192.168.122.250 \ --subnet-range 192.168.122.0/24 \ --gateway 192.168.122.1 \ --network public \ public_subnet 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create subnets _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:00.141) 0:00:16.790 ******* 2026-01-20 17:19:15,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:15 +0000 (0:00:00.141) 0:00:16.789 ******* 2026-01-20 17:19:20,718 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | TASK [os_net_setup : Print subnet pools command creation msg={{ lookup('ansible.builtin.template', _template_file) }}] *** 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:05.298) 0:00:22.089 ******* 2026-01-20 17:19:20,728 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:05.298) 0:00:22.088 ******* 2026-01-20 17:19:20,836 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | set -euo pipefail oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 26 \ --pool-prefix 10.1.0.0/20 \ --default \ --share \ shared-pool-ipv4 oc exec -n openstack openstackclient -- openstack subnet pool create \ --default-prefix-length 64 \ --pool-prefix fdfe:381f:8400::/56 \ --default \ --share \ shared-pool-ipv6 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | TASK [os_net_setup : Create subnet pools _raw_params={{ lookup('ansible.builtin.template', _template_file) }} ] *** 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:00.147) 0:00:22.237 ******* 2026-01-20 17:19:20,876 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:20 +0000 (0:00:00.147) 0:00:22.236 ******* 2026-01-20 17:19:26,579 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:05.722) 0:00:27.959 ******* 2026-01-20 17:19:26,598 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:05.722) 0:00:27.958 ******* 2026-01-20 17:19:26,670 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.083) 0:00:28.042 ******* 2026-01-20 17:19:26,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.083) 0:00:28.042 ******* 2026-01-20 17:19:26,789 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:26,800 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_admin_setup _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:26,800 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.119) 0:00:28.161 ******* 2026-01-20 17:19:26,801 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.119) 0:00:28.161 ******* 2026-01-20 17:19:26,908 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | TASK [Validate required variables are set that=['cifmw_fdp_update_target_package is defined', 'cifmw_fdp_update_target_package | length > 0', 'cifmw_fdp_update_repo_baseurl is defined', 'cifmw_fdp_update_repo_baseurl | length > 0'], fail_msg=Required variables are missing! You must set: - cifmw_fdp_update_target_package: Name of the RPM package to update - cifmw_fdp_update_repo_baseurl: Repository base URL containing the updated package , success_msg=Required variables validated successfully] *** 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.147) 0:00:28.309 ******* 2026-01-20 17:19:26,948 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.147) 0:00:28.308 ******* 2026-01-20 17:19:26,966 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Validate parameters and initialize _raw_params=validate.yml] *** 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.031) 0:00:28.341 ******* 2026-01-20 17:19:26,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:26 +0000 (0:00:00.031) 0:00:28.340 ******* 2026-01-20 17:19:27,003 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,019 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Detect OpenShift registry URL _raw_params=detect_registry.yml] *** 2026-01-20 17:19:27,019 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.039) 0:00:28.380 ******* 2026-01-20 17:19:27,020 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.039) 0:00:28.380 ******* 2026-01-20 17:19:27,039 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,056 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Configure registry CA certificate _raw_params=configure_ca_cert.yml] *** 2026-01-20 17:19:27,057 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.037) 0:00:28.418 ******* 2026-01-20 17:19:27,057 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.037) 0:00:28.417 ******* 2026-01-20 17:19:27,076 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Authenticate with registry _raw_params=authenticate_registry.yml] *** 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.036) 0:00:28.454 ******* 2026-01-20 17:19:27,093 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.036) 0:00:28.454 ******* 2026-01-20 17:19:27,151 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Fetch images to process _raw_params=fetch_images.yml] *** 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.070) 0:00:28.525 ******* 2026-01-20 17:19:27,164 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.070) 0:00:28.524 ******* 2026-01-20 17:19:27,183 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Build and push updated images _raw_params=process_image.yml] *** 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.554 ******* 2026-01-20 17:19:27,193 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.554 ******* 2026-01-20 17:19:27,211 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,221 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Display summary msg=['==========================================', 'Container image update complete', 'Target package: {{ cifmw_fdp_update_container_images_target_package }}', 'Images processed: {{ _cifmw_fdp_update_container_images_processed_images }}', "Updated: {{ _cifmw_fdp_update_container_images_updated_cr_keys | join(', ') if _cifmw_fdp_update_container_images_updated_cr_keys | length > 0 else 'None' }}", '==========================================']] *** 2026-01-20 17:19:27,222 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.028) 0:00:28.582 ******* 2026-01-20 17:19:27,222 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.028) 0:00:28.582 ******* 2026-01-20 17:19:27,242 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,251 p=36747 u=zuul n=ansible | TASK [fdp_update_container_images : Cleanup temporary directory path={{ _cifmw_fdp_update_container_images_temp_dir }}, state=absent] *** 2026-01-20 17:19:27,251 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.612 ******* 2026-01-20 17:19:27,252 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.029) 0:00:28.612 ******* 2026-01-20 17:19:27,269 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Validate parameters and initialize _raw_params=validate.yml] *** 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.035) 0:00:28.648 ******* 2026-01-20 17:19:27,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.035) 0:00:28.647 ******* 2026-01-20 17:19:27,309 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,320 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Setup hypervisor firewall for registry access _raw_params=setup_hypervisor_firewall.yml] *** 2026-01-20 17:19:27,321 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.033) 0:00:28.681 ******* 2026-01-20 17:19:27,321 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.033) 0:00:28.681 ******* 2026-01-20 17:19:27,341 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Fetch EDPM NodeSets _raw_params=fetch_nodesets.yml] **** 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.713 ******* 2026-01-20 17:19:27,352 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.712 ******* 2026-01-20 17:19:27,373 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Update container images _raw_params=update_container_images.yml] *** 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.744 ******* 2026-01-20 17:19:27,383 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.031) 0:00:28.744 ******* 2026-01-20 17:19:27,404 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Process each NodeSet _raw_params=process_nodeset.yml] *** 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.777 ******* 2026-01-20 17:19:27,416 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.776 ******* 2026-01-20 17:19:27,431 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Deploy updates to EDPM nodes _raw_params=create_deployment.yml] *** 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.026) 0:00:28.804 ******* 2026-01-20 17:19:27,443 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.026) 0:00:28.803 ******* 2026-01-20 17:19:27,464 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | TASK [fdp_update_edpm : Display update summary msg=['EDPM Update Summary', 'Updated {{ _cifmw_fdp_update_edpm_updated_nodesets | length }} NodeSet(s): {{ _cifmw_fdp_update_edpm_updated_nodesets }}', 'Container images updated: {{ cifmw_fdp_update_edpm_containers_enabled }}', 'Host packages updated: {{ cifmw_fdp_update_edpm_packages_enabled }}']] *** 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.836 ******* 2026-01-20 17:19:27,475 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.032) 0:00:28.836 ******* 2026-01-20 17:19:27,497 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.040) 0:00:28.877 ******* 2026-01-20 17:19:27,516 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.040) 0:00:28.877 ******* 2026-01-20 17:19:27,582 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.077) 0:00:28.955 ******* 2026-01-20 17:19:27,594 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.077) 0:00:28.954 ******* 2026-01-20 17:19:27,703 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_tests _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.119) 0:00:29.075 ******* 2026-01-20 17:19:27,714 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.119) 0:00:29.074 ******* 2026-01-20 17:19:27,814 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | TASK [test_operator : Cleanup previous test-operator resources _raw_params=cleanup.yaml] *** 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.118) 0:00:29.193 ******* 2026-01-20 17:19:27,832 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.118) 0:00:29.192 ******* 2026-01-20 17:19:27,852 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure test_operator folder exists path={{ cifmw_test_operator_artifacts_basedir }}, state=directory, mode=0755, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}] *** 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.030) 0:00:29.223 ******* 2026-01-20 17:19:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:27 +0000 (0:00:00.030) 0:00:29.223 ******* 2026-01-20 17:19:28,235 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:28,247 p=36747 u=zuul n=ansible | TASK [test_operator : Get openstack-operator csv information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, label_selectors=['operators.coreos.com/openstack-operator.openstack-operators'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2026-01-20 17:19:28,248 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.385) 0:00:29.609 ******* 2026-01-20 17:19:28,248 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.385) 0:00:29.608 ******* 2026-01-20 17:19:28,274 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | TASK [test_operator : Get full name of openstack-operator CSV openstack_operator_csv_name={{ csv_info.resources | map(attribute='metadata.name') | list | first }}] *** 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:29.647 ******* 2026-01-20 17:19:28,286 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:29.647 ******* 2026-01-20 17:19:28,315 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,325 p=36747 u=zuul n=ansible | TASK [test_operator : Get index of test-operator image _raw_params=set -o pipefail; oc get ClusterServiceVersion {{ openstack_operator_csv_name }} -o json | jq '.spec.install.spec.deployments[0].spec.template.spec.containers[0].env | to_entries[] | select(.value.name == "RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL").key'] *** 2026-01-20 17:19:28,325 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.039) 0:00:29.686 ******* 2026-01-20 17:19:28,326 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.039) 0:00:29.686 ******* 2026-01-20 17:19:28,355 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | TASK [test_operator : Patch test-operator version in CSV kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=ClusterServiceVersion, api_version=operators.coreos.com/v1alpha1, namespace={{ cifmw_test_operator_controller_namespace }}, name={{ openstack_operator_csv_name }}, patch=[{'path': '/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/{{ image_index.stdout }}/value', 'value': '{{ cifmw_test_operator_bundle }}', 'op': 'replace'}]] *** 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.044) 0:00:29.731 ******* 2026-01-20 17:19:28,370 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.044) 0:00:29.731 ******* 2026-01-20 17:19:28,396 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | TASK [test_operator : Get test-operator-controller-manager pod information kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Pod, label_selectors=['control-plane=controller-manager', 'openstack.org/operator-name=test'], namespace={{ cifmw_test_operator_controller_namespace }}] *** 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.767 ******* 2026-01-20 17:19:28,406 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.767 ******* 2026-01-20 17:19:28,431 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | TASK [test_operator : Get full name of test-operator-controller-manager pod test_operator_controller_name={{ pod_info.resources | map(attribute='metadata.name') | list | first }}] *** 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:29.803 ******* 2026-01-20 17:19:28,442 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:29.802 ******* 2026-01-20 17:19:28,467 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,476 p=36747 u=zuul n=ansible | TASK [test_operator : Wait until the test-operator-controller-manager is reloaded kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ cifmw_test_operator_controller_namespace }}, kind=Pod] *** 2026-01-20 17:19:28,477 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:29.837 ******* 2026-01-20 17:19:28,477 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:29.837 ******* 2026-01-20 17:19:28,500 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | TASK [test_operator : Delete CRDs created by test-operator kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=CustomResourceDefinition, state=absent, api_version=v1, name={{ item }}, namespace={{ cifmw_test_operator_namespace }}, wait=True, wait_timeout=600] *** 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.874 ******* 2026-01-20 17:19:28,513 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.036) 0:00:29.873 ******* 2026-01-20 17:19:28,543 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=tempests.test.openstack.org) 2026-01-20 17:19:28,552 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=tobikoes.test.openstack.org) 2026-01-20 17:19:28,559 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=ansibletests.test.openstack.org) 2026-01-20 17:19:28,565 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=horizontests.test.openstack.org) 2026-01-20 17:19:28,566 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | TASK [test_operator : Clone test-operator repository and checkout into specified version repo=https://github.com/openstack-k8s-operators/test-operator.git, dest=/tmp/test-operator, refspec=+refs/pull/*:refs/heads/*, version={{ cifmw_test_operator_version }}, force=True] *** 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.102) 0:00:29.977 ******* 2026-01-20 17:19:28,616 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.102) 0:00:29.976 ******* 2026-01-20 17:19:28,648 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | TASK [test_operator : Run make generate manifests install from /tmp/test-operator dir chdir=/tmp/test-operator, _raw_params=set -o pipefail; make generate manifests install] *** 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.042) 0:00:30.019 ******* 2026-01-20 17:19:28,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.042) 0:00:30.018 ******* 2026-01-20 17:19:28,683 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | TASK [test_operator : Call test stages loop _raw_params=stages.yml] ************ 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:30.055 ******* 2026-01-20 17:19:28,694 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.035) 0:00:30.054 ******* 2026-01-20 17:19:28,745 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/stages.yml for localhost => (item={'name': 'tempest', 'type': 'tempest'}) 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | TASK [test_operator : Run stage tempest msg=Run stage {{ _stage_vars.name }}] *** 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.063) 0:00:30.118 ******* 2026-01-20 17:19:28,757 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.063) 0:00:30.118 ******* 2026-01-20 17:19:28,780 p=36747 u=zuul n=ansible | ok: [localhost] => msg: Run stage tempest 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:30.152 ******* 2026-01-20 17:19:28,791 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.034) 0:00:30.152 ******* 2026-01-20 17:19:28,826 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.048) 0:00:30.201 ******* 2026-01-20 17:19:28,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.048) 0:00:30.200 ******* 2026-01-20 17:19:28,866 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_test_hooks _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:30.240 ******* 2026-01-20 17:19:28,879 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:28 +0000 (0:00:00.038) 0:00:30.239 ******* 2026-01-20 17:19:29,009 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | TASK [test_operator : Set empty stage vars dict stage_vars_dict={}] ************ 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.149) 0:00:30.389 ******* 2026-01-20 17:19:29,028 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.149) 0:00:30.388 ******* 2026-01-20 17:19:29,049 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | TASK [test_operator : Include stage var file file={{ _stage_vars.test_vars_file | default('/dev/null') }}, name=_stage_var_file] *** 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.032) 0:00:30.422 ******* 2026-01-20 17:19:29,061 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.032) 0:00:30.421 ******* 2026-01-20 17:19:29,084 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | TASK [test_operator : Merge file vars and test vars _stage_test_vars={{ file_vars | combine(test_vars) }}] *** 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.034) 0:00:30.456 ******* 2026-01-20 17:19:29,095 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.034) 0:00:30.456 ******* 2026-01-20 17:19:29,119 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | TASK [test_operator : Overwrite global_vars with stage_vars stage_vars_dict={{ stage_vars_dict | combine({item.key: _stage_test_vars[item.key] | default(lookup('vars', item.key, default=omit)) }) }}] *** 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.033) 0:00:30.490 ******* 2026-01-20 17:19:29,129 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:29 +0000 (0:00:00.033) 0:00:30.489 ******* 2026-01-20 17:19:29,186 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_stages', 'value': [{'name': 'tempest', 'type': 'tempest'}]}) 2026-01-20 17:19:29,197 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_on_test_failure', 'value': True}) 2026-01-20 17:19:29,209 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_artifacts_basedir', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/tests/test_operator"}) 2026-01-20 17:19:29,216 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_namespace', 'value': 'openstack'}) 2026-01-20 17:19:29,223 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_namespace', 'value': 'openstack-operators'}) 2026-01-20 17:19:29,231 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_bundle', 'value': ''}) 2026-01-20 17:19:29,239 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_timeout', 'value': 3600}) 2026-01-20 17:19:29,247 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_logs_image', 'value': 'quay.io/quay/busybox'}) 2026-01-20 17:19:29,254 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_cleanup', 'value': False}) 2026-01-20 17:19:29,262 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_clean_last_run', 'value': False}) 2026-01-20 17:19:29,269 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_dry_run', 'value': False}) 2026-01-20 17:19:29,277 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_groups', 'value': ['default']}) 2026-01-20 17:19:29,285 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_jobs', 'value': ['default']}) 2026-01-20 17:19:29,292 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_fail_fast', 'value': False}) 2026-01-20 17:19:29,299 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class_prefix', 'value': "{{ 'lvms-' if cifmw_use_lvms | default(false) | bool else '' }}"}) 2026-01-20 17:19:29,308 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_storage_class', 'value': '{{ cifmw_test_operator_storage_class_prefix }}local-storage'}) 2026-01-20 17:19:29,315 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_delete_logs_pod', 'value': False}) 2026-01-20 17:19:29,323 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_privileged', 'value': True}) 2026-01-20 17:19:29,331 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_selinux_level', 'value': 's0:c478,c978'}) 2026-01-20 17:19:29,347 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crs_path', 'value': "{{ cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts/test-operator-crs"}) 2026-01-20 17:19:29,355 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_log_pod_definition', 'value': {'apiVersion': 'v1', 'kind': 'Pod', 'metadata': {'name': 'test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'containers': [{'name': 'test-operator-logs-container', 'image': '{{ cifmw_test_operator_logs_image }}', 'command': ['sleep'], 'args': ['infinity'], 'volumeMounts': '{{ _test_operator_volume_mounts }}'}], 'volumes': '{{ _test_operator_volumes }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:29,362 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_registry', 'value': 'quay.io'}) 2026-01-20 17:19:29,370 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_namespace', 'value': 'podified-antelope-centos9'}) 2026-01-20 17:19:29,377 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_default_image_tag', 'value': 'current-podified'}) 2026-01-20 17:19:29,384 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_name', 'value': 'tempest-tests'}) 2026-01-20 17:19:29,392 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_concurrency', 'value': 1}) 2026-01-20 17:19:29,403 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_registry', 'value': "{{ content_provider_os_registry_url | split('/') | first }}"}) 2026-01-20 17:19:29,413 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_namespace', 'value': "{{ content_provider_os_registry_url | split('/') | last }}"}) 2026-01-20 17:19:29,421 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_container', 'value': 'openstack-tempest-all'}) 2026-01-20 17:19:29,430 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tempest_registry }}/{{ stage_vars_dict.cifmw_test_operator_tempest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tempest_container }}'}) 2026-01-20 17:19:29,437 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_image_tag', 'value': 'watcher_latest'}) 2026-01-20 17:19:29,448 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_network_attachments', 'value': []}) 2026-01-20 17:19:29,456 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_include_override_scenario', 'value': False}) 2026-01-20 17:19:29,464 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tests_exclude_override_scenario', 'value': False}) 2026-01-20 17:19:29,472 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_workflow', 'value': []}) 2026-01-20 17:19:29,480 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_cleanup', 'value': False}) 2026-01-20 17:19:29,487 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_failed_tests', 'value': False}) 2026-01-20 17:19:29,496 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_rerun_override_status', 'value': False}) 2026-01-20 17:19:29,506 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_resources', 'value': {'requests': {}, 'limits': {}}}) 2026-01-20 17:19:29,514 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_debug', 'value': False}) 2026-01-20 17:19:29,549 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tempest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tempest_image }}:{{ stage_vars_dict.cifmw_test_operator_tempest_image_tag }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'parallel': '{{ stage_vars_dict.cifmw_test_operator_tempest_parallel | default(omit) }}', 'SSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_tempest_ssh_key_secret_name | default(omit) }}', 'configOverwrite': '{{ stage_vars_dict.cifmw_test_operator_tempest_config_overwrite | default(omit) }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tempest_network_attachments }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_configmaps_mounts | default(omit) }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tempest_resources | default(omit) }}', 'tempestRun': {'includeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_include_list | default('') }}\n", 'excludeList': "{{ stage_vars_dict.cifmw_test_operator_tempest_exclude_list | default('') }}\n", 'expectedFailuresList': "{{ stage_vars_dict.cifmw_test_operator_tempest_expected_failures_list | default('') }}\n", 'concurrency': '{{ stage_vars_dict.cifmw_test_operator_tempest_concurrency }}', 'externalPlugin': '{{ stage_vars_dict.cifmw_test_operator_tempest_external_plugin | default([]) }}', 'extraRPMs': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_rpms | default([]) }}', 'extraImages': '{{ stage_vars_dict.cifmw_test_operator_tempest_extra_images | default([]) }}'}, 'tempestconfRun': '{{ cifmw_tempest_tempestconf_config_defaults | combine(stage_vars_dict.cifmw_test_operator_tempest_tempestconf_config | default({})) }}', 'cleanup': '{{ stage_vars_dict.cifmw_test_operator_tempest_cleanup | bool }}', 'rerunFailedTests': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_failed_tests | bool }}', 'rerunOverrideStatus': '{{ stage_vars_dict.cifmw_test_operator_tempest_rerun_override_status | bool }}', 'timingDataUrl': '{{ stage_vars_dict.cifmw_test_operator_tempest_timing_data_url | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tempest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tempest_debug }}'}}}) 2026-01-20 17:19:29,556 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_name', 'value': 'tobiko-tests'}) 2026-01-20 17:19:29,565 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,573 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,585 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_container', 'value': 'openstack-tobiko'}) 2026-01-20 17:19:29,594 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_tobiko_registry }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_namespace }}/{{ stage_vars_dict.cifmw_test_operator_tobiko_container }}'}) 2026-01-20 17:19:29,601 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,610 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_testenv', 'value': 'scenario'}) 2026-01-20 17:19:29,618 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_version', 'value': 'master'}) 2026-01-20 17:19:29,624 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_pytest_addopts', 'value': None}) 2026-01-20 17:19:29,630 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_prevent_create', 'value': None}) 2026-01-20 17:19:29,637 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_num_processes', 'value': None}) 2026-01-20 17:19:29,645 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_advanced_image_url', 'value': 'https://github.com/openstack-k8s-operators/openstack-k8s-operators-ci/releases/download/v1.0.0/tobiko-custom-v1.0.0.qcow2'}) 2026-01-20 17:19:29,652 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_override_conf', 'value': {}}) 2026-01-20 17:19:29,659 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kubeconfig_secret', 'value': 'tobiko-secret'}) 2026-01-20 17:19:29,670 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_openstack_cmd', 'value': 'oc -n {{ cifmw_openstack_namespace }} exec openstackclient -- openstack'}) 2026-01-20 17:19:29,679 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_cleanup', 'value': False}) 2026-01-20 17:19:29,687 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keytype', 'value': "{{ cifmw_ssh_keytype | default('ecdsa') }}"}) 2026-01-20 17:19:29,695 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_ssh_keysize', 'value': '{{ cifmw_ssh_keysize | default(521) }}'}) 2026-01-20 17:19:29,701 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_debug', 'value': False}) 2026-01-20 17:19:29,709 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_network_attachments', 'value': []}) 2026-01-20 17:19:29,718 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_workflow', 'value': []}) 2026-01-20 17:19:29,741 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tobiko', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_tobiko_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'kubeconfigSecretName': '{{ stage_vars_dict.cifmw_test_operator_tobiko_kubeconfig_secret }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_tobiko_image }}:{{ stage_vars_dict.cifmw_test_operator_tobiko_image_tag }}', 'testenv': '{{ stage_vars_dict.cifmw_test_operator_tobiko_testenv }}', 'version': '{{ stage_vars_dict.cifmw_test_operator_tobiko_version }}', 'patch': '{{ stage_vars_dict.cifmw_test_operator_tobiko_patch | default(omit) }}', 'pytestAddopts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts if stage_vars_dict.cifmw_test_operator_tobiko_pytest_addopts is not none else omit }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_tobiko_debug }}', 'networkAttachments': '{{ stage_vars_dict.cifmw_test_operator_tobiko_network_attachments }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_tobiko_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_tobiko_resources | default(omit) }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_tobiko_workflow }}'}}}) 2026-01-20 17:19:29,747 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_name', 'value': 'ansibletest'}) 2026-01-20 17:19:29,755 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,763 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,771 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_container', 'value': 'openstack-ansible-tests'}) 2026-01-20 17:19:29,780 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_registry }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_ansibletest_container }}'}) 2026-01-20 17:19:29,788 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,795 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_compute_ssh_key_secret_name', 'value': 'dataplane-ansible-ssh-private-key-secret'}) 2026-01-20 17:19:29,803 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workload_ssh_key_secret_name', 'value': ''}) 2026-01-20 17:19:29,812 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_git_repo', 'value': ''}) 2026-01-20 17:19:29,830 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_playbook_path', 'value': ''}) 2026-01-20 17:19:29,845 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_collection', 'value': ''}) 2026-01-20 17:19:29,852 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_var_files', 'value': ''}) 2026-01-20 17:19:29,859 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_extra_vars', 'value': ''}) 2026-01-20 17:19:29,870 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_ansible_inventory', 'value': ''}) 2026-01-20 17:19:29,880 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_map', 'value': 'openstack-config'}) 2026-01-20 17:19:29,892 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_openstack_config_secret', 'value': 'openstack-config-secret'}) 2026-01-20 17:19:29,903 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_debug', 'value': False}) 2026-01-20 17:19:29,913 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_workflow', 'value': []}) 2026-01-20 17:19:29,921 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_extra_configmaps_mounts', 'value': []}) 2026-01-20 17:19:29,943 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'AnsibleTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_image }}:{{ stage_vars_dict.cifmw_test_operator_ansibletest_image_tag }}', 'extraConfigmapsMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_configmaps_mounts }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_extra_mounts | default(omit) }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'computeSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_compute_ssh_key_secret_name }}', 'workloadSSHKeySecretName': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workload_ssh_key_secret_name }}', 'ansibleGitRepo': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_git_repo }}', 'ansiblePlaybookPath': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_playbook_path }}', 'ansibleCollections': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_collection }}', 'ansibleVarFiles': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_var_files }}', 'ansibleExtraVars': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_extra_vars }}', 'ansibleInventory': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_ansible_inventory }}', 'openStackConfigMap': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_map }}', 'openStackConfigSecret': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_openstack_config_secret }}', 'workflow': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_workflow }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_debug }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_ansibletest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:29,951 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_name', 'value': 'horizontest-tests'}) 2026-01-20 17:19:29,959 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_registry', 'value': '{{ cifmw_test_operator_default_registry }}'}) 2026-01-20 17:19:29,966 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_namespace', 'value': '{{ cifmw_test_operator_default_namespace }}'}) 2026-01-20 17:19:29,974 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_container', 'value': 'openstack-horizontest'}) 2026-01-20 17:19:29,982 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image', 'value': '{{ stage_vars_dict.cifmw_test_operator_horizontest_registry }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_namespace }}/{{ stage_vars_dict.cifmw_test_operator_horizontest_container }}'}) 2026-01-20 17:19:29,990 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_tag', 'value': '{{ cifmw_test_operator_default_image_tag }}'}) 2026-01-20 17:19:29,998 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_username', 'value': 'admin'}) 2026-01-20 17:19:30,007 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_admin_password', 'value': '12345678'}) 2026-01-20 17:19:30,013 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_dashboard_url', 'value': 'https://horizon-openstack.apps.ocp.openstack.lab/'}) 2026-01-20 17:19:30,021 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_auth_url', 'value': 'https://keystone-public-openstack.apps.ocp.openstack.lab'}) 2026-01-20 17:19:30,029 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_repo_url', 'value': 'https://review.opendev.org/openstack/horizon'}) 2026-01-20 17:19:30,037 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_repo_branch', 'value': 'master'}) 2026-01-20 17:19:30,044 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_image_url', 'value': 'http://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img'}) 2026-01-20 17:19:30,051 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name', 'value': 'horizontest'}) 2026-01-20 17:19:30,059 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_user', 'value': 'horizontest'}) 2026-01-20 17:19:30,067 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_password', 'value': 'horizontest'}) 2026-01-20 17:19:30,074 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_flavor_name', 'value': 'm1.tiny'}) 2026-01-20 17:19:30,081 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_logs_directory_name', 'value': 'horizon'}) 2026-01-20 17:19:30,088 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_debug', 'value': False}) 2026-01-20 17:19:30,097 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_horizon_test_dir', 'value': '/var/lib/horizontest'}) 2026-01-20 17:19:30,104 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_extra_flag', 'value': 'not pagination'}) 2026-01-20 17:19:30,112 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_project_name_xpath', 'value': "//span[@class='rcueicon rcueicon-folder-open']/ancestor::li"}) 2026-01-20 17:19:30,138 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_config', 'value': {'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'HorizonTest', 'metadata': {'name': '{{ stage_vars_dict.cifmw_test_operator_horizontest_name }}-{{ _stage_vars.name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'spec': {'SELinuxLevel': '{{ cifmw_test_operator_selinux_level }}', 'storageClass': '{{ cifmw_test_operator_storage_class }}', 'privileged': '{{ cifmw_test_operator_privileged }}', 'containerImage': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image }}:{{ stage_vars_dict.cifmw_test_operator_horizontest_image_tag }}', 'adminUsername': '{{ stage_vars_dict.cifmw_test_operator_horizontest_admin_username }}', 'adminPassword': '{{**********}}', 'dashboardUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_dashboard_url }}', 'authUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_auth_url }}', 'repoUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_repo_url }}', 'horizonRepoBranch': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_repo_branch }}', 'imageUrl': '{{ stage_vars_dict.cifmw_test_operator_horizontest_image_url }}', 'projectName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name }}', 'user': '{{ stage_vars_dict.cifmw_test_operator_horizontest_user }}', 'password': '{{**********}}', 'flavorName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_flavor_name }}', 'logsDirectoryName': '{{ stage_vars_dict.cifmw_test_operator_horizontest_logs_directory_name }}', 'debug': '{{ stage_vars_dict.cifmw_test_operator_horizontest_debug }}', 'extraFlag': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_flag }}', 'projectNameXpath': '{{ stage_vars_dict.cifmw_test_operator_horizontest_project_name_xpath }}', 'horizonTestDir': '{{ stage_vars_dict.cifmw_test_operator_horizontest_horizon_test_dir }}', 'extraMounts': '{{ stage_vars_dict.cifmw_test_operator_horizontest_extra_mounts | default(omit) }}', 'resources': '{{ stage_vars_dict.cifmw_test_operator_horizontest_resources | default(omit) }}', 'tolerations': '{{ cifmw_test_operator_tolerations | default(omit) }}', 'nodeSelector': '{{ cifmw_test_operator_node_selector | default(omit) }}'}}}) 2026-01-20 17:19:30,145 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_external_plugin', 'value': [{'changeRefspec': '380572db57798530b64dcac14c6b01b0382c5d8e', 'changeRepository': 'https://review.opendev.org/openstack/watcher-tempest-plugin', 'repository': 'https://opendev.org/openstack/watcher-tempest-plugin.git'}]}) 2026-01-20 17:19:30,153 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_secret_name', 'value': 'test-operator-controller-priv-key'}) 2026-01-20 17:19:30,161 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_priv_key_file_path', 'value': '~/.ssh/id_cifw'}) 2026-01-20 17:19:30,168 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_kind_name', 'value': 'Tempest'}) 2026-01-20 17:19:30,175 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_kind_name', 'value': 'Tobiko'}) 2026-01-20 17:19:30,183 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_kind_name', 'value': 'AnsibleTest'}) 2026-01-20 17:19:30,192 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_kind_name', 'value': 'HorizonTest'}) 2026-01-20 17:19:30,200 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_crd_group', 'value': 'test.openstack.org'}) 2026-01-20 17:19:30,207 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_crd_name', 'value': 'tempests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,215 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_crd_name', 'value': 'tobikoes.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,224 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_ansibletest_crd_name', 'value': 'ansibletests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,232 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_horizontest_crd_name', 'value': 'horizontests.{{ cifmw_test_operator_crd_group }}'}) 2026-01-20 17:19:30,242 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_controller_name', 'value': 'test-operator-controller-manager'}) 2026-01-20 17:19:30,251 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tobiko_default_conf', 'value': {'DEFAULT': {'log_dir': '/var/lib/tobiko/tobiko', 'log_file': 'tobiko.log', 'debug': True}, 'testcase': {'timeout': 1800.0, 'test_runner_timeout': 14400.0}, 'advanced_vm': {'username': 'fedora', 'image_url': '{{ cifmw_test_operator_tobiko_advanced_image_url }}'}, 'keystone': {'interface': 'public'}, 'manila': {'share_protocol': 'cephfs'}}}) 2026-01-20 17:19:30,260 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_exclude_list', 'value': 'watcher_tempest_plugin.*client_functional.*\nwatcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy\nwatcher_tempest_plugin.*\\[.*\\breal_load\\b.*\\].*\nwatcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host\nwatcher_tempest_plugin.*\\[.*\\bvolume_migration\\b.*\\].*\n'}) 2026-01-20 17:19:30,269 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_include_list', 'value': 'watcher_tempest_plugin.*\n'}) 2026-01-20 17:19:30,286 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'cifmw_test_operator_tempest_tempestconf_config', 'value': {'overrides': "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion {{ watcher_tempest_min_microversion | default('1.0') }}\noptimize.max_microversion {{ watcher_tempest_max_microversion | default('latest') }}\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address {{ hostvars['controller']['ansible_host'] }}\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n"}}) 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | TASK [test_operator : Override specific type config stage_vars_dict={{ stage_vars_dict | combine({_stage_config: _stage_test_vars[_stage_config] | default(lookup('vars', _stage_config, default=omit)) }) }}] *** 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:01.256) 0:00:31.746 ******* 2026-01-20 17:19:30,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:01.256) 0:00:31.746 ******* 2026-01-20 17:19:30,513 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | TASK [test_operator : Call runner tempest _raw_params=runners/{{ _stage_vars.type }}_runner.yml] *** 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.139) 0:00:31.886 ******* 2026-01-20 17:19:30,525 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.139) 0:00:31.885 ******* 2026-01-20 17:19:30,558 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/runners/tempest_runner.yml for localhost 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | TASK [test_operator : Run tempest job _raw_params=run-test-operator-job.yml] *** 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.053) 0:00:31.939 ******* 2026-01-20 17:19:30,578 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.053) 0:00:31.939 ******* 2026-01-20 17:19:30,627 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/run-test-operator-job.yml for localhost 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable containing the test-operator CR test_operator_cr={{ test_operator_config }}] *** 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.062) 0:00:32.002 ******* 2026-01-20 17:19:30,641 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.062) 0:00:32.001 ******* 2026-01-20 17:19:30,668 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:30,680 p=36747 u=zuul n=ansible | TASK [test_operator : Prepare test configuration - tempest _raw_params={{ test_operator_config_playbook }}] *** 2026-01-20 17:19:30,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.039) 0:00:32.041 ******* 2026-01-20 17:19:30,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.039) 0:00:32.041 ******* 2026-01-20 17:19:30,739 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/tempest-tests.yml for localhost 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | TASK [test_operator : Copy list_allowed to artifacts dir mode=0644, dest={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, src=list_allowed.yml] *** 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.078) 0:00:32.120 ******* 2026-01-20 17:19:30,759 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.078) 0:00:32.119 ******* 2026-01-20 17:19:30,792 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,802 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of tests to be executed yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_allowed.yml, groups={{ cifmw_test_operator_default_groups }}, job={{ cifmw_test_operator_instance_name | default(omit) }}] *** 2026-01-20 17:19:30,803 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.043) 0:00:32.163 ******* 2026-01-20 17:19:30,803 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.043) 0:00:32.163 ******* 2026-01-20 17:19:30,839 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,851 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'includeList': allowed_tests }}}, recursive=true) }}] *** 2026-01-20 17:19:30,852 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.049) 0:00:32.213 ******* 2026-01-20 17:19:30,852 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.049) 0:00:32.212 ******* 2026-01-20 17:19:30,890 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,902 p=36747 u=zuul n=ansible | TASK [test_operator : Copy list_skipped to artifacts dir dest={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, src=list_skipped.yml, mode=0644] *** 2026-01-20 17:19:30,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.050) 0:00:32.264 ******* 2026-01-20 17:19:30,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.050) 0:00:32.263 ******* 2026-01-20 17:19:30,931 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of tests to be excluded yaml_file={{ cifmw_test_operator_artifacts_basedir }}/list_skipped.yml, jobs={{ cifmw_test_operator_default_jobs }}] *** 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.040) 0:00:32.304 ******* 2026-01-20 17:19:30,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.040) 0:00:32.303 ******* 2026-01-20 17:19:30,969 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:30,980 p=36747 u=zuul n=ansible | TASK [test_operator : Set variable test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestRun': { 'excludeList': skipped_tests }}}, recursive=true) }}] *** 2026-01-20 17:19:30,980 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.037) 0:00:32.341 ******* 2026-01-20 17:19:30,981 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:30 +0000 (0:00:00.037) 0:00:32.341 ******* 2026-01-20 17:19:31,007 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | TASK [test_operator : Check that cifmw private key file exists path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.037) 0:00:32.379 ******* 2026-01-20 17:19:31,018 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.037) 0:00:32.379 ******* 2026-01-20 17:19:31,386 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:31,408 p=36747 u=zuul n=ansible | TASK [test_operator : Slurp cifmw private key file path={{ cifmw_test_operator_controller_priv_key_file_path }}] *** 2026-01-20 17:19:31,409 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.390) 0:00:32.769 ******* 2026-01-20 17:19:31,409 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.390) 0:00:32.769 ******* 2026-01-20 17:19:31,749 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:31,774 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure a secret for the cifmw private key file exists kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, state=present, wait=True, definition={'apiVersion': 'v1', 'kind': 'Secret', 'type': 'Opaque', 'metadata': {'name': '{{ cifmw_test_operator_controller_priv_key_secret_name }}', 'namespace': '{{ stage_vars_dict.cifmw_test_operator_namespace }}'}, 'data': {'ssh-privatekey': '{{ private_key_file_content.content }}'}}] *** 2026-01-20 17:19:31,775 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.366) 0:00:33.136 ******* 2026-01-20 17:19:31,775 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:31 +0000 (0:00:00.366) 0:00:33.135 ******* 2026-01-20 17:19:32,838 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | TASK [test_operator : Add SSHKeySecretName section to Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'SSHKeySecretName': cifmw_test_operator_controller_priv_key_secret_name }}, recursive=true) }}] *** 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:01.081) 0:00:34.217 ******* 2026-01-20 17:19:32,856 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:01.081) 0:00:34.217 ******* 2026-01-20 17:19:32,896 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | TASK [test_operator : Add controller IP to the overrides section in Tempest CR test_operator_cr={{ test_operator_cr | combine({'spec': {'tempestconfRun': {'overrides': (test_operator_cr.spec.tempestconfRun.overrides | default('')) + ' ' + 'whitebox_neutron_plugin_options.proxy_host_address ' + controller_ip }}}, recursive=true) }}] *** 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.053) 0:00:34.271 ******* 2026-01-20 17:19:32,910 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.053) 0:00:34.270 ******* 2026-01-20 17:19:32,943 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | TASK [test_operator : Add controller IP to each workflow step overrides section - Create overriden_workflow overriden_workflow={{ overriden_workflow | default([]) + [_overriden_workflow_step] }}] *** 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.044) 0:00:34.316 ******* 2026-01-20 17:19:32,955 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.044) 0:00:34.315 ******* 2026-01-20 17:19:32,972 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': overriden_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': overriden_workflow}) }}] *** 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.028) 0:00:34.344 ******* 2026-01-20 17:19:32,983 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:32 +0000 (0:00:00.028) 0:00:34.344 ******* 2026-01-20 17:19:33,013 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | TASK [test_operator : Remove resources until fix for bug 2088074 reaches openstack-tempest-all image no_resources_workflow={{ no_resources_workflow | default([]) + [_no_resources_workflow_step] }}] *** 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.386 ******* 2026-01-20 17:19:33,025 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.385 ******* 2026-01-20 17:19:33,041 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,054 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': no_resources_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': no_resources_workflow}) }}] *** 2026-01-20 17:19:33,055 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.029) 0:00:34.415 ******* 2026-01-20 17:19:33,055 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.029) 0:00:34.415 ******* 2026-01-20 17:19:33,085 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | TASK [test_operator : Build tempest timing data URL (no workflow) test_operator_cr={{ test_operator_cr | combine({'spec': {'timingDataUrl': final_timing_data_url}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_timing_data_url': final_timing_data_url}) }}] *** 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.457 ******* 2026-01-20 17:19:33,096 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.456 ******* 2026-01-20 17:19:33,132 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | TASK [test_operator : Add the full timing data url to workflow steps timing_data_url_workflow={{ timing_data_url_workflow | default([]) + [_timing_data_url_workflow_step] }}] *** 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.047) 0:00:34.505 ******* 2026-01-20 17:19:33,144 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.047) 0:00:34.504 ******* 2026-01-20 17:19:33,163 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | TASK [test_operator : Override the Tempest CR workflow test_operator_cr={{ test_operator_cr | combine({'spec': {'workflow': timing_data_url_workflow}}, recursive=true) }}, stage_vars_dict={{ stage_vars_dict | combine({'cifmw_test_operator_tempest_workflow': timing_data_url_workflow}) }}] *** 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.030) 0:00:34.536 ******* 2026-01-20 17:19:33,175 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.030) 0:00:34.535 ******* 2026-01-20 17:19:33,205 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | TASK [test_operator : Print CR before applying msg={{ test_operator_cr }}] ***** 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.577 ******* 2026-01-20 17:19:33,216 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.576 ******* 2026-01-20 17:19:33,248 p=36747 u=zuul n=ansible | ok: [localhost] => msg: apiVersion: test.openstack.org/v1beta1 kind: Tempest metadata: name: tempest-tests-tempest namespace: openstack spec: SELinuxLevel: s0:c478,c978 SSHKeySecretName: test-operator-controller-priv-key cleanup: false containerImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-tempest-all:watcher_latest debug: false networkAttachments: [] privileged: true rerunFailedTests: false rerunOverrideStatus: false resources: limits: {} requests: {} storageClass: local-storage tempestRun: concurrency: 1 excludeList: | watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* expectedFailuresList: |2+ externalPlugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git extraImages: [] extraRPMs: [] includeList: | watcher_tempest_plugin.* tempestconfRun: deployerInput: | [auth] tempest_roles = [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true [compute-feature-enabled] dhcp_domain = '' [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false [volume] catalog_type = volumev3 overrides: |- compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.129 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true whitebox_neutron_plugin_options.proxy_host_address 38.102.83.129 workflow: [] 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | TASK [test_operator : Make sure test-operator CR directory exists path={{ cifmw_test_operator_crs_path }}, state=directory, mode=0755] *** 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.619 ******* 2026-01-20 17:19:33,258 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.041) 0:00:34.618 ******* 2026-01-20 17:19:33,448 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:33,460 p=36747 u=zuul n=ansible | TASK [test_operator : Write test-operator CR to file content={{ test_operator_cr | to_nice_yaml }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml, mode=0644] *** 2026-01-20 17:19:33,461 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.202) 0:00:34.822 ******* 2026-01-20 17:19:33,461 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:33 +0000 (0:00:00.202) 0:00:34.821 ******* 2026-01-20 17:19:34,009 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | TASK [test_operator : Start tests - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}.yaml] *** 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.568) 0:00:35.390 ******* 2026-01-20 17:19:34,029 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.568) 0:00:35.389 ******* 2026-01-20 17:19:34,775 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:19:34,804 p=36747 u=zuul n=ansible | TASK [test_operator : Wait for the last Pod to be Completed - tempest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['workflowStep={{ [(test_operator_workflow | length) - 1, 0] | max }}', 'instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:19:34,805 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.775) 0:00:36.165 ******* 2026-01-20 17:19:34,805 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:19:34 +0000 (0:00:00.775) 0:00:36.165 ******* 2026-01-20 17:55:04,858 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | TASK [test_operator : Check whether timed out - tempest testpod_timed_out={{ testpod.attempts == (cifmw_test_operator_timeout / 10) | round | int }}] *** 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:35:30.068) 0:36:06.234 ******* 2026-01-20 17:55:04,873 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:35:30.068) 0:36:06.233 ******* 2026-01-20 17:55:04,908 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | TASK [test_operator : Collect logs _raw_params=collect-logs.yaml] ************** 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.048) 0:36:06.282 ******* 2026-01-20 17:55:04,921 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.048) 0:36:06.281 ******* 2026-01-20 17:55:04,965 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/test_operator/tasks/collect-logs.yaml for localhost 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | TASK [test_operator : Reset volumes and volume_mounts to an empty list _test_operator_volumes=[], _test_operator_volume_mounts=[]] *** 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.075) 0:36:06.358 ******* 2026-01-20 17:55:04,997 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:04 +0000 (0:00:00.075) 0:36:06.357 ******* 2026-01-20 17:55:05,027 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,042 p=36747 u=zuul n=ansible | TASK [test_operator : Get information about PVCs that store the logs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=PersistentVolumeClaim, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:55:05,042 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.045) 0:36:06.403 ******* 2026-01-20 17:55:05,043 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.045) 0:36:06.403 ******* 2026-01-20 17:55:05,847 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | TASK [test_operator : Set up volume mounts and volumes for all PVCs _test_operator_volume_mounts={{ (_test_operator_volume_mounts | default([])) + [{ 'name': "logs-volume-" ~ index, 'mountPath': "/mnt/logs-{{ test_operator_instance_name }}-step-" ~ index }] }} , _test_operator_volumes={{ (_test_operator_volumes | default([])) + [{ 'name': "logs-volume-" ~ index, 'persistentVolumeClaim': { 'claimName': pvc.metadata.name } }] }} ] *** 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.816) 0:36:07.220 ******* 2026-01-20 17:55:05,859 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.816) 0:36:07.219 ******* 2026-01-20 17:55:05,893 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-80b87', 'namespace': 'openstack', 'uid': 'afaa33e6-d1f8-451d-8d0a-3e6e7a1e63a0', 'resourceVersion': '63960', 'creationTimestamp': '2026-01-20T17:19:34Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '5cdabf65-2e87-4551-b2ae-e38f155bca26', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"5cdabf65-2e87-4551-b2ae-e38f155bca26"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage03-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | TASK [test_operator : Set log pod fact to process omitted vars _test_operator_log_pod={{ cifmw_test_operator_log_pod_definition }}] *** 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.269 ******* 2026-01-20 17:55:05,908 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.268 ******* 2026-01-20 17:55:05,943 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:05,956 p=36747 u=zuul n=ansible | TASK [test_operator : Write log pod definition to file content={{ _test_operator_log_pod | to_nice_yaml }}, dest={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml, mode=0644] *** 2026-01-20 17:55:05,956 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.317 ******* 2026-01-20 17:55:05,957 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:05 +0000 (0:00:00.048) 0:36:07.317 ******* 2026-01-20 17:55:06,467 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:06,482 p=36747 u=zuul n=ansible | TASK [test_operator : Start test-operator-logs-pod kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, state=present, wait=True, src={{ cifmw_test_operator_crs_path }}/{{ test_operator_instance_name }}-log-pod.yaml] *** 2026-01-20 17:55:06,482 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:06 +0000 (0:00:00.525) 0:36:07.843 ******* 2026-01-20 17:55:06,483 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:06 +0000 (0:00:00.525) 0:36:07.843 ******* 2026-01-20 17:55:12,377 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | TASK [test_operator : Ensure that the test-operator-logs-pod is Running kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, name=test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}, wait=True] *** 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:12 +0000 (0:00:05.911) 0:36:13.755 ******* 2026-01-20 17:55:12,394 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:12 +0000 (0:00:05.911) 0:36:13.754 ******* 2026-01-20 17:55:13,194 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | TASK [test_operator : Get logs from test-operator-logs-pod _raw_params=oc cp -n {{ stage_vars_dict.cifmw_test_operator_namespace }} test-operator-logs-pod-{{ run_test_fw }}-{{ test_operator_instance_name }}:{{ pod_path }} {{ cifmw_test_operator_artifacts_basedir }} ] *** 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.811) 0:36:14.567 ******* 2026-01-20 17:55:13,206 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.811) 0:36:14.566 ******* 2026-01-20 17:55:13,694 p=36747 u=zuul n=ansible | changed: [localhost] => (item={'metadata': {'name': 'tempest-tests-tempest-0-80b87', 'namespace': 'openstack', 'uid': 'afaa33e6-d1f8-451d-8d0a-3e6e7a1e63a0', 'resourceVersion': '63960', 'creationTimestamp': '2026-01-20T17:19:34Z', 'labels': {'instanceName': 'tempest-tests-tempest', 'operator': 'test-operator', 'service': 'tempest', 'workflowStep': '0'}, 'annotations': {'pv.kubernetes.io/bind-completed': 'yes', 'pv.kubernetes.io/bound-by-controller': 'yes'}, 'ownerReferences': [{'apiVersion': 'test.openstack.org/v1beta1', 'kind': 'Tempest', 'name': 'tempest-tests-tempest', 'uid': '5cdabf65-2e87-4551-b2ae-e38f155bca26', 'controller': True, 'blockOwnerDeletion': True}], 'finalizers': ['kubernetes.io/pvc-protection'], 'managedFields': [{'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:pv.kubernetes.io/bind-completed': {}, 'f:pv.kubernetes.io/bound-by-controller': {}}}, 'f:spec': {'f:volumeName': {}}}}, {'manager': 'kube-controller-manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:accessModes': {}, 'f:capacity': {'.': {}, 'f:storage': {}}, 'f:phase': {}}}, 'subresource': 'status'}, {'manager': 'manager', 'operation': 'Update', 'apiVersion': 'v1', 'time': '2026-01-20T17:19:34Z', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:labels': {'.': {}, 'f:instanceName': {}, 'f:operator': {}, 'f:service': {}, 'f:workflowStep': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"5cdabf65-2e87-4551-b2ae-e38f155bca26"}': {}}}, 'f:spec': {'f:accessModes': {}, 'f:resources': {'f:requests': {'.': {}, 'f:storage': {}}}, 'f:storageClassName': {}, 'f:volumeMode': {}}}}]}, 'spec': {'accessModes': ['ReadWriteOnce'], 'resources': {'requests': {'storage': '1Gi'}}, 'volumeName': 'local-storage03-crc', 'storageClassName': 'local-storage', 'volumeMode': 'Filesystem'}, 'status': {'phase': 'Bound', 'accessModes': ['ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany'], 'capacity': {'storage': '10Gi'}}, 'apiVersion': 'v1', 'kind': 'PersistentVolumeClaim'}) 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | TASK [test_operator : Get list of all pods kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod] *** 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.502) 0:36:15.069 ******* 2026-01-20 17:55:13,708 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:13 +0000 (0:00:00.502) 0:36:15.069 ******* 2026-01-20 17:55:15,531 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | TASK [test_operator : Get test results from all test pods (Success / Fail) kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit) }}, context={{ cifmw_openshift_context | default(omit) }}, namespace={{ stage_vars_dict.cifmw_test_operator_namespace }}, kind=Pod, label_selectors=['instanceName={{ test_operator_instance_name }}']] *** 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:15 +0000 (0:00:02.090) 0:36:17.160 ******* 2026-01-20 17:55:15,799 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:15 +0000 (0:00:02.090) 0:36:17.159 ******* 2026-01-20 17:55:16,640 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | TASK [test_operator : Get status from test pods pod_status={{ test_pod_results.resources | map(attribute='status.phase') | list | unique }}] *** 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.858) 0:36:18.019 ******* 2026-01-20 17:55:16,658 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.858) 0:36:18.018 ******* 2026-01-20 17:55:16,689 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | TASK [test_operator : Check whether test pods finished successfully successful_execution={{ pod_status | length == 1 and pod_status | first == 'Succeeded' }}] *** 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.045) 0:36:18.064 ******* 2026-01-20 17:55:16,703 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.045) 0:36:18.063 ******* 2026-01-20 17:55:16,734 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | TASK [test_operator : Fail fast if a pod did not succeed - tempest that=successful_execution] *** 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.044) 0:36:18.108 ******* 2026-01-20 17:55:16,747 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.044) 0:36:18.107 ******* 2026-01-20 17:55:16,770 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | TASK [test_operator : Save result - tempest test_operator_results={{ test_operator_results | default({}) | combine({run_test_fw: successful_execution}) }}] *** 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.036) 0:36:18.144 ******* 2026-01-20 17:55:16,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.036) 0:36:18.144 ******* 2026-01-20 17:55:16,811 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | TASK [test_operator : Delete test resources _raw_params=cleanup-run.yaml] ****** 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.185 ******* 2026-01-20 17:55:16,824 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.184 ******* 2026-01-20 17:55:16,849 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.037) 0:36:18.222 ******* 2026-01-20 17:55:16,861 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.037) 0:36:18.221 ******* 2026-01-20 17:55:16,890 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.041) 0:36:18.264 ******* 2026-01-20 17:55:16,903 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.041) 0:36:18.263 ******* 2026-01-20 17:55:16,932 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_test_hooks _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.304 ******* 2026-01-20 17:55:16,943 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:16 +0000 (0:00:00.040) 0:36:18.304 ******* 2026-01-20 17:55:17,121 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,141 p=36747 u=zuul n=ansible | TASK [test_operator : Fail when any tests failed that=['item.value'], success_msg={{ item.key }} tests passed, fail_msg={{ item.key }} tests failed] *** 2026-01-20 17:55:17,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.198) 0:36:18.503 ******* 2026-01-20 17:55:17,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.198) 0:36:18.502 ******* 2026-01-20 17:55:17,175 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'key': 'tempest', 'value': True}) => ansible_loop_var: item changed: false item: key: tempest value: true msg: tempest tests passed 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.053) 0:36:18.556 ******* 2026-01-20 17:55:17,195 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.053) 0:36:18.555 ******* 2026-01-20 17:55:17,262 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.080) 0:36:18.636 ******* 2026-01-20 17:55:17,275 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.080) 0:36:18.636 ******* 2026-01-20 17:55:17,460 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_tests _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.197) 0:36:18.834 ******* 2026-01-20 17:55:17,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.197) 0:36:18.833 ******* 2026-01-20 17:55:17,733 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | TASK [compliance : Ensure compliance folder exists path={{ cifmw_compliance_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.287) 0:36:19.122 ******* 2026-01-20 17:55:17,761 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.287) 0:36:19.121 ******* 2026-01-20 17:55:17,783 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,795 p=36747 u=zuul n=ansible | TASK [compliance : Install the compliance operator and plugin _raw_params=install.yml] *** 2026-01-20 17:55:17,796 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.034) 0:36:19.156 ******* 2026-01-20 17:55:17,796 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.034) 0:36:19.156 ******* 2026-01-20 17:55:17,816 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | TASK [compliance : Run compliance scans and extract results _raw_params=run_suite_scan.yml] *** 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.032) 0:36:19.189 ******* 2026-01-20 17:55:17,828 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.032) 0:36:19.188 ******* 2026-01-20 17:55:17,854 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=cis) 2026-01-20 17:55:17,859 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=e8) 2026-01-20 17:55:17,863 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=high) 2026-01-20 17:55:17,867 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=moderate) 2026-01-20 17:55:17,873 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=nerc-cip) 2026-01-20 17:55:17,878 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=pci-dss) 2026-01-20 17:55:17,880 p=36747 u=zuul n=ansible | skipping: [localhost] => (item=stig) 2026-01-20 17:55:17,881 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | TASK [compliance : Delete all resources created by the role _raw_params=cleanup.yml] *** 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.066) 0:36:19.255 ******* 2026-01-20 17:55:17,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:17 +0000 (0:00:00.065) 0:36:19.254 ******* 2026-01-20 17:55:17,917 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:17,966 p=36747 u=zuul n=ansible | PLAY [Run compliance scan for computes] **************************************** 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | TASK [compliance : Install openscap-scanner and security guide name=['openscap-scanner', 'scap-security-guide'], state=present] *** 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.165) 0:36:19.420 ******* 2026-01-20 17:55:18,059 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.165) 0:36:19.420 ******* 2026-01-20 17:55:18,094 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | TASK [compliance : Create folder to hold scan results path={{ cifmw_compliance_compute_artifacts_basedir }}, state=directory, recurse=True, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, mode=755] *** 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.043) 0:36:19.464 ******* 2026-01-20 17:55:18,103 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.043) 0:36:19.464 ******* 2026-01-20 17:55:18,133 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | TASK [compliance : Do compliance scans _raw_params=oscap xccdf eval --report {{ cifmw_compliance_compute_artifacts_basedir }}/{{ profile }}.html --profile {{ profile}} /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml] *** 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.038) 0:36:19.503 ******* 2026-01-20 17:55:18,142 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.038) 0:36:19.502 ******* 2026-01-20 17:55:18,173 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=pci-dss) 2026-01-20 17:55:18,179 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=e8) 2026-01-20 17:55:18,185 p=36747 u=zuul n=ansible | skipping: [compute-0] => (item=stig) 2026-01-20 17:55:18,187 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | TASK [compliance : Set ownership on report files path={{ cifmw_compliance_compute_artifacts_basedir }}, owner={{ ansible_user | default(lookup('env', 'USER')) }}, group={{ ansible_user | default(lookup('env', 'USER')) }}, recurse=True] *** 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.054) 0:36:19.557 ******* 2026-01-20 17:55:18,196 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.054) 0:36:19.556 ******* 2026-01-20 17:55:18,217 p=36747 u=zuul n=ansible | skipping: [compute-0] 2026-01-20 17:55:18,283 p=36747 u=zuul n=ansible | PLAY [Run hooks and inject status flag] **************************************** 2026-01-20 17:55:18,312 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:18,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.116) 0:36:19.674 ******* 2026-01-20 17:55:18,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.116) 0:36:19.673 ******* 2026-01-20 17:55:18,376 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.072) 0:36:19.746 ******* 2026-01-20 17:55:18,385 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.072) 0:36:19.746 ******* 2026-01-20 17:55:18,554 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_end _raw_params={{ hook.type }}.yml] **** 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.179) 0:36:19.926 ******* 2026-01-20 17:55:18,565 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.179) 0:36:19.926 ******* 2026-01-20 17:55:18,739 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | TASK [Inject success flag path={{ ansible_user_dir }}/cifmw-success, state=touch, mode=0644] *** 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.205) 0:36:20.132 ******* 2026-01-20 17:55:18,771 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:18 +0000 (0:00:00.205) 0:36:20.131 ******* 2026-01-20 17:55:19,000 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:19,036 p=36747 u=zuul n=ansible | PLAY [Run log related tasks] *************************************************** 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] *** 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.433 ******* 2026-01-20 17:55:19,072 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.432 ******* 2026-01-20 17:55:19,136 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:19,150 p=36747 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] *** 2026-01-20 17:55:19,151 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.078) 0:36:20.512 ******* 2026-01-20 17:55:19,151 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.078) 0:36:20.511 ******* 2026-01-20 17:55:19,436 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_logs _raw_params={{ hook.type }}.yml] *** 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.812 ******* 2026-01-20 17:55:19,451 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.300) 0:36:20.811 ******* 2026-01-20 17:55:19,703 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Ensure cifmw_basedir param is set cifmw_basedir={{ ansible_user_dir }}/ci-framework-data] *** 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.291) 0:36:21.104 ******* 2026-01-20 17:55:19,743 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.291) 0:36:21.103 ******* 2026-01-20 17:55:19,769 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | TASK [Read artifacts parameters dir and set as facts name=cifmw_helpers, tasks_from=include_dir.yml] *** 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.040) 0:36:21.144 ******* 2026-01-20 17:55:19,783 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.040) 0:36:21.144 ******* 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check directory is available path={{ included_dir | trim }}] *** 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.110) 0:36:21.255 ******* 2026-01-20 17:55:19,894 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:19 +0000 (0:00:00.110) 0:36:21.254 ******* 2026-01-20 17:55:20,136 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,161 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Find yaml files paths={{ included_dir | trim }}, patterns=*.yml,*.yaml, file_type=file, recurse=False] *** 2026-01-20 17:55:20,161 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.267) 0:36:21.522 ******* 2026-01-20 17:55:20,162 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.267) 0:36:21.522 ******* 2026-01-20 17:55:20,509 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Print available yaml files msg=Found yaml files to parse: {{ _yaml_files.files | map(attribute='path') | list }} ] *** 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.361) 0:36:21.884 ******* 2026-01-20 17:55:20,523 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.361) 0:36:21.883 ******* 2026-01-20 17:55:20,559 p=36747 u=zuul n=ansible | ok: [localhost] => msg: | Found yaml files to parse: ['/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml', '/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml'] 2026-01-20 17:55:20,570 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create files on localhost and use include_vars] ********** 2026-01-20 17:55:20,571 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.047) 0:36:21.931 ******* 2026-01-20 17:55:20,571 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.047) 0:36:21.931 ******* 2026-01-20 17:55:20,622 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,627 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,632 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,637 p=36747 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_helpers/tasks/include_file.yml for localhost => (item=(censored due to no_log)) 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.079) 0:36:22.011 ******* 2026-01-20 17:55:20,650 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.079) 0:36:22.010 ******* 2026-01-20 17:55:20,671 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.031) 0:36:22.042 ******* 2026-01-20 17:55:20,681 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.031) 0:36:22.042 ******* 2026-01-20 17:55:20,903 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.232) 0:36:22.275 ******* 2026-01-20 17:55:20,914 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:20 +0000 (0:00:00.232) 0:36:22.274 ******* 2026-01-20 17:55:21,301 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.398) 0:36:22.674 ******* 2026-01-20 17:55:21,313 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.398) 0:36:22.673 ******* 2026-01-20 17:55:21,489 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.192) 0:36:22.866 ******* 2026-01-20 17:55:21,505 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.192) 0:36:22.866 ******* 2026-01-20 17:55:21,970 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.480) 0:36:23.347 ******* 2026-01-20 17:55:21,986 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:21 +0000 (0:00:00.480) 0:36:23.346 ******* 2026-01-20 17:55:22,041 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.072) 0:36:23.419 ******* 2026-01-20 17:55:22,058 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.072) 0:36:23.418 ******* 2026-01-20 17:55:22,251 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:22,267 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:22,268 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.209) 0:36:23.628 ******* 2026-01-20 17:55:22,268 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.209) 0:36:23.628 ******* 2026-01-20 17:55:22,289 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.033) 0:36:23.662 ******* 2026-01-20 17:55:22,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.033) 0:36:23.661 ******* 2026-01-20 17:55:22,505 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,518 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:22,519 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.217) 0:36:23.880 ******* 2026-01-20 17:55:22,519 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.217) 0:36:23.879 ******* 2026-01-20 17:55:22,703 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:22,773 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:22,774 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.254) 0:36:24.134 ******* 2026-01-20 17:55:22,774 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.254) 0:36:24.134 ******* 2026-01-20 17:55:22,961 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:22,972 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:22,972 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.198) 0:36:24.333 ******* 2026-01-20 17:55:22,973 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:22 +0000 (0:00:00.198) 0:36:24.333 ******* 2026-01-20 17:55:23,389 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.427) 0:36:24.761 ******* 2026-01-20 17:55:23,400 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.427) 0:36:24.760 ******* 2026-01-20 17:55:23,447 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.056) 0:36:24.818 ******* 2026-01-20 17:55:23,457 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.056) 0:36:24.817 ******* 2026-01-20 17:55:23,642 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.196) 0:36:25.014 ******* 2026-01-20 17:55:23,653 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.196) 0:36:25.013 ******* 2026-01-20 17:55:23,674 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.032) 0:36:25.046 ******* 2026-01-20 17:55:23,685 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.032) 0:36:25.046 ******* 2026-01-20 17:55:23,894 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.220) 0:36:25.267 ******* 2026-01-20 17:55:23,906 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:23 +0000 (0:00:00.220) 0:36:25.266 ******* 2026-01-20 17:55:24,102 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.207) 0:36:25.474 ******* 2026-01-20 17:55:24,113 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.207) 0:36:25.473 ******* 2026-01-20 17:55:24,277 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.175) 0:36:25.650 ******* 2026-01-20 17:55:24,289 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.175) 0:36:25.649 ******* 2026-01-20 17:55:24,739 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.462) 0:36:26.112 ******* 2026-01-20 17:55:24,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.462) 0:36:26.111 ******* 2026-01-20 17:55:24,800 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.060) 0:36:26.173 ******* 2026-01-20 17:55:24,812 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:24 +0000 (0:00:00.060) 0:36:26.172 ******* 2026-01-20 17:55:25,022 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Fail if file is not yaml or yml extension msg=File needs to be yaml/yml extension] *** 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.220) 0:36:26.394 ******* 2026-01-20 17:55:25,033 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.220) 0:36:26.393 ******* 2026-01-20 17:55:25,057 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Check if file is available path={{ included_file | trim }}] *** 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.035) 0:36:26.429 ******* 2026-01-20 17:55:25,068 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.035) 0:36:26.429 ******* 2026-01-20 17:55:25,273 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create temporary directory state=directory] ************** 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.218) 0:36:26.648 ******* 2026-01-20 17:55:25,287 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.218) 0:36:26.647 ******* 2026-01-20 17:55:25,520 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Read vars] *********************************************** 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.244) 0:36:26.892 ******* 2026-01-20 17:55:25,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.244) 0:36:26.891 ******* 2026-01-20 17:55:25,729 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Create new variable files with content] ****************** 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.277) 0:36:27.169 ******* 2026-01-20 17:55:25,808 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:25 +0000 (0:00:00.277) 0:36:27.168 ******* 2026-01-20 17:55:26,234 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:26,244 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Include vars] ******************************************** 2026-01-20 17:55:26,245 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.436) 0:36:27.606 ******* 2026-01-20 17:55:26,245 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.436) 0:36:27.605 ******* 2026-01-20 17:55:26,282 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,294 p=36747 u=zuul n=ansible | TASK [cifmw_helpers : Remove temporary directory path={{ _tmp_dir.path }}, state=absent] *** 2026-01-20 17:55:26,295 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.050) 0:36:27.656 ******* 2026-01-20 17:55:26,295 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.050) 0:36:27.655 ******* 2026-01-20 17:55:26,496 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] *** 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.222) 0:36:27.878 ******* 2026-01-20 17:55:26,517 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.222) 0:36:27.877 ******* 2026-01-20 17:55:26,541 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:26,552 p=36747 u=zuul n=ansible | TASK [cifmw_setup : Set destination folder for the logs logfiles_dest_dir={{ ( cifmw_basedir | default(ansible_user_dir ~ '/ci-framework-data'), 'logs/', now(fmt='%Y-%m-%d_%H-%M') ) | path_join }}] *** 2026-01-20 17:55:26,553 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.035) 0:36:27.914 ******* 2026-01-20 17:55:26,553 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.035) 0:36:27.913 ******* 2026-01-20 17:55:26,577 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | TASK [artifacts : Verify if "success" flag exists after successful tests execution path={{ ansible_user_dir }}/cifmw-success] *** 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.036) 0:36:27.950 ******* 2026-01-20 17:55:26,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.036) 0:36:27.949 ******* 2026-01-20 17:55:26,778 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure we have at least minimal ansible facts gather_subset=min] *** 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.201) 0:36:28.151 ******* 2026-01-20 17:55:26,790 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:26 +0000 (0:00:00.201) 0:36:28.150 ******* 2026-01-20 17:55:27,419 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure base directory exists path={{ cifmw_artifacts_basedir }}/{{ item }}, state=directory, mode=0755] *** 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.638) 0:36:28.790 ******* 2026-01-20 17:55:27,429 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.638) 0:36:28.789 ******* 2026-01-20 17:55:27,633 p=36747 u=zuul n=ansible | ok: [localhost] => (item=artifacts) 2026-01-20 17:55:27,849 p=36747 u=zuul n=ansible | ok: [localhost] => (item=logs) 2026-01-20 17:55:27,862 p=36747 u=zuul n=ansible | TASK [artifacts : Load generated hook environment for further usage dir={{ cifmw_artifacts_basedir }}/artifacts, depth=1, files_matching=^(pre|post).*\.yml$] *** 2026-01-20 17:55:27,862 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.433) 0:36:29.223 ******* 2026-01-20 17:55:27,863 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.433) 0:36:29.223 ******* 2026-01-20 17:55:27,932 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | TASK [artifacts : Gather parameter passed to the playbook mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-vars.yml, content={{ vars | to_nice_yaml }}] *** 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.081) 0:36:29.305 ******* 2026-01-20 17:55:27,944 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:27 +0000 (0:00:00.081) 0:36:29.304 ******* 2026-01-20 17:55:30,291 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | TASK [artifacts : Gather facts mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/ansible-facts.yml, content={{ ansible_facts | to_nice_yaml }}] *** 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:02.356) 0:36:31.662 ******* 2026-01-20 17:55:30,301 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:02.356) 0:36:31.661 ******* 2026-01-20 17:55:30,759 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | TASK [artifacts : Copy some network configuration files _raw_params=cp /etc/resolv.conf /etc/hosts {{ cifmw_artifacts_basedir }}/artifacts/ cp -r /etc/NetworkManager/system-connections {{ cifmw_artifacts_basedir }}/artifacts/NetworkManager cp -r /etc/yum.repos.d {{ cifmw_artifacts_basedir }}/artifacts/yum_repos test -d /etc/ci/env && cp -r /etc/ci/env {{ cifmw_artifacts_basedir }}/artifacts/ci-env test -d /var/log/bmaas_console_logs && cp -r /var/log/bmaas_console_logs {{ cifmw_artifacts_basedir }}/logs ip ro ls > {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip rule ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt ip -j -p link ls >> {{ cifmw_artifacts_basedir }}/artifacts/ip-network.txt] *** 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:00.475) 0:36:32.137 ******* 2026-01-20 17:55:30,776 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:30 +0000 (0:00:00.475) 0:36:32.137 ******* 2026-01-20 17:55:31,057 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | TASK [artifacts : Get installed packages list ] ******************************** 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:31 +0000 (0:00:00.292) 0:36:32.430 ******* 2026-01-20 17:55:31,069 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:31 +0000 (0:00:00.292) 0:36:32.429 ******* 2026-01-20 17:55:32,098 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | TASK [artifacts : Output package list mode=0644, dest={{ cifmw_artifacts_basedir }}/artifacts/installed-packages.yml, content={{ ansible_facts.packages | to_nice_yaml }}] *** 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:01.142) 0:36:33.573 ******* 2026-01-20 17:55:32,212 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:01.142) 0:36:33.572 ******* 2026-01-20 17:55:32,709 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | TASK [artifacts : Cleanup unnecesary directories path={{ item }}, state=absent] *** 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:00.539) 0:36:34.112 ******* 2026-01-20 17:55:32,751 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:32 +0000 (0:00:00.539) 0:36:34.111 ******* 2026-01-20 17:55:33,101 p=36747 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/operator) 2026-01-20 17:55:33,147 p=36747 u=zuul n=ansible | TASK [os_must_gather : Ensure directories are present path={{ cifmw_os_must_gather_output_log_dir }}, state=directory, mode=0755] *** 2026-01-20 17:55:33,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.396) 0:36:34.508 ******* 2026-01-20 17:55:33,148 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.396) 0:36:34.508 ******* 2026-01-20 17:55:33,347 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | TASK [os_must_gather : Construct project change list zuul_change_list={{ zuul_change_list | default([]) + [item.project.short_name] }}, cacheable=True] *** 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.228) 0:36:34.737 ******* 2026-01-20 17:55:33,376 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.228) 0:36:34.736 ******* 2026-01-20 17:55:33,421 p=36747 u=zuul n=ansible | ok: [localhost] => (item={'branch': 'main', 'change': '320', 'change_url': 'https://github.com/openstack-k8s-operators/watcher-operator/pull/320', 'commit_id': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'patchset': '111af6c57cd1be8032328ced6eb7a058a201c4b1', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/watcher-operator', 'name': 'openstack-k8s-operators/watcher-operator', 'short_name': 'watcher-operator', 'src_dir': 'src/github.com/openstack-k8s-operators/watcher-operator'}, 'topic': None}) 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | TASK [os_must_gather : Get git tag for image tagging chdir={{ cifmw_os_must_gather_repo_path }}, _raw_params=git show-ref --head --hash head] *** 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.097) 0:36:34.834 ******* 2026-01-20 17:55:33,473 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.097) 0:36:34.834 ******* 2026-01-20 17:55:33,502 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | TASK [os_must_gather : Debug git show-ref msg={{ openstack_must_gather_tag }}] *** 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.057) 0:36:34.892 ******* 2026-01-20 17:55:33,531 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.057) 0:36:34.891 ******* 2026-01-20 17:55:33,562 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | TASK [os_must_gather : Build openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-build, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.058) 0:36:34.950 ******* 2026-01-20 17:55:33,589 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.058) 0:36:34.950 ******* 2026-01-20 17:55:33,616 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | TASK [os_must_gather : Push openstack-must-gather container chdir={{ cifmw_os_must_gather_repo_path }}, output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=make podman-push, extra_args={'IMAGE_TAG': '{{ openstack_must_gather_tag.stdout }}', 'IMAGE_REGISTRY': '{{ cifmw_os_must_gather_image_registry }}', 'MUST_GATHER_IMAGE': 'openstack-must-gather'}] *** 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.053) 0:36:35.004 ******* 2026-01-20 17:55:33,643 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.053) 0:36:35.003 ******* 2026-01-20 17:55:33,668 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | TASK [os_must_gather : Set cifmw_os_must_gather_image to new image tag cifmw_os_must_gather_image={{ cifmw_os_must_gather_image_registry }}/openstack-must-gather:{{ openstack_must_gather_tag.stdout }}] *** 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.120) 0:36:35.124 ******* 2026-01-20 17:55:33,763 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.120) 0:36:35.124 ******* 2026-01-20 17:55:33,795 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | TASK [os_must_gather : Check for oc command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=command -v oc] *** 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.063) 0:36:35.188 ******* 2026-01-20 17:55:33,827 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.063) 0:36:35.187 ******* 2026-01-20 17:55:33,878 p=36747 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_016_check_for_oc.log 2026-01-20 17:55:33,963 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 17:55:33,993 p=36747 u=zuul n=ansible | TASK [os_must_gather : Check if kubeconfig exists path={{ cifmw_openshift_kubeconfig | default(cifmw_os_must_gather_kubeconfig) }}] *** 2026-01-20 17:55:33,994 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.166) 0:36:35.355 ******* 2026-01-20 17:55:33,994 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:33 +0000 (0:00:00.166) 0:36:35.354 ******* 2026-01-20 17:55:34,240 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 17:55:34,270 p=36747 u=zuul n=ansible | TASK [os_must_gather : Run openstack-must-gather command output_dir={{ cifmw_os_must_gather_output_dir }}/artifacts, script=timeout {{ shell_cmd_timeout }} oc adm must-gather --image {{ cifmw_os_must_gather_image }} --timeout {{ cifmw_os_must_gather_timeout }} --host-network={{ cifmw_os_must_gather_host_network }} --dest-dir {{ cifmw_os_must_gather_output_log_dir }} --volume-percentage={{ cifmw_os_must_gather_volume_percentage }} -- ADDITIONAL_NAMESPACES={{ cifmw_os_must_gather_additional_namespaces }} OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1 || { rc=$? if [ $rc -eq 124 ]; then echo "The must gather command did not finish on time!" echo "{{ shell_cmd_timeout }} seconds was not enough to finish the task." fi }] *** 2026-01-20 17:55:34,270 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:34 +0000 (0:00:00.276) 0:36:35.631 ******* 2026-01-20 17:55:34,271 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 17:55:34 +0000 (0:00:00.276) 0:36:35.631 ******* 2026-01-20 17:55:34,379 p=36747 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_017_run_openstack_must_gather.log 2026-01-20 18:40:34,493 p=36747 u=zuul n=ansible | changed: [localhost] 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | TASK [os_must_gather : Find existing os-must-gather directories paths={{ cifmw_os_must_gather_output_log_dir }}, file_type=directory, depth=1] *** 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:45:00.262) 1:21:35.894 ******* 2026-01-20 18:40:34,533 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:45:00.262) 1:21:35.894 ******* 2026-01-20 18:40:34,766 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | TASK [os_must_gather : Create a symlink to newest os-must-gather directory src={{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}, dest={{ cifmw_os_must_gather_output_log_dir }}/latest, state=link] *** 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.268) 1:21:36.163 ******* 2026-01-20 18:40:34,802 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.268) 1:21:36.162 ******* 2026-01-20 18:40:34,837 p=36747 u=zuul n=ansible | fatal: [localhost]: FAILED! => msg: | The task includes an option with an undefined variable. The error was: Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined. Unable to look up a name or access an attribute in template string ({{ (_os_gather_latest_dir.files | sort(attribute='mtime', reverse=True) | first).path | basename }}). Make sure your variable name does not contain invalid characters like '-': expected str, bytes or os.PathLike object, not AnsibleUndefined. expected str, bytes or os.PathLike object, not AnsibleUndefined The error appears to be in '/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/os_must_gather/tasks/main.yml': line 96, column 7, but may be elsewhere in the file depending on the exact syntax problem. The offending line appears to be: - name: Create a symlink to newest os-must-gather directory ^ here 2026-01-20 18:40:34,837 p=36747 u=zuul n=ansible | ...ignoring 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | TASK [artifacts : Create crc logs directory path={{ cifmw_artifacts_basedir }}/logs/crc, state=directory, mode=0755] *** 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.117) 1:21:36.281 ******* 2026-01-20 18:40:34,920 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.117) 1:21:36.280 ******* 2026-01-20 18:40:34,939 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:34,970 p=36747 u=zuul n=ansible | TASK [artifacts : Ensure controller knows CRC ssh keys _raw_params=ssh-keyscan {{ cifmw_artifacts_crc_host }} >> ~/.ssh/known_hosts] *** 2026-01-20 18:40:34,971 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.050) 1:21:36.332 ******* 2026-01-20 18:40:34,971 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:34 +0000 (0:00:00.050) 1:21:36.331 ******* 2026-01-20 18:40:34,988 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | TASK [artifacts : Recognize new keypair path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.128) 1:21:36.460 ******* 2026-01-20 18:40:35,099 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.128) 1:21:36.460 ******* 2026-01-20 18:40:35,116 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | TASK [artifacts : Set fact if new keypair exists new_keypair_path={{ cifmw_artifacts_crc_sshkey_ed25519 }}] *** 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.047) 1:21:36.508 ******* 2026-01-20 18:40:35,147 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.047) 1:21:36.507 ******* 2026-01-20 18:40:35,165 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,199 p=36747 u=zuul n=ansible | TASK [artifacts : Prepare root ssh accesses output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=ssh -i {{ new_keypair_path | default(cifmw_artifacts_crc_sshkey) }} {{ cifmw_artifacts_crc_user }}@{{ cifmw_artifacts_crc_host }} < /tmp/{{ host_ip }}/ovs_vsctl_list_openvswitch.txt sudo ip netns > /tmp/{{ host_ip }}/ip_netns.txt sudo ip a > /tmp/{{ host_ip }}/network.txt sudo ip ro ls >> /tmp/{{ host_ip }}/network.txt sudo rpm -qa > /tmp/{{ host_ip }}/rpm_qa.txt sudo dnf list installed > /tmp/{{ host_ip }}/dnf_list_installed.txt sudo podman images --digests > /tmp/{{ host_ip }}/podman_images.txt sudo fips-mode-setup --check > /tmp/{{ host_ip }}/fips_check.txt mkdir -p /tmp/{{ host_ip }}/service_logs systemctl list-units | awk '/virt|edpm|ovs/ {print $1}' | egrep -v "sys|ovs-delete-transient-ports" | xargs -I {} sudo bash -c 'journalctl -u {} > /tmp/{{ host_ip }}/service_logs/{}.log' sudo ausearch -i | grep denied > /tmp/{{ host_ip }}/selinux-denials.log || true sudo journalctl -p warning -t kernel -o short -g DROPPING --no-pager &> /tmp/{{ host_ip }}/firewall-drops.txt || true EOF] *** 2026-01-20 18:40:35,719 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.084) 1:21:37.080 ******* 2026-01-20 18:40:35,719 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.084) 1:21:37.080 ******* 2026-01-20 18:40:35,749 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | TASK [artifacts : Copy logs to host machine from {{ item.split('/')[0] }} output_dir={{ cifmw_artifacts_basedir }}/artifacts, script=rsync -a -e "ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i {{ ssh_key_file }}" {{ ssh_user }}@{{ host_ip }}:/tmp/{{ host_ip }} {{ cifmw_artifacts_basedir }}/logs/;] *** 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.061) 1:21:37.142 ******* 2026-01-20 18:40:35,781 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.061) 1:21:37.141 ******* 2026-01-20 18:40:35,808 p=36747 u=zuul n=ansible | skipping: [localhost] 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | TASK [artifacts : Generate list of ansible logs to collect in home directory paths={{ ansible_user_dir }}, patterns=*ansible*.log] *** 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.059) 1:21:37.201 ******* 2026-01-20 18:40:35,840 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:35 +0000 (0:00:00.059) 1:21:37.200 ******* 2026-01-20 18:40:36,066 p=36747 u=zuul n=ansible | ok: [localhost] 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | TASK [artifacts : Copy ansible logs to logs directory src={{ item.path }}, dest={{ cifmw_artifacts_basedir }}/logs/, remote_src=True, mode=0644] *** 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.345) 1:21:37.547 ******* 2026-01-20 18:40:36,186 p=36747 u=zuul n=ansible | Tuesday 20 January 2026 18:40:36 +0000 (0:00:00.345) 1:21:37.546 ******* home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log0000644000175000017500000001643415133753355027662 0ustar zuulzuul~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml namespace/openstack unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" NAME DISPLAY NAME STATUS openstack Active oc project openstack Already on project "openstack" on server "https://api.crc.testing:6443". oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane: no such file or directory No resources found rm -Rf /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr bash scripts/cleanup-edpm_deploy.sh ++ oc rsh openstackclient bash -c 'openstack network agent list | grep -E "edpm-compute-.+\.ctlplane" | cut -d" " -f2 | xargs echo -n' + AGENTS= + [[ -n '' ]] mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr bash -c "test -d /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator || CHECKOUT_FROM_OPENSTACK_REF=false scripts/clone-operator-repo.sh" Cloning repo: git clone -b main https://github.com/openstack-k8s-operators/openstack-operator.git openstack-operator Cloning into 'openstack-operator'... mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr cp /home/zuul/ci-framework-data/nova-extra-config.conf /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/25-nova-extra.conf oc apply -f devsetup/edpm/config/ansible-ee-env.yaml configmap/openstack-aee-default-env created oc kustomize --load-restrictor LoadRestrictionsNone /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/dataplane/preprovisioned > /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/dataplane.yaml bash scripts/gen-edpm-kustomize.sh +++ dirname scripts/gen-edpm-kustomize.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only ++ set -e + '[' -z openstack ']' + '[' -z OpenStackDataPlaneNodeSet ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr ']' + NAME=openstackdataplanenodeset + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr ~/ci-framework-data/artifacts/manifests/openstack/dataplane/cr ~/src/github.com/openstack-k8s-operators/install_yamls + cat + '[' -n '' ']' + cat + '[' -n '' ']' + oc get pvc ansible-ee-logs -n openstack Error from server (NotFound): persistentvolumeclaims "ansible-ee-logs" not found + '[' 2 -gt 1 ']' ++ seq 1 1 + for INDEX in $(seq 1 $((${EDPM_TOTAL_NODES} -1))) + '[' compute == networker ']' + IP_ADDRESS_PREFIX=192.168.122.101 + cat + '[' -n '' ']' + cat + '[' -n '' ']' + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/gen-nova-custom-dataplane-service.sh ++ set -e ++ '[' compute == compute ']' ++ cat + kustomization_add_resources + echo merge config dir merge config dir ++ find . -type f -name '*.yaml' ++ grep -v kustomization + yamls=./dataplane.yaml + for y in ${yamls[@]} + kustomize edit add resource ./dataplane.yaml + popd ~/src/github.com/openstack-k8s-operators/install_yamls make edpm_deploy_generate_keys make[1]: Entering directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' devsetup/scripts/gen-ansibleee-ssh-key.sh +++ dirname devsetup/scripts/gen-ansibleee-ssh-key.sh ++ cd devsetup/scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/scripts + NAMESPACE=openstack + DATAPLANE_ANSIBLE_SECRET=dataplane-ansible-ssh-private-key-secret + OUTPUT_DIR=/home/zuul/ci-framework-data/artifacts/edpm + SSH_ALGORITHM=rsa + SSH_KEY_FILE=/home/zuul/.ssh/id_cifw + SSH_KEY_SIZE=4096 + pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/scripts ~/src/github.com/openstack-k8s-operators/install_yamls/devsetup/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + '[' '!' -d /home/zuul/ci-framework-data/artifacts/edpm ']' + mkdir -p /home/zuul/ci-framework-data/artifacts/edpm + pushd /home/zuul/ci-framework-data/artifacts/edpm ~/ci-framework-data/artifacts/edpm ~/src/github.com/openstack-k8s-operators/install_yamls/devsetup/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + oc get secret dataplane-ansible-ssh-private-key-secret -n openstack Error from server (NotFound): secrets "dataplane-ansible-ssh-private-key-secret" not found + '[' '!' -f /home/zuul/.ssh/id_cifw ']' + cat + oc apply -f namespace.yaml namespace/openstack unchanged + oc apply -f - + oc create secret generic dataplane-ansible-ssh-private-key-secret --save-config --dry-run=client --from-file=authorized_keys=/home/zuul/.ssh/id_cifw.pub --from-file=ssh-privatekey=/h**********fw --from-file=ssh-publickey=/home/zuul/.ssh/id_cifw.pub -n openstack -o yaml secret/dataplane-ansible-ssh-private-key-secret created + popd ~/src/github.com/openstack-k8s-operators/install_yamls/devsetup/scripts ~/src/github.com/openstack-k8s-operators/install_yamls + popd ~/src/github.com/openstack-k8s-operators/install_yamls bash scripts/gen-edpm-nova-migration-ssh-key.sh + oc get secret nova-migration-ssh-key -n openstack Error from server (NotFound): secrets "nova-migration-ssh-key" not found + create_migration_key ++ mktemp -d + pushd /tmp/tmp.cSx76kgQ7u /tmp/tmp.cSx76kgQ7u ~/src/github.com/openstack-k8s-operators/install_yamls + ssh-keygen -f ./id -t ecdsa-sha2-nistp521 -N '' Generating public/private ecdsa-sha2-nistp521 key pair. Your identification has been saved in ./id Your public key has been saved in ./id.pub The key fingerprint is: SHA256:eooNN0R3+5ESpq/yygBq8t7/tM0BkxJUFaotOb9YgfU zuul@controller The key's randomart image is: +---[ECDSA 521]---+ | ....o. | | . . | | o + + | | . O * o . | | . O S E o | | . . . * = o . | |o. o + = o . | |o. . B.B * . | | .o o.B=* o | +----[SHA256]-----+ + oc create secret generic nova-migration-ssh-key -n openstack --from-file=ssh-privatekey=id************ --from-file=ssh-publickey=id.pub --type kubernetes.io/ssh-auth secret/nova-migration-ssh-key created + rm id id.pub + popd ~/src/github.com/openstack-k8s-operators/install_yamls make[1]: Leaving directory '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls' oc apply -f devsetup/edpm/services openstackdataplaneservice.dataplane.openstack.org/repo-setup created ~/ci-framework-data/artifacts home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log0000644000175000017500000001055315133730671030721 0ustar zuulzuul~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts bash scripts/gen-namespace.sh + '[' -z /home/zuul/ci-framework-data/artifacts/manifests ']' + '[' -z openstack ']' + OUT_DIR=/home/zuul/ci-framework-data/artifacts/manifests/openstack + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack ']' + cat oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/namespace.yaml namespace/openstack unchanged timeout 500s bash -c "while ! (oc get project.v1.project.openshift.io openstack); do sleep 1; done" NAME DISPLAY NAME STATUS openstack Active oc project openstack Now using project "openstack" on server "https://api.crc.testing:6443". oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr | oc delete --ignore-not-found=true -f - error: must build at directory: not a valid directory: evalsymlink failure on '/home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr' : lstat /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra: no such file or directory No resources found true /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack/infra/cr oc kustomize /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr | oc delete --ignore-not-found=true -f - || true error: unable to find one of 'kustomization.yaml', 'kustomization.yml' or 'Kustomization' in directory '/home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr' No resources found true /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr mkdir -p /home/zuul/ci-framework-data/artifacts/manifests/operator /home/zuul/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr bash -c "test -d /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator || CHECKOUT_FROM_OPENSTACK_REF=false scripts/clone-operator-repo.sh" cp /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr bash scripts/gen-service-kustomize.sh +++ dirname scripts/gen-service-kustomize.sh ++ cd scripts ++ pwd -P + SCRIPTPATH=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts + . /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/scripts/common.sh --source-only ++ set -e + '[' -z openstack ']' + '[' -z OpenStackControlPlane ']' + '[' -z osp-secret ']' + '[' -z /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr ']' + '[' -n '' ']' + REPLACEMENTS= + IMAGE=unused + IMAGE_PATH=containerImage + STORAGE_REQUEST=10G + INTERFACE_MTU=1500 + VLAN_START=20 + VLAN_STEP=1 + '[' '!' -d /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr ']' + pushd /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr ~/ci-framework-data/artifacts/manifests/openstack/openstack/cr ~/src/github.com/openstack-k8s-operators/install_yamls + cat + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ '' != '' ]] + IFS=, + read -ra IMAGES + IFS=, + read -ra IMAGE_PATHS + '[' 1 '!=' 1 ']' + (( i=0 )) + (( i < 1 )) + SPEC_PATH=containerImage + SPEC_VALUE=unused + '[' unused '!=' unused ']' + (( i++ )) + (( i < 1 )) + '[' -n '' ']' + '[' OpenStackControlPlane == OpenStackControlPlane ']' + cat + '[' OpenStackControlPlane == Galera ']' + '[' OpenStackControlPlane == NetConfig ']' + '[' -n '' ']' + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + [[ true == \t\r\u\e ]] + cat + [[ OpenStackControlPlane == \O\p\e\n\S\t\a\c\k\C\o\n\t\r\o\l\P\l\a\n\e ]] + '[' -z true ']' + cat + '[' -n '' ']' + '[' -z true ']' + '[' -n true ']' + '[' -n '' ']' + '[' -n '' ']' + kustomization_add_resources + echo merge config dir merge config dir ++ find . -type f -name '*.yaml' ++ grep -v kustomization + yamls=./core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml + for y in ${yamls[@]} + kustomize edit add resource ./core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml + popd ~/src/github.com/openstack-k8s-operators/install_yamls ~/ci-framework-data/artifacts home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_010_apply_the.log0000644000175000017500000000007615133730703026443 0ustar zuulzuulopenstackcontrolplane.core.openstack.org/controlplane created home/zuul/zuul-output/logs/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log0000644000175000017500000000366315133731446032360 0ustar zuulzuul[WARNING]: Found variable using reserved name: namespace PLAY [RabbitMQ resource setup hook] ******************************************** TASK [Patch rabbitmq resources for lower resource consumption _raw_params=crname=$(oc get openstackcontrolplane -o name -n {{ namespace }}) oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq/resources/requests/cpu", "value": 500m}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq/resources/requests/memory", "value": 500Mi}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq-cell1/resources/requests/cpu", "value": 500m}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq-cell1/resources/requests/memory", "value": 500Mi}]' ] *** Tuesday 20 January 2026 16:53:55 +0000 (0:00:00.068) 0:00:00.068 ******* Tuesday 20 January 2026 16:53:55 +0000 (0:00:00.067) 0:00:00.067 ******* changed: [localhost] PLAY RECAP ********************************************************************* localhost : ok=1 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 Tuesday 20 January 2026 16:53:58 +0000 (0:00:02.823) 0:00:02.892 ******* =============================================================================== Patch rabbitmq resources for lower resource consumption ----------------- 2.82s Tuesday 20 January 2026 16:53:58 +0000 (0:00:02.824) 0:00:02.891 ******* =============================================================================== ansible.builtin.shell --------------------------------------------------- 2.82s ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ total ------------------------------------------------------------------- 2.82s home/zuul/zuul-output/logs/ci-framework-data/logs/post_ctlplane_deploy_tune_rabbitmq_resources.log0000644000175000017500000000534015133731446033274 0ustar zuulzuul2026-01-20 16:53:55,201 p=35869 u=zuul n=ansible | [WARNING]: Found variable using reserved name: namespace 2026-01-20 16:53:55,202 p=35869 u=zuul n=ansible | PLAY [RabbitMQ resource setup hook] ******************************************** 2026-01-20 16:53:55,253 p=35869 u=zuul n=ansible | TASK [Patch rabbitmq resources for lower resource consumption _raw_params=crname=$(oc get openstackcontrolplane -o name -n {{ namespace }}) oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq/resources/requests/cpu", "value": 500m}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq/resources/requests/memory", "value": 500Mi}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq-cell1/resources/requests/cpu", "value": 500m}]' oc patch ${crname} --type json -n {{ namespace }} -p='[{"op": "replace", "path": "/spec/rabbitmq/templates/rabbitmq-cell1/resources/requests/memory", "value": 500Mi}]' ] *** 2026-01-20 16:53:55,253 p=35869 u=zuul n=ansible | Tuesday 20 January 2026 16:53:55 +0000 (0:00:00.068) 0:00:00.068 ******* 2026-01-20 16:53:55,253 p=35869 u=zuul n=ansible | Tuesday 20 January 2026 16:53:55 +0000 (0:00:00.067) 0:00:00.067 ******* 2026-01-20 16:53:58,037 p=35869 u=zuul n=ansible | changed: [localhost] 2026-01-20 16:53:58,077 p=35869 u=zuul n=ansible | PLAY RECAP ********************************************************************* 2026-01-20 16:53:58,077 p=35869 u=zuul n=ansible | localhost : ok=1 changed=1 unreachable=0 failed=0 skipped=0 rescued=0 ignored=0 2026-01-20 16:53:58,077 p=35869 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:02.823) 0:00:02.892 ******* 2026-01-20 16:53:58,077 p=35869 u=zuul n=ansible | =============================================================================== 2026-01-20 16:53:58,077 p=35869 u=zuul n=ansible | Patch rabbitmq resources for lower resource consumption ----------------- 2.82s 2026-01-20 16:53:58,078 p=35869 u=zuul n=ansible | Tuesday 20 January 2026 16:53:58 +0000 (0:00:02.824) 0:00:02.891 ******* 2026-01-20 16:53:58,078 p=35869 u=zuul n=ansible | =============================================================================== 2026-01-20 16:53:58,078 p=35869 u=zuul n=ansible | ansible.builtin.shell --------------------------------------------------- 2.82s 2026-01-20 16:53:58,078 p=35869 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2026-01-20 16:53:58,078 p=35869 u=zuul n=ansible | total ------------------------------------------------------------------- 2.82s home/zuul/zuul-output/logs/ci-framework-data/artifacts/0000755000175000017500000000000015133753413022350 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/0000777000175000017500000000000015133753413026735 5ustar zuulzuul././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_cache/home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_0000755000175000017500000000000015133753413031606 5ustar zuulzuul././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_cache/compute-0home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_0000644000175000017500000005561615133753413031625 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "192.168.122.100", "38.102.83.181" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:feae:a0a2" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768927348", "epoch_int": "1768927348", "hour": "16", "iso8601": "2026-01-20T16:42:28Z", "iso8601_basic": "20260120T164228497812", "iso8601_basic_short": "20260120T164228", "iso8601_micro": "2026-01-20T16:42:28.497812Z", "minute": "42", "month": "01", "second": "28", "time": "16:42:28", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.181", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:ae:a0:a2", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-23-37-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-23-37-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "167770079", "sectorsize": 512, "size": "80.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "167772160", "sectorsize": "512", "size": "80.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "1", "SSH_CLIENT": "38.102.83.129 47322 22", "SSH_CONNECTION": "38.102.83.129 47322 38.102.83.181 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "7", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.181", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:feae:a0a2", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:ae:a0:a2", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.100", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:58:5f:bb", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "compute-0", "ansible_hostname": "compute-0", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "eth0", "eth1", "lo" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.16, "1m": 0.02, "5m": 0.2 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.181", "127.0.0.0/8", "127.0.0.1", "192.168.122.100" ], "ipv6": [ "::1", "fe80::f816:3eff:feae:a0a2" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 6755, "ansible_memory_mb": { "nocache": { "free": 7268, "used": 411 }, "real": { "free": 6755, "total": 7679, "used": 924 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 7679, "ansible_mounts": [ { "block_available": 20302654, "block_size": 4096, "block_total": 20954875, "block_used": 652221, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 41887816, "inode_total": 41942512, "inode_used": 54696, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 83159670784, "size_total": 85831168000, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "compute-0", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor", "2", "AuthenticAMD", "AMD EPYC-Rome Processor", "3", "AuthenticAMD", "AMD EPYC-Rome Processor", "4", "AuthenticAMD", "AMD EPYC-Rome Processor", "5", "AuthenticAMD", "AMD EPYC-Rome Processor", "6", "AuthenticAMD", "AMD EPYC-Rome Processor", "7", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 8, "ansible_processor_nproc": 8, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 8, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCe+qejRAlJDC5tpW9cL6IQbJ9X5gKDWSXERtfbJ2PwIcdLO/H8nHY/DCe7zGcKZFkXQZ5Lt1y4tqqAEA2e5Za8=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIN9tw2cXMe7fXZRFpGIaWJQmIWXbG+knVbPWXpNVXJR9", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 1123, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "all" ], "module_setup": true }././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_cache/compute-1home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_0000644000175000017500000005561615133753413031625 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "192.168.122.101", "38.102.83.192" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:fe12:453d" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768927349", "epoch_int": "1768927349", "hour": "16", "iso8601": "2026-01-20T16:42:29Z", "iso8601_basic": "20260120T164229954884", "iso8601_basic_short": "20260120T164229", "iso8601_micro": "2026-01-20T16:42:29.954884Z", "minute": "42", "month": "01", "second": "29", "time": "16:42:29", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.192", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:12:45:3d", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-24-46-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-24-46-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "167770079", "sectorsize": 512, "size": "80.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "167772160", "sectorsize": "512", "size": "80.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "1", "SSH_CLIENT": "38.102.83.129 52984 22", "SSH_CONNECTION": "38.102.83.129 52984 38.102.83.192 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "8", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.192", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:fe12:453d", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:12:45:3d", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.101", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:30:ed:c6", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "compute-1", "ansible_hostname": "compute-1", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "eth0", "lo", "eth1" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.15, "1m": 0.05, "5m": 0.2 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.192", "127.0.0.0/8", "127.0.0.1", "192.168.122.101" ], "ipv6": [ "::1", "fe80::f816:3eff:fe12:453d" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 6784, "ansible_memory_mb": { "nocache": { "free": 7286, "used": 393 }, "real": { "free": 6784, "total": 7679, "used": 895 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 7679, "ansible_mounts": [ { "block_available": 20302651, "block_size": 4096, "block_total": 20954875, "block_used": 652224, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 41887817, "inode_total": 41942512, "inode_used": 54695, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 83159658496, "size_total": 85831168000, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "compute-1", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor", "2", "AuthenticAMD", "AMD EPYC-Rome Processor", "3", "AuthenticAMD", "AMD EPYC-Rome Processor", "4", "AuthenticAMD", "AMD EPYC-Rome Processor", "5", "AuthenticAMD", "AMD EPYC-Rome Processor", "6", "AuthenticAMD", "AMD EPYC-Rome Processor", "7", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 8, "ansible_processor_nproc": 8, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 8, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFAqM26R0MqyBYDvgqXYsowpIyokzkLkmzXlKae725e7QpsDDdpAwlfRTYM7WYpvW1J1T4e5Qd4z/hQwNCKBvvk=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIDMIgnLst56Z+qDhe62CoSQxsEdOdAODmh24F4PTlS+L", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 1055, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "all" ], "module_setup": true }././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_cache/localhosthome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_19-27/ansible_facts_0000644000175000017500000070206215133753413031617 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "38.102.83.129", "192.168.122.11" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:fe17:b3c5" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768931727", "epoch_int": "1768931727", "hour": "17", "iso8601": "2026-01-20T17:55:27Z", "iso8601_basic": "20260120T175527383154", "iso8601_basic_short": "20260120T175527", "iso8601_micro": "2026-01-20T17:55:27.383154Z", "minute": "55", "month": "01", "second": "27", "time": "17:55:27", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.129", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:17:b3:c5", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-23-08-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-23-08-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "83883999", "sectorsize": 512, "size": "40.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "83886080", "sectorsize": "512", "size": "40.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "192.168.122.10", "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul/src/github.com/openstack-k8s-operators/ci-framework", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "2", "SSH_CLIENT": "38.102.83.114 58004 22", "SSH_CONNECTION": "38.102.83.114 58004 38.102.83.129 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "9", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.129", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:fe17:b3c5", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:17:b3:c5", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.11", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:e2:e3:b7", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "controller", "ansible_hostname": "controller", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "lo", "eth1", "eth0" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.43, "1m": 1.17, "5m": 0.82 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.129", "127.0.0.0/8", "127.0.0.1", "192.168.122.11" ], "ipv6": [ "::1", "fe80::f816:3eff:fe17:b3c5" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 1269, "ansible_memory_mb": { "nocache": { "free": 2767, "used": 888 }, "real": { "free": 1269, "total": 3655, "used": 2386 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 3655, "ansible_mounts": [ { "block_available": 9579302, "block_size": 4096, "block_total": 10469115, "block_used": 889813, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 20821671, "inode_total": 20970992, "inode_used": 149321, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 39236820992, "size_total": 42881495040, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "controller", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 2, "ansible_processor_nproc": 2, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 2, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 997, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "cifmw_discovered_hash": "6b1f209ecc539dcfd8634a5c7786c6629def62c87865ceb38b6678fdd81d8a90", "cifmw_discovered_hash_algorithm": "sha256", "cifmw_discovered_image_name": "CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2", "cifmw_discovered_image_url": "https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2", "cifmw_edpm_deploy_env": { "BMO_SETUP": false, "CHECKOUT_FROM_OPENSTACK_REF": "true", "DATAPLANE_COMPUTE_IP": "192.168.122.100", "DATAPLANE_CONTAINER_TAG": "c3923531bcda0b0811b2d5053f189beb", "DATAPLANE_EXTRA_NOVA_CONFIG_FILE": "/home/zuul/ci-framework-data/nova-extra-config.conf", "DATAPLANE_REGISTRY_URL": "quay.io/podified-antelope-centos9", "DATAPLANE_SINGLE_NODE": "false", "DATAPLANE_SSHD_ALLOWED_RANGES": "['0.0.0.0/0']", "DATAPLANE_TOTAL_NODES": 2, "INSTALL_CERT_MANAGER": false, "KUBECONFIG": "/home/zuul/.crc/machines/crc/kubeconfig", "OPENSTACK_K8S_BRANCH": "main", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "PATH": "/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "SSH_KEY_FILE": "/home/zuul/.ssh/id_cifw", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" }, "cifmw_install_yamls_defaults": { "ADOPTED_EXTERNAL_NETWORK": "172.21.1.0/24", "ADOPTED_INTERNALAPI_NETWORK": "172.17.1.0/24", "ADOPTED_STORAGEMGMT_NETWORK": "172.20.1.0/24", "ADOPTED_STORAGE_NETWORK": "172.18.1.0/24", "ADOPTED_TENANT_NETWORK": "172.9.1.0/24", "ANSIBLEEE": "config/samples/_v1beta1_ansibleee.yaml", "ANSIBLEEE_BRANCH": "main", "ANSIBLEEE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml", "ANSIBLEEE_IMG": "quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest", "ANSIBLEEE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml", "ANSIBLEEE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests", "ANSIBLEEE_KUTTL_NAMESPACE": "ansibleee-kuttl-tests", "ANSIBLEEE_REPO": "https://github.com/openstack-k8s-operators/openstack-ansibleee-operator", "ANSIBLEE_COMMIT_HASH": "", "BARBICAN": "config/samples/barbican_v1beta1_barbican.yaml", "BARBICAN_BRANCH": "main", "BARBICAN_COMMIT_HASH": "", "BARBICAN_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml", "BARBICAN_DEPL_IMG": "unused", "BARBICAN_IMG": "quay.io/openstack-k8s-operators/barbican-operator-index:latest", "BARBICAN_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml", "BARBICAN_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests", "BARBICAN_KUTTL_NAMESPACE": "barbican-kuttl-tests", "BARBICAN_REPO": "https://github.com/openstack-k8s-operators/barbican-operator.git", "BARBICAN_SERVICE_ENABLED": "true", "BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY": "sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=", "BAREMETAL_BRANCH": "main", "BAREMETAL_COMMIT_HASH": "", "BAREMETAL_IMG": "quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest", "BAREMETAL_OS_CONTAINER_IMG": "", "BAREMETAL_OS_IMG": "", "BAREMETAL_OS_IMG_TYPE": "", "BAREMETAL_REPO": "https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git", "BAREMETAL_TIMEOUT": "20m", "BASH_IMG": "quay.io/openstack-k8s-operators/bash:latest", "BGP_ASN": "64999", "BGP_LEAF_1": "100.65.4.1", "BGP_LEAF_2": "100.64.4.1", "BGP_OVN_ROUTING": "false", "BGP_PEER_ASN": "64999", "BGP_SOURCE_IP": "172.30.4.2", "BGP_SOURCE_IP6": "f00d:f00d:f00d:f00d:f00d:f00d:f00d:42", "BMAAS_BRIDGE_IPV4_PREFIX": "172.20.1.2/24", "BMAAS_BRIDGE_IPV6_PREFIX": "fd00:bbbb::2/64", "BMAAS_INSTANCE_DISK_SIZE": "20", "BMAAS_INSTANCE_MEMORY": "4096", "BMAAS_INSTANCE_NAME_PREFIX": "crc-bmaas", "BMAAS_INSTANCE_NET_MODEL": "virtio", "BMAAS_INSTANCE_OS_VARIANT": "centos-stream9", "BMAAS_INSTANCE_VCPUS": "2", "BMAAS_INSTANCE_VIRT_TYPE": "kvm", "BMAAS_IPV4": "true", "BMAAS_IPV6": "false", "BMAAS_LIBVIRT_USER": "sushyemu", "BMAAS_METALLB_ADDRESS_POOL": "172.20.1.64/26", "BMAAS_METALLB_POOL_NAME": "baremetal", "BMAAS_NETWORK_IPV4_PREFIX": "172.20.1.1/24", "BMAAS_NETWORK_IPV6_PREFIX": "fd00:bbbb::1/64", "BMAAS_NETWORK_NAME": "crc-bmaas", "BMAAS_NODE_COUNT": "1", "BMAAS_OCP_INSTANCE_NAME": "crc", "BMAAS_REDFISH_PASSWORD": "password", "BMAAS_REDFISH_USERNAME": "admin", "BMAAS_ROUTE_LIBVIRT_NETWORKS": "crc-bmaas,crc,default", "BMAAS_SUSHY_EMULATOR_DRIVER": "libvirt", "BMAAS_SUSHY_EMULATOR_IMAGE": "quay.io/metal3-io/sushy-tools:latest", "BMAAS_SUSHY_EMULATOR_NAMESPACE": "sushy-emulator", "BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE": "/etc/openstack/clouds.yaml", "BMAAS_SUSHY_EMULATOR_OS_CLOUD": "openstack", "BMH_NAMESPACE": "openstack", "BMO_BRANCH": "release-0.9", "BMO_CLEANUP": "true", "BMO_COMMIT_HASH": "", "BMO_IPA_BRANCH": "stable/2024.1", "BMO_IRONIC_HOST": "192.168.122.10", "BMO_PROVISIONING_INTERFACE": "", "BMO_REPO": "https://github.com/metal3-io/baremetal-operator", "BMO_SETUP": false, "BMO_SETUP_ROUTE_REPLACE": "true", "BM_CTLPLANE_INTERFACE": "enp1s0", "BM_INSTANCE_MEMORY": "8192", "BM_INSTANCE_NAME_PREFIX": "edpm-compute-baremetal", "BM_INSTANCE_NAME_SUFFIX": "0", "BM_NETWORK_NAME": "default", "BM_NODE_COUNT": "1", "BM_ROOT_PASSWORD": "", "BM_ROOT_PASSWORD_SECRET": "", "CEILOMETER_CENTRAL_DEPL_IMG": "unused", "CEILOMETER_NOTIFICATION_DEPL_IMG": "unused", "CEPH_BRANCH": "release-1.15", "CEPH_CLIENT": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml", "CEPH_COMMON": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml", "CEPH_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml", "CEPH_CRDS": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml", "CEPH_IMG": "quay.io/ceph/demo:latest-squid", "CEPH_OP": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml", "CEPH_REPO": "https://github.com/rook/rook.git", "CERTMANAGER_TIMEOUT": "300s", "CHECKOUT_FROM_OPENSTACK_REF": "true", "CINDER": "config/samples/cinder_v1beta1_cinder.yaml", "CINDERAPI_DEPL_IMG": "unused", "CINDERBKP_DEPL_IMG": "unused", "CINDERSCH_DEPL_IMG": "unused", "CINDERVOL_DEPL_IMG": "unused", "CINDER_BRANCH": "main", "CINDER_COMMIT_HASH": "", "CINDER_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml", "CINDER_IMG": "quay.io/openstack-k8s-operators/cinder-operator-index:latest", "CINDER_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml", "CINDER_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests", "CINDER_KUTTL_NAMESPACE": "cinder-kuttl-tests", "CINDER_REPO": "https://github.com/openstack-k8s-operators/cinder-operator.git", "CLEANUP_DIR_CMD": "rm -Rf", "CRC_BGP_NIC_1_MAC": "52:54:00:11:11:11", "CRC_BGP_NIC_2_MAC": "52:54:00:11:11:12", "CRC_HTTPS_PROXY": "", "CRC_HTTP_PROXY": "", "CRC_STORAGE_NAMESPACE": "crc-storage", "CRC_STORAGE_RETRIES": "3", "CRC_URL": "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", "CRC_VERSION": "latest", "DATAPLANE_ANSIBLE_SECRET": "dataplane-ansible-ssh-private-key-secret", "DATAPLANE_ANSIBLE_USER": "", "DATAPLANE_COMPUTE_IP": "192.168.122.100", "DATAPLANE_CONTAINER_PREFIX": "openstack", "DATAPLANE_CONTAINER_TAG": "current-podified", "DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG": "quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest", "DATAPLANE_DEFAULT_GW": "192.168.122.1", "DATAPLANE_EXTRA_NOVA_CONFIG_FILE": "/dev/null", "DATAPLANE_GROWVOLS_ARGS": "/=8GB /tmp=1GB /home=1GB /var=100%", "DATAPLANE_KUSTOMIZE_SCENARIO": "preprovisioned", "DATAPLANE_NETWORKER_IP": "192.168.122.200", "DATAPLANE_NETWORK_INTERFACE_NAME": "eth0", "DATAPLANE_NOVA_NFS_PATH": "", "DATAPLANE_NTP_SERVER": "pool.ntp.org", "DATAPLANE_PLAYBOOK": "osp.edpm.download_cache", "DATAPLANE_REGISTRY_URL": "quay.io/podified-antelope-centos9", "DATAPLANE_RUNNER_IMG": "", "DATAPLANE_SERVER_ROLE": "compute", "DATAPLANE_SSHD_ALLOWED_RANGES": "['192.168.122.0/24']", "DATAPLANE_TIMEOUT": "30m", "DATAPLANE_TLS_ENABLED": "true", "DATAPLANE_TOTAL_NETWORKER_NODES": "1", "DATAPLANE_TOTAL_NODES": "1", "DBSERVICE": "galera", "DESIGNATE": "config/samples/designate_v1beta1_designate.yaml", "DESIGNATE_BRANCH": "main", "DESIGNATE_COMMIT_HASH": "", "DESIGNATE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml", "DESIGNATE_IMG": "quay.io/openstack-k8s-operators/designate-operator-index:latest", "DESIGNATE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml", "DESIGNATE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests", "DESIGNATE_KUTTL_NAMESPACE": "designate-kuttl-tests", "DESIGNATE_REPO": "https://github.com/openstack-k8s-operators/designate-operator.git", "DNSDATA": "config/samples/network_v1beta1_dnsdata.yaml", "DNSDATA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml", "DNSMASQ": "config/samples/network_v1beta1_dnsmasq.yaml", "DNSMASQ_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml", "DNS_DEPL_IMG": "unused", "DNS_DOMAIN": "localdomain", "DOWNLOAD_TOOLS_SELECTION": "all", "EDPM_ATTACH_EXTNET": "true", "EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES": "'[]'", "EDPM_COMPUTE_ADDITIONAL_NETWORKS": "'[]'", "EDPM_COMPUTE_CELLS": "1", "EDPM_COMPUTE_CEPH_ENABLED": "true", "EDPM_COMPUTE_CEPH_NOVA": "true", "EDPM_COMPUTE_DHCP_AGENT_ENABLED": "true", "EDPM_COMPUTE_SRIOV_ENABLED": "true", "EDPM_COMPUTE_SUFFIX": "0", "EDPM_CONFIGURE_DEFAULT_ROUTE": "true", "EDPM_CONFIGURE_HUGEPAGES": "false", "EDPM_CONFIGURE_NETWORKING": "true", "EDPM_FIRSTBOOT_EXTRA": "/tmp/edpm-firstboot-extra", "EDPM_NETWORKER_SUFFIX": "0", "EDPM_TOTAL_NETWORKERS": "1", "EDPM_TOTAL_NODES": "1", "GALERA_REPLICAS": "", "GENERATE_SSH_KEYS": "true", "GIT_CLONE_OPTS": "", "GLANCE": "config/samples/glance_v1beta1_glance.yaml", "GLANCEAPI_DEPL_IMG": "unused", "GLANCE_BRANCH": "main", "GLANCE_COMMIT_HASH": "", "GLANCE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml", "GLANCE_IMG": "quay.io/openstack-k8s-operators/glance-operator-index:latest", "GLANCE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml", "GLANCE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests", "GLANCE_KUTTL_NAMESPACE": "glance-kuttl-tests", "GLANCE_REPO": "https://github.com/openstack-k8s-operators/glance-operator.git", "HEAT": "config/samples/heat_v1beta1_heat.yaml", "HEATAPI_DEPL_IMG": "unused", "HEATCFNAPI_DEPL_IMG": "unused", "HEATENGINE_DEPL_IMG": "unused", "HEAT_AUTH_ENCRYPTION_KEY": "767c3ed056cbaa3b9dfedb8c6f825bf0", "HEAT_BRANCH": "main", "HEAT_COMMIT_HASH": "", "HEAT_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml", "HEAT_IMG": "quay.io/openstack-k8s-operators/heat-operator-index:latest", "HEAT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml", "HEAT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests", "HEAT_KUTTL_NAMESPACE": "heat-kuttl-tests", "HEAT_REPO": "https://github.com/openstack-k8s-operators/heat-operator.git", "HEAT_SERVICE_ENABLED": "true", "HORIZON": "config/samples/horizon_v1beta1_horizon.yaml", "HORIZON_BRANCH": "main", "HORIZON_COMMIT_HASH": "", "HORIZON_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml", "HORIZON_DEPL_IMG": "unused", "HORIZON_IMG": "quay.io/openstack-k8s-operators/horizon-operator-index:latest", "HORIZON_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml", "HORIZON_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests", "HORIZON_KUTTL_NAMESPACE": "horizon-kuttl-tests", "HORIZON_REPO": "https://github.com/openstack-k8s-operators/horizon-operator.git", "INFRA_BRANCH": "main", "INFRA_COMMIT_HASH": "", "INFRA_IMG": "quay.io/openstack-k8s-operators/infra-operator-index:latest", "INFRA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml", "INFRA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests", "INFRA_KUTTL_NAMESPACE": "infra-kuttl-tests", "INFRA_REPO": "https://github.com/openstack-k8s-operators/infra-operator.git", "INSTALL_CERT_MANAGER": false, "INSTALL_NMSTATE": "true || false", "INSTALL_NNCP": "true || false", "INTERNALAPI_HOST_ROUTES": "", "IPV6_LAB_IPV4_NETWORK_IPADDRESS": "172.30.0.1/24", "IPV6_LAB_IPV6_NETWORK_IPADDRESS": "fd00:abcd:abcd:fc00::1/64", "IPV6_LAB_LIBVIRT_STORAGE_POOL": "default", "IPV6_LAB_MANAGE_FIREWALLD": "true", "IPV6_LAB_NAT64_HOST_IPV4": "172.30.0.2/24", "IPV6_LAB_NAT64_HOST_IPV6": "fd00:abcd:abcd:fc00::2/64", "IPV6_LAB_NAT64_INSTANCE_NAME": "nat64-router", "IPV6_LAB_NAT64_IPV6_NETWORK": "fd00:abcd:abcd:fc00::/64", "IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL": "192.168.255.0/24", "IPV6_LAB_NAT64_TAYGA_IPV4": "192.168.255.1", "IPV6_LAB_NAT64_TAYGA_IPV6": "fd00:abcd:abcd:fc00::3", "IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX": "fd00:abcd:abcd:fcff::/96", "IPV6_LAB_NAT64_UPDATE_PACKAGES": "false", "IPV6_LAB_NETWORK_NAME": "nat64", "IPV6_LAB_SNO_CLUSTER_NETWORK": "fd00:abcd:0::/48", "IPV6_LAB_SNO_HOST_IP": "fd00:abcd:abcd:fc00::11", "IPV6_LAB_SNO_HOST_PREFIX": "64", "IPV6_LAB_SNO_INSTANCE_NAME": "sno", "IPV6_LAB_SNO_MACHINE_NETWORK": "fd00:abcd:abcd:fc00::/64", "IPV6_LAB_SNO_OCP_MIRROR_URL": "https://mirror.openshift.com/pub/openshift-v4/clients/ocp", "IPV6_LAB_SNO_OCP_VERSION": "latest-4.14", "IPV6_LAB_SNO_SERVICE_NETWORK": "fd00:abcd:abcd:fc03::/112", "IPV6_LAB_SSH_PUB_KEY": "/home/zuul/.ssh/id_rsa.pub", "IPV6_LAB_WORK_DIR": "/home/zuul/.ipv6lab", "IRONIC": "config/samples/ironic_v1beta1_ironic.yaml", "IRONICAPI_DEPL_IMG": "unused", "IRONICCON_DEPL_IMG": "unused", "IRONICINS_DEPL_IMG": "unused", "IRONICNAG_DEPL_IMG": "unused", "IRONICPXE_DEPL_IMG": "unused", "IRONIC_BRANCH": "main", "IRONIC_COMMIT_HASH": "", "IRONIC_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml", "IRONIC_IMAGE": "quay.io/metal3-io/ironic", "IRONIC_IMAGE_TAG": "release-24.1", "IRONIC_IMG": "quay.io/openstack-k8s-operators/ironic-operator-index:latest", "IRONIC_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml", "IRONIC_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests", "IRONIC_KUTTL_NAMESPACE": "ironic-kuttl-tests", "IRONIC_REPO": "https://github.com/openstack-k8s-operators/ironic-operator.git", "KEYSTONEAPI": "config/samples/keystone_v1beta1_keystoneapi.yaml", "KEYSTONEAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml", "KEYSTONEAPI_DEPL_IMG": "unused", "KEYSTONE_BRANCH": "main", "KEYSTONE_COMMIT_HASH": "", "KEYSTONE_FEDERATION_CLIENT_SECRET": "COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f", "KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE": "openstack", "KEYSTONE_IMG": "quay.io/openstack-k8s-operators/keystone-operator-index:latest", "KEYSTONE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml", "KEYSTONE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests", "KEYSTONE_KUTTL_NAMESPACE": "keystone-kuttl-tests", "KEYSTONE_REPO": "https://github.com/openstack-k8s-operators/keystone-operator.git", "KUBEADMIN_PWD": "12345678", "LIBVIRT_SECRET": "libvirt-secret", "LOKI_DEPLOY_MODE": "openshift-network", "LOKI_DEPLOY_NAMESPACE": "netobserv", "LOKI_DEPLOY_SIZE": "1x.demo", "LOKI_NAMESPACE": "openshift-operators-redhat", "LOKI_OPERATOR_GROUP": "openshift-operators-redhat-loki", "LOKI_SUBSCRIPTION": "loki-operator", "LVMS_CR": "1", "MANILA": "config/samples/manila_v1beta1_manila.yaml", "MANILAAPI_DEPL_IMG": "unused", "MANILASCH_DEPL_IMG": "unused", "MANILASHARE_DEPL_IMG": "unused", "MANILA_BRANCH": "main", "MANILA_COMMIT_HASH": "", "MANILA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml", "MANILA_IMG": "quay.io/openstack-k8s-operators/manila-operator-index:latest", "MANILA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml", "MANILA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests", "MANILA_KUTTL_NAMESPACE": "manila-kuttl-tests", "MANILA_REPO": "https://github.com/openstack-k8s-operators/manila-operator.git", "MANILA_SERVICE_ENABLED": "true", "MARIADB": "config/samples/mariadb_v1beta1_galera.yaml", "MARIADB_BRANCH": "main", "MARIADB_CHAINSAW_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml", "MARIADB_CHAINSAW_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests", "MARIADB_CHAINSAW_NAMESPACE": "mariadb-chainsaw-tests", "MARIADB_COMMIT_HASH": "", "MARIADB_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml", "MARIADB_DEPL_IMG": "unused", "MARIADB_IMG": "quay.io/openstack-k8s-operators/mariadb-operator-index:latest", "MARIADB_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml", "MARIADB_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests", "MARIADB_KUTTL_NAMESPACE": "mariadb-kuttl-tests", "MARIADB_REPO": "https://github.com/openstack-k8s-operators/mariadb-operator.git", "MEMCACHED": "config/samples/memcached_v1beta1_memcached.yaml", "MEMCACHED_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml", "MEMCACHED_DEPL_IMG": "unused", "METADATA_SHARED_SECRET": "1234567842", "METALLB_IPV6_POOL": "fd00:aaaa::80-fd00:aaaa::90", "METALLB_POOL": "192.168.122.80-192.168.122.90", "MICROSHIFT": "0", "NAMESPACE": "openstack", "NETCONFIG": "config/samples/network_v1beta1_netconfig.yaml", "NETCONFIG_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml", "NETCONFIG_DEPL_IMG": "unused", "NETOBSERV_DEPLOY_NAMESPACE": "netobserv", "NETOBSERV_NAMESPACE": "openshift-netobserv-operator", "NETOBSERV_OPERATOR_GROUP": "openshift-netobserv-operator-net", "NETOBSERV_SUBSCRIPTION": "netobserv-operator", "NETWORK_BGP": "false", "NETWORK_DESIGNATE_ADDRESS_PREFIX": "172.28.0", "NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX": "172.50.0", "NETWORK_INTERNALAPI_ADDRESS_PREFIX": "172.17.0", "NETWORK_ISOLATION": "true", "NETWORK_ISOLATION_INSTANCE_NAME": "crc", "NETWORK_ISOLATION_IPV4": "true", "NETWORK_ISOLATION_IPV4_ADDRESS": "172.16.1.1/24", "NETWORK_ISOLATION_IPV4_NAT": "true", "NETWORK_ISOLATION_IPV6": "false", "NETWORK_ISOLATION_IPV6_ADDRESS": "fd00:aaaa::1/64", "NETWORK_ISOLATION_IP_ADDRESS": "192.168.122.10", "NETWORK_ISOLATION_MAC": "52:54:00:11:11:10", "NETWORK_ISOLATION_NETWORK_NAME": "net-iso", "NETWORK_ISOLATION_NET_NAME": "default", "NETWORK_ISOLATION_USE_DEFAULT_NETWORK": "true", "NETWORK_MTU": "1500", "NETWORK_STORAGEMGMT_ADDRESS_PREFIX": "172.20.0", "NETWORK_STORAGE_ADDRESS_PREFIX": "172.18.0", "NETWORK_STORAGE_MACVLAN": "", "NETWORK_TENANT_ADDRESS_PREFIX": "172.19.0", "NETWORK_VLAN_START": "20", "NETWORK_VLAN_STEP": "1", "NEUTRONAPI": "config/samples/neutron_v1beta1_neutronapi.yaml", "NEUTRONAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml", "NEUTRONAPI_DEPL_IMG": "unused", "NEUTRON_BRANCH": "main", "NEUTRON_COMMIT_HASH": "", "NEUTRON_IMG": "quay.io/openstack-k8s-operators/neutron-operator-index:latest", "NEUTRON_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml", "NEUTRON_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests", "NEUTRON_KUTTL_NAMESPACE": "neutron-kuttl-tests", "NEUTRON_REPO": "https://github.com/openstack-k8s-operators/neutron-operator.git", "NFS_HOME": "/home/nfs", "NMSTATE_NAMESPACE": "openshift-nmstate", "NMSTATE_OPERATOR_GROUP": "openshift-nmstate-tn6k8", "NMSTATE_SUBSCRIPTION": "kubernetes-nmstate-operator", "NNCP_ADDITIONAL_HOST_ROUTES": "", "NNCP_BGP_1_INTERFACE": "enp7s0", "NNCP_BGP_1_IP_ADDRESS": "100.65.4.2", "NNCP_BGP_2_INTERFACE": "enp8s0", "NNCP_BGP_2_IP_ADDRESS": "100.64.4.2", "NNCP_BRIDGE": "ospbr", "NNCP_CLEANUP_TIMEOUT": "120s", "NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX": "fd00:aaaa::", "NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX": "10", "NNCP_CTLPLANE_IP_ADDRESS_PREFIX": "192.168.122", "NNCP_CTLPLANE_IP_ADDRESS_SUFFIX": "10", "NNCP_DNS_SERVER": "192.168.122.1", "NNCP_DNS_SERVER_IPV6": "fd00:aaaa::1", "NNCP_GATEWAY": "192.168.122.1", "NNCP_GATEWAY_IPV6": "fd00:aaaa::1", "NNCP_INTERFACE": "enp6s0", "NNCP_NODES": "", "NNCP_TIMEOUT": "240s", "NOVA": "config/samples/nova_v1beta1_nova_collapsed_cell.yaml", "NOVA_BRANCH": "main", "NOVA_COMMIT_HASH": "", "NOVA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml", "NOVA_IMG": "quay.io/openstack-k8s-operators/nova-operator-index:latest", "NOVA_REPO": "https://github.com/openstack-k8s-operators/nova-operator.git", "NUMBER_OF_INSTANCES": "1", "OCP_NETWORK_NAME": "crc", "OCTAVIA": "config/samples/octavia_v1beta1_octavia.yaml", "OCTAVIA_BRANCH": "main", "OCTAVIA_COMMIT_HASH": "", "OCTAVIA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml", "OCTAVIA_IMG": "quay.io/openstack-k8s-operators/octavia-operator-index:latest", "OCTAVIA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml", "OCTAVIA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests", "OCTAVIA_KUTTL_NAMESPACE": "octavia-kuttl-tests", "OCTAVIA_REPO": "https://github.com/openstack-k8s-operators/octavia-operator.git", "OKD": "false", "OPENSTACK_BRANCH": "main", "OPENSTACK_BUNDLE_IMG": "quay.io/openstack-k8s-operators/openstack-operator-bundle:latest", "OPENSTACK_COMMIT_HASH": "", "OPENSTACK_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml", "OPENSTACK_CRDS_DIR": "openstack_crds", "OPENSTACK_CTLPLANE": "config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml", "OPENSTACK_IMG": "quay.io/openstack-k8s-operators/openstack-operator-index:latest", "OPENSTACK_K8S_BRANCH": "main", "OPENSTACK_K8S_TAG": "latest", "OPENSTACK_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml", "OPENSTACK_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests", "OPENSTACK_KUTTL_NAMESPACE": "openstack-kuttl-tests", "OPENSTACK_NEUTRON_CUSTOM_CONF": "", "OPENSTACK_REPO": "https://github.com/openstack-k8s-operators/openstack-operator.git", "OPENSTACK_STORAGE_BUNDLE_IMG": "quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest", "OPERATOR_BASE_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator", "OPERATOR_CHANNEL": "", "OPERATOR_NAMESPACE": "openstack-operators", "OPERATOR_SOURCE": "", "OPERATOR_SOURCE_NAMESPACE": "", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "OVNCONTROLLER": "config/samples/ovn_v1beta1_ovncontroller.yaml", "OVNCONTROLLER_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml", "OVNCONTROLLER_NMAP": "true", "OVNDBS": "config/samples/ovn_v1beta1_ovndbcluster.yaml", "OVNDBS_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml", "OVNNORTHD": "config/samples/ovn_v1beta1_ovnnorthd.yaml", "OVNNORTHD_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml", "OVN_BRANCH": "main", "OVN_COMMIT_HASH": "", "OVN_IMG": "quay.io/openstack-k8s-operators/ovn-operator-index:latest", "OVN_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml", "OVN_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests", "OVN_KUTTL_NAMESPACE": "ovn-kuttl-tests", "OVN_REPO": "https://github.com/openstack-k8s-operators/ovn-operator.git", "PASSWORD": "12345678", "PLACEMENTAPI": "config/samples/placement_v1beta1_placementapi.yaml", "PLACEMENTAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml", "PLACEMENTAPI_DEPL_IMG": "unused", "PLACEMENT_BRANCH": "main", "PLACEMENT_COMMIT_HASH": "", "PLACEMENT_IMG": "quay.io/openstack-k8s-operators/placement-operator-index:latest", "PLACEMENT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml", "PLACEMENT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests", "PLACEMENT_KUTTL_NAMESPACE": "placement-kuttl-tests", "PLACEMENT_REPO": "https://github.com/openstack-k8s-operators/placement-operator.git", "PULL_SECRET": "/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt", "RABBITMQ": "docs/examples/default-security-context/rabbitmq.yaml", "RABBITMQ_BRANCH": "patches", "RABBITMQ_COMMIT_HASH": "", "RABBITMQ_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml", "RABBITMQ_DEPL_IMG": "unused", "RABBITMQ_IMG": "quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest", "RABBITMQ_REPO": "https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git", "REDHAT_OPERATORS": "false", "REDIS": "config/samples/redis_v1beta1_redis.yaml", "REDIS_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml", "REDIS_DEPL_IMG": "unused", "RH_REGISTRY_PWD": "", "RH_REGISTRY_USER": "", "SECRET": "osp-secret", "SG_CORE_DEPL_IMG": "unused", "STANDALONE_COMPUTE_DRIVER": "libvirt", "STANDALONE_EXTERNAL_NET_PREFFIX": "172.21.0", "STANDALONE_INTERNALAPI_NET_PREFIX": "172.17.0", "STANDALONE_STORAGEMGMT_NET_PREFIX": "172.20.0", "STANDALONE_STORAGE_NET_PREFIX": "172.18.0", "STANDALONE_TENANT_NET_PREFIX": "172.19.0", "STORAGEMGMT_HOST_ROUTES": "", "STORAGE_CLASS": "local-storage", "STORAGE_HOST_ROUTES": "", "SWIFT": "config/samples/swift_v1beta1_swift.yaml", "SWIFT_BRANCH": "main", "SWIFT_COMMIT_HASH": "", "SWIFT_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml", "SWIFT_IMG": "quay.io/openstack-k8s-operators/swift-operator-index:latest", "SWIFT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml", "SWIFT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests", "SWIFT_KUTTL_NAMESPACE": "swift-kuttl-tests", "SWIFT_REPO": "https://github.com/openstack-k8s-operators/swift-operator.git", "TELEMETRY": "config/samples/telemetry_v1beta1_telemetry.yaml", "TELEMETRY_BRANCH": "main", "TELEMETRY_COMMIT_HASH": "", "TELEMETRY_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml", "TELEMETRY_IMG": "quay.io/openstack-k8s-operators/telemetry-operator-index:latest", "TELEMETRY_KUTTL_BASEDIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator", "TELEMETRY_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml", "TELEMETRY_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites", "TELEMETRY_KUTTL_NAMESPACE": "telemetry-kuttl-tests", "TELEMETRY_KUTTL_RELPATH": "test/kuttl/suites", "TELEMETRY_REPO": "https://github.com/openstack-k8s-operators/telemetry-operator.git", "TENANT_HOST_ROUTES": "", "TIMEOUT": "300s", "TLS_ENABLED": "false", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator", "tripleo_deploy": "export REGISTRY_PWD:" }, "cifmw_install_yamls_environment": { "BMO_SETUP": false, "CHECKOUT_FROM_OPENSTACK_REF": "true", "INSTALL_CERT_MANAGER": false, "KUBECONFIG": "/home/zuul/.crc/machines/crc/kubeconfig", "OPENSTACK_K8S_BRANCH": "main", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" }, "cifmw_openshift_api": "https://api.crc.testing:6443", "cifmw_openshift_context": "default/api-crc-testing:6443/kubeadmin", "cifmw_openshift_kubeconfig": "/home/zuul/.crc/machines/crc/kubeconfig", "cifmw_openshift_login_api": "https://api.crc.testing:6443", "cifmw_openshift_login_cert_login": false, "cifmw_openshift_login_context": "default/api-crc-testing:6443/kubeadmin", "cifmw_openshift_login_kubeconfig": "/home/zuul/.crc/machines/crc/kubeconfig", "cifmw_openshift_login_password": 123456789, "cifmw_openshift_login_token": "sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs", "cifmw_openshift_login_user": "kubeadmin", "cifmw_openshift_token": "sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs", "cifmw_openshift_user": "kubeadmin", "cifmw_path": "/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "cifmw_repo_setup_commit_hash": null, "cifmw_repo_setup_distro_hash": null, "cifmw_repo_setup_dlrn_api_url": "https://trunk.rdoproject.org/api-centos9-antelope", "cifmw_repo_setup_dlrn_url": "https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5", "cifmw_repo_setup_extended_hash": null, "cifmw_repo_setup_full_hash": "c3923531bcda0b0811b2d5053f189beb", "cifmw_repo_setup_release": "antelope", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "min" ], "module_setup": true, "packages": { "NetworkManager": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-libnm": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-libnm", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-team": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-team", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-tui": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-tui", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "aardvark-dns": [ { "arch": "x86_64", "epoch": 2, "name": "aardvark-dns", "release": "1.el9", "source": "rpm", "version": "1.17.0" } ], "abattis-cantarell-fonts": [ { "arch": "noarch", "epoch": null, "name": "abattis-cantarell-fonts", "release": "4.el9", "source": "rpm", "version": "0.301" } ], "acl": [ { "arch": "x86_64", "epoch": null, "name": "acl", "release": "4.el9", "source": "rpm", "version": "2.3.1" } ], "adobe-source-code-pro-fonts": [ { "arch": "noarch", "epoch": null, "name": "adobe-source-code-pro-fonts", "release": "12.el9.1", "source": "rpm", "version": "2.030.1.050" } ], "alternatives": [ { "arch": "x86_64", "epoch": null, "name": "alternatives", "release": "2.el9", "source": "rpm", "version": "1.24" } ], "annobin": [ { "arch": "x86_64", "epoch": null, "name": "annobin", "release": "1.el9", "source": "rpm", "version": "12.98" } ], "ansible-core": [ { "arch": "x86_64", "epoch": 1, "name": "ansible-core", "release": "2.el9", "source": "rpm", "version": "2.14.18" } ], "apr": [ { "arch": "x86_64", "epoch": null, "name": "apr", "release": "12.el9", "source": "rpm", "version": "1.7.0" } ], "apr-util": [ { "arch": "x86_64", "epoch": null, "name": "apr-util", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "apr-util-bdb": [ { "arch": "x86_64", "epoch": null, "name": "apr-util-bdb", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "apr-util-openssl": [ { "arch": "x86_64", "epoch": null, "name": "apr-util-openssl", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "attr": [ { "arch": "x86_64", "epoch": null, "name": "attr", "release": "3.el9", "source": "rpm", "version": "2.5.1" } ], "audit": [ { "arch": "x86_64", "epoch": null, "name": "audit", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "audit-libs": [ { "arch": "x86_64", "epoch": null, "name": "audit-libs", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "authselect": [ { "arch": "x86_64", "epoch": null, "name": "authselect", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "authselect-compat": [ { "arch": "x86_64", "epoch": null, "name": "authselect-compat", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "authselect-libs": [ { "arch": "x86_64", "epoch": null, "name": "authselect-libs", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "basesystem": [ { "arch": "noarch", "epoch": null, "name": "basesystem", "release": "13.el9", "source": "rpm", "version": "11" } ], "bash": [ { "arch": "x86_64", "epoch": null, "name": "bash", "release": "9.el9", "source": "rpm", "version": "5.1.8" } ], "bash-completion": [ { "arch": "noarch", "epoch": 1, "name": "bash-completion", "release": "5.el9", "source": "rpm", "version": "2.11" } ], "binutils": [ { "arch": "x86_64", "epoch": null, "name": "binutils", "release": "69.el9", "source": "rpm", "version": "2.35.2" } ], "binutils-gold": [ { "arch": "x86_64", "epoch": null, "name": "binutils-gold", "release": "69.el9", "source": "rpm", "version": "2.35.2" } ], "buildah": [ { "arch": "x86_64", "epoch": 2, "name": "buildah", "release": "1.el9", "source": "rpm", "version": "1.41.3" } ], "bzip2": [ { "arch": "x86_64", "epoch": null, "name": "bzip2", "release": "10.el9", "source": "rpm", "version": "1.0.8" } ], "bzip2-libs": [ { "arch": "x86_64", "epoch": null, "name": "bzip2-libs", "release": "10.el9", "source": "rpm", "version": "1.0.8" } ], "c-ares": [ { "arch": "x86_64", "epoch": null, "name": "c-ares", "release": "2.el9", "source": "rpm", "version": "1.19.1" } ], "ca-certificates": [ { "arch": "noarch", "epoch": null, "name": "ca-certificates", "release": "91.el9", "source": "rpm", "version": "2025.2.80_v9.0.305" } ], "centos-gpg-keys": [ { "arch": "noarch", "epoch": null, "name": "centos-gpg-keys", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "centos-logos": [ { "arch": "x86_64", "epoch": null, "name": "centos-logos", "release": "1.el9", "source": "rpm", "version": "90.9" } ], "centos-stream-release": [ { "arch": "noarch", "epoch": null, "name": "centos-stream-release", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "centos-stream-repos": [ { "arch": "noarch", "epoch": null, "name": "centos-stream-repos", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "checkpolicy": [ { "arch": "x86_64", "epoch": null, "name": "checkpolicy", "release": "1.el9", "source": "rpm", "version": "3.6" } ], "chrony": [ { "arch": "x86_64", "epoch": null, "name": "chrony", "release": "1.el9", "source": "rpm", "version": "4.8" } ], "cloud-init": [ { "arch": "noarch", "epoch": null, "name": "cloud-init", "release": "8.el9", "source": "rpm", "version": "24.4" } ], "cloud-utils-growpart": [ { "arch": "x86_64", "epoch": null, "name": "cloud-utils-growpart", "release": "1.el9", "source": "rpm", "version": "0.33" } ], "cmake-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "cmake-filesystem", "release": "3.el9", "source": "rpm", "version": "3.31.8" } ], "cockpit-bridge": [ { "arch": "noarch", "epoch": null, "name": "cockpit-bridge", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-system": [ { "arch": "noarch", "epoch": null, "name": "cockpit-system", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-ws": [ { "arch": "x86_64", "epoch": null, "name": "cockpit-ws", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-ws-selinux": [ { "arch": "x86_64", "epoch": null, "name": "cockpit-ws-selinux", "release": "1.el9", "source": "rpm", "version": "348" } ], "conmon": [ { "arch": "x86_64", "epoch": 3, "name": "conmon", "release": "1.el9", "source": "rpm", "version": "2.1.13" } ], "container-selinux": [ { "arch": "noarch", "epoch": 4, "name": "container-selinux", "release": "1.el9", "source": "rpm", "version": "2.244.0" } ], "containers-common": [ { "arch": "x86_64", "epoch": 4, "name": "containers-common", "release": "134.el9", "source": "rpm", "version": "1" } ], "containers-common-extra": [ { "arch": "x86_64", "epoch": 4, "name": "containers-common-extra", "release": "134.el9", "source": "rpm", "version": "1" } ], "coreutils": [ { "arch": "x86_64", "epoch": null, "name": "coreutils", "release": "39.el9", "source": "rpm", "version": "8.32" } ], "coreutils-common": [ { "arch": "x86_64", "epoch": null, "name": "coreutils-common", "release": "39.el9", "source": "rpm", "version": "8.32" } ], "cpio": [ { "arch": "x86_64", "epoch": null, "name": "cpio", "release": "16.el9", "source": "rpm", "version": "2.13" } ], "cpp": [ { "arch": "x86_64", "epoch": null, "name": "cpp", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "cracklib": [ { "arch": "x86_64", "epoch": null, "name": "cracklib", "release": "28.el9", "source": "rpm", "version": "2.9.6" } ], "cracklib-dicts": [ { "arch": "x86_64", "epoch": null, "name": "cracklib-dicts", "release": "28.el9", "source": "rpm", "version": "2.9.6" } ], "createrepo_c": [ { "arch": "x86_64", "epoch": null, "name": "createrepo_c", "release": "4.el9", "source": "rpm", "version": "0.20.1" } ], "createrepo_c-libs": [ { "arch": "x86_64", "epoch": null, "name": "createrepo_c-libs", "release": "4.el9", "source": "rpm", "version": "0.20.1" } ], "criu": [ { "arch": "x86_64", "epoch": null, "name": "criu", "release": "3.el9", "source": "rpm", "version": "3.19" } ], "criu-libs": [ { "arch": "x86_64", "epoch": null, "name": "criu-libs", "release": "3.el9", "source": "rpm", "version": "3.19" } ], "cronie": [ { "arch": "x86_64", "epoch": null, "name": "cronie", "release": "14.el9", "source": "rpm", "version": "1.5.7" } ], "cronie-anacron": [ { "arch": "x86_64", "epoch": null, "name": "cronie-anacron", "release": "14.el9", "source": "rpm", "version": "1.5.7" } ], "crontabs": [ { "arch": "noarch", "epoch": null, "name": "crontabs", "release": "26.20190603git.el9", "source": "rpm", "version": "1.11" } ], "crun": [ { "arch": "x86_64", "epoch": null, "name": "crun", "release": "1.el9", "source": "rpm", "version": "1.24" } ], "crypto-policies": [ { "arch": "noarch", "epoch": null, "name": "crypto-policies", "release": "1.gite9c4db2.el9", "source": "rpm", "version": "20251126" } ], "crypto-policies-scripts": [ { "arch": "noarch", "epoch": null, "name": "crypto-policies-scripts", "release": "1.gite9c4db2.el9", "source": "rpm", "version": "20251126" } ], "cryptsetup-libs": [ { "arch": "x86_64", "epoch": null, "name": "cryptsetup-libs", "release": "2.el9", "source": "rpm", "version": "2.8.1" } ], "curl": [ { "arch": "x86_64", "epoch": null, "name": "curl", "release": "38.el9", "source": "rpm", "version": "7.76.1" } ], "cyrus-sasl": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-devel": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-devel", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-gssapi": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-gssapi", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-lib": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-lib", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "dbus": [ { "arch": "x86_64", "epoch": 1, "name": "dbus", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-broker": [ { "arch": "x86_64", "epoch": null, "name": "dbus-broker", "release": "7.el9", "source": "rpm", "version": "28" } ], "dbus-common": [ { "arch": "noarch", "epoch": 1, "name": "dbus-common", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-libs": [ { "arch": "x86_64", "epoch": 1, "name": "dbus-libs", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-tools": [ { "arch": "x86_64", "epoch": 1, "name": "dbus-tools", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "debugedit": [ { "arch": "x86_64", "epoch": null, "name": "debugedit", "release": "11.el9", "source": "rpm", "version": "5.0" } ], "dejavu-sans-fonts": [ { "arch": "noarch", "epoch": null, "name": "dejavu-sans-fonts", "release": "18.el9", "source": "rpm", "version": "2.37" } ], "desktop-file-utils": [ { "arch": "x86_64", "epoch": null, "name": "desktop-file-utils", "release": "6.el9", "source": "rpm", "version": "0.26" } ], "device-mapper": [ { "arch": "x86_64", "epoch": 9, "name": "device-mapper", "release": "2.el9", "source": "rpm", "version": "1.02.206" } ], "device-mapper-libs": [ { "arch": "x86_64", "epoch": 9, "name": "device-mapper-libs", "release": "2.el9", "source": "rpm", "version": "1.02.206" } ], "dhcp-client": [ { "arch": "x86_64", "epoch": 12, "name": "dhcp-client", "release": "19.b1.el9", "source": "rpm", "version": "4.4.2" } ], "dhcp-common": [ { "arch": "noarch", "epoch": 12, "name": "dhcp-common", "release": "19.b1.el9", "source": "rpm", "version": "4.4.2" } ], "diffutils": [ { "arch": "x86_64", "epoch": null, "name": "diffutils", "release": "12.el9", "source": "rpm", "version": "3.7" } ], "dnf": [ { "arch": "noarch", "epoch": null, "name": "dnf", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "dnf-data": [ { "arch": "noarch", "epoch": null, "name": "dnf-data", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "dnf-plugins-core": [ { "arch": "noarch", "epoch": null, "name": "dnf-plugins-core", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "dracut": [ { "arch": "x86_64", "epoch": null, "name": "dracut", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-config-generic": [ { "arch": "x86_64", "epoch": null, "name": "dracut-config-generic", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-network": [ { "arch": "x86_64", "epoch": null, "name": "dracut-network", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-squash": [ { "arch": "x86_64", "epoch": null, "name": "dracut-squash", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dwz": [ { "arch": "x86_64", "epoch": null, "name": "dwz", "release": "1.el9", "source": "rpm", "version": "0.16" } ], "e2fsprogs": [ { "arch": "x86_64", "epoch": null, "name": "e2fsprogs", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "e2fsprogs-libs": [ { "arch": "x86_64", "epoch": null, "name": "e2fsprogs-libs", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "ed": [ { "arch": "x86_64", "epoch": null, "name": "ed", "release": "12.el9", "source": "rpm", "version": "1.14.2" } ], "efi-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "efi-srpm-macros", "release": "4.el9", "source": "rpm", "version": "6" } ], "elfutils": [ { "arch": "x86_64", "epoch": null, "name": "elfutils", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-debuginfod-client": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-debuginfod-client", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-default-yama-scope": [ { "arch": "noarch", "epoch": null, "name": "elfutils-default-yama-scope", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-libelf": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-libelf", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-libs", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "emacs-filesystem": [ { "arch": "noarch", "epoch": 1, "name": "emacs-filesystem", "release": "18.el9", "source": "rpm", "version": "27.2" } ], "enchant": [ { "arch": "x86_64", "epoch": 1, "name": "enchant", "release": "30.el9", "source": "rpm", "version": "1.6.0" } ], "ethtool": [ { "arch": "x86_64", "epoch": 2, "name": "ethtool", "release": "2.el9", "source": "rpm", "version": "6.15" } ], "expat": [ { "arch": "x86_64", "epoch": null, "name": "expat", "release": "6.el9", "source": "rpm", "version": "2.5.0" } ], "expect": [ { "arch": "x86_64", "epoch": null, "name": "expect", "release": "16.el9", "source": "rpm", "version": "5.45.4" } ], "file": [ { "arch": "x86_64", "epoch": null, "name": "file", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "file-libs": [ { "arch": "x86_64", "epoch": null, "name": "file-libs", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "filesystem": [ { "arch": "x86_64", "epoch": null, "name": "filesystem", "release": "5.el9", "source": "rpm", "version": "3.16" } ], "findutils": [ { "arch": "x86_64", "epoch": 1, "name": "findutils", "release": "7.el9", "source": "rpm", "version": "4.8.0" } ], "fonts-filesystem": [ { "arch": "noarch", "epoch": 1, "name": "fonts-filesystem", "release": "7.el9.1", "source": "rpm", "version": "2.0.5" } ], "fonts-srpm-macros": [ { "arch": "noarch", "epoch": 1, "name": "fonts-srpm-macros", "release": "7.el9.1", "source": "rpm", "version": "2.0.5" } ], "fuse-common": [ { "arch": "x86_64", "epoch": null, "name": "fuse-common", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "fuse-libs": [ { "arch": "x86_64", "epoch": null, "name": "fuse-libs", "release": "17.el9", "source": "rpm", "version": "2.9.9" } ], "fuse-overlayfs": [ { "arch": "x86_64", "epoch": null, "name": "fuse-overlayfs", "release": "1.el9", "source": "rpm", "version": "1.16" } ], "fuse3": [ { "arch": "x86_64", "epoch": null, "name": "fuse3", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "fuse3-libs": [ { "arch": "x86_64", "epoch": null, "name": "fuse3-libs", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "gawk": [ { "arch": "x86_64", "epoch": null, "name": "gawk", "release": "6.el9", "source": "rpm", "version": "5.1.0" } ], "gawk-all-langpacks": [ { "arch": "x86_64", "epoch": null, "name": "gawk-all-langpacks", "release": "6.el9", "source": "rpm", "version": "5.1.0" } ], "gcc": [ { "arch": "x86_64", "epoch": null, "name": "gcc", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gcc-c++": [ { "arch": "x86_64", "epoch": null, "name": "gcc-c++", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gcc-plugin-annobin": [ { "arch": "x86_64", "epoch": null, "name": "gcc-plugin-annobin", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gdb-minimal": [ { "arch": "x86_64", "epoch": null, "name": "gdb-minimal", "release": "2.el9", "source": "rpm", "version": "16.3" } ], "gdbm-libs": [ { "arch": "x86_64", "epoch": 1, "name": "gdbm-libs", "release": "1.el9", "source": "rpm", "version": "1.23" } ], "gdisk": [ { "arch": "x86_64", "epoch": null, "name": "gdisk", "release": "5.el9", "source": "rpm", "version": "1.0.7" } ], "gdk-pixbuf2": [ { "arch": "x86_64", "epoch": null, "name": "gdk-pixbuf2", "release": "6.el9", "source": "rpm", "version": "2.42.6" } ], "geolite2-city": [ { "arch": "noarch", "epoch": null, "name": "geolite2-city", "release": "6.el9", "source": "rpm", "version": "20191217" } ], "geolite2-country": [ { "arch": "noarch", "epoch": null, "name": "geolite2-country", "release": "6.el9", "source": "rpm", "version": "20191217" } ], "gettext": [ { "arch": "x86_64", "epoch": null, "name": "gettext", "release": "8.el9", "source": "rpm", "version": "0.21" } ], "gettext-libs": [ { "arch": "x86_64", "epoch": null, "name": "gettext-libs", "release": "8.el9", "source": "rpm", "version": "0.21" } ], "ghc-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "ghc-srpm-macros", "release": "6.el9", "source": "rpm", "version": "1.5.0" } ], "git": [ { "arch": "x86_64", "epoch": null, "name": "git", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "git-core": [ { "arch": "x86_64", "epoch": null, "name": "git-core", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "git-core-doc": [ { "arch": "noarch", "epoch": null, "name": "git-core-doc", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "glib-networking": [ { "arch": "x86_64", "epoch": null, "name": "glib-networking", "release": "3.el9", "source": "rpm", "version": "2.68.3" } ], "glib2": [ { "arch": "x86_64", "epoch": null, "name": "glib2", "release": "18.el9", "source": "rpm", "version": "2.68.4" } ], "glibc": [ { "arch": "x86_64", "epoch": null, "name": "glibc", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-common": [ { "arch": "x86_64", "epoch": null, "name": "glibc-common", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-devel": [ { "arch": "x86_64", "epoch": null, "name": "glibc-devel", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-gconv-extra": [ { "arch": "x86_64", "epoch": null, "name": "glibc-gconv-extra", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-headers": [ { "arch": "x86_64", "epoch": null, "name": "glibc-headers", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-langpack-en": [ { "arch": "x86_64", "epoch": null, "name": "glibc-langpack-en", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "gmp": [ { "arch": "x86_64", "epoch": 1, "name": "gmp", "release": "13.el9", "source": "rpm", "version": "6.2.0" } ], "gnupg2": [ { "arch": "x86_64", "epoch": null, "name": "gnupg2", "release": "5.el9", "source": "rpm", "version": "2.3.3" } ], "gnutls": [ { "arch": "x86_64", "epoch": null, "name": "gnutls", "release": "2.el9", "source": "rpm", "version": "3.8.10" } ], "go-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "go-srpm-macros", "release": "1.el9", "source": "rpm", "version": "3.8.1" } ], "gobject-introspection": [ { "arch": "x86_64", "epoch": null, "name": "gobject-introspection", "release": "11.el9", "source": "rpm", "version": "1.68.0" } ], "gpg-pubkey": [ { "arch": null, "epoch": null, "name": "gpg-pubkey", "release": "5ccc5b19", "source": "rpm", "version": "8483c65d" } ], "gpgme": [ { "arch": "x86_64", "epoch": null, "name": "gpgme", "release": "6.el9", "source": "rpm", "version": "1.15.1" } ], "grep": [ { "arch": "x86_64", "epoch": null, "name": "grep", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "groff-base": [ { "arch": "x86_64", "epoch": null, "name": "groff-base", "release": "10.el9", "source": "rpm", "version": "1.22.4" } ], "grub2-common": [ { "arch": "noarch", "epoch": 1, "name": "grub2-common", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-pc": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-pc", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-pc-modules": [ { "arch": "noarch", "epoch": 1, "name": "grub2-pc-modules", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-tools": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-tools", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-tools-minimal": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-tools-minimal", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grubby": [ { "arch": "x86_64", "epoch": null, "name": "grubby", "release": "69.el9", "source": "rpm", "version": "8.40" } ], "gsettings-desktop-schemas": [ { "arch": "x86_64", "epoch": null, "name": "gsettings-desktop-schemas", "release": "8.el9", "source": "rpm", "version": "40.0" } ], "gssproxy": [ { "arch": "x86_64", "epoch": null, "name": "gssproxy", "release": "7.el9", "source": "rpm", "version": "0.8.4" } ], "gzip": [ { "arch": "x86_64", "epoch": null, "name": "gzip", "release": "1.el9", "source": "rpm", "version": "1.12" } ], "hostname": [ { "arch": "x86_64", "epoch": null, "name": "hostname", "release": "6.el9", "source": "rpm", "version": "3.23" } ], "httpd-tools": [ { "arch": "x86_64", "epoch": null, "name": "httpd-tools", "release": "10.el9", "source": "rpm", "version": "2.4.62" } ], "hunspell": [ { "arch": "x86_64", "epoch": null, "name": "hunspell", "release": "11.el9", "source": "rpm", "version": "1.7.0" } ], "hunspell-en-GB": [ { "arch": "noarch", "epoch": null, "name": "hunspell-en-GB", "release": "20.el9", "source": "rpm", "version": "0.20140811.1" } ], "hunspell-en-US": [ { "arch": "noarch", "epoch": null, "name": "hunspell-en-US", "release": "20.el9", "source": "rpm", "version": "0.20140811.1" } ], "hunspell-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "hunspell-filesystem", "release": "11.el9", "source": "rpm", "version": "1.7.0" } ], "hwdata": [ { "arch": "noarch", "epoch": null, "name": "hwdata", "release": "9.20.el9", "source": "rpm", "version": "0.348" } ], "ima-evm-utils": [ { "arch": "x86_64", "epoch": null, "name": "ima-evm-utils", "release": "2.el9", "source": "rpm", "version": "1.6.2" } ], "info": [ { "arch": "x86_64", "epoch": null, "name": "info", "release": "15.el9", "source": "rpm", "version": "6.7" } ], "inih": [ { "arch": "x86_64", "epoch": null, "name": "inih", "release": "6.el9", "source": "rpm", "version": "49" } ], "initscripts-rename-device": [ { "arch": "x86_64", "epoch": null, "name": "initscripts-rename-device", "release": "4.el9", "source": "rpm", "version": "10.11.8" } ], "initscripts-service": [ { "arch": "noarch", "epoch": null, "name": "initscripts-service", "release": "4.el9", "source": "rpm", "version": "10.11.8" } ], "ipcalc": [ { "arch": "x86_64", "epoch": null, "name": "ipcalc", "release": "5.el9", "source": "rpm", "version": "1.0.0" } ], "iproute": [ { "arch": "x86_64", "epoch": null, "name": "iproute", "release": "1.el9", "source": "rpm", "version": "6.17.0" } ], "iproute-tc": [ { "arch": "x86_64", "epoch": null, "name": "iproute-tc", "release": "1.el9", "source": "rpm", "version": "6.17.0" } ], "iptables-libs": [ { "arch": "x86_64", "epoch": null, "name": "iptables-libs", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iptables-nft": [ { "arch": "x86_64", "epoch": null, "name": "iptables-nft", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iptables-nft-services": [ { "arch": "noarch", "epoch": null, "name": "iptables-nft-services", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iputils": [ { "arch": "x86_64", "epoch": null, "name": "iputils", "release": "15.el9", "source": "rpm", "version": "20210202" } ], "irqbalance": [ { "arch": "x86_64", "epoch": 2, "name": "irqbalance", "release": "5.el9", "source": "rpm", "version": "1.9.4" } ], "jansson": [ { "arch": "x86_64", "epoch": null, "name": "jansson", "release": "1.el9", "source": "rpm", "version": "2.14" } ], "jq": [ { "arch": "x86_64", "epoch": null, "name": "jq", "release": "19.el9", "source": "rpm", "version": "1.6" } ], "json-c": [ { "arch": "x86_64", "epoch": null, "name": "json-c", "release": "11.el9", "source": "rpm", "version": "0.14" } ], "json-glib": [ { "arch": "x86_64", "epoch": null, "name": "json-glib", "release": "1.el9", "source": "rpm", "version": "1.6.6" } ], "kbd": [ { "arch": "x86_64", "epoch": null, "name": "kbd", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kbd-legacy": [ { "arch": "noarch", "epoch": null, "name": "kbd-legacy", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kbd-misc": [ { "arch": "noarch", "epoch": null, "name": "kbd-misc", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kernel": [ { "arch": "x86_64", "epoch": null, "name": "kernel", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-core": [ { "arch": "x86_64", "epoch": null, "name": "kernel-core", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-headers": [ { "arch": "x86_64", "epoch": null, "name": "kernel-headers", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-modules": [ { "arch": "x86_64", "epoch": null, "name": "kernel-modules", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-modules-core": [ { "arch": "x86_64", "epoch": null, "name": "kernel-modules-core", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "kernel-srpm-macros", "release": "14.el9", "source": "rpm", "version": "1.0" } ], "kernel-tools": [ { "arch": "x86_64", "epoch": null, "name": "kernel-tools", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-tools-libs": [ { "arch": "x86_64", "epoch": null, "name": "kernel-tools-libs", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kexec-tools": [ { "arch": "x86_64", "epoch": null, "name": "kexec-tools", "release": "14.el9", "source": "rpm", "version": "2.0.29" } ], "keyutils": [ { "arch": "x86_64", "epoch": null, "name": "keyutils", "release": "1.el9", "source": "rpm", "version": "1.6.3" } ], "keyutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "keyutils-libs", "release": "1.el9", "source": "rpm", "version": "1.6.3" } ], "kmod": [ { "arch": "x86_64", "epoch": null, "name": "kmod", "release": "11.el9", "source": "rpm", "version": "28" } ], "kmod-libs": [ { "arch": "x86_64", "epoch": null, "name": "kmod-libs", "release": "11.el9", "source": "rpm", "version": "28" } ], "kpartx": [ { "arch": "x86_64", "epoch": null, "name": "kpartx", "release": "42.el9", "source": "rpm", "version": "0.8.7" } ], "krb5-libs": [ { "arch": "x86_64", "epoch": null, "name": "krb5-libs", "release": "8.el9", "source": "rpm", "version": "1.21.1" } ], "langpacks-core-en_GB": [ { "arch": "noarch", "epoch": null, "name": "langpacks-core-en_GB", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "langpacks-core-font-en": [ { "arch": "noarch", "epoch": null, "name": "langpacks-core-font-en", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "langpacks-en_GB": [ { "arch": "noarch", "epoch": null, "name": "langpacks-en_GB", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "less": [ { "arch": "x86_64", "epoch": null, "name": "less", "release": "6.el9", "source": "rpm", "version": "590" } ], "libacl": [ { "arch": "x86_64", "epoch": null, "name": "libacl", "release": "4.el9", "source": "rpm", "version": "2.3.1" } ], "libappstream-glib": [ { "arch": "x86_64", "epoch": null, "name": "libappstream-glib", "release": "5.el9", "source": "rpm", "version": "0.7.18" } ], "libarchive": [ { "arch": "x86_64", "epoch": null, "name": "libarchive", "release": "6.el9", "source": "rpm", "version": "3.5.3" } ], "libassuan": [ { "arch": "x86_64", "epoch": null, "name": "libassuan", "release": "3.el9", "source": "rpm", "version": "2.5.5" } ], "libattr": [ { "arch": "x86_64", "epoch": null, "name": "libattr", "release": "3.el9", "source": "rpm", "version": "2.5.1" } ], "libbasicobjects": [ { "arch": "x86_64", "epoch": null, "name": "libbasicobjects", "release": "53.el9", "source": "rpm", "version": "0.1.1" } ], "libblkid": [ { "arch": "x86_64", "epoch": null, "name": "libblkid", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libbpf": [ { "arch": "x86_64", "epoch": 2, "name": "libbpf", "release": "3.el9", "source": "rpm", "version": "1.5.0" } ], "libbrotli": [ { "arch": "x86_64", "epoch": null, "name": "libbrotli", "release": "7.el9", "source": "rpm", "version": "1.0.9" } ], "libburn": [ { "arch": "x86_64", "epoch": null, "name": "libburn", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "libcap": [ { "arch": "x86_64", "epoch": null, "name": "libcap", "release": "10.el9", "source": "rpm", "version": "2.48" } ], "libcap-ng": [ { "arch": "x86_64", "epoch": null, "name": "libcap-ng", "release": "7.el9", "source": "rpm", "version": "0.8.2" } ], "libcbor": [ { "arch": "x86_64", "epoch": null, "name": "libcbor", "release": "5.el9", "source": "rpm", "version": "0.7.0" } ], "libcollection": [ { "arch": "x86_64", "epoch": null, "name": "libcollection", "release": "53.el9", "source": "rpm", "version": "0.7.0" } ], "libcom_err": [ { "arch": "x86_64", "epoch": null, "name": "libcom_err", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "libcomps": [ { "arch": "x86_64", "epoch": null, "name": "libcomps", "release": "1.el9", "source": "rpm", "version": "0.1.18" } ], "libcurl": [ { "arch": "x86_64", "epoch": null, "name": "libcurl", "release": "38.el9", "source": "rpm", "version": "7.76.1" } ], "libdaemon": [ { "arch": "x86_64", "epoch": null, "name": "libdaemon", "release": "23.el9", "source": "rpm", "version": "0.14" } ], "libdb": [ { "arch": "x86_64", "epoch": null, "name": "libdb", "release": "57.el9", "source": "rpm", "version": "5.3.28" } ], "libdhash": [ { "arch": "x86_64", "epoch": null, "name": "libdhash", "release": "53.el9", "source": "rpm", "version": "0.5.0" } ], "libdnf": [ { "arch": "x86_64", "epoch": null, "name": "libdnf", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "libeconf": [ { "arch": "x86_64", "epoch": null, "name": "libeconf", "release": "5.el9", "source": "rpm", "version": "0.4.1" } ], "libedit": [ { "arch": "x86_64", "epoch": null, "name": "libedit", "release": "38.20210216cvs.el9", "source": "rpm", "version": "3.1" } ], "libestr": [ { "arch": "x86_64", "epoch": null, "name": "libestr", "release": "4.el9", "source": "rpm", "version": "0.1.11" } ], "libev": [ { "arch": "x86_64", "epoch": null, "name": "libev", "release": "6.el9", "source": "rpm", "version": "4.33" } ], "libevent": [ { "arch": "x86_64", "epoch": null, "name": "libevent", "release": "8.el9", "source": "rpm", "version": "2.1.12" } ], "libfastjson": [ { "arch": "x86_64", "epoch": null, "name": "libfastjson", "release": "5.el9", "source": "rpm", "version": "0.99.9" } ], "libfdisk": [ { "arch": "x86_64", "epoch": null, "name": "libfdisk", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libffi": [ { "arch": "x86_64", "epoch": null, "name": "libffi", "release": "8.el9", "source": "rpm", "version": "3.4.2" } ], "libffi-devel": [ { "arch": "x86_64", "epoch": null, "name": "libffi-devel", "release": "8.el9", "source": "rpm", "version": "3.4.2" } ], "libfido2": [ { "arch": "x86_64", "epoch": null, "name": "libfido2", "release": "2.el9", "source": "rpm", "version": "1.13.0" } ], "libgcc": [ { "arch": "x86_64", "epoch": null, "name": "libgcc", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libgcrypt": [ { "arch": "x86_64", "epoch": null, "name": "libgcrypt", "release": "11.el9", "source": "rpm", "version": "1.10.0" } ], "libgomp": [ { "arch": "x86_64", "epoch": null, "name": "libgomp", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libgpg-error": [ { "arch": "x86_64", "epoch": null, "name": "libgpg-error", "release": "5.el9", "source": "rpm", "version": "1.42" } ], "libgpg-error-devel": [ { "arch": "x86_64", "epoch": null, "name": "libgpg-error-devel", "release": "5.el9", "source": "rpm", "version": "1.42" } ], "libibverbs": [ { "arch": "x86_64", "epoch": null, "name": "libibverbs", "release": "2.el9", "source": "rpm", "version": "57.0" } ], "libicu": [ { "arch": "x86_64", "epoch": null, "name": "libicu", "release": "10.el9", "source": "rpm", "version": "67.1" } ], "libidn2": [ { "arch": "x86_64", "epoch": null, "name": "libidn2", "release": "7.el9", "source": "rpm", "version": "2.3.0" } ], "libini_config": [ { "arch": "x86_64", "epoch": null, "name": "libini_config", "release": "53.el9", "source": "rpm", "version": "1.3.1" } ], "libisoburn": [ { "arch": "x86_64", "epoch": null, "name": "libisoburn", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "libisofs": [ { "arch": "x86_64", "epoch": null, "name": "libisofs", "release": "4.el9", "source": "rpm", "version": "1.5.4" } ], "libjpeg-turbo": [ { "arch": "x86_64", "epoch": null, "name": "libjpeg-turbo", "release": "7.el9", "source": "rpm", "version": "2.0.90" } ], "libkcapi": [ { "arch": "x86_64", "epoch": null, "name": "libkcapi", "release": "2.el9", "source": "rpm", "version": "1.4.0" } ], "libkcapi-hmaccalc": [ { "arch": "x86_64", "epoch": null, "name": "libkcapi-hmaccalc", "release": "2.el9", "source": "rpm", "version": "1.4.0" } ], "libksba": [ { "arch": "x86_64", "epoch": null, "name": "libksba", "release": "7.el9", "source": "rpm", "version": "1.5.1" } ], "libldb": [ { "arch": "x86_64", "epoch": 0, "name": "libldb", "release": "2.el9", "source": "rpm", "version": "4.23.4" } ], "libmaxminddb": [ { "arch": "x86_64", "epoch": null, "name": "libmaxminddb", "release": "4.el9", "source": "rpm", "version": "1.5.2" } ], "libmnl": [ { "arch": "x86_64", "epoch": null, "name": "libmnl", "release": "16.el9", "source": "rpm", "version": "1.0.4" } ], "libmodulemd": [ { "arch": "x86_64", "epoch": null, "name": "libmodulemd", "release": "2.el9", "source": "rpm", "version": "2.13.0" } ], "libmount": [ { "arch": "x86_64", "epoch": null, "name": "libmount", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libmpc": [ { "arch": "x86_64", "epoch": null, "name": "libmpc", "release": "4.el9", "source": "rpm", "version": "1.2.1" } ], "libndp": [ { "arch": "x86_64", "epoch": null, "name": "libndp", "release": "1.el9", "source": "rpm", "version": "1.9" } ], "libnet": [ { "arch": "x86_64", "epoch": null, "name": "libnet", "release": "7.el9", "source": "rpm", "version": "1.2" } ], "libnetfilter_conntrack": [ { "arch": "x86_64", "epoch": null, "name": "libnetfilter_conntrack", "release": "1.el9", "source": "rpm", "version": "1.0.9" } ], "libnfnetlink": [ { "arch": "x86_64", "epoch": null, "name": "libnfnetlink", "release": "23.el9", "source": "rpm", "version": "1.0.1" } ], "libnfsidmap": [ { "arch": "x86_64", "epoch": 1, "name": "libnfsidmap", "release": "41.el9", "source": "rpm", "version": "2.5.4" } ], "libnftnl": [ { "arch": "x86_64", "epoch": null, "name": "libnftnl", "release": "4.el9", "source": "rpm", "version": "1.2.6" } ], "libnghttp2": [ { "arch": "x86_64", "epoch": null, "name": "libnghttp2", "release": "6.el9", "source": "rpm", "version": "1.43.0" } ], "libnl3": [ { "arch": "x86_64", "epoch": null, "name": "libnl3", "release": "1.el9", "source": "rpm", "version": "3.11.0" } ], "libnl3-cli": [ { "arch": "x86_64", "epoch": null, "name": "libnl3-cli", "release": "1.el9", "source": "rpm", "version": "3.11.0" } ], "libosinfo": [ { "arch": "x86_64", "epoch": null, "name": "libosinfo", "release": "1.el9", "source": "rpm", "version": "1.10.0" } ], "libpath_utils": [ { "arch": "x86_64", "epoch": null, "name": "libpath_utils", "release": "53.el9", "source": "rpm", "version": "0.2.1" } ], "libpcap": [ { "arch": "x86_64", "epoch": 14, "name": "libpcap", "release": "4.el9", "source": "rpm", "version": "1.10.0" } ], "libpipeline": [ { "arch": "x86_64", "epoch": null, "name": "libpipeline", "release": "4.el9", "source": "rpm", "version": "1.5.3" } ], "libpkgconf": [ { "arch": "x86_64", "epoch": null, "name": "libpkgconf", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "libpng": [ { "arch": "x86_64", "epoch": 2, "name": "libpng", "release": "12.el9", "source": "rpm", "version": "1.6.37" } ], "libproxy": [ { "arch": "x86_64", "epoch": null, "name": "libproxy", "release": "35.el9", "source": "rpm", "version": "0.4.15" } ], "libproxy-webkitgtk4": [ { "arch": "x86_64", "epoch": null, "name": "libproxy-webkitgtk4", "release": "35.el9", "source": "rpm", "version": "0.4.15" } ], "libpsl": [ { "arch": "x86_64", "epoch": null, "name": "libpsl", "release": "5.el9", "source": "rpm", "version": "0.21.1" } ], "libpwquality": [ { "arch": "x86_64", "epoch": null, "name": "libpwquality", "release": "8.el9", "source": "rpm", "version": "1.4.4" } ], "libref_array": [ { "arch": "x86_64", "epoch": null, "name": "libref_array", "release": "53.el9", "source": "rpm", "version": "0.1.5" } ], "librepo": [ { "arch": "x86_64", "epoch": null, "name": "librepo", "release": "1.el9", "source": "rpm", "version": "1.19.0" } ], "libreport-filesystem": [ { "arch": "noarch", "epoch": null, "name": "libreport-filesystem", "release": "6.el9", "source": "rpm", "version": "2.15.2" } ], "libseccomp": [ { "arch": "x86_64", "epoch": null, "name": "libseccomp", "release": "2.el9", "source": "rpm", "version": "2.5.2" } ], "libselinux": [ { "arch": "x86_64", "epoch": null, "name": "libselinux", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libselinux-utils": [ { "arch": "x86_64", "epoch": null, "name": "libselinux-utils", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libsemanage": [ { "arch": "x86_64", "epoch": null, "name": "libsemanage", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "libsepol": [ { "arch": "x86_64", "epoch": null, "name": "libsepol", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libsigsegv": [ { "arch": "x86_64", "epoch": null, "name": "libsigsegv", "release": "4.el9", "source": "rpm", "version": "2.13" } ], "libslirp": [ { "arch": "x86_64", "epoch": null, "name": "libslirp", "release": "8.el9", "source": "rpm", "version": "4.4.0" } ], "libsmartcols": [ { "arch": "x86_64", "epoch": null, "name": "libsmartcols", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libsolv": [ { "arch": "x86_64", "epoch": null, "name": "libsolv", "release": "3.el9", "source": "rpm", "version": "0.7.24" } ], "libsoup": [ { "arch": "x86_64", "epoch": null, "name": "libsoup", "release": "10.el9", "source": "rpm", "version": "2.72.0" } ], "libss": [ { "arch": "x86_64", "epoch": null, "name": "libss", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "libssh": [ { "arch": "x86_64", "epoch": null, "name": "libssh", "release": "17.el9", "source": "rpm", "version": "0.10.4" } ], "libssh-config": [ { "arch": "noarch", "epoch": null, "name": "libssh-config", "release": "17.el9", "source": "rpm", "version": "0.10.4" } ], "libsss_certmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_certmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_idmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_nss_idmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_nss_idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_sudo": [ { "arch": "x86_64", "epoch": null, "name": "libsss_sudo", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libstdc++": [ { "arch": "x86_64", "epoch": null, "name": "libstdc++", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libstdc++-devel": [ { "arch": "x86_64", "epoch": null, "name": "libstdc++-devel", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libstemmer": [ { "arch": "x86_64", "epoch": null, "name": "libstemmer", "release": "18.585svn.el9", "source": "rpm", "version": "0" } ], "libsysfs": [ { "arch": "x86_64", "epoch": null, "name": "libsysfs", "release": "11.el9", "source": "rpm", "version": "2.1.1" } ], "libtalloc": [ { "arch": "x86_64", "epoch": null, "name": "libtalloc", "release": "1.el9", "source": "rpm", "version": "2.4.3" } ], "libtasn1": [ { "arch": "x86_64", "epoch": null, "name": "libtasn1", "release": "9.el9", "source": "rpm", "version": "4.16.0" } ], "libtdb": [ { "arch": "x86_64", "epoch": null, "name": "libtdb", "release": "1.el9", "source": "rpm", "version": "1.4.14" } ], "libteam": [ { "arch": "x86_64", "epoch": null, "name": "libteam", "release": "16.el9", "source": "rpm", "version": "1.31" } ], "libtevent": [ { "arch": "x86_64", "epoch": null, "name": "libtevent", "release": "1.el9", "source": "rpm", "version": "0.17.1" } ], "libtirpc": [ { "arch": "x86_64", "epoch": null, "name": "libtirpc", "release": "9.el9", "source": "rpm", "version": "1.3.3" } ], "libtool-ltdl": [ { "arch": "x86_64", "epoch": null, "name": "libtool-ltdl", "release": "46.el9", "source": "rpm", "version": "2.4.6" } ], "libunistring": [ { "arch": "x86_64", "epoch": null, "name": "libunistring", "release": "15.el9", "source": "rpm", "version": "0.9.10" } ], "liburing": [ { "arch": "x86_64", "epoch": null, "name": "liburing", "release": "1.el9", "source": "rpm", "version": "2.12" } ], "libuser": [ { "arch": "x86_64", "epoch": null, "name": "libuser", "release": "17.el9", "source": "rpm", "version": "0.63" } ], "libutempter": [ { "arch": "x86_64", "epoch": null, "name": "libutempter", "release": "6.el9", "source": "rpm", "version": "1.2.1" } ], "libuuid": [ { "arch": "x86_64", "epoch": null, "name": "libuuid", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libverto": [ { "arch": "x86_64", "epoch": null, "name": "libverto", "release": "3.el9", "source": "rpm", "version": "0.3.2" } ], "libverto-libev": [ { "arch": "x86_64", "epoch": null, "name": "libverto-libev", "release": "3.el9", "source": "rpm", "version": "0.3.2" } ], "libvirt-client": [ { "arch": "x86_64", "epoch": null, "name": "libvirt-client", "release": "2.el9", "source": "rpm", "version": "11.10.0" } ], "libvirt-libs": [ { "arch": "x86_64", "epoch": null, "name": "libvirt-libs", "release": "2.el9", "source": "rpm", "version": "11.10.0" } ], "libxcrypt": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxcrypt-compat": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt-compat", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxcrypt-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt-devel", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxml2": [ { "arch": "x86_64", "epoch": null, "name": "libxml2", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "libxml2-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxml2-devel", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "libxslt": [ { "arch": "x86_64", "epoch": null, "name": "libxslt", "release": "12.el9", "source": "rpm", "version": "1.1.34" } ], "libxslt-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxslt-devel", "release": "12.el9", "source": "rpm", "version": "1.1.34" } ], "libyaml": [ { "arch": "x86_64", "epoch": null, "name": "libyaml", "release": "7.el9", "source": "rpm", "version": "0.2.5" } ], "libzstd": [ { "arch": "x86_64", "epoch": null, "name": "libzstd", "release": "1.el9", "source": "rpm", "version": "1.5.5" } ], "llvm-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "llvm-filesystem", "release": "1.el9", "source": "rpm", "version": "21.1.7" } ], "llvm-libs": [ { "arch": "x86_64", "epoch": null, "name": "llvm-libs", "release": "1.el9", "source": "rpm", "version": "21.1.7" } ], "lmdb-libs": [ { "arch": "x86_64", "epoch": null, "name": "lmdb-libs", "release": "3.el9", "source": "rpm", "version": "0.9.29" } ], "logrotate": [ { "arch": "x86_64", "epoch": null, "name": "logrotate", "release": "12.el9", "source": "rpm", "version": "3.18.0" } ], "lshw": [ { "arch": "x86_64", "epoch": null, "name": "lshw", "release": "4.el9", "source": "rpm", "version": "B.02.20" } ], "lsscsi": [ { "arch": "x86_64", "epoch": null, "name": "lsscsi", "release": "6.el9", "source": "rpm", "version": "0.32" } ], "lua-libs": [ { "arch": "x86_64", "epoch": null, "name": "lua-libs", "release": "4.el9", "source": "rpm", "version": "5.4.4" } ], "lua-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "lua-srpm-macros", "release": "6.el9", "source": "rpm", "version": "1" } ], "lz4-libs": [ { "arch": "x86_64", "epoch": null, "name": "lz4-libs", "release": "5.el9", "source": "rpm", "version": "1.9.3" } ], "lzo": [ { "arch": "x86_64", "epoch": null, "name": "lzo", "release": "7.el9", "source": "rpm", "version": "2.10" } ], "make": [ { "arch": "x86_64", "epoch": 1, "name": "make", "release": "8.el9", "source": "rpm", "version": "4.3" } ], "man-db": [ { "arch": "x86_64", "epoch": null, "name": "man-db", "release": "9.el9", "source": "rpm", "version": "2.9.3" } ], "microcode_ctl": [ { "arch": "noarch", "epoch": 4, "name": "microcode_ctl", "release": "1.el9", "source": "rpm", "version": "20251111" } ], "mpfr": [ { "arch": "x86_64", "epoch": null, "name": "mpfr", "release": "8.el9", "source": "rpm", "version": "4.1.0" } ], "ncurses": [ { "arch": "x86_64", "epoch": null, "name": "ncurses", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-base": [ { "arch": "noarch", "epoch": null, "name": "ncurses-base", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-c++-libs": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-c++-libs", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-devel": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-devel", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-libs": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-libs", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "netavark": [ { "arch": "x86_64", "epoch": 2, "name": "netavark", "release": "1.el9", "source": "rpm", "version": "1.16.0" } ], "nettle": [ { "arch": "x86_64", "epoch": null, "name": "nettle", "release": "1.el9", "source": "rpm", "version": "3.10.1" } ], "newt": [ { "arch": "x86_64", "epoch": null, "name": "newt", "release": "11.el9", "source": "rpm", "version": "0.52.21" } ], "nfs-utils": [ { "arch": "x86_64", "epoch": 1, "name": "nfs-utils", "release": "41.el9", "source": "rpm", "version": "2.5.4" } ], "nftables": [ { "arch": "x86_64", "epoch": 1, "name": "nftables", "release": "6.el9", "source": "rpm", "version": "1.0.9" } ], "npth": [ { "arch": "x86_64", "epoch": null, "name": "npth", "release": "8.el9", "source": "rpm", "version": "1.6" } ], "numactl-libs": [ { "arch": "x86_64", "epoch": null, "name": "numactl-libs", "release": "3.el9", "source": "rpm", "version": "2.0.19" } ], "ocaml-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "ocaml-srpm-macros", "release": "6.el9", "source": "rpm", "version": "6" } ], "oddjob": [ { "arch": "x86_64", "epoch": null, "name": "oddjob", "release": "7.el9", "source": "rpm", "version": "0.34.7" } ], "oddjob-mkhomedir": [ { "arch": "x86_64", "epoch": null, "name": "oddjob-mkhomedir", "release": "7.el9", "source": "rpm", "version": "0.34.7" } ], "oniguruma": [ { "arch": "x86_64", "epoch": null, "name": "oniguruma", "release": "1.el9.6", "source": "rpm", "version": "6.9.6" } ], "openblas-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "openblas-srpm-macros", "release": "11.el9", "source": "rpm", "version": "2" } ], "openldap": [ { "arch": "x86_64", "epoch": null, "name": "openldap", "release": "4.el9", "source": "rpm", "version": "2.6.8" } ], "openldap-devel": [ { "arch": "x86_64", "epoch": null, "name": "openldap-devel", "release": "4.el9", "source": "rpm", "version": "2.6.8" } ], "openssh": [ { "arch": "x86_64", "epoch": null, "name": "openssh", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssh-clients": [ { "arch": "x86_64", "epoch": null, "name": "openssh-clients", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssh-server": [ { "arch": "x86_64", "epoch": null, "name": "openssh-server", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssl": [ { "arch": "x86_64", "epoch": 1, "name": "openssl", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-devel": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-devel", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-fips-provider": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-fips-provider", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-libs": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-libs", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "os-prober": [ { "arch": "x86_64", "epoch": null, "name": "os-prober", "release": "12.el9", "source": "rpm", "version": "1.77" } ], "osinfo-db": [ { "arch": "noarch", "epoch": null, "name": "osinfo-db", "release": "1.el9", "source": "rpm", "version": "20250606" } ], "osinfo-db-tools": [ { "arch": "x86_64", "epoch": null, "name": "osinfo-db-tools", "release": "1.el9", "source": "rpm", "version": "1.10.0" } ], "p11-kit": [ { "arch": "x86_64", "epoch": null, "name": "p11-kit", "release": "1.el9", "source": "rpm", "version": "0.25.10" } ], "p11-kit-trust": [ { "arch": "x86_64", "epoch": null, "name": "p11-kit-trust", "release": "1.el9", "source": "rpm", "version": "0.25.10" } ], "pam": [ { "arch": "x86_64", "epoch": null, "name": "pam", "release": "28.el9", "source": "rpm", "version": "1.5.1" } ], "parted": [ { "arch": "x86_64", "epoch": null, "name": "parted", "release": "3.el9", "source": "rpm", "version": "3.5" } ], "passt": [ { "arch": "x86_64", "epoch": null, "name": "passt", "release": "2.el9", "source": "rpm", "version": "0^20251210.gd04c480" } ], "passt-selinux": [ { "arch": "noarch", "epoch": null, "name": "passt-selinux", "release": "2.el9", "source": "rpm", "version": "0^20251210.gd04c480" } ], "passwd": [ { "arch": "x86_64", "epoch": null, "name": "passwd", "release": "12.el9", "source": "rpm", "version": "0.80" } ], "patch": [ { "arch": "x86_64", "epoch": null, "name": "patch", "release": "16.el9", "source": "rpm", "version": "2.7.6" } ], "pciutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "pciutils-libs", "release": "7.el9", "source": "rpm", "version": "3.7.0" } ], "pcre": [ { "arch": "x86_64", "epoch": null, "name": "pcre", "release": "4.el9", "source": "rpm", "version": "8.44" } ], "pcre2": [ { "arch": "x86_64", "epoch": null, "name": "pcre2", "release": "6.el9", "source": "rpm", "version": "10.40" } ], "pcre2-syntax": [ { "arch": "noarch", "epoch": null, "name": "pcre2-syntax", "release": "6.el9", "source": "rpm", "version": "10.40" } ], "perl-AutoLoader": [ { "arch": "noarch", "epoch": 0, "name": "perl-AutoLoader", "release": "483.el9", "source": "rpm", "version": "5.74" } ], "perl-B": [ { "arch": "x86_64", "epoch": 0, "name": "perl-B", "release": "483.el9", "source": "rpm", "version": "1.80" } ], "perl-Carp": [ { "arch": "noarch", "epoch": null, "name": "perl-Carp", "release": "460.el9", "source": "rpm", "version": "1.50" } ], "perl-Class-Struct": [ { "arch": "noarch", "epoch": 0, "name": "perl-Class-Struct", "release": "483.el9", "source": "rpm", "version": "0.66" } ], "perl-Data-Dumper": [ { "arch": "x86_64", "epoch": null, "name": "perl-Data-Dumper", "release": "462.el9", "source": "rpm", "version": "2.174" } ], "perl-Digest": [ { "arch": "noarch", "epoch": null, "name": "perl-Digest", "release": "4.el9", "source": "rpm", "version": "1.19" } ], "perl-Digest-MD5": [ { "arch": "x86_64", "epoch": null, "name": "perl-Digest-MD5", "release": "4.el9", "source": "rpm", "version": "2.58" } ], "perl-DynaLoader": [ { "arch": "x86_64", "epoch": 0, "name": "perl-DynaLoader", "release": "483.el9", "source": "rpm", "version": "1.47" } ], "perl-Encode": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Encode", "release": "462.el9", "source": "rpm", "version": "3.08" } ], "perl-Errno": [ { "arch": "x86_64", "epoch": 0, "name": "perl-Errno", "release": "483.el9", "source": "rpm", "version": "1.30" } ], "perl-Error": [ { "arch": "noarch", "epoch": 1, "name": "perl-Error", "release": "7.el9", "source": "rpm", "version": "0.17029" } ], "perl-Exporter": [ { "arch": "noarch", "epoch": null, "name": "perl-Exporter", "release": "461.el9", "source": "rpm", "version": "5.74" } ], "perl-Fcntl": [ { "arch": "x86_64", "epoch": 0, "name": "perl-Fcntl", "release": "483.el9", "source": "rpm", "version": "1.13" } ], "perl-File-Basename": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-Basename", "release": "483.el9", "source": "rpm", "version": "2.85" } ], "perl-File-Find": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-Find", "release": "483.el9", "source": "rpm", "version": "1.37" } ], "perl-File-Path": [ { "arch": "noarch", "epoch": null, "name": "perl-File-Path", "release": "4.el9", "source": "rpm", "version": "2.18" } ], "perl-File-Temp": [ { "arch": "noarch", "epoch": 1, "name": "perl-File-Temp", "release": "4.el9", "source": "rpm", "version": "0.231.100" } ], "perl-File-stat": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-stat", "release": "483.el9", "source": "rpm", "version": "1.09" } ], "perl-FileHandle": [ { "arch": "noarch", "epoch": 0, "name": "perl-FileHandle", "release": "483.el9", "source": "rpm", "version": "2.03" } ], "perl-Getopt-Long": [ { "arch": "noarch", "epoch": 1, "name": "perl-Getopt-Long", "release": "4.el9", "source": "rpm", "version": "2.52" } ], "perl-Getopt-Std": [ { "arch": "noarch", "epoch": 0, "name": "perl-Getopt-Std", "release": "483.el9", "source": "rpm", "version": "1.12" } ], "perl-Git": [ { "arch": "noarch", "epoch": null, "name": "perl-Git", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "perl-HTTP-Tiny": [ { "arch": "noarch", "epoch": null, "name": "perl-HTTP-Tiny", "release": "462.el9", "source": "rpm", "version": "0.076" } ], "perl-IO": [ { "arch": "x86_64", "epoch": 0, "name": "perl-IO", "release": "483.el9", "source": "rpm", "version": "1.43" } ], "perl-IO-Socket-IP": [ { "arch": "noarch", "epoch": null, "name": "perl-IO-Socket-IP", "release": "5.el9", "source": "rpm", "version": "0.41" } ], "perl-IO-Socket-SSL": [ { "arch": "noarch", "epoch": null, "name": "perl-IO-Socket-SSL", "release": "2.el9", "source": "rpm", "version": "2.073" } ], "perl-IPC-Open3": [ { "arch": "noarch", "epoch": 0, "name": "perl-IPC-Open3", "release": "483.el9", "source": "rpm", "version": "1.21" } ], "perl-MIME-Base64": [ { "arch": "x86_64", "epoch": null, "name": "perl-MIME-Base64", "release": "4.el9", "source": "rpm", "version": "3.16" } ], "perl-Mozilla-CA": [ { "arch": "noarch", "epoch": null, "name": "perl-Mozilla-CA", "release": "6.el9", "source": "rpm", "version": "20200520" } ], "perl-NDBM_File": [ { "arch": "x86_64", "epoch": 0, "name": "perl-NDBM_File", "release": "483.el9", "source": "rpm", "version": "1.15" } ], "perl-Net-SSLeay": [ { "arch": "x86_64", "epoch": null, "name": "perl-Net-SSLeay", "release": "3.el9", "source": "rpm", "version": "1.94" } ], "perl-POSIX": [ { "arch": "x86_64", "epoch": 0, "name": "perl-POSIX", "release": "483.el9", "source": "rpm", "version": "1.94" } ], "perl-PathTools": [ { "arch": "x86_64", "epoch": null, "name": "perl-PathTools", "release": "461.el9", "source": "rpm", "version": "3.78" } ], "perl-Pod-Escapes": [ { "arch": "noarch", "epoch": 1, "name": "perl-Pod-Escapes", "release": "460.el9", "source": "rpm", "version": "1.07" } ], "perl-Pod-Perldoc": [ { "arch": "noarch", "epoch": null, "name": "perl-Pod-Perldoc", "release": "461.el9", "source": "rpm", "version": "3.28.01" } ], "perl-Pod-Simple": [ { "arch": "noarch", "epoch": 1, "name": "perl-Pod-Simple", "release": "4.el9", "source": "rpm", "version": "3.42" } ], "perl-Pod-Usage": [ { "arch": "noarch", "epoch": 4, "name": "perl-Pod-Usage", "release": "4.el9", "source": "rpm", "version": "2.01" } ], "perl-Scalar-List-Utils": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Scalar-List-Utils", "release": "462.el9", "source": "rpm", "version": "1.56" } ], "perl-SelectSaver": [ { "arch": "noarch", "epoch": 0, "name": "perl-SelectSaver", "release": "483.el9", "source": "rpm", "version": "1.02" } ], "perl-Socket": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Socket", "release": "4.el9", "source": "rpm", "version": "2.031" } ], "perl-Storable": [ { "arch": "x86_64", "epoch": 1, "name": "perl-Storable", "release": "460.el9", "source": "rpm", "version": "3.21" } ], "perl-Symbol": [ { "arch": "noarch", "epoch": 0, "name": "perl-Symbol", "release": "483.el9", "source": "rpm", "version": "1.08" } ], "perl-Term-ANSIColor": [ { "arch": "noarch", "epoch": null, "name": "perl-Term-ANSIColor", "release": "461.el9", "source": "rpm", "version": "5.01" } ], "perl-Term-Cap": [ { "arch": "noarch", "epoch": null, "name": "perl-Term-Cap", "release": "460.el9", "source": "rpm", "version": "1.17" } ], "perl-TermReadKey": [ { "arch": "x86_64", "epoch": null, "name": "perl-TermReadKey", "release": "11.el9", "source": "rpm", "version": "2.38" } ], "perl-Text-ParseWords": [ { "arch": "noarch", "epoch": null, "name": "perl-Text-ParseWords", "release": "460.el9", "source": "rpm", "version": "3.30" } ], "perl-Text-Tabs+Wrap": [ { "arch": "noarch", "epoch": null, "name": "perl-Text-Tabs+Wrap", "release": "460.el9", "source": "rpm", "version": "2013.0523" } ], "perl-Time-Local": [ { "arch": "noarch", "epoch": 2, "name": "perl-Time-Local", "release": "7.el9", "source": "rpm", "version": "1.300" } ], "perl-URI": [ { "arch": "noarch", "epoch": null, "name": "perl-URI", "release": "3.el9", "source": "rpm", "version": "5.09" } ], "perl-base": [ { "arch": "noarch", "epoch": 0, "name": "perl-base", "release": "483.el9", "source": "rpm", "version": "2.27" } ], "perl-constant": [ { "arch": "noarch", "epoch": null, "name": "perl-constant", "release": "461.el9", "source": "rpm", "version": "1.33" } ], "perl-if": [ { "arch": "noarch", "epoch": 0, "name": "perl-if", "release": "483.el9", "source": "rpm", "version": "0.60.800" } ], "perl-interpreter": [ { "arch": "x86_64", "epoch": 4, "name": "perl-interpreter", "release": "483.el9", "source": "rpm", "version": "5.32.1" } ], "perl-lib": [ { "arch": "x86_64", "epoch": 0, "name": "perl-lib", "release": "483.el9", "source": "rpm", "version": "0.65" } ], "perl-libnet": [ { "arch": "noarch", "epoch": null, "name": "perl-libnet", "release": "4.el9", "source": "rpm", "version": "3.13" } ], "perl-libs": [ { "arch": "x86_64", "epoch": 4, "name": "perl-libs", "release": "483.el9", "source": "rpm", "version": "5.32.1" } ], "perl-mro": [ { "arch": "x86_64", "epoch": 0, "name": "perl-mro", "release": "483.el9", "source": "rpm", "version": "1.23" } ], "perl-overload": [ { "arch": "noarch", "epoch": 0, "name": "perl-overload", "release": "483.el9", "source": "rpm", "version": "1.31" } ], "perl-overloading": [ { "arch": "noarch", "epoch": 0, "name": "perl-overloading", "release": "483.el9", "source": "rpm", "version": "0.02" } ], "perl-parent": [ { "arch": "noarch", "epoch": 1, "name": "perl-parent", "release": "460.el9", "source": "rpm", "version": "0.238" } ], "perl-podlators": [ { "arch": "noarch", "epoch": 1, "name": "perl-podlators", "release": "460.el9", "source": "rpm", "version": "4.14" } ], "perl-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "perl-srpm-macros", "release": "41.el9", "source": "rpm", "version": "1" } ], "perl-subs": [ { "arch": "noarch", "epoch": 0, "name": "perl-subs", "release": "483.el9", "source": "rpm", "version": "1.03" } ], "perl-vars": [ { "arch": "noarch", "epoch": 0, "name": "perl-vars", "release": "483.el9", "source": "rpm", "version": "1.05" } ], "pigz": [ { "arch": "x86_64", "epoch": null, "name": "pigz", "release": "4.el9", "source": "rpm", "version": "2.5" } ], "pkgconf": [ { "arch": "x86_64", "epoch": null, "name": "pkgconf", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "pkgconf-m4": [ { "arch": "noarch", "epoch": null, "name": "pkgconf-m4", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "pkgconf-pkg-config": [ { "arch": "x86_64", "epoch": null, "name": "pkgconf-pkg-config", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "podman": [ { "arch": "x86_64", "epoch": 6, "name": "podman", "release": "2.el9", "source": "rpm", "version": "5.6.0" } ], "policycoreutils": [ { "arch": "x86_64", "epoch": null, "name": "policycoreutils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "policycoreutils-python-utils": [ { "arch": "noarch", "epoch": null, "name": "policycoreutils-python-utils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "polkit": [ { "arch": "x86_64", "epoch": null, "name": "polkit", "release": "14.el9", "source": "rpm", "version": "0.117" } ], "polkit-libs": [ { "arch": "x86_64", "epoch": null, "name": "polkit-libs", "release": "14.el9", "source": "rpm", "version": "0.117" } ], "polkit-pkla-compat": [ { "arch": "x86_64", "epoch": null, "name": "polkit-pkla-compat", "release": "21.el9", "source": "rpm", "version": "0.1" } ], "popt": [ { "arch": "x86_64", "epoch": null, "name": "popt", "release": "8.el9", "source": "rpm", "version": "1.18" } ], "prefixdevname": [ { "arch": "x86_64", "epoch": null, "name": "prefixdevname", "release": "8.el9", "source": "rpm", "version": "0.1.0" } ], "procps-ng": [ { "arch": "x86_64", "epoch": null, "name": "procps-ng", "release": "14.el9", "source": "rpm", "version": "3.3.17" } ], "protobuf-c": [ { "arch": "x86_64", "epoch": null, "name": "protobuf-c", "release": "13.el9", "source": "rpm", "version": "1.3.3" } ], "psmisc": [ { "arch": "x86_64", "epoch": null, "name": "psmisc", "release": "3.el9", "source": "rpm", "version": "23.4" } ], "publicsuffix-list-dafsa": [ { "arch": "noarch", "epoch": null, "name": "publicsuffix-list-dafsa", "release": "3.el9", "source": "rpm", "version": "20210518" } ], "pyproject-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "pyproject-srpm-macros", "release": "1.el9", "source": "rpm", "version": "1.18.5" } ], "python-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python-rpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python-srpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python-unversioned-command": [ { "arch": "noarch", "epoch": null, "name": "python-unversioned-command", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3": [ { "arch": "x86_64", "epoch": null, "name": "python3", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-argcomplete": [ { "arch": "noarch", "epoch": null, "name": "python3-argcomplete", "release": "5.el9", "source": "rpm", "version": "1.12.0" } ], "python3-attrs": [ { "arch": "noarch", "epoch": null, "name": "python3-attrs", "release": "7.el9", "source": "rpm", "version": "20.3.0" } ], "python3-audit": [ { "arch": "x86_64", "epoch": null, "name": "python3-audit", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "python3-babel": [ { "arch": "noarch", "epoch": null, "name": "python3-babel", "release": "2.el9", "source": "rpm", "version": "2.9.1" } ], "python3-cffi": [ { "arch": "x86_64", "epoch": null, "name": "python3-cffi", "release": "5.el9", "source": "rpm", "version": "1.14.5" } ], "python3-chardet": [ { "arch": "noarch", "epoch": null, "name": "python3-chardet", "release": "5.el9", "source": "rpm", "version": "4.0.0" } ], "python3-configobj": [ { "arch": "noarch", "epoch": null, "name": "python3-configobj", "release": "25.el9", "source": "rpm", "version": "5.0.6" } ], "python3-cryptography": [ { "arch": "x86_64", "epoch": null, "name": "python3-cryptography", "release": "5.el9", "source": "rpm", "version": "36.0.1" } ], "python3-dasbus": [ { "arch": "noarch", "epoch": null, "name": "python3-dasbus", "release": "1.el9", "source": "rpm", "version": "1.7" } ], "python3-dateutil": [ { "arch": "noarch", "epoch": 1, "name": "python3-dateutil", "release": "1.el9", "source": "rpm", "version": "2.9.0.post0" } ], "python3-dbus": [ { "arch": "x86_64", "epoch": null, "name": "python3-dbus", "release": "2.el9", "source": "rpm", "version": "1.2.18" } ], "python3-devel": [ { "arch": "x86_64", "epoch": null, "name": "python3-devel", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-distro": [ { "arch": "noarch", "epoch": null, "name": "python3-distro", "release": "7.el9", "source": "rpm", "version": "1.5.0" } ], "python3-dnf": [ { "arch": "noarch", "epoch": null, "name": "python3-dnf", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "python3-dnf-plugins-core": [ { "arch": "noarch", "epoch": null, "name": "python3-dnf-plugins-core", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "python3-enchant": [ { "arch": "noarch", "epoch": null, "name": "python3-enchant", "release": "5.el9", "source": "rpm", "version": "3.2.0" } ], "python3-file-magic": [ { "arch": "noarch", "epoch": null, "name": "python3-file-magic", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "python3-gobject-base": [ { "arch": "x86_64", "epoch": null, "name": "python3-gobject-base", "release": "6.el9", "source": "rpm", "version": "3.40.1" } ], "python3-gobject-base-noarch": [ { "arch": "noarch", "epoch": null, "name": "python3-gobject-base-noarch", "release": "6.el9", "source": "rpm", "version": "3.40.1" } ], "python3-gpg": [ { "arch": "x86_64", "epoch": null, "name": "python3-gpg", "release": "6.el9", "source": "rpm", "version": "1.15.1" } ], "python3-hawkey": [ { "arch": "x86_64", "epoch": null, "name": "python3-hawkey", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "python3-idna": [ { "arch": "noarch", "epoch": null, "name": "python3-idna", "release": "7.el9.1", "source": "rpm", "version": "2.10" } ], "python3-jinja2": [ { "arch": "noarch", "epoch": null, "name": "python3-jinja2", "release": "8.el9", "source": "rpm", "version": "2.11.3" } ], "python3-jmespath": [ { "arch": "noarch", "epoch": null, "name": "python3-jmespath", "release": "1.el9", "source": "rpm", "version": "1.0.1" } ], "python3-jsonpatch": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonpatch", "release": "16.el9", "source": "rpm", "version": "1.21" } ], "python3-jsonpointer": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonpointer", "release": "4.el9", "source": "rpm", "version": "2.0" } ], "python3-jsonschema": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonschema", "release": "13.el9", "source": "rpm", "version": "3.2.0" } ], "python3-libcomps": [ { "arch": "x86_64", "epoch": null, "name": "python3-libcomps", "release": "1.el9", "source": "rpm", "version": "0.1.18" } ], "python3-libdnf": [ { "arch": "x86_64", "epoch": null, "name": "python3-libdnf", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "python3-libs": [ { "arch": "x86_64", "epoch": null, "name": "python3-libs", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-libselinux": [ { "arch": "x86_64", "epoch": null, "name": "python3-libselinux", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "python3-libsemanage": [ { "arch": "x86_64", "epoch": null, "name": "python3-libsemanage", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "python3-libvirt": [ { "arch": "x86_64", "epoch": null, "name": "python3-libvirt", "release": "1.el9", "source": "rpm", "version": "11.10.0" } ], "python3-libxml2": [ { "arch": "x86_64", "epoch": null, "name": "python3-libxml2", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "python3-lxml": [ { "arch": "x86_64", "epoch": null, "name": "python3-lxml", "release": "3.el9", "source": "rpm", "version": "4.6.5" } ], "python3-markupsafe": [ { "arch": "x86_64", "epoch": null, "name": "python3-markupsafe", "release": "12.el9", "source": "rpm", "version": "1.1.1" } ], "python3-netaddr": [ { "arch": "noarch", "epoch": null, "name": "python3-netaddr", "release": "3.el9", "source": "rpm", "version": "0.10.1" } ], "python3-netifaces": [ { "arch": "x86_64", "epoch": null, "name": "python3-netifaces", "release": "15.el9", "source": "rpm", "version": "0.10.6" } ], "python3-oauthlib": [ { "arch": "noarch", "epoch": null, "name": "python3-oauthlib", "release": "5.el9", "source": "rpm", "version": "3.1.1" } ], "python3-packaging": [ { "arch": "noarch", "epoch": null, "name": "python3-packaging", "release": "5.el9", "source": "rpm", "version": "20.9" } ], "python3-pexpect": [ { "arch": "noarch", "epoch": null, "name": "python3-pexpect", "release": "7.el9", "source": "rpm", "version": "4.8.0" } ], "python3-pip": [ { "arch": "noarch", "epoch": null, "name": "python3-pip", "release": "1.el9", "source": "rpm", "version": "21.3.1" } ], "python3-pip-wheel": [ { "arch": "noarch", "epoch": null, "name": "python3-pip-wheel", "release": "1.el9", "source": "rpm", "version": "21.3.1" } ], "python3-ply": [ { "arch": "noarch", "epoch": null, "name": "python3-ply", "release": "14.el9", "source": "rpm", "version": "3.11" } ], "python3-policycoreutils": [ { "arch": "noarch", "epoch": null, "name": "python3-policycoreutils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "python3-prettytable": [ { "arch": "noarch", "epoch": null, "name": "python3-prettytable", "release": "27.el9", "source": "rpm", "version": "0.7.2" } ], "python3-ptyprocess": [ { "arch": "noarch", "epoch": null, "name": "python3-ptyprocess", "release": "12.el9", "source": "rpm", "version": "0.6.0" } ], "python3-pycparser": [ { "arch": "noarch", "epoch": null, "name": "python3-pycparser", "release": "6.el9", "source": "rpm", "version": "2.20" } ], "python3-pyparsing": [ { "arch": "noarch", "epoch": null, "name": "python3-pyparsing", "release": "9.el9", "source": "rpm", "version": "2.4.7" } ], "python3-pyrsistent": [ { "arch": "x86_64", "epoch": null, "name": "python3-pyrsistent", "release": "8.el9", "source": "rpm", "version": "0.17.3" } ], "python3-pyserial": [ { "arch": "noarch", "epoch": null, "name": "python3-pyserial", "release": "12.el9", "source": "rpm", "version": "3.4" } ], "python3-pysocks": [ { "arch": "noarch", "epoch": null, "name": "python3-pysocks", "release": "12.el9", "source": "rpm", "version": "1.7.1" } ], "python3-pytz": [ { "arch": "noarch", "epoch": null, "name": "python3-pytz", "release": "5.el9", "source": "rpm", "version": "2021.1" } ], "python3-pyyaml": [ { "arch": "x86_64", "epoch": null, "name": "python3-pyyaml", "release": "6.el9", "source": "rpm", "version": "5.4.1" } ], "python3-requests": [ { "arch": "noarch", "epoch": null, "name": "python3-requests", "release": "10.el9", "source": "rpm", "version": "2.25.1" } ], "python3-resolvelib": [ { "arch": "noarch", "epoch": null, "name": "python3-resolvelib", "release": "5.el9", "source": "rpm", "version": "0.5.4" } ], "python3-rpm": [ { "arch": "x86_64", "epoch": null, "name": "python3-rpm", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "python3-rpm-generators": [ { "arch": "noarch", "epoch": null, "name": "python3-rpm-generators", "release": "9.el9", "source": "rpm", "version": "12" } ], "python3-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python3-rpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python3-setools": [ { "arch": "x86_64", "epoch": null, "name": "python3-setools", "release": "1.el9", "source": "rpm", "version": "4.4.4" } ], "python3-setuptools": [ { "arch": "noarch", "epoch": null, "name": "python3-setuptools", "release": "15.el9", "source": "rpm", "version": "53.0.0" } ], "python3-setuptools-wheel": [ { "arch": "noarch", "epoch": null, "name": "python3-setuptools-wheel", "release": "15.el9", "source": "rpm", "version": "53.0.0" } ], "python3-six": [ { "arch": "noarch", "epoch": null, "name": "python3-six", "release": "9.el9", "source": "rpm", "version": "1.15.0" } ], "python3-systemd": [ { "arch": "x86_64", "epoch": null, "name": "python3-systemd", "release": "19.el9", "source": "rpm", "version": "234" } ], "python3-urllib3": [ { "arch": "noarch", "epoch": null, "name": "python3-urllib3", "release": "6.el9", "source": "rpm", "version": "1.26.5" } ], "qemu-guest-agent": [ { "arch": "x86_64", "epoch": 17, "name": "qemu-guest-agent", "release": "10.el9", "source": "rpm", "version": "10.1.0" } ], "qt5-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "qt5-srpm-macros", "release": "1.el9", "source": "rpm", "version": "5.15.9" } ], "quota": [ { "arch": "x86_64", "epoch": 1, "name": "quota", "release": "4.el9", "source": "rpm", "version": "4.09" } ], "quota-nls": [ { "arch": "noarch", "epoch": 1, "name": "quota-nls", "release": "4.el9", "source": "rpm", "version": "4.09" } ], "readline": [ { "arch": "x86_64", "epoch": null, "name": "readline", "release": "4.el9", "source": "rpm", "version": "8.1" } ], "readline-devel": [ { "arch": "x86_64", "epoch": null, "name": "readline-devel", "release": "4.el9", "source": "rpm", "version": "8.1" } ], "redhat-rpm-config": [ { "arch": "noarch", "epoch": null, "name": "redhat-rpm-config", "release": "1.el9", "source": "rpm", "version": "210" } ], "rootfiles": [ { "arch": "noarch", "epoch": null, "name": "rootfiles", "release": "35.el9", "source": "rpm", "version": "8.1" } ], "rpcbind": [ { "arch": "x86_64", "epoch": null, "name": "rpcbind", "release": "7.el9", "source": "rpm", "version": "1.2.6" } ], "rpm": [ { "arch": "x86_64", "epoch": null, "name": "rpm", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-build": [ { "arch": "x86_64", "epoch": null, "name": "rpm-build", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-build-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-build-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-audit": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-audit", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-selinux": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-selinux", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-systemd-inhibit": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-systemd-inhibit", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-sign": [ { "arch": "x86_64", "epoch": null, "name": "rpm-sign", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-sign-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-sign-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpmlint": [ { "arch": "noarch", "epoch": null, "name": "rpmlint", "release": "19.el9", "source": "rpm", "version": "1.11" } ], "rsync": [ { "arch": "x86_64", "epoch": null, "name": "rsync", "release": "4.el9", "source": "rpm", "version": "3.2.5" } ], "rsyslog": [ { "arch": "x86_64", "epoch": null, "name": "rsyslog", "release": "2.el9", "source": "rpm", "version": "8.2510.0" } ], "rsyslog-logrotate": [ { "arch": "x86_64", "epoch": null, "name": "rsyslog-logrotate", "release": "2.el9", "source": "rpm", "version": "8.2510.0" } ], "ruby": [ { "arch": "x86_64", "epoch": null, "name": "ruby", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-default-gems": [ { "arch": "noarch", "epoch": null, "name": "ruby-default-gems", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-devel": [ { "arch": "x86_64", "epoch": null, "name": "ruby-devel", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-libs": [ { "arch": "x86_64", "epoch": null, "name": "ruby-libs", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "rubygem-bigdecimal": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-bigdecimal", "release": "165.el9", "source": "rpm", "version": "3.0.0" } ], "rubygem-bundler": [ { "arch": "noarch", "epoch": null, "name": "rubygem-bundler", "release": "165.el9", "source": "rpm", "version": "2.2.33" } ], "rubygem-io-console": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-io-console", "release": "165.el9", "source": "rpm", "version": "0.5.7" } ], "rubygem-json": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-json", "release": "165.el9", "source": "rpm", "version": "2.5.1" } ], "rubygem-psych": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-psych", "release": "165.el9", "source": "rpm", "version": "3.3.2" } ], "rubygem-rdoc": [ { "arch": "noarch", "epoch": null, "name": "rubygem-rdoc", "release": "165.el9", "source": "rpm", "version": "6.3.4.1" } ], "rubygems": [ { "arch": "noarch", "epoch": null, "name": "rubygems", "release": "165.el9", "source": "rpm", "version": "3.2.33" } ], "rust-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "rust-srpm-macros", "release": "4.el9", "source": "rpm", "version": "17" } ], "sed": [ { "arch": "x86_64", "epoch": null, "name": "sed", "release": "9.el9", "source": "rpm", "version": "4.8" } ], "selinux-policy": [ { "arch": "noarch", "epoch": null, "name": "selinux-policy", "release": "1.el9", "source": "rpm", "version": "38.1.71" } ], "selinux-policy-targeted": [ { "arch": "noarch", "epoch": null, "name": "selinux-policy-targeted", "release": "1.el9", "source": "rpm", "version": "38.1.71" } ], "setroubleshoot-plugins": [ { "arch": "noarch", "epoch": null, "name": "setroubleshoot-plugins", "release": "4.el9", "source": "rpm", "version": "3.3.14" } ], "setroubleshoot-server": [ { "arch": "x86_64", "epoch": null, "name": "setroubleshoot-server", "release": "2.el9", "source": "rpm", "version": "3.3.35" } ], "setup": [ { "arch": "noarch", "epoch": null, "name": "setup", "release": "10.el9", "source": "rpm", "version": "2.13.7" } ], "sg3_utils": [ { "arch": "x86_64", "epoch": null, "name": "sg3_utils", "release": "10.el9", "source": "rpm", "version": "1.47" } ], "sg3_utils-libs": [ { "arch": "x86_64", "epoch": null, "name": "sg3_utils-libs", "release": "10.el9", "source": "rpm", "version": "1.47" } ], "shadow-utils": [ { "arch": "x86_64", "epoch": 2, "name": "shadow-utils", "release": "16.el9", "source": "rpm", "version": "4.9" } ], "shadow-utils-subid": [ { "arch": "x86_64", "epoch": 2, "name": "shadow-utils-subid", "release": "16.el9", "source": "rpm", "version": "4.9" } ], "shared-mime-info": [ { "arch": "x86_64", "epoch": null, "name": "shared-mime-info", "release": "5.el9", "source": "rpm", "version": "2.1" } ], "skopeo": [ { "arch": "x86_64", "epoch": 2, "name": "skopeo", "release": "2.el9", "source": "rpm", "version": "1.20.0" } ], "slang": [ { "arch": "x86_64", "epoch": null, "name": "slang", "release": "11.el9", "source": "rpm", "version": "2.3.2" } ], "slirp4netns": [ { "arch": "x86_64", "epoch": null, "name": "slirp4netns", "release": "1.el9", "source": "rpm", "version": "1.3.3" } ], "snappy": [ { "arch": "x86_64", "epoch": null, "name": "snappy", "release": "8.el9", "source": "rpm", "version": "1.1.8" } ], "sos": [ { "arch": "noarch", "epoch": null, "name": "sos", "release": "2.el9", "source": "rpm", "version": "4.10.1" } ], "sqlite": [ { "arch": "x86_64", "epoch": null, "name": "sqlite", "release": "9.el9", "source": "rpm", "version": "3.34.1" } ], "sqlite-libs": [ { "arch": "x86_64", "epoch": null, "name": "sqlite-libs", "release": "9.el9", "source": "rpm", "version": "3.34.1" } ], "squashfs-tools": [ { "arch": "x86_64", "epoch": null, "name": "squashfs-tools", "release": "10.git1.el9", "source": "rpm", "version": "4.4" } ], "sscg": [ { "arch": "x86_64", "epoch": null, "name": "sscg", "release": "2.el9", "source": "rpm", "version": "4.0.3" } ], "sshpass": [ { "arch": "x86_64", "epoch": null, "name": "sshpass", "release": "4.el9", "source": "rpm", "version": "1.09" } ], "sssd-client": [ { "arch": "x86_64", "epoch": null, "name": "sssd-client", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-common": [ { "arch": "x86_64", "epoch": null, "name": "sssd-common", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-kcm": [ { "arch": "x86_64", "epoch": null, "name": "sssd-kcm", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-nfs-idmap": [ { "arch": "x86_64", "epoch": null, "name": "sssd-nfs-idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sudo": [ { "arch": "x86_64", "epoch": null, "name": "sudo", "release": "13.el9", "source": "rpm", "version": "1.9.5p2" } ], "systemd": [ { "arch": "x86_64", "epoch": null, "name": "systemd", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-devel": [ { "arch": "x86_64", "epoch": null, "name": "systemd-devel", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-libs": [ { "arch": "x86_64", "epoch": null, "name": "systemd-libs", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-pam": [ { "arch": "x86_64", "epoch": null, "name": "systemd-pam", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "systemd-rpm-macros", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-udev": [ { "arch": "x86_64", "epoch": null, "name": "systemd-udev", "release": "64.el9", "source": "rpm", "version": "252" } ], "tar": [ { "arch": "x86_64", "epoch": 2, "name": "tar", "release": "9.el9", "source": "rpm", "version": "1.34" } ], "tcl": [ { "arch": "x86_64", "epoch": 1, "name": "tcl", "release": "7.el9", "source": "rpm", "version": "8.6.10" } ], "tcpdump": [ { "arch": "x86_64", "epoch": 14, "name": "tcpdump", "release": "9.el9", "source": "rpm", "version": "4.99.0" } ], "teamd": [ { "arch": "x86_64", "epoch": null, "name": "teamd", "release": "16.el9", "source": "rpm", "version": "1.31" } ], "time": [ { "arch": "x86_64", "epoch": null, "name": "time", "release": "18.el9", "source": "rpm", "version": "1.9" } ], "tmux": [ { "arch": "x86_64", "epoch": null, "name": "tmux", "release": "5.el9", "source": "rpm", "version": "3.2a" } ], "tpm2-tss": [ { "arch": "x86_64", "epoch": null, "name": "tpm2-tss", "release": "1.el9", "source": "rpm", "version": "3.2.3" } ], "traceroute": [ { "arch": "x86_64", "epoch": 3, "name": "traceroute", "release": "1.el9", "source": "rpm", "version": "2.1.1" } ], "tzdata": [ { "arch": "noarch", "epoch": null, "name": "tzdata", "release": "1.el9", "source": "rpm", "version": "2025c" } ], "unzip": [ { "arch": "x86_64", "epoch": null, "name": "unzip", "release": "59.el9", "source": "rpm", "version": "6.0" } ], "userspace-rcu": [ { "arch": "x86_64", "epoch": null, "name": "userspace-rcu", "release": "6.el9", "source": "rpm", "version": "0.12.1" } ], "util-linux": [ { "arch": "x86_64", "epoch": null, "name": "util-linux", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "util-linux-core": [ { "arch": "x86_64", "epoch": null, "name": "util-linux-core", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "vim-minimal": [ { "arch": "x86_64", "epoch": 2, "name": "vim-minimal", "release": "23.el9", "source": "rpm", "version": "8.2.2637" } ], "virt-install": [ { "arch": "noarch", "epoch": null, "name": "virt-install", "release": "1.el9", "source": "rpm", "version": "5.0.0" } ], "virt-manager-common": [ { "arch": "noarch", "epoch": null, "name": "virt-manager-common", "release": "1.el9", "source": "rpm", "version": "5.0.0" } ], "webkit2gtk3-jsc": [ { "arch": "x86_64", "epoch": null, "name": "webkit2gtk3-jsc", "release": "1.el9", "source": "rpm", "version": "2.50.4" } ], "wget": [ { "arch": "x86_64", "epoch": null, "name": "wget", "release": "8.el9", "source": "rpm", "version": "1.21.1" } ], "which": [ { "arch": "x86_64", "epoch": null, "name": "which", "release": "30.el9", "source": "rpm", "version": "2.21" } ], "xfsprogs": [ { "arch": "x86_64", "epoch": null, "name": "xfsprogs", "release": "7.el9", "source": "rpm", "version": "6.4.0" } ], "xmlstarlet": [ { "arch": "x86_64", "epoch": null, "name": "xmlstarlet", "release": "20.el9", "source": "rpm", "version": "1.6.1" } ], "xorriso": [ { "arch": "x86_64", "epoch": null, "name": "xorriso", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "xz": [ { "arch": "x86_64", "epoch": null, "name": "xz", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "xz-devel": [ { "arch": "x86_64", "epoch": null, "name": "xz-devel", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "xz-libs": [ { "arch": "x86_64", "epoch": null, "name": "xz-libs", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "yajl": [ { "arch": "x86_64", "epoch": null, "name": "yajl", "release": "25.el9", "source": "rpm", "version": "2.1.0" } ], "yum": [ { "arch": "noarch", "epoch": null, "name": "yum", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "yum-utils": [ { "arch": "noarch", "epoch": null, "name": "yum-utils", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "zip": [ { "arch": "x86_64", "epoch": null, "name": "zip", "release": "35.el9", "source": "rpm", "version": "3.0" } ], "zlib": [ { "arch": "x86_64", "epoch": null, "name": "zlib", "release": "41.el9", "source": "rpm", "version": "1.2.11" } ], "zlib-devel": [ { "arch": "x86_64", "epoch": null, "name": "zlib-devel", "release": "41.el9", "source": "rpm", "version": "1.2.11" } ], "zstd": [ { "arch": "x86_64", "epoch": null, "name": "zstd", "release": "1.el9", "source": "rpm", "version": "1.5.5" } ] }, "zuul_change_list": [ "watcher-operator" ] }home/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/0000755000175000017500000000000015133753356025105 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/delorean-antelope-testing.repo0000644000175000017500000000317215133727760033050 0ustar zuulzuul[delorean-antelope-testing] name=dlrn-antelope-testing baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [delorean-antelope-build-deps] name=dlrn-antelope-build-deps baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/build-deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-rabbitmq] name=centos9-rabbitmq baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/messaging/$basearch/rabbitmq-38/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-storage] name=centos9-storage baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/storage/$basearch/ceph-reef/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-opstools] name=centos9-opstools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/opstools/$basearch/collectd-5/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-nfv-ovs] name=NFV SIG OpenvSwitch baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/nfv/$basearch/openvswitch-2/ gpgcheck=0 enabled=1 module_hotfixes=1 # epel is required for Ceph Reef [epel-low-priority] name=Extra Packages for Enterprise Linux $releasever - $basearch metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-$releasever&arch=$basearch&infra=$infra&content=$contentdir enabled=1 gpgcheck=0 countme=1 priority=100 includepkgs=libarrow*,parquet*,python3-asyncssh,re2,python3-grpcio,grpc*,abseil*,thrift*,blake3 home/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/delorean.repo0000644000175000017500000001341515133727760027571 0ustar zuulzuul[delorean-component-barbican] name=delorean-openstack-barbican-42b4c41831408a8e323fec3c8983b5c793b64874 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/barbican/42/b4/42b4c41831408a8e323fec3c8983b5c793b64874_08052e9d enabled=1 gpgcheck=0 priority=1 [delorean-component-baremetal] name=delorean-python-glean-10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/baremetal/10/df/10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7_36137eb3 enabled=1 gpgcheck=0 priority=1 [delorean-component-cinder] name=delorean-openstack-cinder-1c00d6490d88e436f26efb71f2ac96e75252e97c baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cinder/1c/00/1c00d6490d88e436f26efb71f2ac96e75252e97c_f716f000 enabled=1 gpgcheck=0 priority=1 [delorean-component-clients] name=delorean-python-stevedore-c4acc5639fd2329372142e39464fcca0209b0018 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/clients/c4/ac/c4acc5639fd2329372142e39464fcca0209b0018_d3ef8337 enabled=1 gpgcheck=0 priority=1 [delorean-component-cloudops] name=delorean-python-cloudkitty-tests-tempest-2c80f80e02c5accd099187ea762c8f8389bd7905 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cloudops/2c/80/2c80f80e02c5accd099187ea762c8f8389bd7905_33e4dd93 enabled=1 gpgcheck=0 priority=1 [delorean-component-common] name=delorean-os-refresh-config-9bfc52b5049be2d8de6134d662fdde9dfa48960f baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/common/9b/fc/9bfc52b5049be2d8de6134d662fdde9dfa48960f_b85780e6 enabled=1 gpgcheck=0 priority=1 [delorean-component-compute] name=delorean-openstack-nova-6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/compute/6f/8d/6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e_dc05b899 enabled=1 gpgcheck=0 priority=1 [delorean-component-designate] name=delorean-python-designate-tests-tempest-347fdbc9b4595a10b726526b3c0b5928e5b7fcf2 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/designate/34/7f/347fdbc9b4595a10b726526b3c0b5928e5b7fcf2_3fd39337 enabled=1 gpgcheck=0 priority=1 [delorean-component-glance] name=delorean-openstack-glance-1fd12c29b339f30fe823e2b5beba14b5f241e52a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/glance/1f/d1/1fd12c29b339f30fe823e2b5beba14b5f241e52a_0d693729 enabled=1 gpgcheck=0 priority=1 [delorean-component-keystone] name=delorean-openstack-keystone-e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/keystone/e4/b4/e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7_264c03cc enabled=1 gpgcheck=0 priority=1 [delorean-component-manila] name=delorean-openstack-manila-3c01b7181572c95dac462eb19c3121e36cb0fe95 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/manila/3c/01/3c01b7181572c95dac462eb19c3121e36cb0fe95_912dfd18 enabled=1 gpgcheck=0 priority=1 [delorean-component-network] name=delorean-python-whitebox-neutron-tests-tempest-12cf06ce36a79a584fc757f4c25ff96845573c93 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/network/12/cf/12cf06ce36a79a584fc757f4c25ff96845573c93_3ed3aba3 enabled=1 gpgcheck=0 priority=1 [delorean-component-octavia] name=delorean-openstack-octavia-ba397f07a7331190208c93368ee23826ac4e2707 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/octavia/ba/39/ba397f07a7331190208c93368ee23826ac4e2707_9d6e596a enabled=1 gpgcheck=0 priority=1 [delorean-component-optimize] name=delorean-openstack-watcher-c014f81a8647287f6dcc339321c1256f5a2e82d5 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/optimize/c0/14/c014f81a8647287f6dcc339321c1256f5a2e82d5_bcbfdccc enabled=1 gpgcheck=0 priority=1 [delorean-component-podified] name=delorean-ansible-config_template-5ccaa22121a7ff05620975540d81f6efb077d8db baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/podified/5c/ca/5ccaa22121a7ff05620975540d81f6efb077d8db_83eb7cc2 enabled=1 gpgcheck=0 priority=1 [delorean-component-puppet] name=delorean-puppet-ceph-7352068d7b8c84ded636ab3158dafa6f3851951e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/puppet/73/52/7352068d7b8c84ded636ab3158dafa6f3851951e_7cde1ad1 enabled=1 gpgcheck=0 priority=1 [delorean-component-swift] name=delorean-openstack-swift-dc98a8463506ac520c469adb0ef47d0f7753905a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/swift/dc/98/dc98a8463506ac520c469adb0ef47d0f7753905a_9d02f069 enabled=1 gpgcheck=0 priority=1 [delorean-component-tempest] name=delorean-python-tempestconf-8515371b7cceebd4282e09f1d8f0cc842df82855 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/tempest/85/15/8515371b7cceebd4282e09f1d8f0cc842df82855_a1e336c7 enabled=1 gpgcheck=0 priority=1 [delorean-component-ui] name=delorean-openstack-heat-ui-013accbfd179753bc3f0d1f4e5bed07a4fd9f771 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/ui/01/3a/013accbfd179753bc3f0d1f4e5bed07a4fd9f771_0c88e467 enabled=1 gpgcheck=0 priority=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-appstream.repo0000644000175000017500000000031615133727760033362 0ustar zuulzuul [repo-setup-centos-appstream] name=repo-setup-centos-appstream baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/AppStream/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-baseos.repo0000644000175000017500000000030415133727760032637 0ustar zuulzuul [repo-setup-centos-baseos] name=repo-setup-centos-baseos baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/BaseOS/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-highavailability.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-highavailabili0000644000175000017500000000034215133727760033356 0ustar zuulzuul [repo-setup-centos-highavailability] name=repo-setup-centos-highavailability baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/HighAvailability/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-powertools.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/repo-setup-centos-powertools.rep0000644000175000017500000000031115133727760033417 0ustar zuulzuul [repo-setup-centos-powertools] name=repo-setup-centos-powertools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/CRB/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/repositories/delorean.repo.md50000644000175000017500000000004115133727757030252 0ustar zuulzuulc3923531bcda0b0811b2d5053f189beb home/zuul/zuul-output/logs/ci-framework-data/artifacts/installed-packages.yml0000644000175000017500000023013215133740624026627 0ustar zuulzuulNetworkManager: - arch: x86_64 epoch: 1 name: NetworkManager release: 2.el9 source: rpm version: 1.54.3 NetworkManager-libnm: - arch: x86_64 epoch: 1 name: NetworkManager-libnm release: 2.el9 source: rpm version: 1.54.3 NetworkManager-team: - arch: x86_64 epoch: 1 name: NetworkManager-team release: 2.el9 source: rpm version: 1.54.3 NetworkManager-tui: - arch: x86_64 epoch: 1 name: NetworkManager-tui release: 2.el9 source: rpm version: 1.54.3 aardvark-dns: - arch: x86_64 epoch: 2 name: aardvark-dns release: 1.el9 source: rpm version: 1.17.0 abattis-cantarell-fonts: - arch: noarch epoch: null name: abattis-cantarell-fonts release: 4.el9 source: rpm version: '0.301' acl: - arch: x86_64 epoch: null name: acl release: 4.el9 source: rpm version: 2.3.1 adobe-source-code-pro-fonts: - arch: noarch epoch: null name: adobe-source-code-pro-fonts release: 12.el9.1 source: rpm version: 2.030.1.050 alternatives: - arch: x86_64 epoch: null name: alternatives release: 2.el9 source: rpm version: '1.24' annobin: - arch: x86_64 epoch: null name: annobin release: 1.el9 source: rpm version: '12.98' ansible-core: - arch: x86_64 epoch: 1 name: ansible-core release: 2.el9 source: rpm version: 2.14.18 apr: - arch: x86_64 epoch: null name: apr release: 12.el9 source: rpm version: 1.7.0 apr-util: - arch: x86_64 epoch: null name: apr-util release: 23.el9 source: rpm version: 1.6.1 apr-util-bdb: - arch: x86_64 epoch: null name: apr-util-bdb release: 23.el9 source: rpm version: 1.6.1 apr-util-openssl: - arch: x86_64 epoch: null name: apr-util-openssl release: 23.el9 source: rpm version: 1.6.1 attr: - arch: x86_64 epoch: null name: attr release: 3.el9 source: rpm version: 2.5.1 audit: - arch: x86_64 epoch: null name: audit release: 8.el9 source: rpm version: 3.1.5 audit-libs: - arch: x86_64 epoch: null name: audit-libs release: 8.el9 source: rpm version: 3.1.5 authselect: - arch: x86_64 epoch: null name: authselect release: 3.el9 source: rpm version: 1.2.6 authselect-compat: - arch: x86_64 epoch: null name: authselect-compat release: 3.el9 source: rpm version: 1.2.6 authselect-libs: - arch: x86_64 epoch: null name: authselect-libs release: 3.el9 source: rpm version: 1.2.6 basesystem: - arch: noarch epoch: null name: basesystem release: 13.el9 source: rpm version: '11' bash: - arch: x86_64 epoch: null name: bash release: 9.el9 source: rpm version: 5.1.8 bash-completion: - arch: noarch epoch: 1 name: bash-completion release: 5.el9 source: rpm version: '2.11' binutils: - arch: x86_64 epoch: null name: binutils release: 69.el9 source: rpm version: 2.35.2 binutils-gold: - arch: x86_64 epoch: null name: binutils-gold release: 69.el9 source: rpm version: 2.35.2 buildah: - arch: x86_64 epoch: 2 name: buildah release: 1.el9 source: rpm version: 1.41.3 bzip2: - arch: x86_64 epoch: null name: bzip2 release: 10.el9 source: rpm version: 1.0.8 bzip2-libs: - arch: x86_64 epoch: null name: bzip2-libs release: 10.el9 source: rpm version: 1.0.8 c-ares: - arch: x86_64 epoch: null name: c-ares release: 2.el9 source: rpm version: 1.19.1 ca-certificates: - arch: noarch epoch: null name: ca-certificates release: 91.el9 source: rpm version: 2025.2.80_v9.0.305 centos-gpg-keys: - arch: noarch epoch: null name: centos-gpg-keys release: 34.el9 source: rpm version: '9.0' centos-logos: - arch: x86_64 epoch: null name: centos-logos release: 1.el9 source: rpm version: '90.9' centos-stream-release: - arch: noarch epoch: null name: centos-stream-release release: 34.el9 source: rpm version: '9.0' centos-stream-repos: - arch: noarch epoch: null name: centos-stream-repos release: 34.el9 source: rpm version: '9.0' checkpolicy: - arch: x86_64 epoch: null name: checkpolicy release: 1.el9 source: rpm version: '3.6' chrony: - arch: x86_64 epoch: null name: chrony release: 1.el9 source: rpm version: '4.8' cloud-init: - arch: noarch epoch: null name: cloud-init release: 8.el9 source: rpm version: '24.4' cloud-utils-growpart: - arch: x86_64 epoch: null name: cloud-utils-growpart release: 1.el9 source: rpm version: '0.33' cmake-filesystem: - arch: x86_64 epoch: null name: cmake-filesystem release: 3.el9 source: rpm version: 3.31.8 cockpit-bridge: - arch: noarch epoch: null name: cockpit-bridge release: 1.el9 source: rpm version: '348' cockpit-system: - arch: noarch epoch: null name: cockpit-system release: 1.el9 source: rpm version: '348' cockpit-ws: - arch: x86_64 epoch: null name: cockpit-ws release: 1.el9 source: rpm version: '348' cockpit-ws-selinux: - arch: x86_64 epoch: null name: cockpit-ws-selinux release: 1.el9 source: rpm version: '348' conmon: - arch: x86_64 epoch: 3 name: conmon release: 1.el9 source: rpm version: 2.1.13 container-selinux: - arch: noarch epoch: 4 name: container-selinux release: 1.el9 source: rpm version: 2.244.0 containers-common: - arch: x86_64 epoch: 4 name: containers-common release: 134.el9 source: rpm version: '1' containers-common-extra: - arch: x86_64 epoch: 4 name: containers-common-extra release: 134.el9 source: rpm version: '1' coreutils: - arch: x86_64 epoch: null name: coreutils release: 39.el9 source: rpm version: '8.32' coreutils-common: - arch: x86_64 epoch: null name: coreutils-common release: 39.el9 source: rpm version: '8.32' cpio: - arch: x86_64 epoch: null name: cpio release: 16.el9 source: rpm version: '2.13' cpp: - arch: x86_64 epoch: null name: cpp release: 14.el9 source: rpm version: 11.5.0 cracklib: - arch: x86_64 epoch: null name: cracklib release: 28.el9 source: rpm version: 2.9.6 cracklib-dicts: - arch: x86_64 epoch: null name: cracklib-dicts release: 28.el9 source: rpm version: 2.9.6 createrepo_c: - arch: x86_64 epoch: null name: createrepo_c release: 4.el9 source: rpm version: 0.20.1 createrepo_c-libs: - arch: x86_64 epoch: null name: createrepo_c-libs release: 4.el9 source: rpm version: 0.20.1 criu: - arch: x86_64 epoch: null name: criu release: 3.el9 source: rpm version: '3.19' criu-libs: - arch: x86_64 epoch: null name: criu-libs release: 3.el9 source: rpm version: '3.19' cronie: - arch: x86_64 epoch: null name: cronie release: 14.el9 source: rpm version: 1.5.7 cronie-anacron: - arch: x86_64 epoch: null name: cronie-anacron release: 14.el9 source: rpm version: 1.5.7 crontabs: - arch: noarch epoch: null name: crontabs release: 26.20190603git.el9 source: rpm version: '1.11' crun: - arch: x86_64 epoch: null name: crun release: 1.el9 source: rpm version: '1.24' crypto-policies: - arch: noarch epoch: null name: crypto-policies release: 1.gite9c4db2.el9 source: rpm version: '20251126' crypto-policies-scripts: - arch: noarch epoch: null name: crypto-policies-scripts release: 1.gite9c4db2.el9 source: rpm version: '20251126' cryptsetup-libs: - arch: x86_64 epoch: null name: cryptsetup-libs release: 2.el9 source: rpm version: 2.8.1 curl: - arch: x86_64 epoch: null name: curl release: 38.el9 source: rpm version: 7.76.1 cyrus-sasl: - arch: x86_64 epoch: null name: cyrus-sasl release: 21.el9 source: rpm version: 2.1.27 cyrus-sasl-devel: - arch: x86_64 epoch: null name: cyrus-sasl-devel release: 21.el9 source: rpm version: 2.1.27 cyrus-sasl-gssapi: - arch: x86_64 epoch: null name: cyrus-sasl-gssapi release: 21.el9 source: rpm version: 2.1.27 cyrus-sasl-lib: - arch: x86_64 epoch: null name: cyrus-sasl-lib release: 21.el9 source: rpm version: 2.1.27 dbus: - arch: x86_64 epoch: 1 name: dbus release: 8.el9 source: rpm version: 1.12.20 dbus-broker: - arch: x86_64 epoch: null name: dbus-broker release: 7.el9 source: rpm version: '28' dbus-common: - arch: noarch epoch: 1 name: dbus-common release: 8.el9 source: rpm version: 1.12.20 dbus-libs: - arch: x86_64 epoch: 1 name: dbus-libs release: 8.el9 source: rpm version: 1.12.20 dbus-tools: - arch: x86_64 epoch: 1 name: dbus-tools release: 8.el9 source: rpm version: 1.12.20 debugedit: - arch: x86_64 epoch: null name: debugedit release: 11.el9 source: rpm version: '5.0' dejavu-sans-fonts: - arch: noarch epoch: null name: dejavu-sans-fonts release: 18.el9 source: rpm version: '2.37' desktop-file-utils: - arch: x86_64 epoch: null name: desktop-file-utils release: 6.el9 source: rpm version: '0.26' device-mapper: - arch: x86_64 epoch: 9 name: device-mapper release: 2.el9 source: rpm version: 1.02.206 device-mapper-libs: - arch: x86_64 epoch: 9 name: device-mapper-libs release: 2.el9 source: rpm version: 1.02.206 dhcp-client: - arch: x86_64 epoch: 12 name: dhcp-client release: 19.b1.el9 source: rpm version: 4.4.2 dhcp-common: - arch: noarch epoch: 12 name: dhcp-common release: 19.b1.el9 source: rpm version: 4.4.2 diffutils: - arch: x86_64 epoch: null name: diffutils release: 12.el9 source: rpm version: '3.7' dnf: - arch: noarch epoch: null name: dnf release: 31.el9 source: rpm version: 4.14.0 dnf-data: - arch: noarch epoch: null name: dnf-data release: 31.el9 source: rpm version: 4.14.0 dnf-plugins-core: - arch: noarch epoch: null name: dnf-plugins-core release: 25.el9 source: rpm version: 4.3.0 dracut: - arch: x86_64 epoch: null name: dracut release: 102.git20250818.el9 source: rpm version: '057' dracut-config-generic: - arch: x86_64 epoch: null name: dracut-config-generic release: 102.git20250818.el9 source: rpm version: '057' dracut-network: - arch: x86_64 epoch: null name: dracut-network release: 102.git20250818.el9 source: rpm version: '057' dracut-squash: - arch: x86_64 epoch: null name: dracut-squash release: 102.git20250818.el9 source: rpm version: '057' dwz: - arch: x86_64 epoch: null name: dwz release: 1.el9 source: rpm version: '0.16' e2fsprogs: - arch: x86_64 epoch: null name: e2fsprogs release: 8.el9 source: rpm version: 1.46.5 e2fsprogs-libs: - arch: x86_64 epoch: null name: e2fsprogs-libs release: 8.el9 source: rpm version: 1.46.5 ed: - arch: x86_64 epoch: null name: ed release: 12.el9 source: rpm version: 1.14.2 efi-srpm-macros: - arch: noarch epoch: null name: efi-srpm-macros release: 4.el9 source: rpm version: '6' elfutils: - arch: x86_64 epoch: null name: elfutils release: 1.el9 source: rpm version: '0.194' elfutils-debuginfod-client: - arch: x86_64 epoch: null name: elfutils-debuginfod-client release: 1.el9 source: rpm version: '0.194' elfutils-default-yama-scope: - arch: noarch epoch: null name: elfutils-default-yama-scope release: 1.el9 source: rpm version: '0.194' elfutils-libelf: - arch: x86_64 epoch: null name: elfutils-libelf release: 1.el9 source: rpm version: '0.194' elfutils-libs: - arch: x86_64 epoch: null name: elfutils-libs release: 1.el9 source: rpm version: '0.194' emacs-filesystem: - arch: noarch epoch: 1 name: emacs-filesystem release: 18.el9 source: rpm version: '27.2' enchant: - arch: x86_64 epoch: 1 name: enchant release: 30.el9 source: rpm version: 1.6.0 ethtool: - arch: x86_64 epoch: 2 name: ethtool release: 2.el9 source: rpm version: '6.15' expat: - arch: x86_64 epoch: null name: expat release: 6.el9 source: rpm version: 2.5.0 expect: - arch: x86_64 epoch: null name: expect release: 16.el9 source: rpm version: 5.45.4 file: - arch: x86_64 epoch: null name: file release: 16.el9 source: rpm version: '5.39' file-libs: - arch: x86_64 epoch: null name: file-libs release: 16.el9 source: rpm version: '5.39' filesystem: - arch: x86_64 epoch: null name: filesystem release: 5.el9 source: rpm version: '3.16' findutils: - arch: x86_64 epoch: 1 name: findutils release: 7.el9 source: rpm version: 4.8.0 fonts-filesystem: - arch: noarch epoch: 1 name: fonts-filesystem release: 7.el9.1 source: rpm version: 2.0.5 fonts-srpm-macros: - arch: noarch epoch: 1 name: fonts-srpm-macros release: 7.el9.1 source: rpm version: 2.0.5 fuse-common: - arch: x86_64 epoch: null name: fuse-common release: 9.el9 source: rpm version: 3.10.2 fuse-libs: - arch: x86_64 epoch: null name: fuse-libs release: 17.el9 source: rpm version: 2.9.9 fuse-overlayfs: - arch: x86_64 epoch: null name: fuse-overlayfs release: 1.el9 source: rpm version: '1.16' fuse3: - arch: x86_64 epoch: null name: fuse3 release: 9.el9 source: rpm version: 3.10.2 fuse3-libs: - arch: x86_64 epoch: null name: fuse3-libs release: 9.el9 source: rpm version: 3.10.2 gawk: - arch: x86_64 epoch: null name: gawk release: 6.el9 source: rpm version: 5.1.0 gawk-all-langpacks: - arch: x86_64 epoch: null name: gawk-all-langpacks release: 6.el9 source: rpm version: 5.1.0 gcc: - arch: x86_64 epoch: null name: gcc release: 14.el9 source: rpm version: 11.5.0 gcc-c++: - arch: x86_64 epoch: null name: gcc-c++ release: 14.el9 source: rpm version: 11.5.0 gcc-plugin-annobin: - arch: x86_64 epoch: null name: gcc-plugin-annobin release: 14.el9 source: rpm version: 11.5.0 gdb-minimal: - arch: x86_64 epoch: null name: gdb-minimal release: 2.el9 source: rpm version: '16.3' gdbm-libs: - arch: x86_64 epoch: 1 name: gdbm-libs release: 1.el9 source: rpm version: '1.23' gdisk: - arch: x86_64 epoch: null name: gdisk release: 5.el9 source: rpm version: 1.0.7 gdk-pixbuf2: - arch: x86_64 epoch: null name: gdk-pixbuf2 release: 6.el9 source: rpm version: 2.42.6 geolite2-city: - arch: noarch epoch: null name: geolite2-city release: 6.el9 source: rpm version: '20191217' geolite2-country: - arch: noarch epoch: null name: geolite2-country release: 6.el9 source: rpm version: '20191217' gettext: - arch: x86_64 epoch: null name: gettext release: 8.el9 source: rpm version: '0.21' gettext-libs: - arch: x86_64 epoch: null name: gettext-libs release: 8.el9 source: rpm version: '0.21' ghc-srpm-macros: - arch: noarch epoch: null name: ghc-srpm-macros release: 6.el9 source: rpm version: 1.5.0 git: - arch: x86_64 epoch: null name: git release: 1.el9 source: rpm version: 2.47.3 git-core: - arch: x86_64 epoch: null name: git-core release: 1.el9 source: rpm version: 2.47.3 git-core-doc: - arch: noarch epoch: null name: git-core-doc release: 1.el9 source: rpm version: 2.47.3 glib-networking: - arch: x86_64 epoch: null name: glib-networking release: 3.el9 source: rpm version: 2.68.3 glib2: - arch: x86_64 epoch: null name: glib2 release: 18.el9 source: rpm version: 2.68.4 glibc: - arch: x86_64 epoch: null name: glibc release: 245.el9 source: rpm version: '2.34' glibc-common: - arch: x86_64 epoch: null name: glibc-common release: 245.el9 source: rpm version: '2.34' glibc-devel: - arch: x86_64 epoch: null name: glibc-devel release: 245.el9 source: rpm version: '2.34' glibc-gconv-extra: - arch: x86_64 epoch: null name: glibc-gconv-extra release: 245.el9 source: rpm version: '2.34' glibc-headers: - arch: x86_64 epoch: null name: glibc-headers release: 245.el9 source: rpm version: '2.34' glibc-langpack-en: - arch: x86_64 epoch: null name: glibc-langpack-en release: 245.el9 source: rpm version: '2.34' gmp: - arch: x86_64 epoch: 1 name: gmp release: 13.el9 source: rpm version: 6.2.0 gnupg2: - arch: x86_64 epoch: null name: gnupg2 release: 5.el9 source: rpm version: 2.3.3 gnutls: - arch: x86_64 epoch: null name: gnutls release: 2.el9 source: rpm version: 3.8.10 go-srpm-macros: - arch: noarch epoch: null name: go-srpm-macros release: 1.el9 source: rpm version: 3.8.1 gobject-introspection: - arch: x86_64 epoch: null name: gobject-introspection release: 11.el9 source: rpm version: 1.68.0 gpg-pubkey: - arch: null epoch: null name: gpg-pubkey release: 5ccc5b19 source: rpm version: 8483c65d gpgme: - arch: x86_64 epoch: null name: gpgme release: 6.el9 source: rpm version: 1.15.1 grep: - arch: x86_64 epoch: null name: grep release: 5.el9 source: rpm version: '3.6' groff-base: - arch: x86_64 epoch: null name: groff-base release: 10.el9 source: rpm version: 1.22.4 grub2-common: - arch: noarch epoch: 1 name: grub2-common release: 120.el9 source: rpm version: '2.06' grub2-pc: - arch: x86_64 epoch: 1 name: grub2-pc release: 120.el9 source: rpm version: '2.06' grub2-pc-modules: - arch: noarch epoch: 1 name: grub2-pc-modules release: 120.el9 source: rpm version: '2.06' grub2-tools: - arch: x86_64 epoch: 1 name: grub2-tools release: 120.el9 source: rpm version: '2.06' grub2-tools-minimal: - arch: x86_64 epoch: 1 name: grub2-tools-minimal release: 120.el9 source: rpm version: '2.06' grubby: - arch: x86_64 epoch: null name: grubby release: 69.el9 source: rpm version: '8.40' gsettings-desktop-schemas: - arch: x86_64 epoch: null name: gsettings-desktop-schemas release: 8.el9 source: rpm version: '40.0' gssproxy: - arch: x86_64 epoch: null name: gssproxy release: 7.el9 source: rpm version: 0.8.4 gzip: - arch: x86_64 epoch: null name: gzip release: 1.el9 source: rpm version: '1.12' hostname: - arch: x86_64 epoch: null name: hostname release: 6.el9 source: rpm version: '3.23' httpd-tools: - arch: x86_64 epoch: null name: httpd-tools release: 10.el9 source: rpm version: 2.4.62 hunspell: - arch: x86_64 epoch: null name: hunspell release: 11.el9 source: rpm version: 1.7.0 hunspell-en-GB: - arch: noarch epoch: null name: hunspell-en-GB release: 20.el9 source: rpm version: 0.20140811.1 hunspell-en-US: - arch: noarch epoch: null name: hunspell-en-US release: 20.el9 source: rpm version: 0.20140811.1 hunspell-filesystem: - arch: x86_64 epoch: null name: hunspell-filesystem release: 11.el9 source: rpm version: 1.7.0 hwdata: - arch: noarch epoch: null name: hwdata release: 9.20.el9 source: rpm version: '0.348' ima-evm-utils: - arch: x86_64 epoch: null name: ima-evm-utils release: 2.el9 source: rpm version: 1.6.2 info: - arch: x86_64 epoch: null name: info release: 15.el9 source: rpm version: '6.7' inih: - arch: x86_64 epoch: null name: inih release: 6.el9 source: rpm version: '49' initscripts-rename-device: - arch: x86_64 epoch: null name: initscripts-rename-device release: 4.el9 source: rpm version: 10.11.8 initscripts-service: - arch: noarch epoch: null name: initscripts-service release: 4.el9 source: rpm version: 10.11.8 ipcalc: - arch: x86_64 epoch: null name: ipcalc release: 5.el9 source: rpm version: 1.0.0 iproute: - arch: x86_64 epoch: null name: iproute release: 1.el9 source: rpm version: 6.17.0 iproute-tc: - arch: x86_64 epoch: null name: iproute-tc release: 1.el9 source: rpm version: 6.17.0 iptables-libs: - arch: x86_64 epoch: null name: iptables-libs release: 11.el9 source: rpm version: 1.8.10 iptables-nft: - arch: x86_64 epoch: null name: iptables-nft release: 11.el9 source: rpm version: 1.8.10 iptables-nft-services: - arch: noarch epoch: null name: iptables-nft-services release: 11.el9 source: rpm version: 1.8.10 iputils: - arch: x86_64 epoch: null name: iputils release: 15.el9 source: rpm version: '20210202' irqbalance: - arch: x86_64 epoch: 2 name: irqbalance release: 5.el9 source: rpm version: 1.9.4 jansson: - arch: x86_64 epoch: null name: jansson release: 1.el9 source: rpm version: '2.14' jq: - arch: x86_64 epoch: null name: jq release: 19.el9 source: rpm version: '1.6' json-c: - arch: x86_64 epoch: null name: json-c release: 11.el9 source: rpm version: '0.14' json-glib: - arch: x86_64 epoch: null name: json-glib release: 1.el9 source: rpm version: 1.6.6 kbd: - arch: x86_64 epoch: null name: kbd release: 11.el9 source: rpm version: 2.4.0 kbd-legacy: - arch: noarch epoch: null name: kbd-legacy release: 11.el9 source: rpm version: 2.4.0 kbd-misc: - arch: noarch epoch: null name: kbd-misc release: 11.el9 source: rpm version: 2.4.0 kernel: - arch: x86_64 epoch: null name: kernel release: 661.el9 source: rpm version: 5.14.0 kernel-core: - arch: x86_64 epoch: null name: kernel-core release: 661.el9 source: rpm version: 5.14.0 kernel-headers: - arch: x86_64 epoch: null name: kernel-headers release: 661.el9 source: rpm version: 5.14.0 kernel-modules: - arch: x86_64 epoch: null name: kernel-modules release: 661.el9 source: rpm version: 5.14.0 kernel-modules-core: - arch: x86_64 epoch: null name: kernel-modules-core release: 661.el9 source: rpm version: 5.14.0 kernel-srpm-macros: - arch: noarch epoch: null name: kernel-srpm-macros release: 14.el9 source: rpm version: '1.0' kernel-tools: - arch: x86_64 epoch: null name: kernel-tools release: 661.el9 source: rpm version: 5.14.0 kernel-tools-libs: - arch: x86_64 epoch: null name: kernel-tools-libs release: 661.el9 source: rpm version: 5.14.0 kexec-tools: - arch: x86_64 epoch: null name: kexec-tools release: 14.el9 source: rpm version: 2.0.29 keyutils: - arch: x86_64 epoch: null name: keyutils release: 1.el9 source: rpm version: 1.6.3 keyutils-libs: - arch: x86_64 epoch: null name: keyutils-libs release: 1.el9 source: rpm version: 1.6.3 kmod: - arch: x86_64 epoch: null name: kmod release: 11.el9 source: rpm version: '28' kmod-libs: - arch: x86_64 epoch: null name: kmod-libs release: 11.el9 source: rpm version: '28' kpartx: - arch: x86_64 epoch: null name: kpartx release: 42.el9 source: rpm version: 0.8.7 krb5-libs: - arch: x86_64 epoch: null name: krb5-libs release: 8.el9 source: rpm version: 1.21.1 langpacks-core-en_GB: - arch: noarch epoch: null name: langpacks-core-en_GB release: 16.el9 source: rpm version: '3.0' langpacks-core-font-en: - arch: noarch epoch: null name: langpacks-core-font-en release: 16.el9 source: rpm version: '3.0' langpacks-en_GB: - arch: noarch epoch: null name: langpacks-en_GB release: 16.el9 source: rpm version: '3.0' less: - arch: x86_64 epoch: null name: less release: 6.el9 source: rpm version: '590' libacl: - arch: x86_64 epoch: null name: libacl release: 4.el9 source: rpm version: 2.3.1 libappstream-glib: - arch: x86_64 epoch: null name: libappstream-glib release: 5.el9 source: rpm version: 0.7.18 libarchive: - arch: x86_64 epoch: null name: libarchive release: 6.el9 source: rpm version: 3.5.3 libassuan: - arch: x86_64 epoch: null name: libassuan release: 3.el9 source: rpm version: 2.5.5 libattr: - arch: x86_64 epoch: null name: libattr release: 3.el9 source: rpm version: 2.5.1 libbasicobjects: - arch: x86_64 epoch: null name: libbasicobjects release: 53.el9 source: rpm version: 0.1.1 libblkid: - arch: x86_64 epoch: null name: libblkid release: 21.el9 source: rpm version: 2.37.4 libbpf: - arch: x86_64 epoch: 2 name: libbpf release: 3.el9 source: rpm version: 1.5.0 libbrotli: - arch: x86_64 epoch: null name: libbrotli release: 7.el9 source: rpm version: 1.0.9 libburn: - arch: x86_64 epoch: null name: libburn release: 5.el9 source: rpm version: 1.5.4 libcap: - arch: x86_64 epoch: null name: libcap release: 10.el9 source: rpm version: '2.48' libcap-ng: - arch: x86_64 epoch: null name: libcap-ng release: 7.el9 source: rpm version: 0.8.2 libcbor: - arch: x86_64 epoch: null name: libcbor release: 5.el9 source: rpm version: 0.7.0 libcollection: - arch: x86_64 epoch: null name: libcollection release: 53.el9 source: rpm version: 0.7.0 libcom_err: - arch: x86_64 epoch: null name: libcom_err release: 8.el9 source: rpm version: 1.46.5 libcomps: - arch: x86_64 epoch: null name: libcomps release: 1.el9 source: rpm version: 0.1.18 libcurl: - arch: x86_64 epoch: null name: libcurl release: 38.el9 source: rpm version: 7.76.1 libdaemon: - arch: x86_64 epoch: null name: libdaemon release: 23.el9 source: rpm version: '0.14' libdb: - arch: x86_64 epoch: null name: libdb release: 57.el9 source: rpm version: 5.3.28 libdhash: - arch: x86_64 epoch: null name: libdhash release: 53.el9 source: rpm version: 0.5.0 libdnf: - arch: x86_64 epoch: null name: libdnf release: 16.el9 source: rpm version: 0.69.0 libeconf: - arch: x86_64 epoch: null name: libeconf release: 5.el9 source: rpm version: 0.4.1 libedit: - arch: x86_64 epoch: null name: libedit release: 38.20210216cvs.el9 source: rpm version: '3.1' libestr: - arch: x86_64 epoch: null name: libestr release: 4.el9 source: rpm version: 0.1.11 libev: - arch: x86_64 epoch: null name: libev release: 6.el9 source: rpm version: '4.33' libevent: - arch: x86_64 epoch: null name: libevent release: 8.el9 source: rpm version: 2.1.12 libfastjson: - arch: x86_64 epoch: null name: libfastjson release: 5.el9 source: rpm version: 0.99.9 libfdisk: - arch: x86_64 epoch: null name: libfdisk release: 21.el9 source: rpm version: 2.37.4 libffi: - arch: x86_64 epoch: null name: libffi release: 8.el9 source: rpm version: 3.4.2 libffi-devel: - arch: x86_64 epoch: null name: libffi-devel release: 8.el9 source: rpm version: 3.4.2 libfido2: - arch: x86_64 epoch: null name: libfido2 release: 2.el9 source: rpm version: 1.13.0 libgcc: - arch: x86_64 epoch: null name: libgcc release: 14.el9 source: rpm version: 11.5.0 libgcrypt: - arch: x86_64 epoch: null name: libgcrypt release: 11.el9 source: rpm version: 1.10.0 libgomp: - arch: x86_64 epoch: null name: libgomp release: 14.el9 source: rpm version: 11.5.0 libgpg-error: - arch: x86_64 epoch: null name: libgpg-error release: 5.el9 source: rpm version: '1.42' libgpg-error-devel: - arch: x86_64 epoch: null name: libgpg-error-devel release: 5.el9 source: rpm version: '1.42' libibverbs: - arch: x86_64 epoch: null name: libibverbs release: 2.el9 source: rpm version: '57.0' libicu: - arch: x86_64 epoch: null name: libicu release: 10.el9 source: rpm version: '67.1' libidn2: - arch: x86_64 epoch: null name: libidn2 release: 7.el9 source: rpm version: 2.3.0 libini_config: - arch: x86_64 epoch: null name: libini_config release: 53.el9 source: rpm version: 1.3.1 libisoburn: - arch: x86_64 epoch: null name: libisoburn release: 5.el9 source: rpm version: 1.5.4 libisofs: - arch: x86_64 epoch: null name: libisofs release: 4.el9 source: rpm version: 1.5.4 libjpeg-turbo: - arch: x86_64 epoch: null name: libjpeg-turbo release: 7.el9 source: rpm version: 2.0.90 libkcapi: - arch: x86_64 epoch: null name: libkcapi release: 2.el9 source: rpm version: 1.4.0 libkcapi-hmaccalc: - arch: x86_64 epoch: null name: libkcapi-hmaccalc release: 2.el9 source: rpm version: 1.4.0 libksba: - arch: x86_64 epoch: null name: libksba release: 7.el9 source: rpm version: 1.5.1 libldb: - arch: x86_64 epoch: 0 name: libldb release: 2.el9 source: rpm version: 4.23.4 libmaxminddb: - arch: x86_64 epoch: null name: libmaxminddb release: 4.el9 source: rpm version: 1.5.2 libmnl: - arch: x86_64 epoch: null name: libmnl release: 16.el9 source: rpm version: 1.0.4 libmodulemd: - arch: x86_64 epoch: null name: libmodulemd release: 2.el9 source: rpm version: 2.13.0 libmount: - arch: x86_64 epoch: null name: libmount release: 21.el9 source: rpm version: 2.37.4 libmpc: - arch: x86_64 epoch: null name: libmpc release: 4.el9 source: rpm version: 1.2.1 libndp: - arch: x86_64 epoch: null name: libndp release: 1.el9 source: rpm version: '1.9' libnet: - arch: x86_64 epoch: null name: libnet release: 7.el9 source: rpm version: '1.2' libnetfilter_conntrack: - arch: x86_64 epoch: null name: libnetfilter_conntrack release: 1.el9 source: rpm version: 1.0.9 libnfnetlink: - arch: x86_64 epoch: null name: libnfnetlink release: 23.el9 source: rpm version: 1.0.1 libnfsidmap: - arch: x86_64 epoch: 1 name: libnfsidmap release: 41.el9 source: rpm version: 2.5.4 libnftnl: - arch: x86_64 epoch: null name: libnftnl release: 4.el9 source: rpm version: 1.2.6 libnghttp2: - arch: x86_64 epoch: null name: libnghttp2 release: 6.el9 source: rpm version: 1.43.0 libnl3: - arch: x86_64 epoch: null name: libnl3 release: 1.el9 source: rpm version: 3.11.0 libnl3-cli: - arch: x86_64 epoch: null name: libnl3-cli release: 1.el9 source: rpm version: 3.11.0 libosinfo: - arch: x86_64 epoch: null name: libosinfo release: 1.el9 source: rpm version: 1.10.0 libpath_utils: - arch: x86_64 epoch: null name: libpath_utils release: 53.el9 source: rpm version: 0.2.1 libpcap: - arch: x86_64 epoch: 14 name: libpcap release: 4.el9 source: rpm version: 1.10.0 libpipeline: - arch: x86_64 epoch: null name: libpipeline release: 4.el9 source: rpm version: 1.5.3 libpkgconf: - arch: x86_64 epoch: null name: libpkgconf release: 10.el9 source: rpm version: 1.7.3 libpng: - arch: x86_64 epoch: 2 name: libpng release: 12.el9 source: rpm version: 1.6.37 libproxy: - arch: x86_64 epoch: null name: libproxy release: 35.el9 source: rpm version: 0.4.15 libproxy-webkitgtk4: - arch: x86_64 epoch: null name: libproxy-webkitgtk4 release: 35.el9 source: rpm version: 0.4.15 libpsl: - arch: x86_64 epoch: null name: libpsl release: 5.el9 source: rpm version: 0.21.1 libpwquality: - arch: x86_64 epoch: null name: libpwquality release: 8.el9 source: rpm version: 1.4.4 libref_array: - arch: x86_64 epoch: null name: libref_array release: 53.el9 source: rpm version: 0.1.5 librepo: - arch: x86_64 epoch: null name: librepo release: 1.el9 source: rpm version: 1.19.0 libreport-filesystem: - arch: noarch epoch: null name: libreport-filesystem release: 6.el9 source: rpm version: 2.15.2 libseccomp: - arch: x86_64 epoch: null name: libseccomp release: 2.el9 source: rpm version: 2.5.2 libselinux: - arch: x86_64 epoch: null name: libselinux release: 3.el9 source: rpm version: '3.6' libselinux-utils: - arch: x86_64 epoch: null name: libselinux-utils release: 3.el9 source: rpm version: '3.6' libsemanage: - arch: x86_64 epoch: null name: libsemanage release: 5.el9 source: rpm version: '3.6' libsepol: - arch: x86_64 epoch: null name: libsepol release: 3.el9 source: rpm version: '3.6' libsigsegv: - arch: x86_64 epoch: null name: libsigsegv release: 4.el9 source: rpm version: '2.13' libslirp: - arch: x86_64 epoch: null name: libslirp release: 8.el9 source: rpm version: 4.4.0 libsmartcols: - arch: x86_64 epoch: null name: libsmartcols release: 21.el9 source: rpm version: 2.37.4 libsolv: - arch: x86_64 epoch: null name: libsolv release: 3.el9 source: rpm version: 0.7.24 libsoup: - arch: x86_64 epoch: null name: libsoup release: 10.el9 source: rpm version: 2.72.0 libss: - arch: x86_64 epoch: null name: libss release: 8.el9 source: rpm version: 1.46.5 libssh: - arch: x86_64 epoch: null name: libssh release: 17.el9 source: rpm version: 0.10.4 libssh-config: - arch: noarch epoch: null name: libssh-config release: 17.el9 source: rpm version: 0.10.4 libsss_certmap: - arch: x86_64 epoch: null name: libsss_certmap release: 5.el9 source: rpm version: 2.9.7 libsss_idmap: - arch: x86_64 epoch: null name: libsss_idmap release: 5.el9 source: rpm version: 2.9.7 libsss_nss_idmap: - arch: x86_64 epoch: null name: libsss_nss_idmap release: 5.el9 source: rpm version: 2.9.7 libsss_sudo: - arch: x86_64 epoch: null name: libsss_sudo release: 5.el9 source: rpm version: 2.9.7 libstdc++: - arch: x86_64 epoch: null name: libstdc++ release: 14.el9 source: rpm version: 11.5.0 libstdc++-devel: - arch: x86_64 epoch: null name: libstdc++-devel release: 14.el9 source: rpm version: 11.5.0 libstemmer: - arch: x86_64 epoch: null name: libstemmer release: 18.585svn.el9 source: rpm version: '0' libsysfs: - arch: x86_64 epoch: null name: libsysfs release: 11.el9 source: rpm version: 2.1.1 libtalloc: - arch: x86_64 epoch: null name: libtalloc release: 1.el9 source: rpm version: 2.4.3 libtasn1: - arch: x86_64 epoch: null name: libtasn1 release: 9.el9 source: rpm version: 4.16.0 libtdb: - arch: x86_64 epoch: null name: libtdb release: 1.el9 source: rpm version: 1.4.14 libteam: - arch: x86_64 epoch: null name: libteam release: 16.el9 source: rpm version: '1.31' libtevent: - arch: x86_64 epoch: null name: libtevent release: 1.el9 source: rpm version: 0.17.1 libtirpc: - arch: x86_64 epoch: null name: libtirpc release: 9.el9 source: rpm version: 1.3.3 libtool-ltdl: - arch: x86_64 epoch: null name: libtool-ltdl release: 46.el9 source: rpm version: 2.4.6 libunistring: - arch: x86_64 epoch: null name: libunistring release: 15.el9 source: rpm version: 0.9.10 liburing: - arch: x86_64 epoch: null name: liburing release: 1.el9 source: rpm version: '2.12' libuser: - arch: x86_64 epoch: null name: libuser release: 17.el9 source: rpm version: '0.63' libutempter: - arch: x86_64 epoch: null name: libutempter release: 6.el9 source: rpm version: 1.2.1 libuuid: - arch: x86_64 epoch: null name: libuuid release: 21.el9 source: rpm version: 2.37.4 libverto: - arch: x86_64 epoch: null name: libverto release: 3.el9 source: rpm version: 0.3.2 libverto-libev: - arch: x86_64 epoch: null name: libverto-libev release: 3.el9 source: rpm version: 0.3.2 libvirt-client: - arch: x86_64 epoch: null name: libvirt-client release: 2.el9 source: rpm version: 11.10.0 libvirt-libs: - arch: x86_64 epoch: null name: libvirt-libs release: 2.el9 source: rpm version: 11.10.0 libxcrypt: - arch: x86_64 epoch: null name: libxcrypt release: 3.el9 source: rpm version: 4.4.18 libxcrypt-compat: - arch: x86_64 epoch: null name: libxcrypt-compat release: 3.el9 source: rpm version: 4.4.18 libxcrypt-devel: - arch: x86_64 epoch: null name: libxcrypt-devel release: 3.el9 source: rpm version: 4.4.18 libxml2: - arch: x86_64 epoch: null name: libxml2 release: 14.el9 source: rpm version: 2.9.13 libxml2-devel: - arch: x86_64 epoch: null name: libxml2-devel release: 14.el9 source: rpm version: 2.9.13 libxslt: - arch: x86_64 epoch: null name: libxslt release: 12.el9 source: rpm version: 1.1.34 libxslt-devel: - arch: x86_64 epoch: null name: libxslt-devel release: 12.el9 source: rpm version: 1.1.34 libyaml: - arch: x86_64 epoch: null name: libyaml release: 7.el9 source: rpm version: 0.2.5 libzstd: - arch: x86_64 epoch: null name: libzstd release: 1.el9 source: rpm version: 1.5.5 llvm-filesystem: - arch: x86_64 epoch: null name: llvm-filesystem release: 1.el9 source: rpm version: 21.1.7 llvm-libs: - arch: x86_64 epoch: null name: llvm-libs release: 1.el9 source: rpm version: 21.1.7 lmdb-libs: - arch: x86_64 epoch: null name: lmdb-libs release: 3.el9 source: rpm version: 0.9.29 logrotate: - arch: x86_64 epoch: null name: logrotate release: 12.el9 source: rpm version: 3.18.0 lshw: - arch: x86_64 epoch: null name: lshw release: 4.el9 source: rpm version: B.02.20 lsscsi: - arch: x86_64 epoch: null name: lsscsi release: 6.el9 source: rpm version: '0.32' lua-libs: - arch: x86_64 epoch: null name: lua-libs release: 4.el9 source: rpm version: 5.4.4 lua-srpm-macros: - arch: noarch epoch: null name: lua-srpm-macros release: 6.el9 source: rpm version: '1' lz4-libs: - arch: x86_64 epoch: null name: lz4-libs release: 5.el9 source: rpm version: 1.9.3 lzo: - arch: x86_64 epoch: null name: lzo release: 7.el9 source: rpm version: '2.10' make: - arch: x86_64 epoch: 1 name: make release: 8.el9 source: rpm version: '4.3' man-db: - arch: x86_64 epoch: null name: man-db release: 9.el9 source: rpm version: 2.9.3 microcode_ctl: - arch: noarch epoch: 4 name: microcode_ctl release: 1.el9 source: rpm version: '20251111' mpfr: - arch: x86_64 epoch: null name: mpfr release: 8.el9 source: rpm version: 4.1.0 ncurses: - arch: x86_64 epoch: null name: ncurses release: 12.20210508.el9 source: rpm version: '6.2' ncurses-base: - arch: noarch epoch: null name: ncurses-base release: 12.20210508.el9 source: rpm version: '6.2' ncurses-c++-libs: - arch: x86_64 epoch: null name: ncurses-c++-libs release: 12.20210508.el9 source: rpm version: '6.2' ncurses-devel: - arch: x86_64 epoch: null name: ncurses-devel release: 12.20210508.el9 source: rpm version: '6.2' ncurses-libs: - arch: x86_64 epoch: null name: ncurses-libs release: 12.20210508.el9 source: rpm version: '6.2' netavark: - arch: x86_64 epoch: 2 name: netavark release: 1.el9 source: rpm version: 1.16.0 nettle: - arch: x86_64 epoch: null name: nettle release: 1.el9 source: rpm version: 3.10.1 newt: - arch: x86_64 epoch: null name: newt release: 11.el9 source: rpm version: 0.52.21 nfs-utils: - arch: x86_64 epoch: 1 name: nfs-utils release: 41.el9 source: rpm version: 2.5.4 nftables: - arch: x86_64 epoch: 1 name: nftables release: 6.el9 source: rpm version: 1.0.9 npth: - arch: x86_64 epoch: null name: npth release: 8.el9 source: rpm version: '1.6' numactl-libs: - arch: x86_64 epoch: null name: numactl-libs release: 3.el9 source: rpm version: 2.0.19 ocaml-srpm-macros: - arch: noarch epoch: null name: ocaml-srpm-macros release: 6.el9 source: rpm version: '6' oddjob: - arch: x86_64 epoch: null name: oddjob release: 7.el9 source: rpm version: 0.34.7 oddjob-mkhomedir: - arch: x86_64 epoch: null name: oddjob-mkhomedir release: 7.el9 source: rpm version: 0.34.7 oniguruma: - arch: x86_64 epoch: null name: oniguruma release: 1.el9.6 source: rpm version: 6.9.6 openblas-srpm-macros: - arch: noarch epoch: null name: openblas-srpm-macros release: 11.el9 source: rpm version: '2' openldap: - arch: x86_64 epoch: null name: openldap release: 4.el9 source: rpm version: 2.6.8 openldap-devel: - arch: x86_64 epoch: null name: openldap-devel release: 4.el9 source: rpm version: 2.6.8 openssh: - arch: x86_64 epoch: null name: openssh release: 3.el9 source: rpm version: 9.9p1 openssh-clients: - arch: x86_64 epoch: null name: openssh-clients release: 3.el9 source: rpm version: 9.9p1 openssh-server: - arch: x86_64 epoch: null name: openssh-server release: 3.el9 source: rpm version: 9.9p1 openssl: - arch: x86_64 epoch: 1 name: openssl release: 6.el9 source: rpm version: 3.5.1 openssl-devel: - arch: x86_64 epoch: 1 name: openssl-devel release: 6.el9 source: rpm version: 3.5.1 openssl-fips-provider: - arch: x86_64 epoch: 1 name: openssl-fips-provider release: 6.el9 source: rpm version: 3.5.1 openssl-libs: - arch: x86_64 epoch: 1 name: openssl-libs release: 6.el9 source: rpm version: 3.5.1 os-prober: - arch: x86_64 epoch: null name: os-prober release: 12.el9 source: rpm version: '1.77' osinfo-db: - arch: noarch epoch: null name: osinfo-db release: 1.el9 source: rpm version: '20250606' osinfo-db-tools: - arch: x86_64 epoch: null name: osinfo-db-tools release: 1.el9 source: rpm version: 1.10.0 p11-kit: - arch: x86_64 epoch: null name: p11-kit release: 1.el9 source: rpm version: 0.25.10 p11-kit-trust: - arch: x86_64 epoch: null name: p11-kit-trust release: 1.el9 source: rpm version: 0.25.10 pam: - arch: x86_64 epoch: null name: pam release: 28.el9 source: rpm version: 1.5.1 parted: - arch: x86_64 epoch: null name: parted release: 3.el9 source: rpm version: '3.5' passt: - arch: x86_64 epoch: null name: passt release: 2.el9 source: rpm version: 0^20251210.gd04c480 passt-selinux: - arch: noarch epoch: null name: passt-selinux release: 2.el9 source: rpm version: 0^20251210.gd04c480 passwd: - arch: x86_64 epoch: null name: passwd release: 12.el9 source: rpm version: '0.80' patch: - arch: x86_64 epoch: null name: patch release: 16.el9 source: rpm version: 2.7.6 pciutils-libs: - arch: x86_64 epoch: null name: pciutils-libs release: 7.el9 source: rpm version: 3.7.0 pcre: - arch: x86_64 epoch: null name: pcre release: 4.el9 source: rpm version: '8.44' pcre2: - arch: x86_64 epoch: null name: pcre2 release: 6.el9 source: rpm version: '10.40' pcre2-syntax: - arch: noarch epoch: null name: pcre2-syntax release: 6.el9 source: rpm version: '10.40' perl-AutoLoader: - arch: noarch epoch: 0 name: perl-AutoLoader release: 483.el9 source: rpm version: '5.74' perl-B: - arch: x86_64 epoch: 0 name: perl-B release: 483.el9 source: rpm version: '1.80' perl-Carp: - arch: noarch epoch: null name: perl-Carp release: 460.el9 source: rpm version: '1.50' perl-Class-Struct: - arch: noarch epoch: 0 name: perl-Class-Struct release: 483.el9 source: rpm version: '0.66' perl-Data-Dumper: - arch: x86_64 epoch: null name: perl-Data-Dumper release: 462.el9 source: rpm version: '2.174' perl-Digest: - arch: noarch epoch: null name: perl-Digest release: 4.el9 source: rpm version: '1.19' perl-Digest-MD5: - arch: x86_64 epoch: null name: perl-Digest-MD5 release: 4.el9 source: rpm version: '2.58' perl-DynaLoader: - arch: x86_64 epoch: 0 name: perl-DynaLoader release: 483.el9 source: rpm version: '1.47' perl-Encode: - arch: x86_64 epoch: 4 name: perl-Encode release: 462.el9 source: rpm version: '3.08' perl-Errno: - arch: x86_64 epoch: 0 name: perl-Errno release: 483.el9 source: rpm version: '1.30' perl-Error: - arch: noarch epoch: 1 name: perl-Error release: 7.el9 source: rpm version: '0.17029' perl-Exporter: - arch: noarch epoch: null name: perl-Exporter release: 461.el9 source: rpm version: '5.74' perl-Fcntl: - arch: x86_64 epoch: 0 name: perl-Fcntl release: 483.el9 source: rpm version: '1.13' perl-File-Basename: - arch: noarch epoch: 0 name: perl-File-Basename release: 483.el9 source: rpm version: '2.85' perl-File-Find: - arch: noarch epoch: 0 name: perl-File-Find release: 483.el9 source: rpm version: '1.37' perl-File-Path: - arch: noarch epoch: null name: perl-File-Path release: 4.el9 source: rpm version: '2.18' perl-File-Temp: - arch: noarch epoch: 1 name: perl-File-Temp release: 4.el9 source: rpm version: 0.231.100 perl-File-stat: - arch: noarch epoch: 0 name: perl-File-stat release: 483.el9 source: rpm version: '1.09' perl-FileHandle: - arch: noarch epoch: 0 name: perl-FileHandle release: 483.el9 source: rpm version: '2.03' perl-Getopt-Long: - arch: noarch epoch: 1 name: perl-Getopt-Long release: 4.el9 source: rpm version: '2.52' perl-Getopt-Std: - arch: noarch epoch: 0 name: perl-Getopt-Std release: 483.el9 source: rpm version: '1.12' perl-Git: - arch: noarch epoch: null name: perl-Git release: 1.el9 source: rpm version: 2.47.3 perl-HTTP-Tiny: - arch: noarch epoch: null name: perl-HTTP-Tiny release: 462.el9 source: rpm version: '0.076' perl-IO: - arch: x86_64 epoch: 0 name: perl-IO release: 483.el9 source: rpm version: '1.43' perl-IO-Socket-IP: - arch: noarch epoch: null name: perl-IO-Socket-IP release: 5.el9 source: rpm version: '0.41' perl-IO-Socket-SSL: - arch: noarch epoch: null name: perl-IO-Socket-SSL release: 2.el9 source: rpm version: '2.073' perl-IPC-Open3: - arch: noarch epoch: 0 name: perl-IPC-Open3 release: 483.el9 source: rpm version: '1.21' perl-MIME-Base64: - arch: x86_64 epoch: null name: perl-MIME-Base64 release: 4.el9 source: rpm version: '3.16' perl-Mozilla-CA: - arch: noarch epoch: null name: perl-Mozilla-CA release: 6.el9 source: rpm version: '20200520' perl-NDBM_File: - arch: x86_64 epoch: 0 name: perl-NDBM_File release: 483.el9 source: rpm version: '1.15' perl-Net-SSLeay: - arch: x86_64 epoch: null name: perl-Net-SSLeay release: 3.el9 source: rpm version: '1.94' perl-POSIX: - arch: x86_64 epoch: 0 name: perl-POSIX release: 483.el9 source: rpm version: '1.94' perl-PathTools: - arch: x86_64 epoch: null name: perl-PathTools release: 461.el9 source: rpm version: '3.78' perl-Pod-Escapes: - arch: noarch epoch: 1 name: perl-Pod-Escapes release: 460.el9 source: rpm version: '1.07' perl-Pod-Perldoc: - arch: noarch epoch: null name: perl-Pod-Perldoc release: 461.el9 source: rpm version: 3.28.01 perl-Pod-Simple: - arch: noarch epoch: 1 name: perl-Pod-Simple release: 4.el9 source: rpm version: '3.42' perl-Pod-Usage: - arch: noarch epoch: 4 name: perl-Pod-Usage release: 4.el9 source: rpm version: '2.01' perl-Scalar-List-Utils: - arch: x86_64 epoch: 4 name: perl-Scalar-List-Utils release: 462.el9 source: rpm version: '1.56' perl-SelectSaver: - arch: noarch epoch: 0 name: perl-SelectSaver release: 483.el9 source: rpm version: '1.02' perl-Socket: - arch: x86_64 epoch: 4 name: perl-Socket release: 4.el9 source: rpm version: '2.031' perl-Storable: - arch: x86_64 epoch: 1 name: perl-Storable release: 460.el9 source: rpm version: '3.21' perl-Symbol: - arch: noarch epoch: 0 name: perl-Symbol release: 483.el9 source: rpm version: '1.08' perl-Term-ANSIColor: - arch: noarch epoch: null name: perl-Term-ANSIColor release: 461.el9 source: rpm version: '5.01' perl-Term-Cap: - arch: noarch epoch: null name: perl-Term-Cap release: 460.el9 source: rpm version: '1.17' perl-TermReadKey: - arch: x86_64 epoch: null name: perl-TermReadKey release: 11.el9 source: rpm version: '2.38' perl-Text-ParseWords: - arch: noarch epoch: null name: perl-Text-ParseWords release: 460.el9 source: rpm version: '3.30' perl-Text-Tabs+Wrap: - arch: noarch epoch: null name: perl-Text-Tabs+Wrap release: 460.el9 source: rpm version: '2013.0523' perl-Time-Local: - arch: noarch epoch: 2 name: perl-Time-Local release: 7.el9 source: rpm version: '1.300' perl-URI: - arch: noarch epoch: null name: perl-URI release: 3.el9 source: rpm version: '5.09' perl-base: - arch: noarch epoch: 0 name: perl-base release: 483.el9 source: rpm version: '2.27' perl-constant: - arch: noarch epoch: null name: perl-constant release: 461.el9 source: rpm version: '1.33' perl-if: - arch: noarch epoch: 0 name: perl-if release: 483.el9 source: rpm version: 0.60.800 perl-interpreter: - arch: x86_64 epoch: 4 name: perl-interpreter release: 483.el9 source: rpm version: 5.32.1 perl-lib: - arch: x86_64 epoch: 0 name: perl-lib release: 483.el9 source: rpm version: '0.65' perl-libnet: - arch: noarch epoch: null name: perl-libnet release: 4.el9 source: rpm version: '3.13' perl-libs: - arch: x86_64 epoch: 4 name: perl-libs release: 483.el9 source: rpm version: 5.32.1 perl-mro: - arch: x86_64 epoch: 0 name: perl-mro release: 483.el9 source: rpm version: '1.23' perl-overload: - arch: noarch epoch: 0 name: perl-overload release: 483.el9 source: rpm version: '1.31' perl-overloading: - arch: noarch epoch: 0 name: perl-overloading release: 483.el9 source: rpm version: '0.02' perl-parent: - arch: noarch epoch: 1 name: perl-parent release: 460.el9 source: rpm version: '0.238' perl-podlators: - arch: noarch epoch: 1 name: perl-podlators release: 460.el9 source: rpm version: '4.14' perl-srpm-macros: - arch: noarch epoch: null name: perl-srpm-macros release: 41.el9 source: rpm version: '1' perl-subs: - arch: noarch epoch: 0 name: perl-subs release: 483.el9 source: rpm version: '1.03' perl-vars: - arch: noarch epoch: 0 name: perl-vars release: 483.el9 source: rpm version: '1.05' pigz: - arch: x86_64 epoch: null name: pigz release: 4.el9 source: rpm version: '2.5' pkgconf: - arch: x86_64 epoch: null name: pkgconf release: 10.el9 source: rpm version: 1.7.3 pkgconf-m4: - arch: noarch epoch: null name: pkgconf-m4 release: 10.el9 source: rpm version: 1.7.3 pkgconf-pkg-config: - arch: x86_64 epoch: null name: pkgconf-pkg-config release: 10.el9 source: rpm version: 1.7.3 podman: - arch: x86_64 epoch: 6 name: podman release: 2.el9 source: rpm version: 5.6.0 policycoreutils: - arch: x86_64 epoch: null name: policycoreutils release: 4.el9 source: rpm version: '3.6' policycoreutils-python-utils: - arch: noarch epoch: null name: policycoreutils-python-utils release: 4.el9 source: rpm version: '3.6' polkit: - arch: x86_64 epoch: null name: polkit release: 14.el9 source: rpm version: '0.117' polkit-libs: - arch: x86_64 epoch: null name: polkit-libs release: 14.el9 source: rpm version: '0.117' polkit-pkla-compat: - arch: x86_64 epoch: null name: polkit-pkla-compat release: 21.el9 source: rpm version: '0.1' popt: - arch: x86_64 epoch: null name: popt release: 8.el9 source: rpm version: '1.18' prefixdevname: - arch: x86_64 epoch: null name: prefixdevname release: 8.el9 source: rpm version: 0.1.0 procps-ng: - arch: x86_64 epoch: null name: procps-ng release: 14.el9 source: rpm version: 3.3.17 protobuf-c: - arch: x86_64 epoch: null name: protobuf-c release: 13.el9 source: rpm version: 1.3.3 psmisc: - arch: x86_64 epoch: null name: psmisc release: 3.el9 source: rpm version: '23.4' publicsuffix-list-dafsa: - arch: noarch epoch: null name: publicsuffix-list-dafsa release: 3.el9 source: rpm version: '20210518' pyproject-srpm-macros: - arch: noarch epoch: null name: pyproject-srpm-macros release: 1.el9 source: rpm version: 1.18.5 python-rpm-macros: - arch: noarch epoch: null name: python-rpm-macros release: 54.el9 source: rpm version: '3.9' python-srpm-macros: - arch: noarch epoch: null name: python-srpm-macros release: 54.el9 source: rpm version: '3.9' python-unversioned-command: - arch: noarch epoch: null name: python-unversioned-command release: 3.el9 source: rpm version: 3.9.25 python3: - arch: x86_64 epoch: null name: python3 release: 3.el9 source: rpm version: 3.9.25 python3-argcomplete: - arch: noarch epoch: null name: python3-argcomplete release: 5.el9 source: rpm version: 1.12.0 python3-attrs: - arch: noarch epoch: null name: python3-attrs release: 7.el9 source: rpm version: 20.3.0 python3-audit: - arch: x86_64 epoch: null name: python3-audit release: 8.el9 source: rpm version: 3.1.5 python3-babel: - arch: noarch epoch: null name: python3-babel release: 2.el9 source: rpm version: 2.9.1 python3-cffi: - arch: x86_64 epoch: null name: python3-cffi release: 5.el9 source: rpm version: 1.14.5 python3-chardet: - arch: noarch epoch: null name: python3-chardet release: 5.el9 source: rpm version: 4.0.0 python3-configobj: - arch: noarch epoch: null name: python3-configobj release: 25.el9 source: rpm version: 5.0.6 python3-cryptography: - arch: x86_64 epoch: null name: python3-cryptography release: 5.el9 source: rpm version: 36.0.1 python3-dasbus: - arch: noarch epoch: null name: python3-dasbus release: 1.el9 source: rpm version: '1.7' python3-dateutil: - arch: noarch epoch: 1 name: python3-dateutil release: 1.el9 source: rpm version: 2.9.0.post0 python3-dbus: - arch: x86_64 epoch: null name: python3-dbus release: 2.el9 source: rpm version: 1.2.18 python3-devel: - arch: x86_64 epoch: null name: python3-devel release: 3.el9 source: rpm version: 3.9.25 python3-distro: - arch: noarch epoch: null name: python3-distro release: 7.el9 source: rpm version: 1.5.0 python3-dnf: - arch: noarch epoch: null name: python3-dnf release: 31.el9 source: rpm version: 4.14.0 python3-dnf-plugins-core: - arch: noarch epoch: null name: python3-dnf-plugins-core release: 25.el9 source: rpm version: 4.3.0 python3-enchant: - arch: noarch epoch: null name: python3-enchant release: 5.el9 source: rpm version: 3.2.0 python3-file-magic: - arch: noarch epoch: null name: python3-file-magic release: 16.el9 source: rpm version: '5.39' python3-gobject-base: - arch: x86_64 epoch: null name: python3-gobject-base release: 6.el9 source: rpm version: 3.40.1 python3-gobject-base-noarch: - arch: noarch epoch: null name: python3-gobject-base-noarch release: 6.el9 source: rpm version: 3.40.1 python3-gpg: - arch: x86_64 epoch: null name: python3-gpg release: 6.el9 source: rpm version: 1.15.1 python3-hawkey: - arch: x86_64 epoch: null name: python3-hawkey release: 16.el9 source: rpm version: 0.69.0 python3-idna: - arch: noarch epoch: null name: python3-idna release: 7.el9.1 source: rpm version: '2.10' python3-jinja2: - arch: noarch epoch: null name: python3-jinja2 release: 8.el9 source: rpm version: 2.11.3 python3-jmespath: - arch: noarch epoch: null name: python3-jmespath release: 1.el9 source: rpm version: 1.0.1 python3-jsonpatch: - arch: noarch epoch: null name: python3-jsonpatch release: 16.el9 source: rpm version: '1.21' python3-jsonpointer: - arch: noarch epoch: null name: python3-jsonpointer release: 4.el9 source: rpm version: '2.0' python3-jsonschema: - arch: noarch epoch: null name: python3-jsonschema release: 13.el9 source: rpm version: 3.2.0 python3-libcomps: - arch: x86_64 epoch: null name: python3-libcomps release: 1.el9 source: rpm version: 0.1.18 python3-libdnf: - arch: x86_64 epoch: null name: python3-libdnf release: 16.el9 source: rpm version: 0.69.0 python3-libs: - arch: x86_64 epoch: null name: python3-libs release: 3.el9 source: rpm version: 3.9.25 python3-libselinux: - arch: x86_64 epoch: null name: python3-libselinux release: 3.el9 source: rpm version: '3.6' python3-libsemanage: - arch: x86_64 epoch: null name: python3-libsemanage release: 5.el9 source: rpm version: '3.6' python3-libvirt: - arch: x86_64 epoch: null name: python3-libvirt release: 1.el9 source: rpm version: 11.10.0 python3-libxml2: - arch: x86_64 epoch: null name: python3-libxml2 release: 14.el9 source: rpm version: 2.9.13 python3-lxml: - arch: x86_64 epoch: null name: python3-lxml release: 3.el9 source: rpm version: 4.6.5 python3-markupsafe: - arch: x86_64 epoch: null name: python3-markupsafe release: 12.el9 source: rpm version: 1.1.1 python3-netaddr: - arch: noarch epoch: null name: python3-netaddr release: 3.el9 source: rpm version: 0.10.1 python3-netifaces: - arch: x86_64 epoch: null name: python3-netifaces release: 15.el9 source: rpm version: 0.10.6 python3-oauthlib: - arch: noarch epoch: null name: python3-oauthlib release: 5.el9 source: rpm version: 3.1.1 python3-packaging: - arch: noarch epoch: null name: python3-packaging release: 5.el9 source: rpm version: '20.9' python3-pexpect: - arch: noarch epoch: null name: python3-pexpect release: 7.el9 source: rpm version: 4.8.0 python3-pip: - arch: noarch epoch: null name: python3-pip release: 1.el9 source: rpm version: 21.3.1 python3-pip-wheel: - arch: noarch epoch: null name: python3-pip-wheel release: 1.el9 source: rpm version: 21.3.1 python3-ply: - arch: noarch epoch: null name: python3-ply release: 14.el9 source: rpm version: '3.11' python3-policycoreutils: - arch: noarch epoch: null name: python3-policycoreutils release: 4.el9 source: rpm version: '3.6' python3-prettytable: - arch: noarch epoch: null name: python3-prettytable release: 27.el9 source: rpm version: 0.7.2 python3-ptyprocess: - arch: noarch epoch: null name: python3-ptyprocess release: 12.el9 source: rpm version: 0.6.0 python3-pycparser: - arch: noarch epoch: null name: python3-pycparser release: 6.el9 source: rpm version: '2.20' python3-pyparsing: - arch: noarch epoch: null name: python3-pyparsing release: 9.el9 source: rpm version: 2.4.7 python3-pyrsistent: - arch: x86_64 epoch: null name: python3-pyrsistent release: 8.el9 source: rpm version: 0.17.3 python3-pyserial: - arch: noarch epoch: null name: python3-pyserial release: 12.el9 source: rpm version: '3.4' python3-pysocks: - arch: noarch epoch: null name: python3-pysocks release: 12.el9 source: rpm version: 1.7.1 python3-pytz: - arch: noarch epoch: null name: python3-pytz release: 5.el9 source: rpm version: '2021.1' python3-pyyaml: - arch: x86_64 epoch: null name: python3-pyyaml release: 6.el9 source: rpm version: 5.4.1 python3-requests: - arch: noarch epoch: null name: python3-requests release: 10.el9 source: rpm version: 2.25.1 python3-resolvelib: - arch: noarch epoch: null name: python3-resolvelib release: 5.el9 source: rpm version: 0.5.4 python3-rpm: - arch: x86_64 epoch: null name: python3-rpm release: 40.el9 source: rpm version: 4.16.1.3 python3-rpm-generators: - arch: noarch epoch: null name: python3-rpm-generators release: 9.el9 source: rpm version: '12' python3-rpm-macros: - arch: noarch epoch: null name: python3-rpm-macros release: 54.el9 source: rpm version: '3.9' python3-setools: - arch: x86_64 epoch: null name: python3-setools release: 1.el9 source: rpm version: 4.4.4 python3-setuptools: - arch: noarch epoch: null name: python3-setuptools release: 15.el9 source: rpm version: 53.0.0 python3-setuptools-wheel: - arch: noarch epoch: null name: python3-setuptools-wheel release: 15.el9 source: rpm version: 53.0.0 python3-six: - arch: noarch epoch: null name: python3-six release: 9.el9 source: rpm version: 1.15.0 python3-systemd: - arch: x86_64 epoch: null name: python3-systemd release: 19.el9 source: rpm version: '234' python3-urllib3: - arch: noarch epoch: null name: python3-urllib3 release: 6.el9 source: rpm version: 1.26.5 qemu-guest-agent: - arch: x86_64 epoch: 17 name: qemu-guest-agent release: 10.el9 source: rpm version: 10.1.0 qt5-srpm-macros: - arch: noarch epoch: null name: qt5-srpm-macros release: 1.el9 source: rpm version: 5.15.9 quota: - arch: x86_64 epoch: 1 name: quota release: 4.el9 source: rpm version: '4.09' quota-nls: - arch: noarch epoch: 1 name: quota-nls release: 4.el9 source: rpm version: '4.09' readline: - arch: x86_64 epoch: null name: readline release: 4.el9 source: rpm version: '8.1' readline-devel: - arch: x86_64 epoch: null name: readline-devel release: 4.el9 source: rpm version: '8.1' redhat-rpm-config: - arch: noarch epoch: null name: redhat-rpm-config release: 1.el9 source: rpm version: '210' rootfiles: - arch: noarch epoch: null name: rootfiles release: 35.el9 source: rpm version: '8.1' rpcbind: - arch: x86_64 epoch: null name: rpcbind release: 7.el9 source: rpm version: 1.2.6 rpm: - arch: x86_64 epoch: null name: rpm release: 40.el9 source: rpm version: 4.16.1.3 rpm-build: - arch: x86_64 epoch: null name: rpm-build release: 40.el9 source: rpm version: 4.16.1.3 rpm-build-libs: - arch: x86_64 epoch: null name: rpm-build-libs release: 40.el9 source: rpm version: 4.16.1.3 rpm-libs: - arch: x86_64 epoch: null name: rpm-libs release: 40.el9 source: rpm version: 4.16.1.3 rpm-plugin-audit: - arch: x86_64 epoch: null name: rpm-plugin-audit release: 40.el9 source: rpm version: 4.16.1.3 rpm-plugin-selinux: - arch: x86_64 epoch: null name: rpm-plugin-selinux release: 40.el9 source: rpm version: 4.16.1.3 rpm-plugin-systemd-inhibit: - arch: x86_64 epoch: null name: rpm-plugin-systemd-inhibit release: 40.el9 source: rpm version: 4.16.1.3 rpm-sign: - arch: x86_64 epoch: null name: rpm-sign release: 40.el9 source: rpm version: 4.16.1.3 rpm-sign-libs: - arch: x86_64 epoch: null name: rpm-sign-libs release: 40.el9 source: rpm version: 4.16.1.3 rpmlint: - arch: noarch epoch: null name: rpmlint release: 19.el9 source: rpm version: '1.11' rsync: - arch: x86_64 epoch: null name: rsync release: 4.el9 source: rpm version: 3.2.5 rsyslog: - arch: x86_64 epoch: null name: rsyslog release: 2.el9 source: rpm version: 8.2510.0 rsyslog-logrotate: - arch: x86_64 epoch: null name: rsyslog-logrotate release: 2.el9 source: rpm version: 8.2510.0 ruby: - arch: x86_64 epoch: null name: ruby release: 165.el9 source: rpm version: 3.0.7 ruby-default-gems: - arch: noarch epoch: null name: ruby-default-gems release: 165.el9 source: rpm version: 3.0.7 ruby-devel: - arch: x86_64 epoch: null name: ruby-devel release: 165.el9 source: rpm version: 3.0.7 ruby-libs: - arch: x86_64 epoch: null name: ruby-libs release: 165.el9 source: rpm version: 3.0.7 rubygem-bigdecimal: - arch: x86_64 epoch: null name: rubygem-bigdecimal release: 165.el9 source: rpm version: 3.0.0 rubygem-bundler: - arch: noarch epoch: null name: rubygem-bundler release: 165.el9 source: rpm version: 2.2.33 rubygem-io-console: - arch: x86_64 epoch: null name: rubygem-io-console release: 165.el9 source: rpm version: 0.5.7 rubygem-json: - arch: x86_64 epoch: null name: rubygem-json release: 165.el9 source: rpm version: 2.5.1 rubygem-psych: - arch: x86_64 epoch: null name: rubygem-psych release: 165.el9 source: rpm version: 3.3.2 rubygem-rdoc: - arch: noarch epoch: null name: rubygem-rdoc release: 165.el9 source: rpm version: 6.3.4.1 rubygems: - arch: noarch epoch: null name: rubygems release: 165.el9 source: rpm version: 3.2.33 rust-srpm-macros: - arch: noarch epoch: null name: rust-srpm-macros release: 4.el9 source: rpm version: '17' sed: - arch: x86_64 epoch: null name: sed release: 9.el9 source: rpm version: '4.8' selinux-policy: - arch: noarch epoch: null name: selinux-policy release: 1.el9 source: rpm version: 38.1.71 selinux-policy-targeted: - arch: noarch epoch: null name: selinux-policy-targeted release: 1.el9 source: rpm version: 38.1.71 setroubleshoot-plugins: - arch: noarch epoch: null name: setroubleshoot-plugins release: 4.el9 source: rpm version: 3.3.14 setroubleshoot-server: - arch: x86_64 epoch: null name: setroubleshoot-server release: 2.el9 source: rpm version: 3.3.35 setup: - arch: noarch epoch: null name: setup release: 10.el9 source: rpm version: 2.13.7 sg3_utils: - arch: x86_64 epoch: null name: sg3_utils release: 10.el9 source: rpm version: '1.47' sg3_utils-libs: - arch: x86_64 epoch: null name: sg3_utils-libs release: 10.el9 source: rpm version: '1.47' shadow-utils: - arch: x86_64 epoch: 2 name: shadow-utils release: 16.el9 source: rpm version: '4.9' shadow-utils-subid: - arch: x86_64 epoch: 2 name: shadow-utils-subid release: 16.el9 source: rpm version: '4.9' shared-mime-info: - arch: x86_64 epoch: null name: shared-mime-info release: 5.el9 source: rpm version: '2.1' skopeo: - arch: x86_64 epoch: 2 name: skopeo release: 2.el9 source: rpm version: 1.20.0 slang: - arch: x86_64 epoch: null name: slang release: 11.el9 source: rpm version: 2.3.2 slirp4netns: - arch: x86_64 epoch: null name: slirp4netns release: 1.el9 source: rpm version: 1.3.3 snappy: - arch: x86_64 epoch: null name: snappy release: 8.el9 source: rpm version: 1.1.8 sos: - arch: noarch epoch: null name: sos release: 2.el9 source: rpm version: 4.10.1 sqlite: - arch: x86_64 epoch: null name: sqlite release: 9.el9 source: rpm version: 3.34.1 sqlite-libs: - arch: x86_64 epoch: null name: sqlite-libs release: 9.el9 source: rpm version: 3.34.1 squashfs-tools: - arch: x86_64 epoch: null name: squashfs-tools release: 10.git1.el9 source: rpm version: '4.4' sscg: - arch: x86_64 epoch: null name: sscg release: 2.el9 source: rpm version: 4.0.3 sshpass: - arch: x86_64 epoch: null name: sshpass release: 4.el9 source: rpm version: '1.09' sssd-client: - arch: x86_64 epoch: null name: sssd-client release: 5.el9 source: rpm version: 2.9.7 sssd-common: - arch: x86_64 epoch: null name: sssd-common release: 5.el9 source: rpm version: 2.9.7 sssd-kcm: - arch: x86_64 epoch: null name: sssd-kcm release: 5.el9 source: rpm version: 2.9.7 sssd-nfs-idmap: - arch: x86_64 epoch: null name: sssd-nfs-idmap release: 5.el9 source: rpm version: 2.9.7 sudo: - arch: x86_64 epoch: null name: sudo release: 13.el9 source: rpm version: 1.9.5p2 systemd: - arch: x86_64 epoch: null name: systemd release: 64.el9 source: rpm version: '252' systemd-devel: - arch: x86_64 epoch: null name: systemd-devel release: 64.el9 source: rpm version: '252' systemd-libs: - arch: x86_64 epoch: null name: systemd-libs release: 64.el9 source: rpm version: '252' systemd-pam: - arch: x86_64 epoch: null name: systemd-pam release: 64.el9 source: rpm version: '252' systemd-rpm-macros: - arch: noarch epoch: null name: systemd-rpm-macros release: 64.el9 source: rpm version: '252' systemd-udev: - arch: x86_64 epoch: null name: systemd-udev release: 64.el9 source: rpm version: '252' tar: - arch: x86_64 epoch: 2 name: tar release: 9.el9 source: rpm version: '1.34' tcl: - arch: x86_64 epoch: 1 name: tcl release: 7.el9 source: rpm version: 8.6.10 tcpdump: - arch: x86_64 epoch: 14 name: tcpdump release: 9.el9 source: rpm version: 4.99.0 teamd: - arch: x86_64 epoch: null name: teamd release: 16.el9 source: rpm version: '1.31' time: - arch: x86_64 epoch: null name: time release: 18.el9 source: rpm version: '1.9' tmux: - arch: x86_64 epoch: null name: tmux release: 5.el9 source: rpm version: 3.2a tpm2-tss: - arch: x86_64 epoch: null name: tpm2-tss release: 1.el9 source: rpm version: 3.2.3 traceroute: - arch: x86_64 epoch: 3 name: traceroute release: 1.el9 source: rpm version: 2.1.1 tzdata: - arch: noarch epoch: null name: tzdata release: 1.el9 source: rpm version: 2025c unzip: - arch: x86_64 epoch: null name: unzip release: 59.el9 source: rpm version: '6.0' userspace-rcu: - arch: x86_64 epoch: null name: userspace-rcu release: 6.el9 source: rpm version: 0.12.1 util-linux: - arch: x86_64 epoch: null name: util-linux release: 21.el9 source: rpm version: 2.37.4 util-linux-core: - arch: x86_64 epoch: null name: util-linux-core release: 21.el9 source: rpm version: 2.37.4 vim-minimal: - arch: x86_64 epoch: 2 name: vim-minimal release: 23.el9 source: rpm version: 8.2.2637 virt-install: - arch: noarch epoch: null name: virt-install release: 1.el9 source: rpm version: 5.0.0 virt-manager-common: - arch: noarch epoch: null name: virt-manager-common release: 1.el9 source: rpm version: 5.0.0 webkit2gtk3-jsc: - arch: x86_64 epoch: null name: webkit2gtk3-jsc release: 1.el9 source: rpm version: 2.50.4 wget: - arch: x86_64 epoch: null name: wget release: 8.el9 source: rpm version: 1.21.1 which: - arch: x86_64 epoch: null name: which release: 30.el9 source: rpm version: '2.21' xfsprogs: - arch: x86_64 epoch: null name: xfsprogs release: 7.el9 source: rpm version: 6.4.0 xmlstarlet: - arch: x86_64 epoch: null name: xmlstarlet release: 20.el9 source: rpm version: 1.6.1 xorriso: - arch: x86_64 epoch: null name: xorriso release: 5.el9 source: rpm version: 1.5.4 xz: - arch: x86_64 epoch: null name: xz release: 8.el9 source: rpm version: 5.2.5 xz-devel: - arch: x86_64 epoch: null name: xz-devel release: 8.el9 source: rpm version: 5.2.5 xz-libs: - arch: x86_64 epoch: null name: xz-libs release: 8.el9 source: rpm version: 5.2.5 yajl: - arch: x86_64 epoch: null name: yajl release: 25.el9 source: rpm version: 2.1.0 yum: - arch: noarch epoch: null name: yum release: 31.el9 source: rpm version: 4.14.0 yum-utils: - arch: noarch epoch: null name: yum-utils release: 25.el9 source: rpm version: 4.3.0 zip: - arch: x86_64 epoch: null name: zip release: 35.el9 source: rpm version: '3.0' zlib: - arch: x86_64 epoch: null name: zlib release: 41.el9 source: rpm version: 1.2.11 zlib-devel: - arch: x86_64 epoch: null name: zlib-devel release: 41.el9 source: rpm version: 1.2.11 zstd: - arch: x86_64 epoch: null name: zstd release: 1.el9 source: rpm version: 1.5.5 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible-facts.yml0000644000175000017500000005065415133746104025617 0ustar zuulzuul_ansible_facts_gathered: true all_ipv4_addresses: - 38.102.83.129 all_ipv6_addresses: - fe80::f816:3eff:fe17:b3c5 ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 crc_ci_bootstrap_instance_default_net_config: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true crc_ci_bootstrap_instance_nm_vlan_networks: - key: internal-api value: ip: 172.17.0.5 - key: storage value: ip: 172.18.0.5 - key: tenant value: ip: 172.19.0.5 crc_ci_bootstrap_instance_parent_port_create_yaml: admin_state_up: true allowed_address_pairs: [] binding_host_id: null binding_profile: {} binding_vif_details: {} binding_vif_type: null binding_vnic_type: normal created_at: '2026-01-20T16:29:40Z' data_plane_status: null description: '' device_id: '' device_owner: '' device_profile: null dns_assignment: - fqdn: host-192-168-122-10.openstacklocal. hostname: host-192-168-122-10 ip_address: 192.168.122.10 dns_domain: '' dns_name: '' extra_dhcp_opts: [] fixed_ips: - ip_address: 192.168.122.10 subnet_id: dec65eab-357c-4966-a142-c02fccf82d54 hardware_offload_type: null hints: '' id: c2f09d41-973e-44f3-b074-20dde6438c42 ip_allocation: immediate mac_address: fa:16:3e:b1:56:1a name: crc-9bcd4f67-9f17-42a8-8b89-21971da88d3d network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 numa_affinity_policy: null port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 propagate_uplink_status: null qos_network_policy_id: null qos_policy_id: null resource_request: null revision_number: 1 security_group_ids: [] status: DOWN tags: [] trunk_details: null trusted: null updated_at: '2026-01-20T16:29:40Z' crc_ci_bootstrap_network_name: zuul-ci-net-36ad0c27 crc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_private_net_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:04Z' description: '' dns_domain: '' id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 ipv4_address_scope: null ipv6_address_scope: null is_default: false is_vlan_qinq: null is_vlan_transparent: true l2_adjacency: true mtu: 1500 name: zuul-ci-net-36ad0c27 port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 provider:network_type: null provider:physical_network: null provider:segmentation_id: null qos_policy_id: null revision_number: 1 router:external: false segments: null shared: false status: ACTIVE subnets: [] tags: [] updated_at: '2026-01-20T16:28:05Z' crc_ci_bootstrap_private_router_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:10Z' description: '' enable_ndp_proxy: null external_gateway_info: null flavor_id: null id: 13dd31cb-de31-4e8f-a504-cc4d8127306d name: zuul-ci-subnet-router-36ad0c27 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 1 routes: [] status: ACTIVE tags: [] tenant_id: 4b633c451ac74233be3721a3635275e5 updated_at: '2026-01-20T16:28:10Z' crc_ci_bootstrap_private_subnet_create_yaml: allocation_pools: - end: 192.168.122.254 start: 192.168.122.2 cidr: 192.168.122.0/24 created_at: '2026-01-20T16:28:07Z' description: '' dns_nameservers: [] dns_publish_fixed_ip: null enable_dhcp: false gateway_ip: 192.168.122.1 host_routes: [] id: dec65eab-357c-4966-a142-c02fccf82d54 ip_version: 4 ipv6_address_mode: null ipv6_ra_mode: null name: zuul-ci-subnet-36ad0c27 network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 0 segment_id: null service_types: [] subnetpool_id: null tags: [] updated_at: '2026-01-20T16:28:07Z' crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 crc_ci_bootstrap_router_name: zuul-ci-subnet-router-36ad0c27 crc_ci_bootstrap_subnet_name: zuul-ci-subnet-36ad0c27 date_time: date: '2026-01-20' day: '20' epoch: '1768934466' epoch_int: '1768934466' hour: '18' iso8601: '2026-01-20T18:41:06Z' iso8601_basic: 20260120T184106594376 iso8601_basic_short: 20260120T184106 iso8601_micro: '2026-01-20T18:41:06.594376Z' minute: '41' month: '01' second: '06' time: '18:41:06' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.129 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:17:b3:c5 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-08-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-08-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '83883999' sectorsize: 512 size: 40.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '83886080' sectorsize: '512' size: 40.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3 distribution: CentOS distribution_file_parsed: true distribution_file_path: /etc/centos-release distribution_file_variety: CentOS distribution_major_version: '9' distribution_release: Stream distribution_version: '9' dns: nameservers: - 192.168.122.10 - 199.204.44.24 - 199.204.47.54 domain: '' effective_group_id: 1000 effective_user_id: 1000 env: ANSIBLE_LOG_PATH: /home/zuul/ci-framework-data/logs/e2e-collect-logs-must-gather.log BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 40844 22 SSH_CONNECTION: 38.102.83.114 40844 38.102.83.129 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '72' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.129 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe17:b3c5 prefix: '64' scope: link macaddress: fa:16:3e:17:b3:c5 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: controller gather_subset: - min hostname: controller hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d interfaces: - eth0 - lo is_chroot: false iscsi_iqn: '' kernel: 5.14.0-661.el9.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.03 1m: 0.1 5m: 0.07 locally_reachable_ips: ipv4: - 38.102.83.129 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe17:b3c5 lsb: {} lvm: N/A machine: x86_64 machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 memfree_mb: 3223 memory_mb: nocache: free: 3432 used: 223 real: free: 3223 total: 3655 used: 432 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 3655 module_setup: true mounts: - block_available: 9928903 block_size: 4096 block_total: 10469115 block_used: 540212 device: /dev/vda1 fstype: xfs inode_available: 20917098 inode_total: 20970992 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 40668786688 size_total: 42881495040 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 nodename: controller os_family: RedHat pkg_mgr: dnf proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 2 processor_nproc: 2 processor_threads_per_core: 1 processor_vcpus: 2 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 python_version: 3.9.25 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 235 user_dir: /home/zuul user_gecos: '' user_gid: 1000 user_id: zuul user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack zuul_change_list: - watcher-operator home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/0000755000175000017500000000000015133730040023463 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/0000755000175000017500000000000015133730040027516 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/0000755000175000017500000000000015133753356030662 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_all.yml0000644000175000017500000000142615133730043033141 0ustar zuulzuul--- - name: Debug make_all_env when: make_all_env is defined ansible.builtin.debug: var: make_all_env - name: Debug make_all_params when: make_all_params is defined ansible.builtin.debug: var: make_all_params - name: Run all retries: "{{ make_all_retries | default(omit) }}" delay: "{{ make_all_delay | default(omit) }}" until: "{{ make_all_until | default(true) }}" register: "make_all_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make all" dry_run: "{{ make_all_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_all_env|default({})), **(make_all_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_help.yml0000644000175000017500000000145615133730043033324 0ustar zuulzuul--- - name: Debug make_help_env when: make_help_env is defined ansible.builtin.debug: var: make_help_env - name: Debug make_help_params when: make_help_params is defined ansible.builtin.debug: var: make_help_params - name: Run help retries: "{{ make_help_retries | default(omit) }}" delay: "{{ make_help_delay | default(omit) }}" until: "{{ make_help_until | default(true) }}" register: "make_help_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make help" dry_run: "{{ make_help_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_help_env|default({})), **(make_help_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cleanup.0000644000175000017500000000152215133730043033273 0ustar zuulzuul--- - name: Debug make_cleanup_env when: make_cleanup_env is defined ansible.builtin.debug: var: make_cleanup_env - name: Debug make_cleanup_params when: make_cleanup_params is defined ansible.builtin.debug: var: make_cleanup_params - name: Run cleanup retries: "{{ make_cleanup_retries | default(omit) }}" delay: "{{ make_cleanup_delay | default(omit) }}" until: "{{ make_cleanup_until | default(true) }}" register: "make_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cleanup" dry_run: "{{ make_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cleanup_env|default({})), **(make_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_deploy_c0000644000175000017500000000167315133730043033373 0ustar zuulzuul--- - name: Debug make_deploy_cleanup_env when: make_deploy_cleanup_env is defined ansible.builtin.debug: var: make_deploy_cleanup_env - name: Debug make_deploy_cleanup_params when: make_deploy_cleanup_params is defined ansible.builtin.debug: var: make_deploy_cleanup_params - name: Run deploy_cleanup retries: "{{ make_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_deploy_cleanup_delay | default(omit) }}" until: "{{ make_deploy_cleanup_until | default(true) }}" register: "make_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make deploy_cleanup" dry_run: "{{ make_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_deploy_cleanup_env|default({})), **(make_deploy_cleanup_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_wait.yml0000644000175000017500000000144515133730043033336 0ustar zuulzuul--- - name: Debug make_wait_env when: make_wait_env is defined ansible.builtin.debug: var: make_wait_env - name: Debug make_wait_params when: make_wait_params is defined ansible.builtin.debug: var: make_wait_params - name: Run wait retries: "{{ make_wait_retries | default(omit) }}" delay: "{{ make_wait_delay | default(omit) }}" until: "{{ make_wait_until | default(true) }}" register: "make_wait_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make wait" dry_run: "{{ make_wait_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_wait_env|default({})), **(make_wait_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_storage.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_stor0000644000175000017500000000161615133730043033410 0ustar zuulzuul--- - name: Debug make_crc_storage_env when: make_crc_storage_env is defined ansible.builtin.debug: var: make_crc_storage_env - name: Debug make_crc_storage_params when: make_crc_storage_params is defined ansible.builtin.debug: var: make_crc_storage_params - name: Run crc_storage retries: "{{ make_crc_storage_retries | default(omit) }}" delay: "{{ make_crc_storage_delay | default(omit) }}" until: "{{ make_crc_storage_until | default(true) }}" register: "make_crc_storage_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_storage" dry_run: "{{ make_crc_storage_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_storage_env|default({})), **(make_crc_storage_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_storage_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_stor0000644000175000017500000000200615133730043033402 0ustar zuulzuul--- - name: Debug make_crc_storage_cleanup_env when: make_crc_storage_cleanup_env is defined ansible.builtin.debug: var: make_crc_storage_cleanup_env - name: Debug make_crc_storage_cleanup_params when: make_crc_storage_cleanup_params is defined ansible.builtin.debug: var: make_crc_storage_cleanup_params - name: Run crc_storage_cleanup retries: "{{ make_crc_storage_cleanup_retries | default(omit) }}" delay: "{{ make_crc_storage_cleanup_delay | default(omit) }}" until: "{{ make_crc_storage_cleanup_until | default(true) }}" register: "make_crc_storage_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_storage_cleanup" dry_run: "{{ make_crc_storage_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_storage_cleanup_env|default({})), **(make_crc_storage_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_storage_release.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_stor0000644000175000017500000000200615133730043033402 0ustar zuulzuul--- - name: Debug make_crc_storage_release_env when: make_crc_storage_release_env is defined ansible.builtin.debug: var: make_crc_storage_release_env - name: Debug make_crc_storage_release_params when: make_crc_storage_release_params is defined ansible.builtin.debug: var: make_crc_storage_release_params - name: Run crc_storage_release retries: "{{ make_crc_storage_release_retries | default(omit) }}" delay: "{{ make_crc_storage_release_delay | default(omit) }}" until: "{{ make_crc_storage_release_until | default(true) }}" register: "make_crc_storage_release_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_storage_release" dry_run: "{{ make_crc_storage_release_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_storage_release_env|default({})), **(make_crc_storage_release_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_storage_with_retries.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_stor0000644000175000017500000000212115133730043033400 0ustar zuulzuul--- - name: Debug make_crc_storage_with_retries_env when: make_crc_storage_with_retries_env is defined ansible.builtin.debug: var: make_crc_storage_with_retries_env - name: Debug make_crc_storage_with_retries_params when: make_crc_storage_with_retries_params is defined ansible.builtin.debug: var: make_crc_storage_with_retries_params - name: Run crc_storage_with_retries retries: "{{ make_crc_storage_with_retries_retries | default(omit) }}" delay: "{{ make_crc_storage_with_retries_delay | default(omit) }}" until: "{{ make_crc_storage_with_retries_until | default(true) }}" register: "make_crc_storage_with_retries_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_storage_with_retries" dry_run: "{{ make_crc_storage_with_retries_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_storage_with_retries_env|default({})), **(make_crc_storage_with_retries_params|default({}))) }}" ././@LongLink0000644000000000000000000000020100000000000011574 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_storage_cleanup_with_retries.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_stor0000644000175000017500000000231115133730043033401 0ustar zuulzuul--- - name: Debug make_crc_storage_cleanup_with_retries_env when: make_crc_storage_cleanup_with_retries_env is defined ansible.builtin.debug: var: make_crc_storage_cleanup_with_retries_env - name: Debug make_crc_storage_cleanup_with_retries_params when: make_crc_storage_cleanup_with_retries_params is defined ansible.builtin.debug: var: make_crc_storage_cleanup_with_retries_params - name: Run crc_storage_cleanup_with_retries retries: "{{ make_crc_storage_cleanup_with_retries_retries | default(omit) }}" delay: "{{ make_crc_storage_cleanup_with_retries_delay | default(omit) }}" until: "{{ make_crc_storage_cleanup_with_retries_until | default(true) }}" register: "make_crc_storage_cleanup_with_retries_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_storage_cleanup_with_retries" dry_run: "{{ make_crc_storage_cleanup_with_retries_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_storage_cleanup_with_retries_env|default({})), **(make_crc_storage_cleanup_with_retries_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_operator_namespace.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_operator0000644000175000017500000000176715133730043033434 0ustar zuulzuul--- - name: Debug make_operator_namespace_env when: make_operator_namespace_env is defined ansible.builtin.debug: var: make_operator_namespace_env - name: Debug make_operator_namespace_params when: make_operator_namespace_params is defined ansible.builtin.debug: var: make_operator_namespace_params - name: Run operator_namespace retries: "{{ make_operator_namespace_retries | default(omit) }}" delay: "{{ make_operator_namespace_delay | default(omit) }}" until: "{{ make_operator_namespace_until | default(true) }}" register: "make_operator_namespace_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make operator_namespace" dry_run: "{{ make_operator_namespace_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_operator_namespace_env|default({})), **(make_operator_namespace_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_namespace.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_namespac0000644000175000017500000000156015133730043033357 0ustar zuulzuul--- - name: Debug make_namespace_env when: make_namespace_env is defined ansible.builtin.debug: var: make_namespace_env - name: Debug make_namespace_params when: make_namespace_params is defined ansible.builtin.debug: var: make_namespace_params - name: Run namespace retries: "{{ make_namespace_retries | default(omit) }}" delay: "{{ make_namespace_delay | default(omit) }}" until: "{{ make_namespace_until | default(true) }}" register: "make_namespace_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make namespace" dry_run: "{{ make_namespace_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_namespace_env|default({})), **(make_namespace_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_namespace_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_namespac0000644000175000017500000000175015133730043033360 0ustar zuulzuul--- - name: Debug make_namespace_cleanup_env when: make_namespace_cleanup_env is defined ansible.builtin.debug: var: make_namespace_cleanup_env - name: Debug make_namespace_cleanup_params when: make_namespace_cleanup_params is defined ansible.builtin.debug: var: make_namespace_cleanup_params - name: Run namespace_cleanup retries: "{{ make_namespace_cleanup_retries | default(omit) }}" delay: "{{ make_namespace_cleanup_delay | default(omit) }}" until: "{{ make_namespace_cleanup_until | default(true) }}" register: "make_namespace_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make namespace_cleanup" dry_run: "{{ make_namespace_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_namespace_cleanup_env|default({})), **(make_namespace_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_input.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_input.ym0000644000175000017500000000146415133730043033356 0ustar zuulzuul--- - name: Debug make_input_env when: make_input_env is defined ansible.builtin.debug: var: make_input_env - name: Debug make_input_params when: make_input_params is defined ansible.builtin.debug: var: make_input_params - name: Run input retries: "{{ make_input_retries | default(omit) }}" delay: "{{ make_input_delay | default(omit) }}" until: "{{ make_input_until | default(true) }}" register: "make_input_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make input" dry_run: "{{ make_input_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_input_env|default({})), **(make_input_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_input_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_input_cl0000644000175000017500000000165415133730043033411 0ustar zuulzuul--- - name: Debug make_input_cleanup_env when: make_input_cleanup_env is defined ansible.builtin.debug: var: make_input_cleanup_env - name: Debug make_input_cleanup_params when: make_input_cleanup_params is defined ansible.builtin.debug: var: make_input_cleanup_params - name: Run input_cleanup retries: "{{ make_input_cleanup_retries | default(omit) }}" delay: "{{ make_input_cleanup_delay | default(omit) }}" until: "{{ make_input_cleanup_until | default(true) }}" register: "make_input_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make input_cleanup" dry_run: "{{ make_input_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_input_cleanup_env|default({})), **(make_input_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_bmo_setup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_bmo_0000644000175000017500000000165415133730043033337 0ustar zuulzuul--- - name: Debug make_crc_bmo_setup_env when: make_crc_bmo_setup_env is defined ansible.builtin.debug: var: make_crc_bmo_setup_env - name: Debug make_crc_bmo_setup_params when: make_crc_bmo_setup_params is defined ansible.builtin.debug: var: make_crc_bmo_setup_params - name: Run crc_bmo_setup retries: "{{ make_crc_bmo_setup_retries | default(omit) }}" delay: "{{ make_crc_bmo_setup_delay | default(omit) }}" until: "{{ make_crc_bmo_setup_until | default(true) }}" register: "make_crc_bmo_setup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_bmo_setup" dry_run: "{{ make_crc_bmo_setup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_bmo_setup_env|default({})), **(make_crc_bmo_setup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_bmo_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_bmo_0000644000175000017500000000171215133730043033332 0ustar zuulzuul--- - name: Debug make_crc_bmo_cleanup_env when: make_crc_bmo_cleanup_env is defined ansible.builtin.debug: var: make_crc_bmo_cleanup_env - name: Debug make_crc_bmo_cleanup_params when: make_crc_bmo_cleanup_params is defined ansible.builtin.debug: var: make_crc_bmo_cleanup_params - name: Run crc_bmo_cleanup retries: "{{ make_crc_bmo_cleanup_retries | default(omit) }}" delay: "{{ make_crc_bmo_cleanup_delay | default(omit) }}" until: "{{ make_crc_bmo_cleanup_until | default(true) }}" register: "make_crc_bmo_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make crc_bmo_cleanup" dry_run: "{{ make_crc_bmo_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_bmo_cleanup_env|default({})), **(make_crc_bmo_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000167315133730043033411 0ustar zuulzuul--- - name: Debug make_openstack_prep_env when: make_openstack_prep_env is defined ansible.builtin.debug: var: make_openstack_prep_env - name: Debug make_openstack_prep_params when: make_openstack_prep_params is defined ansible.builtin.debug: var: make_openstack_prep_params - name: Run openstack_prep retries: "{{ make_openstack_prep_retries | default(omit) }}" delay: "{{ make_openstack_prep_delay | default(omit) }}" until: "{{ make_openstack_prep_until | default(true) }}" register: "make_openstack_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_prep" dry_run: "{{ make_openstack_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_prep_env|default({})), **(make_openstack_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000156015133730043033404 0ustar zuulzuul--- - name: Debug make_openstack_env when: make_openstack_env is defined ansible.builtin.debug: var: make_openstack_env - name: Debug make_openstack_params when: make_openstack_params is defined ansible.builtin.debug: var: make_openstack_params - name: Run openstack retries: "{{ make_openstack_retries | default(omit) }}" delay: "{{ make_openstack_delay | default(omit) }}" until: "{{ make_openstack_until | default(true) }}" register: "make_openstack_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack" dry_run: "{{ make_openstack_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_env|default({})), **(make_openstack_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_wait.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000167315133730043033411 0ustar zuulzuul--- - name: Debug make_openstack_wait_env when: make_openstack_wait_env is defined ansible.builtin.debug: var: make_openstack_wait_env - name: Debug make_openstack_wait_params when: make_openstack_wait_params is defined ansible.builtin.debug: var: make_openstack_wait_params - name: Run openstack_wait retries: "{{ make_openstack_wait_retries | default(omit) }}" delay: "{{ make_openstack_wait_delay | default(omit) }}" until: "{{ make_openstack_wait_until | default(true) }}" register: "make_openstack_wait_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_wait" dry_run: "{{ make_openstack_wait_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_wait_env|default({})), **(make_openstack_wait_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_init.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000167315133730043033411 0ustar zuulzuul--- - name: Debug make_openstack_init_env when: make_openstack_init_env is defined ansible.builtin.debug: var: make_openstack_init_env - name: Debug make_openstack_init_params when: make_openstack_init_params is defined ansible.builtin.debug: var: make_openstack_init_params - name: Run openstack_init retries: "{{ make_openstack_init_retries | default(omit) }}" delay: "{{ make_openstack_init_delay | default(omit) }}" until: "{{ make_openstack_init_until | default(true) }}" register: "make_openstack_init_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_init" dry_run: "{{ make_openstack_init_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_init_env|default({})), **(make_openstack_init_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000175015133730043033405 0ustar zuulzuul--- - name: Debug make_openstack_cleanup_env when: make_openstack_cleanup_env is defined ansible.builtin.debug: var: make_openstack_cleanup_env - name: Debug make_openstack_cleanup_params when: make_openstack_cleanup_params is defined ansible.builtin.debug: var: make_openstack_cleanup_params - name: Run openstack_cleanup retries: "{{ make_openstack_cleanup_retries | default(omit) }}" delay: "{{ make_openstack_cleanup_delay | default(omit) }}" until: "{{ make_openstack_cleanup_until | default(true) }}" register: "make_openstack_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_cleanup" dry_run: "{{ make_openstack_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_cleanup_env|default({})), **(make_openstack_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_repo.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000167315133730043033411 0ustar zuulzuul--- - name: Debug make_openstack_repo_env when: make_openstack_repo_env is defined ansible.builtin.debug: var: make_openstack_repo_env - name: Debug make_openstack_repo_params when: make_openstack_repo_params is defined ansible.builtin.debug: var: make_openstack_repo_params - name: Run openstack_repo retries: "{{ make_openstack_repo_retries | default(omit) }}" delay: "{{ make_openstack_repo_delay | default(omit) }}" until: "{{ make_openstack_repo_until | default(true) }}" register: "make_openstack_repo_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_repo" dry_run: "{{ make_openstack_repo_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_repo_env|default({})), **(make_openstack_repo_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000204415133730043033402 0ustar zuulzuul--- - name: Debug make_openstack_deploy_prep_env when: make_openstack_deploy_prep_env is defined ansible.builtin.debug: var: make_openstack_deploy_prep_env - name: Debug make_openstack_deploy_prep_params when: make_openstack_deploy_prep_params is defined ansible.builtin.debug: var: make_openstack_deploy_prep_params - name: Run openstack_deploy_prep retries: "{{ make_openstack_deploy_prep_retries | default(omit) }}" delay: "{{ make_openstack_deploy_prep_delay | default(omit) }}" until: "{{ make_openstack_deploy_prep_until | default(true) }}" register: "make_openstack_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_deploy_prep" dry_run: "{{ make_openstack_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_deploy_prep_env|default({})), **(make_openstack_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000173115133730043033404 0ustar zuulzuul--- - name: Debug make_openstack_deploy_env when: make_openstack_deploy_env is defined ansible.builtin.debug: var: make_openstack_deploy_env - name: Debug make_openstack_deploy_params when: make_openstack_deploy_params is defined ansible.builtin.debug: var: make_openstack_deploy_params - name: Run openstack_deploy retries: "{{ make_openstack_deploy_retries | default(omit) }}" delay: "{{ make_openstack_deploy_delay | default(omit) }}" until: "{{ make_openstack_deploy_until | default(true) }}" register: "make_openstack_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_deploy" dry_run: "{{ make_openstack_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_deploy_env|default({})), **(make_openstack_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_wait_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000204415133730043033402 0ustar zuulzuul--- - name: Debug make_openstack_wait_deploy_env when: make_openstack_wait_deploy_env is defined ansible.builtin.debug: var: make_openstack_wait_deploy_env - name: Debug make_openstack_wait_deploy_params when: make_openstack_wait_deploy_params is defined ansible.builtin.debug: var: make_openstack_wait_deploy_params - name: Run openstack_wait_deploy retries: "{{ make_openstack_wait_deploy_retries | default(omit) }}" delay: "{{ make_openstack_wait_deploy_delay | default(omit) }}" until: "{{ make_openstack_wait_deploy_until | default(true) }}" register: "make_openstack_wait_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_wait_deploy" dry_run: "{{ make_openstack_wait_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_wait_deploy_env|default({})), **(make_openstack_wait_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000212115133730043033376 0ustar zuulzuul--- - name: Debug make_openstack_deploy_cleanup_env when: make_openstack_deploy_cleanup_env is defined ansible.builtin.debug: var: make_openstack_deploy_cleanup_env - name: Debug make_openstack_deploy_cleanup_params when: make_openstack_deploy_cleanup_params is defined ansible.builtin.debug: var: make_openstack_deploy_cleanup_params - name: Run openstack_deploy_cleanup retries: "{{ make_openstack_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_openstack_deploy_cleanup_delay | default(omit) }}" until: "{{ make_openstack_deploy_cleanup_until | default(true) }}" register: "make_openstack_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_deploy_cleanup" dry_run: "{{ make_openstack_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_deploy_cleanup_env|default({})), **(make_openstack_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_update_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000202515133730043033401 0ustar zuulzuul--- - name: Debug make_openstack_update_run_env when: make_openstack_update_run_env is defined ansible.builtin.debug: var: make_openstack_update_run_env - name: Debug make_openstack_update_run_params when: make_openstack_update_run_params is defined ansible.builtin.debug: var: make_openstack_update_run_params - name: Run openstack_update_run retries: "{{ make_openstack_update_run_retries | default(omit) }}" delay: "{{ make_openstack_update_run_delay | default(omit) }}" until: "{{ make_openstack_update_run_until | default(true) }}" register: "make_openstack_update_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_update_run" dry_run: "{{ make_openstack_update_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_update_run_env|default({})), **(make_openstack_update_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_update_services.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_update_s0000644000175000017500000000171215133730043033373 0ustar zuulzuul--- - name: Debug make_update_services_env when: make_update_services_env is defined ansible.builtin.debug: var: make_update_services_env - name: Debug make_update_services_params when: make_update_services_params is defined ansible.builtin.debug: var: make_update_services_params - name: Run update_services retries: "{{ make_update_services_retries | default(omit) }}" delay: "{{ make_update_services_delay | default(omit) }}" until: "{{ make_update_services_until | default(true) }}" register: "make_update_services_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make update_services" dry_run: "{{ make_update_services_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_update_services_env|default({})), **(make_update_services_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_update_system.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_update_s0000644000175000017500000000165415133730043033400 0ustar zuulzuul--- - name: Debug make_update_system_env when: make_update_system_env is defined ansible.builtin.debug: var: make_update_system_env - name: Debug make_update_system_params when: make_update_system_params is defined ansible.builtin.debug: var: make_update_system_params - name: Run update_system retries: "{{ make_update_system_retries | default(omit) }}" delay: "{{ make_update_system_delay | default(omit) }}" until: "{{ make_update_system_until | default(true) }}" register: "make_update_system_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make update_system" dry_run: "{{ make_update_system_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_update_system_env|default({})), **(make_update_system_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_patch_version.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000210215133730043033375 0ustar zuulzuul--- - name: Debug make_openstack_patch_version_env when: make_openstack_patch_version_env is defined ansible.builtin.debug: var: make_openstack_patch_version_env - name: Debug make_openstack_patch_version_params when: make_openstack_patch_version_params is defined ansible.builtin.debug: var: make_openstack_patch_version_params - name: Run openstack_patch_version retries: "{{ make_openstack_patch_version_retries | default(omit) }}" delay: "{{ make_openstack_patch_version_delay | default(omit) }}" until: "{{ make_openstack_patch_version_until | default(true) }}" register: "make_openstack_patch_version_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_patch_version" dry_run: "{{ make_openstack_patch_version_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_patch_version_env|default({})), **(make_openstack_patch_version_params|default({}))) }}" ././@LongLink0000644000000000000000000000017200000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_generate_keys.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000214015133730043033340 0ustar zuulzuul--- - name: Debug make_edpm_deploy_generate_keys_env when: make_edpm_deploy_generate_keys_env is defined ansible.builtin.debug: var: make_edpm_deploy_generate_keys_env - name: Debug make_edpm_deploy_generate_keys_params when: make_edpm_deploy_generate_keys_params is defined ansible.builtin.debug: var: make_edpm_deploy_generate_keys_params - name: Run edpm_deploy_generate_keys retries: "{{ make_edpm_deploy_generate_keys_retries | default(omit) }}" delay: "{{ make_edpm_deploy_generate_keys_delay | default(omit) }}" until: "{{ make_edpm_deploy_generate_keys_until | default(true) }}" register: "make_edpm_deploy_generate_keys_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_generate_keys" dry_run: "{{ make_edpm_deploy_generate_keys_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_generate_keys_env|default({})), **(make_edpm_deploy_generate_keys_params|default({}))) }}" ././@LongLink0000644000000000000000000000020000000000000011573 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_patch_ansible_runner_image.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_pat0000644000175000017500000000227215133730043033362 0ustar zuulzuul--- - name: Debug make_edpm_patch_ansible_runner_image_env when: make_edpm_patch_ansible_runner_image_env is defined ansible.builtin.debug: var: make_edpm_patch_ansible_runner_image_env - name: Debug make_edpm_patch_ansible_runner_image_params when: make_edpm_patch_ansible_runner_image_params is defined ansible.builtin.debug: var: make_edpm_patch_ansible_runner_image_params - name: Run edpm_patch_ansible_runner_image retries: "{{ make_edpm_patch_ansible_runner_image_retries | default(omit) }}" delay: "{{ make_edpm_patch_ansible_runner_image_delay | default(omit) }}" until: "{{ make_edpm_patch_ansible_runner_image_until | default(true) }}" register: "make_edpm_patch_ansible_runner_image_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_patch_ansible_runner_image" dry_run: "{{ make_edpm_patch_ansible_runner_image_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_patch_ansible_runner_image_env|default({})), **(make_edpm_patch_ansible_runner_image_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000173115133730043033345 0ustar zuulzuul--- - name: Debug make_edpm_deploy_prep_env when: make_edpm_deploy_prep_env is defined ansible.builtin.debug: var: make_edpm_deploy_prep_env - name: Debug make_edpm_deploy_prep_params when: make_edpm_deploy_prep_params is defined ansible.builtin.debug: var: make_edpm_deploy_prep_params - name: Run edpm_deploy_prep retries: "{{ make_edpm_deploy_prep_retries | default(omit) }}" delay: "{{ make_edpm_deploy_prep_delay | default(omit) }}" until: "{{ make_edpm_deploy_prep_until | default(true) }}" register: "make_edpm_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_prep" dry_run: "{{ make_edpm_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_prep_env|default({})), **(make_edpm_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000200615133730043033341 0ustar zuulzuul--- - name: Debug make_edpm_deploy_cleanup_env when: make_edpm_deploy_cleanup_env is defined ansible.builtin.debug: var: make_edpm_deploy_cleanup_env - name: Debug make_edpm_deploy_cleanup_params when: make_edpm_deploy_cleanup_params is defined ansible.builtin.debug: var: make_edpm_deploy_cleanup_params - name: Run edpm_deploy_cleanup retries: "{{ make_edpm_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_edpm_deploy_cleanup_delay | default(omit) }}" until: "{{ make_edpm_deploy_cleanup_until | default(true) }}" register: "make_edpm_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_cleanup" dry_run: "{{ make_edpm_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_cleanup_env|default({})), **(make_edpm_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000161615133730043033347 0ustar zuulzuul--- - name: Debug make_edpm_deploy_env when: make_edpm_deploy_env is defined ansible.builtin.debug: var: make_edpm_deploy_env - name: Debug make_edpm_deploy_params when: make_edpm_deploy_params is defined ansible.builtin.debug: var: make_edpm_deploy_params - name: Run edpm_deploy retries: "{{ make_edpm_deploy_retries | default(omit) }}" delay: "{{ make_edpm_deploy_delay | default(omit) }}" until: "{{ make_edpm_deploy_until | default(true) }}" register: "make_edpm_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy" dry_run: "{{ make_edpm_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_env|default({})), **(make_edpm_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017300000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_baremetal_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000215715133730043033350 0ustar zuulzuul--- - name: Debug make_edpm_deploy_baremetal_prep_env when: make_edpm_deploy_baremetal_prep_env is defined ansible.builtin.debug: var: make_edpm_deploy_baremetal_prep_env - name: Debug make_edpm_deploy_baremetal_prep_params when: make_edpm_deploy_baremetal_prep_params is defined ansible.builtin.debug: var: make_edpm_deploy_baremetal_prep_params - name: Run edpm_deploy_baremetal_prep retries: "{{ make_edpm_deploy_baremetal_prep_retries | default(omit) }}" delay: "{{ make_edpm_deploy_baremetal_prep_delay | default(omit) }}" until: "{{ make_edpm_deploy_baremetal_prep_until | default(true) }}" register: "make_edpm_deploy_baremetal_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_baremetal_prep" dry_run: "{{ make_edpm_deploy_baremetal_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_baremetal_prep_env|default({})), **(make_edpm_deploy_baremetal_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_baremetal.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000204415133730043033343 0ustar zuulzuul--- - name: Debug make_edpm_deploy_baremetal_env when: make_edpm_deploy_baremetal_env is defined ansible.builtin.debug: var: make_edpm_deploy_baremetal_env - name: Debug make_edpm_deploy_baremetal_params when: make_edpm_deploy_baremetal_params is defined ansible.builtin.debug: var: make_edpm_deploy_baremetal_params - name: Run edpm_deploy_baremetal retries: "{{ make_edpm_deploy_baremetal_retries | default(omit) }}" delay: "{{ make_edpm_deploy_baremetal_delay | default(omit) }}" until: "{{ make_edpm_deploy_baremetal_until | default(true) }}" register: "make_edpm_deploy_baremetal_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_baremetal" dry_run: "{{ make_edpm_deploy_baremetal_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_baremetal_env|default({})), **(make_edpm_deploy_baremetal_params|default({}))) }}" ././@LongLink0000644000000000000000000000017300000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_wait_deploy_baremetal.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_wai0000644000175000017500000000215715133730043033360 0ustar zuulzuul--- - name: Debug make_edpm_wait_deploy_baremetal_env when: make_edpm_wait_deploy_baremetal_env is defined ansible.builtin.debug: var: make_edpm_wait_deploy_baremetal_env - name: Debug make_edpm_wait_deploy_baremetal_params when: make_edpm_wait_deploy_baremetal_params is defined ansible.builtin.debug: var: make_edpm_wait_deploy_baremetal_params - name: Run edpm_wait_deploy_baremetal retries: "{{ make_edpm_wait_deploy_baremetal_retries | default(omit) }}" delay: "{{ make_edpm_wait_deploy_baremetal_delay | default(omit) }}" until: "{{ make_edpm_wait_deploy_baremetal_until | default(true) }}" register: "make_edpm_wait_deploy_baremetal_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_wait_deploy_baremetal" dry_run: "{{ make_edpm_wait_deploy_baremetal_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_wait_deploy_baremetal_env|default({})), **(make_edpm_wait_deploy_baremetal_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_wait_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_wai0000644000175000017500000000173115133730043033355 0ustar zuulzuul--- - name: Debug make_edpm_wait_deploy_env when: make_edpm_wait_deploy_env is defined ansible.builtin.debug: var: make_edpm_wait_deploy_env - name: Debug make_edpm_wait_deploy_params when: make_edpm_wait_deploy_params is defined ansible.builtin.debug: var: make_edpm_wait_deploy_params - name: Run edpm_wait_deploy retries: "{{ make_edpm_wait_deploy_retries | default(omit) }}" delay: "{{ make_edpm_wait_deploy_delay | default(omit) }}" until: "{{ make_edpm_wait_deploy_until | default(true) }}" register: "make_edpm_wait_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_wait_deploy" dry_run: "{{ make_edpm_wait_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_wait_deploy_env|default({})), **(make_edpm_wait_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_register_dns.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_reg0000644000175000017500000000175015133730043033353 0ustar zuulzuul--- - name: Debug make_edpm_register_dns_env when: make_edpm_register_dns_env is defined ansible.builtin.debug: var: make_edpm_register_dns_env - name: Debug make_edpm_register_dns_params when: make_edpm_register_dns_params is defined ansible.builtin.debug: var: make_edpm_register_dns_params - name: Run edpm_register_dns retries: "{{ make_edpm_register_dns_retries | default(omit) }}" delay: "{{ make_edpm_register_dns_delay | default(omit) }}" until: "{{ make_edpm_register_dns_until | default(true) }}" register: "make_edpm_register_dns_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_register_dns" dry_run: "{{ make_edpm_register_dns_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_register_dns_env|default({})), **(make_edpm_register_dns_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_nova_discover_hosts.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_nov0000644000175000017500000000212115133730043033371 0ustar zuulzuul--- - name: Debug make_edpm_nova_discover_hosts_env when: make_edpm_nova_discover_hosts_env is defined ansible.builtin.debug: var: make_edpm_nova_discover_hosts_env - name: Debug make_edpm_nova_discover_hosts_params when: make_edpm_nova_discover_hosts_params is defined ansible.builtin.debug: var: make_edpm_nova_discover_hosts_params - name: Run edpm_nova_discover_hosts retries: "{{ make_edpm_nova_discover_hosts_retries | default(omit) }}" delay: "{{ make_edpm_nova_discover_hosts_delay | default(omit) }}" until: "{{ make_edpm_nova_discover_hosts_until | default(true) }}" register: "make_edpm_nova_discover_hosts_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_nova_discover_hosts" dry_run: "{{ make_edpm_nova_discover_hosts_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_nova_discover_hosts_env|default({})), **(make_edpm_nova_discover_hosts_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_crds.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000167315133730043033411 0ustar zuulzuul--- - name: Debug make_openstack_crds_env when: make_openstack_crds_env is defined ansible.builtin.debug: var: make_openstack_crds_env - name: Debug make_openstack_crds_params when: make_openstack_crds_params is defined ansible.builtin.debug: var: make_openstack_crds_params - name: Run openstack_crds retries: "{{ make_openstack_crds_retries | default(omit) }}" delay: "{{ make_openstack_crds_delay | default(omit) }}" until: "{{ make_openstack_crds_until | default(true) }}" register: "make_openstack_crds_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_crds" dry_run: "{{ make_openstack_crds_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_crds_env|default({})), **(make_openstack_crds_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_crds_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000206315133730043033403 0ustar zuulzuul--- - name: Debug make_openstack_crds_cleanup_env when: make_openstack_crds_cleanup_env is defined ansible.builtin.debug: var: make_openstack_crds_cleanup_env - name: Debug make_openstack_crds_cleanup_params when: make_openstack_crds_cleanup_params is defined ansible.builtin.debug: var: make_openstack_crds_cleanup_params - name: Run openstack_crds_cleanup retries: "{{ make_openstack_crds_cleanup_retries | default(omit) }}" delay: "{{ make_openstack_crds_cleanup_delay | default(omit) }}" until: "{{ make_openstack_crds_cleanup_until | default(true) }}" register: "make_openstack_crds_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_crds_cleanup" dry_run: "{{ make_openstack_crds_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_crds_cleanup_env|default({})), **(make_openstack_crds_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017300000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_networker_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000215715133730043033350 0ustar zuulzuul--- - name: Debug make_edpm_deploy_networker_prep_env when: make_edpm_deploy_networker_prep_env is defined ansible.builtin.debug: var: make_edpm_deploy_networker_prep_env - name: Debug make_edpm_deploy_networker_prep_params when: make_edpm_deploy_networker_prep_params is defined ansible.builtin.debug: var: make_edpm_deploy_networker_prep_params - name: Run edpm_deploy_networker_prep retries: "{{ make_edpm_deploy_networker_prep_retries | default(omit) }}" delay: "{{ make_edpm_deploy_networker_prep_delay | default(omit) }}" until: "{{ make_edpm_deploy_networker_prep_until | default(true) }}" register: "make_edpm_deploy_networker_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_networker_prep" dry_run: "{{ make_edpm_deploy_networker_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_networker_prep_env|default({})), **(make_edpm_deploy_networker_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000017600000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_networker_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000223415133730043033344 0ustar zuulzuul--- - name: Debug make_edpm_deploy_networker_cleanup_env when: make_edpm_deploy_networker_cleanup_env is defined ansible.builtin.debug: var: make_edpm_deploy_networker_cleanup_env - name: Debug make_edpm_deploy_networker_cleanup_params when: make_edpm_deploy_networker_cleanup_params is defined ansible.builtin.debug: var: make_edpm_deploy_networker_cleanup_params - name: Run edpm_deploy_networker_cleanup retries: "{{ make_edpm_deploy_networker_cleanup_retries | default(omit) }}" delay: "{{ make_edpm_deploy_networker_cleanup_delay | default(omit) }}" until: "{{ make_edpm_deploy_networker_cleanup_until | default(true) }}" register: "make_edpm_deploy_networker_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_networker_cleanup" dry_run: "{{ make_edpm_deploy_networker_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_networker_cleanup_env|default({})), **(make_edpm_deploy_networker_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_networker.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000204415133730043033343 0ustar zuulzuul--- - name: Debug make_edpm_deploy_networker_env when: make_edpm_deploy_networker_env is defined ansible.builtin.debug: var: make_edpm_deploy_networker_env - name: Debug make_edpm_deploy_networker_params when: make_edpm_deploy_networker_params is defined ansible.builtin.debug: var: make_edpm_deploy_networker_params - name: Run edpm_deploy_networker retries: "{{ make_edpm_deploy_networker_retries | default(omit) }}" delay: "{{ make_edpm_deploy_networker_delay | default(omit) }}" until: "{{ make_edpm_deploy_networker_until | default(true) }}" register: "make_edpm_deploy_networker_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make edpm_deploy_networker" dry_run: "{{ make_edpm_deploy_networker_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_networker_env|default({})), **(make_edpm_deploy_networker_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_pr0000644000175000017500000000157715133730043033400 0ustar zuulzuul--- - name: Debug make_infra_prep_env when: make_infra_prep_env is defined ansible.builtin.debug: var: make_infra_prep_env - name: Debug make_infra_prep_params when: make_infra_prep_params is defined ansible.builtin.debug: var: make_infra_prep_params - name: Run infra_prep retries: "{{ make_infra_prep_retries | default(omit) }}" delay: "{{ make_infra_prep_delay | default(omit) }}" until: "{{ make_infra_prep_until | default(true) }}" register: "make_infra_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make infra_prep" dry_run: "{{ make_infra_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_infra_prep_env|default({})), **(make_infra_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra.ym0000644000175000017500000000146415133730043033316 0ustar zuulzuul--- - name: Debug make_infra_env when: make_infra_env is defined ansible.builtin.debug: var: make_infra_env - name: Debug make_infra_params when: make_infra_params is defined ansible.builtin.debug: var: make_infra_params - name: Run infra retries: "{{ make_infra_retries | default(omit) }}" delay: "{{ make_infra_delay | default(omit) }}" until: "{{ make_infra_until | default(true) }}" register: "make_infra_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make infra" dry_run: "{{ make_infra_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_infra_env|default({})), **(make_infra_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_cl0000644000175000017500000000165415133730043033351 0ustar zuulzuul--- - name: Debug make_infra_cleanup_env when: make_infra_cleanup_env is defined ansible.builtin.debug: var: make_infra_cleanup_env - name: Debug make_infra_cleanup_params when: make_infra_cleanup_params is defined ansible.builtin.debug: var: make_infra_cleanup_params - name: Run infra_cleanup retries: "{{ make_infra_cleanup_retries | default(omit) }}" delay: "{{ make_infra_cleanup_delay | default(omit) }}" until: "{{ make_infra_cleanup_until | default(true) }}" register: "make_infra_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make infra_cleanup" dry_run: "{{ make_infra_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_infra_cleanup_env|default({})), **(make_infra_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_depl0000644000175000017500000000171215133730043033357 0ustar zuulzuul--- - name: Debug make_dns_deploy_prep_env when: make_dns_deploy_prep_env is defined ansible.builtin.debug: var: make_dns_deploy_prep_env - name: Debug make_dns_deploy_prep_params when: make_dns_deploy_prep_params is defined ansible.builtin.debug: var: make_dns_deploy_prep_params - name: Run dns_deploy_prep retries: "{{ make_dns_deploy_prep_retries | default(omit) }}" delay: "{{ make_dns_deploy_prep_delay | default(omit) }}" until: "{{ make_dns_deploy_prep_until | default(true) }}" register: "make_dns_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make dns_deploy_prep" dry_run: "{{ make_dns_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_dns_deploy_prep_env|default({})), **(make_dns_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_depl0000644000175000017500000000157715133730043033370 0ustar zuulzuul--- - name: Debug make_dns_deploy_env when: make_dns_deploy_env is defined ansible.builtin.debug: var: make_dns_deploy_env - name: Debug make_dns_deploy_params when: make_dns_deploy_params is defined ansible.builtin.debug: var: make_dns_deploy_params - name: Run dns_deploy retries: "{{ make_dns_deploy_retries | default(omit) }}" delay: "{{ make_dns_deploy_delay | default(omit) }}" until: "{{ make_dns_deploy_until | default(true) }}" register: "make_dns_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make dns_deploy" dry_run: "{{ make_dns_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_dns_deploy_env|default({})), **(make_dns_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_dns_depl0000644000175000017500000000176715133730043033371 0ustar zuulzuul--- - name: Debug make_dns_deploy_cleanup_env when: make_dns_deploy_cleanup_env is defined ansible.builtin.debug: var: make_dns_deploy_cleanup_env - name: Debug make_dns_deploy_cleanup_params when: make_dns_deploy_cleanup_params is defined ansible.builtin.debug: var: make_dns_deploy_cleanup_params - name: Run dns_deploy_cleanup retries: "{{ make_dns_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_dns_deploy_cleanup_delay | default(omit) }}" until: "{{ make_dns_deploy_cleanup_until | default(true) }}" register: "make_dns_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make dns_deploy_cleanup" dry_run: "{{ make_dns_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_dns_deploy_cleanup_env|default({})), **(make_dns_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfig_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfi0000644000175000017500000000204415133730043033373 0ustar zuulzuul--- - name: Debug make_netconfig_deploy_prep_env when: make_netconfig_deploy_prep_env is defined ansible.builtin.debug: var: make_netconfig_deploy_prep_env - name: Debug make_netconfig_deploy_prep_params when: make_netconfig_deploy_prep_params is defined ansible.builtin.debug: var: make_netconfig_deploy_prep_params - name: Run netconfig_deploy_prep retries: "{{ make_netconfig_deploy_prep_retries | default(omit) }}" delay: "{{ make_netconfig_deploy_prep_delay | default(omit) }}" until: "{{ make_netconfig_deploy_prep_until | default(true) }}" register: "make_netconfig_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netconfig_deploy_prep" dry_run: "{{ make_netconfig_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netconfig_deploy_prep_env|default({})), **(make_netconfig_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfig_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfi0000644000175000017500000000173115133730043033375 0ustar zuulzuul--- - name: Debug make_netconfig_deploy_env when: make_netconfig_deploy_env is defined ansible.builtin.debug: var: make_netconfig_deploy_env - name: Debug make_netconfig_deploy_params when: make_netconfig_deploy_params is defined ansible.builtin.debug: var: make_netconfig_deploy_params - name: Run netconfig_deploy retries: "{{ make_netconfig_deploy_retries | default(omit) }}" delay: "{{ make_netconfig_deploy_delay | default(omit) }}" until: "{{ make_netconfig_deploy_until | default(true) }}" register: "make_netconfig_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netconfig_deploy" dry_run: "{{ make_netconfig_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netconfig_deploy_env|default({})), **(make_netconfig_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfig_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netconfi0000644000175000017500000000212115133730043033367 0ustar zuulzuul--- - name: Debug make_netconfig_deploy_cleanup_env when: make_netconfig_deploy_cleanup_env is defined ansible.builtin.debug: var: make_netconfig_deploy_cleanup_env - name: Debug make_netconfig_deploy_cleanup_params when: make_netconfig_deploy_cleanup_params is defined ansible.builtin.debug: var: make_netconfig_deploy_cleanup_params - name: Run netconfig_deploy_cleanup retries: "{{ make_netconfig_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_netconfig_deploy_cleanup_delay | default(omit) }}" until: "{{ make_netconfig_deploy_cleanup_until | default(true) }}" register: "make_netconfig_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netconfig_deploy_cleanup" dry_run: "{{ make_netconfig_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netconfig_deploy_cleanup_env|default({})), **(make_netconfig_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcached_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcache0000644000175000017500000000204415133730043033330 0ustar zuulzuul--- - name: Debug make_memcached_deploy_prep_env when: make_memcached_deploy_prep_env is defined ansible.builtin.debug: var: make_memcached_deploy_prep_env - name: Debug make_memcached_deploy_prep_params when: make_memcached_deploy_prep_params is defined ansible.builtin.debug: var: make_memcached_deploy_prep_params - name: Run memcached_deploy_prep retries: "{{ make_memcached_deploy_prep_retries | default(omit) }}" delay: "{{ make_memcached_deploy_prep_delay | default(omit) }}" until: "{{ make_memcached_deploy_prep_until | default(true) }}" register: "make_memcached_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make memcached_deploy_prep" dry_run: "{{ make_memcached_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_memcached_deploy_prep_env|default({})), **(make_memcached_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcached_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcache0000644000175000017500000000173115133730043033332 0ustar zuulzuul--- - name: Debug make_memcached_deploy_env when: make_memcached_deploy_env is defined ansible.builtin.debug: var: make_memcached_deploy_env - name: Debug make_memcached_deploy_params when: make_memcached_deploy_params is defined ansible.builtin.debug: var: make_memcached_deploy_params - name: Run memcached_deploy retries: "{{ make_memcached_deploy_retries | default(omit) }}" delay: "{{ make_memcached_deploy_delay | default(omit) }}" until: "{{ make_memcached_deploy_until | default(true) }}" register: "make_memcached_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make memcached_deploy" dry_run: "{{ make_memcached_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_memcached_deploy_env|default({})), **(make_memcached_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcached_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_memcache0000644000175000017500000000212115133730043033324 0ustar zuulzuul--- - name: Debug make_memcached_deploy_cleanup_env when: make_memcached_deploy_cleanup_env is defined ansible.builtin.debug: var: make_memcached_deploy_cleanup_env - name: Debug make_memcached_deploy_cleanup_params when: make_memcached_deploy_cleanup_params is defined ansible.builtin.debug: var: make_memcached_deploy_cleanup_params - name: Run memcached_deploy_cleanup retries: "{{ make_memcached_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_memcached_deploy_cleanup_delay | default(omit) }}" until: "{{ make_memcached_deploy_cleanup_until | default(true) }}" register: "make_memcached_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make memcached_deploy_cleanup" dry_run: "{{ make_memcached_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_memcached_deploy_cleanup_env|default({})), **(make_memcached_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000165415133730043033435 0ustar zuulzuul--- - name: Debug make_keystone_prep_env when: make_keystone_prep_env is defined ansible.builtin.debug: var: make_keystone_prep_env - name: Debug make_keystone_prep_params when: make_keystone_prep_params is defined ansible.builtin.debug: var: make_keystone_prep_params - name: Run keystone_prep retries: "{{ make_keystone_prep_retries | default(omit) }}" delay: "{{ make_keystone_prep_delay | default(omit) }}" until: "{{ make_keystone_prep_until | default(true) }}" register: "make_keystone_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_prep" dry_run: "{{ make_keystone_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_prep_env|default({})), **(make_keystone_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000154115133730043033430 0ustar zuulzuul--- - name: Debug make_keystone_env when: make_keystone_env is defined ansible.builtin.debug: var: make_keystone_env - name: Debug make_keystone_params when: make_keystone_params is defined ansible.builtin.debug: var: make_keystone_params - name: Run keystone retries: "{{ make_keystone_retries | default(omit) }}" delay: "{{ make_keystone_delay | default(omit) }}" until: "{{ make_keystone_until | default(true) }}" register: "make_keystone_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone" dry_run: "{{ make_keystone_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_env|default({})), **(make_keystone_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000173115133730043033431 0ustar zuulzuul--- - name: Debug make_keystone_cleanup_env when: make_keystone_cleanup_env is defined ansible.builtin.debug: var: make_keystone_cleanup_env - name: Debug make_keystone_cleanup_params when: make_keystone_cleanup_params is defined ansible.builtin.debug: var: make_keystone_cleanup_params - name: Run keystone_cleanup retries: "{{ make_keystone_cleanup_retries | default(omit) }}" delay: "{{ make_keystone_cleanup_delay | default(omit) }}" until: "{{ make_keystone_cleanup_until | default(true) }}" register: "make_keystone_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_cleanup" dry_run: "{{ make_keystone_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_cleanup_env|default({})), **(make_keystone_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000202515133730043033426 0ustar zuulzuul--- - name: Debug make_keystone_deploy_prep_env when: make_keystone_deploy_prep_env is defined ansible.builtin.debug: var: make_keystone_deploy_prep_env - name: Debug make_keystone_deploy_prep_params when: make_keystone_deploy_prep_params is defined ansible.builtin.debug: var: make_keystone_deploy_prep_params - name: Run keystone_deploy_prep retries: "{{ make_keystone_deploy_prep_retries | default(omit) }}" delay: "{{ make_keystone_deploy_prep_delay | default(omit) }}" until: "{{ make_keystone_deploy_prep_until | default(true) }}" register: "make_keystone_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_deploy_prep" dry_run: "{{ make_keystone_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_deploy_prep_env|default({})), **(make_keystone_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000171215133730043033430 0ustar zuulzuul--- - name: Debug make_keystone_deploy_env when: make_keystone_deploy_env is defined ansible.builtin.debug: var: make_keystone_deploy_env - name: Debug make_keystone_deploy_params when: make_keystone_deploy_params is defined ansible.builtin.debug: var: make_keystone_deploy_params - name: Run keystone_deploy retries: "{{ make_keystone_deploy_retries | default(omit) }}" delay: "{{ make_keystone_deploy_delay | default(omit) }}" until: "{{ make_keystone_deploy_until | default(true) }}" register: "make_keystone_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_deploy" dry_run: "{{ make_keystone_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_deploy_env|default({})), **(make_keystone_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000210215133730043033422 0ustar zuulzuul--- - name: Debug make_keystone_deploy_cleanup_env when: make_keystone_deploy_cleanup_env is defined ansible.builtin.debug: var: make_keystone_deploy_cleanup_env - name: Debug make_keystone_deploy_cleanup_params when: make_keystone_deploy_cleanup_params is defined ansible.builtin.debug: var: make_keystone_deploy_cleanup_params - name: Run keystone_deploy_cleanup retries: "{{ make_keystone_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_keystone_deploy_cleanup_delay | default(omit) }}" until: "{{ make_keystone_deploy_cleanup_until | default(true) }}" register: "make_keystone_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_deploy_cleanup" dry_run: "{{ make_keystone_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_deploy_cleanup_env|default({})), **(make_keystone_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000165415133730043033335 0ustar zuulzuul--- - name: Debug make_barbican_prep_env when: make_barbican_prep_env is defined ansible.builtin.debug: var: make_barbican_prep_env - name: Debug make_barbican_prep_params when: make_barbican_prep_params is defined ansible.builtin.debug: var: make_barbican_prep_params - name: Run barbican_prep retries: "{{ make_barbican_prep_retries | default(omit) }}" delay: "{{ make_barbican_prep_delay | default(omit) }}" until: "{{ make_barbican_prep_until | default(true) }}" register: "make_barbican_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_prep" dry_run: "{{ make_barbican_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_prep_env|default({})), **(make_barbican_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000154115133730043033330 0ustar zuulzuul--- - name: Debug make_barbican_env when: make_barbican_env is defined ansible.builtin.debug: var: make_barbican_env - name: Debug make_barbican_params when: make_barbican_params is defined ansible.builtin.debug: var: make_barbican_params - name: Run barbican retries: "{{ make_barbican_retries | default(omit) }}" delay: "{{ make_barbican_delay | default(omit) }}" until: "{{ make_barbican_until | default(true) }}" register: "make_barbican_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican" dry_run: "{{ make_barbican_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_env|default({})), **(make_barbican_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000173115133730043033331 0ustar zuulzuul--- - name: Debug make_barbican_cleanup_env when: make_barbican_cleanup_env is defined ansible.builtin.debug: var: make_barbican_cleanup_env - name: Debug make_barbican_cleanup_params when: make_barbican_cleanup_params is defined ansible.builtin.debug: var: make_barbican_cleanup_params - name: Run barbican_cleanup retries: "{{ make_barbican_cleanup_retries | default(omit) }}" delay: "{{ make_barbican_cleanup_delay | default(omit) }}" until: "{{ make_barbican_cleanup_until | default(true) }}" register: "make_barbican_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_cleanup" dry_run: "{{ make_barbican_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_cleanup_env|default({})), **(make_barbican_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000202515133730043033326 0ustar zuulzuul--- - name: Debug make_barbican_deploy_prep_env when: make_barbican_deploy_prep_env is defined ansible.builtin.debug: var: make_barbican_deploy_prep_env - name: Debug make_barbican_deploy_prep_params when: make_barbican_deploy_prep_params is defined ansible.builtin.debug: var: make_barbican_deploy_prep_params - name: Run barbican_deploy_prep retries: "{{ make_barbican_deploy_prep_retries | default(omit) }}" delay: "{{ make_barbican_deploy_prep_delay | default(omit) }}" until: "{{ make_barbican_deploy_prep_until | default(true) }}" register: "make_barbican_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_deploy_prep" dry_run: "{{ make_barbican_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_deploy_prep_env|default({})), **(make_barbican_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000171215133730043033330 0ustar zuulzuul--- - name: Debug make_barbican_deploy_env when: make_barbican_deploy_env is defined ansible.builtin.debug: var: make_barbican_deploy_env - name: Debug make_barbican_deploy_params when: make_barbican_deploy_params is defined ansible.builtin.debug: var: make_barbican_deploy_params - name: Run barbican_deploy retries: "{{ make_barbican_deploy_retries | default(omit) }}" delay: "{{ make_barbican_deploy_delay | default(omit) }}" until: "{{ make_barbican_deploy_until | default(true) }}" register: "make_barbican_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_deploy" dry_run: "{{ make_barbican_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_deploy_env|default({})), **(make_barbican_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_deploy_validate.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000212115133730043033323 0ustar zuulzuul--- - name: Debug make_barbican_deploy_validate_env when: make_barbican_deploy_validate_env is defined ansible.builtin.debug: var: make_barbican_deploy_validate_env - name: Debug make_barbican_deploy_validate_params when: make_barbican_deploy_validate_params is defined ansible.builtin.debug: var: make_barbican_deploy_validate_params - name: Run barbican_deploy_validate retries: "{{ make_barbican_deploy_validate_retries | default(omit) }}" delay: "{{ make_barbican_deploy_validate_delay | default(omit) }}" until: "{{ make_barbican_deploy_validate_until | default(true) }}" register: "make_barbican_deploy_validate_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_deploy_validate" dry_run: "{{ make_barbican_deploy_validate_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_deploy_validate_env|default({})), **(make_barbican_deploy_validate_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000210215133730043033322 0ustar zuulzuul--- - name: Debug make_barbican_deploy_cleanup_env when: make_barbican_deploy_cleanup_env is defined ansible.builtin.debug: var: make_barbican_deploy_cleanup_env - name: Debug make_barbican_deploy_cleanup_params when: make_barbican_deploy_cleanup_params is defined ansible.builtin.debug: var: make_barbican_deploy_cleanup_params - name: Run barbican_deploy_cleanup retries: "{{ make_barbican_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_barbican_deploy_cleanup_delay | default(omit) }}" until: "{{ make_barbican_deploy_cleanup_until | default(true) }}" register: "make_barbican_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_deploy_cleanup" dry_run: "{{ make_barbican_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_deploy_cleanup_env|default({})), **(make_barbican_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb.0000644000175000017500000000152215133730043033243 0ustar zuulzuul--- - name: Debug make_mariadb_env when: make_mariadb_env is defined ansible.builtin.debug: var: make_mariadb_env - name: Debug make_mariadb_params when: make_mariadb_params is defined ansible.builtin.debug: var: make_mariadb_params - name: Run mariadb retries: "{{ make_mariadb_retries | default(omit) }}" delay: "{{ make_mariadb_delay | default(omit) }}" until: "{{ make_mariadb_until | default(true) }}" register: "make_mariadb_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb" dry_run: "{{ make_mariadb_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_env|default({})), **(make_mariadb_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000171215133730043033325 0ustar zuulzuul--- - name: Debug make_mariadb_cleanup_env when: make_mariadb_cleanup_env is defined ansible.builtin.debug: var: make_mariadb_cleanup_env - name: Debug make_mariadb_cleanup_params when: make_mariadb_cleanup_params is defined ansible.builtin.debug: var: make_mariadb_cleanup_params - name: Run mariadb_cleanup retries: "{{ make_mariadb_cleanup_retries | default(omit) }}" delay: "{{ make_mariadb_cleanup_delay | default(omit) }}" until: "{{ make_mariadb_cleanup_until | default(true) }}" register: "make_mariadb_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_cleanup" dry_run: "{{ make_mariadb_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_cleanup_env|default({})), **(make_mariadb_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000200615133730043033322 0ustar zuulzuul--- - name: Debug make_mariadb_deploy_prep_env when: make_mariadb_deploy_prep_env is defined ansible.builtin.debug: var: make_mariadb_deploy_prep_env - name: Debug make_mariadb_deploy_prep_params when: make_mariadb_deploy_prep_params is defined ansible.builtin.debug: var: make_mariadb_deploy_prep_params - name: Run mariadb_deploy_prep retries: "{{ make_mariadb_deploy_prep_retries | default(omit) }}" delay: "{{ make_mariadb_deploy_prep_delay | default(omit) }}" until: "{{ make_mariadb_deploy_prep_until | default(true) }}" register: "make_mariadb_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_deploy_prep" dry_run: "{{ make_mariadb_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_deploy_prep_env|default({})), **(make_mariadb_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000167315133730043033333 0ustar zuulzuul--- - name: Debug make_mariadb_deploy_env when: make_mariadb_deploy_env is defined ansible.builtin.debug: var: make_mariadb_deploy_env - name: Debug make_mariadb_deploy_params when: make_mariadb_deploy_params is defined ansible.builtin.debug: var: make_mariadb_deploy_params - name: Run mariadb_deploy retries: "{{ make_mariadb_deploy_retries | default(omit) }}" delay: "{{ make_mariadb_deploy_delay | default(omit) }}" until: "{{ make_mariadb_deploy_until | default(true) }}" register: "make_mariadb_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_deploy" dry_run: "{{ make_mariadb_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_deploy_env|default({})), **(make_mariadb_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000206315133730043033325 0ustar zuulzuul--- - name: Debug make_mariadb_deploy_cleanup_env when: make_mariadb_deploy_cleanup_env is defined ansible.builtin.debug: var: make_mariadb_deploy_cleanup_env - name: Debug make_mariadb_deploy_cleanup_params when: make_mariadb_deploy_cleanup_params is defined ansible.builtin.debug: var: make_mariadb_deploy_cleanup_params - name: Run mariadb_deploy_cleanup retries: "{{ make_mariadb_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_mariadb_deploy_cleanup_delay | default(omit) }}" until: "{{ make_mariadb_deploy_cleanup_until | default(true) }}" register: "make_mariadb_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_deploy_cleanup" dry_run: "{{ make_mariadb_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_deploy_cleanup_env|default({})), **(make_mariadb_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000167315133730043033361 0ustar zuulzuul--- - name: Debug make_placement_prep_env when: make_placement_prep_env is defined ansible.builtin.debug: var: make_placement_prep_env - name: Debug make_placement_prep_params when: make_placement_prep_params is defined ansible.builtin.debug: var: make_placement_prep_params - name: Run placement_prep retries: "{{ make_placement_prep_retries | default(omit) }}" delay: "{{ make_placement_prep_delay | default(omit) }}" until: "{{ make_placement_prep_until | default(true) }}" register: "make_placement_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_prep" dry_run: "{{ make_placement_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_prep_env|default({})), **(make_placement_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000156015133730043033354 0ustar zuulzuul--- - name: Debug make_placement_env when: make_placement_env is defined ansible.builtin.debug: var: make_placement_env - name: Debug make_placement_params when: make_placement_params is defined ansible.builtin.debug: var: make_placement_params - name: Run placement retries: "{{ make_placement_retries | default(omit) }}" delay: "{{ make_placement_delay | default(omit) }}" until: "{{ make_placement_until | default(true) }}" register: "make_placement_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement" dry_run: "{{ make_placement_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_env|default({})), **(make_placement_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000175015133730043033355 0ustar zuulzuul--- - name: Debug make_placement_cleanup_env when: make_placement_cleanup_env is defined ansible.builtin.debug: var: make_placement_cleanup_env - name: Debug make_placement_cleanup_params when: make_placement_cleanup_params is defined ansible.builtin.debug: var: make_placement_cleanup_params - name: Run placement_cleanup retries: "{{ make_placement_cleanup_retries | default(omit) }}" delay: "{{ make_placement_cleanup_delay | default(omit) }}" until: "{{ make_placement_cleanup_until | default(true) }}" register: "make_placement_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_cleanup" dry_run: "{{ make_placement_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_cleanup_env|default({})), **(make_placement_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000204415133730043033352 0ustar zuulzuul--- - name: Debug make_placement_deploy_prep_env when: make_placement_deploy_prep_env is defined ansible.builtin.debug: var: make_placement_deploy_prep_env - name: Debug make_placement_deploy_prep_params when: make_placement_deploy_prep_params is defined ansible.builtin.debug: var: make_placement_deploy_prep_params - name: Run placement_deploy_prep retries: "{{ make_placement_deploy_prep_retries | default(omit) }}" delay: "{{ make_placement_deploy_prep_delay | default(omit) }}" until: "{{ make_placement_deploy_prep_until | default(true) }}" register: "make_placement_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_deploy_prep" dry_run: "{{ make_placement_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_deploy_prep_env|default({})), **(make_placement_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000173115133730043033354 0ustar zuulzuul--- - name: Debug make_placement_deploy_env when: make_placement_deploy_env is defined ansible.builtin.debug: var: make_placement_deploy_env - name: Debug make_placement_deploy_params when: make_placement_deploy_params is defined ansible.builtin.debug: var: make_placement_deploy_params - name: Run placement_deploy retries: "{{ make_placement_deploy_retries | default(omit) }}" delay: "{{ make_placement_deploy_delay | default(omit) }}" until: "{{ make_placement_deploy_until | default(true) }}" register: "make_placement_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_deploy" dry_run: "{{ make_placement_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_deploy_env|default({})), **(make_placement_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000212115133730043033346 0ustar zuulzuul--- - name: Debug make_placement_deploy_cleanup_env when: make_placement_deploy_cleanup_env is defined ansible.builtin.debug: var: make_placement_deploy_cleanup_env - name: Debug make_placement_deploy_cleanup_params when: make_placement_deploy_cleanup_params is defined ansible.builtin.debug: var: make_placement_deploy_cleanup_params - name: Run placement_deploy_cleanup retries: "{{ make_placement_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_placement_deploy_cleanup_delay | default(omit) }}" until: "{{ make_placement_deploy_cleanup_until | default(true) }}" register: "make_placement_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_deploy_cleanup" dry_run: "{{ make_placement_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_deploy_cleanup_env|default({})), **(make_placement_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_p0000644000175000017500000000161615133730043033342 0ustar zuulzuul--- - name: Debug make_glance_prep_env when: make_glance_prep_env is defined ansible.builtin.debug: var: make_glance_prep_env - name: Debug make_glance_prep_params when: make_glance_prep_params is defined ansible.builtin.debug: var: make_glance_prep_params - name: Run glance_prep retries: "{{ make_glance_prep_retries | default(omit) }}" delay: "{{ make_glance_prep_delay | default(omit) }}" until: "{{ make_glance_prep_until | default(true) }}" register: "make_glance_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_prep" dry_run: "{{ make_glance_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_prep_env|default({})), **(make_glance_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance.y0000644000175000017500000000150315133730043033265 0ustar zuulzuul--- - name: Debug make_glance_env when: make_glance_env is defined ansible.builtin.debug: var: make_glance_env - name: Debug make_glance_params when: make_glance_params is defined ansible.builtin.debug: var: make_glance_params - name: Run glance retries: "{{ make_glance_retries | default(omit) }}" delay: "{{ make_glance_delay | default(omit) }}" until: "{{ make_glance_until | default(true) }}" register: "make_glance_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance" dry_run: "{{ make_glance_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_env|default({})), **(make_glance_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_c0000644000175000017500000000167315133730043033330 0ustar zuulzuul--- - name: Debug make_glance_cleanup_env when: make_glance_cleanup_env is defined ansible.builtin.debug: var: make_glance_cleanup_env - name: Debug make_glance_cleanup_params when: make_glance_cleanup_params is defined ansible.builtin.debug: var: make_glance_cleanup_params - name: Run glance_cleanup retries: "{{ make_glance_cleanup_retries | default(omit) }}" delay: "{{ make_glance_cleanup_delay | default(omit) }}" until: "{{ make_glance_cleanup_until | default(true) }}" register: "make_glance_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_cleanup" dry_run: "{{ make_glance_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_cleanup_env|default({})), **(make_glance_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_d0000644000175000017500000000176715133730043033335 0ustar zuulzuul--- - name: Debug make_glance_deploy_prep_env when: make_glance_deploy_prep_env is defined ansible.builtin.debug: var: make_glance_deploy_prep_env - name: Debug make_glance_deploy_prep_params when: make_glance_deploy_prep_params is defined ansible.builtin.debug: var: make_glance_deploy_prep_params - name: Run glance_deploy_prep retries: "{{ make_glance_deploy_prep_retries | default(omit) }}" delay: "{{ make_glance_deploy_prep_delay | default(omit) }}" until: "{{ make_glance_deploy_prep_until | default(true) }}" register: "make_glance_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_deploy_prep" dry_run: "{{ make_glance_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_deploy_prep_env|default({})), **(make_glance_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_d0000644000175000017500000000165415133730043033330 0ustar zuulzuul--- - name: Debug make_glance_deploy_env when: make_glance_deploy_env is defined ansible.builtin.debug: var: make_glance_deploy_env - name: Debug make_glance_deploy_params when: make_glance_deploy_params is defined ansible.builtin.debug: var: make_glance_deploy_params - name: Run glance_deploy retries: "{{ make_glance_deploy_retries | default(omit) }}" delay: "{{ make_glance_deploy_delay | default(omit) }}" until: "{{ make_glance_deploy_until | default(true) }}" register: "make_glance_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_deploy" dry_run: "{{ make_glance_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_deploy_env|default({})), **(make_glance_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_d0000644000175000017500000000204415133730043033322 0ustar zuulzuul--- - name: Debug make_glance_deploy_cleanup_env when: make_glance_deploy_cleanup_env is defined ansible.builtin.debug: var: make_glance_deploy_cleanup_env - name: Debug make_glance_deploy_cleanup_params when: make_glance_deploy_cleanup_params is defined ansible.builtin.debug: var: make_glance_deploy_cleanup_params - name: Run glance_deploy_cleanup retries: "{{ make_glance_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_glance_deploy_cleanup_delay | default(omit) }}" until: "{{ make_glance_deploy_cleanup_until | default(true) }}" register: "make_glance_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_deploy_cleanup" dry_run: "{{ make_glance_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_deploy_cleanup_env|default({})), **(make_glance_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_prep0000644000175000017500000000154115133730043033417 0ustar zuulzuul--- - name: Debug make_ovn_prep_env when: make_ovn_prep_env is defined ansible.builtin.debug: var: make_ovn_prep_env - name: Debug make_ovn_prep_params when: make_ovn_prep_params is defined ansible.builtin.debug: var: make_ovn_prep_params - name: Run ovn_prep retries: "{{ make_ovn_prep_retries | default(omit) }}" delay: "{{ make_ovn_prep_delay | default(omit) }}" until: "{{ make_ovn_prep_until | default(true) }}" register: "make_ovn_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_prep" dry_run: "{{ make_ovn_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_prep_env|default({})), **(make_ovn_prep_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn.yml0000644000175000017500000000142615133730043033173 0ustar zuulzuul--- - name: Debug make_ovn_env when: make_ovn_env is defined ansible.builtin.debug: var: make_ovn_env - name: Debug make_ovn_params when: make_ovn_params is defined ansible.builtin.debug: var: make_ovn_params - name: Run ovn retries: "{{ make_ovn_retries | default(omit) }}" delay: "{{ make_ovn_delay | default(omit) }}" until: "{{ make_ovn_until | default(true) }}" register: "make_ovn_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn" dry_run: "{{ make_ovn_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_env|default({})), **(make_ovn_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_clea0000644000175000017500000000161615133730043033360 0ustar zuulzuul--- - name: Debug make_ovn_cleanup_env when: make_ovn_cleanup_env is defined ansible.builtin.debug: var: make_ovn_cleanup_env - name: Debug make_ovn_cleanup_params when: make_ovn_cleanup_params is defined ansible.builtin.debug: var: make_ovn_cleanup_params - name: Run ovn_cleanup retries: "{{ make_ovn_cleanup_retries | default(omit) }}" delay: "{{ make_ovn_cleanup_delay | default(omit) }}" until: "{{ make_ovn_cleanup_until | default(true) }}" register: "make_ovn_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_cleanup" dry_run: "{{ make_ovn_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_cleanup_env|default({})), **(make_ovn_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_depl0000644000175000017500000000171215133730043033375 0ustar zuulzuul--- - name: Debug make_ovn_deploy_prep_env when: make_ovn_deploy_prep_env is defined ansible.builtin.debug: var: make_ovn_deploy_prep_env - name: Debug make_ovn_deploy_prep_params when: make_ovn_deploy_prep_params is defined ansible.builtin.debug: var: make_ovn_deploy_prep_params - name: Run ovn_deploy_prep retries: "{{ make_ovn_deploy_prep_retries | default(omit) }}" delay: "{{ make_ovn_deploy_prep_delay | default(omit) }}" until: "{{ make_ovn_deploy_prep_until | default(true) }}" register: "make_ovn_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_deploy_prep" dry_run: "{{ make_ovn_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_deploy_prep_env|default({})), **(make_ovn_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_depl0000644000175000017500000000157715133730043033406 0ustar zuulzuul--- - name: Debug make_ovn_deploy_env when: make_ovn_deploy_env is defined ansible.builtin.debug: var: make_ovn_deploy_env - name: Debug make_ovn_deploy_params when: make_ovn_deploy_params is defined ansible.builtin.debug: var: make_ovn_deploy_params - name: Run ovn_deploy retries: "{{ make_ovn_deploy_retries | default(omit) }}" delay: "{{ make_ovn_deploy_delay | default(omit) }}" until: "{{ make_ovn_deploy_until | default(true) }}" register: "make_ovn_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_deploy" dry_run: "{{ make_ovn_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_deploy_env|default({})), **(make_ovn_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_depl0000644000175000017500000000176715133730043033407 0ustar zuulzuul--- - name: Debug make_ovn_deploy_cleanup_env when: make_ovn_deploy_cleanup_env is defined ansible.builtin.debug: var: make_ovn_deploy_cleanup_env - name: Debug make_ovn_deploy_cleanup_params when: make_ovn_deploy_cleanup_params is defined ansible.builtin.debug: var: make_ovn_deploy_cleanup_params - name: Run ovn_deploy_cleanup retries: "{{ make_ovn_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_ovn_deploy_cleanup_delay | default(omit) }}" until: "{{ make_ovn_deploy_cleanup_until | default(true) }}" register: "make_ovn_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_deploy_cleanup" dry_run: "{{ make_ovn_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_deploy_cleanup_env|default({})), **(make_ovn_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000163515133730043033424 0ustar zuulzuul--- - name: Debug make_neutron_prep_env when: make_neutron_prep_env is defined ansible.builtin.debug: var: make_neutron_prep_env - name: Debug make_neutron_prep_params when: make_neutron_prep_params is defined ansible.builtin.debug: var: make_neutron_prep_params - name: Run neutron_prep retries: "{{ make_neutron_prep_retries | default(omit) }}" delay: "{{ make_neutron_prep_delay | default(omit) }}" until: "{{ make_neutron_prep_until | default(true) }}" register: "make_neutron_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_prep" dry_run: "{{ make_neutron_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_prep_env|default({})), **(make_neutron_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron.0000644000175000017500000000152215133730043033336 0ustar zuulzuul--- - name: Debug make_neutron_env when: make_neutron_env is defined ansible.builtin.debug: var: make_neutron_env - name: Debug make_neutron_params when: make_neutron_params is defined ansible.builtin.debug: var: make_neutron_params - name: Run neutron retries: "{{ make_neutron_retries | default(omit) }}" delay: "{{ make_neutron_delay | default(omit) }}" until: "{{ make_neutron_until | default(true) }}" register: "make_neutron_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron" dry_run: "{{ make_neutron_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_env|default({})), **(make_neutron_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000171215133730043033420 0ustar zuulzuul--- - name: Debug make_neutron_cleanup_env when: make_neutron_cleanup_env is defined ansible.builtin.debug: var: make_neutron_cleanup_env - name: Debug make_neutron_cleanup_params when: make_neutron_cleanup_params is defined ansible.builtin.debug: var: make_neutron_cleanup_params - name: Run neutron_cleanup retries: "{{ make_neutron_cleanup_retries | default(omit) }}" delay: "{{ make_neutron_cleanup_delay | default(omit) }}" until: "{{ make_neutron_cleanup_until | default(true) }}" register: "make_neutron_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_cleanup" dry_run: "{{ make_neutron_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_cleanup_env|default({})), **(make_neutron_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000200615133730043033415 0ustar zuulzuul--- - name: Debug make_neutron_deploy_prep_env when: make_neutron_deploy_prep_env is defined ansible.builtin.debug: var: make_neutron_deploy_prep_env - name: Debug make_neutron_deploy_prep_params when: make_neutron_deploy_prep_params is defined ansible.builtin.debug: var: make_neutron_deploy_prep_params - name: Run neutron_deploy_prep retries: "{{ make_neutron_deploy_prep_retries | default(omit) }}" delay: "{{ make_neutron_deploy_prep_delay | default(omit) }}" until: "{{ make_neutron_deploy_prep_until | default(true) }}" register: "make_neutron_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_deploy_prep" dry_run: "{{ make_neutron_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_deploy_prep_env|default({})), **(make_neutron_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000167315133730043033426 0ustar zuulzuul--- - name: Debug make_neutron_deploy_env when: make_neutron_deploy_env is defined ansible.builtin.debug: var: make_neutron_deploy_env - name: Debug make_neutron_deploy_params when: make_neutron_deploy_params is defined ansible.builtin.debug: var: make_neutron_deploy_params - name: Run neutron_deploy retries: "{{ make_neutron_deploy_retries | default(omit) }}" delay: "{{ make_neutron_deploy_delay | default(omit) }}" until: "{{ make_neutron_deploy_until | default(true) }}" register: "make_neutron_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_deploy" dry_run: "{{ make_neutron_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_deploy_env|default({})), **(make_neutron_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000206315133730043033420 0ustar zuulzuul--- - name: Debug make_neutron_deploy_cleanup_env when: make_neutron_deploy_cleanup_env is defined ansible.builtin.debug: var: make_neutron_deploy_cleanup_env - name: Debug make_neutron_deploy_cleanup_params when: make_neutron_deploy_cleanup_params is defined ansible.builtin.debug: var: make_neutron_deploy_cleanup_params - name: Run neutron_deploy_cleanup retries: "{{ make_neutron_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_neutron_deploy_cleanup_delay | default(omit) }}" until: "{{ make_neutron_deploy_cleanup_until | default(true) }}" register: "make_neutron_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_deploy_cleanup" dry_run: "{{ make_neutron_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_deploy_cleanup_env|default({})), **(make_neutron_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_p0000644000175000017500000000161615133730043033355 0ustar zuulzuul--- - name: Debug make_cinder_prep_env when: make_cinder_prep_env is defined ansible.builtin.debug: var: make_cinder_prep_env - name: Debug make_cinder_prep_params when: make_cinder_prep_params is defined ansible.builtin.debug: var: make_cinder_prep_params - name: Run cinder_prep retries: "{{ make_cinder_prep_retries | default(omit) }}" delay: "{{ make_cinder_prep_delay | default(omit) }}" until: "{{ make_cinder_prep_until | default(true) }}" register: "make_cinder_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_prep" dry_run: "{{ make_cinder_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_prep_env|default({})), **(make_cinder_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder.y0000644000175000017500000000150315133730043033300 0ustar zuulzuul--- - name: Debug make_cinder_env when: make_cinder_env is defined ansible.builtin.debug: var: make_cinder_env - name: Debug make_cinder_params when: make_cinder_params is defined ansible.builtin.debug: var: make_cinder_params - name: Run cinder retries: "{{ make_cinder_retries | default(omit) }}" delay: "{{ make_cinder_delay | default(omit) }}" until: "{{ make_cinder_until | default(true) }}" register: "make_cinder_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder" dry_run: "{{ make_cinder_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_env|default({})), **(make_cinder_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_c0000644000175000017500000000167315133730043033343 0ustar zuulzuul--- - name: Debug make_cinder_cleanup_env when: make_cinder_cleanup_env is defined ansible.builtin.debug: var: make_cinder_cleanup_env - name: Debug make_cinder_cleanup_params when: make_cinder_cleanup_params is defined ansible.builtin.debug: var: make_cinder_cleanup_params - name: Run cinder_cleanup retries: "{{ make_cinder_cleanup_retries | default(omit) }}" delay: "{{ make_cinder_cleanup_delay | default(omit) }}" until: "{{ make_cinder_cleanup_until | default(true) }}" register: "make_cinder_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_cleanup" dry_run: "{{ make_cinder_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_cleanup_env|default({})), **(make_cinder_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_d0000644000175000017500000000176715133730043033350 0ustar zuulzuul--- - name: Debug make_cinder_deploy_prep_env when: make_cinder_deploy_prep_env is defined ansible.builtin.debug: var: make_cinder_deploy_prep_env - name: Debug make_cinder_deploy_prep_params when: make_cinder_deploy_prep_params is defined ansible.builtin.debug: var: make_cinder_deploy_prep_params - name: Run cinder_deploy_prep retries: "{{ make_cinder_deploy_prep_retries | default(omit) }}" delay: "{{ make_cinder_deploy_prep_delay | default(omit) }}" until: "{{ make_cinder_deploy_prep_until | default(true) }}" register: "make_cinder_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_deploy_prep" dry_run: "{{ make_cinder_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_deploy_prep_env|default({})), **(make_cinder_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_d0000644000175000017500000000165415133730043033343 0ustar zuulzuul--- - name: Debug make_cinder_deploy_env when: make_cinder_deploy_env is defined ansible.builtin.debug: var: make_cinder_deploy_env - name: Debug make_cinder_deploy_params when: make_cinder_deploy_params is defined ansible.builtin.debug: var: make_cinder_deploy_params - name: Run cinder_deploy retries: "{{ make_cinder_deploy_retries | default(omit) }}" delay: "{{ make_cinder_deploy_delay | default(omit) }}" until: "{{ make_cinder_deploy_until | default(true) }}" register: "make_cinder_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_deploy" dry_run: "{{ make_cinder_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_deploy_env|default({})), **(make_cinder_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_d0000644000175000017500000000204415133730043033335 0ustar zuulzuul--- - name: Debug make_cinder_deploy_cleanup_env when: make_cinder_deploy_cleanup_env is defined ansible.builtin.debug: var: make_cinder_deploy_cleanup_env - name: Debug make_cinder_deploy_cleanup_params when: make_cinder_deploy_cleanup_params is defined ansible.builtin.debug: var: make_cinder_deploy_cleanup_params - name: Run cinder_deploy_cleanup retries: "{{ make_cinder_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_cinder_deploy_cleanup_delay | default(omit) }}" until: "{{ make_cinder_deploy_cleanup_until | default(true) }}" register: "make_cinder_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_deploy_cleanup" dry_run: "{{ make_cinder_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_deploy_cleanup_env|default({})), **(make_cinder_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000165415133730043033375 0ustar zuulzuul--- - name: Debug make_rabbitmq_prep_env when: make_rabbitmq_prep_env is defined ansible.builtin.debug: var: make_rabbitmq_prep_env - name: Debug make_rabbitmq_prep_params when: make_rabbitmq_prep_params is defined ansible.builtin.debug: var: make_rabbitmq_prep_params - name: Run rabbitmq_prep retries: "{{ make_rabbitmq_prep_retries | default(omit) }}" delay: "{{ make_rabbitmq_prep_delay | default(omit) }}" until: "{{ make_rabbitmq_prep_until | default(true) }}" register: "make_rabbitmq_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq_prep" dry_run: "{{ make_rabbitmq_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_prep_env|default({})), **(make_rabbitmq_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000154115133730043033370 0ustar zuulzuul--- - name: Debug make_rabbitmq_env when: make_rabbitmq_env is defined ansible.builtin.debug: var: make_rabbitmq_env - name: Debug make_rabbitmq_params when: make_rabbitmq_params is defined ansible.builtin.debug: var: make_rabbitmq_params - name: Run rabbitmq retries: "{{ make_rabbitmq_retries | default(omit) }}" delay: "{{ make_rabbitmq_delay | default(omit) }}" until: "{{ make_rabbitmq_until | default(true) }}" register: "make_rabbitmq_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq" dry_run: "{{ make_rabbitmq_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_env|default({})), **(make_rabbitmq_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000173115133730043033371 0ustar zuulzuul--- - name: Debug make_rabbitmq_cleanup_env when: make_rabbitmq_cleanup_env is defined ansible.builtin.debug: var: make_rabbitmq_cleanup_env - name: Debug make_rabbitmq_cleanup_params when: make_rabbitmq_cleanup_params is defined ansible.builtin.debug: var: make_rabbitmq_cleanup_params - name: Run rabbitmq_cleanup retries: "{{ make_rabbitmq_cleanup_retries | default(omit) }}" delay: "{{ make_rabbitmq_cleanup_delay | default(omit) }}" until: "{{ make_rabbitmq_cleanup_until | default(true) }}" register: "make_rabbitmq_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq_cleanup" dry_run: "{{ make_rabbitmq_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_cleanup_env|default({})), **(make_rabbitmq_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000202515133730043033366 0ustar zuulzuul--- - name: Debug make_rabbitmq_deploy_prep_env when: make_rabbitmq_deploy_prep_env is defined ansible.builtin.debug: var: make_rabbitmq_deploy_prep_env - name: Debug make_rabbitmq_deploy_prep_params when: make_rabbitmq_deploy_prep_params is defined ansible.builtin.debug: var: make_rabbitmq_deploy_prep_params - name: Run rabbitmq_deploy_prep retries: "{{ make_rabbitmq_deploy_prep_retries | default(omit) }}" delay: "{{ make_rabbitmq_deploy_prep_delay | default(omit) }}" until: "{{ make_rabbitmq_deploy_prep_until | default(true) }}" register: "make_rabbitmq_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq_deploy_prep" dry_run: "{{ make_rabbitmq_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_deploy_prep_env|default({})), **(make_rabbitmq_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000171215133730043033370 0ustar zuulzuul--- - name: Debug make_rabbitmq_deploy_env when: make_rabbitmq_deploy_env is defined ansible.builtin.debug: var: make_rabbitmq_deploy_env - name: Debug make_rabbitmq_deploy_params when: make_rabbitmq_deploy_params is defined ansible.builtin.debug: var: make_rabbitmq_deploy_params - name: Run rabbitmq_deploy retries: "{{ make_rabbitmq_deploy_retries | default(omit) }}" delay: "{{ make_rabbitmq_deploy_delay | default(omit) }}" until: "{{ make_rabbitmq_deploy_until | default(true) }}" register: "make_rabbitmq_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq_deploy" dry_run: "{{ make_rabbitmq_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_deploy_env|default({})), **(make_rabbitmq_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rabbitmq0000644000175000017500000000210215133730043033362 0ustar zuulzuul--- - name: Debug make_rabbitmq_deploy_cleanup_env when: make_rabbitmq_deploy_cleanup_env is defined ansible.builtin.debug: var: make_rabbitmq_deploy_cleanup_env - name: Debug make_rabbitmq_deploy_cleanup_params when: make_rabbitmq_deploy_cleanup_params is defined ansible.builtin.debug: var: make_rabbitmq_deploy_cleanup_params - name: Run rabbitmq_deploy_cleanup retries: "{{ make_rabbitmq_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_rabbitmq_deploy_cleanup_delay | default(omit) }}" until: "{{ make_rabbitmq_deploy_cleanup_until | default(true) }}" register: "make_rabbitmq_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rabbitmq_deploy_cleanup" dry_run: "{{ make_rabbitmq_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rabbitmq_deploy_cleanup_env|default({})), **(make_rabbitmq_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_p0000644000175000017500000000161615133730043033374 0ustar zuulzuul--- - name: Debug make_ironic_prep_env when: make_ironic_prep_env is defined ansible.builtin.debug: var: make_ironic_prep_env - name: Debug make_ironic_prep_params when: make_ironic_prep_params is defined ansible.builtin.debug: var: make_ironic_prep_params - name: Run ironic_prep retries: "{{ make_ironic_prep_retries | default(omit) }}" delay: "{{ make_ironic_prep_delay | default(omit) }}" until: "{{ make_ironic_prep_until | default(true) }}" register: "make_ironic_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_prep" dry_run: "{{ make_ironic_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_prep_env|default({})), **(make_ironic_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic.y0000644000175000017500000000150315133730043033317 0ustar zuulzuul--- - name: Debug make_ironic_env when: make_ironic_env is defined ansible.builtin.debug: var: make_ironic_env - name: Debug make_ironic_params when: make_ironic_params is defined ansible.builtin.debug: var: make_ironic_params - name: Run ironic retries: "{{ make_ironic_retries | default(omit) }}" delay: "{{ make_ironic_delay | default(omit) }}" until: "{{ make_ironic_until | default(true) }}" register: "make_ironic_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic" dry_run: "{{ make_ironic_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_env|default({})), **(make_ironic_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_c0000644000175000017500000000167315133730043033362 0ustar zuulzuul--- - name: Debug make_ironic_cleanup_env when: make_ironic_cleanup_env is defined ansible.builtin.debug: var: make_ironic_cleanup_env - name: Debug make_ironic_cleanup_params when: make_ironic_cleanup_params is defined ansible.builtin.debug: var: make_ironic_cleanup_params - name: Run ironic_cleanup retries: "{{ make_ironic_cleanup_retries | default(omit) }}" delay: "{{ make_ironic_cleanup_delay | default(omit) }}" until: "{{ make_ironic_cleanup_until | default(true) }}" register: "make_ironic_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_cleanup" dry_run: "{{ make_ironic_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_cleanup_env|default({})), **(make_ironic_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_d0000644000175000017500000000176715133730043033367 0ustar zuulzuul--- - name: Debug make_ironic_deploy_prep_env when: make_ironic_deploy_prep_env is defined ansible.builtin.debug: var: make_ironic_deploy_prep_env - name: Debug make_ironic_deploy_prep_params when: make_ironic_deploy_prep_params is defined ansible.builtin.debug: var: make_ironic_deploy_prep_params - name: Run ironic_deploy_prep retries: "{{ make_ironic_deploy_prep_retries | default(omit) }}" delay: "{{ make_ironic_deploy_prep_delay | default(omit) }}" until: "{{ make_ironic_deploy_prep_until | default(true) }}" register: "make_ironic_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_deploy_prep" dry_run: "{{ make_ironic_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_deploy_prep_env|default({})), **(make_ironic_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_d0000644000175000017500000000165415133730043033362 0ustar zuulzuul--- - name: Debug make_ironic_deploy_env when: make_ironic_deploy_env is defined ansible.builtin.debug: var: make_ironic_deploy_env - name: Debug make_ironic_deploy_params when: make_ironic_deploy_params is defined ansible.builtin.debug: var: make_ironic_deploy_params - name: Run ironic_deploy retries: "{{ make_ironic_deploy_retries | default(omit) }}" delay: "{{ make_ironic_deploy_delay | default(omit) }}" until: "{{ make_ironic_deploy_until | default(true) }}" register: "make_ironic_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_deploy" dry_run: "{{ make_ironic_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_deploy_env|default({})), **(make_ironic_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_d0000644000175000017500000000204415133730043033354 0ustar zuulzuul--- - name: Debug make_ironic_deploy_cleanup_env when: make_ironic_deploy_cleanup_env is defined ansible.builtin.debug: var: make_ironic_deploy_cleanup_env - name: Debug make_ironic_deploy_cleanup_params when: make_ironic_deploy_cleanup_params is defined ansible.builtin.debug: var: make_ironic_deploy_cleanup_params - name: Run ironic_deploy_cleanup retries: "{{ make_ironic_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_ironic_deploy_cleanup_delay | default(omit) }}" until: "{{ make_ironic_deploy_cleanup_until | default(true) }}" register: "make_ironic_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_deploy_cleanup" dry_run: "{{ make_ironic_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_deploy_cleanup_env|default({})), **(make_ironic_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000163515133730043033360 0ustar zuulzuul--- - name: Debug make_octavia_prep_env when: make_octavia_prep_env is defined ansible.builtin.debug: var: make_octavia_prep_env - name: Debug make_octavia_prep_params when: make_octavia_prep_params is defined ansible.builtin.debug: var: make_octavia_prep_params - name: Run octavia_prep retries: "{{ make_octavia_prep_retries | default(omit) }}" delay: "{{ make_octavia_prep_delay | default(omit) }}" until: "{{ make_octavia_prep_until | default(true) }}" register: "make_octavia_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_prep" dry_run: "{{ make_octavia_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_prep_env|default({})), **(make_octavia_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia.0000644000175000017500000000152215133730043033272 0ustar zuulzuul--- - name: Debug make_octavia_env when: make_octavia_env is defined ansible.builtin.debug: var: make_octavia_env - name: Debug make_octavia_params when: make_octavia_params is defined ansible.builtin.debug: var: make_octavia_params - name: Run octavia retries: "{{ make_octavia_retries | default(omit) }}" delay: "{{ make_octavia_delay | default(omit) }}" until: "{{ make_octavia_until | default(true) }}" register: "make_octavia_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia" dry_run: "{{ make_octavia_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_env|default({})), **(make_octavia_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000171215133730043033354 0ustar zuulzuul--- - name: Debug make_octavia_cleanup_env when: make_octavia_cleanup_env is defined ansible.builtin.debug: var: make_octavia_cleanup_env - name: Debug make_octavia_cleanup_params when: make_octavia_cleanup_params is defined ansible.builtin.debug: var: make_octavia_cleanup_params - name: Run octavia_cleanup retries: "{{ make_octavia_cleanup_retries | default(omit) }}" delay: "{{ make_octavia_cleanup_delay | default(omit) }}" until: "{{ make_octavia_cleanup_until | default(true) }}" register: "make_octavia_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_cleanup" dry_run: "{{ make_octavia_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_cleanup_env|default({})), **(make_octavia_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000200615133730043033351 0ustar zuulzuul--- - name: Debug make_octavia_deploy_prep_env when: make_octavia_deploy_prep_env is defined ansible.builtin.debug: var: make_octavia_deploy_prep_env - name: Debug make_octavia_deploy_prep_params when: make_octavia_deploy_prep_params is defined ansible.builtin.debug: var: make_octavia_deploy_prep_params - name: Run octavia_deploy_prep retries: "{{ make_octavia_deploy_prep_retries | default(omit) }}" delay: "{{ make_octavia_deploy_prep_delay | default(omit) }}" until: "{{ make_octavia_deploy_prep_until | default(true) }}" register: "make_octavia_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_deploy_prep" dry_run: "{{ make_octavia_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_deploy_prep_env|default({})), **(make_octavia_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000167315133730043033362 0ustar zuulzuul--- - name: Debug make_octavia_deploy_env when: make_octavia_deploy_env is defined ansible.builtin.debug: var: make_octavia_deploy_env - name: Debug make_octavia_deploy_params when: make_octavia_deploy_params is defined ansible.builtin.debug: var: make_octavia_deploy_params - name: Run octavia_deploy retries: "{{ make_octavia_deploy_retries | default(omit) }}" delay: "{{ make_octavia_deploy_delay | default(omit) }}" until: "{{ make_octavia_deploy_until | default(true) }}" register: "make_octavia_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_deploy" dry_run: "{{ make_octavia_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_deploy_env|default({})), **(make_octavia_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000206315133730043033354 0ustar zuulzuul--- - name: Debug make_octavia_deploy_cleanup_env when: make_octavia_deploy_cleanup_env is defined ansible.builtin.debug: var: make_octavia_deploy_cleanup_env - name: Debug make_octavia_deploy_cleanup_params when: make_octavia_deploy_cleanup_params is defined ansible.builtin.debug: var: make_octavia_deploy_cleanup_params - name: Run octavia_deploy_cleanup retries: "{{ make_octavia_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_octavia_deploy_cleanup_delay | default(omit) }}" until: "{{ make_octavia_deploy_cleanup_until | default(true) }}" register: "make_octavia_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_deploy_cleanup" dry_run: "{{ make_octavia_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_deploy_cleanup_env|default({})), **(make_octavia_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000167315133730043033373 0ustar zuulzuul--- - name: Debug make_designate_prep_env when: make_designate_prep_env is defined ansible.builtin.debug: var: make_designate_prep_env - name: Debug make_designate_prep_params when: make_designate_prep_params is defined ansible.builtin.debug: var: make_designate_prep_params - name: Run designate_prep retries: "{{ make_designate_prep_retries | default(omit) }}" delay: "{{ make_designate_prep_delay | default(omit) }}" until: "{{ make_designate_prep_until | default(true) }}" register: "make_designate_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_prep" dry_run: "{{ make_designate_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_prep_env|default({})), **(make_designate_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000156015133730043033366 0ustar zuulzuul--- - name: Debug make_designate_env when: make_designate_env is defined ansible.builtin.debug: var: make_designate_env - name: Debug make_designate_params when: make_designate_params is defined ansible.builtin.debug: var: make_designate_params - name: Run designate retries: "{{ make_designate_retries | default(omit) }}" delay: "{{ make_designate_delay | default(omit) }}" until: "{{ make_designate_until | default(true) }}" register: "make_designate_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate" dry_run: "{{ make_designate_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_env|default({})), **(make_designate_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000175015133730043033367 0ustar zuulzuul--- - name: Debug make_designate_cleanup_env when: make_designate_cleanup_env is defined ansible.builtin.debug: var: make_designate_cleanup_env - name: Debug make_designate_cleanup_params when: make_designate_cleanup_params is defined ansible.builtin.debug: var: make_designate_cleanup_params - name: Run designate_cleanup retries: "{{ make_designate_cleanup_retries | default(omit) }}" delay: "{{ make_designate_cleanup_delay | default(omit) }}" until: "{{ make_designate_cleanup_until | default(true) }}" register: "make_designate_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_cleanup" dry_run: "{{ make_designate_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_cleanup_env|default({})), **(make_designate_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000204415133730043033364 0ustar zuulzuul--- - name: Debug make_designate_deploy_prep_env when: make_designate_deploy_prep_env is defined ansible.builtin.debug: var: make_designate_deploy_prep_env - name: Debug make_designate_deploy_prep_params when: make_designate_deploy_prep_params is defined ansible.builtin.debug: var: make_designate_deploy_prep_params - name: Run designate_deploy_prep retries: "{{ make_designate_deploy_prep_retries | default(omit) }}" delay: "{{ make_designate_deploy_prep_delay | default(omit) }}" until: "{{ make_designate_deploy_prep_until | default(true) }}" register: "make_designate_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_deploy_prep" dry_run: "{{ make_designate_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_deploy_prep_env|default({})), **(make_designate_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000173115133730043033366 0ustar zuulzuul--- - name: Debug make_designate_deploy_env when: make_designate_deploy_env is defined ansible.builtin.debug: var: make_designate_deploy_env - name: Debug make_designate_deploy_params when: make_designate_deploy_params is defined ansible.builtin.debug: var: make_designate_deploy_params - name: Run designate_deploy retries: "{{ make_designate_deploy_retries | default(omit) }}" delay: "{{ make_designate_deploy_delay | default(omit) }}" until: "{{ make_designate_deploy_until | default(true) }}" register: "make_designate_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_deploy" dry_run: "{{ make_designate_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_deploy_env|default({})), **(make_designate_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000212115133730043033360 0ustar zuulzuul--- - name: Debug make_designate_deploy_cleanup_env when: make_designate_deploy_cleanup_env is defined ansible.builtin.debug: var: make_designate_deploy_cleanup_env - name: Debug make_designate_deploy_cleanup_params when: make_designate_deploy_cleanup_params is defined ansible.builtin.debug: var: make_designate_deploy_cleanup_params - name: Run designate_deploy_cleanup retries: "{{ make_designate_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_designate_deploy_cleanup_delay | default(omit) }}" until: "{{ make_designate_deploy_cleanup_until | default(true) }}" register: "make_designate_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_deploy_cleanup" dry_run: "{{ make_designate_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_deploy_cleanup_env|default({})), **(make_designate_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_pre0000644000175000017500000000156015133730043033401 0ustar zuulzuul--- - name: Debug make_nova_prep_env when: make_nova_prep_env is defined ansible.builtin.debug: var: make_nova_prep_env - name: Debug make_nova_prep_params when: make_nova_prep_params is defined ansible.builtin.debug: var: make_nova_prep_params - name: Run nova_prep retries: "{{ make_nova_prep_retries | default(omit) }}" delay: "{{ make_nova_prep_delay | default(omit) }}" until: "{{ make_nova_prep_until | default(true) }}" register: "make_nova_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova_prep" dry_run: "{{ make_nova_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_prep_env|default({})), **(make_nova_prep_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova.yml0000644000175000017500000000144515133730043033335 0ustar zuulzuul--- - name: Debug make_nova_env when: make_nova_env is defined ansible.builtin.debug: var: make_nova_env - name: Debug make_nova_params when: make_nova_params is defined ansible.builtin.debug: var: make_nova_params - name: Run nova retries: "{{ make_nova_retries | default(omit) }}" delay: "{{ make_nova_delay | default(omit) }}" until: "{{ make_nova_until | default(true) }}" register: "make_nova_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova" dry_run: "{{ make_nova_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_env|default({})), **(make_nova_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_cle0000644000175000017500000000163515133730043033361 0ustar zuulzuul--- - name: Debug make_nova_cleanup_env when: make_nova_cleanup_env is defined ansible.builtin.debug: var: make_nova_cleanup_env - name: Debug make_nova_cleanup_params when: make_nova_cleanup_params is defined ansible.builtin.debug: var: make_nova_cleanup_params - name: Run nova_cleanup retries: "{{ make_nova_cleanup_retries | default(omit) }}" delay: "{{ make_nova_cleanup_delay | default(omit) }}" until: "{{ make_nova_cleanup_until | default(true) }}" register: "make_nova_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova_cleanup" dry_run: "{{ make_nova_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_cleanup_env|default({})), **(make_nova_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_dep0000644000175000017500000000173115133730043033363 0ustar zuulzuul--- - name: Debug make_nova_deploy_prep_env when: make_nova_deploy_prep_env is defined ansible.builtin.debug: var: make_nova_deploy_prep_env - name: Debug make_nova_deploy_prep_params when: make_nova_deploy_prep_params is defined ansible.builtin.debug: var: make_nova_deploy_prep_params - name: Run nova_deploy_prep retries: "{{ make_nova_deploy_prep_retries | default(omit) }}" delay: "{{ make_nova_deploy_prep_delay | default(omit) }}" until: "{{ make_nova_deploy_prep_until | default(true) }}" register: "make_nova_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova_deploy_prep" dry_run: "{{ make_nova_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_deploy_prep_env|default({})), **(make_nova_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_dep0000644000175000017500000000161615133730043033365 0ustar zuulzuul--- - name: Debug make_nova_deploy_env when: make_nova_deploy_env is defined ansible.builtin.debug: var: make_nova_deploy_env - name: Debug make_nova_deploy_params when: make_nova_deploy_params is defined ansible.builtin.debug: var: make_nova_deploy_params - name: Run nova_deploy retries: "{{ make_nova_deploy_retries | default(omit) }}" delay: "{{ make_nova_deploy_delay | default(omit) }}" until: "{{ make_nova_deploy_until | default(true) }}" register: "make_nova_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova_deploy" dry_run: "{{ make_nova_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_deploy_env|default({})), **(make_nova_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nova_dep0000644000175000017500000000200615133730043033357 0ustar zuulzuul--- - name: Debug make_nova_deploy_cleanup_env when: make_nova_deploy_cleanup_env is defined ansible.builtin.debug: var: make_nova_deploy_cleanup_env - name: Debug make_nova_deploy_cleanup_params when: make_nova_deploy_cleanup_params is defined ansible.builtin.debug: var: make_nova_deploy_cleanup_params - name: Run nova_deploy_cleanup retries: "{{ make_nova_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_nova_deploy_cleanup_delay | default(omit) }}" until: "{{ make_nova_deploy_cleanup_until | default(true) }}" register: "make_nova_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nova_deploy_cleanup" dry_run: "{{ make_nova_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nova_deploy_cleanup_env|default({})), **(make_nova_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000175015133730043033327 0ustar zuulzuul--- - name: Debug make_mariadb_kuttl_run_env when: make_mariadb_kuttl_run_env is defined ansible.builtin.debug: var: make_mariadb_kuttl_run_env - name: Debug make_mariadb_kuttl_run_params when: make_mariadb_kuttl_run_params is defined ansible.builtin.debug: var: make_mariadb_kuttl_run_params - name: Run mariadb_kuttl_run retries: "{{ make_mariadb_kuttl_run_retries | default(omit) }}" delay: "{{ make_mariadb_kuttl_run_delay | default(omit) }}" until: "{{ make_mariadb_kuttl_run_until | default(true) }}" register: "make_mariadb_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_kuttl_run" dry_run: "{{ make_mariadb_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_kuttl_run_env|default({})), **(make_mariadb_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000165415133730043033332 0ustar zuulzuul--- - name: Debug make_mariadb_kuttl_env when: make_mariadb_kuttl_env is defined ansible.builtin.debug: var: make_mariadb_kuttl_env - name: Debug make_mariadb_kuttl_params when: make_mariadb_kuttl_params is defined ansible.builtin.debug: var: make_mariadb_kuttl_params - name: Run mariadb_kuttl retries: "{{ make_mariadb_kuttl_retries | default(omit) }}" delay: "{{ make_mariadb_kuttl_delay | default(omit) }}" until: "{{ make_mariadb_kuttl_until | default(true) }}" register: "make_mariadb_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_kuttl" dry_run: "{{ make_mariadb_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_kuttl_env|default({})), **(make_mariadb_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_db_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_db0000644000175000017500000000165415133730043033404 0ustar zuulzuul--- - name: Debug make_kuttl_db_prep_env when: make_kuttl_db_prep_env is defined ansible.builtin.debug: var: make_kuttl_db_prep_env - name: Debug make_kuttl_db_prep_params when: make_kuttl_db_prep_params is defined ansible.builtin.debug: var: make_kuttl_db_prep_params - name: Run kuttl_db_prep retries: "{{ make_kuttl_db_prep_retries | default(omit) }}" delay: "{{ make_kuttl_db_prep_delay | default(omit) }}" until: "{{ make_kuttl_db_prep_until | default(true) }}" register: "make_kuttl_db_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make kuttl_db_prep" dry_run: "{{ make_kuttl_db_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_kuttl_db_prep_env|default({})), **(make_kuttl_db_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_db_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_db0000644000175000017500000000173115133730043033400 0ustar zuulzuul--- - name: Debug make_kuttl_db_cleanup_env when: make_kuttl_db_cleanup_env is defined ansible.builtin.debug: var: make_kuttl_db_cleanup_env - name: Debug make_kuttl_db_cleanup_params when: make_kuttl_db_cleanup_params is defined ansible.builtin.debug: var: make_kuttl_db_cleanup_params - name: Run kuttl_db_cleanup retries: "{{ make_kuttl_db_cleanup_retries | default(omit) }}" delay: "{{ make_kuttl_db_cleanup_delay | default(omit) }}" until: "{{ make_kuttl_db_cleanup_until | default(true) }}" register: "make_kuttl_db_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make kuttl_db_cleanup" dry_run: "{{ make_kuttl_db_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_kuttl_db_cleanup_env|default({})), **(make_kuttl_db_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_common_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_co0000644000175000017500000000175015133730043033415 0ustar zuulzuul--- - name: Debug make_kuttl_common_prep_env when: make_kuttl_common_prep_env is defined ansible.builtin.debug: var: make_kuttl_common_prep_env - name: Debug make_kuttl_common_prep_params when: make_kuttl_common_prep_params is defined ansible.builtin.debug: var: make_kuttl_common_prep_params - name: Run kuttl_common_prep retries: "{{ make_kuttl_common_prep_retries | default(omit) }}" delay: "{{ make_kuttl_common_prep_delay | default(omit) }}" until: "{{ make_kuttl_common_prep_until | default(true) }}" register: "make_kuttl_common_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make kuttl_common_prep" dry_run: "{{ make_kuttl_common_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_kuttl_common_prep_env|default({})), **(make_kuttl_common_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_common_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_kuttl_co0000644000175000017500000000202515133730043033411 0ustar zuulzuul--- - name: Debug make_kuttl_common_cleanup_env when: make_kuttl_common_cleanup_env is defined ansible.builtin.debug: var: make_kuttl_common_cleanup_env - name: Debug make_kuttl_common_cleanup_params when: make_kuttl_common_cleanup_params is defined ansible.builtin.debug: var: make_kuttl_common_cleanup_params - name: Run kuttl_common_cleanup retries: "{{ make_kuttl_common_cleanup_retries | default(omit) }}" delay: "{{ make_kuttl_common_cleanup_delay | default(omit) }}" until: "{{ make_kuttl_common_cleanup_until | default(true) }}" register: "make_kuttl_common_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make kuttl_common_cleanup" dry_run: "{{ make_kuttl_common_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_kuttl_common_cleanup_env|default({})), **(make_kuttl_common_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000176715133730043033442 0ustar zuulzuul--- - name: Debug make_keystone_kuttl_run_env when: make_keystone_kuttl_run_env is defined ansible.builtin.debug: var: make_keystone_kuttl_run_env - name: Debug make_keystone_kuttl_run_params when: make_keystone_kuttl_run_params is defined ansible.builtin.debug: var: make_keystone_kuttl_run_params - name: Run keystone_kuttl_run retries: "{{ make_keystone_kuttl_run_retries | default(omit) }}" delay: "{{ make_keystone_kuttl_run_delay | default(omit) }}" until: "{{ make_keystone_kuttl_run_until | default(true) }}" register: "make_keystone_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_kuttl_run" dry_run: "{{ make_keystone_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_kuttl_run_env|default({})), **(make_keystone_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_keystone0000644000175000017500000000167315133730043033436 0ustar zuulzuul--- - name: Debug make_keystone_kuttl_env when: make_keystone_kuttl_env is defined ansible.builtin.debug: var: make_keystone_kuttl_env - name: Debug make_keystone_kuttl_params when: make_keystone_kuttl_params is defined ansible.builtin.debug: var: make_keystone_kuttl_params - name: Run keystone_kuttl retries: "{{ make_keystone_kuttl_retries | default(omit) }}" delay: "{{ make_keystone_kuttl_delay | default(omit) }}" until: "{{ make_keystone_kuttl_until | default(true) }}" register: "make_keystone_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make keystone_kuttl" dry_run: "{{ make_keystone_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_keystone_kuttl_env|default({})), **(make_keystone_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000176715133730043033342 0ustar zuulzuul--- - name: Debug make_barbican_kuttl_run_env when: make_barbican_kuttl_run_env is defined ansible.builtin.debug: var: make_barbican_kuttl_run_env - name: Debug make_barbican_kuttl_run_params when: make_barbican_kuttl_run_params is defined ansible.builtin.debug: var: make_barbican_kuttl_run_params - name: Run barbican_kuttl_run retries: "{{ make_barbican_kuttl_run_retries | default(omit) }}" delay: "{{ make_barbican_kuttl_run_delay | default(omit) }}" until: "{{ make_barbican_kuttl_run_until | default(true) }}" register: "make_barbican_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_kuttl_run" dry_run: "{{ make_barbican_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_kuttl_run_env|default({})), **(make_barbican_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_barbican0000644000175000017500000000167315133730043033336 0ustar zuulzuul--- - name: Debug make_barbican_kuttl_env when: make_barbican_kuttl_env is defined ansible.builtin.debug: var: make_barbican_kuttl_env - name: Debug make_barbican_kuttl_params when: make_barbican_kuttl_params is defined ansible.builtin.debug: var: make_barbican_kuttl_params - name: Run barbican_kuttl retries: "{{ make_barbican_kuttl_retries | default(omit) }}" delay: "{{ make_barbican_kuttl_delay | default(omit) }}" until: "{{ make_barbican_kuttl_until | default(true) }}" register: "make_barbican_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make barbican_kuttl" dry_run: "{{ make_barbican_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_barbican_kuttl_env|default({})), **(make_barbican_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000200615133730043033350 0ustar zuulzuul--- - name: Debug make_placement_kuttl_run_env when: make_placement_kuttl_run_env is defined ansible.builtin.debug: var: make_placement_kuttl_run_env - name: Debug make_placement_kuttl_run_params when: make_placement_kuttl_run_params is defined ansible.builtin.debug: var: make_placement_kuttl_run_params - name: Run placement_kuttl_run retries: "{{ make_placement_kuttl_run_retries | default(omit) }}" delay: "{{ make_placement_kuttl_run_delay | default(omit) }}" until: "{{ make_placement_kuttl_run_until | default(true) }}" register: "make_placement_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_kuttl_run" dry_run: "{{ make_placement_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_kuttl_run_env|default({})), **(make_placement_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placement_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_placemen0000644000175000017500000000171215133730043033353 0ustar zuulzuul--- - name: Debug make_placement_kuttl_env when: make_placement_kuttl_env is defined ansible.builtin.debug: var: make_placement_kuttl_env - name: Debug make_placement_kuttl_params when: make_placement_kuttl_params is defined ansible.builtin.debug: var: make_placement_kuttl_params - name: Run placement_kuttl retries: "{{ make_placement_kuttl_retries | default(omit) }}" delay: "{{ make_placement_kuttl_delay | default(omit) }}" until: "{{ make_placement_kuttl_until | default(true) }}" register: "make_placement_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make placement_kuttl" dry_run: "{{ make_placement_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_placement_kuttl_env|default({})), **(make_placement_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_k0000644000175000017500000000173115133730043033346 0ustar zuulzuul--- - name: Debug make_cinder_kuttl_run_env when: make_cinder_kuttl_run_env is defined ansible.builtin.debug: var: make_cinder_kuttl_run_env - name: Debug make_cinder_kuttl_run_params when: make_cinder_kuttl_run_params is defined ansible.builtin.debug: var: make_cinder_kuttl_run_params - name: Run cinder_kuttl_run retries: "{{ make_cinder_kuttl_run_retries | default(omit) }}" delay: "{{ make_cinder_kuttl_run_delay | default(omit) }}" until: "{{ make_cinder_kuttl_run_until | default(true) }}" register: "make_cinder_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_kuttl_run" dry_run: "{{ make_cinder_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_kuttl_run_env|default({})), **(make_cinder_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cinder_k0000644000175000017500000000163515133730043033351 0ustar zuulzuul--- - name: Debug make_cinder_kuttl_env when: make_cinder_kuttl_env is defined ansible.builtin.debug: var: make_cinder_kuttl_env - name: Debug make_cinder_kuttl_params when: make_cinder_kuttl_params is defined ansible.builtin.debug: var: make_cinder_kuttl_params - name: Run cinder_kuttl retries: "{{ make_cinder_kuttl_retries | default(omit) }}" delay: "{{ make_cinder_kuttl_delay | default(omit) }}" until: "{{ make_cinder_kuttl_until | default(true) }}" register: "make_cinder_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make cinder_kuttl" dry_run: "{{ make_cinder_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cinder_kuttl_env|default({})), **(make_cinder_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000175015133730043033422 0ustar zuulzuul--- - name: Debug make_neutron_kuttl_run_env when: make_neutron_kuttl_run_env is defined ansible.builtin.debug: var: make_neutron_kuttl_run_env - name: Debug make_neutron_kuttl_run_params when: make_neutron_kuttl_run_params is defined ansible.builtin.debug: var: make_neutron_kuttl_run_params - name: Run neutron_kuttl_run retries: "{{ make_neutron_kuttl_run_retries | default(omit) }}" delay: "{{ make_neutron_kuttl_run_delay | default(omit) }}" until: "{{ make_neutron_kuttl_run_until | default(true) }}" register: "make_neutron_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_kuttl_run" dry_run: "{{ make_neutron_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_kuttl_run_env|default({})), **(make_neutron_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_neutron_0000644000175000017500000000165415133730043033425 0ustar zuulzuul--- - name: Debug make_neutron_kuttl_env when: make_neutron_kuttl_env is defined ansible.builtin.debug: var: make_neutron_kuttl_env - name: Debug make_neutron_kuttl_params when: make_neutron_kuttl_params is defined ansible.builtin.debug: var: make_neutron_kuttl_params - name: Run neutron_kuttl retries: "{{ make_neutron_kuttl_retries | default(omit) }}" delay: "{{ make_neutron_kuttl_delay | default(omit) }}" until: "{{ make_neutron_kuttl_until | default(true) }}" register: "make_neutron_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make neutron_kuttl" dry_run: "{{ make_neutron_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_neutron_kuttl_env|default({})), **(make_neutron_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000175015133730043033356 0ustar zuulzuul--- - name: Debug make_octavia_kuttl_run_env when: make_octavia_kuttl_run_env is defined ansible.builtin.debug: var: make_octavia_kuttl_run_env - name: Debug make_octavia_kuttl_run_params when: make_octavia_kuttl_run_params is defined ansible.builtin.debug: var: make_octavia_kuttl_run_params - name: Run octavia_kuttl_run retries: "{{ make_octavia_kuttl_run_retries | default(omit) }}" delay: "{{ make_octavia_kuttl_run_delay | default(omit) }}" until: "{{ make_octavia_kuttl_run_until | default(true) }}" register: "make_octavia_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_kuttl_run" dry_run: "{{ make_octavia_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_kuttl_run_env|default({})), **(make_octavia_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_octavia_0000644000175000017500000000165415133730043033361 0ustar zuulzuul--- - name: Debug make_octavia_kuttl_env when: make_octavia_kuttl_env is defined ansible.builtin.debug: var: make_octavia_kuttl_env - name: Debug make_octavia_kuttl_params when: make_octavia_kuttl_params is defined ansible.builtin.debug: var: make_octavia_kuttl_params - name: Run octavia_kuttl retries: "{{ make_octavia_kuttl_retries | default(omit) }}" delay: "{{ make_octavia_kuttl_delay | default(omit) }}" until: "{{ make_octavia_kuttl_until | default(true) }}" register: "make_octavia_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make octavia_kuttl" dry_run: "{{ make_octavia_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_octavia_kuttl_env|default({})), **(make_octavia_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000171215133730043033365 0ustar zuulzuul--- - name: Debug make_designate_kuttl_env when: make_designate_kuttl_env is defined ansible.builtin.debug: var: make_designate_kuttl_env - name: Debug make_designate_kuttl_params when: make_designate_kuttl_params is defined ansible.builtin.debug: var: make_designate_kuttl_params - name: Run designate_kuttl retries: "{{ make_designate_kuttl_retries | default(omit) }}" delay: "{{ make_designate_kuttl_delay | default(omit) }}" until: "{{ make_designate_kuttl_until | default(true) }}" register: "make_designate_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_kuttl" dry_run: "{{ make_designate_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_kuttl_env|default({})), **(make_designate_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designate_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_designat0000644000175000017500000000200615133730043033362 0ustar zuulzuul--- - name: Debug make_designate_kuttl_run_env when: make_designate_kuttl_run_env is defined ansible.builtin.debug: var: make_designate_kuttl_run_env - name: Debug make_designate_kuttl_run_params when: make_designate_kuttl_run_params is defined ansible.builtin.debug: var: make_designate_kuttl_run_params - name: Run designate_kuttl_run retries: "{{ make_designate_kuttl_run_retries | default(omit) }}" delay: "{{ make_designate_kuttl_run_delay | default(omit) }}" until: "{{ make_designate_kuttl_run_until | default(true) }}" register: "make_designate_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make designate_kuttl_run" dry_run: "{{ make_designate_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_designate_kuttl_run_env|default({})), **(make_designate_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_kutt0000644000175000017500000000165415133730043033445 0ustar zuulzuul--- - name: Debug make_ovn_kuttl_run_env when: make_ovn_kuttl_run_env is defined ansible.builtin.debug: var: make_ovn_kuttl_run_env - name: Debug make_ovn_kuttl_run_params when: make_ovn_kuttl_run_params is defined ansible.builtin.debug: var: make_ovn_kuttl_run_params - name: Run ovn_kuttl_run retries: "{{ make_ovn_kuttl_run_retries | default(omit) }}" delay: "{{ make_ovn_kuttl_run_delay | default(omit) }}" until: "{{ make_ovn_kuttl_run_until | default(true) }}" register: "make_ovn_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_kuttl_run" dry_run: "{{ make_ovn_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_kuttl_run_env|default({})), **(make_ovn_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ovn_kutt0000644000175000017500000000156015133730043033441 0ustar zuulzuul--- - name: Debug make_ovn_kuttl_env when: make_ovn_kuttl_env is defined ansible.builtin.debug: var: make_ovn_kuttl_env - name: Debug make_ovn_kuttl_params when: make_ovn_kuttl_params is defined ansible.builtin.debug: var: make_ovn_kuttl_params - name: Run ovn_kuttl retries: "{{ make_ovn_kuttl_retries | default(omit) }}" delay: "{{ make_ovn_kuttl_delay | default(omit) }}" until: "{{ make_ovn_kuttl_until | default(true) }}" register: "make_ovn_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ovn_kuttl" dry_run: "{{ make_ovn_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ovn_kuttl_env|default({})), **(make_ovn_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_ku0000644000175000017500000000171215133730043033365 0ustar zuulzuul--- - name: Debug make_infra_kuttl_run_env when: make_infra_kuttl_run_env is defined ansible.builtin.debug: var: make_infra_kuttl_run_env - name: Debug make_infra_kuttl_run_params when: make_infra_kuttl_run_params is defined ansible.builtin.debug: var: make_infra_kuttl_run_params - name: Run infra_kuttl_run retries: "{{ make_infra_kuttl_run_retries | default(omit) }}" delay: "{{ make_infra_kuttl_run_delay | default(omit) }}" until: "{{ make_infra_kuttl_run_until | default(true) }}" register: "make_infra_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make infra_kuttl_run" dry_run: "{{ make_infra_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_infra_kuttl_run_env|default({})), **(make_infra_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_infra_ku0000644000175000017500000000161615133730043033370 0ustar zuulzuul--- - name: Debug make_infra_kuttl_env when: make_infra_kuttl_env is defined ansible.builtin.debug: var: make_infra_kuttl_env - name: Debug make_infra_kuttl_params when: make_infra_kuttl_params is defined ansible.builtin.debug: var: make_infra_kuttl_params - name: Run infra_kuttl retries: "{{ make_infra_kuttl_retries | default(omit) }}" delay: "{{ make_infra_kuttl_delay | default(omit) }}" until: "{{ make_infra_kuttl_until | default(true) }}" register: "make_infra_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make infra_kuttl" dry_run: "{{ make_infra_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_infra_kuttl_env|default({})), **(make_infra_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_k0000644000175000017500000000173115133730043033365 0ustar zuulzuul--- - name: Debug make_ironic_kuttl_run_env when: make_ironic_kuttl_run_env is defined ansible.builtin.debug: var: make_ironic_kuttl_run_env - name: Debug make_ironic_kuttl_run_params when: make_ironic_kuttl_run_params is defined ansible.builtin.debug: var: make_ironic_kuttl_run_params - name: Run ironic_kuttl_run retries: "{{ make_ironic_kuttl_run_retries | default(omit) }}" delay: "{{ make_ironic_kuttl_run_delay | default(omit) }}" until: "{{ make_ironic_kuttl_run_until | default(true) }}" register: "make_ironic_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_kuttl_run" dry_run: "{{ make_ironic_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_kuttl_run_env|default({})), **(make_ironic_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_k0000644000175000017500000000163515133730043033370 0ustar zuulzuul--- - name: Debug make_ironic_kuttl_env when: make_ironic_kuttl_env is defined ansible.builtin.debug: var: make_ironic_kuttl_env - name: Debug make_ironic_kuttl_params when: make_ironic_kuttl_params is defined ansible.builtin.debug: var: make_ironic_kuttl_params - name: Run ironic_kuttl retries: "{{ make_ironic_kuttl_retries | default(omit) }}" delay: "{{ make_ironic_kuttl_delay | default(omit) }}" until: "{{ make_ironic_kuttl_until | default(true) }}" register: "make_ironic_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_kuttl" dry_run: "{{ make_ironic_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_kuttl_env|default({})), **(make_ironic_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_kuttl_crc.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ironic_k0000644000175000017500000000173115133730043033365 0ustar zuulzuul--- - name: Debug make_ironic_kuttl_crc_env when: make_ironic_kuttl_crc_env is defined ansible.builtin.debug: var: make_ironic_kuttl_crc_env - name: Debug make_ironic_kuttl_crc_params when: make_ironic_kuttl_crc_params is defined ansible.builtin.debug: var: make_ironic_kuttl_crc_params - name: Run ironic_kuttl_crc retries: "{{ make_ironic_kuttl_crc_retries | default(omit) }}" delay: "{{ make_ironic_kuttl_crc_delay | default(omit) }}" until: "{{ make_ironic_kuttl_crc_until | default(true) }}" register: "make_ironic_kuttl_crc_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ironic_kuttl_crc" dry_run: "{{ make_ironic_kuttl_crc_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ironic_kuttl_crc_env|default({})), **(make_ironic_kuttl_crc_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kut0000644000175000017500000000167315133730043033401 0ustar zuulzuul--- - name: Debug make_heat_kuttl_run_env when: make_heat_kuttl_run_env is defined ansible.builtin.debug: var: make_heat_kuttl_run_env - name: Debug make_heat_kuttl_run_params when: make_heat_kuttl_run_params is defined ansible.builtin.debug: var: make_heat_kuttl_run_params - name: Run heat_kuttl_run retries: "{{ make_heat_kuttl_run_retries | default(omit) }}" delay: "{{ make_heat_kuttl_run_delay | default(omit) }}" until: "{{ make_heat_kuttl_run_until | default(true) }}" register: "make_heat_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_kuttl_run" dry_run: "{{ make_heat_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_kuttl_run_env|default({})), **(make_heat_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kut0000644000175000017500000000157715133730043033404 0ustar zuulzuul--- - name: Debug make_heat_kuttl_env when: make_heat_kuttl_env is defined ansible.builtin.debug: var: make_heat_kuttl_env - name: Debug make_heat_kuttl_params when: make_heat_kuttl_params is defined ansible.builtin.debug: var: make_heat_kuttl_params - name: Run heat_kuttl retries: "{{ make_heat_kuttl_retries | default(omit) }}" delay: "{{ make_heat_kuttl_delay | default(omit) }}" until: "{{ make_heat_kuttl_until | default(true) }}" register: "make_heat_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_kuttl" dry_run: "{{ make_heat_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_kuttl_env|default({})), **(make_heat_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kuttl_crc.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_kut0000644000175000017500000000167315133730043033401 0ustar zuulzuul--- - name: Debug make_heat_kuttl_crc_env when: make_heat_kuttl_crc_env is defined ansible.builtin.debug: var: make_heat_kuttl_crc_env - name: Debug make_heat_kuttl_crc_params when: make_heat_kuttl_crc_params is defined ansible.builtin.debug: var: make_heat_kuttl_crc_params - name: Run heat_kuttl_crc retries: "{{ make_heat_kuttl_crc_retries | default(omit) }}" delay: "{{ make_heat_kuttl_crc_delay | default(omit) }}" until: "{{ make_heat_kuttl_crc_until | default(true) }}" register: "make_heat_kuttl_crc_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_kuttl_crc" dry_run: "{{ make_heat_kuttl_crc_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_kuttl_crc_env|default({})), **(make_heat_kuttl_crc_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000200615133730043033346 0ustar zuulzuul--- - name: Debug make_ansibleee_kuttl_run_env when: make_ansibleee_kuttl_run_env is defined ansible.builtin.debug: var: make_ansibleee_kuttl_run_env - name: Debug make_ansibleee_kuttl_run_params when: make_ansibleee_kuttl_run_params is defined ansible.builtin.debug: var: make_ansibleee_kuttl_run_params - name: Run ansibleee_kuttl_run retries: "{{ make_ansibleee_kuttl_run_retries | default(omit) }}" delay: "{{ make_ansibleee_kuttl_run_delay | default(omit) }}" until: "{{ make_ansibleee_kuttl_run_until | default(true) }}" register: "make_ansibleee_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_kuttl_run" dry_run: "{{ make_ansibleee_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_kuttl_run_env|default({})), **(make_ansibleee_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_kuttl_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000210215133730043033343 0ustar zuulzuul--- - name: Debug make_ansibleee_kuttl_cleanup_env when: make_ansibleee_kuttl_cleanup_env is defined ansible.builtin.debug: var: make_ansibleee_kuttl_cleanup_env - name: Debug make_ansibleee_kuttl_cleanup_params when: make_ansibleee_kuttl_cleanup_params is defined ansible.builtin.debug: var: make_ansibleee_kuttl_cleanup_params - name: Run ansibleee_kuttl_cleanup retries: "{{ make_ansibleee_kuttl_cleanup_retries | default(omit) }}" delay: "{{ make_ansibleee_kuttl_cleanup_delay | default(omit) }}" until: "{{ make_ansibleee_kuttl_cleanup_until | default(true) }}" register: "make_ansibleee_kuttl_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_kuttl_cleanup" dry_run: "{{ make_ansibleee_kuttl_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_kuttl_cleanup_env|default({})), **(make_ansibleee_kuttl_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_kuttl_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000202515133730043033347 0ustar zuulzuul--- - name: Debug make_ansibleee_kuttl_prep_env when: make_ansibleee_kuttl_prep_env is defined ansible.builtin.debug: var: make_ansibleee_kuttl_prep_env - name: Debug make_ansibleee_kuttl_prep_params when: make_ansibleee_kuttl_prep_params is defined ansible.builtin.debug: var: make_ansibleee_kuttl_prep_params - name: Run ansibleee_kuttl_prep retries: "{{ make_ansibleee_kuttl_prep_retries | default(omit) }}" delay: "{{ make_ansibleee_kuttl_prep_delay | default(omit) }}" until: "{{ make_ansibleee_kuttl_prep_until | default(true) }}" register: "make_ansibleee_kuttl_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_kuttl_prep" dry_run: "{{ make_ansibleee_kuttl_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_kuttl_prep_env|default({})), **(make_ansibleee_kuttl_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000171215133730043033351 0ustar zuulzuul--- - name: Debug make_ansibleee_kuttl_env when: make_ansibleee_kuttl_env is defined ansible.builtin.debug: var: make_ansibleee_kuttl_env - name: Debug make_ansibleee_kuttl_params when: make_ansibleee_kuttl_params is defined ansible.builtin.debug: var: make_ansibleee_kuttl_params - name: Run ansibleee_kuttl retries: "{{ make_ansibleee_kuttl_retries | default(omit) }}" delay: "{{ make_ansibleee_kuttl_delay | default(omit) }}" until: "{{ make_ansibleee_kuttl_until | default(true) }}" register: "make_ansibleee_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_kuttl" dry_run: "{{ make_ansibleee_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_kuttl_env|default({})), **(make_ansibleee_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_k0000644000175000017500000000173115133730043033333 0ustar zuulzuul--- - name: Debug make_glance_kuttl_run_env when: make_glance_kuttl_run_env is defined ansible.builtin.debug: var: make_glance_kuttl_run_env - name: Debug make_glance_kuttl_run_params when: make_glance_kuttl_run_params is defined ansible.builtin.debug: var: make_glance_kuttl_run_params - name: Run glance_kuttl_run retries: "{{ make_glance_kuttl_run_retries | default(omit) }}" delay: "{{ make_glance_kuttl_run_delay | default(omit) }}" until: "{{ make_glance_kuttl_run_until | default(true) }}" register: "make_glance_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_kuttl_run" dry_run: "{{ make_glance_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_kuttl_run_env|default({})), **(make_glance_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_glance_k0000644000175000017500000000163515133730043033336 0ustar zuulzuul--- - name: Debug make_glance_kuttl_env when: make_glance_kuttl_env is defined ansible.builtin.debug: var: make_glance_kuttl_env - name: Debug make_glance_kuttl_params when: make_glance_kuttl_params is defined ansible.builtin.debug: var: make_glance_kuttl_params - name: Run glance_kuttl retries: "{{ make_glance_kuttl_retries | default(omit) }}" delay: "{{ make_glance_kuttl_delay | default(omit) }}" until: "{{ make_glance_kuttl_until | default(true) }}" register: "make_glance_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make glance_kuttl" dry_run: "{{ make_glance_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_glance_kuttl_env|default({})), **(make_glance_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_k0000644000175000017500000000173115133730043033343 0ustar zuulzuul--- - name: Debug make_manila_kuttl_run_env when: make_manila_kuttl_run_env is defined ansible.builtin.debug: var: make_manila_kuttl_run_env - name: Debug make_manila_kuttl_run_params when: make_manila_kuttl_run_params is defined ansible.builtin.debug: var: make_manila_kuttl_run_params - name: Run manila_kuttl_run retries: "{{ make_manila_kuttl_run_retries | default(omit) }}" delay: "{{ make_manila_kuttl_run_delay | default(omit) }}" until: "{{ make_manila_kuttl_run_until | default(true) }}" register: "make_manila_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_kuttl_run" dry_run: "{{ make_manila_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_kuttl_run_env|default({})), **(make_manila_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_k0000644000175000017500000000163515133730043033346 0ustar zuulzuul--- - name: Debug make_manila_kuttl_env when: make_manila_kuttl_env is defined ansible.builtin.debug: var: make_manila_kuttl_env - name: Debug make_manila_kuttl_params when: make_manila_kuttl_params is defined ansible.builtin.debug: var: make_manila_kuttl_params - name: Run manila_kuttl retries: "{{ make_manila_kuttl_retries | default(omit) }}" delay: "{{ make_manila_kuttl_delay | default(omit) }}" until: "{{ make_manila_kuttl_until | default(true) }}" register: "make_manila_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_kuttl" dry_run: "{{ make_manila_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_kuttl_env|default({})), **(make_manila_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_ku0000644000175000017500000000171215133730043033422 0ustar zuulzuul--- - name: Debug make_swift_kuttl_run_env when: make_swift_kuttl_run_env is defined ansible.builtin.debug: var: make_swift_kuttl_run_env - name: Debug make_swift_kuttl_run_params when: make_swift_kuttl_run_params is defined ansible.builtin.debug: var: make_swift_kuttl_run_params - name: Run swift_kuttl_run retries: "{{ make_swift_kuttl_run_retries | default(omit) }}" delay: "{{ make_swift_kuttl_run_delay | default(omit) }}" until: "{{ make_swift_kuttl_run_until | default(true) }}" register: "make_swift_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_kuttl_run" dry_run: "{{ make_swift_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_kuttl_run_env|default({})), **(make_swift_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_ku0000644000175000017500000000161615133730043033425 0ustar zuulzuul--- - name: Debug make_swift_kuttl_env when: make_swift_kuttl_env is defined ansible.builtin.debug: var: make_swift_kuttl_env - name: Debug make_swift_kuttl_params when: make_swift_kuttl_params is defined ansible.builtin.debug: var: make_swift_kuttl_params - name: Run swift_kuttl retries: "{{ make_swift_kuttl_retries | default(omit) }}" delay: "{{ make_swift_kuttl_delay | default(omit) }}" until: "{{ make_swift_kuttl_until | default(true) }}" register: "make_swift_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_kuttl" dry_run: "{{ make_swift_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_kuttl_env|default({})), **(make_swift_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000175015133730043033420 0ustar zuulzuul--- - name: Debug make_horizon_kuttl_run_env when: make_horizon_kuttl_run_env is defined ansible.builtin.debug: var: make_horizon_kuttl_run_env - name: Debug make_horizon_kuttl_run_params when: make_horizon_kuttl_run_params is defined ansible.builtin.debug: var: make_horizon_kuttl_run_params - name: Run horizon_kuttl_run retries: "{{ make_horizon_kuttl_run_retries | default(omit) }}" delay: "{{ make_horizon_kuttl_run_delay | default(omit) }}" until: "{{ make_horizon_kuttl_run_until | default(true) }}" register: "make_horizon_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_kuttl_run" dry_run: "{{ make_horizon_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_kuttl_run_env|default({})), **(make_horizon_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000165415133730043033423 0ustar zuulzuul--- - name: Debug make_horizon_kuttl_env when: make_horizon_kuttl_env is defined ansible.builtin.debug: var: make_horizon_kuttl_env - name: Debug make_horizon_kuttl_params when: make_horizon_kuttl_params is defined ansible.builtin.debug: var: make_horizon_kuttl_params - name: Run horizon_kuttl retries: "{{ make_horizon_kuttl_retries | default(omit) }}" delay: "{{ make_horizon_kuttl_delay | default(omit) }}" until: "{{ make_horizon_kuttl_until | default(true) }}" register: "make_horizon_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_kuttl" dry_run: "{{ make_horizon_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_kuttl_env|default({})), **(make_horizon_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000200615133730043033400 0ustar zuulzuul--- - name: Debug make_openstack_kuttl_run_env when: make_openstack_kuttl_run_env is defined ansible.builtin.debug: var: make_openstack_kuttl_run_env - name: Debug make_openstack_kuttl_run_params when: make_openstack_kuttl_run_params is defined ansible.builtin.debug: var: make_openstack_kuttl_run_params - name: Run openstack_kuttl_run retries: "{{ make_openstack_kuttl_run_retries | default(omit) }}" delay: "{{ make_openstack_kuttl_run_delay | default(omit) }}" until: "{{ make_openstack_kuttl_run_until | default(true) }}" register: "make_openstack_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_kuttl_run" dry_run: "{{ make_openstack_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_kuttl_run_env|default({})), **(make_openstack_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstack_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_openstac0000644000175000017500000000171215133730043033403 0ustar zuulzuul--- - name: Debug make_openstack_kuttl_env when: make_openstack_kuttl_env is defined ansible.builtin.debug: var: make_openstack_kuttl_env - name: Debug make_openstack_kuttl_params when: make_openstack_kuttl_params is defined ansible.builtin.debug: var: make_openstack_kuttl_params - name: Run openstack_kuttl retries: "{{ make_openstack_kuttl_retries | default(omit) }}" delay: "{{ make_openstack_kuttl_delay | default(omit) }}" until: "{{ make_openstack_kuttl_until | default(true) }}" register: "make_openstack_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make openstack_kuttl" dry_run: "{{ make_openstack_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_openstack_kuttl_env|default({})), **(make_openstack_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_chainsaw_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000202515133730043033323 0ustar zuulzuul--- - name: Debug make_mariadb_chainsaw_run_env when: make_mariadb_chainsaw_run_env is defined ansible.builtin.debug: var: make_mariadb_chainsaw_run_env - name: Debug make_mariadb_chainsaw_run_params when: make_mariadb_chainsaw_run_params is defined ansible.builtin.debug: var: make_mariadb_chainsaw_run_params - name: Run mariadb_chainsaw_run retries: "{{ make_mariadb_chainsaw_run_retries | default(omit) }}" delay: "{{ make_mariadb_chainsaw_run_delay | default(omit) }}" until: "{{ make_mariadb_chainsaw_run_until | default(true) }}" register: "make_mariadb_chainsaw_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_chainsaw_run" dry_run: "{{ make_mariadb_chainsaw_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_chainsaw_run_env|default({})), **(make_mariadb_chainsaw_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_chainsaw.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_mariadb_0000644000175000017500000000173115133730043033326 0ustar zuulzuul--- - name: Debug make_mariadb_chainsaw_env when: make_mariadb_chainsaw_env is defined ansible.builtin.debug: var: make_mariadb_chainsaw_env - name: Debug make_mariadb_chainsaw_params when: make_mariadb_chainsaw_params is defined ansible.builtin.debug: var: make_mariadb_chainsaw_params - name: Run mariadb_chainsaw retries: "{{ make_mariadb_chainsaw_retries | default(omit) }}" delay: "{{ make_mariadb_chainsaw_delay | default(omit) }}" until: "{{ make_mariadb_chainsaw_until | default(true) }}" register: "make_mariadb_chainsaw_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make mariadb_chainsaw" dry_run: "{{ make_mariadb_chainsaw_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_mariadb_chainsaw_env|default({})), **(make_mariadb_chainsaw_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000163515133730043033422 0ustar zuulzuul--- - name: Debug make_horizon_prep_env when: make_horizon_prep_env is defined ansible.builtin.debug: var: make_horizon_prep_env - name: Debug make_horizon_prep_params when: make_horizon_prep_params is defined ansible.builtin.debug: var: make_horizon_prep_params - name: Run horizon_prep retries: "{{ make_horizon_prep_retries | default(omit) }}" delay: "{{ make_horizon_prep_delay | default(omit) }}" until: "{{ make_horizon_prep_until | default(true) }}" register: "make_horizon_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_prep" dry_run: "{{ make_horizon_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_prep_env|default({})), **(make_horizon_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon.0000644000175000017500000000152215133730043033334 0ustar zuulzuul--- - name: Debug make_horizon_env when: make_horizon_env is defined ansible.builtin.debug: var: make_horizon_env - name: Debug make_horizon_params when: make_horizon_params is defined ansible.builtin.debug: var: make_horizon_params - name: Run horizon retries: "{{ make_horizon_retries | default(omit) }}" delay: "{{ make_horizon_delay | default(omit) }}" until: "{{ make_horizon_until | default(true) }}" register: "make_horizon_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon" dry_run: "{{ make_horizon_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_env|default({})), **(make_horizon_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000171215133730043033416 0ustar zuulzuul--- - name: Debug make_horizon_cleanup_env when: make_horizon_cleanup_env is defined ansible.builtin.debug: var: make_horizon_cleanup_env - name: Debug make_horizon_cleanup_params when: make_horizon_cleanup_params is defined ansible.builtin.debug: var: make_horizon_cleanup_params - name: Run horizon_cleanup retries: "{{ make_horizon_cleanup_retries | default(omit) }}" delay: "{{ make_horizon_cleanup_delay | default(omit) }}" until: "{{ make_horizon_cleanup_until | default(true) }}" register: "make_horizon_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_cleanup" dry_run: "{{ make_horizon_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_cleanup_env|default({})), **(make_horizon_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000200615133730043033413 0ustar zuulzuul--- - name: Debug make_horizon_deploy_prep_env when: make_horizon_deploy_prep_env is defined ansible.builtin.debug: var: make_horizon_deploy_prep_env - name: Debug make_horizon_deploy_prep_params when: make_horizon_deploy_prep_params is defined ansible.builtin.debug: var: make_horizon_deploy_prep_params - name: Run horizon_deploy_prep retries: "{{ make_horizon_deploy_prep_retries | default(omit) }}" delay: "{{ make_horizon_deploy_prep_delay | default(omit) }}" until: "{{ make_horizon_deploy_prep_until | default(true) }}" register: "make_horizon_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_deploy_prep" dry_run: "{{ make_horizon_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_deploy_prep_env|default({})), **(make_horizon_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000167315133730043033424 0ustar zuulzuul--- - name: Debug make_horizon_deploy_env when: make_horizon_deploy_env is defined ansible.builtin.debug: var: make_horizon_deploy_env - name: Debug make_horizon_deploy_params when: make_horizon_deploy_params is defined ansible.builtin.debug: var: make_horizon_deploy_params - name: Run horizon_deploy retries: "{{ make_horizon_deploy_retries | default(omit) }}" delay: "{{ make_horizon_deploy_delay | default(omit) }}" until: "{{ make_horizon_deploy_until | default(true) }}" register: "make_horizon_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_deploy" dry_run: "{{ make_horizon_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_deploy_env|default({})), **(make_horizon_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_horizon_0000644000175000017500000000206315133730043033416 0ustar zuulzuul--- - name: Debug make_horizon_deploy_cleanup_env when: make_horizon_deploy_cleanup_env is defined ansible.builtin.debug: var: make_horizon_deploy_cleanup_env - name: Debug make_horizon_deploy_cleanup_params when: make_horizon_deploy_cleanup_params is defined ansible.builtin.debug: var: make_horizon_deploy_cleanup_params - name: Run horizon_deploy_cleanup retries: "{{ make_horizon_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_horizon_deploy_cleanup_delay | default(omit) }}" until: "{{ make_horizon_deploy_cleanup_until | default(true) }}" register: "make_horizon_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make horizon_deploy_cleanup" dry_run: "{{ make_horizon_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_horizon_deploy_cleanup_env|default({})), **(make_horizon_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_pre0000644000175000017500000000156015133730043033357 0ustar zuulzuul--- - name: Debug make_heat_prep_env when: make_heat_prep_env is defined ansible.builtin.debug: var: make_heat_prep_env - name: Debug make_heat_prep_params when: make_heat_prep_params is defined ansible.builtin.debug: var: make_heat_prep_params - name: Run heat_prep retries: "{{ make_heat_prep_retries | default(omit) }}" delay: "{{ make_heat_prep_delay | default(omit) }}" until: "{{ make_heat_prep_until | default(true) }}" register: "make_heat_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_prep" dry_run: "{{ make_heat_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_prep_env|default({})), **(make_heat_prep_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat.yml0000644000175000017500000000144515133730043033313 0ustar zuulzuul--- - name: Debug make_heat_env when: make_heat_env is defined ansible.builtin.debug: var: make_heat_env - name: Debug make_heat_params when: make_heat_params is defined ansible.builtin.debug: var: make_heat_params - name: Run heat retries: "{{ make_heat_retries | default(omit) }}" delay: "{{ make_heat_delay | default(omit) }}" until: "{{ make_heat_until | default(true) }}" register: "make_heat_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat" dry_run: "{{ make_heat_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_env|default({})), **(make_heat_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_cle0000644000175000017500000000163515133730043033337 0ustar zuulzuul--- - name: Debug make_heat_cleanup_env when: make_heat_cleanup_env is defined ansible.builtin.debug: var: make_heat_cleanup_env - name: Debug make_heat_cleanup_params when: make_heat_cleanup_params is defined ansible.builtin.debug: var: make_heat_cleanup_params - name: Run heat_cleanup retries: "{{ make_heat_cleanup_retries | default(omit) }}" delay: "{{ make_heat_cleanup_delay | default(omit) }}" until: "{{ make_heat_cleanup_until | default(true) }}" register: "make_heat_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_cleanup" dry_run: "{{ make_heat_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_cleanup_env|default({})), **(make_heat_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_dep0000644000175000017500000000173115133730043033341 0ustar zuulzuul--- - name: Debug make_heat_deploy_prep_env when: make_heat_deploy_prep_env is defined ansible.builtin.debug: var: make_heat_deploy_prep_env - name: Debug make_heat_deploy_prep_params when: make_heat_deploy_prep_params is defined ansible.builtin.debug: var: make_heat_deploy_prep_params - name: Run heat_deploy_prep retries: "{{ make_heat_deploy_prep_retries | default(omit) }}" delay: "{{ make_heat_deploy_prep_delay | default(omit) }}" until: "{{ make_heat_deploy_prep_until | default(true) }}" register: "make_heat_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_deploy_prep" dry_run: "{{ make_heat_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_deploy_prep_env|default({})), **(make_heat_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_dep0000644000175000017500000000161615133730043033343 0ustar zuulzuul--- - name: Debug make_heat_deploy_env when: make_heat_deploy_env is defined ansible.builtin.debug: var: make_heat_deploy_env - name: Debug make_heat_deploy_params when: make_heat_deploy_params is defined ansible.builtin.debug: var: make_heat_deploy_params - name: Run heat_deploy retries: "{{ make_heat_deploy_retries | default(omit) }}" delay: "{{ make_heat_deploy_delay | default(omit) }}" until: "{{ make_heat_deploy_until | default(true) }}" register: "make_heat_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_deploy" dry_run: "{{ make_heat_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_deploy_env|default({})), **(make_heat_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_heat_dep0000644000175000017500000000200615133730043033335 0ustar zuulzuul--- - name: Debug make_heat_deploy_cleanup_env when: make_heat_deploy_cleanup_env is defined ansible.builtin.debug: var: make_heat_deploy_cleanup_env - name: Debug make_heat_deploy_cleanup_params when: make_heat_deploy_cleanup_params is defined ansible.builtin.debug: var: make_heat_deploy_cleanup_params - name: Run heat_deploy_cleanup retries: "{{ make_heat_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_heat_deploy_cleanup_delay | default(omit) }}" until: "{{ make_heat_deploy_cleanup_until | default(true) }}" register: "make_heat_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make heat_deploy_cleanup" dry_run: "{{ make_heat_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_heat_deploy_cleanup_env|default({})), **(make_heat_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000167315133730043033357 0ustar zuulzuul--- - name: Debug make_ansibleee_prep_env when: make_ansibleee_prep_env is defined ansible.builtin.debug: var: make_ansibleee_prep_env - name: Debug make_ansibleee_prep_params when: make_ansibleee_prep_params is defined ansible.builtin.debug: var: make_ansibleee_prep_params - name: Run ansibleee_prep retries: "{{ make_ansibleee_prep_retries | default(omit) }}" delay: "{{ make_ansibleee_prep_delay | default(omit) }}" until: "{{ make_ansibleee_prep_until | default(true) }}" register: "make_ansibleee_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_prep" dry_run: "{{ make_ansibleee_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_prep_env|default({})), **(make_ansibleee_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000156015133730043033352 0ustar zuulzuul--- - name: Debug make_ansibleee_env when: make_ansibleee_env is defined ansible.builtin.debug: var: make_ansibleee_env - name: Debug make_ansibleee_params when: make_ansibleee_params is defined ansible.builtin.debug: var: make_ansibleee_params - name: Run ansibleee retries: "{{ make_ansibleee_retries | default(omit) }}" delay: "{{ make_ansibleee_delay | default(omit) }}" until: "{{ make_ansibleee_until | default(true) }}" register: "make_ansibleee_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee" dry_run: "{{ make_ansibleee_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_env|default({})), **(make_ansibleee_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansibleee_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ansiblee0000644000175000017500000000175015133730043033353 0ustar zuulzuul--- - name: Debug make_ansibleee_cleanup_env when: make_ansibleee_cleanup_env is defined ansible.builtin.debug: var: make_ansibleee_cleanup_env - name: Debug make_ansibleee_cleanup_params when: make_ansibleee_cleanup_params is defined ansible.builtin.debug: var: make_ansibleee_cleanup_params - name: Run ansibleee_cleanup retries: "{{ make_ansibleee_cleanup_retries | default(omit) }}" delay: "{{ make_ansibleee_cleanup_delay | default(omit) }}" until: "{{ make_ansibleee_cleanup_until | default(true) }}" register: "make_ansibleee_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ansibleee_cleanup" dry_run: "{{ make_ansibleee_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ansibleee_cleanup_env|default({})), **(make_ansibleee_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremetal_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremeta0000644000175000017500000000167315133730043033355 0ustar zuulzuul--- - name: Debug make_baremetal_prep_env when: make_baremetal_prep_env is defined ansible.builtin.debug: var: make_baremetal_prep_env - name: Debug make_baremetal_prep_params when: make_baremetal_prep_params is defined ansible.builtin.debug: var: make_baremetal_prep_params - name: Run baremetal_prep retries: "{{ make_baremetal_prep_retries | default(omit) }}" delay: "{{ make_baremetal_prep_delay | default(omit) }}" until: "{{ make_baremetal_prep_until | default(true) }}" register: "make_baremetal_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make baremetal_prep" dry_run: "{{ make_baremetal_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_baremetal_prep_env|default({})), **(make_baremetal_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremetal.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremeta0000644000175000017500000000156015133730043033350 0ustar zuulzuul--- - name: Debug make_baremetal_env when: make_baremetal_env is defined ansible.builtin.debug: var: make_baremetal_env - name: Debug make_baremetal_params when: make_baremetal_params is defined ansible.builtin.debug: var: make_baremetal_params - name: Run baremetal retries: "{{ make_baremetal_retries | default(omit) }}" delay: "{{ make_baremetal_delay | default(omit) }}" until: "{{ make_baremetal_until | default(true) }}" register: "make_baremetal_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make baremetal" dry_run: "{{ make_baremetal_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_baremetal_env|default({})), **(make_baremetal_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremetal_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_baremeta0000644000175000017500000000175015133730043033351 0ustar zuulzuul--- - name: Debug make_baremetal_cleanup_env when: make_baremetal_cleanup_env is defined ansible.builtin.debug: var: make_baremetal_cleanup_env - name: Debug make_baremetal_cleanup_params when: make_baremetal_cleanup_params is defined ansible.builtin.debug: var: make_baremetal_cleanup_params - name: Run baremetal_cleanup retries: "{{ make_baremetal_cleanup_retries | default(omit) }}" delay: "{{ make_baremetal_cleanup_delay | default(omit) }}" until: "{{ make_baremetal_cleanup_until | default(true) }}" register: "make_baremetal_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make baremetal_cleanup" dry_run: "{{ make_baremetal_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_baremetal_cleanup_env|default({})), **(make_baremetal_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ceph_help.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ceph_hel0000644000175000017500000000156015133730043033337 0ustar zuulzuul--- - name: Debug make_ceph_help_env when: make_ceph_help_env is defined ansible.builtin.debug: var: make_ceph_help_env - name: Debug make_ceph_help_params when: make_ceph_help_params is defined ansible.builtin.debug: var: make_ceph_help_params - name: Run ceph_help retries: "{{ make_ceph_help_retries | default(omit) }}" delay: "{{ make_ceph_help_delay | default(omit) }}" until: "{{ make_ceph_help_until | default(true) }}" register: "make_ceph_help_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ceph_help" dry_run: "{{ make_ceph_help_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ceph_help_env|default({})), **(make_ceph_help_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ceph.yml0000644000175000017500000000144515133730043033311 0ustar zuulzuul--- - name: Debug make_ceph_env when: make_ceph_env is defined ansible.builtin.debug: var: make_ceph_env - name: Debug make_ceph_params when: make_ceph_params is defined ansible.builtin.debug: var: make_ceph_params - name: Run ceph retries: "{{ make_ceph_retries | default(omit) }}" delay: "{{ make_ceph_delay | default(omit) }}" until: "{{ make_ceph_until | default(true) }}" register: "make_ceph_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ceph" dry_run: "{{ make_ceph_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ceph_env|default({})), **(make_ceph_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ceph_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ceph_cle0000644000175000017500000000163515133730043033335 0ustar zuulzuul--- - name: Debug make_ceph_cleanup_env when: make_ceph_cleanup_env is defined ansible.builtin.debug: var: make_ceph_cleanup_env - name: Debug make_ceph_cleanup_params when: make_ceph_cleanup_params is defined ansible.builtin.debug: var: make_ceph_cleanup_params - name: Run ceph_cleanup retries: "{{ make_ceph_cleanup_retries | default(omit) }}" delay: "{{ make_ceph_cleanup_delay | default(omit) }}" until: "{{ make_ceph_cleanup_until | default(true) }}" register: "make_ceph_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make ceph_cleanup" dry_run: "{{ make_ceph_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ceph_cleanup_env|default({})), **(make_ceph_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_pre0000644000175000017500000000156015133730043033410 0ustar zuulzuul--- - name: Debug make_rook_prep_env when: make_rook_prep_env is defined ansible.builtin.debug: var: make_rook_prep_env - name: Debug make_rook_prep_params when: make_rook_prep_params is defined ansible.builtin.debug: var: make_rook_prep_params - name: Run rook_prep retries: "{{ make_rook_prep_retries | default(omit) }}" delay: "{{ make_rook_prep_delay | default(omit) }}" until: "{{ make_rook_prep_until | default(true) }}" register: "make_rook_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook_prep" dry_run: "{{ make_rook_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_prep_env|default({})), **(make_rook_prep_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook.yml0000644000175000017500000000144515133730043033344 0ustar zuulzuul--- - name: Debug make_rook_env when: make_rook_env is defined ansible.builtin.debug: var: make_rook_env - name: Debug make_rook_params when: make_rook_params is defined ansible.builtin.debug: var: make_rook_params - name: Run rook retries: "{{ make_rook_retries | default(omit) }}" delay: "{{ make_rook_delay | default(omit) }}" until: "{{ make_rook_until | default(true) }}" register: "make_rook_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook" dry_run: "{{ make_rook_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_env|default({})), **(make_rook_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_dep0000644000175000017500000000173115133730043033372 0ustar zuulzuul--- - name: Debug make_rook_deploy_prep_env when: make_rook_deploy_prep_env is defined ansible.builtin.debug: var: make_rook_deploy_prep_env - name: Debug make_rook_deploy_prep_params when: make_rook_deploy_prep_params is defined ansible.builtin.debug: var: make_rook_deploy_prep_params - name: Run rook_deploy_prep retries: "{{ make_rook_deploy_prep_retries | default(omit) }}" delay: "{{ make_rook_deploy_prep_delay | default(omit) }}" until: "{{ make_rook_deploy_prep_until | default(true) }}" register: "make_rook_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook_deploy_prep" dry_run: "{{ make_rook_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_deploy_prep_env|default({})), **(make_rook_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_dep0000644000175000017500000000161615133730043033374 0ustar zuulzuul--- - name: Debug make_rook_deploy_env when: make_rook_deploy_env is defined ansible.builtin.debug: var: make_rook_deploy_env - name: Debug make_rook_deploy_params when: make_rook_deploy_params is defined ansible.builtin.debug: var: make_rook_deploy_params - name: Run rook_deploy retries: "{{ make_rook_deploy_retries | default(omit) }}" delay: "{{ make_rook_deploy_delay | default(omit) }}" until: "{{ make_rook_deploy_until | default(true) }}" register: "make_rook_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook_deploy" dry_run: "{{ make_rook_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_deploy_env|default({})), **(make_rook_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_crc_disk.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_crc0000644000175000017500000000165415133730043033375 0ustar zuulzuul--- - name: Debug make_rook_crc_disk_env when: make_rook_crc_disk_env is defined ansible.builtin.debug: var: make_rook_crc_disk_env - name: Debug make_rook_crc_disk_params when: make_rook_crc_disk_params is defined ansible.builtin.debug: var: make_rook_crc_disk_params - name: Run rook_crc_disk retries: "{{ make_rook_crc_disk_retries | default(omit) }}" delay: "{{ make_rook_crc_disk_delay | default(omit) }}" until: "{{ make_rook_crc_disk_until | default(true) }}" register: "make_rook_crc_disk_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook_crc_disk" dry_run: "{{ make_rook_crc_disk_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_crc_disk_env|default({})), **(make_rook_crc_disk_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_rook_cle0000644000175000017500000000163515133730043033370 0ustar zuulzuul--- - name: Debug make_rook_cleanup_env when: make_rook_cleanup_env is defined ansible.builtin.debug: var: make_rook_cleanup_env - name: Debug make_rook_cleanup_params when: make_rook_cleanup_params is defined ansible.builtin.debug: var: make_rook_cleanup_params - name: Run rook_cleanup retries: "{{ make_rook_cleanup_retries | default(omit) }}" delay: "{{ make_rook_cleanup_delay | default(omit) }}" until: "{{ make_rook_cleanup_until | default(true) }}" register: "make_rook_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make rook_cleanup" dry_run: "{{ make_rook_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_rook_cleanup_env|default({})), **(make_rook_cleanup_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_lvms.yml0000644000175000017500000000144515133730043033353 0ustar zuulzuul--- - name: Debug make_lvms_env when: make_lvms_env is defined ansible.builtin.debug: var: make_lvms_env - name: Debug make_lvms_params when: make_lvms_params is defined ansible.builtin.debug: var: make_lvms_params - name: Run lvms retries: "{{ make_lvms_retries | default(omit) }}" delay: "{{ make_lvms_delay | default(omit) }}" until: "{{ make_lvms_until | default(true) }}" register: "make_lvms_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make lvms" dry_run: "{{ make_lvms_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_lvms_env|default({})), **(make_lvms_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nmstate.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nmstate.0000644000175000017500000000152215133730043033317 0ustar zuulzuul--- - name: Debug make_nmstate_env when: make_nmstate_env is defined ansible.builtin.debug: var: make_nmstate_env - name: Debug make_nmstate_params when: make_nmstate_params is defined ansible.builtin.debug: var: make_nmstate_params - name: Run nmstate retries: "{{ make_nmstate_retries | default(omit) }}" delay: "{{ make_nmstate_delay | default(omit) }}" until: "{{ make_nmstate_until | default(true) }}" register: "make_nmstate_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nmstate" dry_run: "{{ make_nmstate_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nmstate_env|default({})), **(make_nmstate_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nncp.yml0000644000175000017500000000144515133730043033330 0ustar zuulzuul--- - name: Debug make_nncp_env when: make_nncp_env is defined ansible.builtin.debug: var: make_nncp_env - name: Debug make_nncp_params when: make_nncp_params is defined ansible.builtin.debug: var: make_nncp_params - name: Run nncp retries: "{{ make_nncp_retries | default(omit) }}" delay: "{{ make_nncp_delay | default(omit) }}" until: "{{ make_nncp_until | default(true) }}" register: "make_nncp_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nncp" dry_run: "{{ make_nncp_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nncp_env|default({})), **(make_nncp_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nncp_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nncp_cle0000644000175000017500000000163515133730043033354 0ustar zuulzuul--- - name: Debug make_nncp_cleanup_env when: make_nncp_cleanup_env is defined ansible.builtin.debug: var: make_nncp_cleanup_env - name: Debug make_nncp_cleanup_params when: make_nncp_cleanup_params is defined ansible.builtin.debug: var: make_nncp_cleanup_params - name: Run nncp_cleanup retries: "{{ make_nncp_cleanup_retries | default(omit) }}" delay: "{{ make_nncp_cleanup_delay | default(omit) }}" until: "{{ make_nncp_cleanup_until | default(true) }}" register: "make_nncp_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make nncp_cleanup" dry_run: "{{ make_nncp_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nncp_cleanup_env|default({})), **(make_nncp_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netattach.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netattac0000644000175000017500000000156015133730043033373 0ustar zuulzuul--- - name: Debug make_netattach_env when: make_netattach_env is defined ansible.builtin.debug: var: make_netattach_env - name: Debug make_netattach_params when: make_netattach_params is defined ansible.builtin.debug: var: make_netattach_params - name: Run netattach retries: "{{ make_netattach_retries | default(omit) }}" delay: "{{ make_netattach_delay | default(omit) }}" until: "{{ make_netattach_until | default(true) }}" register: "make_netattach_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netattach" dry_run: "{{ make_netattach_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netattach_env|default({})), **(make_netattach_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netattach_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netattac0000644000175000017500000000175015133730043033374 0ustar zuulzuul--- - name: Debug make_netattach_cleanup_env when: make_netattach_cleanup_env is defined ansible.builtin.debug: var: make_netattach_cleanup_env - name: Debug make_netattach_cleanup_params when: make_netattach_cleanup_params is defined ansible.builtin.debug: var: make_netattach_cleanup_params - name: Run netattach_cleanup retries: "{{ make_netattach_cleanup_retries | default(omit) }}" delay: "{{ make_netattach_cleanup_delay | default(omit) }}" until: "{{ make_netattach_cleanup_until | default(true) }}" register: "make_netattach_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netattach_cleanup" dry_run: "{{ make_netattach_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netattach_cleanup_env|default({})), **(make_netattach_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb.0000644000175000017500000000152215133730043033264 0ustar zuulzuul--- - name: Debug make_metallb_env when: make_metallb_env is defined ansible.builtin.debug: var: make_metallb_env - name: Debug make_metallb_params when: make_metallb_params is defined ansible.builtin.debug: var: make_metallb_params - name: Run metallb retries: "{{ make_metallb_retries | default(omit) }}" delay: "{{ make_metallb_delay | default(omit) }}" until: "{{ make_metallb_until | default(true) }}" register: "make_metallb_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make metallb" dry_run: "{{ make_metallb_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_metallb_env|default({})), **(make_metallb_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_config.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_0000644000175000017500000000167315133730043033354 0ustar zuulzuul--- - name: Debug make_metallb_config_env when: make_metallb_config_env is defined ansible.builtin.debug: var: make_metallb_config_env - name: Debug make_metallb_config_params when: make_metallb_config_params is defined ansible.builtin.debug: var: make_metallb_config_params - name: Run metallb_config retries: "{{ make_metallb_config_retries | default(omit) }}" delay: "{{ make_metallb_config_delay | default(omit) }}" until: "{{ make_metallb_config_until | default(true) }}" register: "make_metallb_config_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make metallb_config" dry_run: "{{ make_metallb_config_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_metallb_config_env|default({})), **(make_metallb_config_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_config_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_0000644000175000017500000000206315133730043033346 0ustar zuulzuul--- - name: Debug make_metallb_config_cleanup_env when: make_metallb_config_cleanup_env is defined ansible.builtin.debug: var: make_metallb_config_cleanup_env - name: Debug make_metallb_config_cleanup_params when: make_metallb_config_cleanup_params is defined ansible.builtin.debug: var: make_metallb_config_cleanup_params - name: Run metallb_config_cleanup retries: "{{ make_metallb_config_cleanup_retries | default(omit) }}" delay: "{{ make_metallb_config_cleanup_delay | default(omit) }}" until: "{{ make_metallb_config_cleanup_until | default(true) }}" register: "make_metallb_config_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make metallb_config_cleanup" dry_run: "{{ make_metallb_config_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_metallb_config_cleanup_env|default({})), **(make_metallb_config_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_metallb_0000644000175000017500000000171215133730043033346 0ustar zuulzuul--- - name: Debug make_metallb_cleanup_env when: make_metallb_cleanup_env is defined ansible.builtin.debug: var: make_metallb_cleanup_env - name: Debug make_metallb_cleanup_params when: make_metallb_cleanup_params is defined ansible.builtin.debug: var: make_metallb_cleanup_params - name: Run metallb_cleanup retries: "{{ make_metallb_cleanup_retries | default(omit) }}" delay: "{{ make_metallb_cleanup_delay | default(omit) }}" until: "{{ make_metallb_cleanup_until | default(true) }}" register: "make_metallb_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make metallb_cleanup" dry_run: "{{ make_metallb_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_metallb_cleanup_env|default({})), **(make_metallb_cleanup_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki.yml0000644000175000017500000000144515133730043033330 0ustar zuulzuul--- - name: Debug make_loki_env when: make_loki_env is defined ansible.builtin.debug: var: make_loki_env - name: Debug make_loki_params when: make_loki_params is defined ansible.builtin.debug: var: make_loki_params - name: Run loki retries: "{{ make_loki_retries | default(omit) }}" delay: "{{ make_loki_delay | default(omit) }}" until: "{{ make_loki_until | default(true) }}" register: "make_loki_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make loki" dry_run: "{{ make_loki_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_loki_env|default({})), **(make_loki_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_cle0000644000175000017500000000163515133730043033354 0ustar zuulzuul--- - name: Debug make_loki_cleanup_env when: make_loki_cleanup_env is defined ansible.builtin.debug: var: make_loki_cleanup_env - name: Debug make_loki_cleanup_params when: make_loki_cleanup_params is defined ansible.builtin.debug: var: make_loki_cleanup_params - name: Run loki_cleanup retries: "{{ make_loki_cleanup_retries | default(omit) }}" delay: "{{ make_loki_cleanup_delay | default(omit) }}" until: "{{ make_loki_cleanup_until | default(true) }}" register: "make_loki_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make loki_cleanup" dry_run: "{{ make_loki_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_loki_cleanup_env|default({})), **(make_loki_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_dep0000644000175000017500000000161615133730043033360 0ustar zuulzuul--- - name: Debug make_loki_deploy_env when: make_loki_deploy_env is defined ansible.builtin.debug: var: make_loki_deploy_env - name: Debug make_loki_deploy_params when: make_loki_deploy_params is defined ansible.builtin.debug: var: make_loki_deploy_params - name: Run loki_deploy retries: "{{ make_loki_deploy_retries | default(omit) }}" delay: "{{ make_loki_deploy_delay | default(omit) }}" until: "{{ make_loki_deploy_until | default(true) }}" register: "make_loki_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make loki_deploy" dry_run: "{{ make_loki_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_loki_deploy_env|default({})), **(make_loki_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_loki_dep0000644000175000017500000000200615133730043033352 0ustar zuulzuul--- - name: Debug make_loki_deploy_cleanup_env when: make_loki_deploy_cleanup_env is defined ansible.builtin.debug: var: make_loki_deploy_cleanup_env - name: Debug make_loki_deploy_cleanup_params when: make_loki_deploy_cleanup_params is defined ansible.builtin.debug: var: make_loki_deploy_cleanup_params - name: Run loki_deploy_cleanup retries: "{{ make_loki_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_loki_deploy_cleanup_delay | default(omit) }}" until: "{{ make_loki_deploy_cleanup_until | default(true) }}" register: "make_loki_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make loki_deploy_cleanup" dry_run: "{{ make_loki_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_loki_deploy_cleanup_env|default({})), **(make_loki_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobserv.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobser0000644000175000017500000000156015133730043033411 0ustar zuulzuul--- - name: Debug make_netobserv_env when: make_netobserv_env is defined ansible.builtin.debug: var: make_netobserv_env - name: Debug make_netobserv_params when: make_netobserv_params is defined ansible.builtin.debug: var: make_netobserv_params - name: Run netobserv retries: "{{ make_netobserv_retries | default(omit) }}" delay: "{{ make_netobserv_delay | default(omit) }}" until: "{{ make_netobserv_until | default(true) }}" register: "make_netobserv_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netobserv" dry_run: "{{ make_netobserv_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netobserv_env|default({})), **(make_netobserv_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobserv_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobser0000644000175000017500000000175015133730043033412 0ustar zuulzuul--- - name: Debug make_netobserv_cleanup_env when: make_netobserv_cleanup_env is defined ansible.builtin.debug: var: make_netobserv_cleanup_env - name: Debug make_netobserv_cleanup_params when: make_netobserv_cleanup_params is defined ansible.builtin.debug: var: make_netobserv_cleanup_params - name: Run netobserv_cleanup retries: "{{ make_netobserv_cleanup_retries | default(omit) }}" delay: "{{ make_netobserv_cleanup_delay | default(omit) }}" until: "{{ make_netobserv_cleanup_until | default(true) }}" register: "make_netobserv_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netobserv_cleanup" dry_run: "{{ make_netobserv_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netobserv_cleanup_env|default({})), **(make_netobserv_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobserv_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobser0000644000175000017500000000173115133730043033411 0ustar zuulzuul--- - name: Debug make_netobserv_deploy_env when: make_netobserv_deploy_env is defined ansible.builtin.debug: var: make_netobserv_deploy_env - name: Debug make_netobserv_deploy_params when: make_netobserv_deploy_params is defined ansible.builtin.debug: var: make_netobserv_deploy_params - name: Run netobserv_deploy retries: "{{ make_netobserv_deploy_retries | default(omit) }}" delay: "{{ make_netobserv_deploy_delay | default(omit) }}" until: "{{ make_netobserv_deploy_until | default(true) }}" register: "make_netobserv_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netobserv_deploy" dry_run: "{{ make_netobserv_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netobserv_deploy_env|default({})), **(make_netobserv_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobserv_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_netobser0000644000175000017500000000212115133730043033403 0ustar zuulzuul--- - name: Debug make_netobserv_deploy_cleanup_env when: make_netobserv_deploy_cleanup_env is defined ansible.builtin.debug: var: make_netobserv_deploy_cleanup_env - name: Debug make_netobserv_deploy_cleanup_params when: make_netobserv_deploy_cleanup_params is defined ansible.builtin.debug: var: make_netobserv_deploy_cleanup_params - name: Run netobserv_deploy_cleanup retries: "{{ make_netobserv_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_netobserv_deploy_cleanup_delay | default(omit) }}" until: "{{ make_netobserv_deploy_cleanup_until | default(true) }}" register: "make_netobserv_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make netobserv_deploy_cleanup" dry_run: "{{ make_netobserv_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_netobserv_deploy_cleanup_env|default({})), **(make_netobserv_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_p0000644000175000017500000000161615133730043033352 0ustar zuulzuul--- - name: Debug make_manila_prep_env when: make_manila_prep_env is defined ansible.builtin.debug: var: make_manila_prep_env - name: Debug make_manila_prep_params when: make_manila_prep_params is defined ansible.builtin.debug: var: make_manila_prep_params - name: Run manila_prep retries: "{{ make_manila_prep_retries | default(omit) }}" delay: "{{ make_manila_prep_delay | default(omit) }}" until: "{{ make_manila_prep_until | default(true) }}" register: "make_manila_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_prep" dry_run: "{{ make_manila_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_prep_env|default({})), **(make_manila_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila.y0000644000175000017500000000150315133730043033275 0ustar zuulzuul--- - name: Debug make_manila_env when: make_manila_env is defined ansible.builtin.debug: var: make_manila_env - name: Debug make_manila_params when: make_manila_params is defined ansible.builtin.debug: var: make_manila_params - name: Run manila retries: "{{ make_manila_retries | default(omit) }}" delay: "{{ make_manila_delay | default(omit) }}" until: "{{ make_manila_until | default(true) }}" register: "make_manila_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila" dry_run: "{{ make_manila_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_env|default({})), **(make_manila_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_c0000644000175000017500000000167315133730043033340 0ustar zuulzuul--- - name: Debug make_manila_cleanup_env when: make_manila_cleanup_env is defined ansible.builtin.debug: var: make_manila_cleanup_env - name: Debug make_manila_cleanup_params when: make_manila_cleanup_params is defined ansible.builtin.debug: var: make_manila_cleanup_params - name: Run manila_cleanup retries: "{{ make_manila_cleanup_retries | default(omit) }}" delay: "{{ make_manila_cleanup_delay | default(omit) }}" until: "{{ make_manila_cleanup_until | default(true) }}" register: "make_manila_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_cleanup" dry_run: "{{ make_manila_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_cleanup_env|default({})), **(make_manila_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_d0000644000175000017500000000176715133730043033345 0ustar zuulzuul--- - name: Debug make_manila_deploy_prep_env when: make_manila_deploy_prep_env is defined ansible.builtin.debug: var: make_manila_deploy_prep_env - name: Debug make_manila_deploy_prep_params when: make_manila_deploy_prep_params is defined ansible.builtin.debug: var: make_manila_deploy_prep_params - name: Run manila_deploy_prep retries: "{{ make_manila_deploy_prep_retries | default(omit) }}" delay: "{{ make_manila_deploy_prep_delay | default(omit) }}" until: "{{ make_manila_deploy_prep_until | default(true) }}" register: "make_manila_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_deploy_prep" dry_run: "{{ make_manila_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_deploy_prep_env|default({})), **(make_manila_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_d0000644000175000017500000000165415133730043033340 0ustar zuulzuul--- - name: Debug make_manila_deploy_env when: make_manila_deploy_env is defined ansible.builtin.debug: var: make_manila_deploy_env - name: Debug make_manila_deploy_params when: make_manila_deploy_params is defined ansible.builtin.debug: var: make_manila_deploy_params - name: Run manila_deploy retries: "{{ make_manila_deploy_retries | default(omit) }}" delay: "{{ make_manila_deploy_delay | default(omit) }}" until: "{{ make_manila_deploy_until | default(true) }}" register: "make_manila_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_deploy" dry_run: "{{ make_manila_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_deploy_env|default({})), **(make_manila_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_manila_d0000644000175000017500000000204415133730043033332 0ustar zuulzuul--- - name: Debug make_manila_deploy_cleanup_env when: make_manila_deploy_cleanup_env is defined ansible.builtin.debug: var: make_manila_deploy_cleanup_env - name: Debug make_manila_deploy_cleanup_params when: make_manila_deploy_cleanup_params is defined ansible.builtin.debug: var: make_manila_deploy_cleanup_params - name: Run manila_deploy_cleanup retries: "{{ make_manila_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_manila_deploy_cleanup_delay | default(omit) }}" until: "{{ make_manila_deploy_cleanup_until | default(true) }}" register: "make_manila_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make manila_deploy_cleanup" dry_run: "{{ make_manila_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_manila_deploy_cleanup_env|default({})), **(make_manila_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000167315133730043033416 0ustar zuulzuul--- - name: Debug make_telemetry_prep_env when: make_telemetry_prep_env is defined ansible.builtin.debug: var: make_telemetry_prep_env - name: Debug make_telemetry_prep_params when: make_telemetry_prep_params is defined ansible.builtin.debug: var: make_telemetry_prep_params - name: Run telemetry_prep retries: "{{ make_telemetry_prep_retries | default(omit) }}" delay: "{{ make_telemetry_prep_delay | default(omit) }}" until: "{{ make_telemetry_prep_until | default(true) }}" register: "make_telemetry_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_prep" dry_run: "{{ make_telemetry_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_prep_env|default({})), **(make_telemetry_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000156015133730043033411 0ustar zuulzuul--- - name: Debug make_telemetry_env when: make_telemetry_env is defined ansible.builtin.debug: var: make_telemetry_env - name: Debug make_telemetry_params when: make_telemetry_params is defined ansible.builtin.debug: var: make_telemetry_params - name: Run telemetry retries: "{{ make_telemetry_retries | default(omit) }}" delay: "{{ make_telemetry_delay | default(omit) }}" until: "{{ make_telemetry_until | default(true) }}" register: "make_telemetry_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry" dry_run: "{{ make_telemetry_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_env|default({})), **(make_telemetry_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000175015133730043033412 0ustar zuulzuul--- - name: Debug make_telemetry_cleanup_env when: make_telemetry_cleanup_env is defined ansible.builtin.debug: var: make_telemetry_cleanup_env - name: Debug make_telemetry_cleanup_params when: make_telemetry_cleanup_params is defined ansible.builtin.debug: var: make_telemetry_cleanup_params - name: Run telemetry_cleanup retries: "{{ make_telemetry_cleanup_retries | default(omit) }}" delay: "{{ make_telemetry_cleanup_delay | default(omit) }}" until: "{{ make_telemetry_cleanup_until | default(true) }}" register: "make_telemetry_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_cleanup" dry_run: "{{ make_telemetry_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_cleanup_env|default({})), **(make_telemetry_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000204415133730043033407 0ustar zuulzuul--- - name: Debug make_telemetry_deploy_prep_env when: make_telemetry_deploy_prep_env is defined ansible.builtin.debug: var: make_telemetry_deploy_prep_env - name: Debug make_telemetry_deploy_prep_params when: make_telemetry_deploy_prep_params is defined ansible.builtin.debug: var: make_telemetry_deploy_prep_params - name: Run telemetry_deploy_prep retries: "{{ make_telemetry_deploy_prep_retries | default(omit) }}" delay: "{{ make_telemetry_deploy_prep_delay | default(omit) }}" until: "{{ make_telemetry_deploy_prep_until | default(true) }}" register: "make_telemetry_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_deploy_prep" dry_run: "{{ make_telemetry_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_deploy_prep_env|default({})), **(make_telemetry_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000173115133730043033411 0ustar zuulzuul--- - name: Debug make_telemetry_deploy_env when: make_telemetry_deploy_env is defined ansible.builtin.debug: var: make_telemetry_deploy_env - name: Debug make_telemetry_deploy_params when: make_telemetry_deploy_params is defined ansible.builtin.debug: var: make_telemetry_deploy_params - name: Run telemetry_deploy retries: "{{ make_telemetry_deploy_retries | default(omit) }}" delay: "{{ make_telemetry_deploy_delay | default(omit) }}" until: "{{ make_telemetry_deploy_until | default(true) }}" register: "make_telemetry_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_deploy" dry_run: "{{ make_telemetry_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_deploy_env|default({})), **(make_telemetry_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000212115133730043033403 0ustar zuulzuul--- - name: Debug make_telemetry_deploy_cleanup_env when: make_telemetry_deploy_cleanup_env is defined ansible.builtin.debug: var: make_telemetry_deploy_cleanup_env - name: Debug make_telemetry_deploy_cleanup_params when: make_telemetry_deploy_cleanup_params is defined ansible.builtin.debug: var: make_telemetry_deploy_cleanup_params - name: Run telemetry_deploy_cleanup retries: "{{ make_telemetry_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_telemetry_deploy_cleanup_delay | default(omit) }}" until: "{{ make_telemetry_deploy_cleanup_until | default(true) }}" register: "make_telemetry_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_deploy_cleanup" dry_run: "{{ make_telemetry_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_deploy_cleanup_env|default({})), **(make_telemetry_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_kuttl_run.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000200615133730043033405 0ustar zuulzuul--- - name: Debug make_telemetry_kuttl_run_env when: make_telemetry_kuttl_run_env is defined ansible.builtin.debug: var: make_telemetry_kuttl_run_env - name: Debug make_telemetry_kuttl_run_params when: make_telemetry_kuttl_run_params is defined ansible.builtin.debug: var: make_telemetry_kuttl_run_params - name: Run telemetry_kuttl_run retries: "{{ make_telemetry_kuttl_run_retries | default(omit) }}" delay: "{{ make_telemetry_kuttl_run_delay | default(omit) }}" until: "{{ make_telemetry_kuttl_run_until | default(true) }}" register: "make_telemetry_kuttl_run_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_kuttl_run" dry_run: "{{ make_telemetry_kuttl_run_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_kuttl_run_env|default({})), **(make_telemetry_kuttl_run_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetry_kuttl.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_telemetr0000644000175000017500000000171215133730043033410 0ustar zuulzuul--- - name: Debug make_telemetry_kuttl_env when: make_telemetry_kuttl_env is defined ansible.builtin.debug: var: make_telemetry_kuttl_env - name: Debug make_telemetry_kuttl_params when: make_telemetry_kuttl_params is defined ansible.builtin.debug: var: make_telemetry_kuttl_params - name: Run telemetry_kuttl retries: "{{ make_telemetry_kuttl_retries | default(omit) }}" delay: "{{ make_telemetry_kuttl_delay | default(omit) }}" until: "{{ make_telemetry_kuttl_until | default(true) }}" register: "make_telemetry_kuttl_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make telemetry_kuttl" dry_run: "{{ make_telemetry_kuttl_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_telemetry_kuttl_env|default({})), **(make_telemetry_kuttl_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_pr0000644000175000017500000000157715133730043033435 0ustar zuulzuul--- - name: Debug make_swift_prep_env when: make_swift_prep_env is defined ansible.builtin.debug: var: make_swift_prep_env - name: Debug make_swift_prep_params when: make_swift_prep_params is defined ansible.builtin.debug: var: make_swift_prep_params - name: Run swift_prep retries: "{{ make_swift_prep_retries | default(omit) }}" delay: "{{ make_swift_prep_delay | default(omit) }}" until: "{{ make_swift_prep_until | default(true) }}" register: "make_swift_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_prep" dry_run: "{{ make_swift_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_prep_env|default({})), **(make_swift_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift.ym0000644000175000017500000000146415133730043033353 0ustar zuulzuul--- - name: Debug make_swift_env when: make_swift_env is defined ansible.builtin.debug: var: make_swift_env - name: Debug make_swift_params when: make_swift_params is defined ansible.builtin.debug: var: make_swift_params - name: Run swift retries: "{{ make_swift_retries | default(omit) }}" delay: "{{ make_swift_delay | default(omit) }}" until: "{{ make_swift_until | default(true) }}" register: "make_swift_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift" dry_run: "{{ make_swift_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_env|default({})), **(make_swift_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_cl0000644000175000017500000000165415133730043033406 0ustar zuulzuul--- - name: Debug make_swift_cleanup_env when: make_swift_cleanup_env is defined ansible.builtin.debug: var: make_swift_cleanup_env - name: Debug make_swift_cleanup_params when: make_swift_cleanup_params is defined ansible.builtin.debug: var: make_swift_cleanup_params - name: Run swift_cleanup retries: "{{ make_swift_cleanup_retries | default(omit) }}" delay: "{{ make_swift_cleanup_delay | default(omit) }}" until: "{{ make_swift_cleanup_until | default(true) }}" register: "make_swift_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_cleanup" dry_run: "{{ make_swift_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_cleanup_env|default({})), **(make_swift_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_de0000644000175000017500000000175015133730043033375 0ustar zuulzuul--- - name: Debug make_swift_deploy_prep_env when: make_swift_deploy_prep_env is defined ansible.builtin.debug: var: make_swift_deploy_prep_env - name: Debug make_swift_deploy_prep_params when: make_swift_deploy_prep_params is defined ansible.builtin.debug: var: make_swift_deploy_prep_params - name: Run swift_deploy_prep retries: "{{ make_swift_deploy_prep_retries | default(omit) }}" delay: "{{ make_swift_deploy_prep_delay | default(omit) }}" until: "{{ make_swift_deploy_prep_until | default(true) }}" register: "make_swift_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_deploy_prep" dry_run: "{{ make_swift_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_deploy_prep_env|default({})), **(make_swift_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_de0000644000175000017500000000163515133730043033377 0ustar zuulzuul--- - name: Debug make_swift_deploy_env when: make_swift_deploy_env is defined ansible.builtin.debug: var: make_swift_deploy_env - name: Debug make_swift_deploy_params when: make_swift_deploy_params is defined ansible.builtin.debug: var: make_swift_deploy_params - name: Run swift_deploy retries: "{{ make_swift_deploy_retries | default(omit) }}" delay: "{{ make_swift_deploy_delay | default(omit) }}" until: "{{ make_swift_deploy_until | default(true) }}" register: "make_swift_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_deploy" dry_run: "{{ make_swift_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_deploy_env|default({})), **(make_swift_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_swift_de0000644000175000017500000000202515133730043033371 0ustar zuulzuul--- - name: Debug make_swift_deploy_cleanup_env when: make_swift_deploy_cleanup_env is defined ansible.builtin.debug: var: make_swift_deploy_cleanup_env - name: Debug make_swift_deploy_cleanup_params when: make_swift_deploy_cleanup_params is defined ansible.builtin.debug: var: make_swift_deploy_cleanup_params - name: Run swift_deploy_cleanup retries: "{{ make_swift_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_swift_deploy_cleanup_delay | default(omit) }}" until: "{{ make_swift_deploy_cleanup_until | default(true) }}" register: "make_swift_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make swift_deploy_cleanup" dry_run: "{{ make_swift_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_swift_deploy_cleanup_env|default({})), **(make_swift_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_certmanager.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_certmana0000644000175000017500000000161615133730043033364 0ustar zuulzuul--- - name: Debug make_certmanager_env when: make_certmanager_env is defined ansible.builtin.debug: var: make_certmanager_env - name: Debug make_certmanager_params when: make_certmanager_params is defined ansible.builtin.debug: var: make_certmanager_params - name: Run certmanager retries: "{{ make_certmanager_retries | default(omit) }}" delay: "{{ make_certmanager_delay | default(omit) }}" until: "{{ make_certmanager_until | default(true) }}" register: "make_certmanager_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make certmanager" dry_run: "{{ make_certmanager_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_certmanager_env|default({})), **(make_certmanager_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_certmanager_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_certmana0000644000175000017500000000200615133730043033356 0ustar zuulzuul--- - name: Debug make_certmanager_cleanup_env when: make_certmanager_cleanup_env is defined ansible.builtin.debug: var: make_certmanager_cleanup_env - name: Debug make_certmanager_cleanup_params when: make_certmanager_cleanup_params is defined ansible.builtin.debug: var: make_certmanager_cleanup_params - name: Run certmanager_cleanup retries: "{{ make_certmanager_cleanup_retries | default(omit) }}" delay: "{{ make_certmanager_cleanup_delay | default(omit) }}" until: "{{ make_certmanager_cleanup_until | default(true) }}" register: "make_certmanager_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make certmanager_cleanup" dry_run: "{{ make_certmanager_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_certmanager_cleanup_env|default({})), **(make_certmanager_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_validate_marketplace.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_validate0000644000175000017500000000202515133730043033356 0ustar zuulzuul--- - name: Debug make_validate_marketplace_env when: make_validate_marketplace_env is defined ansible.builtin.debug: var: make_validate_marketplace_env - name: Debug make_validate_marketplace_params when: make_validate_marketplace_params is defined ansible.builtin.debug: var: make_validate_marketplace_params - name: Run validate_marketplace retries: "{{ make_validate_marketplace_retries | default(omit) }}" delay: "{{ make_validate_marketplace_delay | default(omit) }}" until: "{{ make_validate_marketplace_until | default(true) }}" register: "make_validate_marketplace_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make validate_marketplace" dry_run: "{{ make_validate_marketplace_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_validate_marketplace_env|default({})), **(make_validate_marketplace_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_deploy_prep.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_de0000644000175000017500000000175015133730043033347 0ustar zuulzuul--- - name: Debug make_redis_deploy_prep_env when: make_redis_deploy_prep_env is defined ansible.builtin.debug: var: make_redis_deploy_prep_env - name: Debug make_redis_deploy_prep_params when: make_redis_deploy_prep_params is defined ansible.builtin.debug: var: make_redis_deploy_prep_params - name: Run redis_deploy_prep retries: "{{ make_redis_deploy_prep_retries | default(omit) }}" delay: "{{ make_redis_deploy_prep_delay | default(omit) }}" until: "{{ make_redis_deploy_prep_until | default(true) }}" register: "make_redis_deploy_prep_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make redis_deploy_prep" dry_run: "{{ make_redis_deploy_prep_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_redis_deploy_prep_env|default({})), **(make_redis_deploy_prep_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_de0000644000175000017500000000163515133730043033351 0ustar zuulzuul--- - name: Debug make_redis_deploy_env when: make_redis_deploy_env is defined ansible.builtin.debug: var: make_redis_deploy_env - name: Debug make_redis_deploy_params when: make_redis_deploy_params is defined ansible.builtin.debug: var: make_redis_deploy_params - name: Run redis_deploy retries: "{{ make_redis_deploy_retries | default(omit) }}" delay: "{{ make_redis_deploy_delay | default(omit) }}" until: "{{ make_redis_deploy_until | default(true) }}" register: "make_redis_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make redis_deploy" dry_run: "{{ make_redis_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_redis_deploy_env|default({})), **(make_redis_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_deploy_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_redis_de0000644000175000017500000000202515133730043033343 0ustar zuulzuul--- - name: Debug make_redis_deploy_cleanup_env when: make_redis_deploy_cleanup_env is defined ansible.builtin.debug: var: make_redis_deploy_cleanup_env - name: Debug make_redis_deploy_cleanup_params when: make_redis_deploy_cleanup_params is defined ansible.builtin.debug: var: make_redis_deploy_cleanup_params - name: Run redis_deploy_cleanup retries: "{{ make_redis_deploy_cleanup_retries | default(omit) }}" delay: "{{ make_redis_deploy_cleanup_delay | default(omit) }}" until: "{{ make_redis_deploy_cleanup_until | default(true) }}" register: "make_redis_deploy_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make redis_deploy_cleanup" dry_run: "{{ make_redis_deploy_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_redis_deploy_cleanup_env|default({})), **(make_redis_deploy_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_set_slower_etcd_profile.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_set_slow0000644000175000017500000000210215133730043033420 0ustar zuulzuul--- - name: Debug make_set_slower_etcd_profile_env when: make_set_slower_etcd_profile_env is defined ansible.builtin.debug: var: make_set_slower_etcd_profile_env - name: Debug make_set_slower_etcd_profile_params when: make_set_slower_etcd_profile_params is defined ansible.builtin.debug: var: make_set_slower_etcd_profile_params - name: Run set_slower_etcd_profile retries: "{{ make_set_slower_etcd_profile_retries | default(omit) }}" delay: "{{ make_set_slower_etcd_profile_delay | default(omit) }}" until: "{{ make_set_slower_etcd_profile_until | default(true) }}" register: "make_set_slower_etcd_profile_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls" script: "make set_slower_etcd_profile" dry_run: "{{ make_set_slower_etcd_profile_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_set_slower_etcd_profile_env|default({})), **(make_set_slower_etcd_profile_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_download_tools.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_download0000644000175000017500000000170415133730043033377 0ustar zuulzuul--- - name: Debug make_download_tools_env when: make_download_tools_env is defined ansible.builtin.debug: var: make_download_tools_env - name: Debug make_download_tools_params when: make_download_tools_params is defined ansible.builtin.debug: var: make_download_tools_params - name: Run download_tools retries: "{{ make_download_tools_retries | default(omit) }}" delay: "{{ make_download_tools_delay | default(omit) }}" until: "{{ make_download_tools_until | default(true) }}" register: "make_download_tools_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make download_tools" dry_run: "{{ make_download_tools_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_download_tools_env|default({})), **(make_download_tools_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nfs.yml0000644000175000017500000000143715133730043033161 0ustar zuulzuul--- - name: Debug make_nfs_env when: make_nfs_env is defined ansible.builtin.debug: var: make_nfs_env - name: Debug make_nfs_params when: make_nfs_params is defined ansible.builtin.debug: var: make_nfs_params - name: Run nfs retries: "{{ make_nfs_retries | default(omit) }}" delay: "{{ make_nfs_delay | default(omit) }}" until: "{{ make_nfs_until | default(true) }}" register: "make_nfs_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make nfs" dry_run: "{{ make_nfs_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nfs_env|default({})), **(make_nfs_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nfs_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_nfs_clea0000644000175000017500000000162715133730043033346 0ustar zuulzuul--- - name: Debug make_nfs_cleanup_env when: make_nfs_cleanup_env is defined ansible.builtin.debug: var: make_nfs_cleanup_env - name: Debug make_nfs_cleanup_params when: make_nfs_cleanup_params is defined ansible.builtin.debug: var: make_nfs_cleanup_params - name: Run nfs_cleanup retries: "{{ make_nfs_cleanup_retries | default(omit) }}" delay: "{{ make_nfs_cleanup_delay | default(omit) }}" until: "{{ make_nfs_cleanup_until | default(true) }}" register: "make_nfs_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make nfs_cleanup" dry_run: "{{ make_nfs_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_nfs_cleanup_env|default({})), **(make_nfs_cleanup_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc.yml0000644000175000017500000000143715133730043033142 0ustar zuulzuul--- - name: Debug make_crc_env when: make_crc_env is defined ansible.builtin.debug: var: make_crc_env - name: Debug make_crc_params when: make_crc_params is defined ansible.builtin.debug: var: make_crc_params - name: Run crc retries: "{{ make_crc_retries | default(omit) }}" delay: "{{ make_crc_delay | default(omit) }}" until: "{{ make_crc_until | default(true) }}" register: "make_crc_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make crc" dry_run: "{{ make_crc_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_env|default({})), **(make_crc_params|default({}))) }}" ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_clea0000644000175000017500000000162715133730043033327 0ustar zuulzuul--- - name: Debug make_crc_cleanup_env when: make_crc_cleanup_env is defined ansible.builtin.debug: var: make_crc_cleanup_env - name: Debug make_crc_cleanup_params when: make_crc_cleanup_params is defined ansible.builtin.debug: var: make_crc_cleanup_params - name: Run crc_cleanup retries: "{{ make_crc_cleanup_retries | default(omit) }}" delay: "{{ make_crc_cleanup_delay | default(omit) }}" until: "{{ make_crc_cleanup_until | default(true) }}" register: "make_crc_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make crc_cleanup" dry_run: "{{ make_crc_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_cleanup_env|default({})), **(make_crc_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_scrub.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_scru0000644000175000017500000000157115133730043033375 0ustar zuulzuul--- - name: Debug make_crc_scrub_env when: make_crc_scrub_env is defined ansible.builtin.debug: var: make_crc_scrub_env - name: Debug make_crc_scrub_params when: make_crc_scrub_params is defined ansible.builtin.debug: var: make_crc_scrub_params - name: Run crc_scrub retries: "{{ make_crc_scrub_retries | default(omit) }}" delay: "{{ make_crc_scrub_delay | default(omit) }}" until: "{{ make_crc_scrub_until | default(true) }}" register: "make_crc_scrub_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make crc_scrub" dry_run: "{{ make_crc_scrub_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_scrub_env|default({})), **(make_crc_scrub_params|default({}))) }}" ././@LongLink0000644000000000000000000000017500000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_attach_default_interface.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_atta0000644000175000017500000000222615133730043033350 0ustar zuulzuul--- - name: Debug make_crc_attach_default_interface_env when: make_crc_attach_default_interface_env is defined ansible.builtin.debug: var: make_crc_attach_default_interface_env - name: Debug make_crc_attach_default_interface_params when: make_crc_attach_default_interface_params is defined ansible.builtin.debug: var: make_crc_attach_default_interface_params - name: Run crc_attach_default_interface retries: "{{ make_crc_attach_default_interface_retries | default(omit) }}" delay: "{{ make_crc_attach_default_interface_delay | default(omit) }}" until: "{{ make_crc_attach_default_interface_until | default(true) }}" register: "make_crc_attach_default_interface_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make crc_attach_default_interface" dry_run: "{{ make_crc_attach_default_interface_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_attach_default_interface_env|default({})), **(make_crc_attach_default_interface_params|default({}))) }}" ././@LongLink0000644000000000000000000000020500000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_attach_default_interface_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_crc_atta0000644000175000017500000000241615133730043033351 0ustar zuulzuul--- - name: Debug make_crc_attach_default_interface_cleanup_env when: make_crc_attach_default_interface_cleanup_env is defined ansible.builtin.debug: var: make_crc_attach_default_interface_cleanup_env - name: Debug make_crc_attach_default_interface_cleanup_params when: make_crc_attach_default_interface_cleanup_params is defined ansible.builtin.debug: var: make_crc_attach_default_interface_cleanup_params - name: Run crc_attach_default_interface_cleanup retries: "{{ make_crc_attach_default_interface_cleanup_retries | default(omit) }}" delay: "{{ make_crc_attach_default_interface_cleanup_delay | default(omit) }}" until: "{{ make_crc_attach_default_interface_cleanup_until | default(true) }}" register: "make_crc_attach_default_interface_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make crc_attach_default_interface_cleanup" dry_run: "{{ make_crc_attach_default_interface_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_crc_attach_default_interface_cleanup_env|default({})), **(make_crc_attach_default_interface_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_network.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000174215133730043033274 0ustar zuulzuul--- - name: Debug make_ipv6_lab_network_env when: make_ipv6_lab_network_env is defined ansible.builtin.debug: var: make_ipv6_lab_network_env - name: Debug make_ipv6_lab_network_params when: make_ipv6_lab_network_params is defined ansible.builtin.debug: var: make_ipv6_lab_network_params - name: Run ipv6_lab_network retries: "{{ make_ipv6_lab_network_retries | default(omit) }}" delay: "{{ make_ipv6_lab_network_delay | default(omit) }}" until: "{{ make_ipv6_lab_network_until | default(true) }}" register: "make_ipv6_lab_network_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_network" dry_run: "{{ make_ipv6_lab_network_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_network_env|default({})), **(make_ipv6_lab_network_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_network_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000213215133730043033266 0ustar zuulzuul--- - name: Debug make_ipv6_lab_network_cleanup_env when: make_ipv6_lab_network_cleanup_env is defined ansible.builtin.debug: var: make_ipv6_lab_network_cleanup_env - name: Debug make_ipv6_lab_network_cleanup_params when: make_ipv6_lab_network_cleanup_params is defined ansible.builtin.debug: var: make_ipv6_lab_network_cleanup_params - name: Run ipv6_lab_network_cleanup retries: "{{ make_ipv6_lab_network_cleanup_retries | default(omit) }}" delay: "{{ make_ipv6_lab_network_cleanup_delay | default(omit) }}" until: "{{ make_ipv6_lab_network_cleanup_until | default(true) }}" register: "make_ipv6_lab_network_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_network_cleanup" dry_run: "{{ make_ipv6_lab_network_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_network_cleanup_env|default({})), **(make_ipv6_lab_network_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_nat64_router.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000205515133730043033272 0ustar zuulzuul--- - name: Debug make_ipv6_lab_nat64_router_env when: make_ipv6_lab_nat64_router_env is defined ansible.builtin.debug: var: make_ipv6_lab_nat64_router_env - name: Debug make_ipv6_lab_nat64_router_params when: make_ipv6_lab_nat64_router_params is defined ansible.builtin.debug: var: make_ipv6_lab_nat64_router_params - name: Run ipv6_lab_nat64_router retries: "{{ make_ipv6_lab_nat64_router_retries | default(omit) }}" delay: "{{ make_ipv6_lab_nat64_router_delay | default(omit) }}" until: "{{ make_ipv6_lab_nat64_router_until | default(true) }}" register: "make_ipv6_lab_nat64_router_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_nat64_router" dry_run: "{{ make_ipv6_lab_nat64_router_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_nat64_router_env|default({})), **(make_ipv6_lab_nat64_router_params|default({}))) }}" ././@LongLink0000644000000000000000000000017600000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_nat64_router_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000224515133730043033273 0ustar zuulzuul--- - name: Debug make_ipv6_lab_nat64_router_cleanup_env when: make_ipv6_lab_nat64_router_cleanup_env is defined ansible.builtin.debug: var: make_ipv6_lab_nat64_router_cleanup_env - name: Debug make_ipv6_lab_nat64_router_cleanup_params when: make_ipv6_lab_nat64_router_cleanup_params is defined ansible.builtin.debug: var: make_ipv6_lab_nat64_router_cleanup_params - name: Run ipv6_lab_nat64_router_cleanup retries: "{{ make_ipv6_lab_nat64_router_cleanup_retries | default(omit) }}" delay: "{{ make_ipv6_lab_nat64_router_cleanup_delay | default(omit) }}" until: "{{ make_ipv6_lab_nat64_router_cleanup_until | default(true) }}" register: "make_ipv6_lab_nat64_router_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_nat64_router_cleanup" dry_run: "{{ make_ipv6_lab_nat64_router_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_nat64_router_cleanup_env|default({})), **(make_ipv6_lab_nat64_router_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_sno.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000164615133730043033277 0ustar zuulzuul--- - name: Debug make_ipv6_lab_sno_env when: make_ipv6_lab_sno_env is defined ansible.builtin.debug: var: make_ipv6_lab_sno_env - name: Debug make_ipv6_lab_sno_params when: make_ipv6_lab_sno_params is defined ansible.builtin.debug: var: make_ipv6_lab_sno_params - name: Run ipv6_lab_sno retries: "{{ make_ipv6_lab_sno_retries | default(omit) }}" delay: "{{ make_ipv6_lab_sno_delay | default(omit) }}" until: "{{ make_ipv6_lab_sno_until | default(true) }}" register: "make_ipv6_lab_sno_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_sno" dry_run: "{{ make_ipv6_lab_sno_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_sno_env|default({})), **(make_ipv6_lab_sno_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_sno_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000203615133730043033271 0ustar zuulzuul--- - name: Debug make_ipv6_lab_sno_cleanup_env when: make_ipv6_lab_sno_cleanup_env is defined ansible.builtin.debug: var: make_ipv6_lab_sno_cleanup_env - name: Debug make_ipv6_lab_sno_cleanup_params when: make_ipv6_lab_sno_cleanup_params is defined ansible.builtin.debug: var: make_ipv6_lab_sno_cleanup_params - name: Run ipv6_lab_sno_cleanup retries: "{{ make_ipv6_lab_sno_cleanup_retries | default(omit) }}" delay: "{{ make_ipv6_lab_sno_cleanup_delay | default(omit) }}" until: "{{ make_ipv6_lab_sno_cleanup_until | default(true) }}" register: "make_ipv6_lab_sno_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_sno_cleanup" dry_run: "{{ make_ipv6_lab_sno_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_sno_cleanup_env|default({})), **(make_ipv6_lab_sno_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000155215133730043033273 0ustar zuulzuul--- - name: Debug make_ipv6_lab_env when: make_ipv6_lab_env is defined ansible.builtin.debug: var: make_ipv6_lab_env - name: Debug make_ipv6_lab_params when: make_ipv6_lab_params is defined ansible.builtin.debug: var: make_ipv6_lab_params - name: Run ipv6_lab retries: "{{ make_ipv6_lab_retries | default(omit) }}" delay: "{{ make_ipv6_lab_delay | default(omit) }}" until: "{{ make_ipv6_lab_until | default(true) }}" register: "make_ipv6_lab_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab" dry_run: "{{ make_ipv6_lab_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_env|default({})), **(make_ipv6_lab_params|default({}))) }}" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_ipv6_lab0000644000175000017500000000174215133730043033274 0ustar zuulzuul--- - name: Debug make_ipv6_lab_cleanup_env when: make_ipv6_lab_cleanup_env is defined ansible.builtin.debug: var: make_ipv6_lab_cleanup_env - name: Debug make_ipv6_lab_cleanup_params when: make_ipv6_lab_cleanup_params is defined ansible.builtin.debug: var: make_ipv6_lab_cleanup_params - name: Run ipv6_lab_cleanup retries: "{{ make_ipv6_lab_cleanup_retries | default(omit) }}" delay: "{{ make_ipv6_lab_cleanup_delay | default(omit) }}" until: "{{ make_ipv6_lab_cleanup_until | default(true) }}" register: "make_ipv6_lab_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make ipv6_lab_cleanup" dry_run: "{{ make_ipv6_lab_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_ipv6_lab_cleanup_env|default({})), **(make_ipv6_lab_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_attach_default_interface.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_attach_d0000644000175000017500000000213215133730043033333 0ustar zuulzuul--- - name: Debug make_attach_default_interface_env when: make_attach_default_interface_env is defined ansible.builtin.debug: var: make_attach_default_interface_env - name: Debug make_attach_default_interface_params when: make_attach_default_interface_params is defined ansible.builtin.debug: var: make_attach_default_interface_params - name: Run attach_default_interface retries: "{{ make_attach_default_interface_retries | default(omit) }}" delay: "{{ make_attach_default_interface_delay | default(omit) }}" until: "{{ make_attach_default_interface_until | default(true) }}" register: "make_attach_default_interface_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make attach_default_interface" dry_run: "{{ make_attach_default_interface_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_attach_default_interface_env|default({})), **(make_attach_default_interface_params|default({}))) }}" ././@LongLink0000644000000000000000000000020100000000000011574 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_attach_default_interface_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_attach_d0000644000175000017500000000232215133730043033334 0ustar zuulzuul--- - name: Debug make_attach_default_interface_cleanup_env when: make_attach_default_interface_cleanup_env is defined ansible.builtin.debug: var: make_attach_default_interface_cleanup_env - name: Debug make_attach_default_interface_cleanup_params when: make_attach_default_interface_cleanup_params is defined ansible.builtin.debug: var: make_attach_default_interface_cleanup_params - name: Run attach_default_interface_cleanup retries: "{{ make_attach_default_interface_cleanup_retries | default(omit) }}" delay: "{{ make_attach_default_interface_cleanup_delay | default(omit) }}" until: "{{ make_attach_default_interface_cleanup_until | default(true) }}" register: "make_attach_default_interface_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make attach_default_interface_cleanup" dry_run: "{{ make_attach_default_interface_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_attach_default_interface_cleanup_env|default({})), **(make_attach_default_interface_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_network_isolation_bridge.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_network_0000644000175000017500000000213215133730043033414 0ustar zuulzuul--- - name: Debug make_network_isolation_bridge_env when: make_network_isolation_bridge_env is defined ansible.builtin.debug: var: make_network_isolation_bridge_env - name: Debug make_network_isolation_bridge_params when: make_network_isolation_bridge_params is defined ansible.builtin.debug: var: make_network_isolation_bridge_params - name: Run network_isolation_bridge retries: "{{ make_network_isolation_bridge_retries | default(omit) }}" delay: "{{ make_network_isolation_bridge_delay | default(omit) }}" until: "{{ make_network_isolation_bridge_until | default(true) }}" register: "make_network_isolation_bridge_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make network_isolation_bridge" dry_run: "{{ make_network_isolation_bridge_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_network_isolation_bridge_env|default({})), **(make_network_isolation_bridge_params|default({}))) }}" ././@LongLink0000644000000000000000000000020100000000000011574 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_network_isolation_bridge_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_network_0000644000175000017500000000232215133730043033415 0ustar zuulzuul--- - name: Debug make_network_isolation_bridge_cleanup_env when: make_network_isolation_bridge_cleanup_env is defined ansible.builtin.debug: var: make_network_isolation_bridge_cleanup_env - name: Debug make_network_isolation_bridge_cleanup_params when: make_network_isolation_bridge_cleanup_params is defined ansible.builtin.debug: var: make_network_isolation_bridge_cleanup_params - name: Run network_isolation_bridge_cleanup retries: "{{ make_network_isolation_bridge_cleanup_retries | default(omit) }}" delay: "{{ make_network_isolation_bridge_cleanup_delay | default(omit) }}" until: "{{ make_network_isolation_bridge_cleanup_until | default(true) }}" register: "make_network_isolation_bridge_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make network_isolation_bridge_cleanup" dry_run: "{{ make_network_isolation_bridge_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_network_isolation_bridge_cleanup_env|default({})), **(make_network_isolation_bridge_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_baremetal_compute.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_bar0000644000175000017500000000207415133730043033342 0ustar zuulzuul--- - name: Debug make_edpm_baremetal_compute_env when: make_edpm_baremetal_compute_env is defined ansible.builtin.debug: var: make_edpm_baremetal_compute_env - name: Debug make_edpm_baremetal_compute_params when: make_edpm_baremetal_compute_params is defined ansible.builtin.debug: var: make_edpm_baremetal_compute_params - name: Run edpm_baremetal_compute retries: "{{ make_edpm_baremetal_compute_retries | default(omit) }}" delay: "{{ make_edpm_baremetal_compute_delay | default(omit) }}" until: "{{ make_edpm_baremetal_compute_until | default(true) }}" register: "make_edpm_baremetal_compute_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_baremetal_compute" dry_run: "{{ make_edpm_baremetal_compute_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_baremetal_compute_env|default({})), **(make_edpm_baremetal_compute_params|default({}))) }}" ././@LongLink0000644000000000000000000000015500000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_compute.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_com0000644000175000017500000000164615133730043033360 0ustar zuulzuul--- - name: Debug make_edpm_compute_env when: make_edpm_compute_env is defined ansible.builtin.debug: var: make_edpm_compute_env - name: Debug make_edpm_compute_params when: make_edpm_compute_params is defined ansible.builtin.debug: var: make_edpm_compute_params - name: Run edpm_compute retries: "{{ make_edpm_compute_retries | default(omit) }}" delay: "{{ make_edpm_compute_delay | default(omit) }}" until: "{{ make_edpm_compute_until | default(true) }}" register: "make_edpm_compute_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_compute" dry_run: "{{ make_edpm_compute_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_compute_env|default({})), **(make_edpm_compute_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_compute_bootc.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_com0000644000175000017500000000200015133730043033341 0ustar zuulzuul--- - name: Debug make_edpm_compute_bootc_env when: make_edpm_compute_bootc_env is defined ansible.builtin.debug: var: make_edpm_compute_bootc_env - name: Debug make_edpm_compute_bootc_params when: make_edpm_compute_bootc_params is defined ansible.builtin.debug: var: make_edpm_compute_bootc_params - name: Run edpm_compute_bootc retries: "{{ make_edpm_compute_bootc_retries | default(omit) }}" delay: "{{ make_edpm_compute_bootc_delay | default(omit) }}" until: "{{ make_edpm_compute_bootc_until | default(true) }}" register: "make_edpm_compute_bootc_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_compute_bootc" dry_run: "{{ make_edpm_compute_bootc_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_compute_bootc_env|default({})), **(make_edpm_compute_bootc_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_ansible_runner.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_ans0000644000175000017500000000201715133730043033354 0ustar zuulzuul--- - name: Debug make_edpm_ansible_runner_env when: make_edpm_ansible_runner_env is defined ansible.builtin.debug: var: make_edpm_ansible_runner_env - name: Debug make_edpm_ansible_runner_params when: make_edpm_ansible_runner_params is defined ansible.builtin.debug: var: make_edpm_ansible_runner_params - name: Run edpm_ansible_runner retries: "{{ make_edpm_ansible_runner_retries | default(omit) }}" delay: "{{ make_edpm_ansible_runner_delay | default(omit) }}" until: "{{ make_edpm_ansible_runner_until | default(true) }}" register: "make_edpm_ansible_runner_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_ansible_runner" dry_run: "{{ make_edpm_ansible_runner_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_ansible_runner_env|default({})), **(make_edpm_ansible_runner_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_computes_bgp.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_com0000644000175000017500000000176115133730043033356 0ustar zuulzuul--- - name: Debug make_edpm_computes_bgp_env when: make_edpm_computes_bgp_env is defined ansible.builtin.debug: var: make_edpm_computes_bgp_env - name: Debug make_edpm_computes_bgp_params when: make_edpm_computes_bgp_params is defined ansible.builtin.debug: var: make_edpm_computes_bgp_params - name: Run edpm_computes_bgp retries: "{{ make_edpm_computes_bgp_retries | default(omit) }}" delay: "{{ make_edpm_computes_bgp_delay | default(omit) }}" until: "{{ make_edpm_computes_bgp_until | default(true) }}" register: "make_edpm_computes_bgp_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_computes_bgp" dry_run: "{{ make_edpm_computes_bgp_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_computes_bgp_env|default({})), **(make_edpm_computes_bgp_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_compute_repos.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_com0000644000175000017500000000200015133730043033341 0ustar zuulzuul--- - name: Debug make_edpm_compute_repos_env when: make_edpm_compute_repos_env is defined ansible.builtin.debug: var: make_edpm_compute_repos_env - name: Debug make_edpm_compute_repos_params when: make_edpm_compute_repos_params is defined ansible.builtin.debug: var: make_edpm_compute_repos_params - name: Run edpm_compute_repos retries: "{{ make_edpm_compute_repos_retries | default(omit) }}" delay: "{{ make_edpm_compute_repos_delay | default(omit) }}" until: "{{ make_edpm_compute_repos_until | default(true) }}" register: "make_edpm_compute_repos_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_compute_repos" dry_run: "{{ make_edpm_compute_repos_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_compute_repos_env|default({})), **(make_edpm_compute_repos_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_compute_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_com0000644000175000017500000000203615133730043033352 0ustar zuulzuul--- - name: Debug make_edpm_compute_cleanup_env when: make_edpm_compute_cleanup_env is defined ansible.builtin.debug: var: make_edpm_compute_cleanup_env - name: Debug make_edpm_compute_cleanup_params when: make_edpm_compute_cleanup_params is defined ansible.builtin.debug: var: make_edpm_compute_cleanup_params - name: Run edpm_compute_cleanup retries: "{{ make_edpm_compute_cleanup_retries | default(omit) }}" delay: "{{ make_edpm_compute_cleanup_delay | default(omit) }}" until: "{{ make_edpm_compute_cleanup_until | default(true) }}" register: "make_edpm_compute_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_compute_cleanup" dry_run: "{{ make_edpm_compute_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_compute_cleanup_env|default({})), **(make_edpm_compute_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_networker.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_net0000644000175000017500000000170415133730043033363 0ustar zuulzuul--- - name: Debug make_edpm_networker_env when: make_edpm_networker_env is defined ansible.builtin.debug: var: make_edpm_networker_env - name: Debug make_edpm_networker_params when: make_edpm_networker_params is defined ansible.builtin.debug: var: make_edpm_networker_params - name: Run edpm_networker retries: "{{ make_edpm_networker_retries | default(omit) }}" delay: "{{ make_edpm_networker_delay | default(omit) }}" until: "{{ make_edpm_networker_until | default(true) }}" register: "make_edpm_networker_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_networker" dry_run: "{{ make_edpm_networker_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_networker_env|default({})), **(make_edpm_networker_params|default({}))) }}" ././@LongLink0000644000000000000000000000016700000000000011607 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_networker_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_net0000644000175000017500000000207415133730043033364 0ustar zuulzuul--- - name: Debug make_edpm_networker_cleanup_env when: make_edpm_networker_cleanup_env is defined ansible.builtin.debug: var: make_edpm_networker_cleanup_env - name: Debug make_edpm_networker_cleanup_params when: make_edpm_networker_cleanup_params is defined ansible.builtin.debug: var: make_edpm_networker_cleanup_params - name: Run edpm_networker_cleanup retries: "{{ make_edpm_networker_cleanup_retries | default(omit) }}" delay: "{{ make_edpm_networker_cleanup_delay | default(omit) }}" until: "{{ make_edpm_networker_cleanup_until | default(true) }}" register: "make_edpm_networker_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_networker_cleanup" dry_run: "{{ make_edpm_networker_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_networker_cleanup_env|default({})), **(make_edpm_networker_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_deploy_instance.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_edpm_dep0000644000175000017500000000203615133730043033344 0ustar zuulzuul--- - name: Debug make_edpm_deploy_instance_env when: make_edpm_deploy_instance_env is defined ansible.builtin.debug: var: make_edpm_deploy_instance_env - name: Debug make_edpm_deploy_instance_params when: make_edpm_deploy_instance_params is defined ansible.builtin.debug: var: make_edpm_deploy_instance_params - name: Run edpm_deploy_instance retries: "{{ make_edpm_deploy_instance_retries | default(omit) }}" delay: "{{ make_edpm_deploy_instance_delay | default(omit) }}" until: "{{ make_edpm_deploy_instance_until | default(true) }}" register: "make_edpm_deploy_instance_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make edpm_deploy_instance" dry_run: "{{ make_edpm_deploy_instance_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_edpm_deploy_instance_env|default({})), **(make_edpm_deploy_instance_params|default({}))) }}" ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_tripleo_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_tripleo_0000644000175000017500000000170415133730043033405 0ustar zuulzuul--- - name: Debug make_tripleo_deploy_env when: make_tripleo_deploy_env is defined ansible.builtin.debug: var: make_tripleo_deploy_env - name: Debug make_tripleo_deploy_params when: make_tripleo_deploy_params is defined ansible.builtin.debug: var: make_tripleo_deploy_params - name: Run tripleo_deploy retries: "{{ make_tripleo_deploy_retries | default(omit) }}" delay: "{{ make_tripleo_deploy_delay | default(omit) }}" until: "{{ make_tripleo_deploy_until | default(true) }}" register: "make_tripleo_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make tripleo_deploy" dry_run: "{{ make_tripleo_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_tripleo_deploy_env|default({})), **(make_tripleo_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone_deploy.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000176115133730043033400 0ustar zuulzuul--- - name: Debug make_standalone_deploy_env when: make_standalone_deploy_env is defined ansible.builtin.debug: var: make_standalone_deploy_env - name: Debug make_standalone_deploy_params when: make_standalone_deploy_params is defined ansible.builtin.debug: var: make_standalone_deploy_params - name: Run standalone_deploy retries: "{{ make_standalone_deploy_retries | default(omit) }}" delay: "{{ make_standalone_deploy_delay | default(omit) }}" until: "{{ make_standalone_deploy_until | default(true) }}" register: "make_standalone_deploy_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone_deploy" dry_run: "{{ make_standalone_deploy_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_deploy_env|default({})), **(make_standalone_deploy_params|default({}))) }}" ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone_sync.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000172315133730043033376 0ustar zuulzuul--- - name: Debug make_standalone_sync_env when: make_standalone_sync_env is defined ansible.builtin.debug: var: make_standalone_sync_env - name: Debug make_standalone_sync_params when: make_standalone_sync_params is defined ansible.builtin.debug: var: make_standalone_sync_params - name: Run standalone_sync retries: "{{ make_standalone_sync_retries | default(omit) }}" delay: "{{ make_standalone_sync_delay | default(omit) }}" until: "{{ make_standalone_sync_until | default(true) }}" register: "make_standalone_sync_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone_sync" dry_run: "{{ make_standalone_sync_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_sync_env|default({})), **(make_standalone_sync_params|default({}))) }}" ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000161015133730043033371 0ustar zuulzuul--- - name: Debug make_standalone_env when: make_standalone_env is defined ansible.builtin.debug: var: make_standalone_env - name: Debug make_standalone_params when: make_standalone_params is defined ansible.builtin.debug: var: make_standalone_params - name: Run standalone retries: "{{ make_standalone_retries | default(omit) }}" delay: "{{ make_standalone_delay | default(omit) }}" until: "{{ make_standalone_until | default(true) }}" register: "make_standalone_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone" dry_run: "{{ make_standalone_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_env|default({})), **(make_standalone_params|default({}))) }}" ././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000200015133730043033363 0ustar zuulzuul--- - name: Debug make_standalone_cleanup_env when: make_standalone_cleanup_env is defined ansible.builtin.debug: var: make_standalone_cleanup_env - name: Debug make_standalone_cleanup_params when: make_standalone_cleanup_params is defined ansible.builtin.debug: var: make_standalone_cleanup_params - name: Run standalone_cleanup retries: "{{ make_standalone_cleanup_retries | default(omit) }}" delay: "{{ make_standalone_cleanup_delay | default(omit) }}" until: "{{ make_standalone_cleanup_until | default(true) }}" register: "make_standalone_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone_cleanup" dry_run: "{{ make_standalone_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_cleanup_env|default({})), **(make_standalone_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone_snapshot.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000201715133730043033373 0ustar zuulzuul--- - name: Debug make_standalone_snapshot_env when: make_standalone_snapshot_env is defined ansible.builtin.debug: var: make_standalone_snapshot_env - name: Debug make_standalone_snapshot_params when: make_standalone_snapshot_params is defined ansible.builtin.debug: var: make_standalone_snapshot_params - name: Run standalone_snapshot retries: "{{ make_standalone_snapshot_retries | default(omit) }}" delay: "{{ make_standalone_snapshot_delay | default(omit) }}" until: "{{ make_standalone_snapshot_until | default(true) }}" register: "make_standalone_snapshot_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone_snapshot" dry_run: "{{ make_standalone_snapshot_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_snapshot_env|default({})), **(make_standalone_snapshot_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalone_revert.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_standalo0000644000175000017500000000176115133730043033400 0ustar zuulzuul--- - name: Debug make_standalone_revert_env when: make_standalone_revert_env is defined ansible.builtin.debug: var: make_standalone_revert_env - name: Debug make_standalone_revert_params when: make_standalone_revert_params is defined ansible.builtin.debug: var: make_standalone_revert_params - name: Run standalone_revert retries: "{{ make_standalone_revert_retries | default(omit) }}" delay: "{{ make_standalone_revert_delay | default(omit) }}" until: "{{ make_standalone_revert_until | default(true) }}" register: "make_standalone_revert_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make standalone_revert" dry_run: "{{ make_standalone_revert_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_standalone_revert_env|default({})), **(make_standalone_revert_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cifmw_prepare.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cifmw_pr0000644000175000017500000000166515133730043033404 0ustar zuulzuul--- - name: Debug make_cifmw_prepare_env when: make_cifmw_prepare_env is defined ansible.builtin.debug: var: make_cifmw_prepare_env - name: Debug make_cifmw_prepare_params when: make_cifmw_prepare_params is defined ansible.builtin.debug: var: make_cifmw_prepare_params - name: Run cifmw_prepare retries: "{{ make_cifmw_prepare_retries | default(omit) }}" delay: "{{ make_cifmw_prepare_delay | default(omit) }}" until: "{{ make_cifmw_prepare_until | default(true) }}" register: "make_cifmw_prepare_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make cifmw_prepare" dry_run: "{{ make_cifmw_prepare_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cifmw_prepare_env|default({})), **(make_cifmw_prepare_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cifmw_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_cifmw_cl0000644000175000017500000000166515133730043033361 0ustar zuulzuul--- - name: Debug make_cifmw_cleanup_env when: make_cifmw_cleanup_env is defined ansible.builtin.debug: var: make_cifmw_cleanup_env - name: Debug make_cifmw_cleanup_params when: make_cifmw_cleanup_params is defined ansible.builtin.debug: var: make_cifmw_cleanup_params - name: Run cifmw_cleanup retries: "{{ make_cifmw_cleanup_retries | default(omit) }}" delay: "{{ make_cifmw_cleanup_delay | default(omit) }}" until: "{{ make_cifmw_cleanup_until | default(true) }}" register: "make_cifmw_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make cifmw_cleanup" dry_run: "{{ make_cifmw_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_cifmw_cleanup_env|default({})), **(make_cifmw_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_network.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ne0000644000175000017500000000166515133730043033343 0ustar zuulzuul--- - name: Debug make_bmaas_network_env when: make_bmaas_network_env is defined ansible.builtin.debug: var: make_bmaas_network_env - name: Debug make_bmaas_network_params when: make_bmaas_network_params is defined ansible.builtin.debug: var: make_bmaas_network_params - name: Run bmaas_network retries: "{{ make_bmaas_network_retries | default(omit) }}" delay: "{{ make_bmaas_network_delay | default(omit) }}" until: "{{ make_bmaas_network_until | default(true) }}" register: "make_bmaas_network_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_network" dry_run: "{{ make_bmaas_network_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_network_env|default({})), **(make_bmaas_network_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_network_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ne0000644000175000017500000000205515133730043033335 0ustar zuulzuul--- - name: Debug make_bmaas_network_cleanup_env when: make_bmaas_network_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_network_cleanup_env - name: Debug make_bmaas_network_cleanup_params when: make_bmaas_network_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_network_cleanup_params - name: Run bmaas_network_cleanup retries: "{{ make_bmaas_network_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_network_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_network_cleanup_until | default(true) }}" register: "make_bmaas_network_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_network_cleanup" dry_run: "{{ make_bmaas_network_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_network_cleanup_env|default({})), **(make_bmaas_network_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000020700000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_route_crc_and_crc_bmaas_networks.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ro0000644000175000017500000000245415133730043033356 0ustar zuulzuul--- - name: Debug make_bmaas_route_crc_and_crc_bmaas_networks_env when: make_bmaas_route_crc_and_crc_bmaas_networks_env is defined ansible.builtin.debug: var: make_bmaas_route_crc_and_crc_bmaas_networks_env - name: Debug make_bmaas_route_crc_and_crc_bmaas_networks_params when: make_bmaas_route_crc_and_crc_bmaas_networks_params is defined ansible.builtin.debug: var: make_bmaas_route_crc_and_crc_bmaas_networks_params - name: Run bmaas_route_crc_and_crc_bmaas_networks retries: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_retries | default(omit) }}" delay: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_delay | default(omit) }}" until: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_until | default(true) }}" register: "make_bmaas_route_crc_and_crc_bmaas_networks_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_route_crc_and_crc_bmaas_networks" dry_run: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_route_crc_and_crc_bmaas_networks_env|default({})), **(make_bmaas_route_crc_and_crc_bmaas_networks_params|default({}))) }}" ././@LongLink0000644000000000000000000000021700000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_route_crc_and_crc_bmaas_networks_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ro0000644000175000017500000000264415133730043033357 0ustar zuulzuul--- - name: Debug make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_env when: make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_env - name: Debug make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_params when: make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_params - name: Run bmaas_route_crc_and_crc_bmaas_networks_cleanup retries: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_until | default(true) }}" register: "make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_route_crc_and_crc_bmaas_networks_cleanup" dry_run: "{{ make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_env|default({})), **(make_bmaas_route_crc_and_crc_bmaas_networks_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_metallb.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_me0000644000175000017500000000166515133730043033342 0ustar zuulzuul--- - name: Debug make_bmaas_metallb_env when: make_bmaas_metallb_env is defined ansible.builtin.debug: var: make_bmaas_metallb_env - name: Debug make_bmaas_metallb_params when: make_bmaas_metallb_params is defined ansible.builtin.debug: var: make_bmaas_metallb_params - name: Run bmaas_metallb retries: "{{ make_bmaas_metallb_retries | default(omit) }}" delay: "{{ make_bmaas_metallb_delay | default(omit) }}" until: "{{ make_bmaas_metallb_until | default(true) }}" register: "make_bmaas_metallb_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_metallb" dry_run: "{{ make_bmaas_metallb_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_metallb_env|default({})), **(make_bmaas_metallb_params|default({}))) }}" ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_crc_attach_network.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cr0000644000175000017500000000213215133730043033333 0ustar zuulzuul--- - name: Debug make_bmaas_crc_attach_network_env when: make_bmaas_crc_attach_network_env is defined ansible.builtin.debug: var: make_bmaas_crc_attach_network_env - name: Debug make_bmaas_crc_attach_network_params when: make_bmaas_crc_attach_network_params is defined ansible.builtin.debug: var: make_bmaas_crc_attach_network_params - name: Run bmaas_crc_attach_network retries: "{{ make_bmaas_crc_attach_network_retries | default(omit) }}" delay: "{{ make_bmaas_crc_attach_network_delay | default(omit) }}" until: "{{ make_bmaas_crc_attach_network_until | default(true) }}" register: "make_bmaas_crc_attach_network_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_crc_attach_network" dry_run: "{{ make_bmaas_crc_attach_network_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_crc_attach_network_env|default({})), **(make_bmaas_crc_attach_network_params|default({}))) }}" ././@LongLink0000644000000000000000000000020100000000000011574 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_crc_attach_network_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cr0000644000175000017500000000232215133730043033334 0ustar zuulzuul--- - name: Debug make_bmaas_crc_attach_network_cleanup_env when: make_bmaas_crc_attach_network_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_crc_attach_network_cleanup_env - name: Debug make_bmaas_crc_attach_network_cleanup_params when: make_bmaas_crc_attach_network_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_crc_attach_network_cleanup_params - name: Run bmaas_crc_attach_network_cleanup retries: "{{ make_bmaas_crc_attach_network_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_crc_attach_network_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_crc_attach_network_cleanup_until | default(true) }}" register: "make_bmaas_crc_attach_network_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_crc_attach_network_cleanup" dry_run: "{{ make_bmaas_crc_attach_network_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_crc_attach_network_cleanup_env|default({})), **(make_bmaas_crc_attach_network_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017300000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_crc_baremetal_bridge.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cr0000644000175000017500000000217015133730043033335 0ustar zuulzuul--- - name: Debug make_bmaas_crc_baremetal_bridge_env when: make_bmaas_crc_baremetal_bridge_env is defined ansible.builtin.debug: var: make_bmaas_crc_baremetal_bridge_env - name: Debug make_bmaas_crc_baremetal_bridge_params when: make_bmaas_crc_baremetal_bridge_params is defined ansible.builtin.debug: var: make_bmaas_crc_baremetal_bridge_params - name: Run bmaas_crc_baremetal_bridge retries: "{{ make_bmaas_crc_baremetal_bridge_retries | default(omit) }}" delay: "{{ make_bmaas_crc_baremetal_bridge_delay | default(omit) }}" until: "{{ make_bmaas_crc_baremetal_bridge_until | default(true) }}" register: "make_bmaas_crc_baremetal_bridge_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_crc_baremetal_bridge" dry_run: "{{ make_bmaas_crc_baremetal_bridge_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_crc_baremetal_bridge_env|default({})), **(make_bmaas_crc_baremetal_bridge_params|default({}))) }}" ././@LongLink0000644000000000000000000000020300000000000011576 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_crc_baremetal_bridge_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cr0000644000175000017500000000236015133730043033336 0ustar zuulzuul--- - name: Debug make_bmaas_crc_baremetal_bridge_cleanup_env when: make_bmaas_crc_baremetal_bridge_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_crc_baremetal_bridge_cleanup_env - name: Debug make_bmaas_crc_baremetal_bridge_cleanup_params when: make_bmaas_crc_baremetal_bridge_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_crc_baremetal_bridge_cleanup_params - name: Run bmaas_crc_baremetal_bridge_cleanup retries: "{{ make_bmaas_crc_baremetal_bridge_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_crc_baremetal_bridge_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_crc_baremetal_bridge_cleanup_until | default(true) }}" register: "make_bmaas_crc_baremetal_bridge_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_crc_baremetal_bridge_cleanup" dry_run: "{{ make_bmaas_crc_baremetal_bridge_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_crc_baremetal_bridge_cleanup_env|default({})), **(make_bmaas_crc_baremetal_bridge_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_baremetal_net_nad.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ba0000644000175000017500000000211315133730043033310 0ustar zuulzuul--- - name: Debug make_bmaas_baremetal_net_nad_env when: make_bmaas_baremetal_net_nad_env is defined ansible.builtin.debug: var: make_bmaas_baremetal_net_nad_env - name: Debug make_bmaas_baremetal_net_nad_params when: make_bmaas_baremetal_net_nad_params is defined ansible.builtin.debug: var: make_bmaas_baremetal_net_nad_params - name: Run bmaas_baremetal_net_nad retries: "{{ make_bmaas_baremetal_net_nad_retries | default(omit) }}" delay: "{{ make_bmaas_baremetal_net_nad_delay | default(omit) }}" until: "{{ make_bmaas_baremetal_net_nad_until | default(true) }}" register: "make_bmaas_baremetal_net_nad_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_baremetal_net_nad" dry_run: "{{ make_bmaas_baremetal_net_nad_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_baremetal_net_nad_env|default({})), **(make_bmaas_baremetal_net_nad_params|default({}))) }}" ././@LongLink0000644000000000000000000000020000000000000011573 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_baremetal_net_nad_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ba0000644000175000017500000000230315133730043033311 0ustar zuulzuul--- - name: Debug make_bmaas_baremetal_net_nad_cleanup_env when: make_bmaas_baremetal_net_nad_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_baremetal_net_nad_cleanup_env - name: Debug make_bmaas_baremetal_net_nad_cleanup_params when: make_bmaas_baremetal_net_nad_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_baremetal_net_nad_cleanup_params - name: Run bmaas_baremetal_net_nad_cleanup retries: "{{ make_bmaas_baremetal_net_nad_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_baremetal_net_nad_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_baremetal_net_nad_cleanup_until | default(true) }}" register: "make_bmaas_baremetal_net_nad_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_baremetal_net_nad_cleanup" dry_run: "{{ make_bmaas_baremetal_net_nad_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_baremetal_net_nad_cleanup_env|default({})), **(make_bmaas_baremetal_net_nad_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016600000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_metallb_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_me0000644000175000017500000000205515133730043033334 0ustar zuulzuul--- - name: Debug make_bmaas_metallb_cleanup_env when: make_bmaas_metallb_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_metallb_cleanup_env - name: Debug make_bmaas_metallb_cleanup_params when: make_bmaas_metallb_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_metallb_cleanup_params - name: Run bmaas_metallb_cleanup retries: "{{ make_bmaas_metallb_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_metallb_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_metallb_cleanup_until | default(true) }}" register: "make_bmaas_metallb_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_metallb_cleanup" dry_run: "{{ make_bmaas_metallb_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_metallb_cleanup_env|default({})), **(make_bmaas_metallb_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_virtual_bms.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_vi0000644000175000017500000000176115133730043033354 0ustar zuulzuul--- - name: Debug make_bmaas_virtual_bms_env when: make_bmaas_virtual_bms_env is defined ansible.builtin.debug: var: make_bmaas_virtual_bms_env - name: Debug make_bmaas_virtual_bms_params when: make_bmaas_virtual_bms_params is defined ansible.builtin.debug: var: make_bmaas_virtual_bms_params - name: Run bmaas_virtual_bms retries: "{{ make_bmaas_virtual_bms_retries | default(omit) }}" delay: "{{ make_bmaas_virtual_bms_delay | default(omit) }}" until: "{{ make_bmaas_virtual_bms_until | default(true) }}" register: "make_bmaas_virtual_bms_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_virtual_bms" dry_run: "{{ make_bmaas_virtual_bms_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_virtual_bms_env|default({})), **(make_bmaas_virtual_bms_params|default({}))) }}" ././@LongLink0000644000000000000000000000017200000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_virtual_bms_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_vi0000644000175000017500000000215115133730043033346 0ustar zuulzuul--- - name: Debug make_bmaas_virtual_bms_cleanup_env when: make_bmaas_virtual_bms_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_virtual_bms_cleanup_env - name: Debug make_bmaas_virtual_bms_cleanup_params when: make_bmaas_virtual_bms_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_virtual_bms_cleanup_params - name: Run bmaas_virtual_bms_cleanup retries: "{{ make_bmaas_virtual_bms_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_virtual_bms_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_virtual_bms_cleanup_until | default(true) }}" register: "make_bmaas_virtual_bms_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_virtual_bms_cleanup" dry_run: "{{ make_bmaas_virtual_bms_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_virtual_bms_cleanup_env|default({})), **(make_bmaas_virtual_bms_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_sushy_emulator.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_su0000644000175000017500000000203615133730043033361 0ustar zuulzuul--- - name: Debug make_bmaas_sushy_emulator_env when: make_bmaas_sushy_emulator_env is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_env - name: Debug make_bmaas_sushy_emulator_params when: make_bmaas_sushy_emulator_params is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_params - name: Run bmaas_sushy_emulator retries: "{{ make_bmaas_sushy_emulator_retries | default(omit) }}" delay: "{{ make_bmaas_sushy_emulator_delay | default(omit) }}" until: "{{ make_bmaas_sushy_emulator_until | default(true) }}" register: "make_bmaas_sushy_emulator_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_sushy_emulator" dry_run: "{{ make_bmaas_sushy_emulator_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_sushy_emulator_env|default({})), **(make_bmaas_sushy_emulator_params|default({}))) }}" ././@LongLink0000644000000000000000000000017500000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_sushy_emulator_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_su0000644000175000017500000000222615133730043033362 0ustar zuulzuul--- - name: Debug make_bmaas_sushy_emulator_cleanup_env when: make_bmaas_sushy_emulator_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_cleanup_env - name: Debug make_bmaas_sushy_emulator_cleanup_params when: make_bmaas_sushy_emulator_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_cleanup_params - name: Run bmaas_sushy_emulator_cleanup retries: "{{ make_bmaas_sushy_emulator_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_sushy_emulator_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_sushy_emulator_cleanup_until | default(true) }}" register: "make_bmaas_sushy_emulator_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_sushy_emulator_cleanup" dry_run: "{{ make_bmaas_sushy_emulator_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_sushy_emulator_cleanup_env|default({})), **(make_bmaas_sushy_emulator_cleanup_params|default({}))) }}" ././@LongLink0000644000000000000000000000017200000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_sushy_emulator_wait.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_su0000644000175000017500000000215115133730043033357 0ustar zuulzuul--- - name: Debug make_bmaas_sushy_emulator_wait_env when: make_bmaas_sushy_emulator_wait_env is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_wait_env - name: Debug make_bmaas_sushy_emulator_wait_params when: make_bmaas_sushy_emulator_wait_params is defined ansible.builtin.debug: var: make_bmaas_sushy_emulator_wait_params - name: Run bmaas_sushy_emulator_wait retries: "{{ make_bmaas_sushy_emulator_wait_retries | default(omit) }}" delay: "{{ make_bmaas_sushy_emulator_wait_delay | default(omit) }}" until: "{{ make_bmaas_sushy_emulator_wait_until | default(true) }}" register: "make_bmaas_sushy_emulator_wait_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_sushy_emulator_wait" dry_run: "{{ make_bmaas_sushy_emulator_wait_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_sushy_emulator_wait_env|default({})), **(make_bmaas_sushy_emulator_wait_params|default({}))) }}" ././@LongLink0000644000000000000000000000017200000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_generate_nodes_yaml.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_ge0000644000175000017500000000215115133730043033323 0ustar zuulzuul--- - name: Debug make_bmaas_generate_nodes_yaml_env when: make_bmaas_generate_nodes_yaml_env is defined ansible.builtin.debug: var: make_bmaas_generate_nodes_yaml_env - name: Debug make_bmaas_generate_nodes_yaml_params when: make_bmaas_generate_nodes_yaml_params is defined ansible.builtin.debug: var: make_bmaas_generate_nodes_yaml_params - name: Run bmaas_generate_nodes_yaml retries: "{{ make_bmaas_generate_nodes_yaml_retries | default(omit) }}" delay: "{{ make_bmaas_generate_nodes_yaml_delay | default(omit) }}" until: "{{ make_bmaas_generate_nodes_yaml_until | default(true) }}" register: "make_bmaas_generate_nodes_yaml_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_generate_nodes_yaml" dry_run: "{{ make_bmaas_generate_nodes_yaml_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_generate_nodes_yaml_env|default({})), **(make_bmaas_generate_nodes_yaml_params|default({}))) }}" ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas.ym0000644000175000017500000000147515133730043033304 0ustar zuulzuul--- - name: Debug make_bmaas_env when: make_bmaas_env is defined ansible.builtin.debug: var: make_bmaas_env - name: Debug make_bmaas_params when: make_bmaas_params is defined ansible.builtin.debug: var: make_bmaas_params - name: Run bmaas retries: "{{ make_bmaas_retries | default(omit) }}" delay: "{{ make_bmaas_delay | default(omit) }}" until: "{{ make_bmaas_until | default(true) }}" register: "make_bmaas_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas" dry_run: "{{ make_bmaas_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_env|default({})), **(make_bmaas_params|default({}))) }}" ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cleanup.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/roles/install_yamls_makes/tasks/make_bmaas_cl0000644000175000017500000000166515133730043033337 0ustar zuulzuul--- - name: Debug make_bmaas_cleanup_env when: make_bmaas_cleanup_env is defined ansible.builtin.debug: var: make_bmaas_cleanup_env - name: Debug make_bmaas_cleanup_params when: make_bmaas_cleanup_params is defined ansible.builtin.debug: var: make_bmaas_cleanup_params - name: Run bmaas_cleanup retries: "{{ make_bmaas_cleanup_retries | default(omit) }}" delay: "{{ make_bmaas_cleanup_delay | default(omit) }}" until: "{{ make_bmaas_cleanup_until | default(true) }}" register: "make_bmaas_cleanup_status" cifmw.general.ci_script: output_dir: "{{ cifmw_basedir|default(ansible_user_dir ~ '/ci-framework-data') }}/artifacts" chdir: "/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" script: "make bmaas_cleanup" dry_run: "{{ make_bmaas_cleanup_dryrun|default(false)|bool }}" extra_args: "{{ dict((make_bmaas_cleanup_env|default({})), **(make_bmaas_cleanup_params|default({}))) }}" home/zuul/zuul-output/logs/ci-framework-data/artifacts/operator_images.yaml0000644000175000017500000001675415133746062026433 0ustar zuulzuulcifmw_csv_images: - RELATED_IMAGE_OCTAVIA_HEALTHMANAGER_IMAGE_URL_DEFAULT: quay.io/podified-antelope-centos9/openstack-octavia-health-manager:current-podified - RELATED_IMAGE_BARBICAN_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/barbican-operator@sha256:f0634d8cf7c2c2919ca248a6883ce43d6ae4ac59252c987a5cfe17643fe7d38a - RELATED_IMAGE_CINDER_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/cinder-operator@sha256:ddb59f1a8e3fd0d641405e371e33b3d8c913af08e40e84f390e7e06f0a7f3488 - RELATED_IMAGE_DESIGNATE_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/designate-operator@sha256:0d59a405f50b37c833e14c0f4987e95c8769d9ab06a7087078bdd02568c18ca8 - RELATED_IMAGE_GLANCE_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/glance-operator@sha256:d69a68cdac59165797daf1064f3a3b4b14b546bf1c7254070a7ed1238998c028 - RELATED_IMAGE_HEAT_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/heat-operator@sha256:2f9a2f064448faebbae58f52d564dc0e8e39bed0fc12bd6b9fe925e42f1b5492 - RELATED_IMAGE_HORIZON_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/horizon-operator@sha256:3311e627bcb860d9443592a2c67078417318c9eb77d8ef4d07f9aa7027d46822 - RELATED_IMAGE_INFRA_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/infra-operator@sha256:b262df0f889c0ffaa53e3c6c5f40356d2baf9a814f3c20a4ce9a2051f0597238 - RELATED_IMAGE_IRONIC_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/ironic-operator@sha256:56c5f8b78445b3dbfc0d5afd9312906f6bef4dccf67302b0e4e5ca20bd263525 - RELATED_IMAGE_KEYSTONE_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/keystone-operator@sha256:393d7567eef4fd05af625389f5a7384c6bb75108b21b06183f1f5e33aac5417e - RELATED_IMAGE_MANILA_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/manila-operator@sha256:fd2e631e747c35a95f083418f5829d06c4b830f1fdb322368ff6190b9887ea32 - RELATED_IMAGE_MARIADB_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/mariadb-operator@sha256:ff0b6c27e2d96afccd73fbbb5b5297a3f60c7f4f1dfd2a877152466697018d71 - RELATED_IMAGE_NEUTRON_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/neutron-operator@sha256:0f440bf7dc937ce0135bdd328716686fd2f1320f453a9ac4e11e96383148ad6c - RELATED_IMAGE_NOVA_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/nova-operator@sha256:6defa56fc6a5bfbd5b27d28ff7b1c7bc89b24b2ef956e2a6d97b2726f668a231 - RELATED_IMAGE_OCTAVIA_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/octavia-operator@sha256:ab629ec4ce57b5cde9cd6d75069e68edca441b97b7b5a3f58804e2e61766b729 - RELATED_IMAGE_OPENSTACK_BAREMETAL_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:dae767a3ae652ffc70ba60c5bf2b5bf72c12d939353053e231b258948ededb22 - RELATED_IMAGE_OVN_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/ovn-operator@sha256:8b3bfb9e86618b7ac69443939b0968fae28a22cd62ea1e429b599ff9f8a5f8cf - RELATED_IMAGE_PLACEMENT_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/placement-operator@sha256:146961cac3291daf96c1ca2bc7bd52bc94d1f4787a0770e23205c2c9beb0d737 - RELATED_IMAGE_RABBITMQ_CLUSTER_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 - RELATED_IMAGE_SWIFT_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/swift-operator@sha256:9404536bf7cb7c3818e1a0f92b53e4d7c02fe7942324f32894106f02f8fc7e92 - RELATED_IMAGE_TELEMETRY_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/telemetry-operator@sha256:2e89109f5db66abf1afd15ef59bda35a53db40c5e59e020579ac5aa0acea1843 - RELATED_IMAGE_TEST_OPERATOR_MANAGER_IMAGE_URL: quay.io/openstack-k8s-operators/test-operator@sha256:244a4906353b84899db16a89e1ebb64491c9f85e69327cb2a72b6da0142a6e5e - RELATED_IMAGE_WATCHER_OPERATOR_MANAGER_IMAGE_URL: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_openstack_operator_index_image: OPENSTACK_IMG: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index@sha256:a0f13943a92e0881d21a5c74f94e8e4901a345fd22a581356f38fe044eb8dba5 cifmw_operator_images: BARBICAN_OP_IMG: quay.io/openstack-k8s-operators/barbican-operator@sha256:f0634d8cf7c2c2919ca248a6883ce43d6ae4ac59252c987a5cfe17643fe7d38a CINDER_OP_IMG: quay.io/openstack-k8s-operators/cinder-operator@sha256:ddb59f1a8e3fd0d641405e371e33b3d8c913af08e40e84f390e7e06f0a7f3488 DESIGNATE_OP_IMG: quay.io/openstack-k8s-operators/designate-operator@sha256:0d59a405f50b37c833e14c0f4987e95c8769d9ab06a7087078bdd02568c18ca8 GLANCE_OP_IMG: quay.io/openstack-k8s-operators/glance-operator@sha256:d69a68cdac59165797daf1064f3a3b4b14b546bf1c7254070a7ed1238998c028 HEAT_OP_IMG: quay.io/openstack-k8s-operators/heat-operator@sha256:2f9a2f064448faebbae58f52d564dc0e8e39bed0fc12bd6b9fe925e42f1b5492 HORIZON_OP_IMG: quay.io/openstack-k8s-operators/horizon-operator@sha256:3311e627bcb860d9443592a2c67078417318c9eb77d8ef4d07f9aa7027d46822 INFRA_OP_IMG: quay.io/openstack-k8s-operators/infra-operator@sha256:b262df0f889c0ffaa53e3c6c5f40356d2baf9a814f3c20a4ce9a2051f0597238 IRONIC_OP_IMG: quay.io/openstack-k8s-operators/ironic-operator@sha256:56c5f8b78445b3dbfc0d5afd9312906f6bef4dccf67302b0e4e5ca20bd263525 KEYSTONE_OP_IMG: quay.io/openstack-k8s-operators/keystone-operator@sha256:393d7567eef4fd05af625389f5a7384c6bb75108b21b06183f1f5e33aac5417e MANILA_OP_IMG: quay.io/openstack-k8s-operators/manila-operator@sha256:fd2e631e747c35a95f083418f5829d06c4b830f1fdb322368ff6190b9887ea32 MARIADB_OP_IMG: quay.io/openstack-k8s-operators/mariadb-operator@sha256:ff0b6c27e2d96afccd73fbbb5b5297a3f60c7f4f1dfd2a877152466697018d71 NEUTRON_OP_IMG: quay.io/openstack-k8s-operators/neutron-operator@sha256:0f440bf7dc937ce0135bdd328716686fd2f1320f453a9ac4e11e96383148ad6c NOVA_OP_IMG: quay.io/openstack-k8s-operators/nova-operator@sha256:6defa56fc6a5bfbd5b27d28ff7b1c7bc89b24b2ef956e2a6d97b2726f668a231 OCTAVIA_OP_IMG: quay.io/openstack-k8s-operators/octavia-operator@sha256:ab629ec4ce57b5cde9cd6d75069e68edca441b97b7b5a3f58804e2e61766b729 OPENSTACK-BAREMETAL_OP_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:dae767a3ae652ffc70ba60c5bf2b5bf72c12d939353053e231b258948ededb22 OPENSTACK-INIT_OP_IMG: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator@sha256:a2efba7435711bd0e6e0bb349159517a224f39bf3e6628c021d82801ebf3b58c OPENSTACK_OP_IMG: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator@sha256:a2efba7435711bd0e6e0bb349159517a224f39bf3e6628c021d82801ebf3b58c OVN_OP_IMG: quay.io/openstack-k8s-operators/ovn-operator@sha256:8b3bfb9e86618b7ac69443939b0968fae28a22cd62ea1e429b599ff9f8a5f8cf PLACEMENT_OP_IMG: quay.io/openstack-k8s-operators/placement-operator@sha256:146961cac3291daf96c1ca2bc7bd52bc94d1f4787a0770e23205c2c9beb0d737 RABBITMQ_OP_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 SWIFT_OP_IMG: quay.io/openstack-k8s-operators/swift-operator@sha256:9404536bf7cb7c3818e1a0f92b53e4d7c02fe7942324f32894106f02f8fc7e92 TELEMETRY_OP_IMG: quay.io/openstack-k8s-operators/telemetry-operator@sha256:2e89109f5db66abf1afd15ef59bda35a53db40c5e59e020579ac5aa0acea1843 TEST_OP_IMG: quay.io/openstack-k8s-operators/test-operator@sha256:244a4906353b84899db16a89e1ebb64491c9f85e69327cb2a72b6da0142a6e5e WATCHER_OP_IMG: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator@sha256:a6d29640021448803404209a04fb90656d835e71cda02a6b7e558bcf6122d9bd home/zuul/zuul-output/logs/ci-framework-data/artifacts/edpm/0000755000175000017500000000000015133753356023303 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/edpm/namespace.yaml0000644000175000017500000000027415133731460026116 0ustar zuulzuulapiVersion: v1 kind: Namespace metadata: name: openstack labels: pod-security.kubernetes.io/enforce: privileged security.openshift.io/scc.podSecurityLabelSync: "false" home/zuul/zuul-output/logs/ci-framework-data/artifacts/install_yamls.sh0000644000175000017500000000055215133730042025552 0ustar zuulzuulexport BMO_SETUP=False export INSTALL_CERT_MANAGER=False export OUT=/home/zuul/ci-framework-data/artifacts/manifests export OUTPUT_DIR=/home/zuul/ci-framework-data/artifacts/edpm export CHECKOUT_FROM_OPENSTACK_REF=true export OPENSTACK_K8S_BRANCH=main export WATCHER_REPO=/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator export WATCHER_BRANCH= home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/0000755000175000017500000000000015133753356024347 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/0000755000175000017500000000000015133730175027444 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/dataplane/0000755000175000017500000000000015133753356031403 5ustar zuulzuul././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/dataplane/99-kustomi0000644000175000017500000000764315133730177033266 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: openstack patches: - target: kind: OpenStackDataPlaneNodeSet patch: |- - op: replace path: /spec/nodes/edpm-compute-0/hostName value: "compute-0" - op: replace path: /spec/nodes/edpm-compute-1/hostName value: "compute-1" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/neutron_public_interface_name value: "eth1" - op: replace path: /spec/nodes/edpm-compute-0/networks/0/defaultRoute value: false - op: replace path: /spec/nodes/edpm-compute-1/networks/0/defaultRoute value: false - op: replace path: /spec/nodes/edpm-compute-1/ansible/ansibleHost value: >- 192.168.122.101 - op: replace path: /spec/nodes/edpm-compute-1/networks/0/fixedIP value: >- 192.168.122.101 - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_os_net_config_mappings value: net_config_data_lookup: edpm-compute: nic2: "eth1" - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_debug value: true - op: add path: /spec/env value: {} - op: add path: /spec/env value: - name: "ANSIBLE_VERBOSITY" value: "2" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_network_config_template value: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} - op: replace path: /spec/nodeTemplate/ansible/ansibleUser value: "zuul" - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/ctlplane_dns_nameservers value: - "192.168.122.10" - "199.204.44.24" - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_container_registry_insecure_registries value: ["38.102.83.51:5001"] - op: add path: /spec/nodeTemplate/ansible/ansibleVars/edpm_sshd_allowed_ranges value: ["0.0.0.0/0"] - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_telemetry_enabled_exporters value: - "podman_exporter" - "openstack_network_exporter" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/controlplane/0000755000175000017500000000000015133753356032152 5ustar zuulzuul././@LongLink0000644000000000000000000000017300000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-horizon-kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/controlplane/80-hori0000644000175000017500000000046115133730206033251 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: openstack patches: - target: kind: OpenStackControlPlane patch: |- - op: add path: /spec/horizon/enabled value: true - op: add path: /spec/horizon/template/memcachedInstance value: memcached././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/kustomizations/controlplane/99-kust0000644000175000017500000000062215133730176033315 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: namespace: openstack patches: - target: kind: OpenStackControlPlane patch: |- - op: replace path: /spec/dns/template/options value: [ { "key": "server", "values": [ "192.168.122.10" ] }, { "key": "no-negcache", "values": [] } ]home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/cert-manager/0000755000175000017500000000000015133753356026714 5ustar zuulzuul././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/cert-manager/cert_manager_manifest.ymlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/cert-manager/cert_manager_manifest.0000644000175000017500000366045215133746050033243 0ustar zuulzuul# Copyright 2022 The cert-manager Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. apiVersion: v1 kind: Namespace metadata: name: cert-manager --- # Source: cert-manager/templates/crd-acme.cert-manager.io_challenges.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "challenges.acme.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: acme.cert-manager.io names: categories: - cert-manager - cert-manager-acme kind: Challenge listKind: ChallengeList plural: challenges singular: challenge scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: .status.state name: State type: string - jsonPath: .spec.dnsName name: Domain type: string - jsonPath: .status.reason name: Reason priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: Challenge is a type to represent a Challenge request with an ACME server properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: properties: authorizationURL: description: |- The URL to the ACME Authorization resource that this challenge is a part of. type: string dnsName: description: |- dnsName is the identifier that this challenge is for, e.g., example.com. If the requested DNSName is a 'wildcard', this field MUST be set to the non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`. type: string issuerRef: description: |- References a properly configured ACME-type Issuer which should be used to create this Challenge. If the Issuer does not exist, processing will be retried. If the Issuer is not an 'ACME' Issuer, an error will be returned and the Challenge will be marked as failed. properties: group: description: |- Group of the issuer being referred to. Defaults to 'cert-manager.io'. type: string kind: description: |- Kind of the issuer being referred to. Defaults to 'Issuer'. type: string name: description: Name of the issuer being referred to. type: string required: - name type: object key: description: |- The ACME challenge key for this challenge For HTTP01 challenges, this is the value that must be responded with to complete the HTTP01 challenge in the format: `.`. For DNS01 challenges, this is the base64 encoded SHA256 sum of the `.` text that must be set as the TXT record content. type: string solver: description: |- Contains the domain solving configuration that should be used to solve this challenge resource. properties: dns01: description: |- Configures cert-manager to attempt to complete authorizations by performing the DNS01 challenge flow. properties: acmeDNS: description: |- Use the 'ACME DNS' (https://github.com/joohoi/acme-dns) API to manage DNS01 challenge records. properties: accountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object host: type: string required: - accountSecretRef - host type: object akamai: description: Use the Akamai DNS zone management API to manage DNS01 challenge records. properties: accessTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientSecretSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object serviceConsumerDomain: type: string required: - accessTokenSecretRef - clientSecretSecretRef - clientTokenSecretRef - serviceConsumerDomain type: object azureDNS: description: Use the Microsoft Azure DNS API to manage DNS01 challenge records. properties: clientID: description: |- Auth: Azure Service Principal: The ClientID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientSecret and TenantID must also be set. type: string clientSecretSecretRef: description: |- Auth: Azure Service Principal: A reference to a Secret containing the password associated with the Service Principal. If set, ClientID and TenantID must also be set. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object environment: description: name of the Azure environment (default AzurePublicCloud) enum: - AzurePublicCloud - AzureChinaCloud - AzureGermanCloud - AzureUSGovernmentCloud type: string hostedZoneName: description: name of the DNS zone that should be used type: string managedIdentity: description: |- Auth: Azure Workload Identity or Azure Managed Service Identity: Settings to enable Azure Workload Identity or Azure Managed Service Identity If set, ClientID, ClientSecret and TenantID must not be set. properties: clientID: description: client ID of the managed identity, cannot be used at the same time as resourceID type: string resourceID: description: |- resource ID of the managed identity, cannot be used at the same time as clientID Cannot be used for Azure Managed Service Identity type: string tenantID: description: tenant ID of the managed identity, cannot be used at the same time as resourceID type: string type: object resourceGroupName: description: resource group the DNS zone is located in type: string subscriptionID: description: ID of the Azure subscription type: string tenantID: description: |- Auth: Azure Service Principal: The TenantID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientID and ClientSecret must also be set. type: string required: - resourceGroupName - subscriptionID type: object cloudDNS: description: Use the Google Cloud DNS API to manage DNS01 challenge records. properties: hostedZoneName: description: |- HostedZoneName is an optional field that tells cert-manager in which Cloud DNS zone the challenge record has to be created. If left empty cert-manager will automatically choose a zone. type: string project: type: string serviceAccountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - project type: object cloudflare: description: Use the Cloudflare API to manage DNS01 challenge records. properties: apiKeySecretRef: description: |- API key to use to authenticate with Cloudflare. Note: using an API token to authenticate is now the recommended method as it allows greater control of permissions. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object apiTokenSecretRef: description: API token used to authenticate with Cloudflare. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object email: description: Email of the account, only required when using API key based authentication. type: string type: object cnameStrategy: description: |- CNAMEStrategy configures how the DNS01 provider should handle CNAME records when found in DNS zones. enum: - None - Follow type: string digitalocean: description: Use the DigitalOcean DNS API to manage DNS01 challenge records. properties: tokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - tokenSecretRef type: object rfc2136: description: |- Use RFC2136 ("Dynamic Updates in the Domain Name System") (https://datatracker.ietf.org/doc/rfc2136/) to manage DNS01 challenge records. properties: nameserver: description: |- The IP address or hostname of an authoritative DNS server supporting RFC2136 in the form host:port. If the host is an IPv6 address it must be enclosed in square brackets (e.g [2001:db8::1]) ; port is optional. This field is required. type: string protocol: description: Protocol to use for dynamic DNS update queries. Valid values are (case-sensitive) ``TCP`` and ``UDP``; ``UDP`` (default). enum: - TCP - UDP type: string tsigAlgorithm: description: |- The TSIG Algorithm configured in the DNS supporting RFC2136. Used only when ``tsigSecretSecretRef`` and ``tsigKeyName`` are defined. Supported values are (case-insensitive): ``HMACMD5`` (default), ``HMACSHA1``, ``HMACSHA256`` or ``HMACSHA512``. type: string tsigKeyName: description: |- The TSIG Key name configured in the DNS. If ``tsigSecretSecretRef`` is defined, this field is required. type: string tsigSecretSecretRef: description: |- The name of the secret containing the TSIG value. If ``tsigKeyName`` is defined, this field is required. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - nameserver type: object route53: description: Use the AWS Route53 API to manage DNS01 challenge records. properties: accessKeyID: description: |- The AccessKeyID is used for authentication. Cannot be set when SecretAccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials type: string accessKeyIDSecretRef: description: |- The SecretAccessKey is used for authentication. If set, pull the AWS access key ID from a key within a Kubernetes Secret. Cannot be set when AccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object auth: description: Auth configures how cert-manager authenticates. properties: kubernetes: description: |- Kubernetes authenticates with Route53 using AssumeRoleWithWebIdentity by passing a bound ServiceAccount token. properties: serviceAccountRef: description: |- A reference to a service account that will be used to request a bound token (also known as "projected token"). To use this field, you must configure an RBAC rule to let cert-manager request a token. properties: audiences: description: |- TokenAudiences is an optional list of audiences to include in the token passed to AWS. The default token consisting of the issuer's namespace and name is always included. If unset the audience defaults to `sts.amazonaws.com`. items: type: string type: array x-kubernetes-list-type: atomic name: description: Name of the ServiceAccount used to request a token. type: string required: - name type: object required: - serviceAccountRef type: object required: - kubernetes type: object hostedZoneID: description: If set, the provider will manage only this zone in Route53 and will not do a lookup using the route53:ListHostedZonesByName api call. type: string region: description: |- Override the AWS region. Route53 is a global service and does not have regional endpoints but the region specified here (or via environment variables) is used as a hint to help compute the correct AWS credential scope and partition when it connects to Route53. See: - [Amazon Route 53 endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/r53.html) - [Global services](https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/global-services.html) If you omit this region field, cert-manager will use the region from AWS_REGION and AWS_DEFAULT_REGION environment variables, if they are set in the cert-manager controller Pod. The `region` field is not needed if you use [IAM Roles for Service Accounts (IRSA)](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Webhook](https://github.com/aws/amazon-eks-pod-identity-webhook). In this case this `region` field value is ignored. The `region` field is not needed if you use [EKS Pod Identities](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Agent](https://github.com/aws/eks-pod-identity-agent), In this case this `region` field value is ignored. type: string role: description: |- Role is a Role ARN which the Route53 provider will assume using either the explicit credentials AccessKeyID/SecretAccessKey or the inferred credentials from environment variables, shared credentials file or AWS Instance metadata type: string secretAccessKeySecretRef: description: |- The SecretAccessKey is used for authentication. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object type: object webhook: description: |- Configure an external webhook based DNS01 challenge solver to manage DNS01 challenge records. properties: config: description: |- Additional configuration that should be passed to the webhook apiserver when challenges are processed. This can contain arbitrary JSON data. Secret values should not be specified in this stanza. If secret values are needed (e.g., credentials for a DNS service), you should use a SecretKeySelector to reference a Secret resource. For details on the schema of this field, consult the webhook provider implementation's documentation. x-kubernetes-preserve-unknown-fields: true groupName: description: |- The API group name that should be used when POSTing ChallengePayload resources to the webhook apiserver. This should be the same as the GroupName specified in the webhook provider implementation. type: string solverName: description: |- The name of the solver to use, as defined in the webhook provider implementation. This will typically be the name of the provider, e.g., 'cloudflare'. type: string required: - groupName - solverName type: object type: object http01: description: |- Configures cert-manager to attempt to complete authorizations by performing the HTTP01 challenge flow. It is not possible to obtain certificates for wildcard domain names (e.g., `*.example.com`) using the HTTP01 challenge mechanism. properties: gatewayHTTPRoute: description: |- The Gateway API is a sig-network community API that models service networking in Kubernetes (https://gateway-api.sigs.k8s.io/). The Gateway solver will create HTTPRoutes with the specified labels in the same namespace as the challenge. This solver is experimental, and fields / behaviour may change in the future. properties: labels: additionalProperties: type: string description: |- Custom labels that will be applied to HTTPRoutes created by cert-manager while solving HTTP-01 challenges. type: object parentRefs: description: |- When solving an HTTP-01 challenge, cert-manager creates an HTTPRoute. cert-manager needs to know which parentRefs should be used when creating the HTTPRoute. Usually, the parentRef references a Gateway. See: https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways items: description: |- ParentReference identifies an API object (usually a Gateway) that can be considered a parent of this resource (usually a route). There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) This API may be extended in the future to support additional kinds of parent resources. The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid. properties: group: default: gateway.networking.k8s.io description: |- Group is the group of the referent. When unspecified, "gateway.networking.k8s.io" is inferred. To set the core API group (such as for a "Service" kind referent), Group must be explicitly set to "" (empty string). Support: Core maxLength: 253 pattern: ^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string kind: default: Gateway description: |- Kind is kind of the referent. There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) Support for other resources is Implementation-Specific. maxLength: 63 minLength: 1 pattern: ^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$ type: string name: description: |- Name is the name of the referent. Support: Core maxLength: 253 minLength: 1 type: string namespace: description: |- Namespace is the namespace of the referent. When unspecified, this refers to the local namespace of the Route. Note that there are specific rules for ParentRefs which cross namespace boundaries. Cross-namespace references are only valid if they are explicitly allowed by something in the namespace they are referring to. For example: Gateway has the AllowedRoutes field, and ReferenceGrant provides a generic way to enable any other kind of cross-namespace reference. ParentRefs from a Route to a Service in the same namespace are "producer" routes, which apply default routing rules to inbound connections from any namespace to the Service. ParentRefs from a Route to a Service in a different namespace are "consumer" routes, and these routing rules are only applied to outbound connections originating from the same namespace as the Route, for which the intended destination of the connections are a Service targeted as a ParentRef of the Route. Support: Core maxLength: 63 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ type: string port: description: |- Port is the network port this Route targets. It can be interpreted differently based on the type of parent resource. When the parent resource is a Gateway, this targets all listeners listening on the specified port that also support this kind of Route(and select this Route). It's not recommended to set `Port` unless the networking behaviors specified in a Route must apply to a specific port as opposed to a listener(s) whose port(s) may be changed. When both Port and SectionName are specified, the name and port of the selected listener must match both specified values. When the parent resource is a Service, this targets a specific port in the Service spec. When both Port (experimental) and SectionName are specified, the name and port of the selected port must match both specified values. Implementations MAY choose to support other parent resources. Implementations supporting other types of parent resources MUST clearly document how/if Port is interpreted. For the purpose of status, an attachment is considered successful as long as the parent resource accepts it partially. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Extended format: int32 maximum: 65535 minimum: 1 type: integer sectionName: description: |- SectionName is the name of a section within the target resource. In the following resources, SectionName is interpreted as the following: * Gateway: Listener name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. * Service: Port name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. Implementations MAY choose to support attaching Routes to other resources. If that is the case, they MUST clearly document how SectionName is interpreted. When unspecified (empty string), this will reference the entire resource. For the purpose of status, an attachment is considered successful if at least one section in the parent resource accepts it. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Core maxLength: 253 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string required: - name type: object type: array x-kubernetes-list-type: atomic podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object ingress: description: |- The ingress based HTTP01 challenge solver will solve challenges by creating or modifying Ingress resources in order to route requests for '/.well-known/acme-challenge/XYZ' to 'challenge solver' pods that are provisioned by cert-manager for each Challenge to be completed. properties: class: description: |- This field configures the annotation `kubernetes.io/ingress.class` when creating Ingress resources to solve ACME challenges that use this challenge solver. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressClassName: description: |- This field configures the field `ingressClassName` on the created Ingress resources used to solve ACME challenges that use this challenge solver. This is the recommended way of configuring the ingress class. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressTemplate: description: |- Optional ingress template used to configure the ACME challenge solver ingress used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the ingress used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver ingress. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver ingress. type: object type: object type: object name: description: |- The name of the ingress resource that should have ACME challenge solving routes inserted into it in order to solve HTTP01 challenges. This is typically used in conjunction with ingress controllers like ingress-gce, which maintains a 1:1 mapping between external IPs and ingress resources. Only one of `class`, `name` or `ingressClassName` may be specified. type: string podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object type: object selector: description: |- Selector selects a set of DNSNames on the Certificate resource that should be solved using this challenge solver. If not specified, the solver will be treated as the 'default' solver with the lowest priority, i.e. if any other solver has a more specific match, it will be used instead. properties: dnsNames: description: |- List of DNSNames that this solver will be used to solve. If specified and a match is found, a dnsNames selector will take precedence over a dnsZones selector. If multiple solvers match with the same dnsNames value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic dnsZones: description: |- List of DNSZones that this solver will be used to solve. The most specific DNS zone match specified here will take precedence over other DNS zone matches, so a solver specifying sys.example.com will be selected over one specifying example.com for the domain www.sys.example.com. If multiple solvers match with the same dnsZones value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- A label selector that is used to refine the set of certificate's that this challenge solver will apply to. type: object type: object type: object token: description: |- The ACME challenge token for this challenge. This is the raw value returned from the ACME server. type: string type: description: |- The type of ACME challenge this resource represents. One of "HTTP-01" or "DNS-01". enum: - HTTP-01 - DNS-01 type: string url: description: |- The URL of the ACME Challenge resource for this challenge. This can be used to lookup details about the status of this challenge. type: string wildcard: description: |- wildcard will be true if this challenge is for a wildcard identifier, for example '*.example.com'. type: boolean required: - authorizationURL - dnsName - issuerRef - key - solver - token - type - url type: object status: properties: presented: description: |- presented will be set to true if the challenge values for this challenge are currently 'presented'. This *does not* imply the self check is passing. Only that the values have been 'submitted' for the appropriate challenge mechanism (i.e. the DNS01 TXT record has been presented, or the HTTP01 configuration has been configured). type: boolean processing: description: |- Used to denote whether this challenge should be processed or not. This field will only be set to true by the 'scheduling' component. It will only be set to false by the 'challenges' controller, after the challenge has reached a final state or timed out. If this field is set to false, the challenge controller will not take any more action. type: boolean reason: description: |- Contains human readable information on why the Challenge is in the current state. type: string state: description: |- Contains the current 'state' of the challenge. If not set, the state of the challenge is unknown. enum: - valid - ready - pending - processing - invalid - expired - errored type: string type: object required: - metadata - spec type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/crd-acme.cert-manager.io_orders.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "orders.acme.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: acme.cert-manager.io names: categories: - cert-manager - cert-manager-acme kind: Order listKind: OrderList plural: orders singular: order scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: .status.state name: State type: string - jsonPath: .spec.issuerRef.name name: Issuer priority: 1 type: string - jsonPath: .status.reason name: Reason priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: Order is a type to represent an Order with an ACME server properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: properties: commonName: description: |- CommonName is the common name as specified on the DER encoded CSR. If specified, this value must also be present in `dnsNames` or `ipAddresses`. This field must match the corresponding field on the DER encoded CSR. type: string dnsNames: description: |- DNSNames is a list of DNS names that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR. items: type: string type: array x-kubernetes-list-type: atomic duration: description: |- Duration is the duration for the not after date for the requested certificate. this is set on order creation as pe the ACME spec. type: string ipAddresses: description: |- IPAddresses is a list of IP addresses that should be included as part of the Order validation process. This field must match the corresponding field on the DER encoded CSR. items: type: string type: array x-kubernetes-list-type: atomic issuerRef: description: |- IssuerRef references a properly configured ACME-type Issuer which should be used to create this Order. If the Issuer does not exist, processing will be retried. If the Issuer is not an 'ACME' Issuer, an error will be returned and the Order will be marked as failed. properties: group: description: |- Group of the issuer being referred to. Defaults to 'cert-manager.io'. type: string kind: description: |- Kind of the issuer being referred to. Defaults to 'Issuer'. type: string name: description: Name of the issuer being referred to. type: string required: - name type: object profile: description: |- Profile allows requesting a certificate profile from the ACME server. Supported profiles are listed by the server's ACME directory URL. type: string request: description: |- Certificate signing request bytes in DER encoding. This will be used when finalizing the order. This field must be set on the order. format: byte type: string required: - issuerRef - request type: object status: properties: authorizations: description: |- Authorizations contains data returned from the ACME server on what authorizations must be completed in order to validate the DNS names specified on the Order. items: description: |- ACMEAuthorization contains data returned from the ACME server on an authorization that must be completed in order validate a DNS name on an ACME Order resource. properties: challenges: description: |- Challenges specifies the challenge types offered by the ACME server. One of these challenge types will be selected when validating the DNS name and an appropriate Challenge resource will be created to perform the ACME challenge process. items: description: |- Challenge specifies a challenge offered by the ACME server for an Order. An appropriate Challenge resource can be created to perform the ACME challenge process. properties: token: description: |- Token is the token that must be presented for this challenge. This is used to compute the 'key' that must also be presented. type: string type: description: |- Type is the type of challenge being offered, e.g., 'http-01', 'dns-01', 'tls-sni-01', etc. This is the raw value retrieved from the ACME server. Only 'http-01' and 'dns-01' are supported by cert-manager, other values will be ignored. type: string url: description: |- URL is the URL of this challenge. It can be used to retrieve additional metadata about the Challenge from the ACME server. type: string required: - token - type - url type: object type: array x-kubernetes-list-type: atomic identifier: description: Identifier is the DNS name to be validated as part of this authorization type: string initialState: description: |- InitialState is the initial state of the ACME authorization when first fetched from the ACME server. If an Authorization is already 'valid', the Order controller will not create a Challenge resource for the authorization. This will occur when working with an ACME server that enables 'authz reuse' (such as Let's Encrypt's production endpoint). If not set and 'identifier' is set, the state is assumed to be pending and a Challenge will be created. enum: - valid - ready - pending - processing - invalid - expired - errored type: string url: description: URL is the URL of the Authorization that must be completed type: string wildcard: description: |- Wildcard will be true if this authorization is for a wildcard DNS name. If this is true, the identifier will be the *non-wildcard* version of the DNS name. For example, if '*.example.com' is the DNS name being validated, this field will be 'true' and the 'identifier' field will be 'example.com'. type: boolean required: - url type: object type: array x-kubernetes-list-type: atomic certificate: description: |- Certificate is a copy of the PEM encoded certificate for this Order. This field will be populated after the order has been successfully finalized with the ACME server, and the order has transitioned to the 'valid' state. format: byte type: string failureTime: description: |- FailureTime stores the time that this order failed. This is used to influence garbage collection and back-off. format: date-time type: string finalizeURL: description: |- FinalizeURL of the Order. This is used to obtain certificates for this order once it has been completed. type: string reason: description: |- Reason optionally provides more information about a why the order is in the current state. type: string state: description: |- State contains the current state of this Order resource. States 'success' and 'expired' are 'final' enum: - valid - ready - pending - processing - invalid - expired - errored type: string url: description: |- URL of the Order. This will initially be empty when the resource is first created. The Order controller will populate this field when the Order is first processed. This field will be immutable after it is initially set. type: string type: object required: - metadata - spec type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/crd-cert-manager.io_certificaterequests.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "certificaterequests.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: cert-manager.io names: categories: - cert-manager kind: CertificateRequest listKind: CertificateRequestList plural: certificaterequests shortNames: - cr - crs singular: certificaterequest scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: .status.conditions[?(@.type == "Approved")].status name: Approved type: string - jsonPath: .status.conditions[?(@.type == "Denied")].status name: Denied type: string - jsonPath: .status.conditions[?(@.type == "Ready")].status name: Ready type: string - jsonPath: .spec.issuerRef.name name: Issuer type: string - jsonPath: .spec.username name: Requester type: string - jsonPath: .status.conditions[?(@.type == "Ready")].message name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: |- A CertificateRequest is used to request a signed certificate from one of the configured issuers. All fields within the CertificateRequest's `spec` are immutable after creation. A CertificateRequest will either succeed or fail, as denoted by its `Ready` status condition and its `status.failureTime` field. A CertificateRequest is a one-shot resource, meaning it represents a single point in time request for a certificate and cannot be re-used. properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: description: |- Specification of the desired state of the CertificateRequest resource. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status properties: duration: description: |- Requested 'duration' (i.e. lifetime) of the Certificate. Note that the issuer may choose to ignore the requested duration, just like any other requested attribute. type: string extra: additionalProperties: items: type: string type: array description: |- Extra contains extra attributes of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: object groups: description: |- Groups contains group membership of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: |- Requested basic constraints isCA value. Note that the issuer may choose to ignore the requested isCA value, just like any other requested attribute. NOTE: If the CSR in the `Request` field has a BasicConstraints extension, it must have the same isCA value as specified here. If true, this will automatically add the `cert sign` usage to the list of requested `usages`. type: boolean issuerRef: description: |- Reference to the issuer responsible for issuing the certificate. If the issuer is namespace-scoped, it must be in the same namespace as the Certificate. If the issuer is cluster-scoped, it can be used from any namespace. The `name` field of the reference must always be specified. properties: group: description: |- Group of the issuer being referred to. Defaults to 'cert-manager.io'. type: string kind: description: |- Kind of the issuer being referred to. Defaults to 'Issuer'. type: string name: description: Name of the issuer being referred to. type: string required: - name type: object request: description: |- The PEM-encoded X.509 certificate signing request to be submitted to the issuer for signing. If the CSR has a BasicConstraints extension, its isCA attribute must match the `isCA` value of this CertificateRequest. If the CSR has a KeyUsage extension, its key usages must match the key usages in the `usages` field of this CertificateRequest. If the CSR has a ExtKeyUsage extension, its extended key usages must match the extended key usages in the `usages` field of this CertificateRequest. format: byte type: string uid: description: |- UID contains the uid of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string usages: description: |- Requested key usages and extended key usages. NOTE: If the CSR in the `Request` field has uses the KeyUsage or ExtKeyUsage extension, these extensions must have the same values as specified here without any additional values. If unset, defaults to `digital signature` and `key encipherment`. items: description: |- KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array x-kubernetes-list-type: atomic username: description: |- Username contains the name of the user that created the CertificateRequest. Populated by the cert-manager webhook on creation and immutable. type: string required: - issuerRef - request type: object status: description: |- Status of the CertificateRequest. This is set and managed automatically. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status properties: ca: description: |- The PEM encoded X.509 certificate of the signer, also known as the CA (Certificate Authority). This is set on a best-effort basis by different issuers. If not set, the CA is assumed to be unknown/not available. format: byte type: string certificate: description: |- The PEM encoded X.509 certificate resulting from the certificate signing request. If not set, the CertificateRequest has either not been completed or has failed. More information on failure can be found by checking the `conditions` field. format: byte type: string conditions: description: |- List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready`, `InvalidRequest`, `Approved` and `Denied`. items: description: CertificateRequestCondition contains condition information for a CertificateRequest. properties: lastTransitionTime: description: |- LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: |- Message is a human readable description of the details of the last transition, complementing reason. type: string reason: description: |- Reason is a brief machine readable explanation for the condition's last transition. type: string status: description: Status of the condition, one of (`True`, `False`, `Unknown`). enum: - "True" - "False" - Unknown type: string type: description: |- Type of the condition, known values are (`Ready`, `InvalidRequest`, `Approved`, `Denied`). type: string required: - status - type type: object type: array x-kubernetes-list-map-keys: - type x-kubernetes-list-type: map failureTime: description: |- FailureTime stores the time that this CertificateRequest failed. This is used to influence garbage collection and back-off. format: date-time type: string type: object type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/crd-cert-manager.io_certificates.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "certificates.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: cert-manager.io names: categories: - cert-manager kind: Certificate listKind: CertificateList plural: certificates shortNames: - cert - certs singular: certificate scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: .status.conditions[?(@.type == "Ready")].status name: Ready type: string - jsonPath: .spec.secretName name: Secret type: string - jsonPath: .spec.issuerRef.name name: Issuer priority: 1 type: string - jsonPath: .status.conditions[?(@.type == "Ready")].message name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: |- A Certificate resource should be created to ensure an up to date and signed X.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`. The stored certificate will be renewed before it expires (as configured by `spec.renewBefore`). properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: description: |- Specification of the desired state of the Certificate resource. https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status properties: additionalOutputFormats: description: |- Defines extra output formats of the private key and signed certificate chain to be written to this Certificate's target Secret. items: description: |- CertificateAdditionalOutputFormat defines an additional output format of a Certificate resource. These contain supplementary data formats of the signed certificate chain and paired private key. properties: type: description: |- Type is the name of the format type that should be written to the Certificate's target Secret. enum: - DER - CombinedPEM type: string required: - type type: object type: array x-kubernetes-list-type: atomic commonName: description: |- Requested common name X509 certificate subject attribute. More info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6 NOTE: TLS clients will ignore this value when any subject alternative name is set (see https://tools.ietf.org/html/rfc6125#section-6.4.4). Should have a length of 64 characters or fewer to avoid generating invalid CSRs. Cannot be set if the `literalSubject` field is set. type: string dnsNames: description: Requested DNS subject alternative names. items: type: string type: array x-kubernetes-list-type: atomic duration: description: |- Requested 'duration' (i.e. lifetime) of the Certificate. Note that the issuer may choose to ignore the requested duration, just like any other requested attribute. If unset, this defaults to 90 days. Minimum accepted duration is 1 hour. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration. type: string emailAddresses: description: Requested email subject alternative names. items: type: string type: array x-kubernetes-list-type: atomic encodeUsagesInRequest: description: |- Whether the KeyUsage and ExtKeyUsage extensions should be set in the encoded CSR. This option defaults to true, and should only be disabled if the target issuer does not support CSRs with these X509 KeyUsage/ ExtKeyUsage extensions. type: boolean ipAddresses: description: Requested IP address subject alternative names. items: type: string type: array x-kubernetes-list-type: atomic isCA: description: |- Requested basic constraints isCA value. The isCA value is used to set the `isCA` field on the created CertificateRequest resources. Note that the issuer may choose to ignore the requested isCA value, just like any other requested attribute. If true, this will automatically add the `cert sign` usage to the list of requested `usages`. type: boolean issuerRef: description: |- Reference to the issuer responsible for issuing the certificate. If the issuer is namespace-scoped, it must be in the same namespace as the Certificate. If the issuer is cluster-scoped, it can be used from any namespace. The `name` field of the reference must always be specified. properties: group: description: |- Group of the issuer being referred to. Defaults to 'cert-manager.io'. type: string kind: description: |- Kind of the issuer being referred to. Defaults to 'Issuer'. type: string name: description: Name of the issuer being referred to. type: string required: - name type: object keystores: description: Additional keystore output formats to be stored in the Certificate's Secret. properties: jks: description: |- JKS configures options for storing a JKS keystore in the `spec.secretName` Secret resource. properties: alias: description: |- Alias specifies the alias of the key in the keystore, required by the JKS format. If not provided, the default alias `certificate` will be used. type: string create: description: |- Create enables JKS keystore creation for the Certificate. If true, a file named `keystore.jks` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` or `password`. The keystore file will be updated immediately. If the issuer provided a CA certificate, a file named `truststore.jks` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority type: boolean password: description: |- Password provides a literal password used to encrypt the JKS keystore. Mutually exclusive with passwordSecretRef. One of password or passwordSecretRef must provide a password with a non-zero length. type: string passwordSecretRef: description: |- PasswordSecretRef is a reference to a non-empty key in a Secret resource containing the password used to encrypt the JKS keystore. Mutually exclusive with password. One of password or passwordSecretRef must provide a password with a non-zero length. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - create type: object pkcs12: description: |- PKCS12 configures options for storing a PKCS12 keystore in the `spec.secretName` Secret resource. properties: create: description: |- Create enables PKCS12 keystore creation for the Certificate. If true, a file named `keystore.p12` will be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` or in `password`. The keystore file will be updated immediately. If the issuer provided a CA certificate, a file named `truststore.p12` will also be created in the target Secret resource, encrypted using the password stored in `passwordSecretRef` containing the issuing Certificate Authority type: boolean password: description: |- Password provides a literal password used to encrypt the PKCS#12 keystore. Mutually exclusive with passwordSecretRef. One of password or passwordSecretRef must provide a password with a non-zero length. type: string passwordSecretRef: description: |- PasswordSecretRef is a reference to a non-empty key in a Secret resource containing the password used to encrypt the PKCS#12 keystore. Mutually exclusive with password. One of password or passwordSecretRef must provide a password with a non-zero length. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object profile: description: |- Profile specifies the key and certificate encryption algorithms and the HMAC algorithm used to create the PKCS12 keystore. Default value is `LegacyRC2` for backward compatibility. If provided, allowed values are: `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20. `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility. `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms (e.g., because of company policy). Please note that the security of the algorithm is not that important in reality, because the unencrypted certificate and private key are also stored in the Secret. enum: - LegacyRC2 - LegacyDES - Modern2023 type: string required: - create type: object type: object literalSubject: description: |- Requested X.509 certificate subject, represented using the LDAP "String Representation of a Distinguished Name" [1]. Important: the LDAP string format also specifies the order of the attributes in the subject, this is important when issuing certs for LDAP authentication. Example: `CN=foo,DC=corp,DC=example,DC=com` More info [1]: https://datatracker.ietf.org/doc/html/rfc4514 More info: https://github.com/cert-manager/cert-manager/issues/3203 More info: https://github.com/cert-manager/cert-manager/issues/4424 Cannot be set if the `subject` or `commonName` field is set. type: string nameConstraints: description: |- x.509 certificate NameConstraint extension which MUST NOT be used in a non-CA certificate. More Info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.10 This is an Alpha Feature and is only enabled with the `--feature-gates=NameConstraints=true` option set on both the controller and webhook components. properties: critical: description: if true then the name constraints are marked critical. type: boolean excluded: description: |- Excluded contains the constraints which must be disallowed. Any name matching a restriction in the excluded field is invalid regardless of information appearing in the permitted properties: dnsDomains: description: DNSDomains is a list of DNS domains that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic emailAddresses: description: EmailAddresses is a list of Email Addresses that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic ipRanges: description: |- IPRanges is a list of IP Ranges that are permitted or excluded. This should be a valid CIDR notation. items: type: string type: array x-kubernetes-list-type: atomic uriDomains: description: URIDomains is a list of URI domains that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic type: object permitted: description: Permitted contains the constraints in which the names must be located. properties: dnsDomains: description: DNSDomains is a list of DNS domains that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic emailAddresses: description: EmailAddresses is a list of Email Addresses that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic ipRanges: description: |- IPRanges is a list of IP Ranges that are permitted or excluded. This should be a valid CIDR notation. items: type: string type: array x-kubernetes-list-type: atomic uriDomains: description: URIDomains is a list of URI domains that are permitted or excluded. items: type: string type: array x-kubernetes-list-type: atomic type: object type: object otherNames: description: |- `otherNames` is an escape hatch for SAN that allows any type. We currently restrict the support to string like otherNames, cf RFC 5280 p 37 Any UTF8 String valued otherName can be passed with by setting the keys oid: x.x.x.x and UTF8Value: somevalue for `otherName`. Most commonly this would be UPN set with oid: 1.3.6.1.4.1.311.20.2.3 You should ensure that any OID passed is valid for the UTF8String type as we do not explicitly validate this. items: properties: oid: description: |- OID is the object identifier for the otherName SAN. The object identifier must be expressed as a dotted string, for example, "1.2.840.113556.1.4.221". type: string utf8Value: description: |- utf8Value is the string value of the otherName SAN. The utf8Value accepts any valid UTF8 string to set as value for the otherName SAN. type: string type: object type: array x-kubernetes-list-type: atomic privateKey: description: |- Private key options. These include the key algorithm and size, the used encoding and the rotation policy. properties: algorithm: description: |- Algorithm is the private key algorithm of the corresponding private key for this certificate. If provided, allowed values are either `RSA`, `ECDSA` or `Ed25519`. If `algorithm` is specified and `size` is not provided, key size of 2048 will be used for `RSA` key algorithm and key size of 256 will be used for `ECDSA` key algorithm. key size is ignored when using the `Ed25519` key algorithm. enum: - RSA - ECDSA - Ed25519 type: string encoding: description: |- The private key cryptography standards (PKCS) encoding for this certificate's private key to be encoded in. If provided, allowed values are `PKCS1` and `PKCS8` standing for PKCS#1 and PKCS#8, respectively. Defaults to `PKCS1` if not specified. enum: - PKCS1 - PKCS8 type: string rotationPolicy: description: |- RotationPolicy controls how private keys should be regenerated when a re-issuance is being processed. If set to `Never`, a private key will only be generated if one does not already exist in the target `spec.secretName`. If one does exist but it does not have the correct algorithm or size, a warning will be raised to await user intervention. If set to `Always`, a private key matching the specified requirements will be generated whenever a re-issuance occurs. Default is `Always`. The default was changed from `Never` to `Always` in cert-manager >=v1.18.0. The new default can be disabled by setting the `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on the controller component. enum: - Never - Always type: string size: description: |- Size is the key bit size of the corresponding private key for this certificate. If `algorithm` is set to `RSA`, valid values are `2048`, `4096` or `8192`, and will default to `2048` if not specified. If `algorithm` is set to `ECDSA`, valid values are `256`, `384` or `521`, and will default to `256` if not specified. If `algorithm` is set to `Ed25519`, Size is ignored. No other values are allowed. type: integer type: object renewBefore: description: |- How long before the currently issued certificate's expiry cert-manager should renew the certificate. For example, if a certificate is valid for 60 minutes, and `renewBefore=10m`, cert-manager will begin to attempt to renew the certificate 50 minutes after it was issued (i.e. when there are 10 minutes remaining until the certificate is no longer valid). NOTE: The actual lifetime of the issued certificate is used to determine the renewal time. If an issuer returns a certificate with a different lifetime than the one requested, cert-manager will use the lifetime of the issued certificate. If unset, this defaults to 1/3 of the issued certificate's lifetime. Minimum accepted value is 5 minutes. Value must be in units accepted by Go time.ParseDuration https://golang.org/pkg/time/#ParseDuration. Cannot be set if the `renewBeforePercentage` field is set. type: string renewBeforePercentage: description: |- `renewBeforePercentage` is like `renewBefore`, except it is a relative percentage rather than an absolute duration. For example, if a certificate is valid for 60 minutes, and `renewBeforePercentage=25`, cert-manager will begin to attempt to renew the certificate 45 minutes after it was issued (i.e. when there are 15 minutes (25%) remaining until the certificate is no longer valid). NOTE: The actual lifetime of the issued certificate is used to determine the renewal time. If an issuer returns a certificate with a different lifetime than the one requested, cert-manager will use the lifetime of the issued certificate. Value must be an integer in the range (0,100). The minimum effective `renewBefore` derived from the `renewBeforePercentage` and `duration` fields is 5 minutes. Cannot be set if the `renewBefore` field is set. format: int32 type: integer revisionHistoryLimit: description: |- The maximum number of CertificateRequest revisions that are maintained in the Certificate's history. Each revision represents a single `CertificateRequest` created by this Certificate, either when it was created, renewed, or Spec was changed. Revisions will be removed by oldest first if the number of revisions exceeds this number. If set, revisionHistoryLimit must be a value of `1` or greater. Default value is `1`. format: int32 type: integer secretName: description: |- Name of the Secret resource that will be automatically created and managed by this Certificate resource. It will be populated with a private key and certificate, signed by the denoted issuer. The Secret resource lives in the same namespace as the Certificate resource. type: string secretTemplate: description: |- Defines annotations and labels to be copied to the Certificate's Secret. Labels and annotations on the Secret will be changed as they appear on the SecretTemplate when added or removed. SecretTemplate annotations are added in conjunction with, and cannot overwrite, the base set of annotations cert-manager sets on the Certificate's Secret. properties: annotations: additionalProperties: type: string description: Annotations is a key value map to be copied to the target Kubernetes Secret. type: object labels: additionalProperties: type: string description: Labels is a key value map to be copied to the target Kubernetes Secret. type: object type: object signatureAlgorithm: description: |- Signature algorithm to use. Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA. Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512. Allowed values for Ed25519 keys: PureEd25519. enum: - SHA256WithRSA - SHA384WithRSA - SHA512WithRSA - ECDSAWithSHA256 - ECDSAWithSHA384 - ECDSAWithSHA512 - PureEd25519 type: string subject: description: |- Requested set of X509 certificate subject attributes. More info: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6 The common name attribute is specified separately in the `commonName` field. Cannot be set if the `literalSubject` field is set. properties: countries: description: Countries to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic localities: description: Cities to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic organizationalUnits: description: Organizational Units to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic organizations: description: Organizations to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic postalCodes: description: Postal codes to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic provinces: description: State/Provinces to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic serialNumber: description: Serial number to be used on the Certificate. type: string streetAddresses: description: Street addresses to be used on the Certificate. items: type: string type: array x-kubernetes-list-type: atomic type: object uris: description: Requested URI subject alternative names. items: type: string type: array x-kubernetes-list-type: atomic usages: description: |- Requested key usages and extended key usages. These usages are used to set the `usages` field on the created CertificateRequest resources. If `encodeUsagesInRequest` is unset or set to `true`, the usages will additionally be encoded in the `request` field which contains the CSR blob. If unset, defaults to `digital signature` and `key encipherment`. items: description: |- KeyUsage specifies valid usage contexts for keys. See: https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12 Valid KeyUsage values are as follows: "signing", "digital signature", "content commitment", "key encipherment", "key agreement", "data encipherment", "cert sign", "crl sign", "encipher only", "decipher only", "any", "server auth", "client auth", "code signing", "email protection", "s/mime", "ipsec end system", "ipsec tunnel", "ipsec user", "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc" enum: - signing - digital signature - content commitment - key encipherment - key agreement - data encipherment - cert sign - crl sign - encipher only - decipher only - any - server auth - client auth - code signing - email protection - s/mime - ipsec end system - ipsec tunnel - ipsec user - timestamping - ocsp signing - microsoft sgc - netscape sgc type: string type: array x-kubernetes-list-type: atomic required: - issuerRef - secretName type: object status: description: |- Status of the Certificate. This is set and managed automatically. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-status properties: conditions: description: |- List of status conditions to indicate the status of certificates. Known condition types are `Ready` and `Issuing`. items: description: CertificateCondition contains condition information for a Certificate. properties: lastTransitionTime: description: |- LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: |- Message is a human readable description of the details of the last transition, complementing reason. type: string observedGeneration: description: |- If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Certificate. format: int64 type: integer reason: description: |- Reason is a brief machine readable explanation for the condition's last transition. type: string status: description: Status of the condition, one of (`True`, `False`, `Unknown`). enum: - "True" - "False" - Unknown type: string type: description: Type of the condition, known values are (`Ready`, `Issuing`). type: string required: - status - type type: object type: array x-kubernetes-list-map-keys: - type x-kubernetes-list-type: map failedIssuanceAttempts: description: |- The number of continuous failed issuance attempts up till now. This field gets removed (if set) on a successful issuance and gets set to 1 if unset and an issuance has failed. If an issuance has failed, the delay till the next issuance will be calculated using formula time.Hour * 2 ^ (failedIssuanceAttempts - 1). type: integer lastFailureTime: description: |- LastFailureTime is set only if the latest issuance for this Certificate failed and contains the time of the failure. If an issuance has failed, the delay till the next issuance will be calculated using formula time.Hour * 2 ^ (failedIssuanceAttempts - 1). If the latest issuance has succeeded this field will be unset. format: date-time type: string nextPrivateKeySecretName: description: |- The name of the Secret resource containing the private key to be used for the next certificate iteration. The keymanager controller will automatically set this field if the `Issuing` condition is set to `True`. It will automatically unset this field when the Issuing condition is not set or False. type: string notAfter: description: |- The expiration time of the certificate stored in the secret named by this resource in `spec.secretName`. format: date-time type: string notBefore: description: |- The time after which the certificate stored in the secret named by this resource in `spec.secretName` is valid. format: date-time type: string renewalTime: description: |- RenewalTime is the time at which the certificate will be next renewed. If not set, no upcoming renewal is scheduled. format: date-time type: string revision: description: |- The current 'revision' of the certificate as issued. When a CertificateRequest resource is created, it will have the `cert-manager.io/certificate-revision` set to one greater than the current value of this field. Upon issuance, this field will be set to the value of the annotation on the CertificateRequest resource used to issue the certificate. Persisting the value on the CertificateRequest resource allows the certificates controller to know whether a request is part of an old issuance or if it is part of the ongoing revision's issuance by checking if the revision value in the annotation is greater than this field. type: integer type: object type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/crd-cert-manager.io_clusterissuers.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "clusterissuers.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: cert-manager.io names: categories: - cert-manager kind: ClusterIssuer listKind: ClusterIssuerList plural: clusterissuers shortNames: - ciss singular: clusterissuer scope: Cluster versions: - additionalPrinterColumns: - jsonPath: .status.conditions[?(@.type == "Ready")].status name: Ready type: string - jsonPath: .status.conditions[?(@.type == "Ready")].message name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: |- A ClusterIssuer represents a certificate issuing authority which can be referenced as part of `issuerRef` fields. It is similar to an Issuer, however it is cluster-scoped and therefore can be referenced by resources that exist in *any* namespace, not just the same namespace as the referent. properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: description: Desired state of the ClusterIssuer resource. properties: acme: description: |- ACME configures this issuer to communicate with a RFC8555 (ACME) server to obtain signed x509 certificates. properties: caBundle: description: |- Base64-encoded bundle of PEM CAs which can be used to validate the certificate chain presented by the ACME server. Mutually exclusive with SkipTLSVerify; prefer using CABundle to prevent various kinds of security vulnerabilities. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. format: byte type: string disableAccountKeyGeneration: description: |- Enables or disables generating a new ACME account key. If true, the Issuer resource will *not* request a new account but will expect the account key to be supplied via an existing secret. If false, the cert-manager system will generate a new ACME account key for the Issuer. Defaults to false. type: boolean email: description: |- Email is the email address to be associated with the ACME account. This field is optional, but it is strongly recommended to be set. It will be used to contact you in case of issues with your account or certificates, including expiry notification emails. This field may be updated after the account is initially registered. type: string enableDurationFeature: description: |- Enables requesting a Not After date on certificates that matches the duration of the certificate. This is not supported by all ACME servers like Let's Encrypt. If set to true when the ACME server does not support it, it will create an error on the Order. Defaults to false. type: boolean externalAccountBinding: description: |- ExternalAccountBinding is a reference to a CA external account of the ACME server. If set, upon registration cert-manager will attempt to associate the given external account credentials with the registered ACME account. properties: keyAlgorithm: description: |- Deprecated: keyAlgorithm field exists for historical compatibility reasons and should not be used. The algorithm is now hardcoded to HS256 in golang/x/crypto/acme. enum: - HS256 - HS384 - HS512 type: string keyID: description: keyID is the ID of the CA key that the External Account is bound to. type: string keySecretRef: description: |- keySecretRef is a Secret Key Selector referencing a data item in a Kubernetes Secret which holds the symmetric MAC key of the External Account Binding. The `key` is the index string that is paired with the key data in the Secret and should not be confused with the key data itself, or indeed with the External Account Binding keyID above. The secret key stored in the Secret **must** be un-padded, base64 URL encoded data. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - keyID - keySecretRef type: object preferredChain: description: |- PreferredChain is the chain to use if the ACME server outputs multiple. PreferredChain is no guarantee that this one gets delivered by the ACME endpoint. For example, for Let's Encrypt's DST cross-sign you would use: "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA. This value picks the first certificate bundle in the combined set of ACME default and alternative chains that has a root-most certificate with this value as its issuer's commonname. maxLength: 64 type: string privateKeySecretRef: description: |- PrivateKey is the name of a Kubernetes Secret resource that will be used to store the automatically generated ACME account private key. Optionally, a `key` may be specified to select a specific entry within the named Secret resource. If `key` is not specified, a default of `tls.key` will be used. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object profile: description: |- Profile allows requesting a certificate profile from the ACME server. Supported profiles are listed by the server's ACME directory URL. type: string server: description: |- Server is the URL used to access the ACME server's 'directory' endpoint. For example, for Let's Encrypt's staging endpoint, you would use: "https://acme-staging-v02.api.letsencrypt.org/directory". Only ACME v2 endpoints (i.e. RFC 8555) are supported. type: string skipTLSVerify: description: |- INSECURE: Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have the TLS certificate chain validated. Mutually exclusive with CABundle; prefer using CABundle to prevent various kinds of security vulnerabilities. Only enable this option in development environments. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. Defaults to false. type: boolean solvers: description: |- Solvers is a list of challenge solvers that will be used to solve ACME challenges for the matching domains. Solver configurations must be provided in order to obtain certificates from an ACME server. For more information, see: https://cert-manager.io/docs/configuration/acme/ items: description: |- An ACMEChallengeSolver describes how to solve ACME challenges for the issuer it is part of. A selector may be provided to use different solving strategies for different DNS names. Only one of HTTP01 or DNS01 must be provided. properties: dns01: description: |- Configures cert-manager to attempt to complete authorizations by performing the DNS01 challenge flow. properties: acmeDNS: description: |- Use the 'ACME DNS' (https://github.com/joohoi/acme-dns) API to manage DNS01 challenge records. properties: accountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object host: type: string required: - accountSecretRef - host type: object akamai: description: Use the Akamai DNS zone management API to manage DNS01 challenge records. properties: accessTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientSecretSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object serviceConsumerDomain: type: string required: - accessTokenSecretRef - clientSecretSecretRef - clientTokenSecretRef - serviceConsumerDomain type: object azureDNS: description: Use the Microsoft Azure DNS API to manage DNS01 challenge records. properties: clientID: description: |- Auth: Azure Service Principal: The ClientID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientSecret and TenantID must also be set. type: string clientSecretSecretRef: description: |- Auth: Azure Service Principal: A reference to a Secret containing the password associated with the Service Principal. If set, ClientID and TenantID must also be set. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object environment: description: name of the Azure environment (default AzurePublicCloud) enum: - AzurePublicCloud - AzureChinaCloud - AzureGermanCloud - AzureUSGovernmentCloud type: string hostedZoneName: description: name of the DNS zone that should be used type: string managedIdentity: description: |- Auth: Azure Workload Identity or Azure Managed Service Identity: Settings to enable Azure Workload Identity or Azure Managed Service Identity If set, ClientID, ClientSecret and TenantID must not be set. properties: clientID: description: client ID of the managed identity, cannot be used at the same time as resourceID type: string resourceID: description: |- resource ID of the managed identity, cannot be used at the same time as clientID Cannot be used for Azure Managed Service Identity type: string tenantID: description: tenant ID of the managed identity, cannot be used at the same time as resourceID type: string type: object resourceGroupName: description: resource group the DNS zone is located in type: string subscriptionID: description: ID of the Azure subscription type: string tenantID: description: |- Auth: Azure Service Principal: The TenantID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientID and ClientSecret must also be set. type: string required: - resourceGroupName - subscriptionID type: object cloudDNS: description: Use the Google Cloud DNS API to manage DNS01 challenge records. properties: hostedZoneName: description: |- HostedZoneName is an optional field that tells cert-manager in which Cloud DNS zone the challenge record has to be created. If left empty cert-manager will automatically choose a zone. type: string project: type: string serviceAccountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - project type: object cloudflare: description: Use the Cloudflare API to manage DNS01 challenge records. properties: apiKeySecretRef: description: |- API key to use to authenticate with Cloudflare. Note: using an API token to authenticate is now the recommended method as it allows greater control of permissions. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object apiTokenSecretRef: description: API token used to authenticate with Cloudflare. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object email: description: Email of the account, only required when using API key based authentication. type: string type: object cnameStrategy: description: |- CNAMEStrategy configures how the DNS01 provider should handle CNAME records when found in DNS zones. enum: - None - Follow type: string digitalocean: description: Use the DigitalOcean DNS API to manage DNS01 challenge records. properties: tokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - tokenSecretRef type: object rfc2136: description: |- Use RFC2136 ("Dynamic Updates in the Domain Name System") (https://datatracker.ietf.org/doc/rfc2136/) to manage DNS01 challenge records. properties: nameserver: description: |- The IP address or hostname of an authoritative DNS server supporting RFC2136 in the form host:port. If the host is an IPv6 address it must be enclosed in square brackets (e.g [2001:db8::1]) ; port is optional. This field is required. type: string protocol: description: Protocol to use for dynamic DNS update queries. Valid values are (case-sensitive) ``TCP`` and ``UDP``; ``UDP`` (default). enum: - TCP - UDP type: string tsigAlgorithm: description: |- The TSIG Algorithm configured in the DNS supporting RFC2136. Used only when ``tsigSecretSecretRef`` and ``tsigKeyName`` are defined. Supported values are (case-insensitive): ``HMACMD5`` (default), ``HMACSHA1``, ``HMACSHA256`` or ``HMACSHA512``. type: string tsigKeyName: description: |- The TSIG Key name configured in the DNS. If ``tsigSecretSecretRef`` is defined, this field is required. type: string tsigSecretSecretRef: description: |- The name of the secret containing the TSIG value. If ``tsigKeyName`` is defined, this field is required. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - nameserver type: object route53: description: Use the AWS Route53 API to manage DNS01 challenge records. properties: accessKeyID: description: |- The AccessKeyID is used for authentication. Cannot be set when SecretAccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials type: string accessKeyIDSecretRef: description: |- The SecretAccessKey is used for authentication. If set, pull the AWS access key ID from a key within a Kubernetes Secret. Cannot be set when AccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object auth: description: Auth configures how cert-manager authenticates. properties: kubernetes: description: |- Kubernetes authenticates with Route53 using AssumeRoleWithWebIdentity by passing a bound ServiceAccount token. properties: serviceAccountRef: description: |- A reference to a service account that will be used to request a bound token (also known as "projected token"). To use this field, you must configure an RBAC rule to let cert-manager request a token. properties: audiences: description: |- TokenAudiences is an optional list of audiences to include in the token passed to AWS. The default token consisting of the issuer's namespace and name is always included. If unset the audience defaults to `sts.amazonaws.com`. items: type: string type: array x-kubernetes-list-type: atomic name: description: Name of the ServiceAccount used to request a token. type: string required: - name type: object required: - serviceAccountRef type: object required: - kubernetes type: object hostedZoneID: description: If set, the provider will manage only this zone in Route53 and will not do a lookup using the route53:ListHostedZonesByName api call. type: string region: description: |- Override the AWS region. Route53 is a global service and does not have regional endpoints but the region specified here (or via environment variables) is used as a hint to help compute the correct AWS credential scope and partition when it connects to Route53. See: - [Amazon Route 53 endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/r53.html) - [Global services](https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/global-services.html) If you omit this region field, cert-manager will use the region from AWS_REGION and AWS_DEFAULT_REGION environment variables, if they are set in the cert-manager controller Pod. The `region` field is not needed if you use [IAM Roles for Service Accounts (IRSA)](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Webhook](https://github.com/aws/amazon-eks-pod-identity-webhook). In this case this `region` field value is ignored. The `region` field is not needed if you use [EKS Pod Identities](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Agent](https://github.com/aws/eks-pod-identity-agent), In this case this `region` field value is ignored. type: string role: description: |- Role is a Role ARN which the Route53 provider will assume using either the explicit credentials AccessKeyID/SecretAccessKey or the inferred credentials from environment variables, shared credentials file or AWS Instance metadata type: string secretAccessKeySecretRef: description: |- The SecretAccessKey is used for authentication. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object type: object webhook: description: |- Configure an external webhook based DNS01 challenge solver to manage DNS01 challenge records. properties: config: description: |- Additional configuration that should be passed to the webhook apiserver when challenges are processed. This can contain arbitrary JSON data. Secret values should not be specified in this stanza. If secret values are needed (e.g., credentials for a DNS service), you should use a SecretKeySelector to reference a Secret resource. For details on the schema of this field, consult the webhook provider implementation's documentation. x-kubernetes-preserve-unknown-fields: true groupName: description: |- The API group name that should be used when POSTing ChallengePayload resources to the webhook apiserver. This should be the same as the GroupName specified in the webhook provider implementation. type: string solverName: description: |- The name of the solver to use, as defined in the webhook provider implementation. This will typically be the name of the provider, e.g., 'cloudflare'. type: string required: - groupName - solverName type: object type: object http01: description: |- Configures cert-manager to attempt to complete authorizations by performing the HTTP01 challenge flow. It is not possible to obtain certificates for wildcard domain names (e.g., `*.example.com`) using the HTTP01 challenge mechanism. properties: gatewayHTTPRoute: description: |- The Gateway API is a sig-network community API that models service networking in Kubernetes (https://gateway-api.sigs.k8s.io/). The Gateway solver will create HTTPRoutes with the specified labels in the same namespace as the challenge. This solver is experimental, and fields / behaviour may change in the future. properties: labels: additionalProperties: type: string description: |- Custom labels that will be applied to HTTPRoutes created by cert-manager while solving HTTP-01 challenges. type: object parentRefs: description: |- When solving an HTTP-01 challenge, cert-manager creates an HTTPRoute. cert-manager needs to know which parentRefs should be used when creating the HTTPRoute. Usually, the parentRef references a Gateway. See: https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways items: description: |- ParentReference identifies an API object (usually a Gateway) that can be considered a parent of this resource (usually a route). There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) This API may be extended in the future to support additional kinds of parent resources. The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid. properties: group: default: gateway.networking.k8s.io description: |- Group is the group of the referent. When unspecified, "gateway.networking.k8s.io" is inferred. To set the core API group (such as for a "Service" kind referent), Group must be explicitly set to "" (empty string). Support: Core maxLength: 253 pattern: ^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string kind: default: Gateway description: |- Kind is kind of the referent. There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) Support for other resources is Implementation-Specific. maxLength: 63 minLength: 1 pattern: ^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$ type: string name: description: |- Name is the name of the referent. Support: Core maxLength: 253 minLength: 1 type: string namespace: description: |- Namespace is the namespace of the referent. When unspecified, this refers to the local namespace of the Route. Note that there are specific rules for ParentRefs which cross namespace boundaries. Cross-namespace references are only valid if they are explicitly allowed by something in the namespace they are referring to. For example: Gateway has the AllowedRoutes field, and ReferenceGrant provides a generic way to enable any other kind of cross-namespace reference. ParentRefs from a Route to a Service in the same namespace are "producer" routes, which apply default routing rules to inbound connections from any namespace to the Service. ParentRefs from a Route to a Service in a different namespace are "consumer" routes, and these routing rules are only applied to outbound connections originating from the same namespace as the Route, for which the intended destination of the connections are a Service targeted as a ParentRef of the Route. Support: Core maxLength: 63 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ type: string port: description: |- Port is the network port this Route targets. It can be interpreted differently based on the type of parent resource. When the parent resource is a Gateway, this targets all listeners listening on the specified port that also support this kind of Route(and select this Route). It's not recommended to set `Port` unless the networking behaviors specified in a Route must apply to a specific port as opposed to a listener(s) whose port(s) may be changed. When both Port and SectionName are specified, the name and port of the selected listener must match both specified values. When the parent resource is a Service, this targets a specific port in the Service spec. When both Port (experimental) and SectionName are specified, the name and port of the selected port must match both specified values. Implementations MAY choose to support other parent resources. Implementations supporting other types of parent resources MUST clearly document how/if Port is interpreted. For the purpose of status, an attachment is considered successful as long as the parent resource accepts it partially. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Extended format: int32 maximum: 65535 minimum: 1 type: integer sectionName: description: |- SectionName is the name of a section within the target resource. In the following resources, SectionName is interpreted as the following: * Gateway: Listener name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. * Service: Port name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. Implementations MAY choose to support attaching Routes to other resources. If that is the case, they MUST clearly document how SectionName is interpreted. When unspecified (empty string), this will reference the entire resource. For the purpose of status, an attachment is considered successful if at least one section in the parent resource accepts it. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Core maxLength: 253 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string required: - name type: object type: array x-kubernetes-list-type: atomic podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object ingress: description: |- The ingress based HTTP01 challenge solver will solve challenges by creating or modifying Ingress resources in order to route requests for '/.well-known/acme-challenge/XYZ' to 'challenge solver' pods that are provisioned by cert-manager for each Challenge to be completed. properties: class: description: |- This field configures the annotation `kubernetes.io/ingress.class` when creating Ingress resources to solve ACME challenges that use this challenge solver. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressClassName: description: |- This field configures the field `ingressClassName` on the created Ingress resources used to solve ACME challenges that use this challenge solver. This is the recommended way of configuring the ingress class. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressTemplate: description: |- Optional ingress template used to configure the ACME challenge solver ingress used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the ingress used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver ingress. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver ingress. type: object type: object type: object name: description: |- The name of the ingress resource that should have ACME challenge solving routes inserted into it in order to solve HTTP01 challenges. This is typically used in conjunction with ingress controllers like ingress-gce, which maintains a 1:1 mapping between external IPs and ingress resources. Only one of `class`, `name` or `ingressClassName` may be specified. type: string podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object type: object selector: description: |- Selector selects a set of DNSNames on the Certificate resource that should be solved using this challenge solver. If not specified, the solver will be treated as the 'default' solver with the lowest priority, i.e. if any other solver has a more specific match, it will be used instead. properties: dnsNames: description: |- List of DNSNames that this solver will be used to solve. If specified and a match is found, a dnsNames selector will take precedence over a dnsZones selector. If multiple solvers match with the same dnsNames value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic dnsZones: description: |- List of DNSZones that this solver will be used to solve. The most specific DNS zone match specified here will take precedence over other DNS zone matches, so a solver specifying sys.example.com will be selected over one specifying example.com for the domain www.sys.example.com. If multiple solvers match with the same dnsZones value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- A label selector that is used to refine the set of certificate's that this challenge solver will apply to. type: object type: object type: object type: array x-kubernetes-list-type: atomic required: - privateKeySecretRef - server type: object ca: description: |- CA configures this issuer to sign certificates using a signing CA keypair stored in a Secret resource. This is used to build internal PKIs that are managed by cert-manager. properties: crlDistributionPoints: description: |- The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set, certificates will be issued without distribution points set. items: type: string type: array x-kubernetes-list-type: atomic issuingCertificateURLs: description: |- IssuingCertificateURLs is a list of URLs which this issuer should embed into certificates it creates. See https://www.rfc-editor.org/rfc/rfc5280#section-4.2.2.1 for more details. As an example, such a URL might be "http://ca.domain.com/ca.crt". items: type: string type: array x-kubernetes-list-type: atomic ocspServers: description: |- The OCSP server list is an X.509 v3 extension that defines a list of URLs of OCSP responders. The OCSP responders can be queried for the revocation status of an issued certificate. If not set, the certificate will be issued with no OCSP servers set. For example, an OCSP server URL could be "http://ocsp.int-x3.letsencrypt.org". items: type: string type: array x-kubernetes-list-type: atomic secretName: description: |- SecretName is the name of the secret used to sign Certificates issued by this Issuer. type: string required: - secretName type: object selfSigned: description: |- SelfSigned configures this issuer to 'self sign' certificates using the private key used to create the CertificateRequest object. properties: crlDistributionPoints: description: |- The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set certificate will be issued without CDP. Values are strings. items: type: string type: array x-kubernetes-list-type: atomic type: object vault: description: |- Vault configures this issuer to sign certificates using a HashiCorp Vault PKI backend. properties: auth: description: Auth configures how cert-manager authenticates with the Vault server. properties: appRole: description: |- AppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource. properties: path: description: |- Path where the App Role authentication backend is mounted in Vault, e.g: "approle" type: string roleId: description: |- RoleID configured in the App Role authentication backend when setting up the authentication backend in Vault. type: string secretRef: description: |- Reference to a key in a Secret that contains the App Role secret used to authenticate with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - path - roleId - secretRef type: object clientCertificate: description: |- ClientCertificate authenticates with Vault by presenting a client certificate during the request's TLS handshake. Works only when using HTTPS protocol. properties: mountPath: description: |- The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/cert" will be used. type: string name: description: |- Name of the certificate role to authenticate against. If not set, matching any certificate role, if available. type: string secretName: description: |- Reference to Kubernetes Secret of type "kubernetes.io/tls" (hence containing tls.crt and tls.key) used to authenticate to Vault using TLS client authentication. type: string type: object kubernetes: description: |- Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server. properties: mountPath: description: |- The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/kubernetes" will be used. type: string role: description: |- A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies. type: string secretRef: description: |- The required Secret field containing a Kubernetes ServiceAccount JWT used for authenticating with Vault. Use of 'ambient credentials' is not supported. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object serviceAccountRef: description: |- A reference to a service account that will be used to request a bound token (also known as "projected token"). Compared to using "secretRef", using this field means that you don't rely on statically bound tokens. To use this field, you must configure an RBAC rule to let cert-manager request a token. properties: audiences: description: |- TokenAudiences is an optional list of extra audiences to include in the token passed to Vault. The default token consisting of the issuer's namespace and name is always included. items: type: string type: array x-kubernetes-list-type: atomic name: description: Name of the ServiceAccount used to request a token. type: string required: - name type: object required: - role type: object tokenSecretRef: description: TokenSecretRef authenticates with Vault by presenting a token. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object type: object caBundle: description: |- Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by Vault. Only used if using HTTPS to connect to Vault and ignored for HTTP connections. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. format: byte type: string caBundleSecretRef: description: |- Reference to a Secret containing a bundle of PEM-encoded CAs to use when verifying the certificate chain presented by Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to 'ca.crt'. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientCertSecretRef: description: |- Reference to a Secret containing a PEM-encoded Client Certificate to use when the Vault server requires mTLS. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientKeySecretRef: description: |- Reference to a Secret containing a PEM-encoded Client Private Key to use when the Vault server requires mTLS. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object namespace: description: |- Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: "ns1" More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces type: string path: description: |- Path is the mount path of the Vault PKI backend's `sign` endpoint, e.g: "my_pki_mount/sign/my-role-name". type: string server: description: 'Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".' type: string serverName: description: |- ServerName is used to verify the hostname on the returned certificates by the Vault server. type: string required: - auth - path - server type: object venafi: description: |- Venafi configures this issuer to sign certificates using a Venafi TPP or Venafi Cloud policy zone. properties: cloud: description: |- Cloud specifies the Venafi cloud configuration settings. Only one of TPP or Cloud may be specified. properties: apiTokenSecretRef: description: APITokenSecretRef is a secret key selector for the Venafi Cloud API token. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object url: description: |- URL is the base URL for Venafi Cloud. Defaults to "https://api.venafi.cloud/". type: string required: - apiTokenSecretRef type: object tpp: description: |- TPP specifies Trust Protection Platform configuration settings. Only one of TPP or Cloud may be specified. properties: caBundle: description: |- Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. If undefined, the certificate bundle in the cert-manager controller container is used to validate the chain. format: byte type: string caBundleSecretRef: description: |- Reference to a Secret containing a base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef is defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object credentialsRef: description: |- CredentialsRef is a reference to a Secret containing the Venafi TPP API credentials. The secret must contain the key 'access-token' for the Access Token Authentication, or two keys, 'username' and 'password' for the API Keys Authentication. properties: name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object url: description: |- URL is the base URL for the vedsdk endpoint of the Venafi TPP instance, for example: "https://tpp.example.com/vedsdk". type: string required: - credentialsRef - url type: object zone: description: |- Zone is the Venafi Policy Zone to use for this issuer. All requests made to the Venafi platform will be restricted by the named zone policy. This field is required. type: string required: - zone type: object type: object status: description: Status of the ClusterIssuer. This is set and managed automatically. properties: acme: description: |- ACME specific status options. This field should only be set if the Issuer is configured to use an ACME server to issue certificates. properties: lastPrivateKeyHash: description: |- LastPrivateKeyHash is a hash of the private key associated with the latest registered ACME account, in order to track changes made to registered account associated with the Issuer type: string lastRegisteredEmail: description: |- LastRegisteredEmail is the email associated with the latest registered ACME account, in order to track changes made to registered account associated with the Issuer type: string uri: description: |- URI is the unique account identifier, which can also be used to retrieve account details from the CA type: string type: object conditions: description: |- List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready`. items: description: IssuerCondition contains condition information for an Issuer. properties: lastTransitionTime: description: |- LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: |- Message is a human readable description of the details of the last transition, complementing reason. type: string observedGeneration: description: |- If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Issuer. format: int64 type: integer reason: description: |- Reason is a brief machine readable explanation for the condition's last transition. type: string status: description: Status of the condition, one of (`True`, `False`, `Unknown`). enum: - "True" - "False" - Unknown type: string type: description: Type of the condition, known values are (`Ready`). type: string required: - status - type type: object type: array x-kubernetes-list-map-keys: - type x-kubernetes-list-type: map type: object required: - spec type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/crd-cert-manager.io_issuers.yaml apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: name: "issuers.cert-manager.io" annotations: helm.sh/resource-policy: keep labels: app: "cert-manager" app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" app.kubernetes.io/version: "v1.19.2" spec: group: cert-manager.io names: categories: - cert-manager kind: Issuer listKind: IssuerList plural: issuers shortNames: - iss singular: issuer scope: Namespaced versions: - additionalPrinterColumns: - jsonPath: .status.conditions[?(@.type == "Ready")].status name: Ready type: string - jsonPath: .status.conditions[?(@.type == "Ready")].message name: Status priority: 1 type: string - description: CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. jsonPath: .metadata.creationTimestamp name: Age type: date name: v1 schema: openAPIV3Schema: description: |- An Issuer represents a certificate issuing authority which can be referenced as part of `issuerRef` fields. It is scoped to a single namespace and can therefore only be referenced by resources within the same namespace. properties: apiVersion: description: |- APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources type: string kind: description: |- Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds type: string metadata: type: object spec: description: Desired state of the Issuer resource. properties: acme: description: |- ACME configures this issuer to communicate with a RFC8555 (ACME) server to obtain signed x509 certificates. properties: caBundle: description: |- Base64-encoded bundle of PEM CAs which can be used to validate the certificate chain presented by the ACME server. Mutually exclusive with SkipTLSVerify; prefer using CABundle to prevent various kinds of security vulnerabilities. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. format: byte type: string disableAccountKeyGeneration: description: |- Enables or disables generating a new ACME account key. If true, the Issuer resource will *not* request a new account but will expect the account key to be supplied via an existing secret. If false, the cert-manager system will generate a new ACME account key for the Issuer. Defaults to false. type: boolean email: description: |- Email is the email address to be associated with the ACME account. This field is optional, but it is strongly recommended to be set. It will be used to contact you in case of issues with your account or certificates, including expiry notification emails. This field may be updated after the account is initially registered. type: string enableDurationFeature: description: |- Enables requesting a Not After date on certificates that matches the duration of the certificate. This is not supported by all ACME servers like Let's Encrypt. If set to true when the ACME server does not support it, it will create an error on the Order. Defaults to false. type: boolean externalAccountBinding: description: |- ExternalAccountBinding is a reference to a CA external account of the ACME server. If set, upon registration cert-manager will attempt to associate the given external account credentials with the registered ACME account. properties: keyAlgorithm: description: |- Deprecated: keyAlgorithm field exists for historical compatibility reasons and should not be used. The algorithm is now hardcoded to HS256 in golang/x/crypto/acme. enum: - HS256 - HS384 - HS512 type: string keyID: description: keyID is the ID of the CA key that the External Account is bound to. type: string keySecretRef: description: |- keySecretRef is a Secret Key Selector referencing a data item in a Kubernetes Secret which holds the symmetric MAC key of the External Account Binding. The `key` is the index string that is paired with the key data in the Secret and should not be confused with the key data itself, or indeed with the External Account Binding keyID above. The secret key stored in the Secret **must** be un-padded, base64 URL encoded data. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - keyID - keySecretRef type: object preferredChain: description: |- PreferredChain is the chain to use if the ACME server outputs multiple. PreferredChain is no guarantee that this one gets delivered by the ACME endpoint. For example, for Let's Encrypt's DST cross-sign you would use: "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA. This value picks the first certificate bundle in the combined set of ACME default and alternative chains that has a root-most certificate with this value as its issuer's commonname. maxLength: 64 type: string privateKeySecretRef: description: |- PrivateKey is the name of a Kubernetes Secret resource that will be used to store the automatically generated ACME account private key. Optionally, a `key` may be specified to select a specific entry within the named Secret resource. If `key` is not specified, a default of `tls.key` will be used. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object profile: description: |- Profile allows requesting a certificate profile from the ACME server. Supported profiles are listed by the server's ACME directory URL. type: string server: description: |- Server is the URL used to access the ACME server's 'directory' endpoint. For example, for Let's Encrypt's staging endpoint, you would use: "https://acme-staging-v02.api.letsencrypt.org/directory". Only ACME v2 endpoints (i.e. RFC 8555) are supported. type: string skipTLSVerify: description: |- INSECURE: Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have the TLS certificate chain validated. Mutually exclusive with CABundle; prefer using CABundle to prevent various kinds of security vulnerabilities. Only enable this option in development environments. If CABundle and SkipTLSVerify are unset, the system certificate bundle inside the container is used to validate the TLS connection. Defaults to false. type: boolean solvers: description: |- Solvers is a list of challenge solvers that will be used to solve ACME challenges for the matching domains. Solver configurations must be provided in order to obtain certificates from an ACME server. For more information, see: https://cert-manager.io/docs/configuration/acme/ items: description: |- An ACMEChallengeSolver describes how to solve ACME challenges for the issuer it is part of. A selector may be provided to use different solving strategies for different DNS names. Only one of HTTP01 or DNS01 must be provided. properties: dns01: description: |- Configures cert-manager to attempt to complete authorizations by performing the DNS01 challenge flow. properties: acmeDNS: description: |- Use the 'ACME DNS' (https://github.com/joohoi/acme-dns) API to manage DNS01 challenge records. properties: accountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object host: type: string required: - accountSecretRef - host type: object akamai: description: Use the Akamai DNS zone management API to manage DNS01 challenge records. properties: accessTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientSecretSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientTokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object serviceConsumerDomain: type: string required: - accessTokenSecretRef - clientSecretSecretRef - clientTokenSecretRef - serviceConsumerDomain type: object azureDNS: description: Use the Microsoft Azure DNS API to manage DNS01 challenge records. properties: clientID: description: |- Auth: Azure Service Principal: The ClientID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientSecret and TenantID must also be set. type: string clientSecretSecretRef: description: |- Auth: Azure Service Principal: A reference to a Secret containing the password associated with the Service Principal. If set, ClientID and TenantID must also be set. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object environment: description: name of the Azure environment (default AzurePublicCloud) enum: - AzurePublicCloud - AzureChinaCloud - AzureGermanCloud - AzureUSGovernmentCloud type: string hostedZoneName: description: name of the DNS zone that should be used type: string managedIdentity: description: |- Auth: Azure Workload Identity or Azure Managed Service Identity: Settings to enable Azure Workload Identity or Azure Managed Service Identity If set, ClientID, ClientSecret and TenantID must not be set. properties: clientID: description: client ID of the managed identity, cannot be used at the same time as resourceID type: string resourceID: description: |- resource ID of the managed identity, cannot be used at the same time as clientID Cannot be used for Azure Managed Service Identity type: string tenantID: description: tenant ID of the managed identity, cannot be used at the same time as resourceID type: string type: object resourceGroupName: description: resource group the DNS zone is located in type: string subscriptionID: description: ID of the Azure subscription type: string tenantID: description: |- Auth: Azure Service Principal: The TenantID of the Azure Service Principal used to authenticate with Azure DNS. If set, ClientID and ClientSecret must also be set. type: string required: - resourceGroupName - subscriptionID type: object cloudDNS: description: Use the Google Cloud DNS API to manage DNS01 challenge records. properties: hostedZoneName: description: |- HostedZoneName is an optional field that tells cert-manager in which Cloud DNS zone the challenge record has to be created. If left empty cert-manager will automatically choose a zone. type: string project: type: string serviceAccountSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - project type: object cloudflare: description: Use the Cloudflare API to manage DNS01 challenge records. properties: apiKeySecretRef: description: |- API key to use to authenticate with Cloudflare. Note: using an API token to authenticate is now the recommended method as it allows greater control of permissions. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object apiTokenSecretRef: description: API token used to authenticate with Cloudflare. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object email: description: Email of the account, only required when using API key based authentication. type: string type: object cnameStrategy: description: |- CNAMEStrategy configures how the DNS01 provider should handle CNAME records when found in DNS zones. enum: - None - Follow type: string digitalocean: description: Use the DigitalOcean DNS API to manage DNS01 challenge records. properties: tokenSecretRef: description: |- A reference to a specific 'key' within a Secret resource. In some instances, `key` is a required field. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - tokenSecretRef type: object rfc2136: description: |- Use RFC2136 ("Dynamic Updates in the Domain Name System") (https://datatracker.ietf.org/doc/rfc2136/) to manage DNS01 challenge records. properties: nameserver: description: |- The IP address or hostname of an authoritative DNS server supporting RFC2136 in the form host:port. If the host is an IPv6 address it must be enclosed in square brackets (e.g [2001:db8::1]) ; port is optional. This field is required. type: string protocol: description: Protocol to use for dynamic DNS update queries. Valid values are (case-sensitive) ``TCP`` and ``UDP``; ``UDP`` (default). enum: - TCP - UDP type: string tsigAlgorithm: description: |- The TSIG Algorithm configured in the DNS supporting RFC2136. Used only when ``tsigSecretSecretRef`` and ``tsigKeyName`` are defined. Supported values are (case-insensitive): ``HMACMD5`` (default), ``HMACSHA1``, ``HMACSHA256`` or ``HMACSHA512``. type: string tsigKeyName: description: |- The TSIG Key name configured in the DNS. If ``tsigSecretSecretRef`` is defined, this field is required. type: string tsigSecretSecretRef: description: |- The name of the secret containing the TSIG value. If ``tsigKeyName`` is defined, this field is required. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - nameserver type: object route53: description: Use the AWS Route53 API to manage DNS01 challenge records. properties: accessKeyID: description: |- The AccessKeyID is used for authentication. Cannot be set when SecretAccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials type: string accessKeyIDSecretRef: description: |- The SecretAccessKey is used for authentication. If set, pull the AWS access key ID from a key within a Kubernetes Secret. Cannot be set when AccessKeyID is set. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object auth: description: Auth configures how cert-manager authenticates. properties: kubernetes: description: |- Kubernetes authenticates with Route53 using AssumeRoleWithWebIdentity by passing a bound ServiceAccount token. properties: serviceAccountRef: description: |- A reference to a service account that will be used to request a bound token (also known as "projected token"). To use this field, you must configure an RBAC rule to let cert-manager request a token. properties: audiences: description: |- TokenAudiences is an optional list of audiences to include in the token passed to AWS. The default token consisting of the issuer's namespace and name is always included. If unset the audience defaults to `sts.amazonaws.com`. items: type: string type: array x-kubernetes-list-type: atomic name: description: Name of the ServiceAccount used to request a token. type: string required: - name type: object required: - serviceAccountRef type: object required: - kubernetes type: object hostedZoneID: description: If set, the provider will manage only this zone in Route53 and will not do a lookup using the route53:ListHostedZonesByName api call. type: string region: description: |- Override the AWS region. Route53 is a global service and does not have regional endpoints but the region specified here (or via environment variables) is used as a hint to help compute the correct AWS credential scope and partition when it connects to Route53. See: - [Amazon Route 53 endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/r53.html) - [Global services](https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/global-services.html) If you omit this region field, cert-manager will use the region from AWS_REGION and AWS_DEFAULT_REGION environment variables, if they are set in the cert-manager controller Pod. The `region` field is not needed if you use [IAM Roles for Service Accounts (IRSA)](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Webhook](https://github.com/aws/amazon-eks-pod-identity-webhook). In this case this `region` field value is ignored. The `region` field is not needed if you use [EKS Pod Identities](https://docs.aws.amazon.com/eks/latest/userguide/pod-identities.html). Instead an AWS_REGION environment variable is added to the cert-manager controller Pod by: [Amazon EKS Pod Identity Agent](https://github.com/aws/eks-pod-identity-agent), In this case this `region` field value is ignored. type: string role: description: |- Role is a Role ARN which the Route53 provider will assume using either the explicit credentials AccessKeyID/SecretAccessKey or the inferred credentials from environment variables, shared credentials file or AWS Instance metadata type: string secretAccessKeySecretRef: description: |- The SecretAccessKey is used for authentication. If neither the Access Key nor Key ID are set, we fall-back to using env vars, shared credentials file or AWS Instance metadata, see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object type: object webhook: description: |- Configure an external webhook based DNS01 challenge solver to manage DNS01 challenge records. properties: config: description: |- Additional configuration that should be passed to the webhook apiserver when challenges are processed. This can contain arbitrary JSON data. Secret values should not be specified in this stanza. If secret values are needed (e.g., credentials for a DNS service), you should use a SecretKeySelector to reference a Secret resource. For details on the schema of this field, consult the webhook provider implementation's documentation. x-kubernetes-preserve-unknown-fields: true groupName: description: |- The API group name that should be used when POSTing ChallengePayload resources to the webhook apiserver. This should be the same as the GroupName specified in the webhook provider implementation. type: string solverName: description: |- The name of the solver to use, as defined in the webhook provider implementation. This will typically be the name of the provider, e.g., 'cloudflare'. type: string required: - groupName - solverName type: object type: object http01: description: |- Configures cert-manager to attempt to complete authorizations by performing the HTTP01 challenge flow. It is not possible to obtain certificates for wildcard domain names (e.g., `*.example.com`) using the HTTP01 challenge mechanism. properties: gatewayHTTPRoute: description: |- The Gateway API is a sig-network community API that models service networking in Kubernetes (https://gateway-api.sigs.k8s.io/). The Gateway solver will create HTTPRoutes with the specified labels in the same namespace as the challenge. This solver is experimental, and fields / behaviour may change in the future. properties: labels: additionalProperties: type: string description: |- Custom labels that will be applied to HTTPRoutes created by cert-manager while solving HTTP-01 challenges. type: object parentRefs: description: |- When solving an HTTP-01 challenge, cert-manager creates an HTTPRoute. cert-manager needs to know which parentRefs should be used when creating the HTTPRoute. Usually, the parentRef references a Gateway. See: https://gateway-api.sigs.k8s.io/api-types/httproute/#attaching-to-gateways items: description: |- ParentReference identifies an API object (usually a Gateway) that can be considered a parent of this resource (usually a route). There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) This API may be extended in the future to support additional kinds of parent resources. The API object must be valid in the cluster; the Group and Kind must be registered in the cluster for this reference to be valid. properties: group: default: gateway.networking.k8s.io description: |- Group is the group of the referent. When unspecified, "gateway.networking.k8s.io" is inferred. To set the core API group (such as for a "Service" kind referent), Group must be explicitly set to "" (empty string). Support: Core maxLength: 253 pattern: ^$|^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string kind: default: Gateway description: |- Kind is kind of the referent. There are two kinds of parent resources with "Core" support: * Gateway (Gateway conformance profile) * Service (Mesh conformance profile, ClusterIP Services only) Support for other resources is Implementation-Specific. maxLength: 63 minLength: 1 pattern: ^[a-zA-Z]([-a-zA-Z0-9]*[a-zA-Z0-9])?$ type: string name: description: |- Name is the name of the referent. Support: Core maxLength: 253 minLength: 1 type: string namespace: description: |- Namespace is the namespace of the referent. When unspecified, this refers to the local namespace of the Route. Note that there are specific rules for ParentRefs which cross namespace boundaries. Cross-namespace references are only valid if they are explicitly allowed by something in the namespace they are referring to. For example: Gateway has the AllowedRoutes field, and ReferenceGrant provides a generic way to enable any other kind of cross-namespace reference. ParentRefs from a Route to a Service in the same namespace are "producer" routes, which apply default routing rules to inbound connections from any namespace to the Service. ParentRefs from a Route to a Service in a different namespace are "consumer" routes, and these routing rules are only applied to outbound connections originating from the same namespace as the Route, for which the intended destination of the connections are a Service targeted as a ParentRef of the Route. Support: Core maxLength: 63 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ type: string port: description: |- Port is the network port this Route targets. It can be interpreted differently based on the type of parent resource. When the parent resource is a Gateway, this targets all listeners listening on the specified port that also support this kind of Route(and select this Route). It's not recommended to set `Port` unless the networking behaviors specified in a Route must apply to a specific port as opposed to a listener(s) whose port(s) may be changed. When both Port and SectionName are specified, the name and port of the selected listener must match both specified values. When the parent resource is a Service, this targets a specific port in the Service spec. When both Port (experimental) and SectionName are specified, the name and port of the selected port must match both specified values. Implementations MAY choose to support other parent resources. Implementations supporting other types of parent resources MUST clearly document how/if Port is interpreted. For the purpose of status, an attachment is considered successful as long as the parent resource accepts it partially. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Extended format: int32 maximum: 65535 minimum: 1 type: integer sectionName: description: |- SectionName is the name of a section within the target resource. In the following resources, SectionName is interpreted as the following: * Gateway: Listener name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. * Service: Port name. When both Port (experimental) and SectionName are specified, the name and port of the selected listener must match both specified values. Implementations MAY choose to support attaching Routes to other resources. If that is the case, they MUST clearly document how SectionName is interpreted. When unspecified (empty string), this will reference the entire resource. For the purpose of status, an attachment is considered successful if at least one section in the parent resource accepts it. For example, Gateway listeners can restrict which Routes can attach to them by Route kind, namespace, or hostname. If 1 of 2 Gateway listeners accept attachment from the referencing Route, the Route MUST be considered successfully attached. If no Gateway listeners accept attachment from this Route, the Route MUST be considered detached from the Gateway. Support: Core maxLength: 253 minLength: 1 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ type: string required: - name type: object type: array x-kubernetes-list-type: atomic podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object ingress: description: |- The ingress based HTTP01 challenge solver will solve challenges by creating or modifying Ingress resources in order to route requests for '/.well-known/acme-challenge/XYZ' to 'challenge solver' pods that are provisioned by cert-manager for each Challenge to be completed. properties: class: description: |- This field configures the annotation `kubernetes.io/ingress.class` when creating Ingress resources to solve ACME challenges that use this challenge solver. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressClassName: description: |- This field configures the field `ingressClassName` on the created Ingress resources used to solve ACME challenges that use this challenge solver. This is the recommended way of configuring the ingress class. Only one of `class`, `name` or `ingressClassName` may be specified. type: string ingressTemplate: description: |- Optional ingress template used to configure the ACME challenge solver ingress used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the ingress used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver ingress. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver ingress. type: object type: object type: object name: description: |- The name of the ingress resource that should have ACME challenge solving routes inserted into it in order to solve HTTP01 challenges. This is typically used in conjunction with ingress controllers like ingress-gce, which maintains a 1:1 mapping between external IPs and ingress resources. Only one of `class`, `name` or `ingressClassName` may be specified. type: string podTemplate: description: |- Optional pod template used to configure the ACME challenge solver pods used for HTTP01 challenges. properties: metadata: description: |- ObjectMeta overrides for the pod used to solve HTTP01 challenges. Only the 'labels' and 'annotations' fields may be set. If labels or annotations overlap with in-built values, the values here will override the in-built values. properties: annotations: additionalProperties: type: string description: Annotations that should be added to the created ACME HTTP01 solver pods. type: object labels: additionalProperties: type: string description: Labels that should be added to the created ACME HTTP01 solver pods. type: object type: object spec: description: |- PodSpec defines overrides for the HTTP01 challenge solver pod. Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields. All other fields will be ignored. properties: affinity: description: If specified, the pod's scheduling constraints properties: nodeAffinity: description: Describes node affinity scheduling rules for the pod. properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node matches the corresponding matchExpressions; the node(s) with the highest sum are the most preferred. items: description: |- An empty preferred scheduling term matches all objects with implicit weight 0 (i.e. it's a no-op). A null preferred scheduling term matches no objects (i.e. is also a no-op). properties: preference: description: A node selector term, associated with the corresponding weight. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic weight: description: Weight associated with matching the corresponding nodeSelectorTerm, in the range 1-100. format: int32 type: integer required: - preference - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to an update), the system may or may not try to eventually evict the pod from its node. properties: nodeSelectorTerms: description: Required. A list of node selector terms. The terms are ORed. items: description: |- A null or empty node selector term matches no objects. The requirements of them are ANDed. The TopologySelectorTerm type implements a subset of the NodeSelectorTerm. properties: matchExpressions: description: A list of node selector requirements by node's labels. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchFields: description: A list of node selector requirements by node's fields. items: description: |- A node selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: The label key that the selector applies to. type: string operator: description: |- Represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists, DoesNotExist. Gt, and Lt. type: string values: description: |- An array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. If the operator is Gt or Lt, the values array must have a single element, which will be interpreted as an integer. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-type: atomic required: - nodeSelectorTerms type: object x-kubernetes-map-type: atomic type: object podAffinity: description: Describes pod affinity scheduling rules (e.g. co-locate this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling affinity expressions, etc.), compute a sum by iterating through the elements of this field and adding "weight" to the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object podAntiAffinity: description: Describes pod anti-affinity scheduling rules (e.g. avoid putting this pod in the same node, zone, etc. as some other pod(s)). properties: preferredDuringSchedulingIgnoredDuringExecution: description: |- The scheduler will prefer to schedule pods to nodes that satisfy the anti-affinity expressions specified by this field, but it may choose a node that violates one or more of the expressions. The node that is most preferred is the one with the greatest sum of weights, i.e. for each node that meets all of the scheduling requirements (resource request, requiredDuringScheduling anti-affinity expressions, etc.), compute a sum by iterating through the elements of this field and subtracting "weight" from the sum if the node has pods which matches the corresponding podAffinityTerm; the node(s) with the highest sum are the most preferred. items: description: The weights of all of the matched WeightedPodAffinityTerm fields are added per-node to find the most preferred node(s) properties: podAffinityTerm: description: Required. A pod affinity term, associated with the corresponding weight. properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object weight: description: |- weight associated with matching the corresponding podAffinityTerm, in the range 1-100. format: int32 type: integer required: - podAffinityTerm - weight type: object type: array x-kubernetes-list-type: atomic requiredDuringSchedulingIgnoredDuringExecution: description: |- If the anti-affinity requirements specified by this field are not met at scheduling time, the pod will not be scheduled onto the node. If the anti-affinity requirements specified by this field cease to be met at some point during pod execution (e.g. due to a pod label update), the system may or may not try to eventually evict the pod from its node. When there are multiple elements, the lists of nodes corresponding to each podAffinityTerm are intersected, i.e. all terms must be satisfied. items: description: |- Defines a set of pods (namely those matching the labelSelector relative to the given namespace(s)) that this pod should be co-located (affinity) or not co-located (anti-affinity) with, where co-located is defined as running on a node whose value of the label with key matches that of any node on which a pod of the set of pods is running properties: labelSelector: description: |- A label query over a set of resources, in this case pods. If it's null, this PodAffinityTerm matches with no Pods. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic matchLabelKeys: description: |- MatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key in (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both matchLabelKeys and labelSelector. Also, matchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic mismatchLabelKeys: description: |- MismatchLabelKeys is a set of pod label keys to select which pods will be taken into consideration. The keys are used to lookup values from the incoming pod labels, those key-value labels are merged with `labelSelector` as `key notin (value)` to select the group of existing pods which pods will be taken into consideration for the incoming pod's pod (anti) affinity. Keys that don't exist in the incoming pod labels will be ignored. The default value is empty. The same key is forbidden to exist in both mismatchLabelKeys and labelSelector. Also, mismatchLabelKeys cannot be set when labelSelector isn't set. items: type: string type: array x-kubernetes-list-type: atomic namespaceSelector: description: |- A label query over the set of namespaces that the term applies to. The term is applied to the union of the namespaces selected by this field and the ones listed in the namespaces field. null selector and null or empty namespaces list means "this pod's namespace". An empty selector ({}) matches all namespaces. properties: matchExpressions: description: matchExpressions is a list of label selector requirements. The requirements are ANDed. items: description: |- A label selector requirement is a selector that contains values, a key, and an operator that relates the key and values. properties: key: description: key is the label key that the selector applies to. type: string operator: description: |- operator represents a key's relationship to a set of values. Valid operators are In, NotIn, Exists and DoesNotExist. type: string values: description: |- values is an array of string values. If the operator is In or NotIn, the values array must be non-empty. If the operator is Exists or DoesNotExist, the values array must be empty. This array is replaced during a strategic merge patch. items: type: string type: array x-kubernetes-list-type: atomic required: - key - operator type: object type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels map is equivalent to an element of matchExpressions, whose key field is "key", the operator is "In", and the values array contains only "value". The requirements are ANDed. type: object type: object x-kubernetes-map-type: atomic namespaces: description: |- namespaces specifies a static list of namespace names that the term applies to. The term is applied to the union of the namespaces listed in this field and the ones selected by namespaceSelector. null or empty namespaces list and null namespaceSelector means "this pod's namespace". items: type: string type: array x-kubernetes-list-type: atomic topologyKey: description: |- This pod should be co-located (affinity) or not co-located (anti-affinity) with the pods matching the labelSelector in the specified namespaces, where co-located is defined as running on a node whose value of the label with key topologyKey matches that of any node on which any of the selected pods is running. Empty topologyKey is not allowed. type: string required: - topologyKey type: object type: array x-kubernetes-list-type: atomic type: object type: object imagePullSecrets: description: If specified, the pod's imagePullSecrets items: description: |- LocalObjectReference contains enough information to let you locate the referenced object inside the same namespace. properties: name: default: "" description: |- Name of the referent. This field is effectively required, but due to backwards compatibility is allowed to be empty. Instances of this type with an empty value here are almost certainly wrong. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string type: object x-kubernetes-map-type: atomic type: array x-kubernetes-list-map-keys: - name x-kubernetes-list-type: map nodeSelector: additionalProperties: type: string description: |- NodeSelector is a selector which must be true for the pod to fit on a node. Selector which must match a node's labels for the pod to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/ type: object priorityClassName: description: If specified, the pod's priorityClassName. type: string resources: description: |- If specified, the pod's resource requirements. These values override the global resource configuration flags. Note that when only specifying resource limits, ensure they are greater than or equal to the corresponding global resource requests configured via controller flags (--acme-http01-solver-resource-request-cpu, --acme-http01-solver-resource-request-memory). Kubernetes will reject pod creation if limits are lower than requests, causing challenge failures. properties: limits: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Limits describes the maximum amount of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object requests: additionalProperties: anyOf: - type: integer - type: string pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ x-kubernetes-int-or-string: true description: |- Requests describes the minimum amount of compute resources required. If Requests is omitted for a container, it defaults to Limits if that is explicitly specified, otherwise to the global values configured via controller flags. Requests cannot exceed Limits. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ type: object type: object securityContext: description: If specified, the pod's security context properties: fsGroup: description: |- A special supplemental group that applies to all containers in a pod. Some volume types allow the Kubelet to change the ownership of that volume to be owned by the pod: 1. The owning GID will be the FSGroup 2. The setgid bit is set (new files created in the volume will be owned by FSGroup) 3. The permission bits are OR'd with rw-rw---- If unset, the Kubelet will not modify the ownership and permissions of any volume. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer fsGroupChangePolicy: description: |- fsGroupChangePolicy defines behavior of changing ownership and permission of the volume before being exposed inside Pod. This field will only apply to volume types which support fsGroup based ownership(and permissions). It will have no effect on ephemeral volume types such as: secret, configmaps and emptydir. Valid values are "OnRootMismatch" and "Always". If not specified, "Always" is used. Note that this field cannot be set when spec.os.name is windows. type: string runAsGroup: description: |- The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer runAsNonRoot: description: |- Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. type: boolean runAsUser: description: |- The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. format: int64 type: integer seLinuxOptions: description: |- The SELinux context to be applied to all containers. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in SecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence for that container. Note that this field cannot be set when spec.os.name is windows. properties: level: description: Level is SELinux level label that applies to the container. type: string role: description: Role is a SELinux role label that applies to the container. type: string type: description: Type is a SELinux type label that applies to the container. type: string user: description: User is a SELinux user label that applies to the container. type: string type: object seccompProfile: description: |- The seccomp options to use by the containers in this pod. Note that this field cannot be set when spec.os.name is windows. properties: localhostProfile: description: |- localhostProfile indicates a profile defined in a file on the node should be used. The profile must be preconfigured on the node to work. Must be a descending path, relative to the kubelet's configured seccomp profile location. Must be set if type is "Localhost". Must NOT be set for any other type. type: string type: description: |- type indicates which kind of seccomp profile will be applied. Valid options are: Localhost - a profile defined in a file on the node should be used. RuntimeDefault - the container runtime default profile should be used. Unconfined - no profile should be applied. type: string required: - type type: object supplementalGroups: description: |- A list of groups applied to the first process run in each container, in addition to the container's primary GID, the fsGroup (if specified), and group memberships defined in the container image for the uid of the container process. If unspecified, no additional groups are added to any container. Note that group memberships defined in the container image for the uid of the container process are still effective, even if they are not included in this list. Note that this field cannot be set when spec.os.name is windows. items: format: int64 type: integer type: array x-kubernetes-list-type: atomic sysctls: description: |- Sysctls hold a list of namespaced sysctls used for the pod. Pods with unsupported sysctls (by the container runtime) might fail to launch. Note that this field cannot be set when spec.os.name is windows. items: description: Sysctl defines a kernel parameter to be set properties: name: description: Name of a property to set type: string value: description: Value of a property to set type: string required: - name - value type: object type: array x-kubernetes-list-type: atomic type: object serviceAccountName: description: If specified, the pod's service account type: string tolerations: description: If specified, the pod's tolerations. items: description: |- The pod this Toleration is attached to tolerates any taint that matches the triple using the matching operator . properties: effect: description: |- Effect indicates the taint effect to match. Empty means match all taint effects. When specified, allowed values are NoSchedule, PreferNoSchedule and NoExecute. type: string key: description: |- Key is the taint key that the toleration applies to. Empty means match all taint keys. If the key is empty, operator must be Exists; this combination means to match all values and all keys. type: string operator: description: |- Operator represents a key's relationship to the value. Valid operators are Exists and Equal. Defaults to Equal. Exists is equivalent to wildcard for value, so that a pod can tolerate all taints of a particular category. type: string tolerationSeconds: description: |- TolerationSeconds represents the period of time the toleration (which must be of effect NoExecute, otherwise this field is ignored) tolerates the taint. By default, it is not set, which means tolerate the taint forever (do not evict). Zero and negative values will be treated as 0 (evict immediately) by the system. format: int64 type: integer value: description: |- Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string type: object type: array x-kubernetes-list-type: atomic type: object type: object serviceType: description: |- Optional service type for Kubernetes solver service. Supported values are NodePort or ClusterIP. If unset, defaults to NodePort. type: string type: object type: object selector: description: |- Selector selects a set of DNSNames on the Certificate resource that should be solved using this challenge solver. If not specified, the solver will be treated as the 'default' solver with the lowest priority, i.e. if any other solver has a more specific match, it will be used instead. properties: dnsNames: description: |- List of DNSNames that this solver will be used to solve. If specified and a match is found, a dnsNames selector will take precedence over a dnsZones selector. If multiple solvers match with the same dnsNames value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic dnsZones: description: |- List of DNSZones that this solver will be used to solve. The most specific DNS zone match specified here will take precedence over other DNS zone matches, so a solver specifying sys.example.com will be selected over one specifying example.com for the domain www.sys.example.com. If multiple solvers match with the same dnsZones value, the solver with the most matching labels in matchLabels will be selected. If neither has more matches, the solver defined earlier in the list will be selected. items: type: string type: array x-kubernetes-list-type: atomic matchLabels: additionalProperties: type: string description: |- A label selector that is used to refine the set of certificate's that this challenge solver will apply to. type: object type: object type: object type: array x-kubernetes-list-type: atomic required: - privateKeySecretRef - server type: object ca: description: |- CA configures this issuer to sign certificates using a signing CA keypair stored in a Secret resource. This is used to build internal PKIs that are managed by cert-manager. properties: crlDistributionPoints: description: |- The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set, certificates will be issued without distribution points set. items: type: string type: array x-kubernetes-list-type: atomic issuingCertificateURLs: description: |- IssuingCertificateURLs is a list of URLs which this issuer should embed into certificates it creates. See https://www.rfc-editor.org/rfc/rfc5280#section-4.2.2.1 for more details. As an example, such a URL might be "http://ca.domain.com/ca.crt". items: type: string type: array x-kubernetes-list-type: atomic ocspServers: description: |- The OCSP server list is an X.509 v3 extension that defines a list of URLs of OCSP responders. The OCSP responders can be queried for the revocation status of an issued certificate. If not set, the certificate will be issued with no OCSP servers set. For example, an OCSP server URL could be "http://ocsp.int-x3.letsencrypt.org". items: type: string type: array x-kubernetes-list-type: atomic secretName: description: |- SecretName is the name of the secret used to sign Certificates issued by this Issuer. type: string required: - secretName type: object selfSigned: description: |- SelfSigned configures this issuer to 'self sign' certificates using the private key used to create the CertificateRequest object. properties: crlDistributionPoints: description: |- The CRL distribution points is an X.509 v3 certificate extension which identifies the location of the CRL from which the revocation of this certificate can be checked. If not set certificate will be issued without CDP. Values are strings. items: type: string type: array x-kubernetes-list-type: atomic type: object vault: description: |- Vault configures this issuer to sign certificates using a HashiCorp Vault PKI backend. properties: auth: description: Auth configures how cert-manager authenticates with the Vault server. properties: appRole: description: |- AppRole authenticates with Vault using the App Role auth mechanism, with the role and secret stored in a Kubernetes Secret resource. properties: path: description: |- Path where the App Role authentication backend is mounted in Vault, e.g: "approle" type: string roleId: description: |- RoleID configured in the App Role authentication backend when setting up the authentication backend in Vault. type: string secretRef: description: |- Reference to a key in a Secret that contains the App Role secret used to authenticate with Vault. The `key` field must be specified and denotes which entry within the Secret resource is used as the app role secret. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object required: - path - roleId - secretRef type: object clientCertificate: description: |- ClientCertificate authenticates with Vault by presenting a client certificate during the request's TLS handshake. Works only when using HTTPS protocol. properties: mountPath: description: |- The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/cert" will be used. type: string name: description: |- Name of the certificate role to authenticate against. If not set, matching any certificate role, if available. type: string secretName: description: |- Reference to Kubernetes Secret of type "kubernetes.io/tls" (hence containing tls.crt and tls.key) used to authenticate to Vault using TLS client authentication. type: string type: object kubernetes: description: |- Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server. properties: mountPath: description: |- The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to `/v1/auth/foo`, will use the path `/v1/auth/foo/login` to authenticate with Vault. If unspecified, the default value "/v1/auth/kubernetes" will be used. type: string role: description: |- A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies. type: string secretRef: description: |- The required Secret field containing a Kubernetes ServiceAccount JWT used for authenticating with Vault. Use of 'ambient credentials' is not supported. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object serviceAccountRef: description: |- A reference to a service account that will be used to request a bound token (also known as "projected token"). Compared to using "secretRef", using this field means that you don't rely on statically bound tokens. To use this field, you must configure an RBAC rule to let cert-manager request a token. properties: audiences: description: |- TokenAudiences is an optional list of extra audiences to include in the token passed to Vault. The default token consisting of the issuer's namespace and name is always included. items: type: string type: array x-kubernetes-list-type: atomic name: description: Name of the ServiceAccount used to request a token. type: string required: - name type: object required: - role type: object tokenSecretRef: description: TokenSecretRef authenticates with Vault by presenting a token. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object type: object caBundle: description: |- Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by Vault. Only used if using HTTPS to connect to Vault and ignored for HTTP connections. Mutually exclusive with CABundleSecretRef. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. format: byte type: string caBundleSecretRef: description: |- Reference to a Secret containing a bundle of PEM-encoded CAs to use when verifying the certificate chain presented by Vault when using HTTPS. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef are defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. If no key for the Secret is specified, cert-manager will default to 'ca.crt'. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientCertSecretRef: description: |- Reference to a Secret containing a PEM-encoded Client Certificate to use when the Vault server requires mTLS. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object clientKeySecretRef: description: |- Reference to a Secret containing a PEM-encoded Client Private Key to use when the Vault server requires mTLS. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object namespace: description: |- Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: "ns1" More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces type: string path: description: |- Path is the mount path of the Vault PKI backend's `sign` endpoint, e.g: "my_pki_mount/sign/my-role-name". type: string server: description: 'Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".' type: string serverName: description: |- ServerName is used to verify the hostname on the returned certificates by the Vault server. type: string required: - auth - path - server type: object venafi: description: |- Venafi configures this issuer to sign certificates using a Venafi TPP or Venafi Cloud policy zone. properties: cloud: description: |- Cloud specifies the Venafi cloud configuration settings. Only one of TPP or Cloud may be specified. properties: apiTokenSecretRef: description: APITokenSecretRef is a secret key selector for the Venafi Cloud API token. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object url: description: |- URL is the base URL for Venafi Cloud. Defaults to "https://api.venafi.cloud/". type: string required: - apiTokenSecretRef type: object tpp: description: |- TPP specifies Trust Protection Platform configuration settings. Only one of TPP or Cloud may be specified. properties: caBundle: description: |- Base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. If undefined, the certificate bundle in the cert-manager controller container is used to validate the chain. format: byte type: string caBundleSecretRef: description: |- Reference to a Secret containing a base64-encoded bundle of PEM CAs which will be used to validate the certificate chain presented by the TPP server. Only used if using HTTPS; ignored for HTTP. Mutually exclusive with CABundle. If neither CABundle nor CABundleSecretRef is defined, the certificate bundle in the cert-manager controller container is used to validate the TLS connection. properties: key: description: |- The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required. type: string name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object credentialsRef: description: |- CredentialsRef is a reference to a Secret containing the Venafi TPP API credentials. The secret must contain the key 'access-token' for the Access Token Authentication, or two keys, 'username' and 'password' for the API Keys Authentication. properties: name: description: |- Name of the resource being referred to. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names type: string required: - name type: object url: description: |- URL is the base URL for the vedsdk endpoint of the Venafi TPP instance, for example: "https://tpp.example.com/vedsdk". type: string required: - credentialsRef - url type: object zone: description: |- Zone is the Venafi Policy Zone to use for this issuer. All requests made to the Venafi platform will be restricted by the named zone policy. This field is required. type: string required: - zone type: object type: object status: description: Status of the Issuer. This is set and managed automatically. properties: acme: description: |- ACME specific status options. This field should only be set if the Issuer is configured to use an ACME server to issue certificates. properties: lastPrivateKeyHash: description: |- LastPrivateKeyHash is a hash of the private key associated with the latest registered ACME account, in order to track changes made to registered account associated with the Issuer type: string lastRegisteredEmail: description: |- LastRegisteredEmail is the email associated with the latest registered ACME account, in order to track changes made to registered account associated with the Issuer type: string uri: description: |- URI is the unique account identifier, which can also be used to retrieve account details from the CA type: string type: object conditions: description: |- List of status conditions to indicate the status of a CertificateRequest. Known condition types are `Ready`. items: description: IssuerCondition contains condition information for an Issuer. properties: lastTransitionTime: description: |- LastTransitionTime is the timestamp corresponding to the last status change of this condition. format: date-time type: string message: description: |- Message is a human readable description of the details of the last transition, complementing reason. type: string observedGeneration: description: |- If set, this represents the .metadata.generation that the condition was set based upon. For instance, if .metadata.generation is currently 12, but the .status.condition[x].observedGeneration is 9, the condition is out of date with respect to the current state of the Issuer. format: int64 type: integer reason: description: |- Reason is a brief machine readable explanation for the condition's last transition. type: string status: description: Status of the condition, one of (`True`, `False`, `Unknown`). enum: - "True" - "False" - Unknown type: string type: description: Type of the condition, known values are (`Ready`). type: string required: - status - type type: object type: array x-kubernetes-list-map-keys: - type x-kubernetes-list-type: map type: object required: - spec type: object served: true storage: true subresources: status: {} --- # Source: cert-manager/templates/cainjector-serviceaccount.yaml apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true metadata: name: cert-manager-cainjector namespace: cert-manager labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" --- # Source: cert-manager/templates/serviceaccount.yaml apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true metadata: name: cert-manager namespace: cert-manager labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" --- # Source: cert-manager/templates/webhook-serviceaccount.yaml apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true metadata: name: cert-manager-webhook namespace: cert-manager labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" --- # Source: cert-manager/templates/cainjector-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-cainjector labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["get", "create", "update", "patch"] - apiGroups: ["admissionregistration.k8s.io"] resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"] verbs: ["get", "list", "watch", "update", "patch"] - apiGroups: ["apiregistration.k8s.io"] resources: ["apiservices"] verbs: ["get", "list", "watch", "update", "patch"] - apiGroups: ["apiextensions.k8s.io"] resources: ["customresourcedefinitions"] verbs: ["get", "list", "watch", "update", "patch"] --- # Source: cert-manager/templates/rbac.yaml # Issuer controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-issuers labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["issuers", "issuers/status"] verbs: ["update", "patch"] - apiGroups: ["cert-manager.io"] resources: ["issuers"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch", "create", "update", "delete"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- # Source: cert-manager/templates/rbac.yaml # ClusterIssuer controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-clusterissuers labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["clusterissuers", "clusterissuers/status"] verbs: ["update", "patch"] - apiGroups: ["cert-manager.io"] resources: ["clusterissuers"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch", "create", "update", "delete"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- # Source: cert-manager/templates/rbac.yaml # Certificates controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-certificates labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"] verbs: ["update", "patch"] - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests", "clusterissuers", "issuers"] verbs: ["get", "list", "watch"] # We require these rules to support users with the OwnerReferencesPermissionEnforcement # admission controller enabled: # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement - apiGroups: ["cert-manager.io"] resources: ["certificates/finalizers", "certificaterequests/finalizers"] verbs: ["update"] - apiGroups: ["acme.cert-manager.io"] resources: ["orders"] verbs: ["create", "delete", "get", "list", "watch"] - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch", "create", "update", "delete", "patch"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- # Source: cert-manager/templates/rbac.yaml # Orders controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-orders labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["acme.cert-manager.io"] resources: ["orders", "orders/status"] verbs: ["update", "patch"] - apiGroups: ["acme.cert-manager.io"] resources: ["orders", "challenges"] verbs: ["get", "list", "watch"] - apiGroups: ["cert-manager.io"] resources: ["clusterissuers", "issuers"] verbs: ["get", "list", "watch"] - apiGroups: ["acme.cert-manager.io"] resources: ["challenges"] verbs: ["create", "delete"] # We require these rules to support users with the OwnerReferencesPermissionEnforcement # admission controller enabled: # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement - apiGroups: ["acme.cert-manager.io"] resources: ["orders/finalizers"] verbs: ["update"] - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- # Source: cert-manager/templates/rbac.yaml # Challenges controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-challenges labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: # Use to update challenge resource status - apiGroups: ["acme.cert-manager.io"] resources: ["challenges", "challenges/status"] verbs: ["update", "patch"] # Used to watch challenge resources - apiGroups: ["acme.cert-manager.io"] resources: ["challenges"] verbs: ["get", "list", "watch"] # Used to watch challenges, issuer and clusterissuer resources - apiGroups: ["cert-manager.io"] resources: ["issuers", "clusterissuers"] verbs: ["get", "list", "watch"] # Need to be able to retrieve ACME account private key to complete challenges - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch"] # Used to create events - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] # HTTP01 rules - apiGroups: [""] resources: ["pods", "services"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: ["networking.k8s.io"] resources: ["ingresses"] verbs: ["get", "list", "watch", "create", "delete", "update"] - apiGroups: ["gateway.networking.k8s.io"] resources: ["httproutes"] verbs: ["get", "list", "watch", "create", "delete", "update"] # We require the ability to specify a custom hostname when we are creating # new ingress resources. # See: https://github.com/openshift/origin/blob/21f191775636f9acadb44fa42beeb4f75b255532/pkg/route/apiserver/admission/ingress_admission.go#L84-L148 - apiGroups: ["route.openshift.io"] resources: ["routes/custom-host"] verbs: ["create"] # We require these rules to support users with the OwnerReferencesPermissionEnforcement # admission controller enabled: # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement - apiGroups: ["acme.cert-manager.io"] resources: ["challenges/finalizers"] verbs: ["update"] # DNS01 rules (duplicated above) - apiGroups: [""] resources: ["secrets"] verbs: ["get", "list", "watch"] --- # Source: cert-manager/templates/rbac.yaml # ingress-shim controller role apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-ingress-shim labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests"] verbs: ["create", "update", "delete"] - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests", "issuers", "clusterissuers"] verbs: ["get", "list", "watch"] - apiGroups: ["networking.k8s.io"] resources: ["ingresses"] verbs: ["get", "list", "watch"] # We require these rules to support users with the OwnerReferencesPermissionEnforcement # admission controller enabled: # https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement - apiGroups: ["networking.k8s.io"] resources: ["ingresses/finalizers"] verbs: ["update"] - apiGroups: ["gateway.networking.k8s.io"] resources: ["gateways", "httproutes"] verbs: ["get", "list", "watch"] - apiGroups: ["gateway.networking.k8s.io"] resources: ["gateways/finalizers", "httproutes/finalizers"] verbs: ["update"] - apiGroups: [""] resources: ["events"] verbs: ["create", "patch"] --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-cluster-view labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" rules: - apiGroups: ["cert-manager.io"] resources: ["clusterissuers"] verbs: ["get", "list", "watch"] --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-view labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests", "issuers"] verbs: ["get", "list", "watch"] - apiGroups: ["acme.cert-manager.io"] resources: ["challenges", "orders"] verbs: ["get", "list", "watch"] --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-edit labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests", "issuers"] verbs: ["create", "delete", "deletecollection", "patch", "update"] - apiGroups: ["cert-manager.io"] resources: ["certificates/status"] verbs: ["update"] - apiGroups: ["acme.cert-manager.io"] resources: ["challenges", "orders"] verbs: ["create", "delete", "deletecollection", "patch", "update"] --- # Source: cert-manager/templates/rbac.yaml # Permission to approve CertificateRequests referencing cert-manager.io Issuers and ClusterIssuers apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-approve:cert-manager-io labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["cert-manager.io"] resources: ["signers"] verbs: ["approve"] resourceNames: - "issuers.cert-manager.io/*" - "clusterissuers.cert-manager.io/*" --- # Source: cert-manager/templates/rbac.yaml # Permission to: # - Update and sign CertificateSigningRequests referencing cert-manager.io Issuers and ClusterIssuers # - Perform SubjectAccessReviews to test whether users are able to reference Namespaced Issuers apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-controller-certificatesigningrequests labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["certificates.k8s.io"] resources: ["certificatesigningrequests"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["certificates.k8s.io"] resources: ["certificatesigningrequests/status"] verbs: ["update", "patch"] - apiGroups: ["certificates.k8s.io"] resources: ["signers"] resourceNames: ["issuers.cert-manager.io/*", "clusterissuers.cert-manager.io/*"] verbs: ["sign"] - apiGroups: ["authorization.k8s.io"] resources: ["subjectaccessreviews"] verbs: ["create"] --- # Source: cert-manager/templates/webhook-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cert-manager-webhook:subjectaccessreviews labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["authorization.k8s.io"] resources: ["subjectaccessreviews"] verbs: ["create"] --- # Source: cert-manager/templates/cainjector-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-cainjector labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-cainjector subjects: - name: cert-manager-cainjector namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-issuers labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-issuers subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-clusterissuers labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-clusterissuers subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-certificates labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-certificates subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-orders labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-orders subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-challenges labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-challenges subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-ingress-shim labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-ingress-shim subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-approve:cert-manager-io labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-approve:cert-manager-io subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-controller-certificatesigningrequests labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-controller-certificatesigningrequests subjects: - name: cert-manager namespace: cert-manager kind: ServiceAccount --- # Source: cert-manager/templates/webhook-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: cert-manager-webhook:subjectaccessreviews labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cert-manager-webhook:subjectaccessreviews subjects: - kind: ServiceAccount name: cert-manager-webhook namespace: cert-manager --- # Source: cert-manager/templates/cainjector-rbac.yaml # leader election rules apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: cert-manager-cainjector:leaderelection namespace: kube-system labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" rules: # Used for leader election by the controller # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller # see cmd/cainjector/start.go#L113 # cert-manager-cainjector-leader-election-core is used by the SecretBased injector controller # see cmd/cainjector/start.go#L137 - apiGroups: ["coordination.k8s.io"] resources: ["leases"] resourceNames: ["cert-manager-cainjector-leader-election", "cert-manager-cainjector-leader-election-core"] verbs: ["get", "update", "patch"] - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["create"] --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: cert-manager:leaderelection namespace: kube-system labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] resourceNames: ["cert-manager-controller"] verbs: ["get", "update", "patch"] - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["create"] --- # Source: cert-manager/templates/rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: cert-manager-tokenrequest namespace: cert-manager labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: [""] resources: ["serviceaccounts/token"] resourceNames: ["cert-manager"] verbs: ["create"] --- # Source: cert-manager/templates/webhook-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: cert-manager-webhook:dynamic-serving namespace: cert-manager labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" rules: - apiGroups: [""] resources: ["secrets"] resourceNames: - 'cert-manager-webhook-ca' verbs: ["get", "list", "watch", "update"] # It's not possible to grant CREATE permission on a single resourceName. - apiGroups: [""] resources: ["secrets"] verbs: ["create"] --- # Source: cert-manager/templates/cainjector-rbac.yaml # grant cert-manager permission to manage the leaderelection configmap in the # leader election namespace apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: cert-manager-cainjector:leaderelection namespace: kube-system labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: cert-manager-cainjector:leaderelection subjects: - kind: ServiceAccount name: cert-manager-cainjector namespace: cert-manager --- # Source: cert-manager/templates/rbac.yaml # grant cert-manager permission to manage the leaderelection configmap in the # leader election namespace apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: cert-manager:leaderelection namespace: kube-system labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: cert-manager:leaderelection subjects: - kind: ServiceAccount name: cert-manager namespace: cert-manager --- # Source: cert-manager/templates/rbac.yaml # grant cert-manager permission to create tokens for the serviceaccount apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: cert-manager-tokenrequest namespace: cert-manager labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: cert-manager-tokenrequest subjects: - kind: ServiceAccount name: cert-manager namespace: cert-manager --- # Source: cert-manager/templates/webhook-rbac.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: cert-manager-webhook:dynamic-serving namespace: cert-manager labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: cert-manager-webhook:dynamic-serving subjects: - kind: ServiceAccount name: cert-manager-webhook namespace: cert-manager --- # Source: cert-manager/templates/cainjector-service.yaml apiVersion: v1 kind: Service metadata: name: cert-manager-cainjector namespace: cert-manager labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" spec: type: ClusterIP ports: - protocol: TCP port: 9402 name: http-metrics selector: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" --- # Source: cert-manager/templates/service.yaml apiVersion: v1 kind: Service metadata: name: cert-manager namespace: cert-manager labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" spec: type: ClusterIP ports: - protocol: TCP port: 9402 name: tcp-prometheus-servicemonitor targetPort: http-metrics selector: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" --- # Source: cert-manager/templates/webhook-service.yaml apiVersion: v1 kind: Service metadata: name: cert-manager-webhook namespace: cert-manager labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" spec: type: ClusterIP ports: - name: https port: 443 protocol: TCP targetPort: "https" - name: metrics port: 9402 protocol: TCP targetPort: "http-metrics" selector: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" --- # Source: cert-manager/templates/cainjector-deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: cert-manager-cainjector namespace: cert-manager labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" spec: replicas: 1 selector: matchLabels: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" template: metadata: labels: app: cainjector app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" app.kubernetes.io/version: "v1.19.2" annotations: prometheus.io/path: "/metrics" prometheus.io/scrape: 'true' prometheus.io/port: '9402' spec: serviceAccountName: cert-manager-cainjector enableServiceLinks: false securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault containers: - name: cert-manager-cainjector image: "quay.io/jetstack/cert-manager-cainjector:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 - --leader-election-namespace=kube-system ports: - containerPort: 9402 name: http-metrics protocol: TCP env: - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true nodeSelector: kubernetes.io/os: "linux" --- # Source: cert-manager/templates/deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: cert-manager namespace: cert-manager labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" spec: replicas: 1 selector: matchLabels: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" template: metadata: labels: app: cert-manager app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" app.kubernetes.io/version: "v1.19.2" annotations: prometheus.io/path: "/metrics" prometheus.io/scrape: 'true' prometheus.io/port: '9402' spec: serviceAccountName: cert-manager enableServiceLinks: false securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault containers: - name: cert-manager-controller image: "quay.io/jetstack/cert-manager-controller:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 - --cluster-resource-namespace=$(POD_NAMESPACE) - --leader-election-namespace=kube-system - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.2 - --max-concurrent-challenges=60 ports: - containerPort: 9402 name: http-metrics protocol: TCP - containerPort: 9403 name: http-healthz protocol: TCP securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true env: - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace # LivenessProbe settings are based on those used for the Kubernetes # controller-manager. See: # https://github.com/kubernetes/kubernetes/blob/806b30170c61a38fedd54cc9ede4cd6275a1ad3b/cmd/kubeadm/app/util/staticpod/utils.go#L241-L245 livenessProbe: httpGet: port: http-healthz path: /livez scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 timeoutSeconds: 15 successThreshold: 1 failureThreshold: 8 nodeSelector: kubernetes.io/os: "linux" --- # Source: cert-manager/templates/webhook-deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: cert-manager-webhook namespace: cert-manager labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" spec: replicas: 1 selector: matchLabels: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" template: metadata: labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" annotations: prometheus.io/path: "/metrics" prometheus.io/scrape: 'true' prometheus.io/port: '9402' spec: serviceAccountName: cert-manager-webhook enableServiceLinks: false securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault containers: - name: cert-manager-webhook image: "quay.io/jetstack/cert-manager-webhook:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 - --secure-port=10250 - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE) - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca - --dynamic-serving-dns-names=cert-manager-webhook - --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE) - --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE).svc ports: - name: https protocol: TCP containerPort: 10250 - name: healthcheck protocol: TCP containerPort: 6080 - containerPort: 9402 name: http-metrics protocol: TCP livenessProbe: httpGet: path: /livez port: healthcheck scheme: HTTP initialDelaySeconds: 60 periodSeconds: 10 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 readinessProbe: httpGet: path: /healthz port: healthcheck scheme: HTTP initialDelaySeconds: 5 periodSeconds: 5 timeoutSeconds: 1 successThreshold: 1 failureThreshold: 3 securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true env: - name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace nodeSelector: kubernetes.io/os: "linux" --- # Source: cert-manager/templates/webhook-mutating-webhook.yaml apiVersion: admissionregistration.k8s.io/v1 kind: MutatingWebhookConfiguration metadata: name: cert-manager-webhook labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" annotations: cert-manager.io/inject-ca-from-secret: "ce**********ca" webhooks: - name: webhook.cert-manager.io rules: - apiGroups: - "cert-manager.io" apiVersions: - "v1" operations: - CREATE resources: - "certificaterequests" admissionReviewVersions: ["v1"] # This webhook only accepts v1 cert-manager resources. # Equivalent matchPolicy ensures that non-v1 resource requests are sent to # this webhook (after the resources have been converted to v1). matchPolicy: Equivalent timeoutSeconds: 30 failurePolicy: Fail # Only include 'sideEffects' field in Kubernetes 1.12+ sideEffects: None clientConfig: service: name: cert-manager-webhook namespace: cert-manager path: /mutate --- # Source: cert-manager/templates/webhook-validating-webhook.yaml apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: name: cert-manager-webhook labels: app: webhook app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" app.kubernetes.io/version: "v1.19.2" annotations: cert-manager.io/inject-ca-from-secret: "ce**********ca" webhooks: - name: webhook.cert-manager.io namespaceSelector: matchExpressions: - key: cert-manager.io/disable-validation operator: NotIn values: - "true" rules: - apiGroups: - "cert-manager.io" - "acme.cert-manager.io" apiVersions: - "v1" operations: - CREATE - UPDATE resources: - "*/*" admissionReviewVersions: ["v1"] # This webhook only accepts v1 cert-manager resources. # Equivalent matchPolicy ensures that non-v1 resource requests are sent to # this webhook (after the resources have been converted to v1). matchPolicy: Equivalent timeoutSeconds: 30 failurePolicy: Fail sideEffects: None clientConfig: service: name: cert-manager-webhook namespace: cert-manager path: /validate home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/0000755000175000017500000000000015133753356027311 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/namespace.yaml0000644000175000017500000000030115133730374032116 0ustar zuulzuulapiVersion: v1 kind: Namespace metadata: name: metallb-system labels: pod-security.kubernetes.io/enforce: privileged security.openshift.io/scc.podSecurityLabelSync: "false" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/0000755000175000017500000000000015133730374030724 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/0000755000175000017500000000000015133753356031335 5ustar zuulzuul././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddresspools.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/ipaddress0000644000175000017500000000145715133730504033233 0ustar zuulzuul--- apiVersion: metallb.io/v1beta1 kind: IPAddressPool metadata: namespace: metallb-system name: ctlplane spec: addresses: - 192.168.122.80-192.168.122.90 --- apiVersion: metallb.io/v1beta1 kind: IPAddressPool metadata: namespace: metallb-system name: internalapi spec: addresses: - 172.17.0.80-172.17.0.90 --- apiVersion: metallb.io/v1beta1 kind: IPAddressPool metadata: namespace: metallb-system name: storage spec: addresses: - 172.18.0.80-172.18.0.90 --- apiVersion: metallb.io/v1beta1 kind: IPAddressPool metadata: namespace: metallb-system name: tenant spec: addresses: - 172.19.0.80-172.19.0.90 --- apiVersion: metallb.io/v1beta1 kind: IPAddressPool metadata: namespace: metallb-system name: designateext spec: autoAssign: false addresses: - 172.50.0.80-172.50.0.90 ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2advertisement.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/l2adverti0000644000175000017500000000156115133730504033145 0ustar zuulzuul--- apiVersion: metallb.io/v1beta1 kind: L2Advertisement metadata: name: ctlplane namespace: metallb-system spec: ipAddressPools: - ctlplane interfaces: - ospbr --- apiVersion: metallb.io/v1beta1 kind: L2Advertisement metadata: name: internalapi namespace: metallb-system spec: ipAddressPools: - internalapi interfaces: - ens7.20 --- apiVersion: metallb.io/v1beta1 kind: L2Advertisement metadata: name: storage namespace: metallb-system spec: ipAddressPools: - storage interfaces: - ens7.21 --- apiVersion: metallb.io/v1beta1 kind: L2Advertisement metadata: name: tenant namespace: metallb-system spec: ipAddressPools: - tenant interfaces: - ens7.22 --- apiVersion: metallb.io/v1beta1 kind: L2Advertisement metadata: name: designateext namespace: metallb-system spec: ipAddressPools: - designateext interfaces: - ens7.26 ././@LongLink0000644000000000000000000000016000000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/deploy_operator.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/deploy_op0000644000175000017500000000026215133730375033246 0ustar zuulzuulapiVersion: metallb.io/v1beta1 kind: MetalLB metadata: name: metallb namespace: metallb-system spec: logLevel: debug nodeSelector: node-role.kubernetes.io/worker: "" ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpadvertisement.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpadvert0000644000175000017500000000037315133730504033227 0ustar zuulzuul--- apiVersion: metallb.io/v1beta1 kind: BGPAdvertisement metadata: name: bgpadvertisement namespace: metallb-system spec: ipAddressPools: - ctlplane - internalapi - storage - tenant - designateext peers: - bgp-peer - bgp-peer-2 ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpextras.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgpextras0000644000175000017500000000144315133730504033247 0ustar zuulzuul--- apiVersion: v1 kind: ConfigMap metadata: namespace: metallb-system name: bgpextras data: extras: | router bgp 64999 network 172.30.4.2/32 neighbor 100.65.4.1 allowas-in origin neighbor 100.64.4.1 allowas-in origin ! ip prefix-list osp permit 172.16.0.0/16 le 32 route-map 100.65.4.1-in permit 20 ! match ip address prefix-list osp set src 172.30.4.2 route-map 100.64.4.1-in permit 20 ! match ip address prefix-list osp set src 172.30.4.2 ip protocol bgp route-map 100.65.4.1-in ip protocol bgp route-map 100.64.4.1-in ip prefix-list ocp-lo permit 172.30.4.2/32 route-map 100.65.4.1-out permit 3 match ip address prefix-list ocp-lo route-map 100.64.4.1-out permit 3 match ip address prefix-list ocp-lo ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgppeers.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/metallb-system/metallb/cr/bgppeers.0000644000175000017500000000066615133746050033146 0ustar zuulzuul--- apiVersion: metallb.io/v1beta2 kind: BGPPeer metadata: name: bgp-peer namespace: metallb-system spec: myASN: 64999 peerASN: 64999 peerAddress: 100.65.4.1 password: f0**********rZ routerID: 172.30.4.2 --- apiVersion: metallb.io/v1beta2 kind: BGPPeer metadata: name: bgp-peer-2 namespace: metallb-system spec: myASN: 64999 peerASN: 64999 peerAddress: 100.64.4.1 password: f0**********rZ routerID: 172.30.4.2 home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/storage/0000755000175000017500000000000015133753356026013 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/storage/storage.yaml0000644000175000017500000001634015133730277030344 0ustar zuulzuul--- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage01-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv01 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage02-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv02 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage03-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv03 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage04-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv04 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage05-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv05 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage06-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv06 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage07-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv07 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage08-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv08 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage09-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv09 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage10-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv10 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage11-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv11 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] --- kind: PersistentVolume apiVersion: v1 metadata: name: local-storage12-crc annotations: pv.kubernetes.io/provisioned-by: cifmw labels: provisioned-by: cifmw spec: storageClassName: local-storage capacity: storage: 10Gi accessModes: - ReadWriteOnce - ReadWriteMany - ReadOnlyMany persistentVolumeReclaimPolicy: Delete local: path: /mnt/openstack/pv12 type: DirectoryOrCreate volumeMode: Filesystem nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: [crc] home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/storage/storage-class.yaml0000644000175000017500000000030015133730265031431 0ustar zuulzuulallowVolumeExpansion: true apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: name: local-storage provisioner: kubernetes.io/no-provisioner volumeBindingMode: WaitForFirstConsumer home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/0000755000175000017500000000000015133753356026336 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/0000755000175000017500000000000015133731457030265 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/0000755000175000017500000000000015133753356030673 5ustar zuulzuul././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/25-nova-extra.confhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/25-nova-extr0000644000175000017500000000006115133731457032760 0ustar zuulzuul[libvirt] cpu_mode = custom cpu_models = Nehalem ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/dataplane.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/dataplane.ya0000644000175000017500000000617215133731457033163 0ustar zuulzuulapiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: name: network-config-template-ipam namespace: openstack --- apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: name: neutron-edpm-ipam namespace: openstack --- apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: name: edpm-deployment-ipam namespace: openstack spec: nodeSets: - openstack-edpm-ipam --- apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_FORCE_COLOR value: "True" networkAttachments: - ctlplane nodeTemplate: ansible: ansibleVars: edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_sshd_allowed_ranges: - 192.168.122.0/24 enable_debug: false gather_facts: false ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: edpm-compute-0 networks: - defaultRoute: true fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 preProvisioned: true services: - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/kustomizatio0000644000175000017500000000545115133731457033363 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: - ./dataplane.yaml namespace: openstack labels: - pairs: created-by: install_yamls patches: - patch: |- - op: replace path: /metadata/name value: edpm-deployment target: kind: OpenStackDataPlaneDeployment - patch: |- - op: replace path: /spec/preProvisioned value: true - op: replace path: /spec/nodes/edpm-compute-0/ansible/ansibleHost value: 192.168.122.100 - op: replace path: /spec/nodes/edpm-compute-0/networks value: - name: ctlplane subnetName: subnet1 defaultRoute: true fixedIP: 192.168.122.100 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 - op: add path: /spec/services/0 value: repo-setup - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/timesync_ntp_servers value: - {hostname: pool.ntp.org} - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/neutron_public_interface_name value: eth0 - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/registry_url value: quay.io/podified-antelope-centos9 - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/image_prefix value: openstack - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/image_tag value: c3923531bcda0b0811b2d5053f189beb - op: replace path: /spec/nodeTemplate/ansible/ansibleVars/edpm_sshd_allowed_ranges value: ['0.0.0.0/0'] - op: replace path: /spec/nodeTemplate/ansibleSSHPrivateKeySecret value: dataplane-ansible-ssh-private-key-secret - op: replace path: /spec/nodeTemplate/ansible/ansibleUser value: cloud-admin - op: replace path: /spec/tlsEnabled value: true - op: copy from: /spec/nodes/edpm-compute-0 path: /spec/nodes/edpm-compute-1 - op: replace path: /spec/nodes/edpm-compute-1/ansible/ansibleHost value: 192.168.122.101 - op: replace path: /spec/nodes/edpm-compute-1/hostName value: edpm-compute-1 - op: add path: /spec/nodes/edpm-compute-1/networks value: - name: CtlPlane subnetName: subnet1 defaultRoute: true fixedIP: 192.168.122.101 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 target: kind: OpenStackDataPlaneNodeSet configMapGenerator: - files: - 25-nova-extra.conf=/home/zuul/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/25-nova-extra.conf name: nova-extra-config options: disableNameSuffixHash: true ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustomization-result.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/dataplane/cr/cifmw-kustom0000644000175000017500000001456515133731462033250 0ustar zuulzuulapiVersion: v1 data: network_config_template: | --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic1 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} kind: ConfigMap metadata: labels: created-by: install_yamls name: network-config-template-ipam namespace: openstack --- apiVersion: v1 data: physical_bridge_name: br-ex public_interface_name: eth0 kind: ConfigMap metadata: labels: created-by: install_yamls name: neutron-edpm-ipam namespace: openstack --- apiVersion: v1 data: 25-nova-extra.conf: | [libvirt] cpu_mode = custom cpu_models = Nehalem kind: ConfigMap metadata: labels: created-by: install_yamls name: nova-extra-config namespace: openstack --- apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneDeployment metadata: labels: created-by: install_yamls name: edpm-deployment namespace: openstack spec: nodeSets: - openstack-edpm-ipam --- apiVersion: dataplane.openstack.org/v1beta1 kind: OpenStackDataPlaneNodeSet metadata: labels: created-by: install_yamls name: openstack-edpm-ipam namespace: openstack spec: env: - name: ANSIBLE_VERBOSITY value: "2" networkAttachments: - ctlplane nodeTemplate: ansible: ansibleUser: zuul ansibleVars: ctlplane_dns_nameservers: - 192.168.122.10 - 199.204.44.24 edpm_container_registry_insecure_registries: - 38.102.83.51:5001 edpm_network_config_debug: true edpm_network_config_template: |- --- {% set mtu_list = [ctlplane_mtu] %} {% for network in nodeset_networks %} {% set _ = mtu_list.append(lookup('vars', networks_lower[network] ~ '_mtu')) %} {%- endfor %} {% set min_viable_mtu = mtu_list | max %} network_config: - type: interface name: nic1 use_dhcp: true mtu: {{ min_viable_mtu }} - type: ovs_bridge name: {{ neutron_physical_bridge_name }} mtu: {{ min_viable_mtu }} use_dhcp: false dns_servers: {{ ctlplane_dns_nameservers }} domain: {{ dns_search_domains }} addresses: - ip_netmask: {{ ctlplane_ip }}/{{ ctlplane_cidr }} routes: {{ ctlplane_host_routes }} members: - type: interface name: nic2 mtu: {{ min_viable_mtu }} # force the MAC address of the bridge to this interface primary: true {% if edpm_network_config_nmstate | bool %} # this ovs_extra configuration fixes OSPRH-17551, but it will be not needed when FDP-1472 is resolved ovs_extra: - "set interface eth1 external-ids:ovn-egress-iface=true" {% endif %} {% for network in nodeset_networks %} - type: vlan mtu: {{ lookup('vars', networks_lower[network] ~ '_mtu') }} vlan_id: {{ lookup('vars', networks_lower[network] ~ '_vlan_id') }} addresses: - ip_netmask: {{ lookup('vars', networks_lower[network] ~ '_ip') }}/{{ lookup('vars', networks_lower[network] ~ '_cidr') }} routes: {{ lookup('vars', networks_lower[network] ~ '_host_routes') }} {% endfor %} edpm_nodes_validation_validate_controllers_icmp: false edpm_nodes_validation_validate_gateway_icmp: false edpm_os_net_config_mappings: net_config_data_lookup: edpm-compute: nic2: eth1 edpm_sshd_allowed_ranges: - 0.0.0.0/0 edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter enable_debug: false gather_facts: false image_prefix: openstack image_tag: c3923531bcda0b0811b2d5053f189beb neutron_public_interface_name: eth1 registry_url: quay.io/podified-antelope-centos9 timesync_ntp_servers: - hostname: pool.ntp.org ansibleVarsFrom: - configMapRef: name: network-config-template-ipam prefix: edpm_ - configMapRef: name: neutron-edpm-ipam prefix: neutron_ ansibleSSHPrivateKeySecret: dataplane-ansible-ssh-private-key-secret nodes: edpm-compute-0: ansible: ansibleHost: 192.168.122.100 hostName: compute-0 networks: - defaultRoute: false fixedIP: 192.168.122.100 name: ctlplane subnetName: subnet1 - name: internalapi subnetName: subnet1 - name: storage subnetName: subnet1 - name: tenant subnetName: subnet1 edpm-compute-1: ansible: ansibleHost: 192.168.122.101 hostName: compute-1 networks: - defaultRoute: false fixedIP: 192.168.122.101 name: CtlPlane subnetName: subnet1 - name: InternalApi subnetName: subnet1 - name: Storage subnetName: subnet1 - name: Tenant subnetName: subnet1 preProvisioned: true services: - repo-setup - redhat - bootstrap - download-cache - configure-network - validate-network - install-os - configure-os - ssh-known-hosts - run-os - reboot-os - install-certs - ovn - neutron-metadata - libvirt - nova - telemetry tlsEnabled: true home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/nncp/0000755000175000017500000000000015133730357027270 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/nncp/cr/0000755000175000017500000000000015133753356027700 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/nncp/cr/crc_nncp.yaml0000644000175000017500000000603615133730357032352 0ustar zuulzuulapiVersion: nmstate.io/v1 kind: NodeNetworkConfigurationPolicy metadata: labels: osp/interface: ens7 name: ens7-crc spec: desiredState: interfaces: - description: internalapi vlan interface name: ens7.20 state: up type: vlan vlan: base-iface: ens7 id: 20 reorder-headers: true ipv4: address: - ip: 172.17.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: storage vlan interface name: ens7.21 state: up type: vlan vlan: base-iface: ens7 id: 21 reorder-headers: true ipv4: address: - ip: 172.18.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: tenant vlan interface name: ens7.22 state: up type: vlan vlan: base-iface: ens7 id: 22 reorder-headers: true ipv4: address: - ip: 172.19.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: storagemgmt vlan interface name: ens7.23 state: up type: vlan vlan: base-iface: ens7 id: 23 reorder-headers: true ipv4: address: - ip: 172.20.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: Octavia vlan host interface name: ens7.24 state: up type: vlan vlan: base-iface: ens7 id: 24 - bridge: options: stp: enabled: false port: - name: ens7.24 description: Configuring bridge octbr mtu: 1500 name: octbr state: up type: linux-bridge - description: designate vlan interface name: ens7.25 state: up type: vlan vlan: base-iface: ens7 id: 25 reorder-headers: true ipv4: address: - ip: 172.28.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: designate external vlan interface name: ens7.26 state: up type: vlan vlan: base-iface: ens7 id: 26 reorder-headers: true ipv4: address: - ip: 172.50.0.5 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false - description: Configuring Bridge ospbr with interface ens7 name: ospbr mtu: 1500 type: linux-bridge state: up bridge: options: stp: enabled: false port: - name: ens7 vlan: {} ipv4: address: - ip: 192.168.122.10 prefix-length: 24 enabled: true dhcp: false ipv6: enabled: false nodeSelector: kubernetes.io/hostname: crc node-role.kubernetes.io/worker: "" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/0000755000175000017500000000000015133730673027432 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/0000755000175000017500000000000015133753356030041 5ustar zuulzuul././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/network_v1beta1_netconfig.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/network_v1beta1_0000644000175000017500000000263615133730676033146 0ustar zuulzuulapiVersion: network.openstack.org/v1beta1 kind: NetConfig metadata: name: netconfig spec: networks: - name: ctlplane dnsDomain: ctlplane.example.com subnets: - name: subnet1 allocationRanges: - end: 192.168.122.120 start: 192.168.122.100 - end: 192.168.122.200 start: 192.168.122.150 cidr: 192.168.122.0/24 gateway: 192.168.122.1 - name: internalapi dnsDomain: internalapi.example.com subnets: - name: subnet1 allocationRanges: - end: 172.17.0.250 start: 172.17.0.100 cidr: 172.17.0.0/24 vlan: 20 - name: external dnsDomain: external.example.com subnets: - name: subnet1 allocationRanges: - end: 10.0.0.250 start: 10.0.0.100 cidr: 10.0.0.0/24 gateway: 10.0.0.1 - name: storage dnsDomain: storage.example.com subnets: - name: subnet1 allocationRanges: - end: 172.18.0.250 start: 172.18.0.100 cidr: 172.18.0.0/24 vlan: 21 - name: storagemgmt dnsDomain: storagemgmt.example.com subnets: - name: subnet1 allocationRanges: - end: 172.20.0.250 start: 172.20.0.100 cidr: 172.20.0.0/24 vlan: 23 - name: tenant dnsDomain: tenant.example.com subnets: - name: subnet1 allocationRanges: - end: 172.19.0.250 start: 172.19.0.100 cidr: 172.19.0.0/24 vlan: 22 ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/kustomization.ya0000644000175000017500000000310215133730676033310 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: - ./network_v1beta1_netconfig.yaml - ./vlan-config.yaml namespace: openstack labels: - pairs: created-by: install_yamls patches: - patch: |- - op: replace path: /spec/secret value: osp-secret - op: replace path: /spec/storageClass value: "local-storage" - op: replace path: /spec/networks/0/mtu value: 1500 - op: replace path: /spec/networks/1/mtu value: 1500 - op: replace path: /spec/networks/2/mtu value: 1500 - op: replace path: /spec/networks/3/mtu value: 1500 - op: replace path: /spec/networks/4/mtu value: 1500 - op: replace path: /spec/networks/5/mtu value: 1500 target: kind: NetConfig replacements: - source: fieldPath: data.internalapi kind: ConfigMap name: vlan-config targets: - fieldPaths: - spec.networks.[name=internalapi].subnets.0.vlan select: kind: NetConfig - source: fieldPath: data.storage kind: ConfigMap name: vlan-config targets: - fieldPaths: - spec.networks.[name=storage].subnets.0.vlan select: kind: NetConfig - source: fieldPath: data.storagemgmt kind: ConfigMap name: vlan-config targets: - fieldPaths: - spec.networks.[name=storagemgmt].subnets.0.vlan select: kind: NetConfig - source: fieldPath: data.tenant kind: ConfigMap name: vlan-config targets: - fieldPaths: - spec.networks.[name=tenant].subnets.0.vlan select: kind: NetConfig home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/infra/cr/vlan-config.yaml0000644000175000017500000000027715133730676033136 0ustar zuulzuulapiVersion: v1 kind: ConfigMap metadata: annotations: config.kubernetes.io/local-config: "true" name: vlan-config data: internalapi: 20 storage: 21 storagemgmt: 23 tenant: 22 home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/0000755000175000017500000000000015133730557030323 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/0000755000175000017500000000000015133753356030731 5ustar zuulzuul././@LongLink0000644000000000000000000000023100000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/core_v1beta1_openstackcontrolplane_galera_network_isolation.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/core_v1beta10000644000175000017500000003215515133746050033126 0ustar zuulzuulapiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: name: openstack-galera-network-isolation spec: secret: os**********et storageClass: local-storage dns: template: override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer options: - key: server values: - 192.168.122.1 replicas: 1 cinder: apiOverride: route: {} template: databaseInstance: openstack secret: os**********et cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderScheduler: replicas: 1 cinderBackup: networkAttachments: - storage replicas: 0 # backend needs to be configured cinderVolumes: volume1: networkAttachments: - storage replicas: 0 # backend needs to be configured glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack storage: storageClass: "" storageRequest: 10G secret: os**********et keystoneEndpoint: default glanceAPIs: default: replicas: 1 override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer networkAttachments: - storage keystone: apiOverride: route: {} template: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer databaseInstance: openstack secret: os**********et galera: templates: openstack: storageRequest: 500M secret: os**********et replicas: 1 openstack-cell1: storageRequest: 500M secret: os**********et replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer databaseInstance: openstack secret: os**********et networkAttachments: - internalapi barbican: apiOverride: route: {} template: databaseInstance: openstack secret: os**********et barbicanAPI: replicas: 1 override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer barbicanWorker: replicas: 1 barbicanKeystoneListener: replicas: 1 horizon: apiOverride: route: {} template: replicas: 1 secret: os**********et nova: apiOverride: route: {} template: cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: replicas: 1 networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer manilaScheduler: replicas: 1 manilaShares: share1: replicas: 1 networkAttachments: - storage ovn: template: ovnDBCluster: ovndbcluster-nb: dbType: NB storageRequest: 10G networkAttachment: internalapi ovndbcluster-sb: dbType: SB storageRequest: 10G networkAttachment: internalapi ovnController: networkAttachment: tenant placement: apiOverride: route: {} template: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer databaseInstance: openstack secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et telemetry: enabled: true template: metricStorage: enabled: false monitoringStack: alertingEnabled: true scrapeInterval: 30s storage: strategy: persistent retention: 24h persistent: pvcStorageRequest: 10G autoscaling: enabled: false aodh: passwordSelectors: databaseAccount: aodh databaseInstance: openstack secret: os**********et heatInstance: heat ceilometer: enabled: true secret: os**********et logging: enabled: false ipaddr: 172.17.0.80 annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 port: 10514 cloNamespace: openshift-logging cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: "2024-11-18" version: v13 secret: name: cloudkitty-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftRing: ringReplicas: 1 swiftStorage: replicas: 1 networkAttachments: - storage swiftProxy: replicas: 1 override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer networkAttachments: - storage octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et redis: enabled: false designate: enabled: false apiOverride: route: {} template: databaseInstance: openstack secret: os**********et designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateCentral: replicas: 1 designateWorker: replicas: 1 networkAttachments: - designate designateProducer: replicas: 1 designateMdns: replicas: 1 networkAttachments: - designate designateBackendbind9: replicas: 1 storageClass: local-storage storageRequest: 10G networkAttachments: - designate ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomization.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/kustomizatio0000644000175000017500000000225015133730671033410 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: - ./core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml namespace: openstack labels: - pairs: created-by: install_yamls patches: - patch: |- - op: replace path: /spec/secret value: osp-secret - op: replace path: /spec/storageClass value: "local-storage" - op: replace path: /spec/galera/templates/openstack/storageRequest value: 10G - op: replace path: /spec/galera/templates/openstack-cell1/storageRequest value: 10G target: kind: OpenStackControlPlane - patch: |- apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: name: unused spec: ovn: template: ovnController: nicMappings: datacentre: ospbr target: kind: OpenStackControlPlane - patch: |- apiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: name: unused spec: dns: template: options: - key: server values: - 192.168.122.10 target: kind: OpenStackControlPlane ././@LongLink0000644000000000000000000000017000000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustom0000644000175000017500000003332015133746050033273 0ustar zuulzuulapiVersion: core.openstack.org/v1beta1 kind: OpenStackControlPlane metadata: labels: created-by: install_yamls name: controlplane namespace: openstack spec: barbican: apiOverride: route: {} template: barbicanAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 barbicanKeystoneListener: replicas: 1 barbicanWorker: replicas: 1 databaseInstance: openstack secret: os**********et cinder: apiOverride: route: {} template: cinderAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cinderBackup: networkAttachments: - storage replicas: 0 cinderScheduler: replicas: 1 cinderVolumes: volume1: networkAttachments: - storage replicas: 0 databaseInstance: openstack secret: os**********et designate: apiOverride: route: {} enabled: false template: databaseInstance: openstack designateAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer designateBackendbind9: networkAttachments: - designate replicas: 1 storageClass: local-storage storageRequest: 10G designateCentral: replicas: 1 designateMdns: networkAttachments: - designate replicas: 1 designateProducer: replicas: 1 designateWorker: networkAttachments: - designate replicas: 1 secret: os**********et dns: template: options: - key: server values: - 192.168.122.10 - key: no-negcache values: [] override: service: metadata: annotations: metallb.universe.tf/address-pool: ctlplane metallb.universe.tf/allow-shared-ip: ctlplane metallb.universe.tf/loadBalancerIPs: 192.168.122.80 spec: type: LoadBalancer replicas: 1 galera: templates: openstack: replicas: 1 secret: os**********et storageRequest: 10G openstack-cell1: replicas: 1 secret: os**********et storageRequest: 10G glance: apiOverrides: default: route: {} template: customServiceConfig: | [DEFAULT] enabled_backends = default_backend:swift [glance_store] default_backend = default_backend [default_backend] swift_store_create_container_on_put = True swift_store_auth_version = 3 swift_store_auth_address = {{ .KeystoneInternalURL }} swift_store_endpoint_type = internalURL swift_store_user = service:glance swift_store_key = {{ .ServicePassword }} databaseInstance: openstack glanceAPIs: default: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 keystoneEndpoint: default secret: os**********et storage: storageClass: "" storageRequest: 10G heat: apiOverride: route: {} cnfAPIOverride: route: {} enabled: false template: databaseInstance: openstack heatAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 heatEngine: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 secret: os**********et horizon: apiOverride: route: {} enabled: true template: memcachedInstance: memcached replicas: 1 secret: os**********et ironic: enabled: false template: databaseInstance: openstack ironicAPI: replicas: 1 ironicConductors: - replicas: 1 storageRequest: 10G ironicInspector: replicas: 1 ironicNeutronAgent: replicas: 1 secret: os**********et keystone: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et manila: apiOverride: route: {} template: databaseInstance: openstack manilaAPI: networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 manilaScheduler: replicas: 1 manilaShares: share1: networkAttachments: - storage replicas: 1 memcached: templates: memcached: replicas: 1 neutron: apiOverride: route: {} template: databaseInstance: openstack networkAttachments: - internalapi override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et nova: apiOverride: route: {} template: apiServiceTemplate: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer cellTemplates: cell0: cellDatabaseAccount: nova-cell0 cellDatabaseInstance: openstack cellMessageBusInstance: rabbitmq conductorServiceTemplate: replicas: 1 hasAPIAccess: true cell1: cellDatabaseAccount: nova-cell1 cellDatabaseInstance: openstack-cell1 cellMessageBusInstance: rabbitmq-cell1 conductorServiceTemplate: replicas: 1 hasAPIAccess: true metadataServiceTemplate: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et octavia: enabled: false template: databaseInstance: openstack octaviaAPI: replicas: 1 secret: os**********et ovn: template: ovnController: networkAttachment: tenant nicMappings: datacentre: ospbr ovnDBCluster: ovndbcluster-nb: dbType: NB networkAttachment: internalapi storageRequest: 10G ovndbcluster-sb: dbType: SB networkAttachment: internalapi storageRequest: 10G placement: apiOverride: route: {} template: databaseInstance: openstack override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer secret: os**********et rabbitmq: templates: rabbitmq: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.85 spec: type: LoadBalancer rabbitmq-cell1: override: service: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.86 spec: type: LoadBalancer redis: enabled: false secret: os**********et storageClass: local-storage swift: enabled: true proxyOverride: route: {} template: swiftProxy: networkAttachments: - storage override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 swiftRing: ringReplicas: 1 swiftStorage: networkAttachments: - storage replicas: 1 telemetry: enabled: true template: autoscaling: aodh: databaseAccount: aodh databaseInstance: openstack passwordSelectors: null secret: os**********et enabled: false heatInstance: heat ceilometer: enabled: true secret: os**********et cloudkitty: apiTimeout: 0 cloudKittyAPI: override: service: internal: metadata: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 spec: type: LoadBalancer replicas: 1 resources: {} tls: api: internal: {} public: {} caBundleSecretName: combined-ca-bundle cloudKittyProc: replicas: 1 resources: {} tls: caBundleSecretName: combined-ca-bundle databaseAccount: cloudkitty databaseInstance: openstack enabled: false memcachedInstance: memcached passwordSelector: aodhService: AodhPassword ceilometerService: CeilometerPassword cloudKittyService: CloudKittyPassword preserveJobs: false rabbitMqClusterName: rabbitmq s3StorageConfig: schemas: - effectiveDate: "2024-11-18" version: v13 secret: name: cloudkitty-loki-s3 type: s3 secret: os**********et serviceUser: cloudkitty storageClass: local-storage logging: annotations: metallb.universe.tf/address-pool: internalapi metallb.universe.tf/allow-shared-ip: internalapi metallb.universe.tf/loadBalancerIPs: 172.17.0.80 cloNamespace: openshift-logging enabled: false ipaddr: 172.17.0.80 port: 10514 metricStorage: customMonitoringStack: alertmanagerConfig: disabled: true prometheusConfig: enableRemoteWriteReceiver: true persistentVolumeClaim: resources: requests: storage: 20G replicas: 1 scrapeInterval: 30s resourceSelector: matchLabels: service: metricStorage retention: 24h enabled: true watcher: enabled: true template: decisionengineServiceTemplate: customServiceConfig: |- [watcher_cluster_data_model_collectors.compute] period = 60 [watcher_cluster_data_model_collectors.storage] period = 60 home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/namespace.yaml0000644000175000017500000000027415133731451031151 0ustar zuulzuulapiVersion: v1 kind: Namespace metadata: name: openstack labels: pod-security.kubernetes.io/enforce: privileged security.openshift.io/scc.podSecurityLabelSync: "false" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/cr/0000755000175000017500000000000015133730037026731 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/input/0000755000175000017500000000000015133753356027475 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/input/kustomization.yaml0000644000175000017500000000256115133746050033276 0ustar zuulzuulapiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization resources: labels: - pairs: created-by: install_yamls secretGenerator: - name: osp-secret literals: - AdminPassword=12**********78 - AodhPassword=12**********78 - BarbicanPassword=12**********78 - BarbicanSimpleCryptoKEK=sE**********U= - CeilometerPassword=12**********78 - CloudKittyPassword=12345678 - DbRootPassword=12**********78 - DatabasePassword=12**********78 - DesignatePassword=12**********78 - PlacementPassword=12**********78 - GlancePassword=12**********78 - NeutronPassword=12**********78 - CinderPassword=12**********78 - IronicPassword=12**********78 - IronicInspectorPassword=12**********78 - KeystoneOIDCClientSecret=COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f - KeystoneOIDCCryptoPassphrase=openstack - OctaviaPassword=12**********78 - OctaviaHeartbeatKey=12**********78 - NovaPassword=12**********78 - ManilaPassword=12**********78 - MetadataSecret=12**********42 - HeatPassword=12**********78 - HeatAuthEncryptionKey=76**********f0 - HeatStackDomainAdminPassword=12345678 - SwiftPassword=12345678 - WatcherPassword=12345678 - name: libvirt-secret literals: - LibvirtPassword=12**********78 - name: octavia-ca-passphrase literals: - server-ca-passphrase=12**********78 generatorOptions: disableNameSuffixHash: true labels: type: osp-secret home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/0000755000175000017500000000000015133730503030276 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/0000755000175000017500000000000015133753356030715 5ustar zuulzuul././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/ctlplane.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/ctlplane.yam0000644000175000017500000000064515133730503033221 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: ctlplane namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "ctlplane", "type": "macvlan", "master": "ospbr", "ipam": { "type": "whereabouts", "range": "192.168.122.0/24", "range_start": "192.168.122.30", "range_end": "192.168.122.70" } } ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/internalapi.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/internalapi.0000644000175000017500000000064415133730503033215 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: internalapi namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "internalapi", "type": "macvlan", "master": "ens7.20", "ipam": { "type": "whereabouts", "range": "172.17.0.0/24", "range_start": "172.17.0.30", "range_end": "172.17.0.70" } } home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/storage.yaml0000644000175000017500000000063415133730503033235 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: storage namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "storage", "type": "macvlan", "master": "ens7.21", "ipam": { "type": "whereabouts", "range": "172.18.0.0/24", "range_start": "172.18.0.30", "range_end": "172.18.0.70" } } home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/tenant.yaml0000644000175000017500000000063215133730503033060 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: tenant namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "tenant", "type": "macvlan", "master": "ens7.22", "ipam": { "type": "whereabouts", "range": "172.19.0.0/24", "range_start": "172.19.0.30", "range_end": "172.19.0.70" } } ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/datacentre.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/datacentre.y0000644000175000017500000000041615133730503033207 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: datacentre namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "datacentre", "type": "bridge", "bridge": "ospbr", "ipam": {} } ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/storagemgmt.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/storagemgmt.0000644000175000017500000000064415133730503033240 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: storagemgmt namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "storagemgmt", "type": "macvlan", "master": "ens7.23", "ipam": { "type": "whereabouts", "range": "172.20.0.0/24", "range_start": "172.20.0.30", "range_end": "172.20.0.70" } } home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/octavia.yaml0000644000175000017500000000103315133730503033211 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: octavia namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "octavia", "type": "bridge", "bridge": "octbr", "ipam": { "type": "whereabouts", "range": "172.23.0.0/24", "range_start": "172.23.0.30", "range_end": "172.23.0.70", "routes": [ { "dst": "172.24.0.0/16", "gw" : "172.23.0.150" } ] } } ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/designate.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/designate.ya0000644000175000017500000000064015133730503033200 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: designate namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "designate", "type": "macvlan", "master": "ens7.25", "ipam": { "type": "whereabouts", "range": "172.28.0.0/24", "range_start": "172.28.0.30", "range_end": "172.28.0.70" } } ././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/designateext.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack/netattach/cr/designateext0000644000175000017500000000064515133730503033316 0ustar zuulzuulapiVersion: k8s.cni.cncf.io/v1 kind: NetworkAttachmentDefinition metadata: name: designateext namespace: openstack spec: config: | { "cniVersion": "0.3.1", "name": "designatext", "type": "macvlan", "master": "ens7.26", "ipam": { "type": "whereabouts", "range": "172.50.0.0/24", "range_start": "172.50.0.30", "range_end": "172.50.0.70" } } home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/0000755000175000017500000000000015133753356030017 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/0000755000175000017500000000000015133730305031457 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr/0000755000175000017500000000000015133753356032076 5ustar zuulzuul././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr/deploy_operator.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/nmstate/cr/deploy0000644000175000017500000000010215133730305033273 0ustar zuulzuulapiVersion: nmstate.io/v1 kind: NMState metadata: name: nmstate home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openshift-nmstate/namespace.yaml0000644000175000017500000000030415133730304032620 0ustar zuulzuulapiVersion: v1 kind: Namespace metadata: name: openshift-nmstate labels: pod-security.kubernetes.io/enforce: privileged security.openshift.io/scc.podSecurityLabelSync: "false" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/0000755000175000017500000000000015133753356030352 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/0000755000175000017500000000000015133730504032327 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/0000755000175000017500000000000015133753356032757 5ustar zuulzuul././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/operatorgroup.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/op0000644000175000017500000000016515133730504033310 0ustar zuulzuulapiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: openstack namespace: openstack-operators ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/catalogsource.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/ca0000644000175000017500000000043015133730504033250 0ustar zuulzuulapiVersion: operators.coreos.com/v1alpha1 kind: CatalogSource metadata: name: openstack-operator-index namespace: openstack-operators spec: image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd sourceType: grpc ././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/subscription.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/openstack/op/su0000644000175000017500000000037715133730504033326 0ustar zuulzuulapiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: openstack-operator namespace: openstack-operators spec: name: openstack-operator channel: alpha source: openstack-operator-index sourceNamespace: openstack-operators home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/infra/0000755000175000017500000000000015133730673031446 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/infra/op/0000755000175000017500000000000015133730673032064 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/0000755000175000017500000000000015133730374031765 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op/0000755000175000017500000000000015133753356032410 5ustar zuulzuul././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op/operatorgroup.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op/oper0000644000175000017500000000016715133730375033300 0ustar zuulzuulapiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: name: metallb-operator namespace: metallb-system ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op/subscription.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/metallb/op/subs0000644000175000017500000000036515133730375033307 0ustar zuulzuulapiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: name: metallb-operator-sub namespace: metallb-system spec: channel: stable name: metallb-operator source: redhat-operators sourceNamespace: openshift-marketplace home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/namespace.yaml0000644000175000017500000000030615133730504033157 0ustar zuulzuulapiVersion: v1 kind: Namespace metadata: name: openstack-operators labels: pod-security.kubernetes.io/enforce: privileged security.openshift.io/scc.podSecurityLabelSync: "false" home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/0000755000175000017500000000000015133730305032012 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op/0000755000175000017500000000000015133753356032443 5ustar zuulzuul././@LongLink0000644000000000000000000000016300000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op/operatorgroup.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op/oper0000644000175000017500000000041715133730305033322 0ustar zuulzuulapiVersion: operators.coreos.com/v1 kind: OperatorGroup metadata: annotations: olm.providedAPIs: NMState.v1.nmstate.io generateName: openshift-nmstate- name: openshift-nmstate-tn6k8 namespace: openshift-nmstate spec: targetNamespaces: - openshift-nmstate ././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op/subscription.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/openstack-operators/nmstate/op/subs0000644000175000017500000000060015133730305033323 0ustar zuulzuulapiVersion: operators.coreos.com/v1alpha1 kind: Subscription metadata: labels: operators.coreos.com/kubernetes-nmstate-operator.openshift-nmstate: "" name: kubernetes-nmstate-operator namespace: openshift-nmstate spec: channel: stable installPlanApproval: Automatic name: kubernetes-nmstate-operator source: redhat-operators sourceNamespace: openshift-marketplace home/zuul/zuul-output/logs/ci-framework-data/artifacts/manifests/update_containers.yml0000644000175000017500000000073315133730700030570 0ustar zuulzuulapiVersion: core.openstack.org/v1beta1 kind: OpenStackVersion metadata: name: controlplane namespace: openstack spec: customContainerImages: watcherAPIImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-watcher-api:watcher_latest watcherApplierImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-watcher-applier:watcher_latest watcherDecisionEngineImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-watcher-decision-engine:watcher_latest home/zuul/zuul-output/logs/ci-framework-data/artifacts/post_infra_fetch_nodes_facts_and_save_the.yml0000644000175000017500000000053115133730200033444 0ustar zuulzuulcifmw_edpm_deploy_extra_vars: DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_SINGLE_NODE: 'false' DATAPLANE_SSHD_ALLOWED_RANGES: '[''0.0.0.0/0'']' DATAPLANE_TOTAL_NODES: 2 SSH_KEY_FILE: /home/zuul/.ssh/id_cifw cifmw_edpm_prepare_extra_vars: NETWORK_MTU: 1500 NNCP_DNS_SERVER: 192.168.122.10 NNCP_INTERFACE: ens7 home/zuul/zuul-output/logs/ci-framework-data/artifacts/test-operator-crs/0000755000175000017500000000000015133753356025753 5ustar zuulzuul././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/test-operator-crs/tempest-tests-tempest-log-pod.yamlhome/zuul/zuul-output/logs/ci-framework-data/artifacts/test-operator-crs/tempest-tests-tempest-log-p0000644000175000017500000000102315133740572033202 0ustar zuulzuulapiVersion: v1 kind: Pod metadata: name: test-operator-logs-pod-tempest-tempest-tests-tempest namespace: openstack spec: containers: - args: - infinity command: - sleep image: quay.io/quay/busybox name: test-operator-logs-container volumeMounts: - mountPath: /mnt/logs-tempest-tests-tempest-step-0 name: logs-volume-0 volumes: - name: logs-volume-0 persistentVolumeClaim: claimName: tempest-tests-tempest-0-80b87 home/zuul/zuul-output/logs/ci-framework-data/artifacts/test-operator-crs/tempest-tests-tempest.yaml0000644000175000017500000000700015133734445033132 0ustar zuulzuulapiVersion: test.openstack.org/v1beta1 kind: Tempest metadata: name: tempest-tests-tempest namespace: openstack spec: SELinuxLevel: s0:c478,c978 SSHKeySecretName: test-operator-controller-priv-key cleanup: false containerImage: 38.102.83.51:5001/podified-epoxy-centos9/openstack-tempest-all:watcher_latest debug: false networkAttachments: [] privileged: true rerunFailedTests: false rerunOverrideStatus: false resources: limits: {} requests: {} storageClass: local-storage tempestRun: concurrency: 1 excludeList: 'watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* ' expectedFailuresList: ' ' externalPlugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git extraImages: [] extraRPMs: [] includeList: 'watcher_tempest_plugin.* ' tempestconfRun: deployerInput: '[auth] tempest_roles = [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true [compute-feature-enabled] dhcp_domain = '''' [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false [volume] catalog_type = volumev3 ' overrides: "compute.min_microversion 2.56\ncompute.min_compute_nodes 2\nplacement.min_microversion 1.29\ncompute-feature-enabled.live_migration true\ncompute-feature-enabled.block_migration_for_live_migration true\nservice_available.sg_core true\ntelemetry_services.metric_backends prometheus\ntelemetry.disable_ssl_certificate_validation true\ntelemetry.ceilometer_polling_interval 15\noptimize.min_microversion 1.0\noptimize.max_microversion 1.4\noptimize.datasource prometheus\noptimize.openstack_type podified\noptimize.proxy_host_address 38.102.83.129\noptimize.proxy_host_user zuul\noptimize.prometheus_host metric-storage-prometheus.openstack.svc\noptimize.prometheus_ssl_enabled true\noptimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle\noptimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig\noptimize.podified_namespace openstack\noptimize.run_continuous_audit_tests true\n whitebox_neutron_plugin_options.proxy_host_address 38.102.83.129" workflow: [] home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_000_run_hook_without_retry.sh0000644000175000017500000000161115133730047032153 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/pre_infra_download_needed_tools.log" ansible-playbook -i localhost, -c local -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=pre_infra" -e "hook_name=download_needed_tools" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_015_run_hook_without_retry_patch.sh0000644000175000017500000000206215133734376033352 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_015_run_hook_without_retry_patch.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/post_deploy_patch_openstack_prometheus_to_.log" ansible-playbook -i /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=post_deploy" -e "hook_name=patch_openstack_prometheus_to_" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks" /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_001_fetch_openshift.sh0000644000175000017500000000032515133730121030462 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log) 2>&1 oc login -u kubeadmin -p 123456789 --insecure-skip-tls-verify=true api.crc.testing:6443 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_002_run_hook_without_retry_fetch.sh0000644000175000017500000000205415133730162033326 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/post_infra_fetch_nodes_facts_and_save_the.log" ansible-playbook -i /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=post_infra" -e "hook_name=fetch_nodes_facts_and_save_the" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks" /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks/fetch_compute_facts.yml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_003_run_hook_without_retry_80.sh0000644000175000017500000000204115133730205032457 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_80.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/pre_deploy_80_kustomize_openstack_cr.log" ansible-playbook -i /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=pre_deploy" -e "hook_name=80_kustomize_openstack_cr" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks" /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks/control_plane_horizon.yml ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_004_run_hook_without_retry_create.shhome/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_004_run_hook_without_retry_create.s0000644000175000017500000000206415133730210033325 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_004_run_hook_without_retry_create.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/pre_deploy_create_coo_subscription.log" ansible-playbook -i /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=pre_deploy" -e "hook_name=create_coo_subscription" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks" /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_006_run.sh0000644000175000017500000000177615133730303026140 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_006_run.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export NETWORK_MTU="1500" export NNCP_DNS_SERVER="192.168.122.10" export NNCP_INTERFACE="ens7" export OPENSTACK_IMG="38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd" make openstack popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_007_run_openstack.sh0000644000175000017500000000161215133730546030206 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_007_run_openstack.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export NETWORK_MTU="1500" export NNCP_DNS_SERVER="192.168.122.10" export NNCP_INTERFACE="ens7" make openstack_init popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_005_run.sh0000644000175000017500000000156715133730301026133 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_005_run.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export NETWORK_MTU="1500" export NNCP_DNS_SERVER="192.168.122.10" export NNCP_INTERFACE="ens7" make input popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_012_run_edpm_deploy.sh0000644000175000017500000000235015133731451030510 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_012_run_edpm_deploy.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export DATAPLANE_REGISTRY_URL="quay.io/podified-antelope-centos9" export DATAPLANE_CONTAINER_TAG="c3923531bcda0b0811b2d5053f189beb" export DATAPLANE_COMPUTE_IP="192.168.122.100" export DATAPLANE_SINGLE_NODE="false" export DATAPLANE_SSHD_ALLOWED_RANGES="['0.0.0.0/0']" export DATAPLANE_TOTAL_NODES="2" export SSH_KEY_FILE="/home/zuul/.ssh/id_cifw" export DATAPLANE_EXTRA_NOVA_CONFIG_FILE="/home/zuul/ci-framework-data/nova-extra-config.conf" make edpm_deploy_prep popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_009_run_netconfig.sh0000644000175000017500000000161415133730671030176 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_009_run_netconfig.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export NETWORK_MTU="1500" export NNCP_DNS_SERVER="192.168.122.10" export NNCP_INTERFACE="ens7" make netconfig_deploy popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_016_check_for_oc.sh0000644000175000017500000000020715133740625027735 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_016_check_for_oc.log) 2>&1 command -v oc home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_017_run_openstack_must_gather.sh0000644000175000017500000000135115133740626032611 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_017_run_openstack_must_gather.log) 2>&1 timeout 2700.0 oc adm must-gather --image quay.io/openstack-k8s-operators/openstack-must-gather:latest --timeout 30m --host-network=False --dest-dir /home/zuul/ci-framework-data/logs/openstack-must-gather --volume-percentage=80 -- ADDITIONAL_NAMESPACES=kuttl,openshift-storage,openshift-marketplace,openshift-operators,sushy-emulator,tobiko OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1 || { rc=$? if [ $rc -eq 124 ]; then echo "The must gather command did not finish on time!" echo "2700.0 seconds was not enough to finish the task." fi } home/zuul/zuul-output/logs/ci-framework-data/artifacts/zuul_inventory.yml0000644000175000017500000016460415133746046026226 0ustar zuulzuulall: children: computes: hosts: compute-0: null compute-1: null ocps: hosts: crc: null zuul_unreachable: hosts: {} hosts: compute-0: ansible_connection: ssh ansible_host: 38.102.83.181 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 4a97dc24-4ca7-40a1-a947-14cb9a360e7a host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.181 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.181 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.181 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false compute-1: ansible_connection: ssh ansible_host: 38.102.83.192 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 140c3cf9-9c81-4398-b693-267e7839c148 host_id: 5519e7a0ee5dc826795d295efc9c908d171b61deb9bf71b1016f861f interface_ip: 38.102.83.192 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.192 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.192 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false controller: ansible_connection: ssh ansible_host: 38.102.83.129 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 783ff1ec-2d67-41d5-bd30-0d300b3a9326 host_id: 511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b interface_ip: 38.102.83.129 label: cloud-centos-9-stream-tripleo-vexxhost-medium private_ipv4: 38.102.83.129 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.129 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false crc: ansible_connection: ssh ansible_host: 38.102.83.143 ansible_port: 22 ansible_python_interpreter: auto ansible_user: core cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 9bcd4f67-9f17-42a8-8b89-21971da88d3d host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.143 label: crc-cloud-ocp-4-18-1-3xl private_ipv4: 38.102.83.143 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.143 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false localhost: ansible_connection: local vars: cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n \ spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_log_collection: false home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_000_check_for_oc.sh0000644000175000017500000000020715133746122027724 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_000_check_for_oc.log) 2>&1 command -v oc home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_013_run_nova_manage_discover.sh0000644000175000017500000000035715133734331032366 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_013_run_nova_manage_discover.log) 2>&1 set -xe oc rsh --namespace=openstack nova-cell0-conductor-0 nova-manage cell_v2 discover_hosts --verbose home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_014_run_hook_without_retry.sh0000644000175000017500000000203315133734336032164 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_014_run_hook_without_retry.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/post_deploy_download_needed_tools.log" ansible-playbook -i /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=post_deploy" -e "hook_name=download_needed_tools" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup" /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_000_run_openstack_must_gather.sh0000644000175000017500000000135115133746123032577 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_000_run_openstack_must_gather.log) 2>&1 timeout 2700.0 oc adm must-gather --image quay.io/openstack-k8s-operators/openstack-must-gather:latest --timeout 30m --host-network=False --dest-dir /home/zuul/ci-framework-data/logs/openstack-must-gather --volume-percentage=80 -- ADDITIONAL_NAMESPACES=kuttl,openshift-storage,openshift-marketplace,openshift-operators,sushy-emulator,tobiko OPENSTACK_DATABASES=$OPENSTACK_DATABASES SOS_EDPM=$SOS_EDPM SOS_DECOMPRESS=$SOS_DECOMPRESS gather 2>&1 || { rc=$? if [ $rc -eq 124 ]; then echo "The must gather command did not finish on time!" echo "2700.0 seconds was not enough to finish the task." fi } home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible-vars.yml0000644000175000017500000205557315133753356025510 0ustar zuulzuul_included_dir: changed: false failed: false stat: atime: 1768934438.4411244 attr_flags: '' attributes: [] block_size: 4096 blocks: 0 charset: binary ctime: 1768934440.3731847 dev: 64513 device_type: 0 executable: true exists: true gid: 1000 gr_name: zuul inode: 75563390 isblk: false ischr: false isdir: true isfifo: false isgid: false islnk: false isreg: false issock: false isuid: false mimetype: inode/directory mode: '0755' mtime: 1768934440.3731847 nlink: 2 path: /home/zuul/ci-framework-data/artifacts/parameters pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 120 uid: 1000 version: '2336304882' wgrp: false woth: false writeable: true wusr: true xgrp: true xoth: true xusr: true _included_file: changed: false failed: false stat: atime: 1768934440.3721848 attr_flags: '' attributes: [] block_size: 4096 blocks: 8 charset: us-ascii checksum: 87ed6d487601b00ccc922f0e1aa924de8578aeec ctime: 1768934436.7920728 dev: 64513 device_type: 0 executable: false exists: true gid: 1000 gr_name: zuul inode: 33722741 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mimetype: text/plain mode: '0644' mtime: 1768927316.0589194 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 280 uid: 1000 version: '364504769' wgrp: false woth: false writeable: true wusr: true xgrp: false xoth: false xusr: false _parsed_vars: changed: false content: Y2lmbXdfb3BlbnNoaWZ0X2FwaTogYXBpLmNyYy50ZXN0aW5nOjY0NDMKY2lmbXdfb3BlbnNoaWZ0X2NvbnRleHQ6IGRlZmF1bHQvYXBpLWNyYy10ZXN0aW5nOjY0NDMva3ViZWFkbWluCmNpZm13X29wZW5zaGlmdF9rdWJlY29uZmlnOiAvaG9tZS96dXVsLy5jcmMvbWFjaGluZXMvY3JjL2t1YmVjb25maWcKY2lmbXdfb3BlbnNoaWZ0X3Rva2VuOiBzaGEyNTZ+Y0VPVnpEUi0zMzY0ZVNQQVIyZ1FINkxkZGlsb0g5ekRJVVlpNHY4Z0ZocwpjaWZtd19vcGVuc2hpZnRfdXNlcjoga3ViZWFkbWluCg== encoding: base64 failed: false source: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml _tmp_dir: changed: true failed: false gid: 10001 group: zuul mode: '0700' owner: zuul path: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/tmp/ansible.xcfw51d4 size: 40 state: directory uid: 10001 _yaml_files: changed: false examined: 4 failed: false files: - atime: 1768934440.350184 ctime: 1768934440.3571842 dev: 64513 gid: 0 gr_name: root inode: 75581130 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3571842 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml pw_name: root rgrp: true roth: true rusr: true size: 20448 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3571842 ctime: 1768934440.3681846 dev: 64513 gid: 0 gr_name: root inode: 75581131 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3681846 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml pw_name: root rgrp: true roth: true rusr: true size: 28303 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3691845 ctime: 1768934440.3721848 dev: 64513 gid: 0 gr_name: root inode: 75581132 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3721848 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml pw_name: root rgrp: true roth: true rusr: true size: 9284 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3721848 ctime: 1768934436.7920728 dev: 64513 gid: 1000 gr_name: zuul inode: 33722741 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768927316.0589194 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml pw_name: zuul rgrp: true roth: true rusr: true size: 280 uid: 1000 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false matched: 4 msg: All paths examined skipped_paths: {} ansible_all_ipv4_addresses: - 38.102.83.129 ansible_all_ipv6_addresses: - fe80::f816:3eff:fe17:b3c5 ansible_apparmor: status: disabled ansible_architecture: x86_64 ansible_bios_date: 04/01/2014 ansible_bios_vendor: SeaBIOS ansible_bios_version: 1.15.0-1 ansible_board_asset_tag: NA ansible_board_name: NA ansible_board_serial: NA ansible_board_vendor: NA ansible_board_version: NA ansible_chassis_asset_tag: NA ansible_chassis_serial: NA ansible_chassis_vendor: QEMU ansible_chassis_version: pc-i440fx-6.2 ansible_check_mode: false ansible_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_collection_name: null ansible_config_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/ansible.cfg ansible_connection: ssh ansible_date_time: date: '2026-01-20' day: '20' epoch: '1768934466' epoch_int: '1768934466' hour: '18' iso8601: '2026-01-20T18:41:06Z' iso8601_basic: 20260120T184106594376 iso8601_basic_short: 20260120T184106 iso8601_micro: '2026-01-20T18:41:06.594376Z' minute: '41' month: '01' second: '06' time: '18:41:06' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' ansible_default_ipv4: address: 38.102.83.129 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:17:b3:c5 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether ansible_default_ipv6: {} ansible_dependent_role_names: [] ansible_device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-08-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-08-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '83883999' sectorsize: 512 size: 40.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '83886080' sectorsize: '512' size: 40.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 ansible_diff_mode: false ansible_distribution: CentOS ansible_distribution_file_parsed: true ansible_distribution_file_path: /etc/centos-release ansible_distribution_file_variety: CentOS ansible_distribution_major_version: '9' ansible_distribution_release: Stream ansible_distribution_version: '9' ansible_dns: nameservers: - 192.168.122.10 - 199.204.44.24 - 199.204.47.54 ansible_domain: '' ansible_effective_group_id: 1000 ansible_effective_user_id: 1000 ansible_env: ANSIBLE_LOG_PATH: /home/zuul/ci-framework-data/logs/e2e-collect-logs-must-gather.log BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 40844 22 SSH_CONNECTION: 38.102.83.114 40844 38.102.83.129 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '72' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f ansible_eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.129 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe17:b3c5 prefix: '64' scope: link macaddress: fa:16:3e:17:b3:c5 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether ansible_facts: _ansible_facts_gathered: true all_ipv4_addresses: - 38.102.83.129 all_ipv6_addresses: - fe80::f816:3eff:fe17:b3c5 ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 crc_ci_bootstrap_instance_default_net_config: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true crc_ci_bootstrap_instance_nm_vlan_networks: - key: internal-api value: ip: 172.17.0.5 - key: storage value: ip: 172.18.0.5 - key: tenant value: ip: 172.19.0.5 crc_ci_bootstrap_instance_parent_port_create_yaml: admin_state_up: true allowed_address_pairs: [] binding_host_id: null binding_profile: {} binding_vif_details: {} binding_vif_type: null binding_vnic_type: normal created_at: '2026-01-20T16:29:40Z' data_plane_status: null description: '' device_id: '' device_owner: '' device_profile: null dns_assignment: - fqdn: host-192-168-122-10.openstacklocal. hostname: host-192-168-122-10 ip_address: 192.168.122.10 dns_domain: '' dns_name: '' extra_dhcp_opts: [] fixed_ips: - ip_address: 192.168.122.10 subnet_id: dec65eab-357c-4966-a142-c02fccf82d54 hardware_offload_type: null hints: '' id: c2f09d41-973e-44f3-b074-20dde6438c42 ip_allocation: immediate mac_address: fa:16:3e:b1:56:1a name: crc-9bcd4f67-9f17-42a8-8b89-21971da88d3d network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 numa_affinity_policy: null port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 propagate_uplink_status: null qos_network_policy_id: null qos_policy_id: null resource_request: null revision_number: 1 security_group_ids: [] status: DOWN tags: [] trunk_details: null trusted: null updated_at: '2026-01-20T16:29:40Z' crc_ci_bootstrap_network_name: zuul-ci-net-36ad0c27 crc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_private_net_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:04Z' description: '' dns_domain: '' id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 ipv4_address_scope: null ipv6_address_scope: null is_default: false is_vlan_qinq: null is_vlan_transparent: true l2_adjacency: true mtu: 1500 name: zuul-ci-net-36ad0c27 port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 provider:network_type: null provider:physical_network: null provider:segmentation_id: null qos_policy_id: null revision_number: 1 router:external: false segments: null shared: false status: ACTIVE subnets: [] tags: [] updated_at: '2026-01-20T16:28:05Z' crc_ci_bootstrap_private_router_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:10Z' description: '' enable_ndp_proxy: null external_gateway_info: null flavor_id: null id: 13dd31cb-de31-4e8f-a504-cc4d8127306d name: zuul-ci-subnet-router-36ad0c27 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 1 routes: [] status: ACTIVE tags: [] tenant_id: 4b633c451ac74233be3721a3635275e5 updated_at: '2026-01-20T16:28:10Z' crc_ci_bootstrap_private_subnet_create_yaml: allocation_pools: - end: 192.168.122.254 start: 192.168.122.2 cidr: 192.168.122.0/24 created_at: '2026-01-20T16:28:07Z' description: '' dns_nameservers: [] dns_publish_fixed_ip: null enable_dhcp: false gateway_ip: 192.168.122.1 host_routes: [] id: dec65eab-357c-4966-a142-c02fccf82d54 ip_version: 4 ipv6_address_mode: null ipv6_ra_mode: null name: zuul-ci-subnet-36ad0c27 network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 0 segment_id: null service_types: [] subnetpool_id: null tags: [] updated_at: '2026-01-20T16:28:07Z' crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 crc_ci_bootstrap_router_name: zuul-ci-subnet-router-36ad0c27 crc_ci_bootstrap_subnet_name: zuul-ci-subnet-36ad0c27 date_time: date: '2026-01-20' day: '20' epoch: '1768934466' epoch_int: '1768934466' hour: '18' iso8601: '2026-01-20T18:41:06Z' iso8601_basic: 20260120T184106594376 iso8601_basic_short: 20260120T184106 iso8601_micro: '2026-01-20T18:41:06.594376Z' minute: '41' month: '01' second: '06' time: '18:41:06' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.129 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:17:b3:c5 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-08-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-08-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '83883999' sectorsize: 512 size: 40.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '83886080' sectorsize: '512' size: 40.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3 distribution: CentOS distribution_file_parsed: true distribution_file_path: /etc/centos-release distribution_file_variety: CentOS distribution_major_version: '9' distribution_release: Stream distribution_version: '9' dns: nameservers: - 192.168.122.10 - 199.204.44.24 - 199.204.47.54 domain: '' effective_group_id: 1000 effective_user_id: 1000 env: ANSIBLE_LOG_PATH: /home/zuul/ci-framework-data/logs/e2e-collect-logs-must-gather.log BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 40844 22 SSH_CONNECTION: 38.102.83.114 40844 38.102.83.129 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '72' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.129 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe17:b3c5 prefix: '64' scope: link macaddress: fa:16:3e:17:b3:c5 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: controller gather_subset: - min hostname: controller hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d interfaces: - eth0 - lo is_chroot: false iscsi_iqn: '' kernel: 5.14.0-661.el9.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.03 1m: 0.1 5m: 0.07 locally_reachable_ips: ipv4: - 38.102.83.129 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe17:b3c5 lsb: {} lvm: N/A machine: x86_64 machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 memfree_mb: 3223 memory_mb: nocache: free: 3432 used: 223 real: free: 3223 total: 3655 used: 432 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 3655 module_setup: true mounts: - block_available: 9928903 block_size: 4096 block_total: 10469115 block_used: 540212 device: /dev/vda1 fstype: xfs inode_available: 20917098 inode_total: 20970992 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 40668786688 size_total: 42881495040 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 nodename: controller os_family: RedHat pkg_mgr: dnf proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 2 processor_nproc: 2 processor_threads_per_core: 1 processor_vcpus: 2 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 python_version: 3.9.25 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 235 user_dir: /home/zuul user_gecos: '' user_gid: 1000 user_id: zuul user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack zuul_change_list: - watcher-operator ansible_fibre_channel_wwn: [] ansible_fips: false ansible_forks: 5 ansible_form_factor: Other ansible_fqdn: controller ansible_host: 38.102.83.129 ansible_hostname: controller ansible_hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d ansible_interfaces: - eth0 - lo ansible_inventory_sources: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml ansible_is_chroot: false ansible_iscsi_iqn: '' ansible_kernel: 5.14.0-661.el9.x86_64 ansible_kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' ansible_lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback ansible_loadavg: 15m: 0.03 1m: 0.1 5m: 0.07 ansible_local: {} ansible_locally_reachable_ips: ipv4: - 38.102.83.129 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe17:b3c5 ansible_lsb: {} ansible_lvm: N/A ansible_machine: x86_64 ansible_machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 ansible_memfree_mb: 3223 ansible_memory_mb: nocache: free: 3432 used: 223 real: free: 3223 total: 3655 used: 432 swap: cached: 0 free: 0 total: 0 used: 0 ansible_memtotal_mb: 3655 ansible_mounts: - block_available: 9928903 block_size: 4096 block_total: 10469115 block_used: 540212 device: /dev/vda1 fstype: xfs inode_available: 20917098 inode_total: 20970992 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 40668786688 size_total: 42881495040 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_nodename: controller ansible_os_family: RedHat ansible_parent_role_names: - cifmw_setup ansible_parent_role_paths: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/roles/cifmw_setup ansible_pkg_mgr: dnf ansible_play_batch: &id002 - controller ansible_play_hosts: - controller ansible_play_hosts_all: - compute-0 - compute-1 - controller - crc ansible_play_name: Run ci/playbooks/e2e-collect-logs.yml ansible_play_role_names: &id003 - run_hook - os_must_gather - artifacts - env_op_images - run_hook - cifmw_setup ansible_playbook_python: /usr/lib/zuul/ansible/8/bin/python ansible_port: 22 ansible_proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor ansible_processor_cores: 1 ansible_processor_count: 2 ansible_processor_nproc: 2 ansible_processor_threads_per_core: 1 ansible_processor_vcpus: 2 ansible_product_name: OpenStack Nova ansible_product_serial: NA ansible_product_uuid: NA ansible_product_version: 26.3.1 ansible_python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 ansible_python_interpreter: auto ansible_python_version: 3.9.25 ansible_real_group_id: 1000 ansible_real_user_id: 1000 ansible_role_name: artifacts ansible_role_names: - artifacts - cifmw_setup - os_must_gather - run_hook - env_op_images ansible_run_tags: - all ansible_scp_extra_args: -o PermitLocalCommand=no ansible_selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted ansible_selinux_python_present: true ansible_service_mgr: systemd ansible_sftp_extra_args: -o PermitLocalCommand=no ansible_skip_tags: [] ansible_ssh_common_args: -o PermitLocalCommand=no ansible_ssh_executable: ssh ansible_ssh_extra_args: -o PermitLocalCommand=no ansible_ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68= ansible_ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ansible_ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD ansible_ssh_host_key_ed25519_public_keytype: ssh-ed25519 ansible_ssh_host_key_rsa_public: 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 ansible_ssh_host_key_rsa_public_keytype: ssh-rsa ansible_swapfree_mb: 0 ansible_swaptotal_mb: 0 ansible_system: Linux ansible_system_capabilities: - '' ansible_system_capabilities_enforced: 'True' ansible_system_vendor: OpenStack Foundation ansible_uptime_seconds: 235 ansible_user: zuul ansible_user_dir: /home/zuul ansible_user_gecos: '' ansible_user_gid: 1000 ansible_user_id: zuul ansible_user_shell: /bin/bash ansible_user_uid: 1000 ansible_userspace_architecture: x86_64 ansible_userspace_bits: '64' ansible_verbosity: 1 ansible_version: full: 2.15.12 major: 2 minor: 15 revision: 12 string: 2.15.12 ansible_virtualization_role: guest ansible_virtualization_tech_guest: - openstack ansible_virtualization_tech_host: - kvm ansible_virtualization_type: openstack cifmw_architecture_repo: /home/zuul/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_basedir: '{{ cifmw_basedir | default(ansible_user_dir ~ ''/ci-framework-data'') }}' cifmw_artifacts_crc_host: api.crc.testing cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_artifacts_crc_sshkey_ed25519: ~/.crc/machines/crc/id_ed25519 cifmw_artifacts_crc_user: core cifmw_artifacts_gather_logs: true cifmw_artifacts_mask_logs: true cifmw_basedir: /home/zuul/ci-framework-data cifmw_build_images_output: {} cifmw_config_certmanager: true cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_deploy_edpm: true cifmw_dlrn_report_result: false cifmw_edpm_deploy_nova_compute_extra_config: '[libvirt] cpu_mode = custom cpu_models = Nehalem ' cifmw_edpm_prepare_kustomizations: - apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: openstack patches: - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n \ ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n \ disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n \ storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n \ monitoringStack: null" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n \ decisionengineServiceTemplate:\n customServiceConfig: |\n \ [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60" target: kind: OpenStackControlPlane cifmw_edpm_prepare_skip_crc_storage_creation: true cifmw_edpm_prepare_timeout: 60 cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_env_op_images_dir: '{{ cifmw_basedir | default(ansible_user_dir ~ ''/ci-framework-data'') }}' cifmw_env_op_images_dryrun: false cifmw_env_op_images_file: operator_images.yaml cifmw_extras: - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: 12**********42 METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: 12**********78 PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator cifmw_installyamls_repos: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_context: default/api-crc-testing:6443/kubeadmin cifmw_openshift_kubeconfig: /home/zuul/.crc/machines/crc/kubeconfig cifmw_openshift_password: 12**********89 cifmw_openshift_setup_skip_internal_registry: true cifmw_openshift_setup_skip_internal_registry_tls_verify: true cifmw_openshift_skip_tls_verify: true cifmw_openshift_token: sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_meta_name: openstack-operator cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_os_must_gather_additional_namespaces: kuttl,openshift-storage,openshift-marketplace,openshift-operators,sushy-emulator,tobiko cifmw_os_must_gather_dump_db: ALL cifmw_os_must_gather_host_network: false cifmw_os_must_gather_image: quay.io/openstack-k8s-operators/openstack-must-gather:latest cifmw_os_must_gather_image_push: true cifmw_os_must_gather_image_registry: quay.rdoproject.org/openstack-k8s-operators cifmw_os_must_gather_kubeconfig: '{{ ansible_user_dir }}/.kube/config' cifmw_os_must_gather_namespaces: - '{{ operator_namespace }}' - '{{ cifmw_openstack_namespace }}' - baremetal-operator-system - openshift-machine-api - cert-manager - openshift-nmstate - openshift-marketplace - metallb-system - crc-storage cifmw_os_must_gather_output_dir: '{{ cifmw_basedir | default(ansible_user_dir ~ ''/ci-framework-data'') }}' cifmw_os_must_gather_output_log_dir: '{{ cifmw_os_must_gather_output_dir }}/logs/openstack-must-gather' cifmw_os_must_gather_repo_path: '{{ ansible_user_dir }}/src/github.com/openstack-k8s-operators/openstack-must-gather' cifmw_os_must_gather_timeout: 30m cifmw_os_must_gather_volume_percentage: 80 cifmw_path: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin cifmw_repo: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_setup_dist_major_version: 9 cifmw_repo_setup_os_release: centos cifmw_run_hook_debug: '{{ (ansible_verbosity | int) >= 2 | bool }}' cifmw_run_test_role: test_operator cifmw_run_tests: true cifmw_status: changed: false failed: false stat: atime: 1768927196.3291223 attr_flags: '' attributes: [] block_size: 4096 blocks: 8 charset: binary ctime: 1768927186.1998007 dev: 64513 device_type: 0 executable: true exists: true gid: 1000 gr_name: zuul inode: 50348684 isblk: false ischr: false isdir: true isfifo: false isgid: false islnk: false isreg: false issock: false isuid: false mimetype: inode/directory mode: '0755' mtime: 1768927186.1998007 nlink: 21 path: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 4096 uid: 1000 version: '194530442' wgrp: false woth: false writeable: true wusr: true xgrp: true xoth: true xusr: true cifmw_success_flag: changed: false failed: false stat: atime: 1768931726.7502286 attr_flags: '' attributes: [] block_size: 4096 blocks: 0 charset: binary checksum: da39a3ee5e6b4b0d3255bfef95601890afd80709 ctime: 1768931718.9799838 dev: 64513 device_type: 0 executable: false exists: true gid: 1000 gr_name: zuul inode: 4413088 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mimetype: inode/x-empty mode: '0644' mtime: 1768931718.9799838 nlink: 1 path: /home/zuul/cifmw-success pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 0 uid: 1000 version: '64459933' wgrp: false woth: false writeable: true wusr: true xgrp: false xoth: false xusr: false cifmw_test_operator_tempest_concurrency: 1 cifmw_test_operator_tempest_exclude_list: 'watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* ' cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_include_list: 'watcher_tempest_plugin.* ' cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_test_operator_tempest_tempestconf_config: overrides: 'compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.129 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true ' cifmw_update_containers: true cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_crc: false cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_instance_default_net_config: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true crc_ci_bootstrap_instance_nm_vlan_networks: - key: internal-api value: ip: 172.17.0.5 - key: storage value: ip: 172.18.0.5 - key: tenant value: ip: 172.19.0.5 crc_ci_bootstrap_instance_parent_port_create_yaml: admin_state_up: true allowed_address_pairs: [] binding_host_id: null binding_profile: {} binding_vif_details: {} binding_vif_type: null binding_vnic_type: normal created_at: '2026-01-20T16:29:40Z' data_plane_status: null description: '' device_id: '' device_owner: '' device_profile: null dns_assignment: - fqdn: host-192-168-122-10.openstacklocal. hostname: host-192-168-122-10 ip_address: 192.168.122.10 dns_domain: '' dns_name: '' extra_dhcp_opts: [] fixed_ips: - ip_address: 192.168.122.10 subnet_id: dec65eab-357c-4966-a142-c02fccf82d54 hardware_offload_type: null hints: '' id: c2f09d41-973e-44f3-b074-20dde6438c42 ip_allocation: immediate mac_address: fa:16:3e:b1:56:1a name: crc-9bcd4f67-9f17-42a8-8b89-21971da88d3d network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 numa_affinity_policy: null port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 propagate_uplink_status: null qos_network_policy_id: null qos_policy_id: null resource_request: null revision_number: 1 security_group_ids: [] status: DOWN tags: [] trunk_details: null trusted: null updated_at: '2026-01-20T16:29:40Z' crc_ci_bootstrap_network_name: zuul-ci-net-36ad0c27 crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 crc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_private_net_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:04Z' description: '' dns_domain: '' id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 ipv4_address_scope: null ipv6_address_scope: null is_default: false is_vlan_qinq: null is_vlan_transparent: true l2_adjacency: true mtu: 1500 name: zuul-ci-net-36ad0c27 port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 provider:network_type: null provider:physical_network: null provider:segmentation_id: null qos_policy_id: null revision_number: 1 router:external: false segments: null shared: false status: ACTIVE subnets: [] tags: [] updated_at: '2026-01-20T16:28:05Z' crc_ci_bootstrap_private_router_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:10Z' description: '' enable_ndp_proxy: null external_gateway_info: null flavor_id: null id: 13dd31cb-de31-4e8f-a504-cc4d8127306d name: zuul-ci-subnet-router-36ad0c27 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 1 routes: [] status: ACTIVE tags: [] tenant_id: 4b633c451ac74233be3721a3635275e5 updated_at: '2026-01-20T16:28:10Z' crc_ci_bootstrap_private_subnet_create_yaml: allocation_pools: - end: 192.168.122.254 start: 192.168.122.2 cidr: 192.168.122.0/24 created_at: '2026-01-20T16:28:07Z' description: '' dns_nameservers: [] dns_publish_fixed_ip: null enable_dhcp: false gateway_ip: 192.168.122.1 host_routes: [] id: dec65eab-357c-4966-a142-c02fccf82d54 ip_version: 4 ipv6_address_mode: null ipv6_ra_mode: null name: zuul-ci-subnet-36ad0c27 network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 0 segment_id: null service_types: [] subnetpool_id: null tags: [] updated_at: '2026-01-20T16:28:07Z' crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 crc_ci_bootstrap_router_name: zuul-ci-subnet-router-36ad0c27 crc_ci_bootstrap_subnet_name: zuul-ci-subnet-36ad0c27 discovered_interpreter_python: /usr/bin/python3 enable_ramdisk: true environment: - ANSIBLE_LOG_PATH: '{{ ansible_user_dir }}/ci-framework-data/logs/e2e-collect-logs-must-gather.log' fetch_dlrn_hash: false gather_subset: - min group_names: - ungrouped groups: all: - compute-0 - compute-1 - controller - crc computes: - compute-0 - compute-1 ocps: - crc ungrouped: &id001 - controller zuul_unreachable: [] hostvars: compute-0: ansible_all_ipv4_addresses: - 38.102.83.181 ansible_all_ipv6_addresses: - fe80::f816:3eff:feae:a0a2 ansible_apparmor: status: disabled ansible_architecture: x86_64 ansible_bios_date: 04/01/2014 ansible_bios_vendor: SeaBIOS ansible_bios_version: 1.15.0-1 ansible_board_asset_tag: NA ansible_board_name: NA ansible_board_serial: NA ansible_board_vendor: NA ansible_board_version: NA ansible_chassis_asset_tag: NA ansible_chassis_serial: NA ansible_chassis_vendor: QEMU ansible_chassis_version: pc-i440fx-6.2 ansible_check_mode: false ansible_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_config_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/ansible.cfg ansible_connection: ssh ansible_date_time: date: '2026-01-20' day: '20' epoch: '1768926435' epoch_int: '1768926435' hour: '11' iso8601: '2026-01-20T16:27:15Z' iso8601_basic: 20260120T112715040113 iso8601_basic_short: 20260120T112715 iso8601_micro: '2026-01-20T16:27:15.040113Z' minute: '27' month: '01' second: '15' time: '11:27:15' tz: EST tz_dst: EDT tz_offset: '-0500' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' ansible_default_ipv4: address: 38.102.83.181 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:ae:a0:a2 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether ansible_default_ipv6: {} ansible_device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-37-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-37-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '167770079' sectorsize: 512 size: 80.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '167772160' sectorsize: '512' size: 80.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 ansible_diff_mode: false ansible_distribution: CentOS ansible_distribution_file_parsed: true ansible_distribution_file_path: /etc/centos-release ansible_distribution_file_variety: CentOS ansible_distribution_major_version: '9' ansible_distribution_release: Stream ansible_distribution_version: '9' ansible_dns: nameservers: - 199.204.44.24 - 199.204.47.54 search: - novalocal ansible_domain: '' ansible_effective_group_id: 1000 ansible_effective_user_id: 1000 ansible_env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 39478 22 SSH_CONNECTION: 38.102.83.114 39478 38.102.83.181 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '1' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f ansible_eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.181 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:feae:a0a2 prefix: '64' scope: link macaddress: fa:16:3e:ae:a0:a2 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether ansible_facts: _ansible_facts_gathered: true all_ipv4_addresses: - 38.102.83.181 all_ipv6_addresses: - fe80::f816:3eff:feae:a0a2 ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 date_time: date: '2026-01-20' day: '20' epoch: '1768926435' epoch_int: '1768926435' hour: '11' iso8601: '2026-01-20T16:27:15Z' iso8601_basic: 20260120T112715040113 iso8601_basic_short: 20260120T112715 iso8601_micro: '2026-01-20T16:27:15.040113Z' minute: '27' month: '01' second: '15' time: '11:27:15' tz: EST tz_dst: EDT tz_offset: '-0500' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.181 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:ae:a0:a2 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-37-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-37-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '167770079' sectorsize: 512 size: 80.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '167772160' sectorsize: '512' size: 80.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3 distribution: CentOS distribution_file_parsed: true distribution_file_path: /etc/centos-release distribution_file_variety: CentOS distribution_major_version: '9' distribution_release: Stream distribution_version: '9' dns: nameservers: - 199.204.44.24 - 199.204.47.54 search: - novalocal domain: '' effective_group_id: 1000 effective_user_id: 1000 env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 39478 22 SSH_CONNECTION: 38.102.83.114 39478 38.102.83.181 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '1' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.181 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:feae:a0a2 prefix: '64' scope: link macaddress: fa:16:3e:ae:a0:a2 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: compute-0 gather_subset: - all hostname: compute-0 hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d interfaces: - lo - eth0 is_chroot: false iscsi_iqn: '' kernel: 5.14.0-661.el9.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.09 1m: 0.23 5m: 0.2 locally_reachable_ips: ipv4: - 38.102.83.181 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:feae:a0a2 lsb: {} lvm: N/A machine: x86_64 machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 memfree_mb: 7127 memory_mb: nocache: free: 7335 used: 344 real: free: 7127 total: 7679 used: 552 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 7679 module_setup: true mounts: - block_available: 20341243 block_size: 4096 block_total: 20954875 block_used: 613632 device: /dev/vda1 fstype: xfs inode_available: 41888618 inode_total: 41942512 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 83317731328 size_total: 85831168000 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 nodename: compute-0 os_family: RedHat pkg_mgr: dnf proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 8 processor_nproc: 8 processor_threads_per_core: 1 processor_vcpus: 8 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 python_version: 3.9.25 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCe+qejRAlJDC5tpW9cL6IQbJ9X5gKDWSXERtfbJ2PwIcdLO/H8nHY/DCe7zGcKZFkXQZ5Lt1y4tqqAEA2e5Za8= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIN9tw2cXMe7fXZRFpGIaWJQmIWXbG+knVbPWXpNVXJR9 ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 209 user_dir: /home/zuul user_gecos: '' user_gid: 1000 user_id: zuul user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack ansible_fibre_channel_wwn: [] ansible_fips: false ansible_forks: 5 ansible_form_factor: Other ansible_fqdn: compute-0 ansible_host: 38.102.83.181 ansible_hostname: compute-0 ansible_hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d ansible_interfaces: - lo - eth0 ansible_inventory_sources: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml ansible_is_chroot: false ansible_iscsi_iqn: '' ansible_kernel: 5.14.0-661.el9.x86_64 ansible_kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' ansible_lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback ansible_loadavg: 15m: 0.09 1m: 0.23 5m: 0.2 ansible_local: {} ansible_locally_reachable_ips: ipv4: - 38.102.83.181 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:feae:a0a2 ansible_lsb: {} ansible_lvm: N/A ansible_machine: x86_64 ansible_machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 ansible_memfree_mb: 7127 ansible_memory_mb: nocache: free: 7335 used: 344 real: free: 7127 total: 7679 used: 552 swap: cached: 0 free: 0 total: 0 used: 0 ansible_memtotal_mb: 7679 ansible_mounts: - block_available: 20341243 block_size: 4096 block_total: 20954875 block_used: 613632 device: /dev/vda1 fstype: xfs inode_available: 41888618 inode_total: 41942512 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 83317731328 size_total: 85831168000 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_nodename: compute-0 ansible_os_family: RedHat ansible_pkg_mgr: dnf ansible_playbook_python: /usr/lib/zuul/ansible/8/bin/python ansible_port: 22 ansible_proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor ansible_processor_cores: 1 ansible_processor_count: 8 ansible_processor_nproc: 8 ansible_processor_threads_per_core: 1 ansible_processor_vcpus: 8 ansible_product_name: OpenStack Nova ansible_product_serial: NA ansible_product_uuid: NA ansible_product_version: 26.3.1 ansible_python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 ansible_python_interpreter: auto ansible_python_version: 3.9.25 ansible_real_group_id: 1000 ansible_real_user_id: 1000 ansible_run_tags: - all ansible_scp_extra_args: -o PermitLocalCommand=no ansible_selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted ansible_selinux_python_present: true ansible_service_mgr: systemd ansible_sftp_extra_args: -o PermitLocalCommand=no ansible_skip_tags: [] ansible_ssh_common_args: -o PermitLocalCommand=no ansible_ssh_executable: ssh ansible_ssh_extra_args: -o PermitLocalCommand=no ansible_ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCe+qejRAlJDC5tpW9cL6IQbJ9X5gKDWSXERtfbJ2PwIcdLO/H8nHY/DCe7zGcKZFkXQZ5Lt1y4tqqAEA2e5Za8= ansible_ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ansible_ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIN9tw2cXMe7fXZRFpGIaWJQmIWXbG+knVbPWXpNVXJR9 ansible_ssh_host_key_ed25519_public_keytype: ssh-ed25519 ansible_ssh_host_key_rsa_public: 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 ansible_ssh_host_key_rsa_public_keytype: ssh-rsa ansible_swapfree_mb: 0 ansible_swaptotal_mb: 0 ansible_system: Linux ansible_system_capabilities: - '' ansible_system_capabilities_enforced: 'True' ansible_system_vendor: OpenStack Foundation ansible_uptime_seconds: 209 ansible_user: zuul ansible_user_dir: /home/zuul ansible_user_gecos: '' ansible_user_gid: 1000 ansible_user_id: zuul ansible_user_shell: /bin/bash ansible_user_uid: 1000 ansible_userspace_architecture: x86_64 ansible_userspace_bits: '64' ansible_verbosity: 1 ansible_version: full: 2.15.12 major: 2 minor: 15 revision: 12 string: 2.15.12 ansible_virtualization_role: guest ansible_virtualization_tech_guest: - openstack ansible_virtualization_tech_host: - kvm ansible_virtualization_type: openstack cifmw_architecture_repo: /home/zuul/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_installyamls_repos: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: /home/zuul/.crc/machines/crc/kubeconfig cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_repo: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: vexxhost crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 discovered_interpreter_python: /usr/bin/python3 enable_ramdisk: true fetch_dlrn_hash: false gather_subset: - all group_names: - computes groups: all: - compute-0 - compute-1 - controller - crc computes: - compute-0 - compute-1 ocps: - crc ungrouped: *id001 zuul_unreachable: [] inventory_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0 inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml inventory_hostname: compute-0 inventory_hostname_short: compute-0 module_setup: true nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 4a97dc24-4ca7-40a1-a947-14cb9a360e7a host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.181 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.181 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.181 public_ipv6: '' region: RegionOne slot: null omit: __omit_place_holder__d5d9d83eed0c89a7bddc7d1578fe8f02e5a188ef operator_namespace: openstack-operators playbook_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true unsafe_vars: ansible_connection: ssh ansible_host: 38.102.83.181 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 4a97dc24-4ca7-40a1-a947-14cb9a360e7a host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.181 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.181 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.181 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n \ spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_execution_branch: main zuul_execution_canonical_name_and_path: github.com/openstack-k8s-operators/ci-framework/ci/playbooks/e2e-collect-logs.yml zuul_execution_phase: post zuul_execution_phase_index: '0' zuul_execution_trusted: 'False' zuul_log_collection: false zuul_success: 'True' zuul_will_retry: 'False' compute-1: ansible_all_ipv4_addresses: - 38.102.83.192 ansible_all_ipv6_addresses: - fe80::f816:3eff:fe12:453d ansible_apparmor: status: disabled ansible_architecture: x86_64 ansible_bios_date: 04/01/2014 ansible_bios_vendor: SeaBIOS ansible_bios_version: 1.15.0-1 ansible_board_asset_tag: NA ansible_board_name: NA ansible_board_serial: NA ansible_board_vendor: NA ansible_board_version: NA ansible_chassis_asset_tag: NA ansible_chassis_serial: NA ansible_chassis_vendor: QEMU ansible_chassis_version: pc-i440fx-6.2 ansible_check_mode: false ansible_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_config_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/ansible.cfg ansible_connection: ssh ansible_date_time: date: '2026-01-20' day: '20' epoch: '1768926435' epoch_int: '1768926435' hour: '11' iso8601: '2026-01-20T16:27:15Z' iso8601_basic: 20260120T112715163560 iso8601_basic_short: 20260120T112715 iso8601_micro: '2026-01-20T16:27:15.163560Z' minute: '27' month: '01' second: '15' time: '11:27:15' tz: EST tz_dst: EDT tz_offset: '-0500' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' ansible_default_ipv4: address: 38.102.83.192 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:12:45:3d mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether ansible_default_ipv6: {} ansible_device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-24-46-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-24-46-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '167770079' sectorsize: 512 size: 80.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '167772160' sectorsize: '512' size: 80.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 ansible_diff_mode: false ansible_distribution: CentOS ansible_distribution_file_parsed: true ansible_distribution_file_path: /etc/centos-release ansible_distribution_file_variety: CentOS ansible_distribution_major_version: '9' ansible_distribution_release: Stream ansible_distribution_version: '9' ansible_dns: nameservers: - 199.204.44.24 - 199.204.47.54 search: - novalocal ansible_domain: '' ansible_effective_group_id: 1000 ansible_effective_user_id: 1000 ansible_env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 36398 22 SSH_CONNECTION: 38.102.83.114 36398 38.102.83.192 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '1' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f ansible_eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.192 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe12:453d prefix: '64' scope: link macaddress: fa:16:3e:12:45:3d module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether ansible_facts: _ansible_facts_gathered: true all_ipv4_addresses: - 38.102.83.192 all_ipv6_addresses: - fe80::f816:3eff:fe12:453d ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 date_time: date: '2026-01-20' day: '20' epoch: '1768926435' epoch_int: '1768926435' hour: '11' iso8601: '2026-01-20T16:27:15Z' iso8601_basic: 20260120T112715163560 iso8601_basic_short: 20260120T112715 iso8601_micro: '2026-01-20T16:27:15.163560Z' minute: '27' month: '01' second: '15' time: '11:27:15' tz: EST tz_dst: EDT tz_offset: '-0500' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.192 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:12:45:3d mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-24-46-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-24-46-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '167770079' sectorsize: 512 size: 80.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '167772160' sectorsize: '512' size: 80.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3 distribution: CentOS distribution_file_parsed: true distribution_file_path: /etc/centos-release distribution_file_variety: CentOS distribution_major_version: '9' distribution_release: Stream distribution_version: '9' dns: nameservers: - 199.204.44.24 - 199.204.47.54 search: - novalocal domain: '' effective_group_id: 1000 effective_user_id: 1000 env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 36398 22 SSH_CONNECTION: 38.102.83.114 36398 38.102.83.192 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '1' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.192 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe12:453d prefix: '64' scope: link macaddress: fa:16:3e:12:45:3d module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: compute-1 gather_subset: - all hostname: compute-1 hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d interfaces: - lo - eth0 is_chroot: false iscsi_iqn: '' kernel: 5.14.0-661.el9.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.08 1m: 0.29 5m: 0.18 locally_reachable_ips: ipv4: - 38.102.83.192 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe12:453d lsb: {} lvm: N/A machine: x86_64 machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 memfree_mb: 7092 memory_mb: nocache: free: 7301 used: 378 real: free: 7092 total: 7679 used: 587 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 7679 module_setup: true mounts: - block_available: 20341225 block_size: 4096 block_total: 20954875 block_used: 613650 device: /dev/vda1 fstype: xfs inode_available: 41888618 inode_total: 41942512 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 83317657600 size_total: 85831168000 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 nodename: compute-1 os_family: RedHat pkg_mgr: dnf proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 8 processor_nproc: 8 processor_threads_per_core: 1 processor_vcpus: 8 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 python_version: 3.9.25 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFAqM26R0MqyBYDvgqXYsowpIyokzkLkmzXlKae725e7QpsDDdpAwlfRTYM7WYpvW1J1T4e5Qd4z/hQwNCKBvvk= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIDMIgnLst56Z+qDhe62CoSQxsEdOdAODmh24F4PTlS+L ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 140 user_dir: /home/zuul user_gecos: '' user_gid: 1000 user_id: zuul user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack ansible_fibre_channel_wwn: [] ansible_fips: false ansible_forks: 5 ansible_form_factor: Other ansible_fqdn: compute-1 ansible_host: 38.102.83.192 ansible_hostname: compute-1 ansible_hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d ansible_interfaces: - lo - eth0 ansible_inventory_sources: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml ansible_is_chroot: false ansible_iscsi_iqn: '' ansible_kernel: 5.14.0-661.el9.x86_64 ansible_kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' ansible_lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback ansible_loadavg: 15m: 0.08 1m: 0.29 5m: 0.18 ansible_local: {} ansible_locally_reachable_ips: ipv4: - 38.102.83.192 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe12:453d ansible_lsb: {} ansible_lvm: N/A ansible_machine: x86_64 ansible_machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 ansible_memfree_mb: 7092 ansible_memory_mb: nocache: free: 7301 used: 378 real: free: 7092 total: 7679 used: 587 swap: cached: 0 free: 0 total: 0 used: 0 ansible_memtotal_mb: 7679 ansible_mounts: - block_available: 20341225 block_size: 4096 block_total: 20954875 block_used: 613650 device: /dev/vda1 fstype: xfs inode_available: 41888618 inode_total: 41942512 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 83317657600 size_total: 85831168000 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_nodename: compute-1 ansible_os_family: RedHat ansible_pkg_mgr: dnf ansible_playbook_python: /usr/lib/zuul/ansible/8/bin/python ansible_port: 22 ansible_proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor ansible_processor_cores: 1 ansible_processor_count: 8 ansible_processor_nproc: 8 ansible_processor_threads_per_core: 1 ansible_processor_vcpus: 8 ansible_product_name: OpenStack Nova ansible_product_serial: NA ansible_product_uuid: NA ansible_product_version: 26.3.1 ansible_python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 ansible_python_interpreter: auto ansible_python_version: 3.9.25 ansible_real_group_id: 1000 ansible_real_user_id: 1000 ansible_run_tags: - all ansible_scp_extra_args: -o PermitLocalCommand=no ansible_selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted ansible_selinux_python_present: true ansible_service_mgr: systemd ansible_sftp_extra_args: -o PermitLocalCommand=no ansible_skip_tags: [] ansible_ssh_common_args: -o PermitLocalCommand=no ansible_ssh_executable: ssh ansible_ssh_extra_args: -o PermitLocalCommand=no ansible_ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFAqM26R0MqyBYDvgqXYsowpIyokzkLkmzXlKae725e7QpsDDdpAwlfRTYM7WYpvW1J1T4e5Qd4z/hQwNCKBvvk= ansible_ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ansible_ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIDMIgnLst56Z+qDhe62CoSQxsEdOdAODmh24F4PTlS+L ansible_ssh_host_key_ed25519_public_keytype: ssh-ed25519 ansible_ssh_host_key_rsa_public: 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 ansible_ssh_host_key_rsa_public_keytype: ssh-rsa ansible_swapfree_mb: 0 ansible_swaptotal_mb: 0 ansible_system: Linux ansible_system_capabilities: - '' ansible_system_capabilities_enforced: 'True' ansible_system_vendor: OpenStack Foundation ansible_uptime_seconds: 140 ansible_user: zuul ansible_user_dir: /home/zuul ansible_user_gecos: '' ansible_user_gid: 1000 ansible_user_id: zuul ansible_user_shell: /bin/bash ansible_user_uid: 1000 ansible_userspace_architecture: x86_64 ansible_userspace_bits: '64' ansible_verbosity: 1 ansible_version: full: 2.15.12 major: 2 minor: 15 revision: 12 string: 2.15.12 ansible_virtualization_role: guest ansible_virtualization_tech_guest: - openstack ansible_virtualization_tech_host: - kvm ansible_virtualization_type: openstack cifmw_architecture_repo: /home/zuul/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_installyamls_repos: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: /home/zuul/.crc/machines/crc/kubeconfig cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_repo: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: vexxhost crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 discovered_interpreter_python: /usr/bin/python3 enable_ramdisk: true fetch_dlrn_hash: false gather_subset: - all group_names: - computes groups: all: - compute-0 - compute-1 - controller - crc computes: - compute-0 - compute-1 ocps: - crc ungrouped: *id001 zuul_unreachable: [] inventory_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0 inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml inventory_hostname: compute-1 inventory_hostname_short: compute-1 module_setup: true nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 140c3cf9-9c81-4398-b693-267e7839c148 host_id: 5519e7a0ee5dc826795d295efc9c908d171b61deb9bf71b1016f861f interface_ip: 38.102.83.192 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.192 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.192 public_ipv6: '' region: RegionOne slot: null omit: __omit_place_holder__d5d9d83eed0c89a7bddc7d1578fe8f02e5a188ef operator_namespace: openstack-operators playbook_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true unsafe_vars: ansible_connection: ssh ansible_host: 38.102.83.192 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 140c3cf9-9c81-4398-b693-267e7839c148 host_id: 5519e7a0ee5dc826795d295efc9c908d171b61deb9bf71b1016f861f interface_ip: 38.102.83.192 label: cloud-centos-9-stream-tripleo-vexxhost private_ipv4: 38.102.83.192 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.192 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n \ spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_execution_branch: main zuul_execution_canonical_name_and_path: github.com/openstack-k8s-operators/ci-framework/ci/playbooks/e2e-collect-logs.yml zuul_execution_phase: post zuul_execution_phase_index: '0' zuul_execution_trusted: 'False' zuul_log_collection: false zuul_success: 'True' zuul_will_retry: 'False' controller: _included_dir: changed: false failed: false stat: atime: 1768934438.4411244 attr_flags: '' attributes: [] block_size: 4096 blocks: 0 charset: binary ctime: 1768934440.3731847 dev: 64513 device_type: 0 executable: true exists: true gid: 1000 gr_name: zuul inode: 75563390 isblk: false ischr: false isdir: true isfifo: false isgid: false islnk: false isreg: false issock: false isuid: false mimetype: inode/directory mode: '0755' mtime: 1768934440.3731847 nlink: 2 path: /home/zuul/ci-framework-data/artifacts/parameters pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 120 uid: 1000 version: '2336304882' wgrp: false woth: false writeable: true wusr: true xgrp: true xoth: true xusr: true _included_file: changed: false failed: false stat: atime: 1768934440.3721848 attr_flags: '' attributes: [] block_size: 4096 blocks: 8 charset: us-ascii checksum: 87ed6d487601b00ccc922f0e1aa924de8578aeec ctime: 1768934436.7920728 dev: 64513 device_type: 0 executable: false exists: true gid: 1000 gr_name: zuul inode: 33722741 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mimetype: text/plain mode: '0644' mtime: 1768927316.0589194 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 280 uid: 1000 version: '364504769' wgrp: false woth: false writeable: true wusr: true xgrp: false xoth: false xusr: false _parsed_vars: changed: false content: Y2lmbXdfb3BlbnNoaWZ0X2FwaTogYXBpLmNyYy50ZXN0aW5nOjY0NDMKY2lmbXdfb3BlbnNoaWZ0X2NvbnRleHQ6IGRlZmF1bHQvYXBpLWNyYy10ZXN0aW5nOjY0NDMva3ViZWFkbWluCmNpZm13X29wZW5zaGlmdF9rdWJlY29uZmlnOiAvaG9tZS96dXVsLy5jcmMvbWFjaGluZXMvY3JjL2t1YmVjb25maWcKY2lmbXdfb3BlbnNoaWZ0X3Rva2VuOiBzaGEyNTZ+Y0VPVnpEUi0zMzY0ZVNQQVIyZ1FINkxkZGlsb0g5ekRJVVlpNHY4Z0ZocwpjaWZtd19vcGVuc2hpZnRfdXNlcjoga3ViZWFkbWluCg== encoding: base64 failed: false source: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml _tmp_dir: changed: true failed: false gid: 10001 group: zuul mode: '0700' owner: zuul path: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/tmp/ansible.xcfw51d4 size: 40 state: directory uid: 10001 _yaml_files: changed: false examined: 4 failed: false files: - atime: 1768934440.350184 ctime: 1768934440.3571842 dev: 64513 gid: 0 gr_name: root inode: 75581130 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3571842 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml pw_name: root rgrp: true roth: true rusr: true size: 20448 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3571842 ctime: 1768934440.3681846 dev: 64513 gid: 0 gr_name: root inode: 75581131 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3681846 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml pw_name: root rgrp: true roth: true rusr: true size: 28303 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3691845 ctime: 1768934440.3721848 dev: 64513 gid: 0 gr_name: root inode: 75581132 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768934440.3721848 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml pw_name: root rgrp: true roth: true rusr: true size: 9284 uid: 0 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false - atime: 1768934440.3721848 ctime: 1768934436.7920728 dev: 64513 gid: 1000 gr_name: zuul inode: 33722741 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mode: '0644' mtime: 1768927316.0589194 nlink: 1 path: /home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml pw_name: zuul rgrp: true roth: true rusr: true size: 280 uid: 1000 wgrp: false woth: false wusr: true xgrp: false xoth: false xusr: false matched: 4 msg: All paths examined skipped_paths: {} ansible_all_ipv4_addresses: - 38.102.83.129 ansible_all_ipv6_addresses: - fe80::f816:3eff:fe17:b3c5 ansible_apparmor: status: disabled ansible_architecture: x86_64 ansible_bios_date: 04/01/2014 ansible_bios_vendor: SeaBIOS ansible_bios_version: 1.15.0-1 ansible_board_asset_tag: NA ansible_board_name: NA ansible_board_serial: NA ansible_board_vendor: NA ansible_board_version: NA ansible_chassis_asset_tag: NA ansible_chassis_serial: NA ansible_chassis_vendor: QEMU ansible_chassis_version: pc-i440fx-6.2 ansible_check_mode: false ansible_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_config_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/ansible.cfg ansible_connection: ssh ansible_date_time: date: '2026-01-20' day: '20' epoch: '1768934466' epoch_int: '1768934466' hour: '18' iso8601: '2026-01-20T18:41:06Z' iso8601_basic: 20260120T184106594376 iso8601_basic_short: 20260120T184106 iso8601_micro: '2026-01-20T18:41:06.594376Z' minute: '41' month: '01' second: '06' time: '18:41:06' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' ansible_default_ipv4: address: 38.102.83.129 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:17:b3:c5 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether ansible_default_ipv6: {} ansible_device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-08-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-08-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '83883999' sectorsize: 512 size: 40.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '83886080' sectorsize: '512' size: 40.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 ansible_diff_mode: false ansible_distribution: CentOS ansible_distribution_file_parsed: true ansible_distribution_file_path: /etc/centos-release ansible_distribution_file_variety: CentOS ansible_distribution_major_version: '9' ansible_distribution_release: Stream ansible_distribution_version: '9' ansible_dns: nameservers: - 192.168.122.10 - 199.204.44.24 - 199.204.47.54 ansible_domain: '' ansible_effective_group_id: 1000 ansible_effective_user_id: 1000 ansible_env: ANSIBLE_LOG_PATH: /home/zuul/ci-framework-data/logs/e2e-collect-logs-must-gather.log BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 40844 22 SSH_CONNECTION: 38.102.83.114 40844 38.102.83.129 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '72' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f ansible_eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.129 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe17:b3c5 prefix: '64' scope: link macaddress: fa:16:3e:17:b3:c5 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether ansible_facts: _ansible_facts_gathered: true all_ipv4_addresses: - 38.102.83.129 all_ipv6_addresses: - fe80::f816:3eff:fe17:b3c5 ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 crc_ci_bootstrap_instance_default_net_config: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true crc_ci_bootstrap_instance_nm_vlan_networks: - key: internal-api value: ip: 172.17.0.5 - key: storage value: ip: 172.18.0.5 - key: tenant value: ip: 172.19.0.5 crc_ci_bootstrap_instance_parent_port_create_yaml: admin_state_up: true allowed_address_pairs: [] binding_host_id: null binding_profile: {} binding_vif_details: {} binding_vif_type: null binding_vnic_type: normal created_at: '2026-01-20T16:29:40Z' data_plane_status: null description: '' device_id: '' device_owner: '' device_profile: null dns_assignment: - fqdn: host-192-168-122-10.openstacklocal. hostname: host-192-168-122-10 ip_address: 192.168.122.10 dns_domain: '' dns_name: '' extra_dhcp_opts: [] fixed_ips: - ip_address: 192.168.122.10 subnet_id: dec65eab-357c-4966-a142-c02fccf82d54 hardware_offload_type: null hints: '' id: c2f09d41-973e-44f3-b074-20dde6438c42 ip_allocation: immediate mac_address: fa:16:3e:b1:56:1a name: crc-9bcd4f67-9f17-42a8-8b89-21971da88d3d network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 numa_affinity_policy: null port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 propagate_uplink_status: null qos_network_policy_id: null qos_policy_id: null resource_request: null revision_number: 1 security_group_ids: [] status: DOWN tags: [] trunk_details: null trusted: null updated_at: '2026-01-20T16:29:40Z' crc_ci_bootstrap_network_name: zuul-ci-net-36ad0c27 crc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_private_net_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:04Z' description: '' dns_domain: '' id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 ipv4_address_scope: null ipv6_address_scope: null is_default: false is_vlan_qinq: null is_vlan_transparent: true l2_adjacency: true mtu: 1500 name: zuul-ci-net-36ad0c27 port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 provider:network_type: null provider:physical_network: null provider:segmentation_id: null qos_policy_id: null revision_number: 1 router:external: false segments: null shared: false status: ACTIVE subnets: [] tags: [] updated_at: '2026-01-20T16:28:05Z' crc_ci_bootstrap_private_router_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:10Z' description: '' enable_ndp_proxy: null external_gateway_info: null flavor_id: null id: 13dd31cb-de31-4e8f-a504-cc4d8127306d name: zuul-ci-subnet-router-36ad0c27 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 1 routes: [] status: ACTIVE tags: [] tenant_id: 4b633c451ac74233be3721a3635275e5 updated_at: '2026-01-20T16:28:10Z' crc_ci_bootstrap_private_subnet_create_yaml: allocation_pools: - end: 192.168.122.254 start: 192.168.122.2 cidr: 192.168.122.0/24 created_at: '2026-01-20T16:28:07Z' description: '' dns_nameservers: [] dns_publish_fixed_ip: null enable_dhcp: false gateway_ip: 192.168.122.1 host_routes: [] id: dec65eab-357c-4966-a142-c02fccf82d54 ip_version: 4 ipv6_address_mode: null ipv6_ra_mode: null name: zuul-ci-subnet-36ad0c27 network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 0 segment_id: null service_types: [] subnetpool_id: null tags: [] updated_at: '2026-01-20T16:28:07Z' crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 crc_ci_bootstrap_router_name: zuul-ci-subnet-router-36ad0c27 crc_ci_bootstrap_subnet_name: zuul-ci-subnet-36ad0c27 date_time: date: '2026-01-20' day: '20' epoch: '1768934466' epoch_int: '1768934466' hour: '18' iso8601: '2026-01-20T18:41:06Z' iso8601_basic: 20260120T184106594376 iso8601_basic_short: 20260120T184106 iso8601_micro: '2026-01-20T18:41:06.594376Z' minute: '41' month: '01' second: '06' time: '18:41:06' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.129 alias: eth0 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: eth0 macaddress: fa:16:3e:17:b3:c5 mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 masters: {} uuids: sr0: - 2026-01-20-16-23-08-00 vda1: - 22ac9141-3960-4912-b20e-19fc8a328d40 devices: sr0: holders: [] host: '' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-23-08-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '2048' vendor: QEMU virtual: 1 vda: holders: [] host: '' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: - 22ac9141-3960-4912-b20e-19fc8a328d40 sectors: '83883999' sectorsize: 512 size: 40.00 GB start: '2048' uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '83886080' sectorsize: '512' size: 40.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3 distribution: CentOS distribution_file_parsed: true distribution_file_path: /etc/centos-release distribution_file_variety: CentOS distribution_major_version: '9' distribution_release: Stream distribution_version: '9' dns: nameservers: - 192.168.122.10 - 199.204.44.24 - 199.204.47.54 domain: '' effective_group_id: 1000 effective_user_id: 1000 env: ANSIBLE_LOG_PATH: /home/zuul/ci-framework-data/logs/e2e-collect-logs-must-gather.log BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus DEBUGINFOD_IMA_CERT_PATH: '/etc/keys/ima:' DEBUGINFOD_URLS: 'https://debuginfod.centos.org/ ' HOME: /home/zuul LANG: en_US.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: zuul MOTD_SHOWN: pam PATH: /home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /home/zuul SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 40844 22 SSH_CONNECTION: 38.102.83.114 40844 38.102.83.129 22 USER: zuul XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '72' XDG_SESSION_TYPE: tty _: /usr/bin/python3 which_declare: declare -f eth0: active: true device: eth0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.129 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::f816:3eff:fe17:b3c5 prefix: '64' scope: link macaddress: fa:16:3e:17:b3:c5 module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: controller gather_subset: - min hostname: controller hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d interfaces: - eth0 - lo is_chroot: false iscsi_iqn: '' kernel: 5.14.0-661.el9.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.03 1m: 0.1 5m: 0.07 locally_reachable_ips: ipv4: - 38.102.83.129 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe17:b3c5 lsb: {} lvm: N/A machine: x86_64 machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 memfree_mb: 3223 memory_mb: nocache: free: 3432 used: 223 real: free: 3223 total: 3655 used: 432 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 3655 module_setup: true mounts: - block_available: 9928903 block_size: 4096 block_total: 10469115 block_used: 540212 device: /dev/vda1 fstype: xfs inode_available: 20917098 inode_total: 20970992 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 40668786688 size_total: 42881495040 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 nodename: controller os_family: RedHat pkg_mgr: dnf proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 2 processor_nproc: 2 processor_threads_per_core: 1 processor_vcpus: 2 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 python_version: 3.9.25 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 235 user_dir: /home/zuul user_gecos: '' user_gid: 1000 user_id: zuul user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack zuul_change_list: - watcher-operator ansible_fibre_channel_wwn: [] ansible_fips: false ansible_forks: 5 ansible_form_factor: Other ansible_fqdn: controller ansible_host: 38.102.83.129 ansible_hostname: controller ansible_hostnqn: nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d ansible_interfaces: - eth0 - lo ansible_inventory_sources: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml ansible_is_chroot: false ansible_iscsi_iqn: '' ansible_kernel: 5.14.0-661.el9.x86_64 ansible_kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026' ansible_lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback ansible_loadavg: 15m: 0.03 1m: 0.1 5m: 0.07 ansible_local: {} ansible_locally_reachable_ips: ipv4: - 38.102.83.129 - 127.0.0.0/8 - 127.0.0.1 ipv6: - ::1 - fe80::f816:3eff:fe17:b3c5 ansible_lsb: {} ansible_lvm: N/A ansible_machine: x86_64 ansible_machine_id: 85ac68c10a6e7ae08ceb898dbdca0cb5 ansible_memfree_mb: 3223 ansible_memory_mb: nocache: free: 3432 used: 223 real: free: 3223 total: 3655 used: 432 swap: cached: 0 free: 0 total: 0 used: 0 ansible_memtotal_mb: 3655 ansible_mounts: - block_available: 9928903 block_size: 4096 block_total: 10469115 block_used: 540212 device: /dev/vda1 fstype: xfs inode_available: 20917098 inode_total: 20970992 inode_used: 53894 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota size_available: 40668786688 size_total: 42881495040 uuid: 22ac9141-3960-4912-b20e-19fc8a328d40 ansible_nodename: controller ansible_os_family: RedHat ansible_pkg_mgr: dnf ansible_playbook_python: /usr/lib/zuul/ansible/8/bin/python ansible_port: 22 ansible_proc_cmdline: BOOT_IMAGE: (hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 console: ttyS0,115200n8 crashkernel: 1G-2G:192M,2G-64G:256M,64G-:512M net.ifnames: '0' no_timer_check: true ro: true root: UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ansible_processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor ansible_processor_cores: 1 ansible_processor_count: 2 ansible_processor_nproc: 2 ansible_processor_threads_per_core: 1 ansible_processor_vcpus: 2 ansible_product_name: OpenStack Nova ansible_product_serial: NA ansible_product_uuid: NA ansible_product_version: 26.3.1 ansible_python: executable: /usr/bin/python3 has_sslcontext: true type: cpython version: major: 3 micro: 25 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 25 - final - 0 ansible_python_interpreter: auto ansible_python_version: 3.9.25 ansible_real_group_id: 1000 ansible_real_user_id: 1000 ansible_run_tags: - all ansible_scp_extra_args: -o PermitLocalCommand=no ansible_selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted ansible_selinux_python_present: true ansible_service_mgr: systemd ansible_sftp_extra_args: -o PermitLocalCommand=no ansible_skip_tags: [] ansible_ssh_common_args: -o PermitLocalCommand=no ansible_ssh_executable: ssh ansible_ssh_extra_args: -o PermitLocalCommand=no ansible_ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68= ansible_ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ansible_ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD ansible_ssh_host_key_ed25519_public_keytype: ssh-ed25519 ansible_ssh_host_key_rsa_public: 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 ansible_ssh_host_key_rsa_public_keytype: ssh-rsa ansible_swapfree_mb: 0 ansible_swaptotal_mb: 0 ansible_system: Linux ansible_system_capabilities: - '' ansible_system_capabilities_enforced: 'True' ansible_system_vendor: OpenStack Foundation ansible_uptime_seconds: 235 ansible_user: zuul ansible_user_dir: /home/zuul ansible_user_gecos: '' ansible_user_gid: 1000 ansible_user_id: zuul ansible_user_shell: /bin/bash ansible_user_uid: 1000 ansible_userspace_architecture: x86_64 ansible_userspace_bits: '64' ansible_verbosity: 1 ansible_version: full: 2.15.12 major: 2 minor: 15 revision: 12 string: 2.15.12 ansible_virtualization_role: guest ansible_virtualization_tech_guest: - openstack ansible_virtualization_tech_host: - kvm ansible_virtualization_type: openstack cifmw_architecture_repo: /home/zuul/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_basedir: /home/zuul/ci-framework-data cifmw_build_images_output: {} cifmw_config_certmanager: true cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_deploy_edpm: true cifmw_dlrn_report_result: false cifmw_edpm_deploy_nova_compute_extra_config: '[libvirt] cpu_mode = custom cpu_models = Nehalem ' cifmw_edpm_prepare_kustomizations: - apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: openstack patches: - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n enabled: true\n \ template:\n ceilometer:\n enabled: true\n metricStorage:\n \ enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n \ disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n \ requests:\n storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n \ matchLabels:\n service: metricStorage\n \ retention: 24h" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n \ monitoringStack: null" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n \ decisionengineServiceTemplate:\n customServiceConfig: |\n [watcher_cluster_data_model_collectors.compute]\n \ period = 60\n [watcher_cluster_data_model_collectors.storage]\n \ period = 60" target: kind: OpenStackControlPlane cifmw_edpm_prepare_skip_crc_storage_creation: true cifmw_edpm_prepare_timeout: 60 cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: 12**********42 METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: 12**********78 PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator cifmw_installyamls_repos: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_context: default/api-crc-testing:6443/kubeadmin cifmw_openshift_kubeconfig: /home/zuul/.crc/machines/crc/kubeconfig cifmw_openshift_password: 12**********89 cifmw_openshift_setup_skip_internal_registry: true cifmw_openshift_setup_skip_internal_registry_tls_verify: true cifmw_openshift_skip_tls_verify: true cifmw_openshift_token: sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_meta_name: openstack-operator cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_path: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin cifmw_repo: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_setup_dist_major_version: 9 cifmw_repo_setup_os_release: centos cifmw_run_test_role: test_operator cifmw_run_tests: true cifmw_status: changed: false failed: false stat: atime: 1768927196.3291223 attr_flags: '' attributes: [] block_size: 4096 blocks: 8 charset: binary ctime: 1768927186.1998007 dev: 64513 device_type: 0 executable: true exists: true gid: 1000 gr_name: zuul inode: 50348684 isblk: false ischr: false isdir: true isfifo: false isgid: false islnk: false isreg: false issock: false isuid: false mimetype: inode/directory mode: '0755' mtime: 1768927186.1998007 nlink: 21 path: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 4096 uid: 1000 version: '194530442' wgrp: false woth: false writeable: true wusr: true xgrp: true xoth: true xusr: true cifmw_success_flag: changed: false failed: false stat: atime: 1768931726.7502286 attr_flags: '' attributes: [] block_size: 4096 blocks: 0 charset: binary checksum: da39a3ee5e6b4b0d3255bfef95601890afd80709 ctime: 1768931718.9799838 dev: 64513 device_type: 0 executable: false exists: true gid: 1000 gr_name: zuul inode: 4413088 isblk: false ischr: false isdir: false isfifo: false isgid: false islnk: false isreg: true issock: false isuid: false mimetype: inode/x-empty mode: '0644' mtime: 1768931718.9799838 nlink: 1 path: /home/zuul/cifmw-success pw_name: zuul readable: true rgrp: true roth: true rusr: true size: 0 uid: 1000 version: '64459933' wgrp: false woth: false writeable: true wusr: true xgrp: false xoth: false xusr: false cifmw_test_operator_tempest_concurrency: 1 cifmw_test_operator_tempest_exclude_list: 'watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* ' cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_include_list: 'watcher_tempest_plugin.* ' cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_test_operator_tempest_tempestconf_config: overrides: 'compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.129 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true ' cifmw_update_containers: true cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_crc: false cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: vexxhost crc_ci_bootstrap_instance_default_net_config: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true crc_ci_bootstrap_instance_nm_vlan_networks: - key: internal-api value: ip: 172.17.0.5 - key: storage value: ip: 172.18.0.5 - key: tenant value: ip: 172.19.0.5 crc_ci_bootstrap_instance_parent_port_create_yaml: admin_state_up: true allowed_address_pairs: [] binding_host_id: null binding_profile: {} binding_vif_details: {} binding_vif_type: null binding_vnic_type: normal created_at: '2026-01-20T16:29:40Z' data_plane_status: null description: '' device_id: '' device_owner: '' device_profile: null dns_assignment: - fqdn: host-192-168-122-10.openstacklocal. hostname: host-192-168-122-10 ip_address: 192.168.122.10 dns_domain: '' dns_name: '' extra_dhcp_opts: [] fixed_ips: - ip_address: 192.168.122.10 subnet_id: dec65eab-357c-4966-a142-c02fccf82d54 hardware_offload_type: null hints: '' id: c2f09d41-973e-44f3-b074-20dde6438c42 ip_allocation: immediate mac_address: fa:16:3e:b1:56:1a name: crc-9bcd4f67-9f17-42a8-8b89-21971da88d3d network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 numa_affinity_policy: null port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 propagate_uplink_status: null qos_network_policy_id: null qos_policy_id: null resource_request: null revision_number: 1 security_group_ids: [] status: DOWN tags: [] trunk_details: null trusted: null updated_at: '2026-01-20T16:29:40Z' crc_ci_bootstrap_network_name: zuul-ci-net-36ad0c27 crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 crc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_private_net_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:04Z' description: '' dns_domain: '' id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 ipv4_address_scope: null ipv6_address_scope: null is_default: false is_vlan_qinq: null is_vlan_transparent: true l2_adjacency: true mtu: 1500 name: zuul-ci-net-36ad0c27 port_security_enabled: false project_id: 4b633c451ac74233be3721a3635275e5 provider:network_type: null provider:physical_network: null provider:segmentation_id: null qos_policy_id: null revision_number: 1 router:external: false segments: null shared: false status: ACTIVE subnets: [] tags: [] updated_at: '2026-01-20T16:28:05Z' crc_ci_bootstrap_private_router_create_yaml: admin_state_up: true availability_zone_hints: - nova availability_zones: [] created_at: '2026-01-20T16:28:10Z' description: '' enable_ndp_proxy: null external_gateway_info: null flavor_id: null id: 13dd31cb-de31-4e8f-a504-cc4d8127306d name: zuul-ci-subnet-router-36ad0c27 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 1 routes: [] status: ACTIVE tags: [] tenant_id: 4b633c451ac74233be3721a3635275e5 updated_at: '2026-01-20T16:28:10Z' crc_ci_bootstrap_private_subnet_create_yaml: allocation_pools: - end: 192.168.122.254 start: 192.168.122.2 cidr: 192.168.122.0/24 created_at: '2026-01-20T16:28:07Z' description: '' dns_nameservers: [] dns_publish_fixed_ip: null enable_dhcp: false gateway_ip: 192.168.122.1 host_routes: [] id: dec65eab-357c-4966-a142-c02fccf82d54 ip_version: 4 ipv6_address_mode: null ipv6_ra_mode: null name: zuul-ci-subnet-36ad0c27 network_id: dd6f9112-ea6f-4a7f-b66e-483fdf63cb88 project_id: 4b633c451ac74233be3721a3635275e5 revision_number: 0 segment_id: null service_types: [] subnetpool_id: null tags: [] updated_at: '2026-01-20T16:28:07Z' crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 crc_ci_bootstrap_router_name: zuul-ci-subnet-router-36ad0c27 crc_ci_bootstrap_subnet_name: zuul-ci-subnet-36ad0c27 discovered_interpreter_python: /usr/bin/python3 enable_ramdisk: true fetch_dlrn_hash: false gather_subset: - min group_names: - ungrouped groups: all: - compute-0 - compute-1 - controller - crc computes: - compute-0 - compute-1 ocps: - crc ungrouped: *id001 zuul_unreachable: [] inventory_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0 inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml inventory_hostname: controller inventory_hostname_short: controller logfiles_dest_dir: /home/zuul/ci-framework-data/logs/2026-01-20_18-41 module_setup: true nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 783ff1ec-2d67-41d5-bd30-0d300b3a9326 host_id: 511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b interface_ip: 38.102.83.129 label: cloud-centos-9-stream-tripleo-vexxhost-medium private_ipv4: 38.102.83.129 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.129 public_ipv6: '' region: RegionOne slot: null omit: __omit_place_holder__d5d9d83eed0c89a7bddc7d1578fe8f02e5a188ef operator_namespace: openstack-operators playbook_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks post_ctlplane_deploy: - name: Tune rabbitmq resources source: rabbitmq_tuning.yml type: playbook post_deploy: - inventory: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook - name: Patch Openstack Prometheus to enable admin API source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml type: playbook post_infra: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook pre_deploy: - name: 80 Kustomize OpenStack CR source: control_plane_horizon.yml type: playbook pre_deploy_create_coo_subscription: - name: Deploy cluster-observability-operator source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml type: playbook pre_infra: - connection: local inventory: localhost, name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook pre_update: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true unsafe_vars: ansible_connection: ssh ansible_host: 38.102.83.129 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 783ff1ec-2d67-41d5-bd30-0d300b3a9326 host_id: 511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b interface_ip: 38.102.83.129 label: cloud-centos-9-stream-tripleo-vexxhost-medium private_ipv4: 38.102.83.129 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.129 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n \ spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_change_list: - watcher-operator zuul_execution_branch: main zuul_execution_canonical_name_and_path: github.com/openstack-k8s-operators/ci-framework/ci/playbooks/e2e-collect-logs.yml zuul_execution_phase: post zuul_execution_phase_index: '0' zuul_execution_trusted: 'False' zuul_log_collection: false zuul_success: 'True' zuul_will_retry: 'False' crc: ansible_all_ipv4_addresses: - 192.168.126.11 - 38.102.83.143 ansible_all_ipv6_addresses: - fe80::89fe:9217:2e69:532e ansible_apparmor: status: disabled ansible_architecture: x86_64 ansible_bios_date: 04/01/2014 ansible_bios_vendor: SeaBIOS ansible_bios_version: 1.15.0-1 ansible_board_asset_tag: NA ansible_board_name: NA ansible_board_serial: NA ansible_board_vendor: NA ansible_board_version: NA ansible_br_int: active: false device: br-int features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: d6:39:55:2e:22:71 mtu: 1400 promisc: true timestamping: [] type: ether ansible_chassis_asset_tag: NA ansible_chassis_serial: NA ansible_chassis_vendor: QEMU ansible_chassis_version: pc-i440fx-6.2 ansible_check_mode: false ansible_cmdline: BOOT_IMAGE: (hd0,gpt3)/boot/ostree/rhcos-222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/vmlinuz-5.14.0-427.50.2.el9_4.x86_64 boot: UUID=de0497b0-db1b-465a-b278-03db02455c71 cgroup_no_v1: all ignition.platform.id: metal ostree: /ostree/boot.1/rhcos/222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/0 psi: '0' root: UUID=0b076daa-c26a-46d2-b3a6-72a8dbc6e257 rootflags: prjquota rw: true systemd.unified_cgroup_hierarchy: '1' ansible_config_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/ansible.cfg ansible_connection: ssh ansible_date_time: date: '2026-01-20' day: '20' epoch: '1768926434' epoch_int: '1768926434' hour: '16' iso8601: '2026-01-20T16:27:14Z' iso8601_basic: 20260120T162714882934 iso8601_basic_short: 20260120T162714 iso8601_micro: '2026-01-20T16:27:14.882934Z' minute: '27' month: '01' second: '14' time: '16:27:14' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' ansible_default_ipv4: address: 38.102.83.143 alias: ens3 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: ens3 macaddress: fa:16:3e:ec:9a:9d mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether ansible_default_ipv6: {} ansible_device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 vda2: - EFI-SYSTEM vda3: - boot vda4: - root masters: {} uuids: sr0: - 2026-01-20-16-26-21-00 vda2: - 7B77-95E7 vda3: - de0497b0-db1b-465a-b278-03db02455c71 vda4: - 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 ansible_devices: sr0: holders: [] host: 'IDE interface: Intel Corporation 82371SB PIIX3 IDE [Natoma/Triton II]' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-26-21-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '0' vendor: QEMU virtual: 1 vda: holders: [] host: 'SCSI storage controller: Red Hat, Inc. Virtio block device' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: [] sectors: '2048' sectorsize: 512 size: 1.00 MB start: '2048' uuid: null vda2: holders: [] links: ids: [] labels: - EFI-SYSTEM masters: [] uuids: - 7B77-95E7 sectors: '260096' sectorsize: 512 size: 127.00 MB start: '4096' uuid: 7B77-95E7 vda3: holders: [] links: ids: [] labels: - boot masters: [] uuids: - de0497b0-db1b-465a-b278-03db02455c71 sectors: '786432' sectorsize: 512 size: 384.00 MB start: '264192' uuid: de0497b0-db1b-465a-b278-03db02455c71 vda4: holders: [] links: ids: [] labels: - root masters: [] uuids: - 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 sectors: '166718848' sectorsize: 512 size: 79.50 GB start: '1050624' uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '419430400' sectorsize: '512' size: 200.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 ansible_diff_mode: false ansible_distribution: RedHat ansible_distribution_file_parsed: true ansible_distribution_file_path: /etc/redhat-release ansible_distribution_file_search_string: Red Hat ansible_distribution_file_variety: RedHat ansible_distribution_major_version: '4' ansible_distribution_release: NA ansible_distribution_version: '4.18' ansible_dns: nameservers: - 199.204.44.24 - 199.204.47.54 ansible_domain: '' ansible_effective_group_id: 1000 ansible_effective_user_id: 1000 ansible_ens3: active: true device: ens3 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_lockless: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.143 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::89fe:9217:2e69:532e prefix: '64' scope: link macaddress: fa:16:3e:ec:9a:9d module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether ansible_env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus HOME: /var/home/core LANG: C.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: core MOTD_SHOWN: pam PATH: /var/home/core/.local/bin:/var/home/core/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /var/home/core SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 51438 22 SSH_CONNECTION: 38.102.83.114 51438 38.102.83.143 22 USER: core XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '2' XDG_SESSION_TYPE: tty _: /usr/bin/python3.9 which_declare: declare -f ansible_eth10: active: true device: eth10 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 192.168.126.11 broadcast: 192.168.126.255 netmask: 255.255.255.0 network: 192.168.126.0 prefix: '24' macaddress: 4a:89:3e:0d:17:eb mtu: 1500 promisc: false timestamping: [] type: ether ansible_facts: _ansible_facts_gathered: true all_ipv4_addresses: - 192.168.126.11 - 38.102.83.143 all_ipv6_addresses: - fe80::89fe:9217:2e69:532e ansible_local: {} apparmor: status: disabled architecture: x86_64 bios_date: 04/01/2014 bios_vendor: SeaBIOS bios_version: 1.15.0-1 board_asset_tag: NA board_name: NA board_serial: NA board_vendor: NA board_version: NA br_int: active: false device: br-int features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: d6:39:55:2e:22:71 mtu: 1400 promisc: true timestamping: [] type: ether chassis_asset_tag: NA chassis_serial: NA chassis_vendor: QEMU chassis_version: pc-i440fx-6.2 cmdline: BOOT_IMAGE: (hd0,gpt3)/boot/ostree/rhcos-222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/vmlinuz-5.14.0-427.50.2.el9_4.x86_64 boot: UUID=de0497b0-db1b-465a-b278-03db02455c71 cgroup_no_v1: all ignition.platform.id: metal ostree: /ostree/boot.1/rhcos/222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/0 psi: '0' root: UUID=0b076daa-c26a-46d2-b3a6-72a8dbc6e257 rootflags: prjquota rw: true systemd.unified_cgroup_hierarchy: '1' date_time: date: '2026-01-20' day: '20' epoch: '1768926434' epoch_int: '1768926434' hour: '16' iso8601: '2026-01-20T16:27:14Z' iso8601_basic: 20260120T162714882934 iso8601_basic_short: 20260120T162714 iso8601_micro: '2026-01-20T16:27:14.882934Z' minute: '27' month: '01' second: '14' time: '16:27:14' tz: UTC tz_dst: UTC tz_offset: '+0000' weekday: Tuesday weekday_number: '2' weeknumber: '03' year: '2026' default_ipv4: address: 38.102.83.143 alias: ens3 broadcast: 38.102.83.255 gateway: 38.102.83.1 interface: ens3 macaddress: fa:16:3e:ec:9a:9d mtu: 1500 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' type: ether default_ipv6: {} device_links: ids: sr0: - ata-QEMU_DVD-ROM_QM00001 labels: sr0: - config-2 vda2: - EFI-SYSTEM vda3: - boot vda4: - root masters: {} uuids: sr0: - 2026-01-20-16-26-21-00 vda2: - 7B77-95E7 vda3: - de0497b0-db1b-465a-b278-03db02455c71 vda4: - 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 devices: sr0: holders: [] host: 'IDE interface: Intel Corporation 82371SB PIIX3 IDE [Natoma/Triton II]' links: ids: - ata-QEMU_DVD-ROM_QM00001 labels: - config-2 masters: [] uuids: - 2026-01-20-16-26-21-00 model: QEMU DVD-ROM partitions: {} removable: '1' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: mq-deadline sectors: '964' sectorsize: '2048' size: 482.00 KB support_discard: '0' vendor: QEMU virtual: 1 vda: holders: [] host: 'SCSI storage controller: Red Hat, Inc. Virtio block device' links: ids: [] labels: [] masters: [] uuids: [] model: null partitions: vda1: holders: [] links: ids: [] labels: [] masters: [] uuids: [] sectors: '2048' sectorsize: 512 size: 1.00 MB start: '2048' uuid: null vda2: holders: [] links: ids: [] labels: - EFI-SYSTEM masters: [] uuids: - 7B77-95E7 sectors: '260096' sectorsize: 512 size: 127.00 MB start: '4096' uuid: 7B77-95E7 vda3: holders: [] links: ids: [] labels: - boot masters: [] uuids: - de0497b0-db1b-465a-b278-03db02455c71 sectors: '786432' sectorsize: 512 size: 384.00 MB start: '264192' uuid: de0497b0-db1b-465a-b278-03db02455c71 vda4: holders: [] links: ids: [] labels: - root masters: [] uuids: - 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 sectors: '166718848' sectorsize: 512 size: 79.50 GB start: '1050624' uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 removable: '0' rotational: '1' sas_address: null sas_device_handle: null scheduler_mode: none sectors: '419430400' sectorsize: '512' size: 200.00 GB support_discard: '512' vendor: '0x1af4' virtual: 1 discovered_interpreter_python: /usr/bin/python3.9 distribution: RedHat distribution_file_parsed: true distribution_file_path: /etc/redhat-release distribution_file_search_string: Red Hat distribution_file_variety: RedHat distribution_major_version: '4' distribution_release: NA distribution_version: '4.18' dns: nameservers: - 199.204.44.24 - 199.204.47.54 domain: '' effective_group_id: 1000 effective_user_id: 1000 ens3: active: true device: ens3 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: 'on' rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: on [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: off [fixed] tx_gso_partial: off [fixed] tx_gso_robust: on [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_lockless: off [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: off [fixed] tx_sctp_segmentation: off [fixed] tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'off' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: off [fixed] tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 38.102.83.143 broadcast: 38.102.83.255 netmask: 255.255.255.0 network: 38.102.83.0 prefix: '24' ipv6: - address: fe80::89fe:9217:2e69:532e prefix: '64' scope: link macaddress: fa:16:3e:ec:9a:9d module: virtio_net mtu: 1500 pciid: virtio1 promisc: false speed: -1 timestamping: [] type: ether env: BASH_FUNC_which%%: "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}" DBUS_SESSION_BUS_ADDRESS: unix:path=/run/user/1000/bus HOME: /var/home/core LANG: C.UTF-8 LESSOPEN: '||/usr/bin/lesspipe.sh %s' LOGNAME: core MOTD_SHOWN: pam PATH: /var/home/core/.local/bin:/var/home/core/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin PWD: /var/home/core SELINUX_LEVEL_REQUESTED: '' SELINUX_ROLE_REQUESTED: '' SELINUX_USE_CURRENT_RANGE: '' SHELL: /bin/bash SHLVL: '1' SSH_CLIENT: 38.102.83.114 51438 22 SSH_CONNECTION: 38.102.83.114 51438 38.102.83.143 22 USER: core XDG_RUNTIME_DIR: /run/user/1000 XDG_SESSION_CLASS: user XDG_SESSION_ID: '2' XDG_SESSION_TYPE: tty _: /usr/bin/python3.9 which_declare: declare -f eth10: active: true device: eth10 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: off [fixed] hw_timestamp_filters: [] ipv4: address: 192.168.126.11 broadcast: 192.168.126.255 netmask: 255.255.255.0 network: 192.168.126.0 prefix: '24' macaddress: 4a:89:3e:0d:17:eb mtu: 1500 promisc: false timestamping: [] type: ether fibre_channel_wwn: [] fips: false form_factor: Other fqdn: crc gather_subset: - all hostname: crc hostnqn: nqn.2014-08.org.nvmexpress:uuid:5868846d-b985-4e9b-a1e6-70725bc6eac4 interfaces: - eth10 - ovs-system - ens3 - ovn-k8s-mp0 - br-int - lo is_chroot: true iscsi_iqn: '' kernel: 5.14.0-427.50.2.el9_4.x86_64 kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Feb 7 09:29:50 EST 2025' lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] netns_local: on [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_lockless: on [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback loadavg: 15m: 0.18 1m: 1.6 5m: 0.52 locally_reachable_ips: ipv4: - 38.102.83.143 - 127.0.0.0/8 - 127.0.0.1 - 192.168.126.11 ipv6: - ::1 - fe80::89fe:9217:2e69:532e lsb: {} lvm: N/A machine: x86_64 machine_id: 21801e6708c44f15b81395eb736a7cec memfree_mb: 31513 memory_mb: nocache: free: 31716 used: 379 real: free: 31513 total: 32095 used: 582 swap: cached: 0 free: 0 total: 0 used: 0 memtotal_mb: 32095 module_setup: true mounts: - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /sysroot options: ro,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /etc options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /usr options: ro,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /sysroot/ostree/deploy/rhcos/var options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /var options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 220687 block_size: 1024 block_total: 358271 block_used: 137584 device: /dev/vda3 fstype: ext4 inode_available: 97936 inode_total: 98304 inode_used: 368 mount: /boot options: ro,seclabel,nosuid,nodev,relatime size_available: 225983488 size_total: 366869504 uuid: de0497b0-db1b-465a-b278-03db02455c71 - block_available: 0 block_size: 2048 block_total: 241 block_used: 241 device: /dev/sr0 fstype: iso9660 inode_available: 0 inode_total: 0 inode_used: 0 mount: /tmp/openstack-config-drive options: ro,relatime,nojoliet,check=s,map=n,blocksize=2048 size_available: 0 size_total: 493568 uuid: 2026-01-20-16-26-21-00 nodename: crc os_family: RedHat ovn_k8s_mp0: active: false device: ovn-k8s-mp0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: 0a:58:0a:d9:00:02 mtu: 1400 promisc: true timestamping: [] type: ether ovs_system: active: false device: ovs-system features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: on [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: a6:05:0b:17:94:04 mtu: 1500 promisc: true timestamping: [] type: ether pkg_mgr: atomic_container proc_cmdline: BOOT_IMAGE: (hd0,gpt3)/boot/ostree/rhcos-222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/vmlinuz-5.14.0-427.50.2.el9_4.x86_64 boot: UUID=de0497b0-db1b-465a-b278-03db02455c71 cgroup_no_v1: all ignition.platform.id: metal ostree: /ostree/boot.1/rhcos/222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/0 psi: '0' root: UUID=0b076daa-c26a-46d2-b3a6-72a8dbc6e257 rootflags: prjquota rw: true systemd.unified_cgroup_hierarchy: '1' processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor - '8' - AuthenticAMD - AMD EPYC-Rome Processor - '9' - AuthenticAMD - AMD EPYC-Rome Processor - '10' - AuthenticAMD - AMD EPYC-Rome Processor - '11' - AuthenticAMD - AMD EPYC-Rome Processor processor_cores: 1 processor_count: 12 processor_nproc: 12 processor_threads_per_core: 1 processor_vcpus: 12 product_name: OpenStack Nova product_serial: NA product_uuid: NA product_version: 26.3.1 python: executable: /usr/bin/python3.9 has_sslcontext: true type: cpython version: major: 3 micro: 18 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 18 - final - 0 python_version: 3.9.18 real_group_id: 1000 real_user_id: 1000 selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted selinux_python_present: true service_mgr: systemd ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBM2gL1NPmTDa3suVZVEFlN8tPkayDFQSSTCPBpXJWQc3prsrt6ZyqK7Td0ww3tUUrsgsfAU/zg0wlL8Uy7glFNY= ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIOBf2eYlZCq3ti7hpf/c/0cPvvnQl+7GDtrgSQLW+P8M ssh_host_key_ed25519_public_keytype: ssh-ed25519 ssh_host_key_rsa_public: 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 ssh_host_key_rsa_public_keytype: ssh-rsa swapfree_mb: 0 swaptotal_mb: 0 system: Linux system_capabilities: - '' system_capabilities_enforced: 'True' system_vendor: OpenStack Foundation uptime_seconds: 44 user_dir: /var/home/core user_gecos: CoreOS Admin user_gid: 1000 user_id: core user_shell: /bin/bash user_uid: 1000 userspace_architecture: x86_64 userspace_bits: '64' virtualization_role: guest virtualization_tech_guest: - openstack virtualization_tech_host: - kvm virtualization_type: openstack ansible_fibre_channel_wwn: [] ansible_fips: false ansible_forks: 5 ansible_form_factor: Other ansible_fqdn: crc ansible_host: 38.102.83.143 ansible_hostname: crc ansible_hostnqn: nqn.2014-08.org.nvmexpress:uuid:5868846d-b985-4e9b-a1e6-70725bc6eac4 ansible_interfaces: - eth10 - ovs-system - ens3 - ovn-k8s-mp0 - br-int - lo ansible_inventory_sources: - /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml ansible_is_chroot: true ansible_iscsi_iqn: '' ansible_kernel: 5.14.0-427.50.2.el9_4.x86_64 ansible_kernel_version: '#1 SMP PREEMPT_DYNAMIC Fri Feb 7 09:29:50 EST 2025' ansible_lo: active: true device: lo features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: on [fixed] hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: on [fixed] macsec_hw_offload: off [fixed] netns_local: on [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: on [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: on [fixed] tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: on [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: off [fixed] tx_gre_segmentation: off [fixed] tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: off [fixed] tx_ipxip6_segmentation: off [fixed] tx_lockless: on [fixed] tx_nocache_copy: off [fixed] tx_scatter_gather: on [fixed] tx_scatter_gather_fraglist: on [fixed] tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: off [fixed] tx_udp_tnl_segmentation: off [fixed] tx_vlan_offload: off [fixed] tx_vlan_stag_hw_insert: off [fixed] vlan_challenged: on [fixed] hw_timestamp_filters: [] ipv4: address: 127.0.0.1 broadcast: '' netmask: 255.0.0.0 network: 127.0.0.0 prefix: '8' ipv6: - address: ::1 prefix: '128' scope: host mtu: 65536 promisc: false timestamping: [] type: loopback ansible_loadavg: 15m: 0.18 1m: 1.6 5m: 0.52 ansible_local: {} ansible_locally_reachable_ips: ipv4: - 38.102.83.143 - 127.0.0.0/8 - 127.0.0.1 - 192.168.126.11 ipv6: - ::1 - fe80::89fe:9217:2e69:532e ansible_lsb: {} ansible_lvm: N/A ansible_machine: x86_64 ansible_machine_id: 21801e6708c44f15b81395eb736a7cec ansible_memfree_mb: 31513 ansible_memory_mb: nocache: free: 31716 used: 379 real: free: 31513 total: 32095 used: 582 swap: cached: 0 free: 0 total: 0 used: 0 ansible_memtotal_mb: 32095 ansible_mounts: - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /sysroot options: ro,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: / options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /etc options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /usr options: ro,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /sysroot/ostree/deploy/rhcos/var options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 15532505 block_size: 4096 block_total: 20823472 block_used: 5290967 device: /dev/vda4 fstype: xfs inode_available: 41561682 inode_total: 41679680 inode_used: 117998 mount: /var options: rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,prjquota,bind size_available: 63621140480 size_total: 85292941312 uuid: 0b076daa-c26a-46d2-b3a6-72a8dbc6e257 - block_available: 220687 block_size: 1024 block_total: 358271 block_used: 137584 device: /dev/vda3 fstype: ext4 inode_available: 97936 inode_total: 98304 inode_used: 368 mount: /boot options: ro,seclabel,nosuid,nodev,relatime size_available: 225983488 size_total: 366869504 uuid: de0497b0-db1b-465a-b278-03db02455c71 - block_available: 0 block_size: 2048 block_total: 241 block_used: 241 device: /dev/sr0 fstype: iso9660 inode_available: 0 inode_total: 0 inode_used: 0 mount: /tmp/openstack-config-drive options: ro,relatime,nojoliet,check=s,map=n,blocksize=2048 size_available: 0 size_total: 493568 uuid: 2026-01-20-16-26-21-00 ansible_nodename: crc ansible_os_family: RedHat ansible_ovn_k8s_mp0: active: false device: ovn-k8s-mp0 features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: off [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: 0a:58:0a:d9:00:02 mtu: 1400 promisc: true timestamping: [] type: ether ansible_ovs_system: active: false device: ovs-system features: esp_hw_offload: off [fixed] esp_tx_csum_hw_offload: off [fixed] fcoe_mtu: off [fixed] generic_receive_offload: 'on' generic_segmentation_offload: 'on' highdma: 'on' hsr_dup_offload: off [fixed] hsr_fwd_offload: off [fixed] hsr_tag_ins_offload: off [fixed] hsr_tag_rm_offload: off [fixed] hw_tc_offload: off [fixed] l2_fwd_offload: off [fixed] large_receive_offload: off [fixed] loopback: off [fixed] macsec_hw_offload: off [fixed] netns_local: on [fixed] ntuple_filters: off [fixed] receive_hashing: off [fixed] rx_all: off [fixed] rx_checksumming: off [fixed] rx_fcs: off [fixed] rx_gro_hw: off [fixed] rx_gro_list: 'off' rx_udp_gro_forwarding: 'off' rx_udp_tunnel_port_offload: off [fixed] rx_vlan_filter: off [fixed] rx_vlan_offload: off [fixed] rx_vlan_stag_filter: off [fixed] rx_vlan_stag_hw_parse: off [fixed] scatter_gather: 'on' tcp_segmentation_offload: 'on' tls_hw_record: off [fixed] tls_hw_rx_offload: off [fixed] tls_hw_tx_offload: off [fixed] tx_checksum_fcoe_crc: off [fixed] tx_checksum_ip_generic: 'on' tx_checksum_ipv4: off [fixed] tx_checksum_ipv6: off [fixed] tx_checksum_sctp: off [fixed] tx_checksumming: 'on' tx_esp_segmentation: off [fixed] tx_fcoe_segmentation: off [fixed] tx_gre_csum_segmentation: 'on' tx_gre_segmentation: 'on' tx_gso_list: 'on' tx_gso_partial: off [fixed] tx_gso_robust: off [fixed] tx_ipxip4_segmentation: 'on' tx_ipxip6_segmentation: 'on' tx_lockless: on [fixed] tx_nocache_copy: 'off' tx_scatter_gather: 'on' tx_scatter_gather_fraglist: 'on' tx_sctp_segmentation: 'on' tx_tcp6_segmentation: 'on' tx_tcp_ecn_segmentation: 'on' tx_tcp_mangleid_segmentation: 'on' tx_tcp_segmentation: 'on' tx_tunnel_remcsum_segmentation: off [fixed] tx_udp_segmentation: 'on' tx_udp_tnl_csum_segmentation: 'on' tx_udp_tnl_segmentation: 'on' tx_vlan_offload: 'on' tx_vlan_stag_hw_insert: 'on' vlan_challenged: off [fixed] hw_timestamp_filters: [] macaddress: a6:05:0b:17:94:04 mtu: 1500 promisc: true timestamping: [] type: ether ansible_pkg_mgr: atomic_container ansible_playbook_python: /usr/lib/zuul/ansible/8/bin/python ansible_port: 22 ansible_proc_cmdline: BOOT_IMAGE: (hd0,gpt3)/boot/ostree/rhcos-222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/vmlinuz-5.14.0-427.50.2.el9_4.x86_64 boot: UUID=de0497b0-db1b-465a-b278-03db02455c71 cgroup_no_v1: all ignition.platform.id: metal ostree: /ostree/boot.1/rhcos/222c9618de9c45c63e246dddef9ff68a7a0a02c06c0f77615561166d9e2254ea/0 psi: '0' root: UUID=0b076daa-c26a-46d2-b3a6-72a8dbc6e257 rootflags: prjquota rw: true systemd.unified_cgroup_hierarchy: '1' ansible_processor: - '0' - AuthenticAMD - AMD EPYC-Rome Processor - '1' - AuthenticAMD - AMD EPYC-Rome Processor - '2' - AuthenticAMD - AMD EPYC-Rome Processor - '3' - AuthenticAMD - AMD EPYC-Rome Processor - '4' - AuthenticAMD - AMD EPYC-Rome Processor - '5' - AuthenticAMD - AMD EPYC-Rome Processor - '6' - AuthenticAMD - AMD EPYC-Rome Processor - '7' - AuthenticAMD - AMD EPYC-Rome Processor - '8' - AuthenticAMD - AMD EPYC-Rome Processor - '9' - AuthenticAMD - AMD EPYC-Rome Processor - '10' - AuthenticAMD - AMD EPYC-Rome Processor - '11' - AuthenticAMD - AMD EPYC-Rome Processor ansible_processor_cores: 1 ansible_processor_count: 12 ansible_processor_nproc: 12 ansible_processor_threads_per_core: 1 ansible_processor_vcpus: 12 ansible_product_name: OpenStack Nova ansible_product_serial: NA ansible_product_uuid: NA ansible_product_version: 26.3.1 ansible_python: executable: /usr/bin/python3.9 has_sslcontext: true type: cpython version: major: 3 micro: 18 minor: 9 releaselevel: final serial: 0 version_info: - 3 - 9 - 18 - final - 0 ansible_python_interpreter: auto ansible_python_version: 3.9.18 ansible_real_group_id: 1000 ansible_real_user_id: 1000 ansible_run_tags: - all ansible_scp_extra_args: -o PermitLocalCommand=no ansible_selinux: config_mode: enforcing mode: enforcing policyvers: 33 status: enabled type: targeted ansible_selinux_python_present: true ansible_service_mgr: systemd ansible_sftp_extra_args: -o PermitLocalCommand=no ansible_skip_tags: [] ansible_ssh_common_args: -o PermitLocalCommand=no ansible_ssh_executable: ssh ansible_ssh_extra_args: -o PermitLocalCommand=no ansible_ssh_host_key_ecdsa_public: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBM2gL1NPmTDa3suVZVEFlN8tPkayDFQSSTCPBpXJWQc3prsrt6ZyqK7Td0ww3tUUrsgsfAU/zg0wlL8Uy7glFNY= ansible_ssh_host_key_ecdsa_public_keytype: ecdsa-sha2-nistp256 ansible_ssh_host_key_ed25519_public: AAAAC3NzaC1lZDI1NTE5AAAAIOBf2eYlZCq3ti7hpf/c/0cPvvnQl+7GDtrgSQLW+P8M ansible_ssh_host_key_ed25519_public_keytype: ssh-ed25519 ansible_ssh_host_key_rsa_public: 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 ansible_ssh_host_key_rsa_public_keytype: ssh-rsa ansible_swapfree_mb: 0 ansible_swaptotal_mb: 0 ansible_system: Linux ansible_system_capabilities: - '' ansible_system_capabilities_enforced: 'True' ansible_system_vendor: OpenStack Foundation ansible_uptime_seconds: 44 ansible_user: core ansible_user_dir: /var/home/core ansible_user_gecos: CoreOS Admin ansible_user_gid: 1000 ansible_user_id: core ansible_user_shell: /bin/bash ansible_user_uid: 1000 ansible_userspace_architecture: x86_64 ansible_userspace_bits: '64' ansible_verbosity: 1 ansible_version: full: 2.15.12 major: 2 minor: 15 revision: 12 string: 2.15.12 ansible_virtualization_role: guest ansible_virtualization_tech_guest: - openstack ansible_virtualization_tech_host: - kvm ansible_virtualization_type: openstack cifmw_architecture_repo: /var/home/core/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@/var/home/core/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/var/home/core/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/var/home/core/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/var/home/core/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_installyamls_repos: /var/home/core/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: /var/home/core/.crc/machines/crc/kubeconfig cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_repo: /var/home/core/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: vexxhost crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '1500' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 discovered_interpreter_python: /usr/bin/python3.9 enable_ramdisk: true fetch_dlrn_hash: false gather_subset: - all group_names: - ocps groups: all: - compute-0 - compute-1 - controller - crc computes: - compute-0 - compute-1 ocps: - crc ungrouped: *id001 zuul_unreachable: [] inventory_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0 inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml inventory_hostname: crc inventory_hostname_short: crc module_setup: true nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 9bcd4f67-9f17-42a8-8b89-21971da88d3d host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.143 label: crc-cloud-ocp-4-18-1-3xl private_ipv4: 38.102.83.143 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.143 public_ipv6: '' region: RegionOne slot: null omit: __omit_place_holder__d5d9d83eed0c89a7bddc7d1578fe8f02e5a188ef operator_namespace: openstack-operators playbook_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true unsafe_vars: ansible_connection: ssh ansible_host: 38.102.83.143 ansible_port: 22 ansible_python_interpreter: auto ansible_user: core cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 9bcd4f67-9f17-42a8-8b89-21971da88d3d host_id: b012578aee5370fae73eb6c92c4679617335173cccca05390470f411 interface_ip: 38.102.83.143 label: crc-cloud-ocp-4-18-1-3xl private_ipv4: 38.102.83.143 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.143 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n \ spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n \ user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_execution_branch: main zuul_execution_canonical_name_and_path: github.com/openstack-k8s-operators/ci-framework/ci/playbooks/e2e-collect-logs.yml zuul_execution_phase: post zuul_execution_phase_index: '0' zuul_execution_trusted: 'False' zuul_log_collection: false zuul_success: 'True' zuul_will_retry: 'False' inventory_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0 inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/post_playbook_0/inventory.yaml inventory_hostname: controller inventory_hostname_short: controller logfiles_dest_dir: /home/zuul/ci-framework-data/logs/2026-01-20_18-41 module_setup: true nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 783ff1ec-2d67-41d5-bd30-0d300b3a9326 host_id: 511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b interface_ip: 38.102.83.129 label: cloud-centos-9-stream-tripleo-vexxhost-medium private_ipv4: 38.102.83.129 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.129 public_ipv6: '' region: RegionOne slot: null omit: __omit_place_holder__d5d9d83eed0c89a7bddc7d1578fe8f02e5a188ef operator_namespace: '{{ cifmw_install_yamls_defaults[''OPERATOR_NAMESPACE''] | default(''openstack-operators'') }}' play_hosts: *id002 playbook_dir: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks post_ctlplane_deploy: - name: Tune rabbitmq resources source: rabbitmq_tuning.yml type: playbook post_deploy: - inventory: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook - name: Patch Openstack Prometheus to enable admin API source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml type: playbook post_infra: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook pre_deploy: - name: 80 Kustomize OpenStack CR source: control_plane_horizon.yml type: playbook pre_deploy_create_coo_subscription: - name: Deploy cluster-observability-operator source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml type: playbook pre_infra: - connection: local inventory: localhost, name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook pre_update: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true role_name: artifacts role_names: *id003 role_path: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/roles/artifacts role_uuid: fa163e3b-3c83-c81d-9014-000000000030 unsafe_vars: ansible_connection: ssh ansible_host: 38.102.83.129 ansible_port: 22 ansible_python_interpreter: auto ansible_user: zuul cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false nodepool: az: nova cloud: vexxhost-nodepool-tripleo external_id: 783ff1ec-2d67-41d5-bd30-0d300b3a9326 host_id: 511625867b15899f344b49f50e790882b35aedda883941cf1472ae2b interface_ip: 38.102.83.129 label: cloud-centos-9-stream-tripleo-vexxhost-medium private_ipv4: 38.102.83.129 private_ipv6: null provider: vexxhost-nodepool-tripleo public_ipv4: 38.102.83.129 public_ipv6: '' region: RegionOne slot: null push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul_log_collection: false watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n \ cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n \ cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n \ cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_message: "Rabbitmq vhost and user support\n\nAdd new messagingBus and notificationsBus interfaces to hold cluster, user and vhost names for optional usage.\r\nThe controller adds these values to the TransportURL create request when present.\r\n\r\nAdditionally, we migrate RabbitMQ cluster name to RabbitMq config struct using DefaultRabbitMqConfig from infra-operator to automatically populate the new Cluster field from legacy RabbitMqClusterName.\r\n\r\nExample usage:\r\n\r\n```\r\n spec:\r\n messagingBus:\r\n \ cluster: rpc-rabbitmq\r\n user: rpc-user\r\n vhost: rpc-vhost\r\n \ notificationsBus:\r\n cluster: notifications-rabbitmq\r\n user: notifications-user\r\n vhost: notifications-vhost\r\n```\r\n\r\nJira: https://issues.redhat.com/browse/OSPRH-23882" change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_change_list: - watcher-operator zuul_execution_branch: main zuul_execution_canonical_name_and_path: github.com/openstack-k8s-operators/ci-framework/ci/playbooks/e2e-collect-logs.yml zuul_execution_phase: post zuul_execution_phase_index: '0' zuul_execution_trusted: 'False' zuul_log_collection: false zuul_success: 'True' zuul_will_retry: 'False' home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_008_run_openstack_deploy.sh0000644000175000017500000000166615133730670031572 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_008_run_openstack_deploy.log) 2>&1 pushd /home/zuul/src/github.com/openstack-k8s-operators/install_yamls export BMO_SETUP="False" export INSTALL_CERT_MANAGER="False" export OUT="/home/zuul/ci-framework-data/artifacts/manifests" export OUTPUT_DIR="/home/zuul/ci-framework-data/artifacts/edpm" export CHECKOUT_FROM_OPENSTACK_REF="true" export OPENSTACK_K8S_BRANCH="main" export WATCHER_REPO="/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" export WATCHER_BRANCH="" export KUBECONFIG="/home/zuul/.crc/machines/crc/kubeconfig" export PATH="/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" export NETWORK_MTU="1500" export NNCP_DNS_SERVER="192.168.122.10" export NNCP_INTERFACE="ens7" export CLEANUP_DIR_CMD="true" make openstack_deploy_prep popd home/zuul/zuul-output/logs/ci-framework-data/artifacts/resolv.conf0000644000175000017500000000015215133746105024527 0ustar zuulzuul# Generated by NetworkManager nameserver 192.168.122.10 nameserver 199.204.44.24 nameserver 199.204.47.54 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_010_apply_the.sh0000644000175000017500000000035215133730702027304 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_010_apply_the.log) 2>&1 oc apply -f /home/zuul/ci-framework-data/artifacts/manifests/openstack/openstack/cr/cifmw-kustomization-result.yaml home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci_script_011_run_hook_without_retry_tune.sh0000644000175000017500000000205515133731442033213 0ustar zuulzuul#!/bin/bash set -euo pipefail exec > >(tee -i /home/zuul/ci-framework-data/logs/ci_script_011_run_hook_without_retry_tune.log) 2>&1 export ANSIBLE_CONFIG="/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ansible.cfg" export ANSIBLE_LOG_PATH="/home/zuul/ci-framework-data/logs/post_ctlplane_deploy_tune_rabbitmq_resources.log" ansible-playbook -i /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml -e namespace=openstack -e "@/home/zuul/ci-framework-data/artifacts/parameters/zuul-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/install-yamls-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/custom-params.yml" -e "@/home/zuul/ci-framework-data/artifacts/parameters/openshift-login-params.yml" -e "cifmw_basedir=/home/zuul/ci-framework-data" -e "step=post_ctlplane_deploy" -e "hook_name=tune_rabbitmq_resources" -e "playbook_dir=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks" /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/hooks/playbooks/rabbitmq_tuning.yml home/zuul/zuul-output/logs/ci-framework-data/artifacts/hosts0000644000175000017500000000023715133746105023435 0ustar zuulzuul127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ip-network.txt0000644000175000017500000000315715133746105025216 0ustar zuulzuuldefault via 38.102.83.1 dev eth0 proto dhcp src 38.102.83.129 metric 100 38.102.83.0/24 dev eth0 proto kernel scope link src 38.102.83.129 metric 100 169.254.169.254 via 38.102.83.126 dev eth0 proto dhcp src 38.102.83.129 metric 100 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.11 metric 101 0: from all lookup local 32766: from all lookup main 32767: from all lookup default [ { "ifindex": 1, "ifname": "lo", "flags": [ "LOOPBACK","UP","LOWER_UP" ], "mtu": 65536, "qdisc": "noqueue", "operstate": "UNKNOWN", "linkmode": "DEFAULT", "group": "default", "txqlen": 1000, "link_type": "loopback", "address": "00:00:00:00:00:00", "broadcast": "00:00:00:00:00:00" },{ "ifindex": 2, "ifname": "eth0", "flags": [ "BROADCAST","MULTICAST","UP","LOWER_UP" ], "mtu": 1500, "qdisc": "fq_codel", "operstate": "UP", "linkmode": "DEFAULT", "group": "default", "txqlen": 1000, "link_type": "ether", "address": "fa:16:3e:17:b3:c5", "broadcast": "ff:ff:ff:ff:ff:ff", "altnames": [ "enp0s3","ens3" ] },{ "ifindex": 3, "ifname": "eth1", "flags": [ "BROADCAST","MULTICAST","UP","LOWER_UP" ], "mtu": 1500, "qdisc": "fq_codel", "operstate": "UP", "linkmode": "DEFAULT", "group": "default", "txqlen": 1000, "link_type": "ether", "address": "fa:16:3e:e2:e3:b7", "broadcast": "ff:ff:ff:ff:ff:ff", "altnames": [ "enp0s7","ens7" ] } ] home/zuul/zuul-output/logs/ci-framework-data/artifacts/parameters/0000755000175000017500000000000015133753356024521 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/parameters/openshift-login-params.yml0000644000175000017500000000043015133730124031613 0ustar zuulzuulcifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_context: default/api-crc-testing:6443/kubeadmin cifmw_openshift_kubeconfig: /home/zuul/.crc/machines/crc/kubeconfig cifmw_openshift_token: sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs cifmw_openshift_user: kubeadmin home/zuul/zuul-output/logs/ci-framework-data/artifacts/parameters/zuul-params.yml0000644000175000017500000004774015133746050027531 0ustar zuulzuulcifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_build_images_output: {} cifmw_dlrn_report_result: false cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/multinode-ci.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/ci-framework'']. src_dir }}/scenarios/centos-9/horizon.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/scenarios/{{ watcher_scenario }}.yml' - '@{{ ansible_user_dir }}/{{ zuul.projects[''github.com/openstack-k8s-operators/watcher-operator'']. src_dir }}/ci/tests/watcher-tempest.yml' cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_kubeconfig: '{{ ansible_user_dir }}/.crc/machines/crc/kubeconfig' cifmw_openshift_password: '12**********89' cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_namespace: '{{ content_provider_os_registry_url | split(''/'') | last }}' cifmw_test_operator_tempest_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: '{{ content_provider_os_registry_url | split(''/'') | first }}' cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_libvirt: false cifmw_zuul_target_host: controller content_provider_dlrn_md5_hash: '' content_provider_gating_repo_available: false content_provider_gating_repo_url: '' content_provider_os_registry_namespace: podified-epoxy-centos9 content_provider_os_registry_url: 38.102.83.51:5001/podified-epoxy-centos9 content_provider_registry_available: true content_provider_registry_ip: 38.102.83.51 content_provider_registry_ip_port: 38.102.83.51:5001 crc_ci_bootstrap_cloud_name: '{{ nodepool.cloud | replace(''-nodepool-tripleo'','''') }}' crc_ci_bootstrap_networking: instances: compute-0: networks: default: ip: 192.168.122.100 internal-api: config_nm: false ip: 172.17.0.100 storage: config_nm: false ip: 172.18.0.100 tenant: config_nm: false ip: 172.19.0.100 compute-1: networks: default: ip: 192.168.122.101 internal-api: config_nm: false ip: 172.17.0.101 storage: config_nm: false ip: 172.18.0.101 tenant: config_nm: false ip: 172.19.0.101 controller: networks: default: ip: 192.168.122.11 crc: networks: default: ip: 192.168.122.10 internal-api: ip: 172.17.0.5 storage: ip: 172.18.0.5 tenant: ip: 172.19.0.5 networks: default: mtu: '{{ (''ibm'' in nodepool.cloud) | ternary(''1440'', ''1500'') }}' range: 192.168.122.0/24 router_net: '' transparent: true internal-api: range: 172.17.0.0/24 vlan: 20 storage: range: 172.18.0.0/24 vlan: 21 tenant: range: 172.19.0.0/24 vlan: 22 enable_ramdisk: true fetch_dlrn_hash: false push_registry: quay.rdoproject.org quay_login_secret_name: quay_nextgen_zuulgithubci registry_login_enabled: true watcher_scenario: edpm-no-notifications watcher_services_tag: watcher_latest watcher_tempest_max_microversion: '1.4' zuul: _inheritance_path: - '' - '' - '' - '' - '' - '' - '' - '' - '' ansible_version: '8' attempts: 1 branch: main build: 36ad0c270b844cd7a55f74e3dc01fd5f build_refs: - branch: main change: '320' change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null buildset: a397ed1820fd4736b0b9316b14e3799c buildset_refs: - branch: main change: '320' change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null change: '320' change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 child_jobs: [] commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 event_id: fdb30ee0-f612-11f0-8358-b9707cfc18ca executor: hostname: ze04.softwarefactory-project.io inventory_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/ansible/inventory.yaml log_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/logs result_data_file: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/results.json src_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work/src work_root: /var/lib/zuul/builds/36ad0c270b844cd7a55f74e3dc01fd5f/work items: - branch: main change: '320' change_url: https://github.com/openstack-k8s-operators/watcher-operator/pull/320 commit_id: 111af6c57cd1be8032328ced6eb7a058a201c4b1 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator topic: null job: watcher-operator-validation-epoxy jobtags: [] max_attempts: 1 message: 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 patchset: 111af6c57cd1be8032328ced6eb7a058a201c4b1 pipeline: github-check playbook_context: playbook_projects: trusted/project_0/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 trusted/project_1/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef trusted/project_2/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 trusted/project_3/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_0/github.com/openstack-k8s-operators/ci-framework: canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 untrusted/project_1/review.rdoproject.org/config: canonical_name: review.rdoproject.org/config checkout: master commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 untrusted/project_2/opendev.org/zuul/zuul-jobs: canonical_name: opendev.org/zuul/zuul-jobs checkout: master commit: 691c03cc007bee9934da14cf46c86009616a2aef untrusted/project_3/review.rdoproject.org/rdo-jobs: canonical_name: review.rdoproject.org/rdo-jobs checkout: master commit: 9df4e7d5b028e976203d64479f9b7a76c1c95a24 playbooks: - path: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/edpm/run.yml roles: - checkout: main checkout_description: playbook branch link_name: ansible/playbook_0/role_0/ci-framework link_target: untrusted/project_0/github.com/openstack-k8s-operators/ci-framework role_path: ansible/playbook_0/role_0/ci-framework/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_1/config link_target: untrusted/project_1/review.rdoproject.org/config role_path: ansible/playbook_0/role_1/config/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_2/zuul-jobs link_target: untrusted/project_2/opendev.org/zuul/zuul-jobs role_path: ansible/playbook_0/role_2/zuul-jobs/roles - checkout: master checkout_description: project default branch link_name: ansible/playbook_0/role_3/rdo-jobs link_target: untrusted/project_3/review.rdoproject.org/rdo-jobs role_path: ansible/playbook_0/role_3/rdo-jobs/roles post_review: false project: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator name: openstack-k8s-operators/watcher-operator short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator projects: github.com/crc-org/crc-cloud: canonical_hostname: github.com canonical_name: github.com/crc-org/crc-cloud checkout: main checkout_description: project override ref commit: 42957126d9d9b9d1372615db325b82bd992fa335 name: crc-org/crc-cloud required: true short_name: crc-cloud src_dir: src/github.com/crc-org/crc-cloud github.com/openstack-k8s-operators/ci-framework: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/ci-framework checkout: main checkout_description: zuul branch commit: 5ef63bb0864260db9480adede60802f93ae2b6f3 name: openstack-k8s-operators/ci-framework required: true short_name: ci-framework src_dir: src/github.com/openstack-k8s-operators/ci-framework github.com/openstack-k8s-operators/edpm-ansible: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/edpm-ansible checkout: main checkout_description: zuul branch commit: 43c8ae13d85939e9a3f9cddbe838cbe4616199f7 name: openstack-k8s-operators/edpm-ansible required: true short_name: edpm-ansible src_dir: src/github.com/openstack-k8s-operators/edpm-ansible github.com/openstack-k8s-operators/infra-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/infra-operator checkout: main checkout_description: zuul branch commit: 0121df8691096e0883637457925e4142353e35ba name: openstack-k8s-operators/infra-operator required: true short_name: infra-operator src_dir: src/github.com/openstack-k8s-operators/infra-operator github.com/openstack-k8s-operators/install_yamls: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/install_yamls checkout: main checkout_description: zuul branch commit: bdf4c9385be5e3e04ff06f67f25d6993db70cf6e name: openstack-k8s-operators/install_yamls required: true short_name: install_yamls src_dir: src/github.com/openstack-k8s-operators/install_yamls github.com/openstack-k8s-operators/openstack-baremetal-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-baremetal-operator checkout: main checkout_description: zuul branch commit: 06cd1004cb26b36ba1054ccf7875fad6248762c5 name: openstack-k8s-operators/openstack-baremetal-operator required: true short_name: openstack-baremetal-operator src_dir: src/github.com/openstack-k8s-operators/openstack-baremetal-operator github.com/openstack-k8s-operators/openstack-must-gather: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-must-gather checkout: main checkout_description: zuul branch commit: c7e029430ec33bf56c2bd1d288806131a8d37c57 name: openstack-k8s-operators/openstack-must-gather required: true short_name: openstack-must-gather src_dir: src/github.com/openstack-k8s-operators/openstack-must-gather github.com/openstack-k8s-operators/openstack-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/openstack-operator checkout: main checkout_description: zuul branch commit: 38e630804dada625f7b015f13f3ac5bb7192f4dd name: openstack-k8s-operators/openstack-operator required: true short_name: openstack-operator src_dir: src/github.com/openstack-k8s-operators/openstack-operator github.com/openstack-k8s-operators/repo-setup: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/repo-setup checkout: main checkout_description: zuul branch commit: 37b10946c6a10f9fa26c13305f06bfd6867e723f name: openstack-k8s-operators/repo-setup required: true short_name: repo-setup src_dir: src/github.com/openstack-k8s-operators/repo-setup github.com/openstack-k8s-operators/watcher-operator: canonical_hostname: github.com canonical_name: github.com/openstack-k8s-operators/watcher-operator checkout: main checkout_description: zuul branch commit: 111af6c57cd1be8032328ced6eb7a058a201c4b1 name: openstack-k8s-operators/watcher-operator required: false short_name: watcher-operator src_dir: src/github.com/openstack-k8s-operators/watcher-operator opendev.org/zuul/zuul-jobs: canonical_hostname: opendev.org canonical_name: opendev.org/zuul/zuul-jobs checkout: master checkout_description: project default branch commit: 691c03cc007bee9934da14cf46c86009616a2aef name: zuul/zuul-jobs required: true short_name: zuul-jobs src_dir: src/opendev.org/zuul/zuul-jobs review.rdoproject.org/config: canonical_hostname: review.rdoproject.org canonical_name: review.rdoproject.org/config checkout: master checkout_description: project default branch commit: 08a84deec7dace955f92270e2cbb8b993f305ad4 name: config required: true short_name: config src_dir: src/review.rdoproject.org/config ref: refs/pull/320/head resources: {} tenant: rdoproject.org timeout: 10800 topic: null voting: true zuul_log_collection: false home/zuul/zuul-output/logs/ci-framework-data/artifacts/parameters/install-yamls-params.yml0000644000175000017500000006721715133746050031324 0ustar zuulzuulcifmw_install_yamls_defaults: ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24 ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24 ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24 ADOPTED_STORAGE_NETWORK: 172.18.1.0/24 ADOPTED_TENANT_NETWORK: 172.9.1.0/24 ANSIBLEEE: config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_BRANCH: main ANSIBLEEE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml ANSIBLEEE_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest ANSIBLEEE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml ANSIBLEEE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests ANSIBLEEE_KUTTL_NAMESPACE: ansibleee-kuttl-tests ANSIBLEEE_REPO: https://github.com/openstack-k8s-operators/openstack-ansibleee-operator ANSIBLEE_COMMIT_HASH: '' BARBICAN: config/samples/barbican_v1beta1_barbican.yaml BARBICAN_BRANCH: main BARBICAN_COMMIT_HASH: '' BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml BARBICAN_DEPL_IMG: unused BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git BARBICAN_SERVICE_ENABLED: 'true' BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sE**********U= BAREMETAL_BRANCH: main BAREMETAL_COMMIT_HASH: '' BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest BAREMETAL_OS_CONTAINER_IMG: '' BAREMETAL_OS_IMG: '' BAREMETAL_OS_IMG_TYPE: '' BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git BAREMETAL_TIMEOUT: 20m BASH_IMG: quay.io/openstack-k8s-operators/bash:latest BGP_ASN: '64999' BGP_LEAF_1: 100.65.4.1 BGP_LEAF_2: 100.64.4.1 BGP_OVN_ROUTING: 'false' BGP_PEER_ASN: '64999' BGP_SOURCE_IP: 172.30.4.2 BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42 BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24 BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64 BMAAS_INSTANCE_DISK_SIZE: '20' BMAAS_INSTANCE_MEMORY: '4096' BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas BMAAS_INSTANCE_NET_MODEL: virtio BMAAS_INSTANCE_OS_VARIANT: centos-stream9 BMAAS_INSTANCE_VCPUS: '2' BMAAS_INSTANCE_VIRT_TYPE: kvm BMAAS_IPV4: 'true' BMAAS_IPV6: 'false' BMAAS_LIBVIRT_USER: sushyemu BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26 BMAAS_METALLB_POOL_NAME: baremetal BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24 BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64 BMAAS_NETWORK_NAME: crc-bmaas BMAAS_NODE_COUNT: '1' BMAAS_OCP_INSTANCE_NAME: crc BMAAS_REDFISH_PASSWORD: password BMAAS_REDFISH_USERNAME: admin BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default BMAAS_SUSHY_EMULATOR_DRIVER: libvirt BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack BMH_NAMESPACE: openstack BMO_BRANCH: release-0.9 BMO_CLEANUP: 'true' BMO_COMMIT_HASH: '' BMO_IPA_BRANCH: stable/2024.1 BMO_IRONIC_HOST: 192.168.122.10 BMO_PROVISIONING_INTERFACE: '' BMO_REPO: https://github.com/metal3-io/baremetal-operator BMO_SETUP: false BMO_SETUP_ROUTE_REPLACE: 'true' BM_CTLPLANE_INTERFACE: enp1s0 BM_INSTANCE_MEMORY: '8192' BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal BM_INSTANCE_NAME_SUFFIX: '0' BM_NETWORK_NAME: default BM_NODE_COUNT: '1' BM_ROOT_PASSWORD: '' BM_ROOT_PASSWORD_SECRET: '' CEILOMETER_CENTRAL_DEPL_IMG: unused CEILOMETER_NOTIFICATION_DEPL_IMG: unused CEPH_BRANCH: release-1.15 CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml CEPH_IMG: quay.io/ceph/demo:latest-squid CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml CEPH_REPO: https://github.com/rook/rook.git CERTMANAGER_TIMEOUT: 300s CHECKOUT_FROM_OPENSTACK_REF: 'true' CINDER: config/samples/cinder_v1beta1_cinder.yaml CINDERAPI_DEPL_IMG: unused CINDERBKP_DEPL_IMG: unused CINDERSCH_DEPL_IMG: unused CINDERVOL_DEPL_IMG: unused CINDER_BRANCH: main CINDER_COMMIT_HASH: '' CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git CLEANUP_DIR_CMD: rm -Rf CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11' CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12' CRC_HTTPS_PROXY: '' CRC_HTTP_PROXY: '' CRC_STORAGE_NAMESPACE: crc-storage CRC_STORAGE_RETRIES: '3' CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz''' CRC_VERSION: latest DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret DATAPLANE_ANSIBLE_USER: '' DATAPLANE_COMPUTE_IP: 192.168.122.100 DATAPLANE_CONTAINER_PREFIX: openstack DATAPLANE_CONTAINER_TAG: current-podified DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest DATAPLANE_DEFAULT_GW: 192.168.122.1 DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100% DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned DATAPLANE_NETWORKER_IP: 192.168.122.200 DATAPLANE_NETWORK_INTERFACE_NAME: eth0 DATAPLANE_NOVA_NFS_PATH: '' DATAPLANE_NTP_SERVER: pool.ntp.org DATAPLANE_PLAYBOOK: osp.edpm.download_cache DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9 DATAPLANE_RUNNER_IMG: '' DATAPLANE_SERVER_ROLE: compute DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']' DATAPLANE_TIMEOUT: 30m DATAPLANE_TLS_ENABLED: 'true' DATAPLANE_TOTAL_NETWORKER_NODES: '1' DATAPLANE_TOTAL_NODES: '1' DBSERVICE: galera DESIGNATE: config/samples/designate_v1beta1_designate.yaml DESIGNATE_BRANCH: main DESIGNATE_COMMIT_HASH: '' DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git DNSDATA: config/samples/network_v1beta1_dnsdata.yaml DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml DNS_DEPL_IMG: unused DNS_DOMAIN: localdomain DOWNLOAD_TOOLS_SELECTION: all EDPM_ATTACH_EXTNET: 'true' EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]''' EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]''' EDPM_COMPUTE_CELLS: '1' EDPM_COMPUTE_CEPH_ENABLED: 'true' EDPM_COMPUTE_CEPH_NOVA: 'true' EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true' EDPM_COMPUTE_SRIOV_ENABLED: 'true' EDPM_COMPUTE_SUFFIX: '0' EDPM_CONFIGURE_DEFAULT_ROUTE: 'true' EDPM_CONFIGURE_HUGEPAGES: 'false' EDPM_CONFIGURE_NETWORKING: 'true' EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra EDPM_NETWORKER_SUFFIX: '0' EDPM_TOTAL_NETWORKERS: '1' EDPM_TOTAL_NODES: '1' GALERA_REPLICAS: '' GENERATE_SSH_KEYS: 'true' GIT_CLONE_OPTS: '' GLANCE: config/samples/glance_v1beta1_glance.yaml GLANCEAPI_DEPL_IMG: unused GLANCE_BRANCH: main GLANCE_COMMIT_HASH: '' GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git HEAT: config/samples/heat_v1beta1_heat.yaml HEATAPI_DEPL_IMG: unused HEATCFNAPI_DEPL_IMG: unused HEATENGINE_DEPL_IMG: unused HEAT_AUTH_ENCRYPTION_KEY: 76**********f0 HEAT_BRANCH: main HEAT_COMMIT_HASH: '' HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests HEAT_KUTTL_NAMESPACE: heat-kuttl-tests HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git HEAT_SERVICE_ENABLED: 'true' HORIZON: config/samples/horizon_v1beta1_horizon.yaml HORIZON_BRANCH: main HORIZON_COMMIT_HASH: '' HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml HORIZON_DEPL_IMG: unused HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git INFRA_BRANCH: main INFRA_COMMIT_HASH: '' INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests INFRA_KUTTL_NAMESPACE: infra-kuttl-tests INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git INSTALL_CERT_MANAGER: false INSTALL_NMSTATE: true || false INSTALL_NNCP: true || false INTERNALAPI_HOST_ROUTES: '' IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24 IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64 IPV6_LAB_LIBVIRT_STORAGE_POOL: default IPV6_LAB_MANAGE_FIREWALLD: 'true' IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24 IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64 IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24 IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1 IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3 IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96 IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false' IPV6_LAB_NETWORK_NAME: nat64 IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48 IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11 IPV6_LAB_SNO_HOST_PREFIX: '64' IPV6_LAB_SNO_INSTANCE_NAME: sno IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64 IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp IPV6_LAB_SNO_OCP_VERSION: latest-4.14 IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112 IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab IRONIC: config/samples/ironic_v1beta1_ironic.yaml IRONICAPI_DEPL_IMG: unused IRONICCON_DEPL_IMG: unused IRONICINS_DEPL_IMG: unused IRONICNAG_DEPL_IMG: unused IRONICPXE_DEPL_IMG: unused IRONIC_BRANCH: main IRONIC_COMMIT_HASH: '' IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml IRONIC_IMAGE: quay.io/metal3-io/ironic IRONIC_IMAGE_TAG: release-24.1 IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml KEYSTONEAPI_DEPL_IMG: unused KEYSTONE_BRANCH: main KEYSTONE_COMMIT_HASH: '' KEYSTONE_FEDERATION_CLIENT_SECRET: CO**********6f KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git KUBEADMIN_PWD: '12345678' LIBVIRT_SECRET: libvirt-secret LOKI_DEPLOY_MODE: openshift-network LOKI_DEPLOY_NAMESPACE: netobserv LOKI_DEPLOY_SIZE: 1x.demo LOKI_NAMESPACE: openshift-operators-redhat LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki LOKI_SUBSCRIPTION: loki-operator LVMS_CR: '1' MANILA: config/samples/manila_v1beta1_manila.yaml MANILAAPI_DEPL_IMG: unused MANILASCH_DEPL_IMG: unused MANILASHARE_DEPL_IMG: unused MANILA_BRANCH: main MANILA_COMMIT_HASH: '' MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests MANILA_KUTTL_NAMESPACE: manila-kuttl-tests MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git MANILA_SERVICE_ENABLED: 'true' MARIADB: config/samples/mariadb_v1beta1_galera.yaml MARIADB_BRANCH: main MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests MARIADB_COMMIT_HASH: '' MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml MARIADB_DEPL_IMG: unused MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml MEMCACHED_DEPL_IMG: unused METADATA_SHARED_SECRET: '12**********42' METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90 METALLB_POOL: 192.168.122.80-192.168.122.90 MICROSHIFT: '0' NAMESPACE: openstack NETCONFIG: config/samples/network_v1beta1_netconfig.yaml NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml NETCONFIG_DEPL_IMG: unused NETOBSERV_DEPLOY_NAMESPACE: netobserv NETOBSERV_NAMESPACE: openshift-netobserv-operator NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net NETOBSERV_SUBSCRIPTION: netobserv-operator NETWORK_BGP: 'false' NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0 NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0 NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0 NETWORK_ISOLATION: 'true' NETWORK_ISOLATION_INSTANCE_NAME: crc NETWORK_ISOLATION_IPV4: 'true' NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24 NETWORK_ISOLATION_IPV4_NAT: 'true' NETWORK_ISOLATION_IPV6: 'false' NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64 NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10 NETWORK_ISOLATION_MAC: '52:54:00:11:11:10' NETWORK_ISOLATION_NETWORK_NAME: net-iso NETWORK_ISOLATION_NET_NAME: default NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true' NETWORK_MTU: '1500' NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0 NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0 NETWORK_STORAGE_MACVLAN: '' NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0 NETWORK_VLAN_START: '20' NETWORK_VLAN_STEP: '1' NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml NEUTRONAPI_DEPL_IMG: unused NEUTRON_BRANCH: main NEUTRON_COMMIT_HASH: '' NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git NFS_HOME: /home/nfs NMSTATE_NAMESPACE: openshift-nmstate NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8 NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator NNCP_ADDITIONAL_HOST_ROUTES: '' NNCP_BGP_1_INTERFACE: enp7s0 NNCP_BGP_1_IP_ADDRESS: 100.65.4.2 NNCP_BGP_2_INTERFACE: enp8s0 NNCP_BGP_2_IP_ADDRESS: 100.64.4.2 NNCP_BRIDGE: ospbr NNCP_CLEANUP_TIMEOUT: 120s NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::' NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10' NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122 NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10' NNCP_DNS_SERVER: 192.168.122.1 NNCP_DNS_SERVER_IPV6: fd00:aaaa::1 NNCP_GATEWAY: 192.168.122.1 NNCP_GATEWAY_IPV6: fd00:aaaa::1 NNCP_INTERFACE: enp6s0 NNCP_NODES: '' NNCP_TIMEOUT: 240s NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_BRANCH: main NOVA_COMMIT_HASH: '' NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git NUMBER_OF_INSTANCES: '1' OCP_NETWORK_NAME: crc OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_BRANCH: main OCTAVIA_COMMIT_HASH: '' OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git OKD: 'false' OPENSTACK_BRANCH: main OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest OPENSTACK_COMMIT_HASH: '' OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_CRDS_DIR: openstack_crds OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest OPENSTACK_K8S_BRANCH: main OPENSTACK_K8S_TAG: latest OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests OPENSTACK_NEUTRON_CUSTOM_CONF: '' OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator OPERATOR_CHANNEL: '' OPERATOR_NAMESPACE: openstack-operators OPERATOR_SOURCE: '' OPERATOR_SOURCE_NAMESPACE: '' OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml OVNCONTROLLER_NMAP: 'true' OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml OVN_BRANCH: main OVN_COMMIT_HASH: '' OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests OVN_KUTTL_NAMESPACE: ovn-kuttl-tests OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git PASSWORD: '12**********78' PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml PLACEMENTAPI_DEPL_IMG: unused PLACEMENT_BRANCH: main PLACEMENT_COMMIT_HASH: '' PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_BRANCH: patches RABBITMQ_COMMIT_HASH: '' RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml RABBITMQ_DEPL_IMG: unused RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git REDHAT_OPERATORS: 'false' REDIS: config/samples/redis_v1beta1_redis.yaml REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml REDIS_DEPL_IMG: unused RH_REGISTRY_PWD: '' RH_REGISTRY_USER: '' SECRET: os**********et SG_CORE_DEPL_IMG: unused STANDALONE_COMPUTE_DRIVER: libvirt STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0 STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0 STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0 STANDALONE_STORAGE_NET_PREFIX: 172.18.0 STANDALONE_TENANT_NET_PREFIX: 172.19.0 STORAGEMGMT_HOST_ROUTES: '' STORAGE_CLASS: local-storage STORAGE_HOST_ROUTES: '' SWIFT: config/samples/swift_v1beta1_swift.yaml SWIFT_BRANCH: main SWIFT_COMMIT_HASH: '' SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_BRANCH: main TELEMETRY_COMMIT_HASH: '' TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests TELEMETRY_KUTTL_RELPATH: test/kuttl/suites TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git TENANT_HOST_ROUTES: '' TIMEOUT: 300s TLS_ENABLED: 'false' WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator tripleo_deploy: 'export REGISTRY_PWD:' cifmw_install_yamls_environment: BMO_SETUP: false CHECKOUT_FROM_OPENSTACK_REF: 'true' INSTALL_CERT_MANAGER: false KUBECONFIG: /home/zuul/.crc/machines/crc/kubeconfig OPENSTACK_K8S_BRANCH: main OUT: /home/zuul/ci-framework-data/artifacts/manifests OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm WATCHER_BRANCH: '' WATCHER_REPO: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator home/zuul/zuul-output/logs/ci-framework-data/artifacts/parameters/custom-params.yml0000644000175000017500000002210415133746050030027 0ustar zuulzuulcifmw_architecture_repo: /home/zuul/src/github.com/openstack-k8s-operators/architecture cifmw_architecture_repo_relative: src/github.com/openstack-k8s-operators/architecture cifmw_artifacts_crc_sshkey: ~/.ssh/id_cifw cifmw_basedir: /home/zuul/ci-framework-data cifmw_build_images_output: {} cifmw_config_certmanager: true cifmw_default_dns_servers: - 1.1.1.1 - 8.8.8.8 cifmw_deploy_edpm: true cifmw_dlrn_report_result: false cifmw_edpm_deploy_nova_compute_extra_config: '[libvirt] cpu_mode = custom cpu_models = Nehalem ' cifmw_edpm_prepare_kustomizations: - apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization namespace: openstack patches: - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n enabled: true\n template:\n \ ceilometer:\n enabled: true\n metricStorage:\n enabled: true\n customMonitoringStack:\n alertmanagerConfig:\n \ disabled: true\n prometheusConfig:\n enableRemoteWriteReceiver: true\n persistentVolumeClaim:\n resources:\n requests:\n \ storage: 20G\n replicas: 1\n scrapeInterval: 30s\n resourceSelector:\n matchLabels:\n service: metricStorage\n retention: 24h" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n telemetry:\n template:\n metricStorage:\n \ monitoringStack: null" target: kind: OpenStackControlPlane - patch: "apiVersion: core.openstack.org/v1beta1\nkind: OpenStackControlPlane\nmetadata:\n \ name: controlplane\nspec:\n watcher:\n enabled: true\n template:\n \ decisionengineServiceTemplate:\n customServiceConfig: |\n \ [watcher_cluster_data_model_collectors.compute]\n period = 60\n [watcher_cluster_data_model_collectors.storage]\n period = 60" target: kind: OpenStackControlPlane cifmw_edpm_prepare_skip_crc_storage_creation: true cifmw_edpm_prepare_timeout: 60 cifmw_edpm_telemetry_enabled_exporters: - podman_exporter - openstack_network_exporter cifmw_extras: - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/multinode-ci.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/scenarios/centos-9/horizon.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/scenarios/edpm-no-notifications.yml' - '@/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/tests/watcher-tempest.yml' cifmw_installyamls_repos: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls cifmw_installyamls_repos_relative: src/github.com/openstack-k8s-operators/install_yamls cifmw_nolog: true cifmw_openshift_api: api.crc.testing:6443 cifmw_openshift_password: '12**********89' cifmw_openshift_setup_skip_internal_registry: true cifmw_openshift_setup_skip_internal_registry_tls_verify: true cifmw_openshift_skip_tls_verify: true cifmw_openshift_user: kubeadmin cifmw_openstack_k8s_operators_org_url: https://github.com/openstack-k8s-operators cifmw_openstack_namespace: openstack cifmw_operator_build_meta_name: openstack-operator cifmw_operator_build_output: operators: openstack-operator: git_commit_hash: 38e630804dada625f7b015f13f3ac5bb7192f4dd git_src_dir: ~/src/github.com/openstack-k8s-operators/openstack-operator image: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator:38e630804dada625f7b015f13f3ac5bb7192f4dd image_bundle: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-bundle:38e630804dada625f7b015f13f3ac5bb7192f4dd image_catalog: 38.102.83.51:5001/openstack-k8s-operators/openstack-operator-index:38e630804dada625f7b015f13f3ac5bb7192f4dd watcher-operator: git_commit_hash: 111af6c57cd1be8032328ced6eb7a058a201c4b1 git_src_dir: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator image: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_bundle: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-bundle:111af6c57cd1be8032328ced6eb7a058a201c4b1 image_catalog: 38.102.83.51:5001/openstack-k8s-operators/watcher-operator-index:111af6c57cd1be8032328ced6eb7a058a201c4b1 cifmw_path: /home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin cifmw_repo: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_relative: src/github.com/openstack-k8s-operators/ci-framework cifmw_repo_setup_dist_major_version: 9 cifmw_repo_setup_os_release: centos cifmw_run_test_role: test_operator cifmw_run_tests: true cifmw_test_operator_tempest_concurrency: 1 cifmw_test_operator_tempest_exclude_list: 'watcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* ' cifmw_test_operator_tempest_external_plugin: - changeRefspec: 380572db57798530b64dcac14c6b01b0382c5d8e changeRepository: https://review.opendev.org/openstack/watcher-tempest-plugin repository: https://opendev.org/openstack/watcher-tempest-plugin.git cifmw_test_operator_tempest_image_tag: watcher_latest cifmw_test_operator_tempest_include_list: 'watcher_tempest_plugin.* ' cifmw_test_operator_tempest_namespace: podified-epoxy-centos9 cifmw_test_operator_tempest_registry: 38.102.83.51:5001 cifmw_test_operator_tempest_tempestconf_config: overrides: 'compute.min_microversion 2.56 compute.min_compute_nodes 2 placement.min_microversion 1.29 compute-feature-enabled.live_migration true compute-feature-enabled.block_migration_for_live_migration true service_available.sg_core true telemetry_services.metric_backends prometheus telemetry.disable_ssl_certificate_validation true telemetry.ceilometer_polling_interval 15 optimize.min_microversion 1.0 optimize.max_microversion 1.4 optimize.datasource prometheus optimize.openstack_type podified optimize.proxy_host_address 38.102.83.129 optimize.proxy_host_user zuul optimize.prometheus_host metric-storage-prometheus.openstack.svc optimize.prometheus_ssl_enabled true optimize.prometheus_ssl_cert_dir /etc/prometheus/secrets/combined-ca-bundle optimize.podified_kubeconfig_path /home/zuul/.crc/machines/crc/kubeconfig optimize.podified_namespace openstack optimize.run_continuous_audit_tests true ' cifmw_update_containers: true cifmw_update_containers_openstack: false cifmw_update_containers_org: podified-epoxy-centos9 cifmw_update_containers_registry: 38.102.83.51:5001 cifmw_update_containers_tag: watcher_latest cifmw_update_containers_watcher: true cifmw_use_crc: false cifmw_use_libvirt: false cifmw_zuul_target_host: controller post_ctlplane_deploy: - name: Tune rabbitmq resources source: rabbitmq_tuning.yml type: playbook post_deploy: - inventory: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/hosts name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook - name: Patch Openstack Prometheus to enable admin API source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/prometheus_admin_api.yaml type: playbook post_infra: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook pre_deploy: - name: 80 Kustomize OpenStack CR source: control_plane_horizon.yml type: playbook pre_deploy_create_coo_subscription: - name: Deploy cluster-observability-operator source: /home/zuul/src/github.com/openstack-k8s-operators/watcher-operator/ci/playbooks/deploy_cluster_observability_operator.yaml type: playbook pre_infra: - connection: local inventory: localhost, name: Download needed tools source: /home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml type: playbook pre_update: - inventory: /home/zuul/ci-framework-data/artifacts/zuul_inventory.yml name: Fetch nodes facts and save them as parameters source: fetch_compute_facts.yml type: playbook home/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/0000755000175000017500000000000015133753356025302 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/system-connections/0000755000175000017500000000000015133753356031146 5ustar zuulzuul././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/system-connections/ens3.nmconnectionhome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/system-connections/ens3.nmconn0000644000175000017500000000026215133746105033222 0ustar zuulzuul[connection] id=ens3 uuid=e94616dd-9c37-40d7-ae7c-f2a49628045b type=ethernet interface-name=ens3 [ethernet] [ipv4] method=auto [ipv6] addr-gen-mode=eui64 method=auto [proxy] ././@LongLink0000644000000000000000000000017100000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/system-connections/ci-private-network.nmconnectionhome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/system-connections/ci-private-0000644000175000017500000000051315133746105033202 0ustar zuulzuul[connection] id=ci-private-network uuid=30c21fc1-8470-5844-9aab-efb8ad4b8884 type=ethernet autoconnect=true interface-name=eth1 [ethernet] mac-address=fa:16:3e:e2:e3:b7 mtu=1500 [ipv4] method=manual addresses=192.168.122.11/24 never-default=true gateway=192.168.122.1 [ipv6] addr-gen-mode=stable-privacy method=disabled [proxy] home/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/ens3.nmconnection0000644000175000017500000000026215133740623030557 0ustar zuulzuul[connection] id=ens3 uuid=e94616dd-9c37-40d7-ae7c-f2a49628045b type=ethernet interface-name=ens3 [ethernet] [ipv4] method=auto [ipv6] addr-gen-mode=eui64 method=auto [proxy] ././@LongLink0000644000000000000000000000014600000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/ci-private-network.nmconnectionhome/zuul/zuul-output/logs/ci-framework-data/artifacts/NetworkManager/ci-private-network.nmconnectio0000644000175000017500000000051315133740623033262 0ustar zuulzuul[connection] id=ci-private-network uuid=30c21fc1-8470-5844-9aab-efb8ad4b8884 type=ethernet autoconnect=true interface-name=eth1 [ethernet] mac-address=fa:16:3e:e2:e3:b7 mtu=1500 [ipv4] method=manual addresses=192.168.122.11/24 never-default=true gateway=192.168.122.1 [ipv6] addr-gen-mode=stable-privacy method=disabled [proxy] home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/0000755000175000017500000000000015133753356024400 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/0000755000175000017500000000000015133753356026563 5ustar zuulzuul././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/delorean-antelope-testing.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/delorean-antelope-testi0000644000175000017500000000317215133746105033227 0ustar zuulzuul[delorean-antelope-testing] name=dlrn-antelope-testing baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [delorean-antelope-build-deps] name=dlrn-antelope-build-deps baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/build-deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-rabbitmq] name=centos9-rabbitmq baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/messaging/$basearch/rabbitmq-38/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-storage] name=centos9-storage baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/storage/$basearch/ceph-reef/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-opstools] name=centos9-opstools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/opstools/$basearch/collectd-5/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-nfv-ovs] name=NFV SIG OpenvSwitch baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/nfv/$basearch/openvswitch-2/ gpgcheck=0 enabled=1 module_hotfixes=1 # epel is required for Ceph Reef [epel-low-priority] name=Extra Packages for Enterprise Linux $releasever - $basearch metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-$releasever&arch=$basearch&infra=$infra&content=$contentdir enabled=1 gpgcheck=0 countme=1 priority=100 includepkgs=libarrow*,parquet*,python3-asyncssh,re2,python3-grpcio,grpc*,abseil*,thrift*,blake3 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/delorean.repo0000644000175000017500000001341515133746105031241 0ustar zuulzuul[delorean-component-barbican] name=delorean-openstack-barbican-42b4c41831408a8e323fec3c8983b5c793b64874 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/barbican/42/b4/42b4c41831408a8e323fec3c8983b5c793b64874_08052e9d enabled=1 gpgcheck=0 priority=1 [delorean-component-baremetal] name=delorean-python-glean-10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/baremetal/10/df/10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7_36137eb3 enabled=1 gpgcheck=0 priority=1 [delorean-component-cinder] name=delorean-openstack-cinder-1c00d6490d88e436f26efb71f2ac96e75252e97c baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cinder/1c/00/1c00d6490d88e436f26efb71f2ac96e75252e97c_f716f000 enabled=1 gpgcheck=0 priority=1 [delorean-component-clients] name=delorean-python-stevedore-c4acc5639fd2329372142e39464fcca0209b0018 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/clients/c4/ac/c4acc5639fd2329372142e39464fcca0209b0018_d3ef8337 enabled=1 gpgcheck=0 priority=1 [delorean-component-cloudops] name=delorean-python-cloudkitty-tests-tempest-2c80f80e02c5accd099187ea762c8f8389bd7905 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cloudops/2c/80/2c80f80e02c5accd099187ea762c8f8389bd7905_33e4dd93 enabled=1 gpgcheck=0 priority=1 [delorean-component-common] name=delorean-os-refresh-config-9bfc52b5049be2d8de6134d662fdde9dfa48960f baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/common/9b/fc/9bfc52b5049be2d8de6134d662fdde9dfa48960f_b85780e6 enabled=1 gpgcheck=0 priority=1 [delorean-component-compute] name=delorean-openstack-nova-6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/compute/6f/8d/6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e_dc05b899 enabled=1 gpgcheck=0 priority=1 [delorean-component-designate] name=delorean-python-designate-tests-tempest-347fdbc9b4595a10b726526b3c0b5928e5b7fcf2 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/designate/34/7f/347fdbc9b4595a10b726526b3c0b5928e5b7fcf2_3fd39337 enabled=1 gpgcheck=0 priority=1 [delorean-component-glance] name=delorean-openstack-glance-1fd12c29b339f30fe823e2b5beba14b5f241e52a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/glance/1f/d1/1fd12c29b339f30fe823e2b5beba14b5f241e52a_0d693729 enabled=1 gpgcheck=0 priority=1 [delorean-component-keystone] name=delorean-openstack-keystone-e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/keystone/e4/b4/e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7_264c03cc enabled=1 gpgcheck=0 priority=1 [delorean-component-manila] name=delorean-openstack-manila-3c01b7181572c95dac462eb19c3121e36cb0fe95 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/manila/3c/01/3c01b7181572c95dac462eb19c3121e36cb0fe95_912dfd18 enabled=1 gpgcheck=0 priority=1 [delorean-component-network] name=delorean-python-whitebox-neutron-tests-tempest-12cf06ce36a79a584fc757f4c25ff96845573c93 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/network/12/cf/12cf06ce36a79a584fc757f4c25ff96845573c93_3ed3aba3 enabled=1 gpgcheck=0 priority=1 [delorean-component-octavia] name=delorean-openstack-octavia-ba397f07a7331190208c93368ee23826ac4e2707 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/octavia/ba/39/ba397f07a7331190208c93368ee23826ac4e2707_9d6e596a enabled=1 gpgcheck=0 priority=1 [delorean-component-optimize] name=delorean-openstack-watcher-c014f81a8647287f6dcc339321c1256f5a2e82d5 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/optimize/c0/14/c014f81a8647287f6dcc339321c1256f5a2e82d5_bcbfdccc enabled=1 gpgcheck=0 priority=1 [delorean-component-podified] name=delorean-ansible-config_template-5ccaa22121a7ff05620975540d81f6efb077d8db baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/podified/5c/ca/5ccaa22121a7ff05620975540d81f6efb077d8db_83eb7cc2 enabled=1 gpgcheck=0 priority=1 [delorean-component-puppet] name=delorean-puppet-ceph-7352068d7b8c84ded636ab3158dafa6f3851951e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/puppet/73/52/7352068d7b8c84ded636ab3158dafa6f3851951e_7cde1ad1 enabled=1 gpgcheck=0 priority=1 [delorean-component-swift] name=delorean-openstack-swift-dc98a8463506ac520c469adb0ef47d0f7753905a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/swift/dc/98/dc98a8463506ac520c469adb0ef47d0f7753905a_9d02f069 enabled=1 gpgcheck=0 priority=1 [delorean-component-tempest] name=delorean-python-tempestconf-8515371b7cceebd4282e09f1d8f0cc842df82855 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/tempest/85/15/8515371b7cceebd4282e09f1d8f0cc842df82855_a1e336c7 enabled=1 gpgcheck=0 priority=1 [delorean-component-ui] name=delorean-openstack-heat-ui-013accbfd179753bc3f0d1f4e5bed07a4fd9f771 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/ui/01/3a/013accbfd179753bc3f0d1f4e5bed07a4fd9f771_0c88e467 enabled=1 gpgcheck=0 priority=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/delorean.repo.md50000644000175000017500000000004115133746105031714 0ustar zuulzuulc3923531bcda0b0811b2d5053f189beb ././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-appstream.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-appst0000644000175000017500000000031615133746105033221 0ustar zuulzuul [repo-setup-centos-appstream] name=repo-setup-centos-appstream baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/AppStream/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-baseos.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-baseo0000644000175000017500000000030415133746105033160 0ustar zuulzuul [repo-setup-centos-baseos] name=repo-setup-centos-baseos baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/BaseOS/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000016500000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-highavailability.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-higha0000644000175000017500000000034215133746105033151 0ustar zuulzuul [repo-setup-centos-highavailability] name=repo-setup-centos-highavailability baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/HighAvailability/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000015700000000000011606 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-powertools.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/yum.repos.d/repo-setup-centos-power0000644000175000017500000000031115133746105033221 0ustar zuulzuul [repo-setup-centos-powertools] name=repo-setup-centos-powertools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/CRB/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/delorean-antelope-testing.repo0000644000175000017500000000317215133740623032334 0ustar zuulzuul[delorean-antelope-testing] name=dlrn-antelope-testing baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [delorean-antelope-build-deps] name=dlrn-antelope-build-deps baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/build-deps/latest/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-rabbitmq] name=centos9-rabbitmq baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/messaging/$basearch/rabbitmq-38/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-storage] name=centos9-storage baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/storage/$basearch/ceph-reef/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-opstools] name=centos9-opstools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/opstools/$basearch/collectd-5/ enabled=1 gpgcheck=0 module_hotfixes=1 [centos9-nfv-ovs] name=NFV SIG OpenvSwitch baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/SIGs/9-stream/nfv/$basearch/openvswitch-2/ gpgcheck=0 enabled=1 module_hotfixes=1 # epel is required for Ceph Reef [epel-low-priority] name=Extra Packages for Enterprise Linux $releasever - $basearch metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-$releasever&arch=$basearch&infra=$infra&content=$contentdir enabled=1 gpgcheck=0 countme=1 priority=100 includepkgs=libarrow*,parquet*,python3-asyncssh,re2,python3-grpcio,grpc*,abseil*,thrift*,blake3 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/delorean.repo0000644000175000017500000001341515133740623027055 0ustar zuulzuul[delorean-component-barbican] name=delorean-openstack-barbican-42b4c41831408a8e323fec3c8983b5c793b64874 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/barbican/42/b4/42b4c41831408a8e323fec3c8983b5c793b64874_08052e9d enabled=1 gpgcheck=0 priority=1 [delorean-component-baremetal] name=delorean-python-glean-10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/baremetal/10/df/10df0bd91b9bc5c9fd9cc02d75c0084cd4da29a7_36137eb3 enabled=1 gpgcheck=0 priority=1 [delorean-component-cinder] name=delorean-openstack-cinder-1c00d6490d88e436f26efb71f2ac96e75252e97c baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cinder/1c/00/1c00d6490d88e436f26efb71f2ac96e75252e97c_f716f000 enabled=1 gpgcheck=0 priority=1 [delorean-component-clients] name=delorean-python-stevedore-c4acc5639fd2329372142e39464fcca0209b0018 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/clients/c4/ac/c4acc5639fd2329372142e39464fcca0209b0018_d3ef8337 enabled=1 gpgcheck=0 priority=1 [delorean-component-cloudops] name=delorean-python-cloudkitty-tests-tempest-2c80f80e02c5accd099187ea762c8f8389bd7905 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/cloudops/2c/80/2c80f80e02c5accd099187ea762c8f8389bd7905_33e4dd93 enabled=1 gpgcheck=0 priority=1 [delorean-component-common] name=delorean-os-refresh-config-9bfc52b5049be2d8de6134d662fdde9dfa48960f baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/common/9b/fc/9bfc52b5049be2d8de6134d662fdde9dfa48960f_b85780e6 enabled=1 gpgcheck=0 priority=1 [delorean-component-compute] name=delorean-openstack-nova-6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/compute/6f/8d/6f8decf0b4f1aa2e96292b6a2ffc28249fe4af5e_dc05b899 enabled=1 gpgcheck=0 priority=1 [delorean-component-designate] name=delorean-python-designate-tests-tempest-347fdbc9b4595a10b726526b3c0b5928e5b7fcf2 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/designate/34/7f/347fdbc9b4595a10b726526b3c0b5928e5b7fcf2_3fd39337 enabled=1 gpgcheck=0 priority=1 [delorean-component-glance] name=delorean-openstack-glance-1fd12c29b339f30fe823e2b5beba14b5f241e52a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/glance/1f/d1/1fd12c29b339f30fe823e2b5beba14b5f241e52a_0d693729 enabled=1 gpgcheck=0 priority=1 [delorean-component-keystone] name=delorean-openstack-keystone-e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/keystone/e4/b4/e4b40af0ae3698fbbbbfb8c22468b33aae80e6d7_264c03cc enabled=1 gpgcheck=0 priority=1 [delorean-component-manila] name=delorean-openstack-manila-3c01b7181572c95dac462eb19c3121e36cb0fe95 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/manila/3c/01/3c01b7181572c95dac462eb19c3121e36cb0fe95_912dfd18 enabled=1 gpgcheck=0 priority=1 [delorean-component-network] name=delorean-python-whitebox-neutron-tests-tempest-12cf06ce36a79a584fc757f4c25ff96845573c93 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/network/12/cf/12cf06ce36a79a584fc757f4c25ff96845573c93_3ed3aba3 enabled=1 gpgcheck=0 priority=1 [delorean-component-octavia] name=delorean-openstack-octavia-ba397f07a7331190208c93368ee23826ac4e2707 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/octavia/ba/39/ba397f07a7331190208c93368ee23826ac4e2707_9d6e596a enabled=1 gpgcheck=0 priority=1 [delorean-component-optimize] name=delorean-openstack-watcher-c014f81a8647287f6dcc339321c1256f5a2e82d5 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/optimize/c0/14/c014f81a8647287f6dcc339321c1256f5a2e82d5_bcbfdccc enabled=1 gpgcheck=0 priority=1 [delorean-component-podified] name=delorean-ansible-config_template-5ccaa22121a7ff05620975540d81f6efb077d8db baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/podified/5c/ca/5ccaa22121a7ff05620975540d81f6efb077d8db_83eb7cc2 enabled=1 gpgcheck=0 priority=1 [delorean-component-puppet] name=delorean-puppet-ceph-7352068d7b8c84ded636ab3158dafa6f3851951e baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/puppet/73/52/7352068d7b8c84ded636ab3158dafa6f3851951e_7cde1ad1 enabled=1 gpgcheck=0 priority=1 [delorean-component-swift] name=delorean-openstack-swift-dc98a8463506ac520c469adb0ef47d0f7753905a baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/swift/dc/98/dc98a8463506ac520c469adb0ef47d0f7753905a_9d02f069 enabled=1 gpgcheck=0 priority=1 [delorean-component-tempest] name=delorean-python-tempestconf-8515371b7cceebd4282e09f1d8f0cc842df82855 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/tempest/85/15/8515371b7cceebd4282e09f1d8f0cc842df82855_a1e336c7 enabled=1 gpgcheck=0 priority=1 [delorean-component-ui] name=delorean-openstack-heat-ui-013accbfd179753bc3f0d1f4e5bed07a4fd9f771 baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org:8080/rdo//centos9-antelope/component/ui/01/3a/013accbfd179753bc3f0d1f4e5bed07a4fd9f771_0c88e467 enabled=1 gpgcheck=0 priority=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/delorean.repo.md50000644000175000017500000000004115133740623027530 0ustar zuulzuulc3923531bcda0b0811b2d5053f189beb home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/repo-setup-centos-appstream.repo0000644000175000017500000000031615133740623032646 0ustar zuulzuul [repo-setup-centos-appstream] name=repo-setup-centos-appstream baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/AppStream/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/repo-setup-centos-baseos.repo0000644000175000017500000000030415133740623032123 0ustar zuulzuul [repo-setup-centos-baseos] name=repo-setup-centos-baseos baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/BaseOS/$basearch/os/ gpgcheck=0 enabled=1 ././@LongLink0000644000000000000000000000015100000000000011600 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/repo-setup-centos-highavailability.repohome/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/repo-setup-centos-highavailability.0000644000175000017500000000034215133740623033275 0ustar zuulzuul [repo-setup-centos-highavailability] name=repo-setup-centos-highavailability baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/HighAvailability/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/yum_repos/repo-setup-centos-powertools.repo0000644000175000017500000000031115133740623033062 0ustar zuulzuul [repo-setup-centos-powertools] name=repo-setup-centos-powertools baseurl=http://mirror.regionone.vexxhost-nodepool-tripleo.rdoproject.org/centos-stream/9-stream/CRB/$basearch/os/ gpgcheck=0 enabled=1 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/0000755000175000017500000000000015133746064026727 5ustar zuulzuul././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_cache/home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_0000755000175000017500000000000015133753356031606 5ustar zuulzuul././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_cache/localhosthome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_0000644000175000017500000070173715133753356031627 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "38.102.83.129", "192.168.122.11" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:fe17:b3c5" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768931727", "epoch_int": "1768931727", "hour": "17", "iso8601": "2026-01-20T17:55:27Z", "iso8601_basic": "20260120T175527383154", "iso8601_basic_short": "20260120T175527", "iso8601_micro": "2026-01-20T17:55:27.383154Z", "minute": "55", "month": "01", "second": "27", "time": "17:55:27", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.129", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:17:b3:c5", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-23-08-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-23-08-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "83883999", "sectorsize": 512, "size": "40.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "83886080", "sectorsize": "512", "size": "40.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "192.168.122.10", "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul/src/github.com/openstack-k8s-operators/ci-framework", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "2", "SSH_CLIENT": "38.102.83.114 58004 22", "SSH_CONNECTION": "38.102.83.114 58004 38.102.83.129 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "9", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.129", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:fe17:b3c5", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:17:b3:c5", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.11", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:e2:e3:b7", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "controller", "ansible_hostname": "controller", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "lo", "eth1", "eth0" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.43, "1m": 1.17, "5m": 0.82 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.129", "127.0.0.0/8", "127.0.0.1", "192.168.122.11" ], "ipv6": [ "::1", "fe80::f816:3eff:fe17:b3c5" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 1269, "ansible_memory_mb": { "nocache": { "free": 2767, "used": 888 }, "real": { "free": 1269, "total": 3655, "used": 2386 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 3655, "ansible_mounts": [ { "block_available": 9579302, "block_size": 4096, "block_total": 10469115, "block_used": 889813, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 20821671, "inode_total": 20970992, "inode_used": 149321, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 39236820992, "size_total": 42881495040, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "controller", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 2, "ansible_processor_nproc": 2, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 2, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKGY33Ph7e+/jsrEFKFfKBaoCp1Mo/kAn0kRw/YRBWFHMhMmQzTHXsz2l1+eFmI2xlosRUTVSlE1P8mHa7wyN68=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIJxeFN6m6ewBPxFAIbS9rVh1LhgLbGXxE+lh04PNnagD", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 997, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "cifmw_discovered_hash": "6b1f209ecc539dcfd8634a5c7786c6629def62c87865ceb38b6678fdd81d8a90", "cifmw_discovered_hash_algorithm": "sha256", "cifmw_discovered_image_name": "CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2", "cifmw_discovered_image_url": "https://cloud.centos.org/centos/9-stream/x86_64/images//CentOS-Stream-GenericCloud-x86_64-9-latest.x86_64.qcow2", "cifmw_edpm_deploy_env": { "BMO_SETUP": false, "CHECKOUT_FROM_OPENSTACK_REF": "true", "DATAPLANE_COMPUTE_IP": "192.168.122.100", "DATAPLANE_CONTAINER_TAG": "c3923531bcda0b0811b2d5053f189beb", "DATAPLANE_EXTRA_NOVA_CONFIG_FILE": "/home/zuul/ci-framework-data/nova-extra-config.conf", "DATAPLANE_REGISTRY_URL": "quay.io/podified-antelope-centos9", "DATAPLANE_SINGLE_NODE": "false", "DATAPLANE_SSHD_ALLOWED_RANGES": "['0.0.0.0/0']", "DATAPLANE_TOTAL_NODES": 2, "INSTALL_CERT_MANAGER": false, "KUBECONFIG": "/home/zuul/.crc/machines/crc/kubeconfig", "OPENSTACK_K8S_BRANCH": "main", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "PATH": "/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "SSH_KEY_FILE": "/home/zuul/.ssh/id_cifw", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" }, "cifmw_install_yamls_defaults": { "ADOPTED_EXTERNAL_NETWORK": "172.21.1.0/24", "ADOPTED_INTERNALAPI_NETWORK": "172.17.1.0/24", "ADOPTED_STORAGEMGMT_NETWORK": "172.20.1.0/24", "ADOPTED_STORAGE_NETWORK": "172.18.1.0/24", "ADOPTED_TENANT_NETWORK": "172.9.1.0/24", "ANSIBLEEE": "config/samples/_v1beta1_ansibleee.yaml", "ANSIBLEEE_BRANCH": "main", "ANSIBLEEE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/config/samples/_v1beta1_ansibleee.yaml", "ANSIBLEEE_IMG": "quay.io/openstack-k8s-operators/openstack-ansibleee-operator-index:latest", "ANSIBLEEE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/kuttl-test.yaml", "ANSIBLEEE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-ansibleee-operator/test/kuttl/tests", "ANSIBLEEE_KUTTL_NAMESPACE": "ansibleee-kuttl-tests", "ANSIBLEEE_REPO": "https://github.com/openstack-k8s-operators/openstack-ansibleee-operator", "ANSIBLEE_COMMIT_HASH": "", "BARBICAN": "config/samples/barbican_v1beta1_barbican.yaml", "BARBICAN_BRANCH": "main", "BARBICAN_COMMIT_HASH": "", "BARBICAN_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml", "BARBICAN_DEPL_IMG": "unused", "BARBICAN_IMG": "quay.io/openstack-k8s-operators/barbican-operator-index:latest", "BARBICAN_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml", "BARBICAN_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests", "BARBICAN_KUTTL_NAMESPACE": "barbican-kuttl-tests", "BARBICAN_REPO": "https://github.com/openstack-k8s-operators/barbican-operator.git", "BARBICAN_SERVICE_ENABLED": "true", "BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY": "sE**********U=", "BAREMETAL_BRANCH": "main", "BAREMETAL_COMMIT_HASH": "", "BAREMETAL_IMG": "quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest", "BAREMETAL_OS_CONTAINER_IMG": "", "BAREMETAL_OS_IMG": "", "BAREMETAL_OS_IMG_TYPE": "", "BAREMETAL_REPO": "https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git", "BAREMETAL_TIMEOUT": "20m", "BASH_IMG": "quay.io/openstack-k8s-operators/bash:latest", "BGP_ASN": "64999", "BGP_LEAF_1": "100.65.4.1", "BGP_LEAF_2": "100.64.4.1", "BGP_OVN_ROUTING": "false", "BGP_PEER_ASN": "64999", "BGP_SOURCE_IP": "172.30.4.2", "BGP_SOURCE_IP6": "f00d:f00d:f00d:f00d:f00d:f00d:f00d:42", "BMAAS_BRIDGE_IPV4_PREFIX": "172.20.1.2/24", "BMAAS_BRIDGE_IPV6_PREFIX": "fd00:bbbb::2/64", "BMAAS_INSTANCE_DISK_SIZE": "20", "BMAAS_INSTANCE_MEMORY": "4096", "BMAAS_INSTANCE_NAME_PREFIX": "crc-bmaas", "BMAAS_INSTANCE_NET_MODEL": "virtio", "BMAAS_INSTANCE_OS_VARIANT": "centos-stream9", "BMAAS_INSTANCE_VCPUS": "2", "BMAAS_INSTANCE_VIRT_TYPE": "kvm", "BMAAS_IPV4": "true", "BMAAS_IPV6": "false", "BMAAS_LIBVIRT_USER": "sushyemu", "BMAAS_METALLB_ADDRESS_POOL": "172.20.1.64/26", "BMAAS_METALLB_POOL_NAME": "baremetal", "BMAAS_NETWORK_IPV4_PREFIX": "172.20.1.1/24", "BMAAS_NETWORK_IPV6_PREFIX": "fd00:bbbb::1/64", "BMAAS_NETWORK_NAME": "crc-bmaas", "BMAAS_NODE_COUNT": "1", "BMAAS_OCP_INSTANCE_NAME": "crc", "BMAAS_REDFISH_PASSWORD": "password", "BMAAS_REDFISH_USERNAME": "admin", "BMAAS_ROUTE_LIBVIRT_NETWORKS": "crc-bmaas,crc,default", "BMAAS_SUSHY_EMULATOR_DRIVER": "libvirt", "BMAAS_SUSHY_EMULATOR_IMAGE": "quay.io/metal3-io/sushy-tools:latest", "BMAAS_SUSHY_EMULATOR_NAMESPACE": "sushy-emulator", "BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE": "/etc/openstack/clouds.yaml", "BMAAS_SUSHY_EMULATOR_OS_CLOUD": "openstack", "BMH_NAMESPACE": "openstack", "BMO_BRANCH": "release-0.9", "BMO_CLEANUP": "true", "BMO_COMMIT_HASH": "", "BMO_IPA_BRANCH": "stable/2024.1", "BMO_IRONIC_HOST": "192.168.122.10", "BMO_PROVISIONING_INTERFACE": "", "BMO_REPO": "https://github.com/metal3-io/baremetal-operator", "BMO_SETUP": false, "BMO_SETUP_ROUTE_REPLACE": "true", "BM_CTLPLANE_INTERFACE": "enp1s0", "BM_INSTANCE_MEMORY": "8192", "BM_INSTANCE_NAME_PREFIX": "edpm-compute-baremetal", "BM_INSTANCE_NAME_SUFFIX": "0", "BM_NETWORK_NAME": "default", "BM_NODE_COUNT": "1", "BM_ROOT_PASSWORD": "", "BM_ROOT_PASSWORD_SECRET": "", "CEILOMETER_CENTRAL_DEPL_IMG": "unused", "CEILOMETER_NOTIFICATION_DEPL_IMG": "unused", "CEPH_BRANCH": "release-1.15", "CEPH_CLIENT": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml", "CEPH_COMMON": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml", "CEPH_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml", "CEPH_CRDS": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml", "CEPH_IMG": "quay.io/ceph/demo:latest-squid", "CEPH_OP": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml", "CEPH_REPO": "https://github.com/rook/rook.git", "CERTMANAGER_TIMEOUT": "300s", "CHECKOUT_FROM_OPENSTACK_REF": "true", "CINDER": "config/samples/cinder_v1beta1_cinder.yaml", "CINDERAPI_DEPL_IMG": "unused", "CINDERBKP_DEPL_IMG": "unused", "CINDERSCH_DEPL_IMG": "unused", "CINDERVOL_DEPL_IMG": "unused", "CINDER_BRANCH": "main", "CINDER_COMMIT_HASH": "", "CINDER_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml", "CINDER_IMG": "quay.io/openstack-k8s-operators/cinder-operator-index:latest", "CINDER_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml", "CINDER_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests", "CINDER_KUTTL_NAMESPACE": "cinder-kuttl-tests", "CINDER_REPO": "https://github.com/openstack-k8s-operators/cinder-operator.git", "CLEANUP_DIR_CMD": "rm -Rf", "CRC_BGP_NIC_1_MAC": "52:54:00:11:11:11", "CRC_BGP_NIC_2_MAC": "52:54:00:11:11:12", "CRC_HTTPS_PROXY": "", "CRC_HTTP_PROXY": "", "CRC_STORAGE_NAMESPACE": "crc-storage", "CRC_STORAGE_RETRIES": "3", "CRC_URL": "'https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'", "CRC_VERSION": "latest", "DATAPLANE_ANSIBLE_SECRET": "dataplane-ansible-ssh-private-key-secret", "DATAPLANE_ANSIBLE_USER": "", "DATAPLANE_COMPUTE_IP": "192.168.122.100", "DATAPLANE_CONTAINER_PREFIX": "openstack", "DATAPLANE_CONTAINER_TAG": "current-podified", "DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG": "quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest", "DATAPLANE_DEFAULT_GW": "192.168.122.1", "DATAPLANE_EXTRA_NOVA_CONFIG_FILE": "/dev/null", "DATAPLANE_GROWVOLS_ARGS": "/=8GB /tmp=1GB /home=1GB /var=100%", "DATAPLANE_KUSTOMIZE_SCENARIO": "preprovisioned", "DATAPLANE_NETWORKER_IP": "192.168.122.200", "DATAPLANE_NETWORK_INTERFACE_NAME": "eth0", "DATAPLANE_NOVA_NFS_PATH": "", "DATAPLANE_NTP_SERVER": "pool.ntp.org", "DATAPLANE_PLAYBOOK": "osp.edpm.download_cache", "DATAPLANE_REGISTRY_URL": "quay.io/podified-antelope-centos9", "DATAPLANE_RUNNER_IMG": "", "DATAPLANE_SERVER_ROLE": "compute", "DATAPLANE_SSHD_ALLOWED_RANGES": "['192.168.122.0/24']", "DATAPLANE_TIMEOUT": "30m", "DATAPLANE_TLS_ENABLED": "true", "DATAPLANE_TOTAL_NETWORKER_NODES": "1", "DATAPLANE_TOTAL_NODES": "1", "DBSERVICE": "galera", "DESIGNATE": "config/samples/designate_v1beta1_designate.yaml", "DESIGNATE_BRANCH": "main", "DESIGNATE_COMMIT_HASH": "", "DESIGNATE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml", "DESIGNATE_IMG": "quay.io/openstack-k8s-operators/designate-operator-index:latest", "DESIGNATE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml", "DESIGNATE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests", "DESIGNATE_KUTTL_NAMESPACE": "designate-kuttl-tests", "DESIGNATE_REPO": "https://github.com/openstack-k8s-operators/designate-operator.git", "DNSDATA": "config/samples/network_v1beta1_dnsdata.yaml", "DNSDATA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml", "DNSMASQ": "config/samples/network_v1beta1_dnsmasq.yaml", "DNSMASQ_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml", "DNS_DEPL_IMG": "unused", "DNS_DOMAIN": "localdomain", "DOWNLOAD_TOOLS_SELECTION": "all", "EDPM_ATTACH_EXTNET": "true", "EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES": "'[]'", "EDPM_COMPUTE_ADDITIONAL_NETWORKS": "'[]'", "EDPM_COMPUTE_CELLS": "1", "EDPM_COMPUTE_CEPH_ENABLED": "true", "EDPM_COMPUTE_CEPH_NOVA": "true", "EDPM_COMPUTE_DHCP_AGENT_ENABLED": "true", "EDPM_COMPUTE_SRIOV_ENABLED": "true", "EDPM_COMPUTE_SUFFIX": "0", "EDPM_CONFIGURE_DEFAULT_ROUTE": "true", "EDPM_CONFIGURE_HUGEPAGES": "false", "EDPM_CONFIGURE_NETWORKING": "true", "EDPM_FIRSTBOOT_EXTRA": "/tmp/edpm-firstboot-extra", "EDPM_NETWORKER_SUFFIX": "0", "EDPM_TOTAL_NETWORKERS": "1", "EDPM_TOTAL_NODES": "1", "GALERA_REPLICAS": "", "GENERATE_SSH_KEYS": "true", "GIT_CLONE_OPTS": "", "GLANCE": "config/samples/glance_v1beta1_glance.yaml", "GLANCEAPI_DEPL_IMG": "unused", "GLANCE_BRANCH": "main", "GLANCE_COMMIT_HASH": "", "GLANCE_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml", "GLANCE_IMG": "quay.io/openstack-k8s-operators/glance-operator-index:latest", "GLANCE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml", "GLANCE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests", "GLANCE_KUTTL_NAMESPACE": "glance-kuttl-tests", "GLANCE_REPO": "https://github.com/openstack-k8s-operators/glance-operator.git", "HEAT": "config/samples/heat_v1beta1_heat.yaml", "HEATAPI_DEPL_IMG": "unused", "HEATCFNAPI_DEPL_IMG": "unused", "HEATENGINE_DEPL_IMG": "unused", "HEAT_AUTH_ENCRYPTION_KEY": "76**********f0", "HEAT_BRANCH": "main", "HEAT_COMMIT_HASH": "", "HEAT_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml", "HEAT_IMG": "quay.io/openstack-k8s-operators/heat-operator-index:latest", "HEAT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml", "HEAT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests", "HEAT_KUTTL_NAMESPACE": "heat-kuttl-tests", "HEAT_REPO": "https://github.com/openstack-k8s-operators/heat-operator.git", "HEAT_SERVICE_ENABLED": "true", "HORIZON": "config/samples/horizon_v1beta1_horizon.yaml", "HORIZON_BRANCH": "main", "HORIZON_COMMIT_HASH": "", "HORIZON_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml", "HORIZON_DEPL_IMG": "unused", "HORIZON_IMG": "quay.io/openstack-k8s-operators/horizon-operator-index:latest", "HORIZON_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml", "HORIZON_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests", "HORIZON_KUTTL_NAMESPACE": "horizon-kuttl-tests", "HORIZON_REPO": "https://github.com/openstack-k8s-operators/horizon-operator.git", "INFRA_BRANCH": "main", "INFRA_COMMIT_HASH": "", "INFRA_IMG": "quay.io/openstack-k8s-operators/infra-operator-index:latest", "INFRA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml", "INFRA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests", "INFRA_KUTTL_NAMESPACE": "infra-kuttl-tests", "INFRA_REPO": "https://github.com/openstack-k8s-operators/infra-operator.git", "INSTALL_CERT_MANAGER": false, "INSTALL_NMSTATE": "true || false", "INSTALL_NNCP": "true || false", "INTERNALAPI_HOST_ROUTES": "", "IPV6_LAB_IPV4_NETWORK_IPADDRESS": "172.30.0.1/24", "IPV6_LAB_IPV6_NETWORK_IPADDRESS": "fd00:abcd:abcd:fc00::1/64", "IPV6_LAB_LIBVIRT_STORAGE_POOL": "default", "IPV6_LAB_MANAGE_FIREWALLD": "true", "IPV6_LAB_NAT64_HOST_IPV4": "172.30.0.2/24", "IPV6_LAB_NAT64_HOST_IPV6": "fd00:abcd:abcd:fc00::2/64", "IPV6_LAB_NAT64_INSTANCE_NAME": "nat64-router", "IPV6_LAB_NAT64_IPV6_NETWORK": "fd00:abcd:abcd:fc00::/64", "IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL": "192.168.255.0/24", "IPV6_LAB_NAT64_TAYGA_IPV4": "192.168.255.1", "IPV6_LAB_NAT64_TAYGA_IPV6": "fd00:abcd:abcd:fc00::3", "IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX": "fd00:abcd:abcd:fcff::/96", "IPV6_LAB_NAT64_UPDATE_PACKAGES": "false", "IPV6_LAB_NETWORK_NAME": "nat64", "IPV6_LAB_SNO_CLUSTER_NETWORK": "fd00:abcd:0::/48", "IPV6_LAB_SNO_HOST_IP": "fd00:abcd:abcd:fc00::11", "IPV6_LAB_SNO_HOST_PREFIX": "64", "IPV6_LAB_SNO_INSTANCE_NAME": "sno", "IPV6_LAB_SNO_MACHINE_NETWORK": "fd00:abcd:abcd:fc00::/64", "IPV6_LAB_SNO_OCP_MIRROR_URL": "https://mirror.openshift.com/pub/openshift-v4/clients/ocp", "IPV6_LAB_SNO_OCP_VERSION": "latest-4.14", "IPV6_LAB_SNO_SERVICE_NETWORK": "fd00:abcd:abcd:fc03::/112", "IPV6_LAB_SSH_PUB_KEY": "/home/zuul/.ssh/id_rsa.pub", "IPV6_LAB_WORK_DIR": "/home/zuul/.ipv6lab", "IRONIC": "config/samples/ironic_v1beta1_ironic.yaml", "IRONICAPI_DEPL_IMG": "unused", "IRONICCON_DEPL_IMG": "unused", "IRONICINS_DEPL_IMG": "unused", "IRONICNAG_DEPL_IMG": "unused", "IRONICPXE_DEPL_IMG": "unused", "IRONIC_BRANCH": "main", "IRONIC_COMMIT_HASH": "", "IRONIC_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml", "IRONIC_IMAGE": "quay.io/metal3-io/ironic", "IRONIC_IMAGE_TAG": "release-24.1", "IRONIC_IMG": "quay.io/openstack-k8s-operators/ironic-operator-index:latest", "IRONIC_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml", "IRONIC_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests", "IRONIC_KUTTL_NAMESPACE": "ironic-kuttl-tests", "IRONIC_REPO": "https://github.com/openstack-k8s-operators/ironic-operator.git", "KEYSTONEAPI": "config/samples/keystone_v1beta1_keystoneapi.yaml", "KEYSTONEAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml", "KEYSTONEAPI_DEPL_IMG": "unused", "KEYSTONE_BRANCH": "main", "KEYSTONE_COMMIT_HASH": "", "KEYSTONE_FEDERATION_CLIENT_SECRET": "CO**********6f", "KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE": "openstack", "KEYSTONE_IMG": "quay.io/openstack-k8s-operators/keystone-operator-index:latest", "KEYSTONE_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml", "KEYSTONE_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests", "KEYSTONE_KUTTL_NAMESPACE": "keystone-kuttl-tests", "KEYSTONE_REPO": "https://github.com/openstack-k8s-operators/keystone-operator.git", "KUBEADMIN_PWD": "12345678", "LIBVIRT_SECRET": "libvirt-secret", "LOKI_DEPLOY_MODE": "openshift-network", "LOKI_DEPLOY_NAMESPACE": "netobserv", "LOKI_DEPLOY_SIZE": "1x.demo", "LOKI_NAMESPACE": "openshift-operators-redhat", "LOKI_OPERATOR_GROUP": "openshift-operators-redhat-loki", "LOKI_SUBSCRIPTION": "loki-operator", "LVMS_CR": "1", "MANILA": "config/samples/manila_v1beta1_manila.yaml", "MANILAAPI_DEPL_IMG": "unused", "MANILASCH_DEPL_IMG": "unused", "MANILASHARE_DEPL_IMG": "unused", "MANILA_BRANCH": "main", "MANILA_COMMIT_HASH": "", "MANILA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml", "MANILA_IMG": "quay.io/openstack-k8s-operators/manila-operator-index:latest", "MANILA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml", "MANILA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests", "MANILA_KUTTL_NAMESPACE": "manila-kuttl-tests", "MANILA_REPO": "https://github.com/openstack-k8s-operators/manila-operator.git", "MANILA_SERVICE_ENABLED": "true", "MARIADB": "config/samples/mariadb_v1beta1_galera.yaml", "MARIADB_BRANCH": "main", "MARIADB_CHAINSAW_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml", "MARIADB_CHAINSAW_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests", "MARIADB_CHAINSAW_NAMESPACE": "mariadb-chainsaw-tests", "MARIADB_COMMIT_HASH": "", "MARIADB_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml", "MARIADB_DEPL_IMG": "unused", "MARIADB_IMG": "quay.io/openstack-k8s-operators/mariadb-operator-index:latest", "MARIADB_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml", "MARIADB_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests", "MARIADB_KUTTL_NAMESPACE": "mariadb-kuttl-tests", "MARIADB_REPO": "https://github.com/openstack-k8s-operators/mariadb-operator.git", "MEMCACHED": "config/samples/memcached_v1beta1_memcached.yaml", "MEMCACHED_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml", "MEMCACHED_DEPL_IMG": "unused", "METADATA_SHARED_SECRET": "12**********42", "METALLB_IPV6_POOL": "fd00:aaaa::80-fd00:aaaa::90", "METALLB_POOL": "192.168.122.80-192.168.122.90", "MICROSHIFT": "0", "NAMESPACE": "openstack", "NETCONFIG": "config/samples/network_v1beta1_netconfig.yaml", "NETCONFIG_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml", "NETCONFIG_DEPL_IMG": "unused", "NETOBSERV_DEPLOY_NAMESPACE": "netobserv", "NETOBSERV_NAMESPACE": "openshift-netobserv-operator", "NETOBSERV_OPERATOR_GROUP": "openshift-netobserv-operator-net", "NETOBSERV_SUBSCRIPTION": "netobserv-operator", "NETWORK_BGP": "false", "NETWORK_DESIGNATE_ADDRESS_PREFIX": "172.28.0", "NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX": "172.50.0", "NETWORK_INTERNALAPI_ADDRESS_PREFIX": "172.17.0", "NETWORK_ISOLATION": "true", "NETWORK_ISOLATION_INSTANCE_NAME": "crc", "NETWORK_ISOLATION_IPV4": "true", "NETWORK_ISOLATION_IPV4_ADDRESS": "172.16.1.1/24", "NETWORK_ISOLATION_IPV4_NAT": "true", "NETWORK_ISOLATION_IPV6": "false", "NETWORK_ISOLATION_IPV6_ADDRESS": "fd00:aaaa::1/64", "NETWORK_ISOLATION_IP_ADDRESS": "192.168.122.10", "NETWORK_ISOLATION_MAC": "52:54:00:11:11:10", "NETWORK_ISOLATION_NETWORK_NAME": "net-iso", "NETWORK_ISOLATION_NET_NAME": "default", "NETWORK_ISOLATION_USE_DEFAULT_NETWORK": "true", "NETWORK_MTU": "1500", "NETWORK_STORAGEMGMT_ADDRESS_PREFIX": "172.20.0", "NETWORK_STORAGE_ADDRESS_PREFIX": "172.18.0", "NETWORK_STORAGE_MACVLAN": "", "NETWORK_TENANT_ADDRESS_PREFIX": "172.19.0", "NETWORK_VLAN_START": "20", "NETWORK_VLAN_STEP": "1", "NEUTRONAPI": "config/samples/neutron_v1beta1_neutronapi.yaml", "NEUTRONAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml", "NEUTRONAPI_DEPL_IMG": "unused", "NEUTRON_BRANCH": "main", "NEUTRON_COMMIT_HASH": "", "NEUTRON_IMG": "quay.io/openstack-k8s-operators/neutron-operator-index:latest", "NEUTRON_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml", "NEUTRON_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests", "NEUTRON_KUTTL_NAMESPACE": "neutron-kuttl-tests", "NEUTRON_REPO": "https://github.com/openstack-k8s-operators/neutron-operator.git", "NFS_HOME": "/home/nfs", "NMSTATE_NAMESPACE": "openshift-nmstate", "NMSTATE_OPERATOR_GROUP": "openshift-nmstate-tn6k8", "NMSTATE_SUBSCRIPTION": "kubernetes-nmstate-operator", "NNCP_ADDITIONAL_HOST_ROUTES": "", "NNCP_BGP_1_INTERFACE": "enp7s0", "NNCP_BGP_1_IP_ADDRESS": "100.65.4.2", "NNCP_BGP_2_INTERFACE": "enp8s0", "NNCP_BGP_2_IP_ADDRESS": "100.64.4.2", "NNCP_BRIDGE": "ospbr", "NNCP_CLEANUP_TIMEOUT": "120s", "NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX": "fd00:aaaa::", "NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX": "10", "NNCP_CTLPLANE_IP_ADDRESS_PREFIX": "192.168.122", "NNCP_CTLPLANE_IP_ADDRESS_SUFFIX": "10", "NNCP_DNS_SERVER": "192.168.122.1", "NNCP_DNS_SERVER_IPV6": "fd00:aaaa::1", "NNCP_GATEWAY": "192.168.122.1", "NNCP_GATEWAY_IPV6": "fd00:aaaa::1", "NNCP_INTERFACE": "enp6s0", "NNCP_NODES": "", "NNCP_TIMEOUT": "240s", "NOVA": "config/samples/nova_v1beta1_nova_collapsed_cell.yaml", "NOVA_BRANCH": "main", "NOVA_COMMIT_HASH": "", "NOVA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml", "NOVA_IMG": "quay.io/openstack-k8s-operators/nova-operator-index:latest", "NOVA_REPO": "https://github.com/openstack-k8s-operators/nova-operator.git", "NUMBER_OF_INSTANCES": "1", "OCP_NETWORK_NAME": "crc", "OCTAVIA": "config/samples/octavia_v1beta1_octavia.yaml", "OCTAVIA_BRANCH": "main", "OCTAVIA_COMMIT_HASH": "", "OCTAVIA_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml", "OCTAVIA_IMG": "quay.io/openstack-k8s-operators/octavia-operator-index:latest", "OCTAVIA_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml", "OCTAVIA_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests", "OCTAVIA_KUTTL_NAMESPACE": "octavia-kuttl-tests", "OCTAVIA_REPO": "https://github.com/openstack-k8s-operators/octavia-operator.git", "OKD": "false", "OPENSTACK_BRANCH": "main", "OPENSTACK_BUNDLE_IMG": "quay.io/openstack-k8s-operators/openstack-operator-bundle:latest", "OPENSTACK_COMMIT_HASH": "", "OPENSTACK_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml", "OPENSTACK_CRDS_DIR": "openstack_crds", "OPENSTACK_CTLPLANE": "config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml", "OPENSTACK_IMG": "quay.io/openstack-k8s-operators/openstack-operator-index:latest", "OPENSTACK_K8S_BRANCH": "main", "OPENSTACK_K8S_TAG": "latest", "OPENSTACK_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml", "OPENSTACK_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests", "OPENSTACK_KUTTL_NAMESPACE": "openstack-kuttl-tests", "OPENSTACK_NEUTRON_CUSTOM_CONF": "", "OPENSTACK_REPO": "https://github.com/openstack-k8s-operators/openstack-operator.git", "OPENSTACK_STORAGE_BUNDLE_IMG": "quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest", "OPERATOR_BASE_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator", "OPERATOR_CHANNEL": "", "OPERATOR_NAMESPACE": "openstack-operators", "OPERATOR_SOURCE": "", "OPERATOR_SOURCE_NAMESPACE": "", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "OVNCONTROLLER": "config/samples/ovn_v1beta1_ovncontroller.yaml", "OVNCONTROLLER_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml", "OVNCONTROLLER_NMAP": "true", "OVNDBS": "config/samples/ovn_v1beta1_ovndbcluster.yaml", "OVNDBS_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml", "OVNNORTHD": "config/samples/ovn_v1beta1_ovnnorthd.yaml", "OVNNORTHD_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml", "OVN_BRANCH": "main", "OVN_COMMIT_HASH": "", "OVN_IMG": "quay.io/openstack-k8s-operators/ovn-operator-index:latest", "OVN_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml", "OVN_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests", "OVN_KUTTL_NAMESPACE": "ovn-kuttl-tests", "OVN_REPO": "https://github.com/openstack-k8s-operators/ovn-operator.git", "PASSWORD": "12**********78", "PLACEMENTAPI": "config/samples/placement_v1beta1_placementapi.yaml", "PLACEMENTAPI_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml", "PLACEMENTAPI_DEPL_IMG": "unused", "PLACEMENT_BRANCH": "main", "PLACEMENT_COMMIT_HASH": "", "PLACEMENT_IMG": "quay.io/openstack-k8s-operators/placement-operator-index:latest", "PLACEMENT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml", "PLACEMENT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests", "PLACEMENT_KUTTL_NAMESPACE": "placement-kuttl-tests", "PLACEMENT_REPO": "https://github.com/openstack-k8s-operators/placement-operator.git", "PULL_SECRET": "/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt", "RABBITMQ": "docs/examples/default-security-context/rabbitmq.yaml", "RABBITMQ_BRANCH": "patches", "RABBITMQ_COMMIT_HASH": "", "RABBITMQ_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml", "RABBITMQ_DEPL_IMG": "unused", "RABBITMQ_IMG": "quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest", "RABBITMQ_REPO": "https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git", "REDHAT_OPERATORS": "false", "REDIS": "config/samples/redis_v1beta1_redis.yaml", "REDIS_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml", "REDIS_DEPL_IMG": "unused", "RH_REGISTRY_PWD": "", "RH_REGISTRY_USER": "", "SECRET": "os**********et", "SG_CORE_DEPL_IMG": "unused", "STANDALONE_COMPUTE_DRIVER": "libvirt", "STANDALONE_EXTERNAL_NET_PREFFIX": "172.21.0", "STANDALONE_INTERNALAPI_NET_PREFIX": "172.17.0", "STANDALONE_STORAGEMGMT_NET_PREFIX": "172.20.0", "STANDALONE_STORAGE_NET_PREFIX": "172.18.0", "STANDALONE_TENANT_NET_PREFIX": "172.19.0", "STORAGEMGMT_HOST_ROUTES": "", "STORAGE_CLASS": "local-storage", "STORAGE_HOST_ROUTES": "", "SWIFT": "config/samples/swift_v1beta1_swift.yaml", "SWIFT_BRANCH": "main", "SWIFT_COMMIT_HASH": "", "SWIFT_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml", "SWIFT_IMG": "quay.io/openstack-k8s-operators/swift-operator-index:latest", "SWIFT_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml", "SWIFT_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests", "SWIFT_KUTTL_NAMESPACE": "swift-kuttl-tests", "SWIFT_REPO": "https://github.com/openstack-k8s-operators/swift-operator.git", "TELEMETRY": "config/samples/telemetry_v1beta1_telemetry.yaml", "TELEMETRY_BRANCH": "main", "TELEMETRY_COMMIT_HASH": "", "TELEMETRY_CR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml", "TELEMETRY_IMG": "quay.io/openstack-k8s-operators/telemetry-operator-index:latest", "TELEMETRY_KUTTL_BASEDIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator", "TELEMETRY_KUTTL_CONF": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml", "TELEMETRY_KUTTL_DIR": "/home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites", "TELEMETRY_KUTTL_NAMESPACE": "telemetry-kuttl-tests", "TELEMETRY_KUTTL_RELPATH": "test/kuttl/suites", "TELEMETRY_REPO": "https://github.com/openstack-k8s-operators/telemetry-operator.git", "TENANT_HOST_ROUTES": "", "TIMEOUT": "300s", "TLS_ENABLED": "false", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator", "tripleo_deploy": "export REGISTRY_PWD:" }, "cifmw_install_yamls_environment": { "BMO_SETUP": false, "CHECKOUT_FROM_OPENSTACK_REF": "true", "INSTALL_CERT_MANAGER": false, "KUBECONFIG": "/home/zuul/.crc/machines/crc/kubeconfig", "OPENSTACK_K8S_BRANCH": "main", "OUT": "/home/zuul/ci-framework-data/artifacts/manifests", "OUTPUT_DIR": "/home/zuul/ci-framework-data/artifacts/edpm", "WATCHER_BRANCH": "", "WATCHER_REPO": "/home/zuul/src/github.com/openstack-k8s-operators/watcher-operator" }, "cifmw_openshift_api": "https://api.crc.testing:6443", "cifmw_openshift_context": "default/api-crc-testing:6443/kubeadmin", "cifmw_openshift_kubeconfig": "/home/zuul/.crc/machines/crc/kubeconfig", "cifmw_openshift_login_api": "https://api.crc.testing:6443", "cifmw_openshift_login_cert_login": false, "cifmw_openshift_login_context": "default/api-crc-testing:6443/kubeadmin", "cifmw_openshift_login_kubeconfig": "/home/zuul/.crc/machines/crc/kubeconfig", "cifmw_openshift_login_password": 12**********89, "cifmw_openshift_login_token": "sh**********hs", "cifmw_openshift_login_user": "kubeadmin", "cifmw_openshift_token": "sha256~cEOVzDR-3364eSPAR2gQH6LddiloH9zDIUYi4v8gFhs", "cifmw_openshift_user": "kubeadmin", "cifmw_path": "/home/zuul/.crc/bin:/home/zuul/.crc/bin/oc:/home/zuul/bin:/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "cifmw_repo_setup_commit_hash": null, "cifmw_repo_setup_distro_hash": null, "cifmw_repo_setup_dlrn_api_url": "https://trunk.rdoproject.org/api-centos9-antelope", "cifmw_repo_setup_dlrn_url": "https://trunk.rdoproject.org/centos9-antelope/current-podified/delorean.repo.md5", "cifmw_repo_setup_extended_hash": null, "cifmw_repo_setup_full_hash": "c3923531bcda0b0811b2d5053f189beb", "cifmw_repo_setup_release": "antelope", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "min" ], "module_setup": true, "packages": { "NetworkManager": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-libnm": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-libnm", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-team": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-team", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "NetworkManager-tui": [ { "arch": "x86_64", "epoch": 1, "name": "NetworkManager-tui", "release": "2.el9", "source": "rpm", "version": "1.54.3" } ], "aardvark-dns": [ { "arch": "x86_64", "epoch": 2, "name": "aardvark-dns", "release": "1.el9", "source": "rpm", "version": "1.17.0" } ], "abattis-cantarell-fonts": [ { "arch": "noarch", "epoch": null, "name": "abattis-cantarell-fonts", "release": "4.el9", "source": "rpm", "version": "0.301" } ], "acl": [ { "arch": "x86_64", "epoch": null, "name": "acl", "release": "4.el9", "source": "rpm", "version": "2.3.1" } ], "adobe-source-code-pro-fonts": [ { "arch": "noarch", "epoch": null, "name": "adobe-source-code-pro-fonts", "release": "12.el9.1", "source": "rpm", "version": "2.030.1.050" } ], "alternatives": [ { "arch": "x86_64", "epoch": null, "name": "alternatives", "release": "2.el9", "source": "rpm", "version": "1.24" } ], "annobin": [ { "arch": "x86_64", "epoch": null, "name": "annobin", "release": "1.el9", "source": "rpm", "version": "12.98" } ], "ansible-core": [ { "arch": "x86_64", "epoch": 1, "name": "ansible-core", "release": "2.el9", "source": "rpm", "version": "2.14.18" } ], "apr": [ { "arch": "x86_64", "epoch": null, "name": "apr", "release": "12.el9", "source": "rpm", "version": "1.7.0" } ], "apr-util": [ { "arch": "x86_64", "epoch": null, "name": "apr-util", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "apr-util-bdb": [ { "arch": "x86_64", "epoch": null, "name": "apr-util-bdb", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "apr-util-openssl": [ { "arch": "x86_64", "epoch": null, "name": "apr-util-openssl", "release": "23.el9", "source": "rpm", "version": "1.6.1" } ], "attr": [ { "arch": "x86_64", "epoch": null, "name": "attr", "release": "3.el9", "source": "rpm", "version": "2.5.1" } ], "audit": [ { "arch": "x86_64", "epoch": null, "name": "audit", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "audit-libs": [ { "arch": "x86_64", "epoch": null, "name": "audit-libs", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "authselect": [ { "arch": "x86_64", "epoch": null, "name": "authselect", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "authselect-compat": [ { "arch": "x86_64", "epoch": null, "name": "authselect-compat", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "authselect-libs": [ { "arch": "x86_64", "epoch": null, "name": "authselect-libs", "release": "3.el9", "source": "rpm", "version": "1.2.6" } ], "basesystem": [ { "arch": "noarch", "epoch": null, "name": "basesystem", "release": "13.el9", "source": "rpm", "version": "11" } ], "bash": [ { "arch": "x86_64", "epoch": null, "name": "bash", "release": "9.el9", "source": "rpm", "version": "5.1.8" } ], "bash-completion": [ { "arch": "noarch", "epoch": 1, "name": "bash-completion", "release": "5.el9", "source": "rpm", "version": "2.11" } ], "binutils": [ { "arch": "x86_64", "epoch": null, "name": "binutils", "release": "69.el9", "source": "rpm", "version": "2.35.2" } ], "binutils-gold": [ { "arch": "x86_64", "epoch": null, "name": "binutils-gold", "release": "69.el9", "source": "rpm", "version": "2.35.2" } ], "buildah": [ { "arch": "x86_64", "epoch": 2, "name": "buildah", "release": "1.el9", "source": "rpm", "version": "1.41.3" } ], "bzip2": [ { "arch": "x86_64", "epoch": null, "name": "bzip2", "release": "10.el9", "source": "rpm", "version": "1.0.8" } ], "bzip2-libs": [ { "arch": "x86_64", "epoch": null, "name": "bzip2-libs", "release": "10.el9", "source": "rpm", "version": "1.0.8" } ], "c-ares": [ { "arch": "x86_64", "epoch": null, "name": "c-ares", "release": "2.el9", "source": "rpm", "version": "1.19.1" } ], "ca-certificates": [ { "arch": "noarch", "epoch": null, "name": "ca-certificates", "release": "91.el9", "source": "rpm", "version": "2025.2.80_v9.0.305" } ], "centos-gpg-keys": [ { "arch": "noarch", "epoch": null, "name": "centos-gpg-keys", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "centos-logos": [ { "arch": "x86_64", "epoch": null, "name": "centos-logos", "release": "1.el9", "source": "rpm", "version": "90.9" } ], "centos-stream-release": [ { "arch": "noarch", "epoch": null, "name": "centos-stream-release", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "centos-stream-repos": [ { "arch": "noarch", "epoch": null, "name": "centos-stream-repos", "release": "34.el9", "source": "rpm", "version": "9.0" } ], "checkpolicy": [ { "arch": "x86_64", "epoch": null, "name": "checkpolicy", "release": "1.el9", "source": "rpm", "version": "3.6" } ], "chrony": [ { "arch": "x86_64", "epoch": null, "name": "chrony", "release": "1.el9", "source": "rpm", "version": "4.8" } ], "cloud-init": [ { "arch": "noarch", "epoch": null, "name": "cloud-init", "release": "8.el9", "source": "rpm", "version": "24.4" } ], "cloud-utils-growpart": [ { "arch": "x86_64", "epoch": null, "name": "cloud-utils-growpart", "release": "1.el9", "source": "rpm", "version": "0.33" } ], "cmake-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "cmake-filesystem", "release": "3.el9", "source": "rpm", "version": "3.31.8" } ], "cockpit-bridge": [ { "arch": "noarch", "epoch": null, "name": "cockpit-bridge", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-system": [ { "arch": "noarch", "epoch": null, "name": "cockpit-system", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-ws": [ { "arch": "x86_64", "epoch": null, "name": "cockpit-ws", "release": "1.el9", "source": "rpm", "version": "348" } ], "cockpit-ws-selinux": [ { "arch": "x86_64", "epoch": null, "name": "cockpit-ws-selinux", "release": "1.el9", "source": "rpm", "version": "348" } ], "conmon": [ { "arch": "x86_64", "epoch": 3, "name": "conmon", "release": "1.el9", "source": "rpm", "version": "2.1.13" } ], "container-selinux": [ { "arch": "noarch", "epoch": 4, "name": "container-selinux", "release": "1.el9", "source": "rpm", "version": "2.244.0" } ], "containers-common": [ { "arch": "x86_64", "epoch": 4, "name": "containers-common", "release": "134.el9", "source": "rpm", "version": "1" } ], "containers-common-extra": [ { "arch": "x86_64", "epoch": 4, "name": "containers-common-extra", "release": "134.el9", "source": "rpm", "version": "1" } ], "coreutils": [ { "arch": "x86_64", "epoch": null, "name": "coreutils", "release": "39.el9", "source": "rpm", "version": "8.32" } ], "coreutils-common": [ { "arch": "x86_64", "epoch": null, "name": "coreutils-common", "release": "39.el9", "source": "rpm", "version": "8.32" } ], "cpio": [ { "arch": "x86_64", "epoch": null, "name": "cpio", "release": "16.el9", "source": "rpm", "version": "2.13" } ], "cpp": [ { "arch": "x86_64", "epoch": null, "name": "cpp", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "cracklib": [ { "arch": "x86_64", "epoch": null, "name": "cracklib", "release": "28.el9", "source": "rpm", "version": "2.9.6" } ], "cracklib-dicts": [ { "arch": "x86_64", "epoch": null, "name": "cracklib-dicts", "release": "28.el9", "source": "rpm", "version": "2.9.6" } ], "createrepo_c": [ { "arch": "x86_64", "epoch": null, "name": "createrepo_c", "release": "4.el9", "source": "rpm", "version": "0.20.1" } ], "createrepo_c-libs": [ { "arch": "x86_64", "epoch": null, "name": "createrepo_c-libs", "release": "4.el9", "source": "rpm", "version": "0.20.1" } ], "criu": [ { "arch": "x86_64", "epoch": null, "name": "criu", "release": "3.el9", "source": "rpm", "version": "3.19" } ], "criu-libs": [ { "arch": "x86_64", "epoch": null, "name": "criu-libs", "release": "3.el9", "source": "rpm", "version": "3.19" } ], "cronie": [ { "arch": "x86_64", "epoch": null, "name": "cronie", "release": "14.el9", "source": "rpm", "version": "1.5.7" } ], "cronie-anacron": [ { "arch": "x86_64", "epoch": null, "name": "cronie-anacron", "release": "14.el9", "source": "rpm", "version": "1.5.7" } ], "crontabs": [ { "arch": "noarch", "epoch": null, "name": "crontabs", "release": "26.20190603git.el9", "source": "rpm", "version": "1.11" } ], "crun": [ { "arch": "x86_64", "epoch": null, "name": "crun", "release": "1.el9", "source": "rpm", "version": "1.24" } ], "crypto-policies": [ { "arch": "noarch", "epoch": null, "name": "crypto-policies", "release": "1.gite9c4db2.el9", "source": "rpm", "version": "20251126" } ], "crypto-policies-scripts": [ { "arch": "noarch", "epoch": null, "name": "crypto-policies-scripts", "release": "1.gite9c4db2.el9", "source": "rpm", "version": "20251126" } ], "cryptsetup-libs": [ { "arch": "x86_64", "epoch": null, "name": "cryptsetup-libs", "release": "2.el9", "source": "rpm", "version": "2.8.1" } ], "curl": [ { "arch": "x86_64", "epoch": null, "name": "curl", "release": "38.el9", "source": "rpm", "version": "7.76.1" } ], "cyrus-sasl": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-devel": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-devel", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-gssapi": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-gssapi", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "cyrus-sasl-lib": [ { "arch": "x86_64", "epoch": null, "name": "cyrus-sasl-lib", "release": "21.el9", "source": "rpm", "version": "2.1.27" } ], "dbus": [ { "arch": "x86_64", "epoch": 1, "name": "dbus", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-broker": [ { "arch": "x86_64", "epoch": null, "name": "dbus-broker", "release": "7.el9", "source": "rpm", "version": "28" } ], "dbus-common": [ { "arch": "noarch", "epoch": 1, "name": "dbus-common", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-libs": [ { "arch": "x86_64", "epoch": 1, "name": "dbus-libs", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "dbus-tools": [ { "arch": "x86_64", "epoch": 1, "name": "dbus-tools", "release": "8.el9", "source": "rpm", "version": "1.12.20" } ], "debugedit": [ { "arch": "x86_64", "epoch": null, "name": "debugedit", "release": "11.el9", "source": "rpm", "version": "5.0" } ], "dejavu-sans-fonts": [ { "arch": "noarch", "epoch": null, "name": "dejavu-sans-fonts", "release": "18.el9", "source": "rpm", "version": "2.37" } ], "desktop-file-utils": [ { "arch": "x86_64", "epoch": null, "name": "desktop-file-utils", "release": "6.el9", "source": "rpm", "version": "0.26" } ], "device-mapper": [ { "arch": "x86_64", "epoch": 9, "name": "device-mapper", "release": "2.el9", "source": "rpm", "version": "1.02.206" } ], "device-mapper-libs": [ { "arch": "x86_64", "epoch": 9, "name": "device-mapper-libs", "release": "2.el9", "source": "rpm", "version": "1.02.206" } ], "dhcp-client": [ { "arch": "x86_64", "epoch": 12, "name": "dhcp-client", "release": "19.b1.el9", "source": "rpm", "version": "4.4.2" } ], "dhcp-common": [ { "arch": "noarch", "epoch": 12, "name": "dhcp-common", "release": "19.b1.el9", "source": "rpm", "version": "4.4.2" } ], "diffutils": [ { "arch": "x86_64", "epoch": null, "name": "diffutils", "release": "12.el9", "source": "rpm", "version": "3.7" } ], "dnf": [ { "arch": "noarch", "epoch": null, "name": "dnf", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "dnf-data": [ { "arch": "noarch", "epoch": null, "name": "dnf-data", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "dnf-plugins-core": [ { "arch": "noarch", "epoch": null, "name": "dnf-plugins-core", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "dracut": [ { "arch": "x86_64", "epoch": null, "name": "dracut", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-config-generic": [ { "arch": "x86_64", "epoch": null, "name": "dracut-config-generic", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-network": [ { "arch": "x86_64", "epoch": null, "name": "dracut-network", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dracut-squash": [ { "arch": "x86_64", "epoch": null, "name": "dracut-squash", "release": "102.git20250818.el9", "source": "rpm", "version": "057" } ], "dwz": [ { "arch": "x86_64", "epoch": null, "name": "dwz", "release": "1.el9", "source": "rpm", "version": "0.16" } ], "e2fsprogs": [ { "arch": "x86_64", "epoch": null, "name": "e2fsprogs", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "e2fsprogs-libs": [ { "arch": "x86_64", "epoch": null, "name": "e2fsprogs-libs", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "ed": [ { "arch": "x86_64", "epoch": null, "name": "ed", "release": "12.el9", "source": "rpm", "version": "1.14.2" } ], "efi-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "efi-srpm-macros", "release": "4.el9", "source": "rpm", "version": "6" } ], "elfutils": [ { "arch": "x86_64", "epoch": null, "name": "elfutils", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-debuginfod-client": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-debuginfod-client", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-default-yama-scope": [ { "arch": "noarch", "epoch": null, "name": "elfutils-default-yama-scope", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-libelf": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-libelf", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "elfutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "elfutils-libs", "release": "1.el9", "source": "rpm", "version": "0.194" } ], "emacs-filesystem": [ { "arch": "noarch", "epoch": 1, "name": "emacs-filesystem", "release": "18.el9", "source": "rpm", "version": "27.2" } ], "enchant": [ { "arch": "x86_64", "epoch": 1, "name": "enchant", "release": "30.el9", "source": "rpm", "version": "1.6.0" } ], "ethtool": [ { "arch": "x86_64", "epoch": 2, "name": "ethtool", "release": "2.el9", "source": "rpm", "version": "6.15" } ], "expat": [ { "arch": "x86_64", "epoch": null, "name": "expat", "release": "6.el9", "source": "rpm", "version": "2.5.0" } ], "expect": [ { "arch": "x86_64", "epoch": null, "name": "expect", "release": "16.el9", "source": "rpm", "version": "5.45.4" } ], "file": [ { "arch": "x86_64", "epoch": null, "name": "file", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "file-libs": [ { "arch": "x86_64", "epoch": null, "name": "file-libs", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "filesystem": [ { "arch": "x86_64", "epoch": null, "name": "filesystem", "release": "5.el9", "source": "rpm", "version": "3.16" } ], "findutils": [ { "arch": "x86_64", "epoch": 1, "name": "findutils", "release": "7.el9", "source": "rpm", "version": "4.8.0" } ], "fonts-filesystem": [ { "arch": "noarch", "epoch": 1, "name": "fonts-filesystem", "release": "7.el9.1", "source": "rpm", "version": "2.0.5" } ], "fonts-srpm-macros": [ { "arch": "noarch", "epoch": 1, "name": "fonts-srpm-macros", "release": "7.el9.1", "source": "rpm", "version": "2.0.5" } ], "fuse-common": [ { "arch": "x86_64", "epoch": null, "name": "fuse-common", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "fuse-libs": [ { "arch": "x86_64", "epoch": null, "name": "fuse-libs", "release": "17.el9", "source": "rpm", "version": "2.9.9" } ], "fuse-overlayfs": [ { "arch": "x86_64", "epoch": null, "name": "fuse-overlayfs", "release": "1.el9", "source": "rpm", "version": "1.16" } ], "fuse3": [ { "arch": "x86_64", "epoch": null, "name": "fuse3", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "fuse3-libs": [ { "arch": "x86_64", "epoch": null, "name": "fuse3-libs", "release": "9.el9", "source": "rpm", "version": "3.10.2" } ], "gawk": [ { "arch": "x86_64", "epoch": null, "name": "gawk", "release": "6.el9", "source": "rpm", "version": "5.1.0" } ], "gawk-all-langpacks": [ { "arch": "x86_64", "epoch": null, "name": "gawk-all-langpacks", "release": "6.el9", "source": "rpm", "version": "5.1.0" } ], "gcc": [ { "arch": "x86_64", "epoch": null, "name": "gcc", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gcc-c++": [ { "arch": "x86_64", "epoch": null, "name": "gcc-c++", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gcc-plugin-annobin": [ { "arch": "x86_64", "epoch": null, "name": "gcc-plugin-annobin", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "gdb-minimal": [ { "arch": "x86_64", "epoch": null, "name": "gdb-minimal", "release": "2.el9", "source": "rpm", "version": "16.3" } ], "gdbm-libs": [ { "arch": "x86_64", "epoch": 1, "name": "gdbm-libs", "release": "1.el9", "source": "rpm", "version": "1.23" } ], "gdisk": [ { "arch": "x86_64", "epoch": null, "name": "gdisk", "release": "5.el9", "source": "rpm", "version": "1.0.7" } ], "gdk-pixbuf2": [ { "arch": "x86_64", "epoch": null, "name": "gdk-pixbuf2", "release": "6.el9", "source": "rpm", "version": "2.42.6" } ], "geolite2-city": [ { "arch": "noarch", "epoch": null, "name": "geolite2-city", "release": "6.el9", "source": "rpm", "version": "20191217" } ], "geolite2-country": [ { "arch": "noarch", "epoch": null, "name": "geolite2-country", "release": "6.el9", "source": "rpm", "version": "20191217" } ], "gettext": [ { "arch": "x86_64", "epoch": null, "name": "gettext", "release": "8.el9", "source": "rpm", "version": "0.21" } ], "gettext-libs": [ { "arch": "x86_64", "epoch": null, "name": "gettext-libs", "release": "8.el9", "source": "rpm", "version": "0.21" } ], "ghc-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "ghc-srpm-macros", "release": "6.el9", "source": "rpm", "version": "1.5.0" } ], "git": [ { "arch": "x86_64", "epoch": null, "name": "git", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "git-core": [ { "arch": "x86_64", "epoch": null, "name": "git-core", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "git-core-doc": [ { "arch": "noarch", "epoch": null, "name": "git-core-doc", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "glib-networking": [ { "arch": "x86_64", "epoch": null, "name": "glib-networking", "release": "3.el9", "source": "rpm", "version": "2.68.3" } ], "glib2": [ { "arch": "x86_64", "epoch": null, "name": "glib2", "release": "18.el9", "source": "rpm", "version": "2.68.4" } ], "glibc": [ { "arch": "x86_64", "epoch": null, "name": "glibc", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-common": [ { "arch": "x86_64", "epoch": null, "name": "glibc-common", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-devel": [ { "arch": "x86_64", "epoch": null, "name": "glibc-devel", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-gconv-extra": [ { "arch": "x86_64", "epoch": null, "name": "glibc-gconv-extra", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-headers": [ { "arch": "x86_64", "epoch": null, "name": "glibc-headers", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "glibc-langpack-en": [ { "arch": "x86_64", "epoch": null, "name": "glibc-langpack-en", "release": "245.el9", "source": "rpm", "version": "2.34" } ], "gmp": [ { "arch": "x86_64", "epoch": 1, "name": "gmp", "release": "13.el9", "source": "rpm", "version": "6.2.0" } ], "gnupg2": [ { "arch": "x86_64", "epoch": null, "name": "gnupg2", "release": "5.el9", "source": "rpm", "version": "2.3.3" } ], "gnutls": [ { "arch": "x86_64", "epoch": null, "name": "gnutls", "release": "2.el9", "source": "rpm", "version": "3.8.10" } ], "go-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "go-srpm-macros", "release": "1.el9", "source": "rpm", "version": "3.8.1" } ], "gobject-introspection": [ { "arch": "x86_64", "epoch": null, "name": "gobject-introspection", "release": "11.el9", "source": "rpm", "version": "1.68.0" } ], "gpg-pubkey": [ { "arch": null, "epoch": null, "name": "gpg-pubkey", "release": "5ccc5b19", "source": "rpm", "version": "8483c65d" } ], "gpgme": [ { "arch": "x86_64", "epoch": null, "name": "gpgme", "release": "6.el9", "source": "rpm", "version": "1.15.1" } ], "grep": [ { "arch": "x86_64", "epoch": null, "name": "grep", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "groff-base": [ { "arch": "x86_64", "epoch": null, "name": "groff-base", "release": "10.el9", "source": "rpm", "version": "1.22.4" } ], "grub2-common": [ { "arch": "noarch", "epoch": 1, "name": "grub2-common", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-pc": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-pc", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-pc-modules": [ { "arch": "noarch", "epoch": 1, "name": "grub2-pc-modules", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-tools": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-tools", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grub2-tools-minimal": [ { "arch": "x86_64", "epoch": 1, "name": "grub2-tools-minimal", "release": "120.el9", "source": "rpm", "version": "2.06" } ], "grubby": [ { "arch": "x86_64", "epoch": null, "name": "grubby", "release": "69.el9", "source": "rpm", "version": "8.40" } ], "gsettings-desktop-schemas": [ { "arch": "x86_64", "epoch": null, "name": "gsettings-desktop-schemas", "release": "8.el9", "source": "rpm", "version": "40.0" } ], "gssproxy": [ { "arch": "x86_64", "epoch": null, "name": "gssproxy", "release": "7.el9", "source": "rpm", "version": "0.8.4" } ], "gzip": [ { "arch": "x86_64", "epoch": null, "name": "gzip", "release": "1.el9", "source": "rpm", "version": "1.12" } ], "hostname": [ { "arch": "x86_64", "epoch": null, "name": "hostname", "release": "6.el9", "source": "rpm", "version": "3.23" } ], "httpd-tools": [ { "arch": "x86_64", "epoch": null, "name": "httpd-tools", "release": "10.el9", "source": "rpm", "version": "2.4.62" } ], "hunspell": [ { "arch": "x86_64", "epoch": null, "name": "hunspell", "release": "11.el9", "source": "rpm", "version": "1.7.0" } ], "hunspell-en-GB": [ { "arch": "noarch", "epoch": null, "name": "hunspell-en-GB", "release": "20.el9", "source": "rpm", "version": "0.20140811.1" } ], "hunspell-en-US": [ { "arch": "noarch", "epoch": null, "name": "hunspell-en-US", "release": "20.el9", "source": "rpm", "version": "0.20140811.1" } ], "hunspell-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "hunspell-filesystem", "release": "11.el9", "source": "rpm", "version": "1.7.0" } ], "hwdata": [ { "arch": "noarch", "epoch": null, "name": "hwdata", "release": "9.20.el9", "source": "rpm", "version": "0.348" } ], "ima-evm-utils": [ { "arch": "x86_64", "epoch": null, "name": "ima-evm-utils", "release": "2.el9", "source": "rpm", "version": "1.6.2" } ], "info": [ { "arch": "x86_64", "epoch": null, "name": "info", "release": "15.el9", "source": "rpm", "version": "6.7" } ], "inih": [ { "arch": "x86_64", "epoch": null, "name": "inih", "release": "6.el9", "source": "rpm", "version": "49" } ], "initscripts-rename-device": [ { "arch": "x86_64", "epoch": null, "name": "initscripts-rename-device", "release": "4.el9", "source": "rpm", "version": "10.11.8" } ], "initscripts-service": [ { "arch": "noarch", "epoch": null, "name": "initscripts-service", "release": "4.el9", "source": "rpm", "version": "10.11.8" } ], "ipcalc": [ { "arch": "x86_64", "epoch": null, "name": "ipcalc", "release": "5.el9", "source": "rpm", "version": "1.0.0" } ], "iproute": [ { "arch": "x86_64", "epoch": null, "name": "iproute", "release": "1.el9", "source": "rpm", "version": "6.17.0" } ], "iproute-tc": [ { "arch": "x86_64", "epoch": null, "name": "iproute-tc", "release": "1.el9", "source": "rpm", "version": "6.17.0" } ], "iptables-libs": [ { "arch": "x86_64", "epoch": null, "name": "iptables-libs", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iptables-nft": [ { "arch": "x86_64", "epoch": null, "name": "iptables-nft", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iptables-nft-services": [ { "arch": "noarch", "epoch": null, "name": "iptables-nft-services", "release": "11.el9", "source": "rpm", "version": "1.8.10" } ], "iputils": [ { "arch": "x86_64", "epoch": null, "name": "iputils", "release": "15.el9", "source": "rpm", "version": "20210202" } ], "irqbalance": [ { "arch": "x86_64", "epoch": 2, "name": "irqbalance", "release": "5.el9", "source": "rpm", "version": "1.9.4" } ], "jansson": [ { "arch": "x86_64", "epoch": null, "name": "jansson", "release": "1.el9", "source": "rpm", "version": "2.14" } ], "jq": [ { "arch": "x86_64", "epoch": null, "name": "jq", "release": "19.el9", "source": "rpm", "version": "1.6" } ], "json-c": [ { "arch": "x86_64", "epoch": null, "name": "json-c", "release": "11.el9", "source": "rpm", "version": "0.14" } ], "json-glib": [ { "arch": "x86_64", "epoch": null, "name": "json-glib", "release": "1.el9", "source": "rpm", "version": "1.6.6" } ], "kbd": [ { "arch": "x86_64", "epoch": null, "name": "kbd", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kbd-legacy": [ { "arch": "noarch", "epoch": null, "name": "kbd-legacy", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kbd-misc": [ { "arch": "noarch", "epoch": null, "name": "kbd-misc", "release": "11.el9", "source": "rpm", "version": "2.4.0" } ], "kernel": [ { "arch": "x86_64", "epoch": null, "name": "kernel", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-core": [ { "arch": "x86_64", "epoch": null, "name": "kernel-core", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-headers": [ { "arch": "x86_64", "epoch": null, "name": "kernel-headers", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-modules": [ { "arch": "x86_64", "epoch": null, "name": "kernel-modules", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-modules-core": [ { "arch": "x86_64", "epoch": null, "name": "kernel-modules-core", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "kernel-srpm-macros", "release": "14.el9", "source": "rpm", "version": "1.0" } ], "kernel-tools": [ { "arch": "x86_64", "epoch": null, "name": "kernel-tools", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kernel-tools-libs": [ { "arch": "x86_64", "epoch": null, "name": "kernel-tools-libs", "release": "661.el9", "source": "rpm", "version": "5.14.0" } ], "kexec-tools": [ { "arch": "x86_64", "epoch": null, "name": "kexec-tools", "release": "14.el9", "source": "rpm", "version": "2.0.29" } ], "keyutils": [ { "arch": "x86_64", "epoch": null, "name": "keyutils", "release": "1.el9", "source": "rpm", "version": "1.6.3" } ], "keyutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "keyutils-libs", "release": "1.el9", "source": "rpm", "version": "1.6.3" } ], "kmod": [ { "arch": "x86_64", "epoch": null, "name": "kmod", "release": "11.el9", "source": "rpm", "version": "28" } ], "kmod-libs": [ { "arch": "x86_64", "epoch": null, "name": "kmod-libs", "release": "11.el9", "source": "rpm", "version": "28" } ], "kpartx": [ { "arch": "x86_64", "epoch": null, "name": "kpartx", "release": "42.el9", "source": "rpm", "version": "0.8.7" } ], "krb5-libs": [ { "arch": "x86_64", "epoch": null, "name": "krb5-libs", "release": "8.el9", "source": "rpm", "version": "1.21.1" } ], "langpacks-core-en_GB": [ { "arch": "noarch", "epoch": null, "name": "langpacks-core-en_GB", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "langpacks-core-font-en": [ { "arch": "noarch", "epoch": null, "name": "langpacks-core-font-en", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "langpacks-en_GB": [ { "arch": "noarch", "epoch": null, "name": "langpacks-en_GB", "release": "16.el9", "source": "rpm", "version": "3.0" } ], "less": [ { "arch": "x86_64", "epoch": null, "name": "less", "release": "6.el9", "source": "rpm", "version": "590" } ], "libacl": [ { "arch": "x86_64", "epoch": null, "name": "libacl", "release": "4.el9", "source": "rpm", "version": "2.3.1" } ], "libappstream-glib": [ { "arch": "x86_64", "epoch": null, "name": "libappstream-glib", "release": "5.el9", "source": "rpm", "version": "0.7.18" } ], "libarchive": [ { "arch": "x86_64", "epoch": null, "name": "libarchive", "release": "6.el9", "source": "rpm", "version": "3.5.3" } ], "libassuan": [ { "arch": "x86_64", "epoch": null, "name": "libassuan", "release": "3.el9", "source": "rpm", "version": "2.5.5" } ], "libattr": [ { "arch": "x86_64", "epoch": null, "name": "libattr", "release": "3.el9", "source": "rpm", "version": "2.5.1" } ], "libbasicobjects": [ { "arch": "x86_64", "epoch": null, "name": "libbasicobjects", "release": "53.el9", "source": "rpm", "version": "0.1.1" } ], "libblkid": [ { "arch": "x86_64", "epoch": null, "name": "libblkid", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libbpf": [ { "arch": "x86_64", "epoch": 2, "name": "libbpf", "release": "3.el9", "source": "rpm", "version": "1.5.0" } ], "libbrotli": [ { "arch": "x86_64", "epoch": null, "name": "libbrotli", "release": "7.el9", "source": "rpm", "version": "1.0.9" } ], "libburn": [ { "arch": "x86_64", "epoch": null, "name": "libburn", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "libcap": [ { "arch": "x86_64", "epoch": null, "name": "libcap", "release": "10.el9", "source": "rpm", "version": "2.48" } ], "libcap-ng": [ { "arch": "x86_64", "epoch": null, "name": "libcap-ng", "release": "7.el9", "source": "rpm", "version": "0.8.2" } ], "libcbor": [ { "arch": "x86_64", "epoch": null, "name": "libcbor", "release": "5.el9", "source": "rpm", "version": "0.7.0" } ], "libcollection": [ { "arch": "x86_64", "epoch": null, "name": "libcollection", "release": "53.el9", "source": "rpm", "version": "0.7.0" } ], "libcom_err": [ { "arch": "x86_64", "epoch": null, "name": "libcom_err", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "libcomps": [ { "arch": "x86_64", "epoch": null, "name": "libcomps", "release": "1.el9", "source": "rpm", "version": "0.1.18" } ], "libcurl": [ { "arch": "x86_64", "epoch": null, "name": "libcurl", "release": "38.el9", "source": "rpm", "version": "7.76.1" } ], "libdaemon": [ { "arch": "x86_64", "epoch": null, "name": "libdaemon", "release": "23.el9", "source": "rpm", "version": "0.14" } ], "libdb": [ { "arch": "x86_64", "epoch": null, "name": "libdb", "release": "57.el9", "source": "rpm", "version": "5.3.28" } ], "libdhash": [ { "arch": "x86_64", "epoch": null, "name": "libdhash", "release": "53.el9", "source": "rpm", "version": "0.5.0" } ], "libdnf": [ { "arch": "x86_64", "epoch": null, "name": "libdnf", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "libeconf": [ { "arch": "x86_64", "epoch": null, "name": "libeconf", "release": "5.el9", "source": "rpm", "version": "0.4.1" } ], "libedit": [ { "arch": "x86_64", "epoch": null, "name": "libedit", "release": "38.20210216cvs.el9", "source": "rpm", "version": "3.1" } ], "libestr": [ { "arch": "x86_64", "epoch": null, "name": "libestr", "release": "4.el9", "source": "rpm", "version": "0.1.11" } ], "libev": [ { "arch": "x86_64", "epoch": null, "name": "libev", "release": "6.el9", "source": "rpm", "version": "4.33" } ], "libevent": [ { "arch": "x86_64", "epoch": null, "name": "libevent", "release": "8.el9", "source": "rpm", "version": "2.1.12" } ], "libfastjson": [ { "arch": "x86_64", "epoch": null, "name": "libfastjson", "release": "5.el9", "source": "rpm", "version": "0.99.9" } ], "libfdisk": [ { "arch": "x86_64", "epoch": null, "name": "libfdisk", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libffi": [ { "arch": "x86_64", "epoch": null, "name": "libffi", "release": "8.el9", "source": "rpm", "version": "3.4.2" } ], "libffi-devel": [ { "arch": "x86_64", "epoch": null, "name": "libffi-devel", "release": "8.el9", "source": "rpm", "version": "3.4.2" } ], "libfido2": [ { "arch": "x86_64", "epoch": null, "name": "libfido2", "release": "2.el9", "source": "rpm", "version": "1.13.0" } ], "libgcc": [ { "arch": "x86_64", "epoch": null, "name": "libgcc", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libgcrypt": [ { "arch": "x86_64", "epoch": null, "name": "libgcrypt", "release": "11.el9", "source": "rpm", "version": "1.10.0" } ], "libgomp": [ { "arch": "x86_64", "epoch": null, "name": "libgomp", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libgpg-error": [ { "arch": "x86_64", "epoch": null, "name": "libgpg-error", "release": "5.el9", "source": "rpm", "version": "1.42" } ], "libgpg-error-devel": [ { "arch": "x86_64", "epoch": null, "name": "libgpg-error-devel", "release": "5.el9", "source": "rpm", "version": "1.42" } ], "libibverbs": [ { "arch": "x86_64", "epoch": null, "name": "libibverbs", "release": "2.el9", "source": "rpm", "version": "57.0" } ], "libicu": [ { "arch": "x86_64", "epoch": null, "name": "libicu", "release": "10.el9", "source": "rpm", "version": "67.1" } ], "libidn2": [ { "arch": "x86_64", "epoch": null, "name": "libidn2", "release": "7.el9", "source": "rpm", "version": "2.3.0" } ], "libini_config": [ { "arch": "x86_64", "epoch": null, "name": "libini_config", "release": "53.el9", "source": "rpm", "version": "1.3.1" } ], "libisoburn": [ { "arch": "x86_64", "epoch": null, "name": "libisoburn", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "libisofs": [ { "arch": "x86_64", "epoch": null, "name": "libisofs", "release": "4.el9", "source": "rpm", "version": "1.5.4" } ], "libjpeg-turbo": [ { "arch": "x86_64", "epoch": null, "name": "libjpeg-turbo", "release": "7.el9", "source": "rpm", "version": "2.0.90" } ], "libkcapi": [ { "arch": "x86_64", "epoch": null, "name": "libkcapi", "release": "2.el9", "source": "rpm", "version": "1.4.0" } ], "libkcapi-hmaccalc": [ { "arch": "x86_64", "epoch": null, "name": "libkcapi-hmaccalc", "release": "2.el9", "source": "rpm", "version": "1.4.0" } ], "libksba": [ { "arch": "x86_64", "epoch": null, "name": "libksba", "release": "7.el9", "source": "rpm", "version": "1.5.1" } ], "libldb": [ { "arch": "x86_64", "epoch": 0, "name": "libldb", "release": "2.el9", "source": "rpm", "version": "4.23.4" } ], "libmaxminddb": [ { "arch": "x86_64", "epoch": null, "name": "libmaxminddb", "release": "4.el9", "source": "rpm", "version": "1.5.2" } ], "libmnl": [ { "arch": "x86_64", "epoch": null, "name": "libmnl", "release": "16.el9", "source": "rpm", "version": "1.0.4" } ], "libmodulemd": [ { "arch": "x86_64", "epoch": null, "name": "libmodulemd", "release": "2.el9", "source": "rpm", "version": "2.13.0" } ], "libmount": [ { "arch": "x86_64", "epoch": null, "name": "libmount", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libmpc": [ { "arch": "x86_64", "epoch": null, "name": "libmpc", "release": "4.el9", "source": "rpm", "version": "1.2.1" } ], "libndp": [ { "arch": "x86_64", "epoch": null, "name": "libndp", "release": "1.el9", "source": "rpm", "version": "1.9" } ], "libnet": [ { "arch": "x86_64", "epoch": null, "name": "libnet", "release": "7.el9", "source": "rpm", "version": "1.2" } ], "libnetfilter_conntrack": [ { "arch": "x86_64", "epoch": null, "name": "libnetfilter_conntrack", "release": "1.el9", "source": "rpm", "version": "1.0.9" } ], "libnfnetlink": [ { "arch": "x86_64", "epoch": null, "name": "libnfnetlink", "release": "23.el9", "source": "rpm", "version": "1.0.1" } ], "libnfsidmap": [ { "arch": "x86_64", "epoch": 1, "name": "libnfsidmap", "release": "41.el9", "source": "rpm", "version": "2.5.4" } ], "libnftnl": [ { "arch": "x86_64", "epoch": null, "name": "libnftnl", "release": "4.el9", "source": "rpm", "version": "1.2.6" } ], "libnghttp2": [ { "arch": "x86_64", "epoch": null, "name": "libnghttp2", "release": "6.el9", "source": "rpm", "version": "1.43.0" } ], "libnl3": [ { "arch": "x86_64", "epoch": null, "name": "libnl3", "release": "1.el9", "source": "rpm", "version": "3.11.0" } ], "libnl3-cli": [ { "arch": "x86_64", "epoch": null, "name": "libnl3-cli", "release": "1.el9", "source": "rpm", "version": "3.11.0" } ], "libosinfo": [ { "arch": "x86_64", "epoch": null, "name": "libosinfo", "release": "1.el9", "source": "rpm", "version": "1.10.0" } ], "libpath_utils": [ { "arch": "x86_64", "epoch": null, "name": "libpath_utils", "release": "53.el9", "source": "rpm", "version": "0.2.1" } ], "libpcap": [ { "arch": "x86_64", "epoch": 14, "name": "libpcap", "release": "4.el9", "source": "rpm", "version": "1.10.0" } ], "libpipeline": [ { "arch": "x86_64", "epoch": null, "name": "libpipeline", "release": "4.el9", "source": "rpm", "version": "1.5.3" } ], "libpkgconf": [ { "arch": "x86_64", "epoch": null, "name": "libpkgconf", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "libpng": [ { "arch": "x86_64", "epoch": 2, "name": "libpng", "release": "12.el9", "source": "rpm", "version": "1.6.37" } ], "libproxy": [ { "arch": "x86_64", "epoch": null, "name": "libproxy", "release": "35.el9", "source": "rpm", "version": "0.4.15" } ], "libproxy-webkitgtk4": [ { "arch": "x86_64", "epoch": null, "name": "libproxy-webkitgtk4", "release": "35.el9", "source": "rpm", "version": "0.4.15" } ], "libpsl": [ { "arch": "x86_64", "epoch": null, "name": "libpsl", "release": "5.el9", "source": "rpm", "version": "0.21.1" } ], "libpwquality": [ { "arch": "x86_64", "epoch": null, "name": "libpwquality", "release": "8.el9", "source": "rpm", "version": "1.4.4" } ], "libref_array": [ { "arch": "x86_64", "epoch": null, "name": "libref_array", "release": "53.el9", "source": "rpm", "version": "0.1.5" } ], "librepo": [ { "arch": "x86_64", "epoch": null, "name": "librepo", "release": "1.el9", "source": "rpm", "version": "1.19.0" } ], "libreport-filesystem": [ { "arch": "noarch", "epoch": null, "name": "libreport-filesystem", "release": "6.el9", "source": "rpm", "version": "2.15.2" } ], "libseccomp": [ { "arch": "x86_64", "epoch": null, "name": "libseccomp", "release": "2.el9", "source": "rpm", "version": "2.5.2" } ], "libselinux": [ { "arch": "x86_64", "epoch": null, "name": "libselinux", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libselinux-utils": [ { "arch": "x86_64", "epoch": null, "name": "libselinux-utils", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libsemanage": [ { "arch": "x86_64", "epoch": null, "name": "libsemanage", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "libsepol": [ { "arch": "x86_64", "epoch": null, "name": "libsepol", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "libsigsegv": [ { "arch": "x86_64", "epoch": null, "name": "libsigsegv", "release": "4.el9", "source": "rpm", "version": "2.13" } ], "libslirp": [ { "arch": "x86_64", "epoch": null, "name": "libslirp", "release": "8.el9", "source": "rpm", "version": "4.4.0" } ], "libsmartcols": [ { "arch": "x86_64", "epoch": null, "name": "libsmartcols", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libsolv": [ { "arch": "x86_64", "epoch": null, "name": "libsolv", "release": "3.el9", "source": "rpm", "version": "0.7.24" } ], "libsoup": [ { "arch": "x86_64", "epoch": null, "name": "libsoup", "release": "10.el9", "source": "rpm", "version": "2.72.0" } ], "libss": [ { "arch": "x86_64", "epoch": null, "name": "libss", "release": "8.el9", "source": "rpm", "version": "1.46.5" } ], "libssh": [ { "arch": "x86_64", "epoch": null, "name": "libssh", "release": "17.el9", "source": "rpm", "version": "0.10.4" } ], "libssh-config": [ { "arch": "noarch", "epoch": null, "name": "libssh-config", "release": "17.el9", "source": "rpm", "version": "0.10.4" } ], "libsss_certmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_certmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_idmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_nss_idmap": [ { "arch": "x86_64", "epoch": null, "name": "libsss_nss_idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libsss_sudo": [ { "arch": "x86_64", "epoch": null, "name": "libsss_sudo", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "libstdc++": [ { "arch": "x86_64", "epoch": null, "name": "libstdc++", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libstdc++-devel": [ { "arch": "x86_64", "epoch": null, "name": "libstdc++-devel", "release": "14.el9", "source": "rpm", "version": "11.5.0" } ], "libstemmer": [ { "arch": "x86_64", "epoch": null, "name": "libstemmer", "release": "18.585svn.el9", "source": "rpm", "version": "0" } ], "libsysfs": [ { "arch": "x86_64", "epoch": null, "name": "libsysfs", "release": "11.el9", "source": "rpm", "version": "2.1.1" } ], "libtalloc": [ { "arch": "x86_64", "epoch": null, "name": "libtalloc", "release": "1.el9", "source": "rpm", "version": "2.4.3" } ], "libtasn1": [ { "arch": "x86_64", "epoch": null, "name": "libtasn1", "release": "9.el9", "source": "rpm", "version": "4.16.0" } ], "libtdb": [ { "arch": "x86_64", "epoch": null, "name": "libtdb", "release": "1.el9", "source": "rpm", "version": "1.4.14" } ], "libteam": [ { "arch": "x86_64", "epoch": null, "name": "libteam", "release": "16.el9", "source": "rpm", "version": "1.31" } ], "libtevent": [ { "arch": "x86_64", "epoch": null, "name": "libtevent", "release": "1.el9", "source": "rpm", "version": "0.17.1" } ], "libtirpc": [ { "arch": "x86_64", "epoch": null, "name": "libtirpc", "release": "9.el9", "source": "rpm", "version": "1.3.3" } ], "libtool-ltdl": [ { "arch": "x86_64", "epoch": null, "name": "libtool-ltdl", "release": "46.el9", "source": "rpm", "version": "2.4.6" } ], "libunistring": [ { "arch": "x86_64", "epoch": null, "name": "libunistring", "release": "15.el9", "source": "rpm", "version": "0.9.10" } ], "liburing": [ { "arch": "x86_64", "epoch": null, "name": "liburing", "release": "1.el9", "source": "rpm", "version": "2.12" } ], "libuser": [ { "arch": "x86_64", "epoch": null, "name": "libuser", "release": "17.el9", "source": "rpm", "version": "0.63" } ], "libutempter": [ { "arch": "x86_64", "epoch": null, "name": "libutempter", "release": "6.el9", "source": "rpm", "version": "1.2.1" } ], "libuuid": [ { "arch": "x86_64", "epoch": null, "name": "libuuid", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "libverto": [ { "arch": "x86_64", "epoch": null, "name": "libverto", "release": "3.el9", "source": "rpm", "version": "0.3.2" } ], "libverto-libev": [ { "arch": "x86_64", "epoch": null, "name": "libverto-libev", "release": "3.el9", "source": "rpm", "version": "0.3.2" } ], "libvirt-client": [ { "arch": "x86_64", "epoch": null, "name": "libvirt-client", "release": "2.el9", "source": "rpm", "version": "11.10.0" } ], "libvirt-libs": [ { "arch": "x86_64", "epoch": null, "name": "libvirt-libs", "release": "2.el9", "source": "rpm", "version": "11.10.0" } ], "libxcrypt": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxcrypt-compat": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt-compat", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxcrypt-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxcrypt-devel", "release": "3.el9", "source": "rpm", "version": "4.4.18" } ], "libxml2": [ { "arch": "x86_64", "epoch": null, "name": "libxml2", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "libxml2-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxml2-devel", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "libxslt": [ { "arch": "x86_64", "epoch": null, "name": "libxslt", "release": "12.el9", "source": "rpm", "version": "1.1.34" } ], "libxslt-devel": [ { "arch": "x86_64", "epoch": null, "name": "libxslt-devel", "release": "12.el9", "source": "rpm", "version": "1.1.34" } ], "libyaml": [ { "arch": "x86_64", "epoch": null, "name": "libyaml", "release": "7.el9", "source": "rpm", "version": "0.2.5" } ], "libzstd": [ { "arch": "x86_64", "epoch": null, "name": "libzstd", "release": "1.el9", "source": "rpm", "version": "1.5.5" } ], "llvm-filesystem": [ { "arch": "x86_64", "epoch": null, "name": "llvm-filesystem", "release": "1.el9", "source": "rpm", "version": "21.1.7" } ], "llvm-libs": [ { "arch": "x86_64", "epoch": null, "name": "llvm-libs", "release": "1.el9", "source": "rpm", "version": "21.1.7" } ], "lmdb-libs": [ { "arch": "x86_64", "epoch": null, "name": "lmdb-libs", "release": "3.el9", "source": "rpm", "version": "0.9.29" } ], "logrotate": [ { "arch": "x86_64", "epoch": null, "name": "logrotate", "release": "12.el9", "source": "rpm", "version": "3.18.0" } ], "lshw": [ { "arch": "x86_64", "epoch": null, "name": "lshw", "release": "4.el9", "source": "rpm", "version": "B.02.20" } ], "lsscsi": [ { "arch": "x86_64", "epoch": null, "name": "lsscsi", "release": "6.el9", "source": "rpm", "version": "0.32" } ], "lua-libs": [ { "arch": "x86_64", "epoch": null, "name": "lua-libs", "release": "4.el9", "source": "rpm", "version": "5.4.4" } ], "lua-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "lua-srpm-macros", "release": "6.el9", "source": "rpm", "version": "1" } ], "lz4-libs": [ { "arch": "x86_64", "epoch": null, "name": "lz4-libs", "release": "5.el9", "source": "rpm", "version": "1.9.3" } ], "lzo": [ { "arch": "x86_64", "epoch": null, "name": "lzo", "release": "7.el9", "source": "rpm", "version": "2.10" } ], "make": [ { "arch": "x86_64", "epoch": 1, "name": "make", "release": "8.el9", "source": "rpm", "version": "4.3" } ], "man-db": [ { "arch": "x86_64", "epoch": null, "name": "man-db", "release": "9.el9", "source": "rpm", "version": "2.9.3" } ], "microcode_ctl": [ { "arch": "noarch", "epoch": 4, "name": "microcode_ctl", "release": "1.el9", "source": "rpm", "version": "20251111" } ], "mpfr": [ { "arch": "x86_64", "epoch": null, "name": "mpfr", "release": "8.el9", "source": "rpm", "version": "4.1.0" } ], "ncurses": [ { "arch": "x86_64", "epoch": null, "name": "ncurses", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-base": [ { "arch": "noarch", "epoch": null, "name": "ncurses-base", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-c++-libs": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-c++-libs", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-devel": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-devel", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "ncurses-libs": [ { "arch": "x86_64", "epoch": null, "name": "ncurses-libs", "release": "12.20210508.el9", "source": "rpm", "version": "6.2" } ], "netavark": [ { "arch": "x86_64", "epoch": 2, "name": "netavark", "release": "1.el9", "source": "rpm", "version": "1.16.0" } ], "nettle": [ { "arch": "x86_64", "epoch": null, "name": "nettle", "release": "1.el9", "source": "rpm", "version": "3.10.1" } ], "newt": [ { "arch": "x86_64", "epoch": null, "name": "newt", "release": "11.el9", "source": "rpm", "version": "0.52.21" } ], "nfs-utils": [ { "arch": "x86_64", "epoch": 1, "name": "nfs-utils", "release": "41.el9", "source": "rpm", "version": "2.5.4" } ], "nftables": [ { "arch": "x86_64", "epoch": 1, "name": "nftables", "release": "6.el9", "source": "rpm", "version": "1.0.9" } ], "npth": [ { "arch": "x86_64", "epoch": null, "name": "npth", "release": "8.el9", "source": "rpm", "version": "1.6" } ], "numactl-libs": [ { "arch": "x86_64", "epoch": null, "name": "numactl-libs", "release": "3.el9", "source": "rpm", "version": "2.0.19" } ], "ocaml-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "ocaml-srpm-macros", "release": "6.el9", "source": "rpm", "version": "6" } ], "oddjob": [ { "arch": "x86_64", "epoch": null, "name": "oddjob", "release": "7.el9", "source": "rpm", "version": "0.34.7" } ], "oddjob-mkhomedir": [ { "arch": "x86_64", "epoch": null, "name": "oddjob-mkhomedir", "release": "7.el9", "source": "rpm", "version": "0.34.7" } ], "oniguruma": [ { "arch": "x86_64", "epoch": null, "name": "oniguruma", "release": "1.el9.6", "source": "rpm", "version": "6.9.6" } ], "openblas-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "openblas-srpm-macros", "release": "11.el9", "source": "rpm", "version": "2" } ], "openldap": [ { "arch": "x86_64", "epoch": null, "name": "openldap", "release": "4.el9", "source": "rpm", "version": "2.6.8" } ], "openldap-devel": [ { "arch": "x86_64", "epoch": null, "name": "openldap-devel", "release": "4.el9", "source": "rpm", "version": "2.6.8" } ], "openssh": [ { "arch": "x86_64", "epoch": null, "name": "openssh", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssh-clients": [ { "arch": "x86_64", "epoch": null, "name": "openssh-clients", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssh-server": [ { "arch": "x86_64", "epoch": null, "name": "openssh-server", "release": "3.el9", "source": "rpm", "version": "9.9p1" } ], "openssl": [ { "arch": "x86_64", "epoch": 1, "name": "openssl", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-devel": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-devel", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-fips-provider": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-fips-provider", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "openssl-libs": [ { "arch": "x86_64", "epoch": 1, "name": "openssl-libs", "release": "6.el9", "source": "rpm", "version": "3.5.1" } ], "os-prober": [ { "arch": "x86_64", "epoch": null, "name": "os-prober", "release": "12.el9", "source": "rpm", "version": "1.77" } ], "osinfo-db": [ { "arch": "noarch", "epoch": null, "name": "osinfo-db", "release": "1.el9", "source": "rpm", "version": "20250606" } ], "osinfo-db-tools": [ { "arch": "x86_64", "epoch": null, "name": "osinfo-db-tools", "release": "1.el9", "source": "rpm", "version": "1.10.0" } ], "p11-kit": [ { "arch": "x86_64", "epoch": null, "name": "p11-kit", "release": "1.el9", "source": "rpm", "version": "0.25.10" } ], "p11-kit-trust": [ { "arch": "x86_64", "epoch": null, "name": "p11-kit-trust", "release": "1.el9", "source": "rpm", "version": "0.25.10" } ], "pam": [ { "arch": "x86_64", "epoch": null, "name": "pam", "release": "28.el9", "source": "rpm", "version": "1.5.1" } ], "parted": [ { "arch": "x86_64", "epoch": null, "name": "parted", "release": "3.el9", "source": "rpm", "version": "3.5" } ], "passt": [ { "arch": "x86_64", "epoch": null, "name": "passt", "release": "2.el9", "source": "rpm", "version": "0^20251210.gd04c480" } ], "passt-selinux": [ { "arch": "noarch", "epoch": null, "name": "passt-selinux", "release": "2.el9", "source": "rpm", "version": "0^20251210.gd04c480" } ], "passwd": [ { "arch": "x86_64", "epoch": null, "name": "passwd", "release": "12.el9", "source": "rpm", "version": "0.80" } ], "patch": [ { "arch": "x86_64", "epoch": null, "name": "patch", "release": "16.el9", "source": "rpm", "version": "2.7.6" } ], "pciutils-libs": [ { "arch": "x86_64", "epoch": null, "name": "pciutils-libs", "release": "7.el9", "source": "rpm", "version": "3.7.0" } ], "pcre": [ { "arch": "x86_64", "epoch": null, "name": "pcre", "release": "4.el9", "source": "rpm", "version": "8.44" } ], "pcre2": [ { "arch": "x86_64", "epoch": null, "name": "pcre2", "release": "6.el9", "source": "rpm", "version": "10.40" } ], "pcre2-syntax": [ { "arch": "noarch", "epoch": null, "name": "pcre2-syntax", "release": "6.el9", "source": "rpm", "version": "10.40" } ], "perl-AutoLoader": [ { "arch": "noarch", "epoch": 0, "name": "perl-AutoLoader", "release": "483.el9", "source": "rpm", "version": "5.74" } ], "perl-B": [ { "arch": "x86_64", "epoch": 0, "name": "perl-B", "release": "483.el9", "source": "rpm", "version": "1.80" } ], "perl-Carp": [ { "arch": "noarch", "epoch": null, "name": "perl-Carp", "release": "460.el9", "source": "rpm", "version": "1.50" } ], "perl-Class-Struct": [ { "arch": "noarch", "epoch": 0, "name": "perl-Class-Struct", "release": "483.el9", "source": "rpm", "version": "0.66" } ], "perl-Data-Dumper": [ { "arch": "x86_64", "epoch": null, "name": "perl-Data-Dumper", "release": "462.el9", "source": "rpm", "version": "2.174" } ], "perl-Digest": [ { "arch": "noarch", "epoch": null, "name": "perl-Digest", "release": "4.el9", "source": "rpm", "version": "1.19" } ], "perl-Digest-MD5": [ { "arch": "x86_64", "epoch": null, "name": "perl-Digest-MD5", "release": "4.el9", "source": "rpm", "version": "2.58" } ], "perl-DynaLoader": [ { "arch": "x86_64", "epoch": 0, "name": "perl-DynaLoader", "release": "483.el9", "source": "rpm", "version": "1.47" } ], "perl-Encode": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Encode", "release": "462.el9", "source": "rpm", "version": "3.08" } ], "perl-Errno": [ { "arch": "x86_64", "epoch": 0, "name": "perl-Errno", "release": "483.el9", "source": "rpm", "version": "1.30" } ], "perl-Error": [ { "arch": "noarch", "epoch": 1, "name": "perl-Error", "release": "7.el9", "source": "rpm", "version": "0.17029" } ], "perl-Exporter": [ { "arch": "noarch", "epoch": null, "name": "perl-Exporter", "release": "461.el9", "source": "rpm", "version": "5.74" } ], "perl-Fcntl": [ { "arch": "x86_64", "epoch": 0, "name": "perl-Fcntl", "release": "483.el9", "source": "rpm", "version": "1.13" } ], "perl-File-Basename": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-Basename", "release": "483.el9", "source": "rpm", "version": "2.85" } ], "perl-File-Find": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-Find", "release": "483.el9", "source": "rpm", "version": "1.37" } ], "perl-File-Path": [ { "arch": "noarch", "epoch": null, "name": "perl-File-Path", "release": "4.el9", "source": "rpm", "version": "2.18" } ], "perl-File-Temp": [ { "arch": "noarch", "epoch": 1, "name": "perl-File-Temp", "release": "4.el9", "source": "rpm", "version": "0.231.100" } ], "perl-File-stat": [ { "arch": "noarch", "epoch": 0, "name": "perl-File-stat", "release": "483.el9", "source": "rpm", "version": "1.09" } ], "perl-FileHandle": [ { "arch": "noarch", "epoch": 0, "name": "perl-FileHandle", "release": "483.el9", "source": "rpm", "version": "2.03" } ], "perl-Getopt-Long": [ { "arch": "noarch", "epoch": 1, "name": "perl-Getopt-Long", "release": "4.el9", "source": "rpm", "version": "2.52" } ], "perl-Getopt-Std": [ { "arch": "noarch", "epoch": 0, "name": "perl-Getopt-Std", "release": "483.el9", "source": "rpm", "version": "1.12" } ], "perl-Git": [ { "arch": "noarch", "epoch": null, "name": "perl-Git", "release": "1.el9", "source": "rpm", "version": "2.47.3" } ], "perl-HTTP-Tiny": [ { "arch": "noarch", "epoch": null, "name": "perl-HTTP-Tiny", "release": "462.el9", "source": "rpm", "version": "0.076" } ], "perl-IO": [ { "arch": "x86_64", "epoch": 0, "name": "perl-IO", "release": "483.el9", "source": "rpm", "version": "1.43" } ], "perl-IO-Socket-IP": [ { "arch": "noarch", "epoch": null, "name": "perl-IO-Socket-IP", "release": "5.el9", "source": "rpm", "version": "0.41" } ], "perl-IO-Socket-SSL": [ { "arch": "noarch", "epoch": null, "name": "perl-IO-Socket-SSL", "release": "2.el9", "source": "rpm", "version": "2.073" } ], "perl-IPC-Open3": [ { "arch": "noarch", "epoch": 0, "name": "perl-IPC-Open3", "release": "483.el9", "source": "rpm", "version": "1.21" } ], "perl-MIME-Base64": [ { "arch": "x86_64", "epoch": null, "name": "perl-MIME-Base64", "release": "4.el9", "source": "rpm", "version": "3.16" } ], "perl-Mozilla-CA": [ { "arch": "noarch", "epoch": null, "name": "perl-Mozilla-CA", "release": "6.el9", "source": "rpm", "version": "20200520" } ], "perl-NDBM_File": [ { "arch": "x86_64", "epoch": 0, "name": "perl-NDBM_File", "release": "483.el9", "source": "rpm", "version": "1.15" } ], "perl-Net-SSLeay": [ { "arch": "x86_64", "epoch": null, "name": "perl-Net-SSLeay", "release": "3.el9", "source": "rpm", "version": "1.94" } ], "perl-POSIX": [ { "arch": "x86_64", "epoch": 0, "name": "perl-POSIX", "release": "483.el9", "source": "rpm", "version": "1.94" } ], "perl-PathTools": [ { "arch": "x86_64", "epoch": null, "name": "perl-PathTools", "release": "461.el9", "source": "rpm", "version": "3.78" } ], "perl-Pod-Escapes": [ { "arch": "noarch", "epoch": 1, "name": "perl-Pod-Escapes", "release": "460.el9", "source": "rpm", "version": "1.07" } ], "perl-Pod-Perldoc": [ { "arch": "noarch", "epoch": null, "name": "perl-Pod-Perldoc", "release": "461.el9", "source": "rpm", "version": "3.28.01" } ], "perl-Pod-Simple": [ { "arch": "noarch", "epoch": 1, "name": "perl-Pod-Simple", "release": "4.el9", "source": "rpm", "version": "3.42" } ], "perl-Pod-Usage": [ { "arch": "noarch", "epoch": 4, "name": "perl-Pod-Usage", "release": "4.el9", "source": "rpm", "version": "2.01" } ], "perl-Scalar-List-Utils": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Scalar-List-Utils", "release": "462.el9", "source": "rpm", "version": "1.56" } ], "perl-SelectSaver": [ { "arch": "noarch", "epoch": 0, "name": "perl-SelectSaver", "release": "483.el9", "source": "rpm", "version": "1.02" } ], "perl-Socket": [ { "arch": "x86_64", "epoch": 4, "name": "perl-Socket", "release": "4.el9", "source": "rpm", "version": "2.031" } ], "perl-Storable": [ { "arch": "x86_64", "epoch": 1, "name": "perl-Storable", "release": "460.el9", "source": "rpm", "version": "3.21" } ], "perl-Symbol": [ { "arch": "noarch", "epoch": 0, "name": "perl-Symbol", "release": "483.el9", "source": "rpm", "version": "1.08" } ], "perl-Term-ANSIColor": [ { "arch": "noarch", "epoch": null, "name": "perl-Term-ANSIColor", "release": "461.el9", "source": "rpm", "version": "5.01" } ], "perl-Term-Cap": [ { "arch": "noarch", "epoch": null, "name": "perl-Term-Cap", "release": "460.el9", "source": "rpm", "version": "1.17" } ], "perl-TermReadKey": [ { "arch": "x86_64", "epoch": null, "name": "perl-TermReadKey", "release": "11.el9", "source": "rpm", "version": "2.38" } ], "perl-Text-ParseWords": [ { "arch": "noarch", "epoch": null, "name": "perl-Text-ParseWords", "release": "460.el9", "source": "rpm", "version": "3.30" } ], "perl-Text-Tabs+Wrap": [ { "arch": "noarch", "epoch": null, "name": "perl-Text-Tabs+Wrap", "release": "460.el9", "source": "rpm", "version": "2013.0523" } ], "perl-Time-Local": [ { "arch": "noarch", "epoch": 2, "name": "perl-Time-Local", "release": "7.el9", "source": "rpm", "version": "1.300" } ], "perl-URI": [ { "arch": "noarch", "epoch": null, "name": "perl-URI", "release": "3.el9", "source": "rpm", "version": "5.09" } ], "perl-base": [ { "arch": "noarch", "epoch": 0, "name": "perl-base", "release": "483.el9", "source": "rpm", "version": "2.27" } ], "perl-constant": [ { "arch": "noarch", "epoch": null, "name": "perl-constant", "release": "461.el9", "source": "rpm", "version": "1.33" } ], "perl-if": [ { "arch": "noarch", "epoch": 0, "name": "perl-if", "release": "483.el9", "source": "rpm", "version": "0.60.800" } ], "perl-interpreter": [ { "arch": "x86_64", "epoch": 4, "name": "perl-interpreter", "release": "483.el9", "source": "rpm", "version": "5.32.1" } ], "perl-lib": [ { "arch": "x86_64", "epoch": 0, "name": "perl-lib", "release": "483.el9", "source": "rpm", "version": "0.65" } ], "perl-libnet": [ { "arch": "noarch", "epoch": null, "name": "perl-libnet", "release": "4.el9", "source": "rpm", "version": "3.13" } ], "perl-libs": [ { "arch": "x86_64", "epoch": 4, "name": "perl-libs", "release": "483.el9", "source": "rpm", "version": "5.32.1" } ], "perl-mro": [ { "arch": "x86_64", "epoch": 0, "name": "perl-mro", "release": "483.el9", "source": "rpm", "version": "1.23" } ], "perl-overload": [ { "arch": "noarch", "epoch": 0, "name": "perl-overload", "release": "483.el9", "source": "rpm", "version": "1.31" } ], "perl-overloading": [ { "arch": "noarch", "epoch": 0, "name": "perl-overloading", "release": "483.el9", "source": "rpm", "version": "0.02" } ], "perl-parent": [ { "arch": "noarch", "epoch": 1, "name": "perl-parent", "release": "460.el9", "source": "rpm", "version": "0.238" } ], "perl-podlators": [ { "arch": "noarch", "epoch": 1, "name": "perl-podlators", "release": "460.el9", "source": "rpm", "version": "4.14" } ], "perl-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "perl-srpm-macros", "release": "41.el9", "source": "rpm", "version": "1" } ], "perl-subs": [ { "arch": "noarch", "epoch": 0, "name": "perl-subs", "release": "483.el9", "source": "rpm", "version": "1.03" } ], "perl-vars": [ { "arch": "noarch", "epoch": 0, "name": "perl-vars", "release": "483.el9", "source": "rpm", "version": "1.05" } ], "pigz": [ { "arch": "x86_64", "epoch": null, "name": "pigz", "release": "4.el9", "source": "rpm", "version": "2.5" } ], "pkgconf": [ { "arch": "x86_64", "epoch": null, "name": "pkgconf", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "pkgconf-m4": [ { "arch": "noarch", "epoch": null, "name": "pkgconf-m4", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "pkgconf-pkg-config": [ { "arch": "x86_64", "epoch": null, "name": "pkgconf-pkg-config", "release": "10.el9", "source": "rpm", "version": "1.7.3" } ], "podman": [ { "arch": "x86_64", "epoch": 6, "name": "podman", "release": "2.el9", "source": "rpm", "version": "5.6.0" } ], "policycoreutils": [ { "arch": "x86_64", "epoch": null, "name": "policycoreutils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "policycoreutils-python-utils": [ { "arch": "noarch", "epoch": null, "name": "policycoreutils-python-utils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "polkit": [ { "arch": "x86_64", "epoch": null, "name": "polkit", "release": "14.el9", "source": "rpm", "version": "0.117" } ], "polkit-libs": [ { "arch": "x86_64", "epoch": null, "name": "polkit-libs", "release": "14.el9", "source": "rpm", "version": "0.117" } ], "polkit-pkla-compat": [ { "arch": "x86_64", "epoch": null, "name": "polkit-pkla-compat", "release": "21.el9", "source": "rpm", "version": "0.1" } ], "popt": [ { "arch": "x86_64", "epoch": null, "name": "popt", "release": "8.el9", "source": "rpm", "version": "1.18" } ], "prefixdevname": [ { "arch": "x86_64", "epoch": null, "name": "prefixdevname", "release": "8.el9", "source": "rpm", "version": "0.1.0" } ], "procps-ng": [ { "arch": "x86_64", "epoch": null, "name": "procps-ng", "release": "14.el9", "source": "rpm", "version": "3.3.17" } ], "protobuf-c": [ { "arch": "x86_64", "epoch": null, "name": "protobuf-c", "release": "13.el9", "source": "rpm", "version": "1.3.3" } ], "psmisc": [ { "arch": "x86_64", "epoch": null, "name": "psmisc", "release": "3.el9", "source": "rpm", "version": "23.4" } ], "publicsuffix-list-dafsa": [ { "arch": "noarch", "epoch": null, "name": "publicsuffix-list-dafsa", "release": "3.el9", "source": "rpm", "version": "20210518" } ], "pyproject-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "pyproject-srpm-macros", "release": "1.el9", "source": "rpm", "version": "1.18.5" } ], "python-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python-rpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python-srpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python-unversioned-command": [ { "arch": "noarch", "epoch": null, "name": "python-unversioned-command", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3": [ { "arch": "x86_64", "epoch": null, "name": "python3", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-argcomplete": [ { "arch": "noarch", "epoch": null, "name": "python3-argcomplete", "release": "5.el9", "source": "rpm", "version": "1.12.0" } ], "python3-attrs": [ { "arch": "noarch", "epoch": null, "name": "python3-attrs", "release": "7.el9", "source": "rpm", "version": "20.3.0" } ], "python3-audit": [ { "arch": "x86_64", "epoch": null, "name": "python3-audit", "release": "8.el9", "source": "rpm", "version": "3.1.5" } ], "python3-babel": [ { "arch": "noarch", "epoch": null, "name": "python3-babel", "release": "2.el9", "source": "rpm", "version": "2.9.1" } ], "python3-cffi": [ { "arch": "x86_64", "epoch": null, "name": "python3-cffi", "release": "5.el9", "source": "rpm", "version": "1.14.5" } ], "python3-chardet": [ { "arch": "noarch", "epoch": null, "name": "python3-chardet", "release": "5.el9", "source": "rpm", "version": "4.0.0" } ], "python3-configobj": [ { "arch": "noarch", "epoch": null, "name": "python3-configobj", "release": "25.el9", "source": "rpm", "version": "5.0.6" } ], "python3-cryptography": [ { "arch": "x86_64", "epoch": null, "name": "python3-cryptography", "release": "5.el9", "source": "rpm", "version": "36.0.1" } ], "python3-dasbus": [ { "arch": "noarch", "epoch": null, "name": "python3-dasbus", "release": "1.el9", "source": "rpm", "version": "1.7" } ], "python3-dateutil": [ { "arch": "noarch", "epoch": 1, "name": "python3-dateutil", "release": "1.el9", "source": "rpm", "version": "2.9.0.post0" } ], "python3-dbus": [ { "arch": "x86_64", "epoch": null, "name": "python3-dbus", "release": "2.el9", "source": "rpm", "version": "1.2.18" } ], "python3-devel": [ { "arch": "x86_64", "epoch": null, "name": "python3-devel", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-distro": [ { "arch": "noarch", "epoch": null, "name": "python3-distro", "release": "7.el9", "source": "rpm", "version": "1.5.0" } ], "python3-dnf": [ { "arch": "noarch", "epoch": null, "name": "python3-dnf", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "python3-dnf-plugins-core": [ { "arch": "noarch", "epoch": null, "name": "python3-dnf-plugins-core", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "python3-enchant": [ { "arch": "noarch", "epoch": null, "name": "python3-enchant", "release": "5.el9", "source": "rpm", "version": "3.2.0" } ], "python3-file-magic": [ { "arch": "noarch", "epoch": null, "name": "python3-file-magic", "release": "16.el9", "source": "rpm", "version": "5.39" } ], "python3-gobject-base": [ { "arch": "x86_64", "epoch": null, "name": "python3-gobject-base", "release": "6.el9", "source": "rpm", "version": "3.40.1" } ], "python3-gobject-base-noarch": [ { "arch": "noarch", "epoch": null, "name": "python3-gobject-base-noarch", "release": "6.el9", "source": "rpm", "version": "3.40.1" } ], "python3-gpg": [ { "arch": "x86_64", "epoch": null, "name": "python3-gpg", "release": "6.el9", "source": "rpm", "version": "1.15.1" } ], "python3-hawkey": [ { "arch": "x86_64", "epoch": null, "name": "python3-hawkey", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "python3-idna": [ { "arch": "noarch", "epoch": null, "name": "python3-idna", "release": "7.el9.1", "source": "rpm", "version": "2.10" } ], "python3-jinja2": [ { "arch": "noarch", "epoch": null, "name": "python3-jinja2", "release": "8.el9", "source": "rpm", "version": "2.11.3" } ], "python3-jmespath": [ { "arch": "noarch", "epoch": null, "name": "python3-jmespath", "release": "1.el9", "source": "rpm", "version": "1.0.1" } ], "python3-jsonpatch": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonpatch", "release": "16.el9", "source": "rpm", "version": "1.21" } ], "python3-jsonpointer": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonpointer", "release": "4.el9", "source": "rpm", "version": "2.0" } ], "python3-jsonschema": [ { "arch": "noarch", "epoch": null, "name": "python3-jsonschema", "release": "13.el9", "source": "rpm", "version": "3.2.0" } ], "python3-libcomps": [ { "arch": "x86_64", "epoch": null, "name": "python3-libcomps", "release": "1.el9", "source": "rpm", "version": "0.1.18" } ], "python3-libdnf": [ { "arch": "x86_64", "epoch": null, "name": "python3-libdnf", "release": "16.el9", "source": "rpm", "version": "0.69.0" } ], "python3-libs": [ { "arch": "x86_64", "epoch": null, "name": "python3-libs", "release": "3.el9", "source": "rpm", "version": "3.9.25" } ], "python3-libselinux": [ { "arch": "x86_64", "epoch": null, "name": "python3-libselinux", "release": "3.el9", "source": "rpm", "version": "3.6" } ], "python3-libsemanage": [ { "arch": "x86_64", "epoch": null, "name": "python3-libsemanage", "release": "5.el9", "source": "rpm", "version": "3.6" } ], "python3-libvirt": [ { "arch": "x86_64", "epoch": null, "name": "python3-libvirt", "release": "1.el9", "source": "rpm", "version": "11.10.0" } ], "python3-libxml2": [ { "arch": "x86_64", "epoch": null, "name": "python3-libxml2", "release": "14.el9", "source": "rpm", "version": "2.9.13" } ], "python3-lxml": [ { "arch": "x86_64", "epoch": null, "name": "python3-lxml", "release": "3.el9", "source": "rpm", "version": "4.6.5" } ], "python3-markupsafe": [ { "arch": "x86_64", "epoch": null, "name": "python3-markupsafe", "release": "12.el9", "source": "rpm", "version": "1.1.1" } ], "python3-netaddr": [ { "arch": "noarch", "epoch": null, "name": "python3-netaddr", "release": "3.el9", "source": "rpm", "version": "0.10.1" } ], "python3-netifaces": [ { "arch": "x86_64", "epoch": null, "name": "python3-netifaces", "release": "15.el9", "source": "rpm", "version": "0.10.6" } ], "python3-oauthlib": [ { "arch": "noarch", "epoch": null, "name": "python3-oauthlib", "release": "5.el9", "source": "rpm", "version": "3.1.1" } ], "python3-packaging": [ { "arch": "noarch", "epoch": null, "name": "python3-packaging", "release": "5.el9", "source": "rpm", "version": "20.9" } ], "python3-pexpect": [ { "arch": "noarch", "epoch": null, "name": "python3-pexpect", "release": "7.el9", "source": "rpm", "version": "4.8.0" } ], "python3-pip": [ { "arch": "noarch", "epoch": null, "name": "python3-pip", "release": "1.el9", "source": "rpm", "version": "21.3.1" } ], "python3-pip-wheel": [ { "arch": "noarch", "epoch": null, "name": "python3-pip-wheel", "release": "1.el9", "source": "rpm", "version": "21.3.1" } ], "python3-ply": [ { "arch": "noarch", "epoch": null, "name": "python3-ply", "release": "14.el9", "source": "rpm", "version": "3.11" } ], "python3-policycoreutils": [ { "arch": "noarch", "epoch": null, "name": "python3-policycoreutils", "release": "4.el9", "source": "rpm", "version": "3.6" } ], "python3-prettytable": [ { "arch": "noarch", "epoch": null, "name": "python3-prettytable", "release": "27.el9", "source": "rpm", "version": "0.7.2" } ], "python3-ptyprocess": [ { "arch": "noarch", "epoch": null, "name": "python3-ptyprocess", "release": "12.el9", "source": "rpm", "version": "0.6.0" } ], "python3-pycparser": [ { "arch": "noarch", "epoch": null, "name": "python3-pycparser", "release": "6.el9", "source": "rpm", "version": "2.20" } ], "python3-pyparsing": [ { "arch": "noarch", "epoch": null, "name": "python3-pyparsing", "release": "9.el9", "source": "rpm", "version": "2.4.7" } ], "python3-pyrsistent": [ { "arch": "x86_64", "epoch": null, "name": "python3-pyrsistent", "release": "8.el9", "source": "rpm", "version": "0.17.3" } ], "python3-pyserial": [ { "arch": "noarch", "epoch": null, "name": "python3-pyserial", "release": "12.el9", "source": "rpm", "version": "3.4" } ], "python3-pysocks": [ { "arch": "noarch", "epoch": null, "name": "python3-pysocks", "release": "12.el9", "source": "rpm", "version": "1.7.1" } ], "python3-pytz": [ { "arch": "noarch", "epoch": null, "name": "python3-pytz", "release": "5.el9", "source": "rpm", "version": "2021.1" } ], "python3-pyyaml": [ { "arch": "x86_64", "epoch": null, "name": "python3-pyyaml", "release": "6.el9", "source": "rpm", "version": "5.4.1" } ], "python3-requests": [ { "arch": "noarch", "epoch": null, "name": "python3-requests", "release": "10.el9", "source": "rpm", "version": "2.25.1" } ], "python3-resolvelib": [ { "arch": "noarch", "epoch": null, "name": "python3-resolvelib", "release": "5.el9", "source": "rpm", "version": "0.5.4" } ], "python3-rpm": [ { "arch": "x86_64", "epoch": null, "name": "python3-rpm", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "python3-rpm-generators": [ { "arch": "noarch", "epoch": null, "name": "python3-rpm-generators", "release": "9.el9", "source": "rpm", "version": "12" } ], "python3-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "python3-rpm-macros", "release": "54.el9", "source": "rpm", "version": "3.9" } ], "python3-setools": [ { "arch": "x86_64", "epoch": null, "name": "python3-setools", "release": "1.el9", "source": "rpm", "version": "4.4.4" } ], "python3-setuptools": [ { "arch": "noarch", "epoch": null, "name": "python3-setuptools", "release": "15.el9", "source": "rpm", "version": "53.0.0" } ], "python3-setuptools-wheel": [ { "arch": "noarch", "epoch": null, "name": "python3-setuptools-wheel", "release": "15.el9", "source": "rpm", "version": "53.0.0" } ], "python3-six": [ { "arch": "noarch", "epoch": null, "name": "python3-six", "release": "9.el9", "source": "rpm", "version": "1.15.0" } ], "python3-systemd": [ { "arch": "x86_64", "epoch": null, "name": "python3-systemd", "release": "19.el9", "source": "rpm", "version": "234" } ], "python3-urllib3": [ { "arch": "noarch", "epoch": null, "name": "python3-urllib3", "release": "6.el9", "source": "rpm", "version": "1.26.5" } ], "qemu-guest-agent": [ { "arch": "x86_64", "epoch": 17, "name": "qemu-guest-agent", "release": "10.el9", "source": "rpm", "version": "10.1.0" } ], "qt5-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "qt5-srpm-macros", "release": "1.el9", "source": "rpm", "version": "5.15.9" } ], "quota": [ { "arch": "x86_64", "epoch": 1, "name": "quota", "release": "4.el9", "source": "rpm", "version": "4.09" } ], "quota-nls": [ { "arch": "noarch", "epoch": 1, "name": "quota-nls", "release": "4.el9", "source": "rpm", "version": "4.09" } ], "readline": [ { "arch": "x86_64", "epoch": null, "name": "readline", "release": "4.el9", "source": "rpm", "version": "8.1" } ], "readline-devel": [ { "arch": "x86_64", "epoch": null, "name": "readline-devel", "release": "4.el9", "source": "rpm", "version": "8.1" } ], "redhat-rpm-config": [ { "arch": "noarch", "epoch": null, "name": "redhat-rpm-config", "release": "1.el9", "source": "rpm", "version": "210" } ], "rootfiles": [ { "arch": "noarch", "epoch": null, "name": "rootfiles", "release": "35.el9", "source": "rpm", "version": "8.1" } ], "rpcbind": [ { "arch": "x86_64", "epoch": null, "name": "rpcbind", "release": "7.el9", "source": "rpm", "version": "1.2.6" } ], "rpm": [ { "arch": "x86_64", "epoch": null, "name": "rpm", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-build": [ { "arch": "x86_64", "epoch": null, "name": "rpm-build", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-build-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-build-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-audit": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-audit", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-selinux": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-selinux", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-plugin-systemd-inhibit": [ { "arch": "x86_64", "epoch": null, "name": "rpm-plugin-systemd-inhibit", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-sign": [ { "arch": "x86_64", "epoch": null, "name": "rpm-sign", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpm-sign-libs": [ { "arch": "x86_64", "epoch": null, "name": "rpm-sign-libs", "release": "40.el9", "source": "rpm", "version": "4.16.1.3" } ], "rpmlint": [ { "arch": "noarch", "epoch": null, "name": "rpmlint", "release": "19.el9", "source": "rpm", "version": "1.11" } ], "rsync": [ { "arch": "x86_64", "epoch": null, "name": "rsync", "release": "4.el9", "source": "rpm", "version": "3.2.5" } ], "rsyslog": [ { "arch": "x86_64", "epoch": null, "name": "rsyslog", "release": "2.el9", "source": "rpm", "version": "8.2510.0" } ], "rsyslog-logrotate": [ { "arch": "x86_64", "epoch": null, "name": "rsyslog-logrotate", "release": "2.el9", "source": "rpm", "version": "8.2510.0" } ], "ruby": [ { "arch": "x86_64", "epoch": null, "name": "ruby", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-default-gems": [ { "arch": "noarch", "epoch": null, "name": "ruby-default-gems", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-devel": [ { "arch": "x86_64", "epoch": null, "name": "ruby-devel", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "ruby-libs": [ { "arch": "x86_64", "epoch": null, "name": "ruby-libs", "release": "165.el9", "source": "rpm", "version": "3.0.7" } ], "rubygem-bigdecimal": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-bigdecimal", "release": "165.el9", "source": "rpm", "version": "3.0.0" } ], "rubygem-bundler": [ { "arch": "noarch", "epoch": null, "name": "rubygem-bundler", "release": "165.el9", "source": "rpm", "version": "2.2.33" } ], "rubygem-io-console": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-io-console", "release": "165.el9", "source": "rpm", "version": "0.5.7" } ], "rubygem-json": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-json", "release": "165.el9", "source": "rpm", "version": "2.5.1" } ], "rubygem-psych": [ { "arch": "x86_64", "epoch": null, "name": "rubygem-psych", "release": "165.el9", "source": "rpm", "version": "3.3.2" } ], "rubygem-rdoc": [ { "arch": "noarch", "epoch": null, "name": "rubygem-rdoc", "release": "165.el9", "source": "rpm", "version": "6.3.4.1" } ], "rubygems": [ { "arch": "noarch", "epoch": null, "name": "rubygems", "release": "165.el9", "source": "rpm", "version": "3.2.33" } ], "rust-srpm-macros": [ { "arch": "noarch", "epoch": null, "name": "rust-srpm-macros", "release": "4.el9", "source": "rpm", "version": "17" } ], "sed": [ { "arch": "x86_64", "epoch": null, "name": "sed", "release": "9.el9", "source": "rpm", "version": "4.8" } ], "selinux-policy": [ { "arch": "noarch", "epoch": null, "name": "selinux-policy", "release": "1.el9", "source": "rpm", "version": "38.1.71" } ], "selinux-policy-targeted": [ { "arch": "noarch", "epoch": null, "name": "selinux-policy-targeted", "release": "1.el9", "source": "rpm", "version": "38.1.71" } ], "setroubleshoot-plugins": [ { "arch": "noarch", "epoch": null, "name": "setroubleshoot-plugins", "release": "4.el9", "source": "rpm", "version": "3.3.14" } ], "setroubleshoot-server": [ { "arch": "x86_64", "epoch": null, "name": "setroubleshoot-server", "release": "2.el9", "source": "rpm", "version": "3.3.35" } ], "setup": [ { "arch": "noarch", "epoch": null, "name": "setup", "release": "10.el9", "source": "rpm", "version": "2.13.7" } ], "sg3_utils": [ { "arch": "x86_64", "epoch": null, "name": "sg3_utils", "release": "10.el9", "source": "rpm", "version": "1.47" } ], "sg3_utils-libs": [ { "arch": "x86_64", "epoch": null, "name": "sg3_utils-libs", "release": "10.el9", "source": "rpm", "version": "1.47" } ], "shadow-utils": [ { "arch": "x86_64", "epoch": 2, "name": "shadow-utils", "release": "16.el9", "source": "rpm", "version": "4.9" } ], "shadow-utils-subid": [ { "arch": "x86_64", "epoch": 2, "name": "shadow-utils-subid", "release": "16.el9", "source": "rpm", "version": "4.9" } ], "shared-mime-info": [ { "arch": "x86_64", "epoch": null, "name": "shared-mime-info", "release": "5.el9", "source": "rpm", "version": "2.1" } ], "skopeo": [ { "arch": "x86_64", "epoch": 2, "name": "skopeo", "release": "2.el9", "source": "rpm", "version": "1.20.0" } ], "slang": [ { "arch": "x86_64", "epoch": null, "name": "slang", "release": "11.el9", "source": "rpm", "version": "2.3.2" } ], "slirp4netns": [ { "arch": "x86_64", "epoch": null, "name": "slirp4netns", "release": "1.el9", "source": "rpm", "version": "1.3.3" } ], "snappy": [ { "arch": "x86_64", "epoch": null, "name": "snappy", "release": "8.el9", "source": "rpm", "version": "1.1.8" } ], "sos": [ { "arch": "noarch", "epoch": null, "name": "sos", "release": "2.el9", "source": "rpm", "version": "4.10.1" } ], "sqlite": [ { "arch": "x86_64", "epoch": null, "name": "sqlite", "release": "9.el9", "source": "rpm", "version": "3.34.1" } ], "sqlite-libs": [ { "arch": "x86_64", "epoch": null, "name": "sqlite-libs", "release": "9.el9", "source": "rpm", "version": "3.34.1" } ], "squashfs-tools": [ { "arch": "x86_64", "epoch": null, "name": "squashfs-tools", "release": "10.git1.el9", "source": "rpm", "version": "4.4" } ], "sscg": [ { "arch": "x86_64", "epoch": null, "name": "sscg", "release": "2.el9", "source": "rpm", "version": "4.0.3" } ], "sshpass": [ { "arch": "x86_64", "epoch": null, "name": "sshpass", "release": "4.el9", "source": "rpm", "version": "1.09" } ], "sssd-client": [ { "arch": "x86_64", "epoch": null, "name": "sssd-client", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-common": [ { "arch": "x86_64", "epoch": null, "name": "sssd-common", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-kcm": [ { "arch": "x86_64", "epoch": null, "name": "sssd-kcm", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sssd-nfs-idmap": [ { "arch": "x86_64", "epoch": null, "name": "sssd-nfs-idmap", "release": "5.el9", "source": "rpm", "version": "2.9.7" } ], "sudo": [ { "arch": "x86_64", "epoch": null, "name": "sudo", "release": "13.el9", "source": "rpm", "version": "1.9.5p2" } ], "systemd": [ { "arch": "x86_64", "epoch": null, "name": "systemd", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-devel": [ { "arch": "x86_64", "epoch": null, "name": "systemd-devel", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-libs": [ { "arch": "x86_64", "epoch": null, "name": "systemd-libs", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-pam": [ { "arch": "x86_64", "epoch": null, "name": "systemd-pam", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-rpm-macros": [ { "arch": "noarch", "epoch": null, "name": "systemd-rpm-macros", "release": "64.el9", "source": "rpm", "version": "252" } ], "systemd-udev": [ { "arch": "x86_64", "epoch": null, "name": "systemd-udev", "release": "64.el9", "source": "rpm", "version": "252" } ], "tar": [ { "arch": "x86_64", "epoch": 2, "name": "tar", "release": "9.el9", "source": "rpm", "version": "1.34" } ], "tcl": [ { "arch": "x86_64", "epoch": 1, "name": "tcl", "release": "7.el9", "source": "rpm", "version": "8.6.10" } ], "tcpdump": [ { "arch": "x86_64", "epoch": 14, "name": "tcpdump", "release": "9.el9", "source": "rpm", "version": "4.99.0" } ], "teamd": [ { "arch": "x86_64", "epoch": null, "name": "teamd", "release": "16.el9", "source": "rpm", "version": "1.31" } ], "time": [ { "arch": "x86_64", "epoch": null, "name": "time", "release": "18.el9", "source": "rpm", "version": "1.9" } ], "tmux": [ { "arch": "x86_64", "epoch": null, "name": "tmux", "release": "5.el9", "source": "rpm", "version": "3.2a" } ], "tpm2-tss": [ { "arch": "x86_64", "epoch": null, "name": "tpm2-tss", "release": "1.el9", "source": "rpm", "version": "3.2.3" } ], "traceroute": [ { "arch": "x86_64", "epoch": 3, "name": "traceroute", "release": "1.el9", "source": "rpm", "version": "2.1.1" } ], "tzdata": [ { "arch": "noarch", "epoch": null, "name": "tzdata", "release": "1.el9", "source": "rpm", "version": "2025c" } ], "unzip": [ { "arch": "x86_64", "epoch": null, "name": "unzip", "release": "59.el9", "source": "rpm", "version": "6.0" } ], "userspace-rcu": [ { "arch": "x86_64", "epoch": null, "name": "userspace-rcu", "release": "6.el9", "source": "rpm", "version": "0.12.1" } ], "util-linux": [ { "arch": "x86_64", "epoch": null, "name": "util-linux", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "util-linux-core": [ { "arch": "x86_64", "epoch": null, "name": "util-linux-core", "release": "21.el9", "source": "rpm", "version": "2.37.4" } ], "vim-minimal": [ { "arch": "x86_64", "epoch": 2, "name": "vim-minimal", "release": "23.el9", "source": "rpm", "version": "8.2.2637" } ], "virt-install": [ { "arch": "noarch", "epoch": null, "name": "virt-install", "release": "1.el9", "source": "rpm", "version": "5.0.0" } ], "virt-manager-common": [ { "arch": "noarch", "epoch": null, "name": "virt-manager-common", "release": "1.el9", "source": "rpm", "version": "5.0.0" } ], "webkit2gtk3-jsc": [ { "arch": "x86_64", "epoch": null, "name": "webkit2gtk3-jsc", "release": "1.el9", "source": "rpm", "version": "2.50.4" } ], "wget": [ { "arch": "x86_64", "epoch": null, "name": "wget", "release": "8.el9", "source": "rpm", "version": "1.21.1" } ], "which": [ { "arch": "x86_64", "epoch": null, "name": "which", "release": "30.el9", "source": "rpm", "version": "2.21" } ], "xfsprogs": [ { "arch": "x86_64", "epoch": null, "name": "xfsprogs", "release": "7.el9", "source": "rpm", "version": "6.4.0" } ], "xmlstarlet": [ { "arch": "x86_64", "epoch": null, "name": "xmlstarlet", "release": "20.el9", "source": "rpm", "version": "1.6.1" } ], "xorriso": [ { "arch": "x86_64", "epoch": null, "name": "xorriso", "release": "5.el9", "source": "rpm", "version": "1.5.4" } ], "xz": [ { "arch": "x86_64", "epoch": null, "name": "xz", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "xz-devel": [ { "arch": "x86_64", "epoch": null, "name": "xz-devel", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "xz-libs": [ { "arch": "x86_64", "epoch": null, "name": "xz-libs", "release": "8.el9", "source": "rpm", "version": "5.2.5" } ], "yajl": [ { "arch": "x86_64", "epoch": null, "name": "yajl", "release": "25.el9", "source": "rpm", "version": "2.1.0" } ], "yum": [ { "arch": "noarch", "epoch": null, "name": "yum", "release": "31.el9", "source": "rpm", "version": "4.14.0" } ], "yum-utils": [ { "arch": "noarch", "epoch": null, "name": "yum-utils", "release": "25.el9", "source": "rpm", "version": "4.3.0" } ], "zip": [ { "arch": "x86_64", "epoch": null, "name": "zip", "release": "35.el9", "source": "rpm", "version": "3.0" } ], "zlib": [ { "arch": "x86_64", "epoch": null, "name": "zlib", "release": "41.el9", "source": "rpm", "version": "1.2.11" } ], "zlib-devel": [ { "arch": "x86_64", "epoch": null, "name": "zlib-devel", "release": "41.el9", "source": "rpm", "version": "1.2.11" } ], "zstd": [ { "arch": "x86_64", "epoch": null, "name": "zstd", "release": "1.el9", "source": "rpm", "version": "1.5.5" } ] }, "zuul_change_list": [ "watcher-operator" ] }././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_cache/compute-0home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_0000644000175000017500000005561615133746064031623 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "192.168.122.100", "38.102.83.181" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:feae:a0a2" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768927348", "epoch_int": "1768927348", "hour": "16", "iso8601": "2026-01-20T16:42:28Z", "iso8601_basic": "20260120T164228497812", "iso8601_basic_short": "20260120T164228", "iso8601_micro": "2026-01-20T16:42:28.497812Z", "minute": "42", "month": "01", "second": "28", "time": "16:42:28", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.181", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:ae:a0:a2", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-23-37-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-23-37-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "167770079", "sectorsize": 512, "size": "80.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "167772160", "sectorsize": "512", "size": "80.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "1", "SSH_CLIENT": "38.102.83.129 47322 22", "SSH_CONNECTION": "38.102.83.129 47322 38.102.83.181 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "7", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.181", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:feae:a0a2", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:ae:a0:a2", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.100", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:58:5f:bb", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "compute-0", "ansible_hostname": "compute-0", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "eth0", "eth1", "lo" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.16, "1m": 0.02, "5m": 0.2 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.181", "127.0.0.0/8", "127.0.0.1", "192.168.122.100" ], "ipv6": [ "::1", "fe80::f816:3eff:feae:a0a2" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 6755, "ansible_memory_mb": { "nocache": { "free": 7268, "used": 411 }, "real": { "free": 6755, "total": 7679, "used": 924 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 7679, "ansible_mounts": [ { "block_available": 20302654, "block_size": 4096, "block_total": 20954875, "block_used": 652221, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 41887816, "inode_total": 41942512, "inode_used": 54696, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 83159670784, "size_total": 85831168000, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "compute-0", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor", "2", "AuthenticAMD", "AMD EPYC-Rome Processor", "3", "AuthenticAMD", "AMD EPYC-Rome Processor", "4", "AuthenticAMD", "AMD EPYC-Rome Processor", "5", "AuthenticAMD", "AMD EPYC-Rome Processor", "6", "AuthenticAMD", "AMD EPYC-Rome Processor", "7", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 8, "ansible_processor_nproc": 8, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 8, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCe+qejRAlJDC5tpW9cL6IQbJ9X5gKDWSXERtfbJ2PwIcdLO/H8nHY/DCe7zGcKZFkXQZ5Lt1y4tqqAEA2e5Za8=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIN9tw2cXMe7fXZRFpGIaWJQmIWXbG+knVbPWXpNVXJR9", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 1123, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "all" ], "module_setup": true }././@LongLink0000644000000000000000000000016400000000000011604 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_cache/compute-1home/zuul/zuul-output/logs/ci-framework-data/artifacts/ansible_facts.2026-01-20_18-40/ansible_facts_0000644000175000017500000005561615133746064031623 0ustar zuulzuul{ "_ansible_facts_gathered": true, "ansible_all_ipv4_addresses": [ "192.168.122.101", "38.102.83.192" ], "ansible_all_ipv6_addresses": [ "fe80::f816:3eff:fe12:453d" ], "ansible_apparmor": { "status": "disabled" }, "ansible_architecture": "x86_64", "ansible_bios_date": "04/01/2014", "ansible_bios_vendor": "SeaBIOS", "ansible_bios_version": "1.15.0-1", "ansible_board_asset_tag": "NA", "ansible_board_name": "NA", "ansible_board_serial": "NA", "ansible_board_vendor": "NA", "ansible_board_version": "NA", "ansible_chassis_asset_tag": "NA", "ansible_chassis_serial": "NA", "ansible_chassis_vendor": "QEMU", "ansible_chassis_version": "pc-i440fx-6.2", "ansible_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_date_time": { "date": "2026-01-20", "day": "20", "epoch": "1768927349", "epoch_int": "1768927349", "hour": "16", "iso8601": "2026-01-20T16:42:29Z", "iso8601_basic": "20260120T164229954884", "iso8601_basic_short": "20260120T164229", "iso8601_micro": "2026-01-20T16:42:29.954884Z", "minute": "42", "month": "01", "second": "29", "time": "16:42:29", "tz": "UTC", "tz_dst": "UTC", "tz_offset": "+0000", "weekday": "Tuesday", "weekday_number": "2", "weeknumber": "03", "year": "2026" }, "ansible_default_ipv4": { "address": "38.102.83.192", "alias": "eth0", "broadcast": "38.102.83.255", "gateway": "38.102.83.1", "interface": "eth0", "macaddress": "fa:16:3e:12:45:3d", "mtu": 1500, "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24", "type": "ether" }, "ansible_default_ipv6": {}, "ansible_device_links": { "ids": { "sr0": [ "ata-QEMU_DVD-ROM_QM00001" ] }, "labels": { "sr0": [ "config-2" ] }, "masters": {}, "uuids": { "sr0": [ "2026-01-20-16-24-46-00" ], "vda1": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] } }, "ansible_devices": { "sr0": { "holders": [], "host": "", "links": { "ids": [ "ata-QEMU_DVD-ROM_QM00001" ], "labels": [ "config-2" ], "masters": [], "uuids": [ "2026-01-20-16-24-46-00" ] }, "model": "QEMU DVD-ROM", "partitions": {}, "removable": "1", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "mq-deadline", "sectors": "964", "sectorsize": "2048", "size": "482.00 KB", "support_discard": "2048", "vendor": "QEMU", "virtual": 1 }, "vda": { "holders": [], "host": "", "links": { "ids": [], "labels": [], "masters": [], "uuids": [] }, "model": null, "partitions": { "vda1": { "holders": [], "links": { "ids": [], "labels": [], "masters": [], "uuids": [ "22ac9141-3960-4912-b20e-19fc8a328d40" ] }, "sectors": "167770079", "sectorsize": 512, "size": "80.00 GB", "start": "2048", "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } }, "removable": "0", "rotational": "1", "sas_address": null, "sas_device_handle": null, "scheduler_mode": "none", "sectors": "167772160", "sectorsize": "512", "size": "80.00 GB", "support_discard": "512", "vendor": "0x1af4", "virtual": 1 } }, "ansible_distribution": "CentOS", "ansible_distribution_file_parsed": true, "ansible_distribution_file_path": "/etc/centos-release", "ansible_distribution_file_variety": "CentOS", "ansible_distribution_major_version": "9", "ansible_distribution_release": "Stream", "ansible_distribution_version": "9", "ansible_dns": { "nameservers": [ "199.204.44.24", "199.204.47.54" ] }, "ansible_domain": "", "ansible_effective_group_id": 1000, "ansible_effective_user_id": 1000, "ansible_env": { "BASH_FUNC_which%%": "() { ( alias;\n eval ${which_declare} ) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@\n}", "DBUS_SESSION_BUS_ADDRESS": "unix:path=/run/user/1000/bus", "DEBUGINFOD_IMA_CERT_PATH": "/etc/keys/ima:", "DEBUGINFOD_URLS": "https://debuginfod.centos.org/ ", "HOME": "/home/zuul", "LANG": "en_US.UTF-8", "LESSOPEN": "||/usr/bin/lesspipe.sh %s", "LOGNAME": "zuul", "MOTD_SHOWN": "pam", "PATH": "/home/zuul/.local/bin:/home/zuul/bin:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin", "PWD": "/home/zuul", "SELINUX_LEVEL_REQUESTED": "", "SELINUX_ROLE_REQUESTED": "", "SELINUX_USE_CURRENT_RANGE": "", "SHELL": "/bin/bash", "SHLVL": "1", "SSH_CLIENT": "38.102.83.129 52984 22", "SSH_CONNECTION": "38.102.83.129 52984 38.102.83.192 22", "USER": "zuul", "XDG_RUNTIME_DIR": "/run/user/1000", "XDG_SESSION_CLASS": "user", "XDG_SESSION_ID": "8", "XDG_SESSION_TYPE": "tty", "_": "/usr/bin/python3", "which_declare": "declare -f" }, "ansible_eth0": { "active": true, "device": "eth0", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "38.102.83.192", "broadcast": "38.102.83.255", "netmask": "255.255.255.0", "network": "38.102.83.0", "prefix": "24" }, "ipv6": [ { "address": "fe80::f816:3eff:fe12:453d", "prefix": "64", "scope": "link" } ], "macaddress": "fa:16:3e:12:45:3d", "module": "virtio_net", "mtu": 1500, "pciid": "virtio1", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_eth1": { "active": true, "device": "eth1", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "off [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "on", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "on [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "off [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "off [fixed]", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "on [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off", "tx_scatter_gather": "on", "tx_scatter_gather_fraglist": "off [fixed]", "tx_sctp_segmentation": "off [fixed]", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "off", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "off [fixed]", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "off [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "192.168.122.101", "broadcast": "192.168.122.255", "netmask": "255.255.255.0", "network": "192.168.122.0", "prefix": "24" }, "macaddress": "fa:16:3e:30:ed:c6", "module": "virtio_net", "mtu": 1500, "pciid": "virtio5", "promisc": false, "speed": -1, "timestamping": [], "type": "ether" }, "ansible_fibre_channel_wwn": [], "ansible_fips": false, "ansible_form_factor": "Other", "ansible_fqdn": "compute-1", "ansible_hostname": "compute-1", "ansible_hostnqn": "nqn.2014-08.org.nvmexpress:uuid:5350774e-8b5e-4dba-80a9-92d405981c1d", "ansible_interfaces": [ "eth0", "lo", "eth1" ], "ansible_is_chroot": false, "ansible_iscsi_iqn": "", "ansible_kernel": "5.14.0-661.el9.x86_64", "ansible_kernel_version": "#1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026", "ansible_lo": { "active": true, "device": "lo", "features": { "esp_hw_offload": "off [fixed]", "esp_tx_csum_hw_offload": "off [fixed]", "generic_receive_offload": "on", "generic_segmentation_offload": "on", "highdma": "on [fixed]", "hsr_dup_offload": "off [fixed]", "hsr_fwd_offload": "off [fixed]", "hsr_tag_ins_offload": "off [fixed]", "hsr_tag_rm_offload": "off [fixed]", "hw_tc_offload": "off [fixed]", "l2_fwd_offload": "off [fixed]", "large_receive_offload": "off [fixed]", "loopback": "on [fixed]", "macsec_hw_offload": "off [fixed]", "ntuple_filters": "off [fixed]", "receive_hashing": "off [fixed]", "rx_all": "off [fixed]", "rx_checksumming": "on [fixed]", "rx_fcs": "off [fixed]", "rx_gro_hw": "off [fixed]", "rx_gro_list": "off", "rx_udp_gro_forwarding": "off", "rx_udp_tunnel_port_offload": "off [fixed]", "rx_vlan_filter": "off [fixed]", "rx_vlan_offload": "off [fixed]", "rx_vlan_stag_filter": "off [fixed]", "rx_vlan_stag_hw_parse": "off [fixed]", "scatter_gather": "on", "tcp_segmentation_offload": "on", "tls_hw_record": "off [fixed]", "tls_hw_rx_offload": "off [fixed]", "tls_hw_tx_offload": "off [fixed]", "tx_checksum_fcoe_crc": "off [fixed]", "tx_checksum_ip_generic": "on [fixed]", "tx_checksum_ipv4": "off [fixed]", "tx_checksum_ipv6": "off [fixed]", "tx_checksum_sctp": "on [fixed]", "tx_checksumming": "on", "tx_esp_segmentation": "off [fixed]", "tx_fcoe_segmentation": "off [fixed]", "tx_gre_csum_segmentation": "off [fixed]", "tx_gre_segmentation": "off [fixed]", "tx_gso_list": "on", "tx_gso_partial": "off [fixed]", "tx_gso_robust": "off [fixed]", "tx_ipxip4_segmentation": "off [fixed]", "tx_ipxip6_segmentation": "off [fixed]", "tx_nocache_copy": "off [fixed]", "tx_scatter_gather": "on [fixed]", "tx_scatter_gather_fraglist": "on [fixed]", "tx_sctp_segmentation": "on", "tx_tcp6_segmentation": "on", "tx_tcp_ecn_segmentation": "on", "tx_tcp_mangleid_segmentation": "on", "tx_tcp_segmentation": "on", "tx_tunnel_remcsum_segmentation": "off [fixed]", "tx_udp_segmentation": "on", "tx_udp_tnl_csum_segmentation": "off [fixed]", "tx_udp_tnl_segmentation": "off [fixed]", "tx_vlan_offload": "off [fixed]", "tx_vlan_stag_hw_insert": "off [fixed]", "vlan_challenged": "on [fixed]" }, "hw_timestamp_filters": [], "ipv4": { "address": "127.0.0.1", "broadcast": "", "netmask": "255.0.0.0", "network": "127.0.0.0", "prefix": "8" }, "ipv6": [ { "address": "::1", "prefix": "128", "scope": "host" } ], "mtu": 65536, "promisc": false, "timestamping": [], "type": "loopback" }, "ansible_loadavg": { "15m": 0.15, "1m": 0.05, "5m": 0.2 }, "ansible_local": {}, "ansible_locally_reachable_ips": { "ipv4": [ "38.102.83.192", "127.0.0.0/8", "127.0.0.1", "192.168.122.101" ], "ipv6": [ "::1", "fe80::f816:3eff:fe12:453d" ] }, "ansible_lsb": {}, "ansible_lvm": "N/A", "ansible_machine": "x86_64", "ansible_machine_id": "85ac68c10a6e7ae08ceb898dbdca0cb5", "ansible_memfree_mb": 6784, "ansible_memory_mb": { "nocache": { "free": 7286, "used": 393 }, "real": { "free": 6784, "total": 7679, "used": 895 }, "swap": { "cached": 0, "free": 0, "total": 0, "used": 0 } }, "ansible_memtotal_mb": 7679, "ansible_mounts": [ { "block_available": 20302651, "block_size": 4096, "block_total": 20954875, "block_used": 652224, "device": "/dev/vda1", "fstype": "xfs", "inode_available": 41887817, "inode_total": 41942512, "inode_used": 54695, "mount": "/", "options": "rw,seclabel,relatime,attr2,inode64,logbufs=8,logbsize=32k,noquota", "size_available": 83159658496, "size_total": 85831168000, "uuid": "22ac9141-3960-4912-b20e-19fc8a328d40" } ], "ansible_nodename": "compute-1", "ansible_os_family": "RedHat", "ansible_pkg_mgr": "dnf", "ansible_proc_cmdline": { "BOOT_IMAGE": "(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", "console": "ttyS0,115200n8", "crashkernel": "1G-2G:192M,2G-64G:256M,64G-:512M", "net.ifnames": "0", "no_timer_check": true, "ro": true, "root": "UUID=22ac9141-3960-4912-b20e-19fc8a328d40" }, "ansible_processor": [ "0", "AuthenticAMD", "AMD EPYC-Rome Processor", "1", "AuthenticAMD", "AMD EPYC-Rome Processor", "2", "AuthenticAMD", "AMD EPYC-Rome Processor", "3", "AuthenticAMD", "AMD EPYC-Rome Processor", "4", "AuthenticAMD", "AMD EPYC-Rome Processor", "5", "AuthenticAMD", "AMD EPYC-Rome Processor", "6", "AuthenticAMD", "AMD EPYC-Rome Processor", "7", "AuthenticAMD", "AMD EPYC-Rome Processor" ], "ansible_processor_cores": 1, "ansible_processor_count": 8, "ansible_processor_nproc": 8, "ansible_processor_threads_per_core": 1, "ansible_processor_vcpus": 8, "ansible_product_name": "OpenStack Nova", "ansible_product_serial": "NA", "ansible_product_uuid": "NA", "ansible_product_version": "26.3.1", "ansible_python": { "executable": "/usr/bin/python3", "has_sslcontext": true, "type": "cpython", "version": { "major": 3, "micro": 25, "minor": 9, "releaselevel": "final", "serial": 0 }, "version_info": [ 3, 9, 25, "final", 0 ] }, "ansible_python_version": "3.9.25", "ansible_real_group_id": 1000, "ansible_real_user_id": 1000, "ansible_selinux": { "config_mode": "enforcing", "mode": "enforcing", "policyvers": 33, "status": "enabled", "type": "targeted" }, "ansible_selinux_python_present": true, "ansible_service_mgr": "systemd", "ansible_ssh_host_key_ecdsa_public": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFAqM26R0MqyBYDvgqXYsowpIyokzkLkmzXlKae725e7QpsDDdpAwlfRTYM7WYpvW1J1T4e5Qd4z/hQwNCKBvvk=", "ansible_ssh_host_key_ecdsa_public_keytype": "ecdsa-sha2-nistp256", "ansible_ssh_host_key_ed25519_public": "AAAAC3NzaC1lZDI1NTE5AAAAIDMIgnLst56Z+qDhe62CoSQxsEdOdAODmh24F4PTlS+L", "ansible_ssh_host_key_ed25519_public_keytype": "ssh-ed25519", "ansible_ssh_host_key_rsa_public": "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", "ansible_ssh_host_key_rsa_public_keytype": "ssh-rsa", "ansible_swapfree_mb": 0, "ansible_swaptotal_mb": 0, "ansible_system": "Linux", "ansible_system_capabilities": [ "" ], "ansible_system_capabilities_enforced": "True", "ansible_system_vendor": "OpenStack Foundation", "ansible_uptime_seconds": 1055, "ansible_user_dir": "/home/zuul", "ansible_user_gecos": "", "ansible_user_gid": 1000, "ansible_user_id": "zuul", "ansible_user_shell": "/bin/bash", "ansible_user_uid": 1000, "ansible_userspace_architecture": "x86_64", "ansible_userspace_bits": "64", "ansible_virtualization_role": "guest", "ansible_virtualization_tech_guest": [ "openstack" ], "ansible_virtualization_tech_host": [ "kvm" ], "ansible_virtualization_type": "openstack", "discovered_interpreter_python": "/usr/bin/python3", "gather_subset": [ "all" ], "module_setup": true }home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci-env/0000755000175000017500000000000015133753356023537 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/ci-env/env/0000755000175000017500000000000015133753356024327 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/artifacts/ci-env/env/networking-info.yml0000644000175000017500000000536615133746105030176 0ustar zuulzuulcrc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 home/zuul/zuul-output/logs/ci-framework-data/artifacts/ci-env/networking-info.yml0000644000175000017500000000536615133740623027405 0ustar zuulzuulcrc_ci_bootstrap_networks_out: compute-0: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.100/24 mac: fa:16:3e:58:5f:bb mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.100/24 mac: 52:54:00:11:cf:94 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.100/24 mac: 52:54:00:54:0e:c3 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.100/24 mac: 52:54:00:70:c7:b6 mtu: '1496' parent_iface: eth1 vlan: 22 compute-1: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.101/24 mac: fa:16:3e:30:ed:c6 mtu: '1500' internal-api: iface: eth1.20 ip: 172.17.0.101/24 mac: 52:54:00:a7:97:64 mtu: '1496' parent_iface: eth1 vlan: 20 storage: iface: eth1.21 ip: 172.18.0.101/24 mac: 52:54:00:ae:e2:62 mtu: '1496' parent_iface: eth1 vlan: 21 tenant: iface: eth1.22 ip: 172.19.0.101/24 mac: 52:54:00:d1:14:3d mtu: '1496' parent_iface: eth1 vlan: 22 controller: default: connection: ci-private-network gw: 192.168.122.1 iface: eth1 ip: 192.168.122.11/24 mac: fa:16:3e:e2:e3:b7 mtu: '1500' crc: default: connection: ci-private-network gw: 192.168.122.1 iface: ens7 ip: 192.168.122.10/24 mac: fa:16:3e:b1:56:1a mtu: '1500' internal-api: connection: ci-private-network-20 iface: ens7.20 ip: 172.17.0.5/24 mac: 52:54:00:c5:34:33 mtu: '1496' parent_iface: ens7 vlan: 20 storage: connection: ci-private-network-21 iface: ens7.21 ip: 172.18.0.5/24 mac: 52:54:00:4e:e9:e6 mtu: '1496' parent_iface: ens7 vlan: 21 tenant: connection: ci-private-network-22 iface: ens7.22 ip: 172.19.0.5/24 mac: 52:54:00:84:d4:64 mtu: '1496' parent_iface: ens7 vlan: 22 crc_ci_bootstrap_provider_dns: - 199.204.44.24 - 199.204.47.54 home/zuul/zuul-output/logs/ci-framework-data/tests/0000755000175000017500000000000015133734440021531 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/0000755000175000017500000000000015133740601024417 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/0000755000175000017500000000000015133753435030730 5ustar zuulzuulhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/stestr.conf0000644000175000017500000000022415133740601033110 0ustar zuulzuul[DEFAULT] test_path=/usr/lib/python3.9/site-packages/tempest/test_discover top_dir=/usr/lib/python3.9/site-packages/tempest group_regex=([^\.]*\.)* home/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/stestr.tar.gz0000644000175000017500000105255515133740601033407 0ustar zuulzuul‹ì]YsG’Ö3#æ? ø¢ÝX6X÷A¯vC–èc–´–<»a‚Q]‰º![£ÐßìÆ-6ÀÑ ²ð }UefU~_fU'ÚYî³|xüd‡„‘œ?A˜)Ðüÿùç æ˜RÉç¤8ÏÒâ»ìÔô3Êr3lµžä¾w šXyÝuç÷ôÓžØ? †=³#é  ÆÖØŸLìO“ÎSAå“ÚMw–?Üþøà®{?wù™Îÿ¾ÿ3Oàoz·QþOý?ˆÇùŸ8ÿ÷g:ÿw9×ÊùPÕüÇŒ0Îéþßâü¿OÞéù“AD$'µ°¿4 ÿâ˜ÈÜõýóü¢8‡©*û÷Ñ ?ß«e‚ fVK`t'0¶;½Q/ù8·QÅuæÏ«×±«×}\«¼i·ó5¦‚‰ØÁàC§¼­uC­ Î(¤a(ϰTäŽ!„'DëT*'¹Àž †ºoZ—&¿xvüMëůûÝOß´Þz;zøßôüÛNšô¯ïËq[´m»ƒ¬< â壬83bIýƒqç‹SÛL’+c'}úùprîð¤õûçÃѨãà¯ÃT`aŒ ÁL&L—C¢(ãÞi¹Ð‡G­ÉÍàÍLÿlz¯¦D¦Þ£$M‘H˜!i’:…c¹ýªSÜ[ˆë‹Þœ¾zùã«ïžW®8Ó\GÁ­Ê.¾‡¯ÝNÿä¿CŠ ·ÑÊq]a‡¾[´•ùn8ürÔÚ¦õ6€í™á‡Ã/ïËLUÎÆL;—(–²¾ÑDD޼£Ž8Ä”½sÕH»0j]•ìÀ¨6½Ê¨žRá8U‰Ô %Lb•îdB¹äDl”¸ £f]ﯘµ–ˆ»0k]¥ìÀ¬6½hÖ÷_ž ¿¼ŸÕdÎTW“HÊ’·KmÏÒOg £éz¦+€cy+L·ºoß—¢šø ÌvH|¿¨!üß_{ƒgu\AÁž¥ªfÏ-DöÙóãfÏ7›Z‘sGÎ9wäÜ‘sßÎ tVˆ»àÜ#×ɯgÛQ®éí±í…^5³_°jž-Ù5Ï.DiŒad­£!à$laxJ˜òŠùÄF<æ§.·FjEf,¹uäÖ‘[o:©"«Ž¬:²êȪ#«¾ÿ¬Z"JÜ=«ÎàØ4£úG'¿8+-v=­VL1†vF«×v« ^‘øn±–M'°«…¹ëÜ5z¿–1wùuä×1wYvdÙ‘eG–½?,»ŠÏ(&÷‰ÐÕrW“¤š¿5ü­!þ&ÆÌ"Ò·=¤oµ&R%[»ŸÍùÌ;—Å©âèOã`¶eZ¯^¿iõ 7羸®Ó¿Aðm†`ˆF\üùpz¾pξÛ´þw0ìºÂkGâW&pÐ=XÆ™¼87w´ï&žDþB'-Óõ³Kû£nŽ.Y:¶yH1è-¼¨SÂLÖÉu×$(@ înMµº? e}puÖGSµ ’0—âÎÓ=jEºg"y¤ 1Ýó¸ùBL÷˜Ü–Œ¥ð}w9èLHÖçÙõçà×혳ŤœNʉõ†*”ÅÜl‘*ˆq"žâ‡ÁØòå—¾éŽIÌyã'¿¼î— »‹í²öDMæ]~f©žUBXG È!¶’Äè $¨ŸJ«`â0vEˆñ¬ßF„kýÆJAÞϺM –ÔB\dŒ^¤ +¬Z‹±.¦„¼Ó›Pí¯tPêe…­ûƒf®$æ<ç,õÎ+ £Éi–JÃÔ(lCP¢Km®²/¸*vü‘´q-#/÷^KnS °ñ)K…Qq˱!ªˆ$%jÂÄeßkÂ: æÖ娥N0/ öÙbECš0Z¢˜*´h]à8@-Ù·­uý(ú &D §8¢ˆ2‚EYI(êw xÜìÊ9,´¨gÞ+ݧÎc¬IeÊ,$ø%›¨7«F,<é|³W*.ÒYYʨ劥Æ3ESÖñq¾z{cOäXíœÄ: ¬ á7ÇXÐİZáÊ„–FâN’u[,ž >v£^ïÓÊÝsÉâJ_é>@„¸Ò·o+} ódíBŒ^~"$Dy‘0Îd¢(1‰æ© B¦—Ø]ùÄre§“Á|þt6Ëz•S²h¶8ëCõÛOgÙ¥·01Åaà ic!ëŠÐà2Ú®»ˆ&N8:aj¾ˆveÁ¬ja­ro9Bðå¬Çl¶>Z¦|‹ŽváÑeÍ}L«ü|!~À~~ÎH¼L}JžBXQM6¨ˆ'Ó¨IÅJøDI¡ÜdY­ –×I´eÄSNÜ üA–á!çŸæ#2³ƒ’?þþþË®°iûýË#ëȺbÁèÄK‚“"^N”c8± é”sÌ”S+¶¿pAq÷ xí Ù6æ_ Œu†Æ"0ÞÊ =Û¶Ë›®`÷tòN7ÁÓÓ&‡ÛörƒÉ×ôö—íº°Œàs‡·Χ+ŠZ»@6ßS {šï[à¶ð¨¬ŒÜØ D×1r[‰Žd³ÈÄ-š{¸-Γ5oÊŒ/Ó­U>âú‰4Ê;Ýl¼_¬üó}ë…év[gfs¿Û]œÿÙY€‘]x×ú|4„YœG¾Õé—³™cÂ[™5¸êyMÈÝäš¶DÊøƒT½ 8—êz«Ï‡Ë€y¶)9šÜ>I,¿~uúö‡×ïf¹ÒeÈ1¾¥]¹“c 윟—{4§[‹Ÿ«>ŽúgÅöóù­ƒ,_V;ô|˜u•ï»¯Ž„Á°\Áš>þºÀ†´ ZëfÊî&]¹M`Sßòe&³rÅj&ùe·÷(“sûølÀ£öv_¿úþu„ÝÇ»‡S1œ·Â$à :}Ÿ ÃÝ¡ñ0¼æöJtfGŒ>pt®þ•¹ä«Ð™mŠÎ:¢sDç{„Îo}ñâôôåéˈÏŸ÷Ÿo’ò/Þï˜î•Ü~ÞSIåšÜ>´«÷n醼@ðµ’G^yAä‘D^yÁ=äüÁã³®\ŸŸIñ9âsÄçˆÏŸ#>ßK|¾¾.é†q;jc„°Ækãv¡¶)üzçÛˆ͹v‚Q˜¨"…ˆ—4…½# [L¬Zû”?Ï_ íô]¡ëÁpVZuŠÛ4¸€DÊÊI˜!I‰×ÀÍUª„ñfÎ 6%'_ãúaHÂl⦠³6M”5i¢v¾JkÔaòÏ©Âyw…˜Š6•gFQ~9}ñúçŸO_MHJ³%dÇÊ=®«´ÆëÈÞ¬ýe–pugXõ†vv$åþE±›ªiuõò™ü¢€(Aã¯Îì5DÕšM•¸Q(¢Ðºº[ºÉˆð&E΋¢áŠhu7EÎÇ"mRä\¶5Æ„’[-r¾²›9'/¾«*rÎŽ”Øñ>¸«r5\7IUîB/${Èõ4n—cĺI{È1bݤX7©p„¼à]¸ø¦ë&­ˆ%µzÈ~~^7I€Ï4°Ä£Z{ …¡9—b,Ó@ذ*‹``%!¤¼Oe“ÖBSãe“œÕ”hB@FcF!tI!èI¤W>©¶+ân."&îå»Î5Ë&Õ‹¸xôAUMª«àVMÚ° [TMbmÍ…$7ˆµ¯‚?B’í[ØöuÕ$]·ÍD{ x¾eÜÆãòå=Ĩ;.›Á1¼Ård=—ÛX}-M±X·—‡á]ïñÝUÀ:®¯…VIõ·å¬¬¯U—aÝúZkñµ©¬*Âcˆ,'.ai‰Ñ-`k‘ó˜9¡Q5žÇúZûs®5댈MCÍŠ-ɼa|}=»ÇU_«®æ›ß¼aË ¾ ? ðÈ› ‰¢{×·|¹²YùãÍ…ä1Bn*BŽõµö1BÞ€Gíì>ŠúZvïü= M`xÍí•è,¨¸›Eç[DçÊüõLòˆÎUè,ã{º÷É{ºŸ>7[_ K‘X“Û—GŒÞMnÿöxAu}­™ä‘D^yAä‘D^py§û·±l3|Ö•u±g’G|Žøñ9âsÄçˆÏ÷Ÿ›­¯˜¨äú¸]ÿLïn7œ/–ªM*7òÍT‰BD!nPßG¢°ÅÄjnC»@Ä`’’Äcœ& ´œrå#!u¤bC{]˜z Úë*mWÚ7lÿfÚå‘ÄdŸÑª–šÊ5è¹æ‰ü¢€¨X_kÏ!ªÖlºi}­ˆB …6¯¯ÕȆgy¤ØÝlxf€#?¾;½=\ä²´ñL×6Ƶ{ _÷šØ½ƒ¦j¡ñ]Ôrcà n—õŠÊ÷"fòGïÐëÅ<¾i¸s×Âî¡kÖ;†g=Ÿe漤„Ÿÿþ÷Ã`FÝÜœ‡¿OZðÏ‹rÁG­éi БésçѪ5±í`Ôu­þ o¥¾£¾›>Üù´(µå£K†t¸i Ò¢¦'!JßM R?>¼AR&Û1Íù­!]ÝÏ&ª>gßáª*¤à¹wýÆ…`M—!¥+@)þlWc Ëîa*&–!eHO¨:ÂxǿдÊÇ7\‡´º¾ËL¾êèçuHC Zzo¥LX°®ø9<‘˜g hK7.sÈ•L°ûT‡TÝvR©Y@ WÌE–"I™@ sàäƒ2^Rºb}"Ö!ÝÓš0õë^;4ñ6&èC«CZKÁ»­CºI¶¨CªÚH3ÔLuDÄŽ·‹ï pûª)f•‹è3Ù( o¹­EǸÏëADn±é½Y1…H —{ýÖÚ¦ ‘b&Qk6=«#FîÝš©DÊ+1£ë!o`^W‰´Ǻ•Ho!üÚ)´V¥‰iš0T¢ö åÁ'6]ñ†W¬Dº§Qç5Áf±i°Yñò–jS…ç±éFsq7¯nmØò¨D ÃO3E3A0Ç{×7}¹ºY¹!¯ý!S‰Û‘c)Ò}Œ‘7 R{‡»¢iÄÝ;eZm÷Ê´ZóÊ4CG\ï¸é=€çªZ¤ º@qGì*xf(Ö4‰ð¼ÏðüHjšD€~à]¥nP‹”iÁV§÷‹võŽkšÜ=1Ðl­è‘Db‰A$‘Dbp‰¢ 1­J¬—¢Ç׆"@ÿ?{çÖÛ¸‘ìñwù‚’‡#jú~ñb°˜Ìd“öL‚dæ Á@h’M['¶dˆ’'ƒ`¾û)R´DI”LY´lJµ@#Y¼Tß~ÿê®êF@# Ðè— è‡)µón¤T+íVÏÝògÊ%{‚íHë*R•w–—…A¥ÐRÀ0õ6*…=:VsaíqÂdÆ" Â³@hÉçT) •RÂU„µ×åÔ‘†µ×-´§ kßñù k´Khû¶·Ø¹œ²éf]qžÀ1çF–Q¸iËU«7=v?RÄЩah÷ýHwñ 7…=àNͳQí—7Þþt8®QµkE)× ecjÖˆ^Íú#´ŽÑmöyì¡£ü‹;w=]ÊÒøúiÒa(ÑaCž K‰PÂÂpýrA·MŽÒ.3O¼ïKñúlÕÖ‡‹8R:îéõí :ÜúAw: +e!è¶€n¾¤˜÷µlCãógçž%æ$¸GYÕ>ô‹@î!÷{È=äÞ)pu…iažécü=S‰`ÑßÛÈ=†ÜCî!÷{GÆ=Þ%mL£|Œ¿G*wYÈ £[6r#÷{È=äÞÑqOó'>÷¥poàžæ¸A>r¹‡ÜCî ÷D—svÜ#¶r}o^Ƚ*î är¹‡Ü;:îYÑÂmÞãïÑÊõ½y ÷{È=ärï¸'»’žF<'Ñ•óœó@îUqO"÷{È=äÞ‘qOu©8xNÊ*³Ûç€Ü«âžBî!÷{Ƚ£ãžV'ÏI+ǘr¹‡ÜCî!÷N{ºËÍiĵP*«¸7/ä^÷ôŽÜÓ¹‡Ü;î-hä{iäSµÈ×ä1ªG­´To9ÆAw%9‘ˆVQ3/$.‰‹ÄEâ#qÉ7gŸÎ&î½àóhügögÙ©N5&HÞãD1K~/®X\Eg¦ô N@IM/üüR(ÎAÏÅ7Åç2ôz/»}þÏ , 9ûÝõ`ùÇéé ¼£ zÆïgé°’¦Éôú°¯Öù£s3½ž 2õqVÆßEgâÿš¼‚߆ÿˆ®ÜFÓ×ÓIbÎn¿L®FÃëÑ%¼ÔåÅwß)Á¾Y‡²ä]A÷Ù·uÝ”‹jSš"ùîU»°ææPÔ4†Ü1Kχj¹Æhî¼'“8 Y$1ÂÇ, \"d ™^Ç´òë‚‚h'2ògŠ‚‡À4xK’ %"nžIPâ º…öT’bÇç×9ïiGº Ê4Õ‡¦ûçÁä þƒèV¶Ó B{Ü&ÈØ¾öbMýÍ¿þõ}5Ú%ß'¤k+Ú–4 öÊmf3cn·‡`G°#ØìOöǹ&Êûnìûð%°ŸÀ’^ù¸êd/Ï6ÏŸÃ먽2RwÁíüòóoåY~$÷6U‰cÞ@ïïûáÁ¨khh‹³Þ­7ʇ.ˆWHlXnIà"*”¥6(¦Ñ(¯Ê\¹édÔŸŒ——~ ß%î:õYóç²?žû™c¼¸týL1xóñdåW~¯|“ŒÆ‘/ÝþÕ†¬ùQÅ iàdNà©f‡Òû¸¹õë:Oέ Z[Øz¤Úá°^°Ú:/xåÔ:Жâ©´'Úùz}ì£A60@ †~¶nÿDüÝkµ~y%e×Ð6L;ïÆc[µYÆÂVäqwÜ,Ëßñù >W]ª÷Ù—óy’—ˆ¥Õ¼)ŒAÞ4ÀJÆ>·8˜½„ÙKÍe/eo†ZµÆþZã ‰n ¬$[]sv0éÓH¢±U'j,ì8RÕs$‰n[ÕWSSÐÀTOB§ƒÐsèÇÌùÀZ̓(ôÂ{èÍ1c˜èvJ‰nuZDk ªÇ¸Ö†c¢ÛN}ñiVv|ò$ºAóƒÖÂD‰nªËe{ïëÔõ¶z.1°¾©Ltkã„ÉÊ©u =‰D7í³/Ý«ý–î·m$/MW¨'Û:õÙxlm3[q_Õ<6L‡’j=ø¼.˜Ž4ø¼n¡=UðùŽÏ\ð¹éjÙOu%ÑÍèjÞÆ oà UÓjà`¢&ºa¢[šÊ‘%ºÕl*(KQ–> K“iŒtë,Žá‡šÅi&'Ò­v©@>’œÈ­B½©ÕŠFÊÐkg£@„Æ@?V<ð*¤VÍ‹ù&̉<•œÈ:-¢å'Ó3T0†9‘»õŧY|ÚñÉG™5?à=k"'Òt­hÃêNýºÎÞ°˜cæD6ç9‘í›[ÛA9µ´'‘‰ }ö(³_”‡ÙåA/í®ŽÇĈ5—mE¯ñЇ`Ü%ò¸Í<>‘¸K$òѹñ¸KÖ£Ö0n6ÍØçÏ¥ôè<óªYý²­¨ª”E%€J•*TÏ«¨¥GGdÍ6Ùâ~EHd$2‰ŒD~áDn8'R3køVßœµB lHݪ+ *Ž%(Ò i€9‘m”{t¬æRZ¬w>²‰e@e b£ƒP[ÐÈ%œqNÅëÁçuÁt¤Áçu í©‚Ïw|þ#‚Ïó!š·îpÚüޝù†CËF!wà5ã·Ú ž¢Ç`Ž$æHbŽdš æHbŽä‰æHÓSÎ?ÓÑxÒÿÓy=ˆ¿ÍÿƯ]}[ñÛìUüøu-#@@“oÎ>MÜ%è¬àó(»4 gÙ¬×E§B†ö¸‘Rëß‹+ÀÛÂÇ™UýBšÂO/ÃÜ”,ô\|S|.gwöªe÷ìw)|_þñé ÈÉO[^QH£)¼b:{Ó4™^ôÍ:tn¦×“A6ÅvVÖÛ ´‚WðÓÁðÑ•ƒz{=$æìöËäj4¼]Â;]^|÷Ý™zk¾©ôÄ“âµjI“¾M-Fo[‹+LFǧÇGq~O›ýžZ½©Ò)B] 5±²žµùЊÙ=ñrG…!¤e\>£ÂèÇ~â× É¥!êðBcù›Ðšèj½øz£0¨QÙ1»ey¢Î@• Y-D ºQˆ4%D$ ‘v ‘Çõ/œ¯E±ò‚ÅʧÝåŠäŠIúœr¥X“„æò°dQÒ()ŸA²¬½d#Ó$ïxµlQ™&)õ3&”mX*V8c‚3&(TpÆEHEÈŽDöË› ·ƒ~Ï)æ)"ŸÇ£èïù?g }â`|(g½+¾ÊqŠ%RZgâPF±°‚XãÄpÕÚ)]¾:²Îó¬žÙ ôý_·è?K!#…/ûÃåÈý®¾¼ÿ0zKäŸ?¿NÓwÉeþêKW/AÅ#+Éÿ÷{¾»mšN7hõ··ãQÖÈ÷("!T¢˜#^$”…"ñ‰Rʹ<’$\/–üÚ´?Ü}öÌxtí u1»µ‰ˆŒ¦4vT@× ©Š@ÙØÊÛZWÞúþbOÂ(¢Î†H$J|Ȩ” zGÜr_¾xœ'KWKa H]Â@Y[oœÐÐCu¢¤P¤|õ¿ ³«³Š‚fîÅ´Õ0¾ †“¨ûß_‚ìˆòçfòP²È;á¸2•>¡‘aÚ$ði¾cqâòl£Ù‡¡»ž©’ËLÊÌî4ûðó0¿ùt|]VG³§E÷÷è-º]z]XfÙâ¶Ë÷Ì‹g“QÌ”H@Ky¨+ÍœM`<£ŽëÈ@Çb͈Y¯ßÇ„dž|š¿6sTó¼ŸH@ë%ÖE ¥4u¬¬U³²¸Ïܸ˥fS”Á,ø«º®‡£;·(${)Eèco4´¦ØŠP h¦ÎÐ(IŒj¦¦³gnª_ªÄ«;Ö£µ*yùí­–QÈ’(ŠP9㉌$uÌdþ¢&MTqþî5€°Í‚EíJ‡±^9êÁ¥†'a`Œ˜‘àª\» qn§“¥úÍÍßZ»~:†¥ fàÂÅFN¸àIâ  "hI$QÜ+7TÁ³ÇnìÃʪzÕ»öú<öÔ%àCêPD!1D —„ôÜ;KM#5\¼|½WCdY*BÁ#ð.Bç…á¡™+^®ß¡Ÿd®ÐRýöo«âôó ™œ—Æ K£“ˆð·–&Ú;Xž'± ›(¡ü‘õé7?üÔ¯CàÛŠÖ·3D”Ž\,¥³*ÒŠ6Ôg–nª ùío㢱ØÐØ„ÅaЊÅ&1ܬ§ZB] F3éút¼4"ÌJi[{W2ò7 yeIc©E¤1F@“¡Lî Ð2±u¾™²œ?xËÐoj5… ”Ž“†4C3~9逕D€¶r‚3i’&šý€&†† o5¼ V °KB*aÐW†h˨“Q¹¶— ^/…mÕºqŽYi 9 —àdià‹p6%¬§ŒJ®˜m¢¨îŸºGI•+|݈„º`2ÁÃÄú0b’Y¼J 0›i²s36ŒÓ:”YÖ¿BÒ$ÆÇ¡W¨p@OeËU Ngpã†.Û- TÙóØV×Ñ`^Â/Õ5Œ!µ P“ˆtM¬±ùÈ*‰Ó&êzöÔZNr­Ê^·ÂîxFŒq§¸Õš É …16–Ì5SÙ…›'µÍ‚Rmƒû-ivÈ ôgê•5´zBk¯¬Ï³r]ÞËbЏÚ0 ‡YÍÍäq…«a«¯rîì~h˜×zçg7ì@íÏ*Òh<¸ýòþ¯ƒ´U´¸ª˜Lê|¾DW7¸I;“QgpßßùÎíÕ— >Ûd$MÇ‘O;ÓâÎäj<š^^uBÍfÜùŸÿîÌÙÛËž~ßëÊSCwô¼X§šfߟ¿ýøë¯?¼Ï÷õ¹qÝwÔ\}õò¹‡›Ápù[Òä‚ÖÚúÔ§|Ä*f*JnÏûï¾î$RÄhÝi¥h^zRLX.žvé©ú¥šX}’òMõâ˜Õ(æVLx2Òï¤CÒ!étí"bŠJr Òeѧýysz˜všJ¦÷IzÝëÅš Þ÷ÆVœÓF‰WaÆžá›ùæîºš{ÅÛ#÷àµ7Œk•ïh%—˨¸ññÀå¶ã}èÒÙÿJÉ•çõʻƥ٥âÝzwô¿ò‹¾Îv -,ÜØ&«‹;®s¦T«o¿8Ûrµ)ƒžÆŽ-¯#„ëߌâüoûš°¸YÓfTßy¥&òNÕ\¸lóu±~Û* ʉXÍEý>‰-ë÷^6¸?†_÷g;ý6aÓÊ›6kËíW,`¢fL*nÕ¸-÷]6⳯à‹&Œ¸¿UÓFTÝwÙˆ'sTV_n¢´„ºÑF&ç¯á«ñýÓ²o^e2%½õQpG{W“›ëÒÍgoèãðK¨¹NϺ{œê ÆM3RÆ‹Üÿx›ÇÕÌÃãßåóoò¿å?›ÝÏ~ÝÏ”Ê`8Mò“¨êñlýhŸ¸&Þ¯‘”}kd•¿¤º<™ÇûK̺ØfVÓAë¢:nÚñ­«—´1ájâ@ó˜ÂGq`\ÈC¢ÄFŠiF­ŸhÐ:ýp9¼MùÇ~üìÂï¯?°»É›ZAëj‡ u…Aë´ŽAë´ŽAëåÚÅ u ZÇ u ZÇ u Z_þƒÖ1h=W´Þš uÕµæYæêöØ©*;ú2}•o(“o–i7ÌÔ™0S÷RÃvœí `ÔCË¢Êýdë ¹uœ]ÛÊ)¤@ÿÅOïò.™=6ûë|óªlhUq^ì÷ÔÔšÕÌȺ&4¸,÷¨/¯ÛmÞ·I]Hr!Jg·®íÑÔ­ØË©ò0:Ý%Ï3¯¬ÆìÚ’ŸJW9ÌgÖói¨ =¢ çqdD' ´4Ê“ÀxÃE&”‰±Þ;|-…¥d…,k@Ñp#jsé—÷Û†ƒû-ÞÎ+NIþºšô645s¬x)ªÉ8+œT. ,kE–9ÐÜwk¤$I²ii<ÁïL|p}lŸêßÊÅ:M£ÌŃôÐg9(¾Ñcáwì|OÕ¸ã+¬w-Ž…ßº c6®õˆl§Ù·@JÕ2·­/·ùƒ¹eG ô=ý¶­p\g#ˆ¨¶¹må~Rë°‚êC¨³Ž¤ìHÓÉà:ŒåÿüÔy뮯;}7†àúº¼×xÚO a¤W>îŒýd:†^<O}g0œõf­i'õP qu¿f’¶Ò ™yb“Q숫¿W²ú»J£âòbRùíÏï?üûýÇŸ?þ6Ÿ*½›ùšÍˆxëÆÐÿàûtAÄyäÊJíž¿p'#}夡†  t&ÎÎÛõuÆÄ‘xg"êãêq[+…w+}‹í.Eq¾­Í?Ч滨ÿòÃûwÿ~ÿã³z Kùï¯Mûõú×S¸;?yÙk¨ø–< 7Œú“ñàò2ļûËNðí§Ã~[¾(æõýàáÝÇ“•_ùa¼òM2çËT÷·Øa‚F›ñ_ø œmò_êWý¶ùJ~ÔŠá°î–1Ù:ÿfq„,E–%K›€¨íнÎFmD«c;æ†#D« j¢Q„(B!ú D)íJe¢”ó ˆf†k ÜQºã!Q„(B!zšå]M[޲DE%Dç†#D« Ê¢Q„(B!ú0De×}Ô­Þ¡xa8B´ ¢;îPlCˆ"DŸ¢?¿ÿñg„èqCt tv6/SõüÞ²ØGƒ¬Ã³mcrþ"`»~9•Åål4í¥9ÈàXŽŽ6=)¥!bsttö\sÜ4Ñf“áÈ~d?²ÙìGö?#ûU— yÔ f²ÒÿžŽ F#ƒ‘ÁÈ`dðs1˜íu¸ì þå͇·?ÆÞ@avÔçÓ˜0ºÍšÄØç[†ÎÒ}'WÙW¯fãÚÿ³wn½mK7p¾¡¿°é¾_¼8Xxeí&€#q’ÎI ÌÕ"VQŠOœï¾5CФÌjFìq†•‡À¢LÏÔLwýþÕÝUŸÀ´¹_ø½wç§g>œ½‡9µ¼Ö¹³‚!¼Þ-Ã{=¶߈ï~á[O8cBÛ'(šÍ*îð8X0s‰0F#ŒÆc?ŒkQ8ä^v>.¸Ý±—­ÇbàU•ô_ŽôGú#ý‘þH¤7ôoÒ+»hAm¨râ…zeg€«y¢M¶´ù´Û6Ù›·¢Cö ýÎÓ!»P ®›£¥E{©£Bïp_õÓÒ \í¥w”Ð()¾|^‘ðà±Wo}ô¿‹poáLØøít>‚W´þÖ²§óèëå4¹EÓ/æÌFÓ/ðùÙèæòÏ9<ø"šÏîÁ±ÏG÷óès6º»¼Ý¾Å ›Ûѯ?ŒV-ð&åÖbø=êÐü{P÷óRvüòÓOgç?‚½X~¥ø ŒÒòÓéõãOKJ„R[¨ÿ½Äí²aðÆ…ûsÿ!°ì¨Lþþ~v»±™¦~¯+kÔõF¯‹Í†‰ll†Í–ŽPuÔØlíÜÃö4cÜ[T¢0ì8zš%Î$&ŽR’(ΈÔ1…ñÖ'Jaç„tLâÔÆ™0âaq¦‰'h©§Ùn*ïiž=Í“8#ÆP°–RGœÎ"ž³(fy&„‡ØÓ¬¯}jö4«346‘ØÉ TO³ºO¸Åžf oáù=͘žÀD‘’‡¨¡ÇZu³o$XÛjgVqªwiÔ@YÞñ™ˆ§¾Ekû™ýµŽ°¦×iñìf·ó´F<µ$s$1–™sC\l¡©T&JX¯w›î+~‹’“<§6ç2!e‚È$‰‰M¢¾íR?š$²'جéôùjµL{°gµùÓÙéÇ~8;¿Ø‹ †§‡û¦îC ɦ=®ÿLÛñ6¾«érÃ5¾ƒÿÔÎã0FtSÖ)`˜º“hK{J´ÊžwuUÕãsg¿.×É7ö²}»þÞfwåݧÏ]çüP9Í(Oˆu4!RHG¬àU<šÆÚQíºQxȧŸñæî0³ÎˆØ>¿³îÕSè¸J8Ö}†áÏì4¼rå™­%´ú'vº-àq¬á &Ž5®Oqlýw^nJV}]Ú2™‰ÌDf3ÍXH6\fz×f ›92³Š™™‰ÌDf"3‘™~fº±4]×s莙Þjk›‘™>f:d&2™‰ÌDfz™)ØXymÖWom32ÓÃLÁ™ÈLd&2™ég¦6ܵYÊ}Ì\ÙŒÌô1Ï!3‘™ÈLdf3ÕžÒ`™é3 ›1άd&žBf"3‘™ÈÌ fš±“ƒ]›¥Îwnvm32ÓÇL<„ÌDf"3‘™~fJ:¦¬ëb¹ÖÎsf®mFfú˜‰g€™ÈLd&2³‚™|Ìø`ãLF}çf×6#3=Ì”™‰ÌDf"3‘™~fÊ1§ƒÝϤFû˜)±¦Á.fJd&2™‰ÌDfú™©Çb¸k³Œz×fW6#3}Ìľ&ÈLd&2™YÁL üxv/RNwÓèjÕt´¼ó¢ë¨€¯ü¯ºí(\YR>TZSë«t»¶ií£5vTAZ#­‘ÖHëJZK;Ø DþvÞk›‘™ÈLd&2™‰ÌlÄLe»¯¦ð㻟O¿ë&ÏÅ».¼²z Ô„Ù<»)FÍmvs%¥ÿ(\xñÑ›…G‚O`Àß—ÞäôÝùéÙ‡gïa6t[ã¶ÛV`»ш[Ämç¸Ýþº´¥ 3fù¯TÀXK5ØVûÊΗ6룸ãÖpd*2™ŠL=¦>Ó§ÁRsïöîö¾Üº-0&µÙ½skø`ëR£ªlÆ[„8B!ŽGˆ?âôo¯~u}§J¾Înÿž;}UÜÜÛ‘‡9Ã…¢âËo¬¿/~\¼¸‹%‡.n®î?O¯Ë·5‡—7Dé—åÏ œNvÀw² _ð3óËÙÝ?ç_¿WÝ¥w©”`ò¯æ÷0Ãæóüþªë›ýsôåþênZˆšW›ˆ};ºƒ¡óææ*š^ÿGrÝ‚Çþûý]n_Ýüyw9»¾š}†ÛúüöõëWâÝ;ö7/ùmG™XK›öÕ;…ûš¿)ýV©g|u°ÖV¡ž  g¤¶¨gú¦g6æÉN½RW6l)†t:dzR'ïË)Y\¶øm–çðø“?/æ7Y2Í—¯â„¡ÔÂÂȺ& Ϻðc­PeýVÑ5W}[Á>TWÑÖÚÎÝ;ýøñÓ>ñl Ö+øÇçåico Š•iõñ­¦œ‘T§:§D±†Yg$f#q¦2®-YîêmžÜNo–ídù4HñpÉãÇJ˜bšs¡éCDÐÄ<>•ûï¶°&À[¬7ÔÚ4¾$<Í#"yBIìbJ˜IU*¹K³~j¥‘‡íó…ïׯ'ë M&v1A_$ÎÕ7œ{m„÷Ï¿…Çì~Õ?_C kqš…9îåL7Ŧ…kQ9Ç!@Ž®w²|iÖ@YÞm¼¦Œ@>õ-^Ûœ(^8mþ……K^ÅXÓë´xv³r9¶ôIkXÀSK2Gc)‘97ÄÛ#4u‚ÊD ëâõ²ó÷"e…‡HâȦÂÿŒ¸ÈZB3+ó,² ËRLNòœÚœË„d” a›D1|Û¥~4IdO<¸YóéóÕ,n=˜ö`Ïjýû§³Ó?üpvþ~± P÷M݇’N{\ÿ1š¶9òûn’ lãÝ„ žmÌ¥ÎeŽÐ<å`mfˆÓ <_–IÊi[Î1ÛxXǾkf×›xìb‚*Û¸în1Û¸á-Ënog·_²ù<ú\ŽÃ¿~ûí$î¯î’YšÁŸßŽà§å¤…?ŒG¿ÂÁ¿þð¾_¸ð…7÷w£|v;ʧÙUú&ºƒ¿ßße£r OF¿}çà+¯—ãý·×ð¸×׳;ðwàX£t4ƒÇ·øþäá’i›ù¬¼`9柱åk…¦T¾ä–ïõ¬Þn¯œ(£Œ0/°ÛûÍ-) ýþìÌ¿Ñë¨éމ–.#­}m&KÛ†\b÷x‡ÜãÅ=Þð{¼|Ly‡§y9ùÐÛ»ÞÓ<…C>ͳÞÞuÒP£8w™'‚8š¶J™¢±‹LãZµ\gÄ1ïïÆ,N9rÜÛ=DNáÞî@7ìpo÷vqo·)žCíí‚d¢BïØÛåcY}]âX¨ _òµ]UA•Ûºuy˜2äûnáîTc¡²–6€Ù˜P;¼cÁb;œ’V;p¶‘_ýYŠâ¯Ÿ‹»×&ꌈ¦kij¸­ÑX­¼Ñ\l'm½á•û_­¼~–jfÉDôrɤþ»¯>-_ØŽ+*¡VT¬Ä…ÿþ-¨4PR½ïQT9Gð¾t½Å÷ª³úº—Ïr,y‡9k/Ägëë)²¶ùìã³lÊg¬Ï†|>$>IE7$ôq:put+äÎì-¸®ë0{ë…”ñFî+ÛQ 2@e€Ê•*ƒTʨÁÚßÅde; „FB#¡‘Ð/LèF©ùEº»Eqó—KÍÿz;»þ|ñø@ØÓiúF îè ¤éï¸Ý µÙ¥¾”}9ÖVt'³|Vv“RŠ«¡4ƒQƒ¢ªw¢ 3@åX?f€`Èqf€Ô*Tf2Écî^ºåà(Hd¸e‘g Ͷ‡J]á?Ô¡Ró¡µ6Tš]ÿyÉBõ”\¸d!c¨Ý¹•hT‡õP*t°z‡‰–6TùHÊ‹ “Ïä6Jƒ*gݱnoÆÅºþµ€·ÔØÊZÔ¨P  @-€ZീÝí¥wÈdï‘Ô•µÈdd22™ŒLF&.“CÆçaœïjÎ ×u½(Ðt÷ÜÛ¬Ã`³Ô¨P  @-pÀZ@¹îöÏ%ÀðÃÙÏg`Ùyµ­ F,7ÆòAÓ÷ÀÉ*ˆ¬~G UW uAgâ¼bóli-zâœ)Lï Vå!¹`-K/1ª5›“ÙýU:ºžÝâl”Ïî¯Ó'ŠF>wÞ7_úÐŒ‰ÝK†w•8Ð¥w5ki-zWô®è]ê]•ä-ŠÞZ&xw%yaq’¼ü-Õ§¸a¶õ’¼ž› Q’W[{ê+É ŽØê¶°³iKà’¼Ê[’we b%V°$oWÔ±$/–ä-¡5­­Õl¹õÐ%y¥ß·/M¨o_—äUEu΄I¢EF‰ŒbNœK‘©`*cà‚˜lXðSk9·ÜREÞ8 ^‘W¦1‹¸D¨Ø)"N,H^ªÓsðôÎÏA­4r°—ÕMjVä­346YØÅTAÞº¸Å‚¼ oa‚¼fb•q†…('bÆÎ¶¶*2<û¶Q/«Xö[š3P†wŸñåž!‚©Oä=˜Ò™X òÖ*X òÖ*Ã*È[s¨$ «c„DiË Ý%±&<§9Ä/Fhö†Ê·ÑȰBÝGÒ^š]ÿy•™ëIú`›™²;;6Û1uª? Ÿe¬DõNK+UVf®©?>€úñüçïÏùøË§oŠ3Ÿ¾ˆÂ[,Ïl»(ÏLµƒ ÈQð‚""2šÄŠ‚S´ÒјC9¯Hax>¤Ÿ ˜Ot«1"š®[z²^ì„ÂÒâ©I7?ª Íu~ø´—†W®L{YyÆÔh.Æ ãÌ„XTµc¦ú±¨Zÿ}/Ž˜úuÄÒÚêˆ=×\w¢Û×é÷û·äÚ@@!o‘·È[µ3_sÖ]0ÞhÕöææÒZ<|êmñx´Z-‚A´|,¸hõ‚ve-‚ÖZŽ EÐ"h´Úà •cÕ^ãß­ØN§\Z‹ *A+´Z-‚A´z¬Û+‡ó‚ åÛ•€7­EÐú@«‚Vc%`íö(Zé9hÁЕ®KŒ_¼:p ûõ„ÊêÀµÉÕ°\ž(Á¹VUç¼×uvxú€šíb¤KkêÔ¨P >@}Ð#}`Œ"§ŸÓKk‘ÓÈiä4r9œî §íÓMožÑñ"Z¶3Ž·¦Ë#â?¾ûùô»N‚Û®b¹iï@8 ÙM1þn³›«(ɉ×w—ÅGoN>9z¿p²ïÎOÏ>|8{¸Caa°°1 ‹ë©€Ò¥E¿¤…žX­¸q»†k¯}ØK®xϨÖâѹpÀfl6Àì§Hý4»š¯-$]­ÔoÅß29aNòÀÍ¡>]ξ~˜Îï6º/]MþÆü‰ŽPpKÜ‚AA:BÕº“0m øV¨Â–1·û¬Â<ºÿ·ßÞAV®©øNG¬ïµ–Gk±†i ZSÔZýÔZþrâå¯z`%©Œ¦.â 5‰ÄÓ„ØH1"²Ì$BEÒˆGÍŸ„0V*“ŒQR6ÉH$aÚÐ¥‰4 ²¶(Ä…R[¹-©>žŸ}úîãÏôÔ§_NOÏÎÞ¿°ž ­žj>éÔS³+Wª§­–?õµ“OÛ”ed²@k…íýðPJýf~žþ‘]_<®Uú´6šÍÛ×5ï4ˆvøoí×`kkÚá)ûÂh‹ÿ,<Çß븙RÇúvvÖÏUªcV!õ'êÔ+CÔ+B ÎL'zåëôîþôåÉÖœMœ¤ÆÉ65ÉÖÝ„ÐV¾Ûn]]Wîut¤Jx¬ÞÍ—üYÚuC e°Ö}ÿ„C+=Ñ\ž1§¤%޲ˆH“(s“’(a‚æ2bÆåkÔ7ÕmZS÷¡µÕ´¦áõŸÑ´¦¶Ë ×´FP¶#™n¼Vû$ Ò­†ºín5›& bÕÝjÀCdÒ:ÂT³^¬ËIó,æ¹H’ÍÆ‹žxb[º¶Õ¨æ)˜†ÚñÏ"k2gĸ À—R—Í"¥òÈÚ¨²Q Ń™ClTSgDˆßåDIÆ­¿E飺O>|<ßðÊ-Æó>Z?m4Pÿxªå>õ :në¿æ]‹æZbÂd¨Ø×Jƒøì]ìÛ@4õޱG‘-‰Œ}ÙãŨÜë8äêë^ë±Ù«]Ü¡¡Ø_Um&¢Ø‡â¦ k Š ұ]0Fï c:7O˜•¢­ê%z=¶ºƒ%úE€Øi&Š(P @p€"À™6Žœ·wò‹?m—v mЖ1Ž»ÇýÃ-ý£_­ý*î¬ÆPáTç4¿œ¤àŸØŽ8Ç®kËdEÉöP©Ëù•º­­¡ÒðúÏ;%XÏÁN R«¨Ù±aÆÔêžœdÌ»¼P˜0ä=†œÜ)¼‚Õ’¹É&ˆ`:'2£ŽØœQ’ç2͘¡FºO Ó)Á:#"ÀЉ™Paœ3xJ°Ñ\l)ë¯Ù•pJ†Ÿ”ЧÍÑa/„ÔÍe¹hæ— K3*ö\'1xJðñÙN1Å:¢©wŒ=ŠS‚ÈØß“0ûíI˜]{nÌÅ>ŽÅÚ›çfJDq%Š@÷ÅGr@a€ÿÑö. Òä}ô¢aØãûÁÆzíÙ}{ 䩦-‘IuOc0ÿ}#«xJUTQLR"•ýЩ:2"3ãû"22Q9W¨ÂiX2Â9tü絉Š´ò-V¥'%<Ó¡ÒWi‡*;¾ÿy ¥‰É=7ÉWvRSºmO«¾àú”ó$”ÒÖ4KΔŸIBéVŽž+ðÆ|€TŒ2_)èES'gÔuEàJBéY&”ö‚kúôFqÏc#ÞDBi_Íç­íøæ3H(…á—8Ý%”Ö™Pª/„:‰„Ò>Ý\'”¶îCYŠy¦´áØ X%¡ôô"j;¦“ÃØ7‘PZ0öÅ—¯ô~ËWzËòÁR²s‚bݶ·£óœ=øý ˜à’KR ø”¡øä’0>{0~¥vO(•š Ò¢‡÷ª×žÃ² ºKÌ’PZH@!…PHÀk%šBpü·õ³>Ð:þÝväðJ’‚·ð–`Ä àž&à.æJ{Ri}Iƒ»føÀO¨“Â×ÜÛ3zjúÛ3v{óÑtþjáJyñcÃRL|Û8,ØŽfËvµãðÇù…{jö·Ó1x"ÿ_> ý¯ëßýpòÁLݯçäà×Iš0ùÐKà: _}õãW3s d³úŽG7ãkhÂõûßüæ+©Ô¯Zrpæª<«æçڋ߃mÔ¡Ó¶ è•„Å•+¡Ó·ìÉõšGÛ÷â×îåöâgï¥C§x¿Ð)Y…Nwâ?5ÛJÿ,®0€{P!)(çBÛ”…iÚÁŠdæ_­’™ qÖAd)ŸÐIH!H… ‚TR!H¯” ñKI1%:AZn&®YIáß/¾©¯ŠÃè´_Ù/WËÙõmâ—ŠHåž´)_Ks)ñ;ÞF¦øȺ™Úë}O±²0«å£§¿MþÐÇ^Ö‰ü¼g-õPxVÏâ»ñ,.QáY'ɳž3«º³VOÛLCˆF:„©0AºbÖ‡JKn*"¼ãNÇhß bÒIî­¼A@<ðÊàH+(5ÈC¸;0ÊP©&+§Z©öë¾ÚÌM®žß„M–µâTuå™é…"Š üòôbcÀÑÞ¬°Nm]Hî“ðÚ…ë¹kúnbºn«Ò·’åL1ýç¥%G‹«˜Ð±bÆ“ÊFM*ç4YÒÆ(ú0u“á]j[ºm®*)·ÚTk…Á"-5U kº‹õ]˜Ë¶eÛ= Ã//¼fÿˆU>ÆV¯Ö-¸²Ü±J[K÷~ v$x)ixšŸ @Ëóz u®s”zú»”vœ|æ?;6¡‹ÿ<„ ÆÅ.Õºjðìa‘9¡à®ÚNŠ\ÉrönhÐчXÅT†æ'­,“®RÛ€¢ŒÆ›] ÓŒ)Å´~»ކ 1¢â**VðÊR˜ÑžsÇ56ærð7 á}†Æ:„e†ž„÷Õð!|Ç&ìá˜IÍs”ÑØ#Ÿ„cÔá…IÞ„;͹"ÂU‘'ºHS,LC•Ôñ)ªÙÕ@¤3¥ˆÒú {áÚYï±f5¦pD¢ÒFq˜ÑÞÓ AëN“Þgh¬CøQfèYAx_ ÂwlÂ^N¸FZäpÚÀÞa!'­¶–Nq‘-[z[Ju¦\d•¼uûe`fƒôi`TrZQÁ[¥+€[ZAãá•ä» Ö3ŽðÛÍã²Ql Ju@cÅ4O…ßLÄÖ§ 17´ƒÃ U8Ü9çqõëôìØ“õ¬ÖÊú*û€$lÇ&ì•Ò%#j—Ò»[Rº$Ê\ód;Ä£Á_÷ý7Ê”è£óm±æ²Ÿ)€I–ŒiD_¯› ã»ziÝûôᓹ¹o&õÚE¿üxÄx†(gÅž|<£z]€ù`RTj¯µ!üRü3Eø'cðM·7ÜÎy¹S?ôâ8¯ çf±@ßICß¾Qv­LmQv€}lo6c ½'"ݺ&„?gwÏ@»ÜéXI²*HW® ÝÉÄ×å%H¯ÃO×#ÀÎ1–âà‡†ôid–#D´ú¶-Â./°È¼}o«Hû’’dE¦_7 y–y:¾úÚ,×kü­EM—2ê‘zhM õ85êÑ=m¶œ!x¤Î¡J¤*æ¼­,—æ78¸ˆñë£í5Î §0ûW{×þ^_7øæáu!Fè&÷åjzÜ0λ¬üeYÐñíÝ=”Ѹ ¼ê~4k Nÿ1 f㙹X»µð®q„‘±7ÁæOÔO¸L7߆k8½Þšô”ŸÿùÏwi Á÷øoÝq&ðÛEú8Ôõ_Ñ/ #X4p:˜)àhÿö®ZºÑBc`Ã`ñÀC5x˜†ÏÈ…«Ûáõ¤Ö{ßÖþß_«{æ­½ “8žÜæmî)`3#úðŒÄïY/Þ¤{Ý O¼çè=S+†÷(V߯ú:¢„e\&f0w†)WÅL‡®Þ'ך'eÏ~6>€9*Iî'GΖ'â Iãi¥¬tŒUÊiS9Î `·³×i@ýÄ6Üÿ}=1Ç1‚ƒG4!—m_®oÓ3øç¿}ÓÊoDYúâÅF”¥‹Ž# WÌ`ÆÔDë]Ê×¹›€H“Ù°.}ûó»% J$ã8k¾~ÀþÒLÎMæb‡£ *0› tÙ/ƒ°†E`gðùãð>3qAk` ƒ»qÜC mÎŒ|j0ð³Á÷ãAЮP×A¼€gƒá,½ þžíC4à#ÿg/MòÔº¦U }©ÿZÓˆ$˜ ǾM š6oà 1‘É'hÉpï úiÝÄë0Kz¯¯k­”ägg ñë)—õT\˵¬;d£æÁÜÜ„ÏÉQ:Ô¯ç¾b̃ADƒe@AbËÀÄÍ4z*­³õUé=lÓæÃjú°õ)½\Ü͇.9ÆÖ÷òÂ÷ÊSÝ1d&›“è 58¥ˆÙ³˜áøÃNº•C´ÌÕƒ†›Õ¼ì{TórX,Ü#÷Ø/H^2Ì$!ÛS^9>Ò&,‹HÏ$$Hvä¼Î¥?SBrÜ…&IhAÍ‚š5 jž2j>3}V]J¥?Péoj¡ÿPËÓ’¥ÚèdÇ“ºô%eBª¼)´{44K­"ßµ¥Ñê Œô<§S¬÷Ýbµ­ü;|™ÎÀÖ÷™Ç&Ñìã׳„óiá„âÖƒ„A4ü NbÂ’•ìA@Ôn„c]3Ÿªé}½`XÍs¤5†²A¤êûVTbÒ¨¨út%|ª8e`g«(ð©¶N•pÇ €(û<Ša¹Ð2*✰R6pJ©æ˜ŽÉ¥ òÂS#¼¢FFÊ=fØ :~ÌþÙø•:Ôj²êUæßݙ錨—Œþ=Œ€fÝ{| V YY­Qw±ÖºF)þ0ÿ*-ÅÎ/Šœk@ Ëgš!­¨‹ŠRg””FÈõ»kûÖda4 ¸ ?Ý aþ¬EwÓº|=ׇ‹ÆÒ¿Nf»þ×ÿ|C>Âß¾L~@¼ú\7}ãî ÀQs3Œê?¤w§Óû-à´qíÝd\¯Š?_-ˆEÆŒgƒ‹˜XCBã0 jûX-õ½Ó«å뢹™†Ûã›Å™ÌÍ£•CÚ)‰±7˜-N{©è[kå[½¸9 ë6ÚºHFÁ  fG[ÖožÔædãnΔ*ŽLYm¼Ê0)Qp&6Îø½ uâE“µif ¤‘"ŒüÝx8šÍ…Z\}S¯å/5¨¨£c9qÁ0C…r˜‡ˆ"REøT_™RU¢qó,^ø0jB­“p²:š'5þ{T?ü~r³N»š·Vó>­ϸ\M»é'÷^MVÝ|æF&ñC!œ'‚EäQ0)``tTÔO¥S0q{$D3ë÷áI»Ñ)ÈËfƒ%uà9£iã"ÆŠ­Z‹F‹dá­¹Þ6sÔzéèëÑø“Y)‰ùÀ9³Á%a4yͬd0LÂ.F%òôtzgWÿ‚©b_"—¸W'o¶^Kî,‰‰`™FÄdž¨äÏJ”£‹ë¶÷„m¬z—co½`à âþ5V4Z ÀèˆbŽQ±Þ»ó|šõþ­ÅßÚ»á~6i<¹y"WQDÑ€¢Œ$ ‚ûLܼ¶s -úuï£æS°‰ÎXi™³H!ÁÀ.1h0«,=ÜÑö‡zJ.’Ûº÷¯çߺÜW„ì[—w|ñ l]ÖD%×j̾;YTkšëRº35ó­;YôQ®¢ 0èˆÐ˜&U1d  ¡˜µ¯Û¿Þ,[)µ1pwŒF¢ÂL§ôo+% ª VQJ¹ö¢ìdy“;Yú –œšCÌ˳ÚÉÒW¯‡,+·[öȋї„ MiŽ,ú‚²SsÑž£ùÚ—k= d©3ùãúr‚• 'çË=‹À˜+0wX˜ÛßvÊóLY“’áW”çyu?º±WkãøéÜO.•FèÅs?·4>ÏÁe˜µçƒ²£çƒ¶‰š9î,p;W™ [¸J‰;¿M®RâÎ%îœ á~»³ZýÌçX¢ÓÏ19cÓß‹V„À#¾Š.‘M$]¥t Kj£'1êgàŸ÷Aý‹†?׿ĻYó3ýÙRkyUáèpÅ$,£œK¼å¸ÃÅ—¥,ùY©û ï} »š±«)»œ³óIû`Öž•oßWëôíwlÂ^!l–RZyž6xÀ¯… d k÷éÚUìkϵr¦|áÈamQλ<9WñY”§cÆ—ƃ½¹Ô É z7í\Ü@)Lµ:f€{[C³³Å·ª=˜-Ø©L«X¹תÌ+l¤®ß&)ë¸N†P’±ð™¦eG›¹tgjæ×vë!)RÑ¥JKê+F½¯ŒD Ç ±Öed ŸŸk£JÊ­6ÕZaFŽ)-ÙÛJ/u$’TÞØP±T¸ÝÊ(+O‘L?´¨ÃCç%uú¬£Ò}†ÆÆnÒcÌгr´ûjø€ŽöŽMØ+-±,SµBL¢îu@ûço¿ÿ6OÀ¹òkì—íØ?W™bÿ!]¼WZ¯‘Ø!©!y [VBp¯d—•``%²­Iõ6­'ƒ-5PLD†(øÕÛŽ“g¼ìuÚ—Ÿß…Éd<¹º Óiª‡÷¾9á».É—Ö¥Ç|SO£Å)ßõŸ›Ól’A¯éíÆ÷7~0ÏÒ‘£q|?ò‹çû`S>Žë§×ti×êË]J!Aë(×®£ýÿ8þüçátöÇôEý§›áüïÓ'–(¾ÖµxþòÃ.ÍÈR9YÊoZ(¾@{åI¬7ÿýƒæç¯ÜvžøJ„³«LÑkªŒˆ×QcRQ«tÅ4W•Š*TBZÙ–‡ð<ó^*$Ÿ|…dE¯G?ü?{×Úä¶eÿŠÊ»ûMèÆ“\µ5ewz“©Y·'ãL65— $A[µrË«‡OÊÿ}ARR‹jP"[ º©¾©JbK‹Kàœ Üǘ,ÿvÉÜ|š¾~¿^~h’!Ùm¦3$WÛB†ä/!C2dH† É>%C†dÈ ’!C2dH† É!2$C†dÈüPeŸ4C2#C'B—grÇ:ö.½Â·:\æøÎóHÛ#Æá6§—>½Þs¾â›r_ÞÔ,e6‰#œ ’R‰8—9{:BD¤X¦,IHVIŠeƳl2ýmT¨`ü¯M¹Ò]?ßWe»ÁÛv§ôøm*[pß–o9 ݯuã^ÄgiîÆ£ü1™<ÔG'’`92¯*§Éd9w1Êîß…ÙUÍUÙlð¦Ú씚i*YpÍ´ì¸N3àÿîðÄ)ᆺ••&yô[&гL!Ìb£3ÉbL*×G3K33[®{»>ÝÕÈ«våò¸kW¯›;z8qÏÈ$Gã|ÜGÉtYZG;N?}´ƒÛe~ü=˜fƒuóùÀ$‹¥™L¾òÇ VK/ Zx;Þòœ»yÿdòGå×ì9þ­/Ðó‘;–¾¾_rñ-þvÏ`uø”ŽÂŒ}õ´ÁbZ}WƒO¦“4à„ç;Ù„‡ûÖ„o¾«Á™N–ŸîÞ“f£Mí"ç˜é üõÖ„Ÿj®Ã {k®O3Í¥£oÃášÅ™åãFÝí$‡ÇѦ8G[v\‡£Úf4JŒp¬-âØ¤È$Š ØŠünÕdÌVpôv:ž;´´ããé̇ 7y‹ÁÍV‹Sòš¦ò×GËŽëô!‰a‘ã@Žœ²q¥sÛA&++£ÔP"xR9U7_ÜFöÖÎ>x)滢ÁàzÓà”Úh*Mpm´ì¸N4Ë•Q¬OÒÅB2D±0Ä&ÖRSñ¤(ÏUÜÞw;ŸNÆi­yü®h7¸Úmׄe®.[G·S·³îÝfÓ…™¬6Ûv¹ƒ¡âTtëð8wŸßöw¤”*;ñwÜEwGq¥ýÞŽ”ãmÿdu3øÐ%æ|ùïÆÇ«ŽW!cB_OW!cÂ="v’1¡%t:¬R":tŽ~/>Ž ÅFQ†#IŽÈÊÿ°Ôï|‰ö ±£‚\÷ê–±UùâÐîDlllllõ ˜ÖŒF*¶Î“é¬<8qMlÔÞ•_]—ßÜ9°Trné‹;&H/؃¤¼æÂÁtHUˆ¾ŠD/k% ÔGµ/Sq!Õ(jÓEP}JA}¤ £V (I â&¦(fFÌ&idUD01Ô÷Lƒú®>“쇹0?þòéõ_fŸ?e¿ÜÒé«FA}´EP… >ꃠ>ꃠ¾míBPõAPõAPõU?„ >ê+õõ&¨Y⦬Í1ÝWf;«ÍðZÈ%ÿ î©^›µ<ì#‘ŒàÞ¬o÷f;‹Å{¸ÓæE% 0u>Æ£ŒX‰ƒ¡Hé„"BʼnSƈ®Ô+.ÔŠ%_¢ÆŽïay­–“©IÉÄÌçãl\¶ u¶#ÐeSÞ¨9„:§S«G‹IŠˆÃqĉRÈ8Û ¹×—D +žb|_n ÒÈ»âëAb&Érbr‹yN±z_Ìdi»TQSÁ:TQË!Ô©ˆE6É«×V îtî|/ã=\H–YgŽyTd~¨ŠÊ³{5¬CµB­ë6‘Qêlad™sÑűåHfÎV&’ %=«È|ùð@ZŽEw¯¢¦‚u¨¢–CØVÑû¶wþù5º"„+z»ûô¬ú“ÃWþœséS]ù×1Ä¿f¯ýþœ³n, < ‰ËmêR›þNF°*BX”Q°*znUTVÎ^÷¼SZŸlžÂ"›æ ÿøç?o[ÿäÉå­›YŒ:Y~ºq ¿î4[5ý<›&(ÿÛ¶§3”oñè?ò8RóOö*â«PüÕMÚþ†æ‹7jøÙ1”_¾Ï/ç6iÐö·Ù8ÏØ¿·q:žÿoñÐr OmÒúÖ-ˆ¢™{~bÇ_lÚ´ýܽ£«¶ïw»ÏÜÖêૉÞÖ/F}§ãtbsÍÆ&OÆ‹¯õ-“ÏËf ÝüOg_›µ-f´ÚÒ'ñZŽ½Âæ¢ì~‘´bî4qpð ZCßn÷~§Ý7°èë,úÖ4—sµ~ 4·EL ½T M‘ñvp¢yä'¿NÞ“‘߀1(‡x°ò|nÄ <x0ð`™ <x0ðà <˜]P®‰ Qj-åq²C)WŸm9.”ŸdºìB )%;‚é>dÄQpïÇiBhûPu#  ªU9hÏUÁ@í‘ 4>$¢o˜RÚjºUˆ €*Plµ£ ØjÏÙVãÊBX†°Õ37ì_«&ÑúÃ-Oò£ñáÐ4qAµÄì˜ ³‡Ž)„}F¥V>M Im%ÇKŸ¡#ÔöÞŸmd9¿µ¶¦U§j4M5N•EŠg1âSd²D"™,ÕRf¼ÙjÏ(BíûôÝøÍ›üòãÍW½x• Ùô—E¨‰j"Ô B "Ô B "Ô¶µ j¡j¡j¡Vý"Ô B­`¡Ö›51¤šŸäpî˜+®Í“ò05æuGÜW\¾Ó=ÑîtOFšÀWïî¸6ëÄï;±ùúEµlXªIBq†b®âš¶É‹ÜôóÌÉ0[”§ëMHñ§ú_·ËÜ r°yÄÀþ^Xùœ¢M¡ä•éË»ÈÃSV+ÛýÝ-èüïå ÎÿŽ/è·Õب¯c7ù!ÂÞŽË6ÕŽ_|´“ÉôÅ7÷OËh‹«U˜b˜-A»Ep¼¸àBqBFÑM||tU~ÁÃä ­'!£[ðŒ•\À3€gÏž<ãYò ö³ -"AÉCxÆ<±·f6ž–0mw‹{aGk‡ѯË_K{þóجª¿Y?iîgôë Zx†¶` /H)Â<0êÛpªàC¬)¬]+ÌK¿0Çò StäæÜaŸ„ßÏŸ°’J×ðr|ýµãÕèÕØ^'^š±Ý §žÄ*Òr1žÌËÝ«øãûÁ•™L#3s[ßd2Úîk”¹cþѦƒ™],gn/fK;ß«™`)së¦!õ¯k*Žñ~=õn•³„ùå¶X.¥¸_·¡Q{VÝžÕ6ç‹”°iõmÓº¿\öZHM2½þ˜Céï;ßÛ,sêH¾\~œ­TSl–¨R覲´ŸÔq»¬1ª&kLž'`èOãÛ¹Â=Úô·+V=íÛõ…»~ ]_Á©Xÿv}ÏzÙ»íCøCÃjÇþ}îÄúdÖ¢:Ió%€ÊO/¦³—éÌd „ùeùÙ¿Ýf.ž]=d+ ŽòÏëÆf63Å!{Ù?U¿:ðœÑªÝ»ÇaߊÉ[¹3åm2¾ý¼\ŒîÄoÔw‘F'MÇùÌä¯ÛßåÓ·²ïÿ[Žg6ïø×ÊX}¾?ôÀš'º_~«ÁeqTU„áòNʰv6q‘•(ãÄ-‘âøÈ“5l[²3å­ YFEØm»-Ba¤ó-BÙ4R*<+S?ì¯få“‹ªÓŠQL0ŽõzCh³ln)ZìóódZ,¥_ßëŠiS}õ.7I‚p”» ÆX m©Dùˆd"µPÖÔDzb§{Šs0ËÛ1êßKoš¼ÛôæK8,ظ!´et›ú¨](úö¥˜Ã9„*‘»Û÷ì«]ðBDR2º'…«Ï–¯áê¨<¢ÃrZ@%ñÓõ’‰vH ª/ި햴úùŠÙ¾½¹~÷ÃÛŸ6Y6¾T`õ í°á;Âþë.ë~q;ýì%´eNÌùiˆ×Yooíï‹ÑléÔ0.´·úiu»Òçúa 3[ì´²·éÎ'ÙtV$iZ?þ0“‰œ„a2ZÓÝ@´Pz‘ ©Æ‡FkvÆlç´7Z@~¦ÞÝL´!jO×ßýýêêúú»ëïÙÙOˆì+“uø-~ÏÏk Àa,¬qƒËývÇfâówcNwj¿›b}L,Ðczçþ©Üžò­á?›2|?Uäö,ñ1‘–‘CBBÍþ1‘#V#÷ß?î¼ÝÆ·i>×ÓÙ|kx)· wiÊ8â*Vn©2J°âV(Ó;bÒ–ýtÃ&>L¦±£0kéÖ"m(Òß®¯Þ¾ys}³"IÁxÁÖü^6·ìàˆþ«ᾉìwCrzw€@XÕh†Šr5EÎÚ_à´1pÝî5@5ZM^T  òaÐýCãÖ`í¹¯2vòl<øë«Ÿ®~8¨ÕÄPn„?SPû5Å^|Ì_ŸËr%º÷bZÔþÙ¢HJþÁ3YV®È¾½?! 0Õ Ÿn]D ž=?ûÎDÅó>Åâ>I½Ç9„êC9 W£€rÏ åÞÞ|ÿPî0Êm®‹å–gzñÈ  ë•'ÐC9•7R9üjA/ÐÐÐÐ;?ГȪs=ÿÍÞFt=èɶ ±«zÏ ô*¸{O ö¢F°Òé“^P)½ÏéS%>{Gå½s܈p p p p pûŒàVUTíq`oþ§-õ”>ÙM!0ò³n¦ 0r4=…À®¬=Ñ+0Ø RFˆ´– “èQ'-|‚5Žn-JWˆ+š ˜r†ˆQ©I Æ1‰üGbà8ýLzÞ°ðI“Wc›ßœd ÷!ajW•Oš*¤ÃÊ'-‡pDåuU$°‘7F )=y”`Ê'5ïΖÔT>iúþuSùd>±¶>Áqºœ­æ¤[òä4`~É8¶Œ¤ikˆ…‘Ò:A2µØ¦*I¥~ô×Pö¬§è¿ô›¼ S£« 7eLªf©ÑÏ»äIÛ#4‹h¶Ô»ÉˆÞ²ç3¨uâÞ|))ÃpÖ«[‡J/âN¼•Ýr¡ÁóêaÜÀƒÕœV÷í6¢ C{’€¾•_ýKœ¨ãÂoÔ¾ð5ÔÑùâ>ÞBï¹Ð€ûápNè÷Oûç^ã ¿sä? ‚­‹›IN%£{œÚõG} âÚ®ÁÔôèA{)Èf€‚  Pܬ䈅.HÌR÷¼Ì-Ons½¥ ÒÄ(”¤6æLbjD|?H¬)Boa™¦óÖU˜XËþVÜLIo±ªÑ åJÎE‡„µ¥¡¸Ù³¨F«é¡9™ƒž!µ/ëÒÆ¬½èÕCvz'µpÅÍ‚Þ,KáÏÔ£¸Y[$„âf€„Ï ».n(ØæLTï;ÕCŽû—Œ°¥½§¼A`ÑÏOlïA@¹g…r]×y9”{XÞAà!×}Ê2õ0Ðó8݉ ç=‚ôôôôÎôÈ0b½ò{}È!(÷‚ÞFt=訶  ÷˜)ˆö{„4‚½°ÅÍ!šïqútýJzîp‹•Þ+:À-À-À-À-Àí3‚[…eï`ÏS‚é¸cÖÍ4€@Î@`?!ð+«yq³Ø¸_`“9Êâ)‰‘fÔ ¦Mlã$J•)\À|ÅÍšnÃ~dª _츼YS;(oÖ²ëƒåÍÜ6©y_+@Ǿ$;wRÁæ`ó'BÝúºûC}³§`í<úfù€Á`ƒ¹õ+tgÐÖ’qØe&T‰<Â)WlÏÁ2bÖ'Îä/‘§|!˜w²s a6C‰¼þ'(‘%ò|#!}ºM¬+‘Çý»þJ8Øõ}»>…yg¿ëC‰<(‘÷Jäõ­Džƒ®GÈ-¶Džtmw’)(ß•È uÛ1Hg8EœÅEi“„eLyWÞ¸¼–ÂDH‰5_om6G«·Ÿi¯gÓ$K£„#›Xχ›7Y$5Õc¬²¬¦FŽ„9=­‘Ó°B^“Wc›Þœb ÷!ÛnWòšê£Ãy-‡ððy„^í4Oär(*èÉkƒÈ«¥‚sühm¼¦ï_7ò’æöÿÙ»²Þ6Žeý~û ¿äÅ#O/3Ó- ²LÛB¬%å8¹½JŒ¹’’Oÿ~«{ÅE”LK–ÂŽHÎôV]]ßWÕÛ…Iûƒ‰H8w€l×Ç-äÖõäh†ì‚Ñ™'ê/¡· ¥ Â5꺙 ³c®4ܸŽ|ùmí=›o9âJK–Ò0Æ£€› 1¡HP#½ìÿ$Ú’ˆ'I"Vs‡u4bQhdþ|~@ŠÁ WŽëE§=¾ð,ЦYÍz&ã{™;—üô/ìs#ˆ‚ÆoˆKň<¡9;túò…äu£Ÿ)ßzع¢íäÈ“›¹ Õû!™Áó¾±oË ž)3x„ûþ¶½iUryø¿ÿ³GW˜<©Ó¿îÄ#Šñ×h´åËx¹3ØîIØòˆ‡æÏýÀ-“Ø2‰I,¥·£éÝo ŽÂkÿÉ+‚žêiÝÍ ÏÖŽ‰,\/ZKaËe6Àe¶7 >E*ó kƒÛ1µ)"p&•ÛØœC‘ÄDXcK­Ñv~/ݺõ|oqZWnßmCæÝÊ¿×M‚ÎJóG¸vi3 ­#!¿¡aÑ¥KÓ¦ojµ½Ið‰ÔZ£é¾ m1è_ˆAw¾CéNÞàÒhòŠ>¤mê&ÁuA/<Õ³nü3µG¸IðÎH¸½Ip‹„ÿ*$üÞ7 nQð.1Q²:&%Oé\’{A#[2¹Z6ý™Bãû{ÛK•¶(÷¯B¹ï}©ÒsA¹{wý]A¾JÂ虃Âá"Ы›¾½E G··\§ðz=ȃ²·ý5K„,†ƒ²MŸƒ©õ¼ë¾Ý\ 3cÍHy±ä_]qݪK̵O¬zƒ‰ú¥3 ºHÛn•è2ÓÕ0/悞è)j"‹»Ñ|…ǽN1â{ÂÿªnoÜÕÿñÓä2ó9÷FYV˺ªò¤W6‹ŠR©ÐóQ% ÐíôË9ÿRÂý"õõ…É *f‹ eœHÿÁæ¹…\æ;^j]qiÓn¯ÐS×EÕ=X¶iºÍ)D:éd£ú©ÊX×\¸Õ…~ø‚UÙÿ5Y)žBôР‹âRe Í fÙ%ʳº~…É^Y¼ÿ3ªþ¨H:ìø¢¯1@~QÝò¯ºö®:  ºœºÁãÛßóâö;¾„KŸT÷ª¬Ln sœéLô‹v]#ßha|í†Ö>P®ny皯JOç¥@kŠ‘ .%†Bvº ˜ëŸ ”¨R™kZ&òò6ÙpT &%Ê1U+á0ÊzêÏ|ì£0ç‰HBÌBpe°»ÃÚPøÄ \Ø‚ "©Æl øZy,øB‹ákÝ8ÍúñŸ-|ý0ð5ké*L¨-O5¾ç ïÔdUFwᜅ†ÊW¸U™ ÒþVf¡¶Ÿ¥%šÚ³é¸/-[ix–ÀEmº*£9¥Yºaa¦f BÕ•+ôÚÐ)Œt‰¥ùª ›Ã¿j”Ö»²|µ-—˜UÖ†7”¦µ†¬p;C+šèßÀÚ‚¦–·4¥ xºIn*„hÚÒÓé7A¨„¶ôT¬a¹€W³œØ,Õtæð¸FÖYÃ=kåû3ì§´ùSH*U‰/3H[²œ›œ¬É¯ffKâWm‰«5Ó)¹JƒÕ4ë&ÿª¸KÉÙ¦ð9ÃÞ*ÂY³€¯e1"Ây%?ŒÁ Ù5ÜÏú,Ða6˜t\<äõ:¾äëQ&Š{°Zç.ÅðèÁ¤¥kÑj1¹•õülj'uã@¯ârû…¹Ä»ÚEa•Ë‚à8-®€T.S7k8Ê]÷ ?TUÐÒðÔ¼dªÀÓâ$·Æ–¬’¡±<‘( šá€K„ƒ8&X‡16ŠèûÅ…@YY¢xhÌyˆ©I"IžH¢¹<þÙJ0B«§S ô*¦š¨tÜûàq¡‡ HÅ#OT>ü–§Ÿ2~væmÿøðä¼ÝJ?“øàøðð<=<~Ûú_NÛÇÍLJ{ï[iû÷¨Áá{Ò¨éÙY ÏÿÔL~Ú:Û?o¥oÞ}jþúþtïäÃÁþYYê›ãýgK =ÝûmEʣ㣙âÎÚǧ.é›ó³ôÝÛýeÎöÚ{ËùËAóɈïÓÁ»J<‡Ÿáró…²kŽÚ­Ów{û­…4›S •³³uõZûç§Ð5éyëÝAñ êz\ª½¤6sÕlãùÙ›ù®¡ha™í“Ã¥x©Zì·—)ůûÇ¿áåu<Ù‡ïKóuû¸@“Ï?¶J±.ë§Óƒ¥MÁi¸L*ó2»¡Q«…z¶v°"ñþÁééùŒ&ÁïÍï{ûû­­Ó=Èól¹ÔNÛ"|ù G-ü‹ÖK„sp6Ó‚6TªÝz›î·NÛ+J=;Ù;9M?}Ü;Z 8x™Hf¸h<¬÷û™ø¶õéÆ ÷å+†Ok®šg-â¯MŸ3Õé…é›L”wéâ%d1I|BñÆõ§_Ì×|ø¶Î\y-€ ½9‚äÈY¼¯nÖã’¿›ðWÓ¹‡› Œ0A=ÊÇò/ Áhž\6øÕ ½•VÉã‚r½¡ ¸€ $°,‹”Á x³÷£U2ŠybV–(Ä2LšˆÂ#Dq„ðÏŒ‰PÇšpkQ”"K"(!2,|øk2ï­Æ‹Y’{äãA=3ºè‚0 Ež_ 2íß‹„`bJ`¬©p²˜Ø‚07£²u3–Aë ¼Än|I ÔDQf´4±v™>Í ÷­êjpMƒžè‹‹Â›“Àª¾V>x Òèk°q ¨ºu1Yθ·,À’ÚD_¥®åJ¯ÕÙó­0¡w<#Œ Ø)“ш0äö¿GXl¦³Ëv,7Nñ‚, hÝ~Àˆí\ƒ¿[bþŸ÷ŒÐ½x7÷õ‹2—ÿT„{Ç#B«F (àPÀüi8ÜFVÙc&]ˆÄIܽ¿ž‹K¥`("”å¹,FP•¾ ¸|nÃ@—@è^§_;އª¹èÙO½Ñ¾ JñL0go¿}ð©ånU¿2¼üšwÜ2©JºÓ U¯äæÂÙ{Î*ª“0Iàp(œÎFéåR(·èkêvñ¥—ÎfTœ{\?é '4uëLž§þÒÊieàY¼ì™6¹Ê:Ã*Úæç§±[Þò¯¾Ne8uaÓ³€ŠàÝLèï’ä—ÏtC᪷23ñ7b¦ý±‹x8…úçE½"ì…d/ …]0lù+†ü><^¿Ç¥t'¤ Ï”­ôè«*6¿E§Úåw‹Ô ä¬ £b«ƒœœ'€¬yDyà : šÐ€Y2T ¸æl«§©¶+&ƒ¬L$­Ãˀư@‚© ¨%‰N8‚gžƒ–ƒûÆ1ëlwÉ?7A±_œ°©t‰ ¡€£®¡]8 „Æ*DW)‹uhŸÞ.(p©MÌe€Ehjˆ8Š'±ÄÄ‘¸}Ôšy<ƒ]Pø¶i™{(ÖŠ½™Iu´ÏÎÆ©G̓ˆàÉÍcˆ¾×(¨ðÍ£ˆî_»•í\–ã³àíþ»]·˜,¿í¸©‚—‡{Gç{~%DMŒ.€ö o8 Õä‹ÏÈ3½‘û¥ó§û§jxÅÛý6º¿h~‡¯Àl> ³w‘ì‹p'NðöfϤ¿qÝ#¿ãò÷ÑJnØ¡›§f°q$!3I’X¶ø6Y7g€ ße“ÿZÔd£0³Â:Ý”ôæüàc±3¥rÅ_®9Ãí%¤ë/0虑€1+\ƒÝ$·ÛotàS× º!‹uYô<änõ|eò×kÕhuMæ}ý«=PnëN&zîv[z"–?›á¥é™L¸úºGù•–Yç¢Ówn|5ùŽv _üV s=ÊD궆侤˫4ë_ìŠnwpå÷E½tþñK·Ù­:"×{sË!¸_QúÄ«^)u¿ðÀwš Èóƒ“ ­:®þ%®~Ù² [YÐ0\8Á–o·>·ƒ½?vç‚*•P•Ï%ÕYgRÿöÅÔÇO—GAFg§Ÿ‚ó³÷»]1î»ÌfN>n<™ ø•¸y6rY•³öÙîHä_Òz3cyZro¼6éM_’ãNWÏ¿2ýÌê·¼šç‹wõ5Èq2èŽ{&ß-ÿBuF¦bg‰ºqî[µ¦'šVÜÅ„|ŠÅì½J}¶ì“EwŸûFÿ÷ühì£;R“ØjèȺÈ žPXaGÿÏÞ¹5µ±k øýTÍèá%çTÑк¶DU¦Æq q66›kÕ.—Z­&¾0¾@ÈÌùï³ÔÝ66´±É&ØzH…v«uYkIú–®‰Q*Œ—Ñáªq8:ttèèðoB‡9:ttø†è¬Sñ›ïKþ…tÒ¢3Ûo íèð.âGÒ!Ív.¿*:L±%D<´ç­‡Ò·wsø&‘œ©$æ(—Ñáªq8:ttøkèPB )hâ„Ð*Ðve41Zc1Db d‹Hq±  ’æ¨òåQ%vTùb¨r²3æ÷“奺î½b®” ¸2Ç«kýÐ`ø§×°ùô ²õ†m›FÞºnε÷þýMžˆÅS Dà‘ü¦VÏFX¶g_žöl„Ë*"Üi¡áÞ%ÜÇÞJôO™C‰pÖBBùÔžù(ýH’Þ&3lˆpWî#\G¸Žpá:Â-&ÜÕW>¾Mæë!"o–@¬Ï´…¦Ž@‹”ÿTHabûáȧ þRF©8I”(©ÄR]1G Ž@:uêÔhŠuÌÞ.2Tt>fZhG …þ ”¨Àžè$}¤C{„wzaµà> eJâ˜/½™}Õ8:uêÔ¨#PG E*×9co–@‰(Úè]}ìõ×H 2!˜#¦}£ˆò)%ÜXD¾V”–D㥧œ¬‡#PG Ž@:uê´€@ Zçôí¨Eë@ÓB¿Œ "_’à‘Ê9{u ¶=ÄXû:p¤š_rNýºmB5A:yPD4¹OÔÆ1ð{WßõEŸŽ‹ÂgoÙ‹r¿Ï+xNwû*kl9J«¬ ¸j+õ`_u7ÚofÐ3<“…EQ]k’…è÷G­Ø\µgĽ Ï›W±* Ÿötyßµä»gwž¬”[·ýùáþÚzTèÎbïk5‚´­\­ËÎz «7åp#RCó§—µñЦxÖQ½Ø{÷Çá‡Jy¯¾]Ýy¿yÞïšÍãqgsÚŸMh‘ÏÛ=è6í÷qd²ÀëkÏïyÓË Ï=hR#ÎÍxèÃÿhÐìµ÷Ðéú¯} >ï{kÕ›‡ÇG ½zG¿ŠŽ‚³“ÏÉ)ù€à·«ø˜ÁsõS|tíÈÑÙÉAGwä…þtV{Ÿ;K¤»õNõ"h×qõúìøóEíGmtÖ¬wÎÊA°×¬¢ÝãíoµnmT»¨þ8ŧßáßÍÙÇÝjûº‘Ï—gHêu498NJíýFõ{ýÇ)…oÙÞÇÊÍ^³T{Á×ÚÅ—ëÚÇRþ¯2®•KÓpõf®Ü½_sóùæìÊròùâ¬Q•Õ‹¸]Û9jŸþ¨ýØ=>üqvüeTÿøí¦Þ@çg?_ì6«75\ïÖŽá_÷ËõY»:¬vå:Ž“x§2¨§ÇèÚ–¹ÖÔx¾Ýk~ý^»øö½^þ,«¿ÐÛ|–¾ï^”¾Þ†; Òp¥Ë‹³ãÎ0¨ïÝœàúu|2lëîшÝœâC+rzñ¡sÚ‰Þ N }Ûm~aµ‹ÃÑéñ—›Ó›à¦vQ¿8»Ø†Ÿ¿ÕvNÛ»åÏWºÛéƒKÁxg{¤Ë¶ÌR¿ø ß~£5W­ù¥4J¤vQº•iƒ^W?Náú4Ü‹Ðý^ót±î/J/H÷•›Ýß•)®½ ™B>‚ÅvzŠ_~‡ßÐÿ·—¤ö@‚úö‚ôQÁ‹õ¯Ñ ÒÿM}¶NÝÕÿ¯™þ¿¾¿æýŸg;WN=?†¿ÝV¹rÐl}¬¼ß4#½yÛ5Ƀ7‚µß g}­ühÜ‹;&í@Gý~Ç_óÜËúÐátóNŸz寭ß0¼Ò[2Á¦ºlo^¡Íke³öÎë÷<‹"Þ;"À5Âl ,äŠGj‡Ãó?½²õF-HÀ“w;ÂãúwÒÙÂø§†Þ;Ëï¼ëö`A ‡àGÆÙHba>ŸÏÇ¥xlëo¤Ë<.ûƒä!KÖÄÞ?s_ÔÃÀ»Ù€ª—Žß5>µä†üWA"d=ÈòDì (Ä–¨yÿÌÜ5ðyþå Ç©ó™Œ;ÿ¹ þå—¡¥Â¼/C+¬ÿž“ãLj/ (L6dÁãØ03®[£šIïOŒóVרἯ?³åí+º5ð†bêl÷à÷x^ã°\®4[S3¶6 j‚‚ L·?2^j›ÿ(Ì¿øÝwÈ[¦M×E.÷Í!#ýñ¼ÞU;NÝtØžaa(5þHøI‚•T$¢1›`aíÑÐ 6Q80ÃoŸ?(·§bòÐFv>ï³M!‡¦: ÜÙn?n'mÇ·ÚBÓeùE›@’¾±‘úöý ß±/z}_OZ8#q_2“¹†âO–/É¡F‡q"}¥cæSM±/ 2¾ MÐ0f±"?7 ‚P„Z&ÄRNÈ0‹d‘X%ùû$B\«ˆ$±4Á4æ4&šE\“<ûTÀóÕÎÂÉì•uÎ×>·Êû‡­Á[µÚ‰õîË{µýÃf¥u´·{X«´JÍf©ü©u\m~j5K;!*'ÍJýãì‹Æ^ùJ³µ_®¶ê‡µR«´½]­W›§sW÷jµÃV ØjšÕ½ü5²ãQÿñ4TµVÚ©´š§û‘ZÕ˜Ép£QÁ÷šMä Ò(VZ¶fÝ9(íª–yâöÊŸ³ïg=(?ðe}¯>—\£¹w`?ýpØhm,/zÕ(5K Ò+ýQ}S)U·'RªÀän€\CUðæ¶KåJ¡®æcª |´rš½Jùð4Ô:¬lW³'ÈëÞ^óÜÌêì^¢Â4›ûµjá…ÖQ:lî-×—òÞ1^œÇý2ðq¹zpp8gÉuø}ö¹L³[9(AœÅR;hî Däâõ þÃÖî©6æJЄL5+SâTû¥ýƒÖÑn©^`8x‘Hªó,ª‰{g®"~¬U¡þ@ÕÙ©Ö—UŸÊ½l6*dÍšÞk±[_MÏ T>>Š ÇCé:ââ¹™yû{[h¼³žYeB‰l*à¤Í‘å$Ë€*w[¬ßË€w{Á)Õý*€»c ”QÒp]Aø£ûŒ9ƒYs º”®4U‚*å³Âad|GÔ74¤T…” ü]EŒË0X'D#i´‘a„ÉÅ á÷B¨ æ1‘I‚XHˆ ÂbD‘ AüÔt…–ÑÕO›q1,ÙWéL³õ,ûqÆM÷?­ðv' ÷»ªÝ›Y00™Î›YXñq2Ãg׬¼¾áqË2B*8Ð?Cv”%µµ®éFI;qšçš„Ëö óÉ'mÒÙéqܶË4²RjrxØ:¯TÎv*Ÿq÷$ØGg§¥´Ìs_ÏÍ‰Š¬âçs¢éŒ}{8/ž?›çø/Ès•å%?)Ï,•akš±É¸V&ŸÊÍ2a‚Hk¤d¤!7(0FŒa¨C†G("f6ƒ´ÑɦÜó¯BÊ(ÀŒP©À` ¡æaÂåÁì×¹jÓc¨ ªÓÿšeÄôâË~»7º3Åüµc'~צâ$F’D k£¨"\hÄL‚´À¡Hà) µm€Ó’ÍÃCOuÖÒ¾îë̤nú°×K#:³ë²Tý\þ$Ž»cXâÛhçãLų¨:. âÀ(ÕFÉ\B¤H¨Eœ0Jï"kþJ–¶. òç4ÛPïC¢¥H4xqI`—Ä!$0Õ1—’g²˜,:É#Í(>—A*—ºž¬{ÈR£±aŒF&6"kŠ%B fªÒI"øÓh:]²@¿" iºe%%Ïç^†LG8‰n"A?g¦RX(ð…Ãà)Tüˆå4+h—¡8Š95\!Í$‰"è>5TSÂgµ›/ª˜ÕoZüµkÆ£¤«`Œy €P’$ ¥Á’‚„ÃYüD Î’]X‡¹ä«©÷^öIlJ´ŠÂˆê(§Ð.QfˆQ‰'Ñpžù§¨½¡àÐDÆZ"Q¢™ ‘2T»ÄÇœÌêw²ìlV¿yùRñðºŒÖfÚ C–h¬cj4‘%¡Q€a†$з=…„Ò$W©h<óO­UºÛ¥¶p§œRPL;H(àWh B­bÆ”ä:äè‰ 9+颦 ÌﯗñÖXd$d‚'ÐhQŽc‘èpmM•âh®1èg‚*›k2)=d/Ó‘Å[Y¢˜…T‡4‚B c¡C 8¥2O#ËÛ!ÍÅMÿj¦PPƉ†&M Û)»¢<(°•¢3‘<…Ù?bLvmGˆBCÎ¡Û "Ä Ñç"%FŠéYmÏø¾Rw¤¸o3mhD ¹W \>N•Œ£„S)ÁuCŒÚëÇŸBT“Tÿ‚¤f~¿ R1‡SuÍD³zÃæÓ˜ì´‹:2‚Véå#lëWDM4&Ž ×Ö 1ð´ÈÜ·‰ªÁ5õ»ª 7˜UöTéZÛåƒ+2£kh7ìaCÐkvÌ_¡D ™¶,@I=…®³TWr¥WRöýR˜@»žÆÚ)"ÃQF¢‰‰VO£ì¼‹'^P‚Ÿ§Kˆ·ò>ÿÏŸ¡ó¶ûã^ìå±xÿû.GT¬}¨%ħÐù‚ %,ÑI€q¶/ÝJ܆ÿÉò6Šé® ϲ>Ð~ ân»—­6m/á+»À~ïŽÆð€(Åsƒ9Ùþt€gAºöG»îôÝð\ Ò‰ÏíÌ¿~— <"+ÿÓ¶.û`´7ÙGv„ÉFÔŒZÓ%ØP¾¨“&”g4îMœ{›ŽgÐ ¶ì’Yk8óyJ‡w·r‰µ&ƒjv¸÷*·š¹<¿B ïLlb&C“ CóÕ¶÷“UÒ‚“ !ˆpȜΙÔï­soÛ6c"Á{¯§oÚ—W´•ï¡kë§yÎ3ïø¢w3«|'²é`|Õ²§onehWþNËy´Ô(¼›úÁ[$<³ñä›>–„˜«¶knõÆvÄÃÔ¿½¼œã%ý—lAµ ×yðì×ZãùáõŸØ«á‘ œ¢u[ òûÖÉæÌ¹ík?·! S!BLH˜övää Û·²ê®lïTþQ”ÄAâȧÌ ©ñiBÂ8”Þe›ç²ÊwÜãqî´­Ð`ÛÍAÿþ “¼¦›ât6à©¶)’ˆAÛS_„$÷çÌŠpr¨6äÕí5ØNx@)'ö,ñÀW!‹üD(a¼Hƒeû_Wã ìÅ˦e~°VÛÚºŠõÙÚùkwÕ­”‹_´«nµ´WØU·úÞ´”ôöUºoíóà‚Õ˜Ñáye­x¿X§aðúNPXE²ö2N‹:éi¡ß`'ý—?>öN5ò o´Ð48HŒ/âô>4 Ép€ÔšÅ‰—ž'¼jo ù%'(¬„&OÚÍ<°¾¨-¦½æBxŽƒÀÛMõ÷ÀAyx3Å›  Ç-`¿x®[)ß5a#w^ém4X§âÙ‡gžeáµ·…vtx—}ßY¶EåUÑ¡ D˜PÊý˜Q#c?‚ß|`€(¤ÂðÀ,½qwÕ8::ü5tÈdÄ"*JÂd($L…D':ŒbE2J&ŠØ©<‡Xjª­ vTùò¨²àx-G•¿‰*Ÿû¾³7y‹YŠXò/ÞÀpKÖÙ w/fÈ®aÀßÂ@ñz¾ÂdW$\èeŠ×úìþy„K{ Ãk¼Ñ—êQ-°$³-ߊG l3Aˆ¤Zz‚ìªq8Âu„ë×®#\G¸îFß"&ë<|…÷€­L ¬ˆ@§…vz—@¹ýU¨0°{)}{λOj| ŒÄGº¼€#Q¼t~Å8:uêÔ¨#PG EÊÖ9~»c ’€”Úè#7-¼Jå*a˜á/Ÿ"øB'ÜGŒPIi–èªq8uêÔ¨#PG Ž@‹4\gä ïBE»n íô.ò¿Z>ÄÇ>¡û4 _ô¨iŒ 1ÂK×™®‡#PG Ž@:uê´ˆ@źDèÍ(ᢈ@§…vz—@Å߀@©Š“(Rú:;ƒžÆ0™$I€2DKÇ@Wè#PG Ž@:uZ@ ,XÙÛ…¤h'Òm¡Þ%ÐÇîµçœ¿: 0p…”Ü7’&>ñ‹°Ãˆ šÅK tÕ8¾IÍÎ*vêôI”Šûº¢¡Þ;ª;ÓNÞ¤ÂÍ#¶ ÿ?{gþÜ6Žåñß»jÿw«z¦VpðtUjÖm»ÓÎÄrÛqì®” @›6uŒ(ÉÇnþ÷} ©Ã2%KŽO6º+‰Íà{ßç‹“×Æ5ø›LI‘O iò=éÓ½ÊoŸC»›ë-.š£TB¾Nœu¦ÖõÃãu<*#˜_‘`Nëæj¢¹¨^æc[{&1}wÿiÍ¡úÕBM^HD;ÎOn,0ÞA ÝV ãK]Sz´§¹gS›T‰3g{ƒHy í|>1ÚHù)oã¿€”—DúX‚@ð¸È Gžç3DxúÉ“’yì>)¿lFÊ)o¤¼‘òFÊ)o¤|I¥<©:ó¤|D´ç‹hÇ1ýá…"zŹ(ñé›Ñ¡Om,”B +,dá .Š”†=åÝ'¢—MÈh#¢ˆ6"Úˆh#¢ˆ¾#¢!½ƒƒ/ë:ªé‹FÀ%5Ñ»1o«šºâ­n¬´*[+¸3ÒåÒjü ìÉ1-ºë ª{o%^Sg=þ>ïÊÙCAAB£Ï–ê4zÈë3«Ï#¿èúÌãMý=Þ«Û|˳°Ò•-×Ò<‹È󅰚MöBõÚ*βÐÞÒUrÑN¿)Õ0šrw~¯%/º>E]¯{vZ~öÖ“örsôÃOkؤrgºè/yòî5óâlvã`§¦Ë |™Ôž¨ï•,ÈCL©èoËʯÿ:üm{s¯ñûÎûwõ³NKÕoƒ¸^ƒøS‡ˆ|µ›ú—‹A ²Péˆ jWÆ«ÒKÎ*R@Gœ©A‚àß´ê Pá œFh'Î:•µëß¾þù5b~t5 ޾â“oÂcöcCydÃï;ÿ:¦_»Á{¿òíK,bÿ\üñÕÝiˆõ‰h5âsíÒ²wtxu²õ¹¿w°aGïÒ§´q~Øo¼ÿ|³{ô5>>ØÀÇôðf'ºŒö¡{B|ÌH,Ø—³àÛFôiçªqslíìØ{[»Wsaï´ñéîùçËÝ­üÏö`wsc|]ã »n³u×uýáúäØòíÃùÉþŽ¿sÞˆq¼{ô<¸¸Ü{¿Óol]F„­Æù1ùxðåb÷æ÷øähû²~Ù½ÞIvZþ5?’¡|ƒøøˆ\¦6º·uq½wpz³{pÌöö?ø;[Ÿ­Ésn\}<ß8\wHÓë>wÏOŽâ$ $–ï¿^£Kù-‰DëëMÀ¾^ƒ´nŽÏ퓃ß/›ØÞÝ:‹>|[û{[Ç´±ñ øçäèëÙîÖ—ó“ƒÝèãæ‡¡hÅíoìK|p#ßÿÞ›ÚæmÖ8?µwÏ/¬Ý›mÚ¸¹ˆÂý ¶{¾1ñé¾u¹³5¾Žì¤×½Š²ß;8ž_öç;¯¨ì·¯§Ê~Ö§´ñŠ|º{ðϯ§ÇÖ+ª§ð̧óËÿfû5•¿½àb­WTþçÛt~ù öŠÊÿº1ýNÍ”ÿÞÖFVþ§ïÞ­Uþ¯¢áêX$áçýýÍÍí/Í­/ïêª/ê4‚’‡f\€Úi@V‰GÁ -c•´ßéÄhlžU2†&ã̦N’¬MÚ ÉP¬ûØÇuÞêCR¿¡¬Ö~­tÚ-E*¿2Úf´æ±¡þB]±°«6IξW6usT ø­2éâ©ô;3ù¬Súk…'•_µ®øµrõA,ð$†¤Ìº‹žÃÅ3ÛHt9ˆÇè¢SK'zt;½>éO£J ófKñd­‘JgЇ6Ìzå§ë*­!É¡8£6ÿ¥RÙ?ÜÜÜÞß_Wc]§¡˜À°žjuúª’ÖÍÚ/…Ïo9ohgÖO”Tp {EûÓ¥ö˜¯ÐŽÐÕF\‚ßÜ@§œSä) +ù ‘‘6ŽÅÕ}˦a _ÍÂ>þü\Ö”÷¬3×V(‘å GïÁ"h û<¨ÃhH-ìM÷ò·H­‰^çéúó‡¬/õdÜç¸ZÞß ;2ÒGÊœ„c¾–ç†( .ü2Wº>sáŒsGäOëÛ¥ì‰|»\Þs|û½°gˆVmÿ…?ôš«e ‚Ô³®Æ¦îÕ %´pu™¶Š½ †2B_µÃcûQ«BjÖkæ(qmû^îÝ%m+jG­Akš ¤V@俺{µÜÎ{̸ï…L:„r&¼Prû’[8¤ €æÑwv(-ÌBGQêûëI×vˆ²¥<Ÿq&Ÿf~S ‘6}A.U‚Ëĵ о˧Ê`Çe  ·üù”Y‚¤ƒ|Þ=F ö,eëxé0Û@Fýæè.Pè–G˜ (€[­Ð PÀ!z)áØaާg£Ù=¨º§×ã¥ô‰ âœåÙȲ„‡<” µæÒf‚ryëÆFúäiÜ xÜY72iÜ•Ÿ¶>¶·¶·fè1­ìþú²^›æUʇ?ÂÏä?FVÊ’|”xÞ€vþãuŒ³^¢ )*]B*' $È'ÜCBªÀb.¦ÜîV!faňt‘okqA<Œ<ßÈ• +é HÓ.sZÖkOU…VÌ¥*DÈŠU( … @-„®Ï6ò} õYÙTÒÐ • ïV!nûBž‹‚évÜà+—"—)Ì]â8Dª2W¡e½ödQhµüW«BÖ¨ Í×¹÷+ÂA?Š“ôá›éß+›<Ž+MÞSMø¡9mN3}“öRõTÐ9Úï T%j§²ÔcÄÍ‹ T'ûë‘ݧ'õA[ÄŽœCMÍgZwU¯åîó™µÙäûübÞëñëtÅØÛ§îI§™_7¹œ¬w¼ø‘:/é zBe“m /I‡ë›ó—ÊûG6Ù?ÝjƒÇŸ¦ÏéÓ,ï¢^6öÖ³eúý¾ç¤wÏŽ¥Uïù¹L*Ÿöö:’vkègŒáIÇAð({ÎëøÒÈÓ@y2•_ 'p*˜Á‹-(â–d(”Â. lê¤Ýƒ·ÆnMfG·ÝŠñ-ÏwlÇE„U"Ȩ/h¥þ#ÑIߥ?¿ÿx*©ñóà ·ë^=äŽCl®ôd Yx†ÛEër_Qa ‹Ï™žÆyCwTévñ/Ô7ËTi}ó,ïðãJ§é*~´Þß¼«Ýüsp[ÊMâãÂ&{k³lfMZîwZéE­ù9 ÁwØ›S™0 Å 7¨´ÂàvÅk®“òÛsm»×ØÞÿcï “£}½º.žT¡=<‘ìÎên­±£µvGm¯¹V` )¦ôÔ)j#.!RÊDHDH% ŰÎq¼ôx2ÅìÇк¯[C$u—Ì–…DhA†Œ„ˆs_ÔYŠ¿X:øŽ‘oS:,V ËÔˆ¢Tþ}ŠmÏ_ø2_?m7¶vïß’Hx­aç±õËrqâ)dËÊ9ßV+wIqK¿ðA¿Óì÷¢ÓÓtïÑòÞ¶ºê7{(¼hz…üÔ ìQb}ÞëÏ\¥ÚræHØÒžJþ~Õä3f¹Þc¨&VÅÞ ¯Ìxªê¦•)ÜÈiltI•Õ3O=ŘÒ¿µUôÝ«”{÷{F9ðäÀÚÈ ©D¤£‚èµÂkO§V nŸ£œ—^Ïù„ª»EäœmTC‘j`+«³`Ũ†çV ·fpÝ`tƒÑ «ØRºá!3ü¡Nö#Låw|×ftÁT~Vu­û·íxEzej Ã?' dÞ-+`<¶Ð FÀ<‚€±Ýû7š0úåµé—Ÿx±o® –å á b ½N‹ -½Ðòmì2›Ü]·,¡^fiÜ—íͽÝÝíÆS.Ž[ÖoOµ8nÅü,Ž[°Û«z¿QV-å¡´…=P¹éP(‡™UioPK½M…T2 2 *bÐÝêûZƒìq™}ú_ ú´q°ùÇóA ŽC-7¾¤Pƒ·KT]}êÙ›õ¢ÓÍ:£À"=0äñàÖ,žߟ‘„Kì hHhHXNÍ•3|^ ®Ú'jU1}«}“K·÷üÂÕ±é%Eã3·÷\b(g(÷¢ÜÔ0C¹”#¦¯ü›’ì%¡gWIù;9ýÂNNmº™F4z¶žžÞàGô— ÿãþ×Ì>§J雚<û öîù>6ݰ¯ˆ}ŽaŸaŸaŸið•zn•a·ìÐ+Þkylº^ô\===½òAÏ«²Ù¯‘–zná Út3´7zžžžž^ù çW-¯üC{…-=múëø,ô«„žo g g g W2èYp¸j?ÿæÃÏÞÒóï@oÚt½;ÐÓî1Ð3Ð3Ð3Ð+ôHÕ±JßÒsï.êËM7YæBèèèè•z´êZ´ìÐ+X®7mº^ôVÜ6Ý@Ï@Ï@Ï@ï-@U=RúîM§zcÓ ôŠ gÖ¨èèè•zVÕóJ¿1‹{÷›ä¹éeÞ³ì'¡gèèèè•zvÕwʽ»‹Ó§M7Ð+‚žÙ˜Å@Ï@Ï@¯„Ðs«Ø.ýD–‚oM›n W=³#‹žž^ ¡çö¡,3ôœÂ% žÙ‚sôÌât==½BÏÿKì½Y8‘Å7{o.‚žYœn g g W>è\enÙ·!#6)€ÞÄt½è³8Ý@Ï@Ï@¯„Ð#UË}oÎ>/ôpÑì͉ézEÐ3‹Ó ô ô ôJ=ZµÝò/N¿»÷æ´ézEÐ3‹Ó ô ô ôJ=Vu™Wrè§°{slº^ôÌât==½BϪzåÿžžS´Nobº^ôÌât==½BÏ®ú¥ß†ŒàÂîͱézEÐ3‹Ó ô ô ôJ=§êû¥Ós‹–,¤¦èÍ…ÞʋәžÞ_zû‡››ÛÛ[Û[{¯{:~݇½ûcÿ ÅIêšfúã÷Ê&cx£{ýˆÇ•žêzí¤Òï T%‚èÉjØq|Ê*‰‚WTAÇ­b·ôK w@›˜nx[Ä[×ðÖðÖðÖ𶌼u«Äz{ŠÉ?§Š'­ìï~êÃ~©ÌŒšÇB ”„AàÛDà߬Bæ)f0É縞ˑËmDby @2Žë`)C‘pæ1Vg1™òuësð2G7JŸ€fxpŒêÇ%XR_ÖâG‡×ÊYOq þ/Æ…å¼p¯d»3äË­‘z'A:bEB%û)Ú sbÓ‹Çþoh*ÚÌÐší¼æ¸O ¶-ŒÃàË.”oedÈÕ¤QZ®3×®[H’êB·ÍäÒËJER§¿!j)Çw„‹D $²¨"ˆÛEܥ̦R…TÊ,•üé"@G 7 ól,CÙû>'°”ðÃw¡E[xLºžíX4pO¸JH‰-˃öÁ³Cçïg!AF'³hDtóc-ÍC÷ä DÞFÑ"{rFÅ1žœÏTv†[úaÏ ‘åÚy”Á_OÌì” 7à}}†öÚ<ae Ÿe ¢S+y‹5ƒîÚbœÖpú_*æ£$M¦ ú ¢èÃNOÀaÙ¹ÔC'*ÂŒxå Vw0>3mº$!Æ®ï@mõó Fʵ¡Í)Ev|„n9œÛ¶o˧t€ý¨HcÑ´ù£ð„k¢kݤjꊷº±Ò ›¸»Ž'CW t²<å‚ðB‚À¶íжüÀšvƒÎï±\ÀžÇäxTº.VD¹ .€ÜÏm…DRŽ=ê3×{*XuÁêŒü¼½{8s*¯Öp–€ZÔr¡ÛŒºúâƒG¯F(Õ;B¥¹eÍe8û¿+jýåÛÅ’ôùÚPtSS=ø¹¥ZÞu³Àï®ãúº[Ê>nž¦GüÑåÍA¢ôƒÒé{F=F§î›¾4ì)ÕìñV–ãYîè <ÞEž‰>õV÷í6/;½‹¸ÃõýÚ½A» •ª9lé&™YM>„꤭kÆ`œvˆ«sƒmFí°“ú•÷Ä™öÔ•ç4Ôw­ŽÌºO·?o¢/–BÃôÄPµ%´PáÌÆnÚÝït;qçô:MH7TG¹'q¡ú#ç‰NOÎôÏÀÏ2ýMû8TPŸ²³NU–´ð“D±t81ãAr¦ ZÕÿ†ÄIûy‡- ƵÓ;ºJ Ñï¥ Ü«„óÞpp4 £¸Ÿu,ðáU–ÆU’þÞj]¥‡{ÐÀɲȬ[Á›¤Õþ2hw¢öPŽîkvºý,í4 ¸*HOu©[(äô—iòÉÜÈ¥ì!qv¡t’áef¦J§{ª¦ŒÍÓOTš} êh¶áZý+“íÎe·§BÕ©[’k]<*u•Þ,Zazö"ꢘÈ0Fðí>49u~‰8ãíS…ZГ=IØNxЊ²7¾ÅÓ»"n bùïtL<èý?{WöÛ¶Îìß/pÿ#/}©qѽ€ë8©{b;8HŠJ”xûdgë‡ó¿ß¡6˱œ8mºåèáœÆEg†3?Žf¨¸çá,Šr^g$ßÓiQž2ÃãþÕÍt–±Æ„#•Ø“”ãäéû 5·(y5œ(ã­ˆÿ¦SÁèÎ7c® øeà †‰.¨œ™K0ÓtÉN¦“°ô6Œfù]¹u¡Sýˆ–©<¾ª(eO¢NþD¡‹Xܑә$ fY?4rú-ÃtøøŸñDŽfÉ£“0úƒËOÈMÿ•÷ñV–BºìéÅϳs2 ã.¹‘ü%w)1S•˜ãÈø(™×=Š'ÍULÝ$Ы”kð$Qø¡?Mf“¬yiH>á"„³0yveK*òÁš¦ÅüVÑd–,&ÉÓ5•+áÄ›ó$õ÷?qì#Íᎉ]“*¥ŠÂ_.r ¶`œêcw ÷µ:<ò«Ü*w_ëÆiÖÿü÷…ÊÜ—MÍ÷…–Ü—cVâ¾Ü·î¾-]ærË“­ïeÃ;7Y™Ñ-]‚‹®!³Á™ßÊLPj3³ÛÏÔÍíÙ|ݧ–-5<+ÜEnº2£¹à S³ôÈÂÌÍ@æUs¯œyß¹ ]p"‰‘N}gj¾òÁ–ü_Ák¤Ö;³|¹M¼InýpCjZs—õÈÝ.ÀŠ¢÷/øÚÄÍ-ojJ îé1¸Éî¯îÖ>µ½tÔÝÆ§ÞŠAë'O<Ùév†ëõ»‡úÑG=ow§±êV¯Þ¯¯šä_­â°ï¸µ›±§} Èã©hZ~óp·Þh– i±§&JßÎæä5G‡ 塀ÛJ~­Ýnÿ j–„UœãQïã²h(*³Ðö‡WªEý¨¿J)¾4º'x5 ø½²_ͱýMní÷[)[WÉé°µr*Ø3Wqe™g4êi¦ö½Ö7Z‡‡G šÜëÅßõF£¹ß<¬CŸ½Õ\;ìﻈ°Õ :Mü—^Ö+˜Óê-Ì Dõ›;^£yØbÔÞAýàÐ;Þ¯wJ¯bIkq‚eëá)vï-,Äæq Ö,½ôD'–Os‰Ì^“lèìÚ%Sí]¨‘Šbó¯7Í¥`Ñ}o²Ÿ^œ‡jÝÞ-^«‡é üÛ:ï*È€´5Ó)É<-}“˜Oëׂ¿Çî/‡s?ïM … JàÑôF\t0fËಀ¯è³°JX¶‰ dù ¦« lƒ”î*áßX ,›9‹e@ W%•+”Ea¢ØBøƒërÓ·}‚YŒæÄòEÜDÊ5_½&=«¾YËQ’¾ǃ†jv9öÀ4áÓéÝ8òã;×(ná‡<¢{¾ øÍ ÞôfÊô’%á`ŽLä;¾KM'`‚K&ãÔÁ’Û¬øtºxŒ'—¼áPרo!LP¬kC5ÉÆ:£LÂ$„…7/´Ò%Eya:ËVçbçë ó{§{çãþî<¨Ý‹xÎ O/䀹ÉÂOsÀÎõ˜átzóD¾ØBÛ”âïà§ØÞ¶qÀ$ì,@rÀc2…äsá~?“Q¦^NXœ·¦mþx ^Ã*SH‰8¨A¦Y†5¤lQE"¢Øèl¢àÊ¢®Ë˜0±E(ã°qAi;mQÛ,>Š6.ăÅÀã‹„5ò'ã0-ûøoÞþbÀGI)@1",,§œØ®D– t±ãð+n©óD.—’F#u¡+N’ž’Ý$ntÅ!×lQ&£©¬ÍùâœÞÊm†žw»ØgÌžU“>låÓ7G°l8 `/ˆ8q¤ë¥K“HlÃ÷LáYë²r"çdúwˆdn ©ò—B.¦Ò·³^do Â!¿XP›”1_VÈ:ËêLF£¾²,*”¯\´Égvˆ ¦°õ–AàÚ¯#é8Ûa…|]¶¤:Ïa-!/RÏK ÓV‚ œšiI qìê25Ç| ¿ Sc éZȾM•Í‘ó\îSb—Jš¼Ȥ[Hõ]˜þ“ÒU7³h<*cÛô]Ë$&¡$80J‚&™M”¤~¿‚€“aW®a›Ùë‰w‰|â+ÄÉ…#¨¦kÚìµQœ!÷U$œÿ«×qm0‘¾dˆ J¤åRÁu‰`¾MŠò©™~ŵ ßtþO‰xz³‚½ >x´@b]/ c(p¦H¾í58¹^ýìÌ?yë¸ÛguáÑ<™K1 `‘`פ”ƒr$÷-‹ë$½’"'3]eª@ý¾ŽseaÂermF‹ÚØw®^©ÌD6Z0ãdƒ(6Z° —žÒ—<¤8ç%ò-‡J‡š®Ka…Y ŒÀàN–¦«|7/ç±ÌÕ¦=U(™‚íø“æ"í¿¸ÅÁWš°§[nðjÿ‚`ìÒˆ*æŽmƒÛ5²ÀèÛ®é0Œ¸%‹Ò^˜ð2ž·à‘€í[Á† æ¶bøÊ™/›2[7dQذ±×`U6êwpª(ðåIˆû€€lp˜˜XkJHl™àY”3_Geói¬rd­ãåÖëKP€&’ºÊÊ–€N˜ëžv“í[&jØšC> …sà)YËp»„[R5Ø X^ÓÔy1Ìe±e”DÐkÈ:u­­ôZÂ^ž…29l7`g„1;E˜ã jÑ@ùæ¯#ìt«“]2ƒoŽÓá=ìwSŸÿ÷7Fèj»ã›‘_K{©ý÷]îÑp_°JˆAÁn|ô ¬@&Æ®Ð!ÍqÝ~½-.!”‚¡°˜‘ާ»˜)#Ðý<çõ܆#/N±òn&ðT?ÒѳwÃÙ ü@”â…`N½Ño7ãÏ€qõE}@Á»é%â7ž»Éþú]x)ÿO½É”ö!yHG˜tGãhæMuø)œ=xiÎלP”mîõ8ºŸh ‹¶Õ}¢8‹4ÅáÝí”c^TÓáÞÛ8n•7™\>LC&•qwNPÖdª.´½ÃY É61uŠï;pH6…ÑÓT( ôàé*>ïRÛŒŒƒK·ó;áä–z:ïAM§ mã˜æ”¸g¯ºç«©ŒÂIm‹ßOcÞËr$æ<œñ‹|°ùÁ?Iðn!ôƒ·‰s®û™>Õ*R·¡~ÉìntÄC+Ô?µ<#¬Œ£Z¢°ËË£÷ŽûÓ?¥…ÃëßP£T#›véW!ã ±_Xÿ!%:YýUø{Y¤.yÐ`µàÅÄÍèÀÉarЈ>„Y”ÚCÔ'Ôpn”ì̘֥~;ŽÒ‡Dà›¦ƒ…Amö_†KcЀ8¾ÃÜ‹!hº¶³Ž½ÖÇ‘üóï"Üž^„ãÜ„×*¤C·|Û¢Àt˜¤Ëî-`ªb®$>`™ý?®JIeÛA€ äø 6a›h”RD‚`Ň=[µno  ÿ€ Í'J3 ïÖÑ>½: ‡Ï!‚;O!úQk AÂO"úv^6¶Þ±t{ÆNcw[çRƒáBý¦`£]ïÕãDˆ]ê™<Údï^âŽb wÀ§qæüd,ggdgFïÆáÆ?e¯·1~õ§,”Tkæ&¥eÇ.Í'ý}ô÷¥=bô â”“÷›{ß&ºÚÕ4LÅ•fÙÒIÈ 6u,›; Q÷9²noÀƒüÿµ É«º™ïÇ«ó’¤G­ý¤.%Ûˆo¬ù~[§$xë§ ՌÒåz¾ú·®6jÅOçºÀŠuAô²Ç}§3ÝZ‹@Õ9–éÏ* táNćú/¬ z´CL/«É¥ªˆkzu%ÒôŽOÒ?ÇQxŽô&>{õŽ6A.q¡†ºŸEÜÓ…!Óx¤Ë;/]lóÁ`|WEmèÝñ†.uËNÃ7“!0г ÒñSMÒmzœv ƒ ˜N[·4\~ÅήT èY4‰Æš±©Ð¡uó´oÔÏ·—B*SeÜ‹çGám~íZå'M§AG½Ãc㨷·=à7#}~ÙÂ!Ç…û3¼âANIéõ{Û3>½öòRÆô0´4à^hv;œ77áÀ_n2ýŒòV±šO íùÊ7nǃ›¡šn§ÿ93í¥µb&'‰êº8ý+K„)D‰æ„ëˆPüD98$ïiËx“àÓ²ÌH=ifVà° ¾ðëæˆb÷‡à7¬<§•Ç1\—ƒƒâ؈â¸ÏžÉ¹n8¬ÀᇖPç#s\f»wˆ ¤#|NWœœè÷xÌw0“”R\ÊßT’ Tþ6 2K|üõÀrÂïF.¬´Ìgô¥èꎃЦ×zšÎ,¶Ñ4Ôc¤Öu«¬k>ü_~9cKÐA ¥_ݪéK(±ß[èyë‡\}æqÙGâIW‡Î—\úR€ûF?™ð±ã(lè¬sP¡opKpC,´`sǶž¸ëöQÜ àV÷_puá­ù¿ÿSáÜ ç~ Î]ÿýöÛDÄì½EÈÆ¡¬ ‡êIW‡Y—âЗž³ÿ'âPIB QƒÛ¦0(qlÃU<0(oçÂíx‡®ÛG…C+ZáЭh@+úbJÐ{ñ h™ei óIWô%æ¿€8 ¾ ¨!Á5…éCH—ëÔ+ÌžÓ¿f­h@+ZÐ €V´‹‘÷³Þ.%e_Oº (þPùÌ$Ô¾Ž)Ëpû¾£Èó©¦ëöQÐ €V´ ­h@K°˜õÞFo5jnº¥§ÀÏ']ÐÇô¥© ¶Mÿ8Êi›q WQË þ'(`In Ç2mâ#S<› ºf}‹49(®B }JJèšzºtNb"ù·`iÚq¼TLýÝòMs“€HëMzh|Näâ=£]ol¹ô²N¾ìm¢¶M¾-Ô6²R¡Tpù7‚˱j¾ 2—©eú!ŒŸ¥—Ë¿Š šƒö'ßÜ\ ¡Ñ/‚ÐxE5ÕÚu]yW\Õ•¸—-í£ó’.òtM±ßÛæ[$ƒÁrËNŒ'mW@¾ È[ÿ ¯‡!n+Ã"RTabpeÛ†íKB\Ûd¶DÏž‰¸f¯€|ä+ _ù ÈW@þMyû={³ÙÀæ&¡¥ÉzÒU2F)„¶_¡1rÙ¡‘íái8€8ÀYs×¶`†p}i!¥“ÏÆÂ×í£‚Ð„® t¡+]Aè B?‚ÐÐ_½ß?ÜÖFM7ÊÜ-Ú”³ÁdÀGjSÝóád 4&Û(y2ÔrI•/àì‚‘Pn’²§.AÝ£Ûp:Ž<=tþ]´‚‚޲ÏEé>"ãÞ²¾’Ad–µO8îéï Ý/ x]•V¶IóÄ܆œ?åª÷z­¢‘¤4–΄µF>Õb<žy¾º ÜÞ‚ß[·>/k;ºÔu=sÆÝOß:i&{sw~t°ñŠû)ûщkw|cG^*Mo2¸§³©Å¼œn >U×&¥¦·|ä×Þýuô±Ùèvv[{¶.ÇCµõõæf°µ æg òe8¯©\ß•€ÚXÖŒQ-·WµhzY‹(âRÝL ø7{¦?j >×0kpÛàëä帶ÑzøxtrüÆë øÉý­896ÏO?gä#‚k·þ‰¿[áã‰Øc³óÓð+ùéØi>$fH;ƒÖ•¶O>_wN¾àNÿˬƒ‡Óì\5ÑþI õfçýkzöµsÝ=i‘öÎàºÞ…‚|žœ#fò4äðRœÖÃ^ë¾óõŒvû-«»#q·öЙí«/wízú_ó¦Ý¨çí:ý¤]c¸<õðùáüærúùê¼×b­«Ýð|çøºsudî÷ýëó+9ëìœÝwz(ìœhz¬î^ûëùÎ ì|­[çÖ´5düÄü½ð cž »xÎzÜë‡nÿ‚t®®q;üÌZ;_èœÎúýþUýbÞîì.nw1¹:?LFïøáwîüÓi(‡Ç_9~8ÃG1Ά_ÐùÎê4Lr¾wFöû_pxyvu| ôºýË«6þb]É»îÉ—p¿ñùV£Sr8|õ÷vg²¡çÜú.¬öÕ5žY«Vôê¤}UŸó´GïZ;y;ÜNÚý²×|[)û«³ßHö͇‚ì—x tþ6üFzz×VËÿëÑï$ë‰5Eº;¿‘ü¯šxµü/î#ù?tŠkê‘ü»;_ù_|øö®¬¹m\Y¿Ï¯àñ‹gªLIÀU©:Ь8ÊX²#ÉkUJ€ -G‹¯;Î=ç¿ßIm6eɉ“±}ù0S±t7Ð_7èwΫ\}æ¸!üÝhì·Jåz³µ[©¿Û6#½=SäÁˆBíwhÖÐÕÒUã^Ø1±õûLÍK'ѡéûòžNUy?•1h[^·mBó[ÀÉfcÓé÷ EœMÊÁ2#N ˜ˆGqÅ£~Úáðò‹S²Æ¨ðäÌü;Ψ¯B69t6-®ØtnÛ# r832Lüˆ™ýà÷úq-<¶¿ö qŒ‡Mî }Hš5¡ógjŠÚËÁ¶œÄêÄÞ»ÆÇ–(ˆ¿2 ¶V7b]¢P[êNsþL¬50yþr†ãØöŒÆ-©õ]À11ÒÐëß tœk­s社€Ìf=?x6L„«0ª©Cúp"”`—·ºFÇ`Œ8ýñL˜çPÑ­€1J`g»¿ÿá8£R©ÜhìLÅØÊ4° 60ÝþÈ8±lþÈì¿‚v¯à â·¡#ýñ¬•Izßáv D8®"08f˜uØbîF‘BRe3xoƒ„µGCͺÌnF†|÷ Ó9n OÉäà¿uáÑûì:¬Ùn?lGí8ãsF-þއwðôR’¬óŸˆÆol¥®}?è۔Л½¾«' -ÝxH™ÉNCö'«Ov*!8§Øe$]¦írF.—L )è¼Y¢€Z !a&ðˆ§D h(Œþ»Ha_KE£ "N|Rí)Ÿýö€ß7;3·’WÖ8ßøxÒ*µN¹ßªVO­u_:¨5Ë­ãƒý£j¹Ul6‹¥­“Jóc«YÜË(Q>m–k»ó/¥¿ËÍÖa©ÒªU‹­â‡•Z¥y¶ðqå Z=jUvËûðPoVæ_WªÅ½r«yv=¨V웹ž6eòð§ùÏëåFé¨Üzÿáxþ×½zñðc¥ÔH[}PúØXÒh½xòÈ—µƒÚBsæAÝ~úþ¨Ñú°[ZöªQl— òïÊü›ï¸òaBžê)ü@ïHYS©5ËõÅR9“I‹5•q꥜v¯\:ªkZGå•ä úzpÐ|¤7˜5?Æ£Æû‡¬a8³Íæaµ…[d©XšË„âséà„,ïãa ž—Ök)¶Ÿ!ÉÕ£ýf%%ë2>Õ+K‡BZhUÒìžD=NÔF©QyäãR¥^?Zäü>ÿ\0³_®¡ÎÆrªÕ›ûS±¼@­Lþ¶Óz q*…4¡SÍònlJ<Òjã°xXoïk‚C–‘¤²8À¬ùð¹÷&ânù¸ó¦Î^¥¶jú”t³Q¦Ö[ú`©n]˜žÈÔ1êe:Bù ~{` v3´¦˜e=³ÎFÝ–¶G YðG±Ÿþ¦ÃúgÁß}õ7…s¿ ¹=Äa¡i ñp¬®:¸£‡àr_- Е°*ðÀ‰H¹Êe8"®”¡çj⢹ÝÉŽ~ V)ÏAĉލÆÂhÕñ(¥ÂÃŒx˜¼ã\¢Ð©ˆ"ì”Ê ¢^ˆ–ŽÂç†Ux¬úa1ÎFIöU¼ÃlMÊ~˜¦‰ÝOx»u—û]ÙîÍ L¶ñæâ)v';{6®`í¸†§EcŒûû=lÝ+±¬uMWA'í†iÚsX®Ûƒx³'Ý­‰w¥ÇaÛ†g$£Ä¥­ޝ?Ÿ“rÖ½ OÔÁåçxÌ _/ì…òdv¤{¡ñN}{8?²oºP6íñOÐs°’¤gÒʰ5íØdï l*“ná&0Hi¥Pzƒ‘Q{9d|…5óÄ‹N²Õž~í1Î…Pˆx”  ØGA ý ò=æ£ù¯SÖÆ;Å0d§‘tÄôÂë~»7º·µ|ѱ¾SrqbA•G´‘LRŸkì™kNÁS\fÛ k%Ù3†‡žìlĺîbn37~8èÅ•ùø€¤U7e ;©ã¾Ó2«v±Î˜<Ë¡C0å""#1L)"°±¤ãÒcìÁ ’µág†°ruY:/Ónü¨°>ƒù!!u„1'L‡¾~B‹I°I„4Çø”1]–ðzï´fSyL™Ðð¤)L ÄTr¬£ˆûÏÃé8d y°8e-&/ö^žV$RÈ7Š)_rƒ<íaI¸#8@ÏÁâ'„ѬÁ]‡*ô™ñ%6°|`N#¥@}j™fÔŸçnL1Ïßxør׌GhÆ`B|rQD" „Ò I(ò©ñ½ð™œ4»tûÂ_½ºOCƒe¤¥ Ó qä3X—˜g¨‘ógápÚù瘽÷a‰ µÀL1ª=Δ4ŒS%"CBŸÎówn6Ïßtü±xxÛŽFsë A£EšèM…ÀQ`$À0C#ÐmÏA¡¸Éu&ÞËücku»RîSpFX“„pĘ„*Ðg=)|øø™9é²¥ ÄïçÇ8¡¸ˆ0÷),ZÌ'!8(\;SÂ>^X ú‰`÷ÈV„„JÉËÔ¥8£%½€é€!ÎÌ0¬¥h€SHó<´œù2—/ýë‰BÆü Œ4,i[ý%= º1ÀV’Qâñè9Äþ ÎØ5¸­03"€¾j)ìÁ¢ïs‚¥§ç¹½0à‡TxŒÝJ˜osk¨¢°\‚)€~aR„*ò™`ºaÁ&žƒT“V‚Ró 8ˆË “0 sÍ(M<šÅøóyDv:ŒeŠŒâu´¼"v~)ÐD3nBe|mc²yxš'æÛ„Õ`šº]Ù 7˜gö”ñZÛ0ÈÁ ã5¬ ‹´&²Î~‰#ÁE¼²J¢ø9x´º–)½³ŽÂ æXF„PX§¨Ì<Ê1³±øD>³Óq,_œüŒü°Ÿ. o¥:ÿËzèœýq/tÒZœÿÝLÜ=ãQjf uè!—3îÁ_‘éÂã£4–â¶üÆÛ*¦§5l=«t ý@†Ýv/ 3m¯á+X ¿wGcxÀŒ‘gNr.$vðŒ´k´§›ÃK9ˆwbË{W¯CY'Ù*Ú˯ÎVXâ‰7Qÿõ]›€°ûSWIE\F}î ‰=×øQ#ͱX¥AÖ­ã h_rmÂZÐäYÕÌOÃÕ•ÂbŠŸ7òË~ÇåT¬¾ü@¼ÔTo=í>ûÅïJC±<¹„­lÜy¥é%Úâø>&óK±a–û&4ϱa6dON°K‚W‡ µ A ¸v™ï.#>è/¢‰hùœú†{Þ*l¸n96̱á¯À†ÜP M $\K¤mÔ 5Z©Àîõ°'™ !WÒ×ÊCŠüÓˆz9¦|q˜’¡S¾Lù»Ó›½É¤e`Ñ%¹Öθ0ÃÕIÎ…û‰Ò´ g]`dK Õ§ç_'¾Åä{YøÖšäø6 ßâ§âÛWèû4ÆgÆÓÔ^ï‚Èhæ D®fR{Hr4Ñʬ kÖ‘ãÛßæø6Ç·9¾Íñmž¾÷!c[>§o¢Bd¥ïï½gâOúÿ*ê3¬p=ß]!â `âIO{2+S¬[GŽ?sü™ãÏæø3ÇŸ9þ|Åü­@øoâY÷ÍãÏûøó©Yg_#þÄ>hoèK”Í ˜ tŽ\C„}‡4Fk¤ÌZ¯Žæø3ÇŸ9þÌñgŽ?süùŠñ­€‰7Š?QA°Ìý÷é süy>ñÞNìûôÕáO&¨xºTIe¯ZÇ®DJ»<õB ØŽ­ÂŸëÖ‘ãÏ7ˆ?_BÆÖ€¾ü挭þùጭ„ïøzGD/&ckŽ–Ÿ7c+óqÆÖ‡ñ9Œ‹0^l ñvË Ä°ƒÎ3ô/á"˜¿¾‹B¤|¤Ì¥†0 ’|WPÀÁÔHR)­‚UzÝ:r#èAç:GÐ9‚Îô"‚†úŠÍf}Ç.j¶ÐDÛ¢‚u®;²g æ›ì^wŒ…d_¶-_zÚL'ðä7é9bY_]‚¸nÚÃþ e›žf¡xróÀ(¨hr9¿­cà¶IÿŠ 6È*ŸP¼e³N|[dð-îk*+l)–ÉpÓ–òMu¿Ò¯fÐ3´‹™‘]+•è÷G­Ðܴ爽 ÏÛ7¡Ì*ë¹Ts­¸Sä·N–Æ­™6?:Üx&kÊC[ r‹†Å­AÛƒVÊÌÖug :§`¹´”š/N²ÂÊâXãCöBgóï£÷åÒAíCeïÝöe¿k¶¿Çí¬>Û°_¶{ 4íÃ×±2ÉüwúÚq{Ît¹rÃK›£ÔŒ‡.üË™Í *×E¼v5¨:}Ùw6*wïNŽßC{µŽ<ùv£NŽÑùé§èŒ¾ÇðÛMxâÁsåï3r|­öÄèü´ÞÑq¥?•Þ§Ž&ën­S¹Bíên‘}¿ µ“ê¨Ú=:oj²R¹=k–Gµ½³»³æå×jó}ÿú­Ò¾m+úéú $OpGÓú¥:-¶•oµïgì Yñv¿ÞB½¨ÒCÕ«Ïöïô¿ò¸Z*NËÕšI¹R÷á8Ìݧ»óSËé§«óFET®Š·{UV»:¾Úo~ꞟT oG´ÖÆíê^ùÛ~³Þ­vËì|·Œk{U¯Ú¨ +]q'OÂ(Üë jèì߯c†ñAïšžíW­ôITv?³Y?‹ßö¯Š³rgwq¹âõÕùIg¨î„{Çw§¤vžÛº{ü]Ñã»3rdéß_^ìžá³;twÞ=nCß:0æÑÙÕûËjè{õéò`ïó·Z³~uÐ,·÷KŸnt·Ó;¥õk Á÷pïÃH—ì˜Ë´v}¼ú ô²ýúÜŽEZ½*ÎhÚ`·•Ýi9RKʽÞÝ–óþêâñ¾|7Çûû4¥ÕDÓjó3Z.§½ 9ý–ò8›ÿßõKâ¿÷ÈœJ×…Âÿ«2YÎÿ‹ï/ˆÿwµù9uÿÐnÂÿ‹wï6œÿ8V¹úÌqCø»ÑØo•Êõfk·R·mFz{¦ǃ 7…Úï*Ь¡«¥«Æ½°cb:ê÷;Xš—N¢C‡Sçå=:«ò~Þ8$ж¼nÛì‘·“ÍÆ¦Óï9Š8›”ƒaF œ0âŠG½´Ãáå§dmQ $àÉ™ywœQÿ^;;„l:rèlZ\±éܶGÒ<à‰1³ø^Ƥk à±ýµ_ˆã;l&-èCÒ¬ ?SKÔ!@»‰3Õ‰}w-Qe7½ÕX‡(Ô–:Óœ?c ,ž¿œá86=£qç_Ùõ ´1ÒÐëß tœk­s礮€Ìfý¤Ùõ±a"\…™PMÝч¡³¼Õ5r8[ÄéG`Áì8‡ˆnEl¡P;Û=øýÇi•JåFcg*ÆV¦M0°éöGƉe³ðGfÿ9E!ó`Lèè Y¡4vL÷y’o¤¤yb( ¯o#À:^U)—’À¸Ìã•:ô\a8”‡G|ÕFÀºuäKççR?¿}™ø‘@)ƒL\^® kX;6Rs~öÆt:xöÞM2À'Â*0rMà)—IB\…|á"%™/¥ç‰$úĹ6ŸRtæ-H³CN~ŒKޝç\¼KÝiÞœ;-lãjZ .†ó†¨?ÐðsØ¿íM|±Ëò¦™á×÷ž%dÏÃ(Ðnä…ÜeÜ® xäúïy^ä1¡Ø<&>Æç ý=$À+HÀI0¹\"= ´æ éWG‘ˆA“´Ô¿‚ìYIðØ4@ÙÓÀ ²gu\ÄýÈe§]N(ü£‘R‚(D=ó+§yF¤·ñš‡˜¾™zˆ#„Ễqà;Åž«Œ?”“aËê‹ú—Lo#«à&ÉÍH¶;”a–ʦÃÊAÙÏ‚2ïÕA2¡"E~à"ÂLQ¥\2XÐ!~Àˆ`teŠÍuëø?ö®­·mÜÙ¿à|£/ûR%âM ìÜÔiÝ4q’¦ 7%N}[ÙÎ¥ûÝÏ’l9¶§›f›þõÄ’(’3Îü8+Hvß½'ú"ÿ²Z'!¶&ÅúϨ“…ο–U W«&Ī >+UÓ#3˜¾¼ó…<ÐÜxŒ(ìÑ€`£ñ8³‡ì0¡M<¤œ6­£RNÌÔ•:ªT,[<æë@~2ÜG‚„èÓ I"¼A4ËõPÆNÙ –ŸÐ‘á4U&¥Ã«®õ‡lo²–Üž¤¢;±Á>ÅkœIöcÀÿ¾3ü/ù”VºLlá·jh óŸÇ­ÔSçë&]£W×@oÐÌo¾*•´ïr€([©ýb6I‡=û`0ôTÑÐZ/Õ2g ÿÓêWÎîI®¡<î‡Ô£4'$ðX˜øœ’øì;¸™BÅ}bÎ}LMÈ0“<”Ds#xð{"AcIqš`ªeTÅ@ÔIžÝ=ô|“t¥){äðʇÓxçà8þ È©ÕúlµÜÎ~ëà¸ÓˆOö÷Ž[¸ÞéÔw>ħÍ·¸S¿¢Dãs§Ñ~W~p´¿óG£ì4ãöq«×ww›ífçláåæ~«u·öß5öàâ°ÓÜ/?n¶êïqçìzÐjÚ'¥ž5ðò­ò뇣ãFüv÷¤|÷ýaýàCsç(oõíþ·£5ÖOïy³½ß^hh_}{|ï¾ÛY÷è¨Þ©¯#òfùIØwÒÜ-ØÓú 7ÈÝùÐ4ÛÆán}§±rkj ü#í¬{ãC𸏱ÛÌ® ¯ûû{z³4XeÞ. E+Ûì´bãµbQ?O;û§x}vàzm½–c{+$¹u¼×iæl]7N‡Íµ¤àØ_Ç•ežÝ‘¨û™z´sÔ¼çåæááñ‚$·á~ùº¾³ÓØk֡Σõ\;ììEˆðõÚ ü‡Ök˜ÓDdIMJŸóÀñeÍX½YkTƨ4ÚD!H“æVˆ ¦"B*I¢àiFÚ=¬ß(„%© wØh{ÏC¦$N¤Ie "ã3ÅÀ‘ˆ|úO1ÄØØ`tÒRÔP("‰”`>ލ¢Ù§€btKÑÞ äß;ºf:I‡ƒÒcø:b>ñ %I"€Q $ÉOb‚,úÿ 8kvíx°Ùð.uŸhƒD¢„ %UÒü èpCŒà(z’Î;ÿ³7ŒP‘ZqD%%ŠET C#bSaòøékÊã›Ó߯»ÉäUI_P -QXijá%¡à IÀ¶=‡\“›L´ +óñ&æöAY¸C'(¦ Lù” PP¡š1Áè‰9£tªñûç4Î……ˈ'( (-`%\;S¹´  †ÙÁnº]З™KqÎK¤YHUHý(¢0Ã%$1X€“çQ+ÿ˜—s_æzÕ¿™(¬ !u¢@¥EÈÚ/ÁØJŸ¶”`%O!öpÆn0ÚQÃCè`À2 À b ôƒÈ9F‚©òh/¼Ì…û†[ŠTÂò­¤C%u K±ì \Ë$ œÃÒ 1 6þ¬*Zýœ*ø2 PSsÍH…™–Å 0óiDvFÆ:CFÐ&V^b;¿$h¢hd´4²9Þ" x:Ê–oÅPÃÒÔ당´<Ø3Ü7ÖʦUJ¯Hi¬AoHİš¾ (áwšPAO1ÖY«-¥7ìe*Œ/`¹+#Œ è)ÂÃQF"D£O3Ø9ë•S°‚‚5-ü ŸÎ%š‹s›ÿçwzèj»Ãé@×òZjÿ÷[æî±­<˜%Ä£`‡¼ˆF ~%,Q‰qäŽHµ·å¿3Ñž­b–ýÑÖó ´/Ýï²¼UñtoÙDmp¿?™Â¢/8s²<“ÎÁ3•Ю½i3Xý6¾©ûâ¹›­¯˽èÊ_Ãq<‚ÐÞf/Y“­h˜NâY*·<ôkÞQ=(÷¶[O:†¥olò-+8‹}rîÝ79Çâ©fݽWÎo5+2º¸wm´TÁÝy‡Š"csnõ}‘m JÄ·¡R¿Y‡C¶è,µ¾”//¾°:£ààÒãÙ“îèŠÆy.F¶¡ësÞx¬{VÊVð¦‡m”L˺óÐæ+ËÓEÄb’9ï\?ø ¿Øzæû ï+•š«®ýȦÖãaêïÚ,0¬– ÓZ&°+¦-y ‚òÜîu¼è^ÿŽ­J5´Xq•c}FпUñô;u’à~WZ[Dæ€h¶f´ž“Ã,ÿ妩`³¬ùK2ѾbéÑ@#ÂÌ“ j<šP‡Á3‡AóÉîé4_´m °m’Ñ¿ŸïcÅ.8á©6Ô…\)ž(ãÁ‚&ºä ¤¸‡¤–„1Xžùâ6Cù! +ó}OQnÅ(‘ %áƒY´7­ãØ …ú,ó‚µY‚ìM¤ÏÎΛw£^ü ì¼›µ½AvÞÍsÜ:¤w \"ßWÃÎDœ~âgÝöjuæPòšáx’Ù&œ­ù[8\u ±#ºÚé¿Ò`‘Gîô'/p;-öeb„ÁÐþaz<ô¥g¨’ ‰€5îCdÓ:~ òCöúoMžÔÌ<`ïMrI:Ò¿và A—xQ¨ðãT`äÁò" *ügü(èqgØ7îžO`ï=âl‚åçkÎ X—bþUž*w¹¯I5/§Ýž^.²˜lÞ‰ù3ŸÒÅØkÊ£_ò€¬B‡–h^¡ÃUè>ÒloÊ‹B‡’F1»ã×päQiOÒ0ò|~ˆC-„znZG…+tøcÐ!ã’I rÂxñ b"$*Q¡Ô‚ aO±Ÿò¸1WT$J\¡ÊŸUÒ Uþ4¨rÝÉWÏ,Gâzðrq%[—A4‡W×ìP:þ³vdûYsù÷».~¦]·KȺöûïÿ3»]°¥&¨ †kc{J‘®Ù Wô$|ÍÐÃIù_,ÂüU×ýìþùnð€p17‚If?|IåÑHiGp‰tE>’‘LÌuºi­n…p+„[!Ü áþÇ \öÆ÷_3ö«âJ¼åc¾„+s¢+\¹WFÅ•/ð»:õU¤™&KˆÅ„ˆ{"  1$‘ј<„+7­£Â•®¬pe…++\YáÊÕ¸ró˜É_âל=¼#êe"P´E¢åí9ѤB KXóÈ­/†$dBˆ—hÄ<*éI#…'%  Ë0w×Þ{°æ†uT´B ­h…@+Z!ÐU”¾ø :¹ý‘ßÖC¼œYÓúÕÑî+èc÷½DJY(03ÈS>£`ë˜ö$ÂÂc„FŒ ?J²„Ÿ÷ú@7¬£B ­h…@+Z!Ð ®B  Ð_Õj£;Wú@-Ñ•t%eD AðòN²'>I°&¡ç fSÎKêÉ$Â@;}CÊ’¾Ü‡@7­£B ¿$Íò¿U´‚ OA­Od‚n(¨Ké³Ñ™ŸôJóŠmÃÈ·§’où[¤„Dš€hò4Ÿ.ýãâ3¯UßyÓ*.*Iļ!æ NÞpñFƒRáåŸ/;Ñ|f^%–ùù¯ž K/¼–Q´éÏNÔ\‹¡Ñ¿ƒ¡CÍ HïÕšmÊr;µ2ó²mt±M ‘ûöiA/Â×>yöD‘φä Y‰ä-ÑA…äW!ùÇîÓz‰H)?ÁŠ&^htäQ“$^ä3ß#Xb*‰ÖT¡‡ü¦uTH¾Bò’¯|…ä+$_!ù_ɇ¯ƒpMÖ…_Cx †Î‰®0ô] >CcÄ_^<ò Ï€yX1æQ¬4à_IÉ÷|òåóaOõø¥úp6{ s¤úí^óÒï¶¿õ.Ͼõúgøxòå´qݾõýýÎÙÍÞiãæìÛ×Iëôã׳ËjwŽoZ—ín³{Ý•äãè â¾8E=E/äçz÷à¨yÓþvF÷;M¶ß©“öå9küóÖå§ëÖ»zþט¶vê³ríˬÜN™sûñöËg åóÇË/GMÞ¼Tì ·Ø(»wzrÑz§&íw_që]´N[l¯³Ûýò¾ù ú‰Zæ·³nsÜìó[qªý¾.¿œöÆ£ž~rû·¯õçqWõO¾Irr <´| û§íËýÓ/ÐoÔ;^ìu>­ÉYg÷rÿÈ¿ùö®´©m¥Y?U÷?èå çT!˜MÒ U©ºŽ1Ä9Ø/lU§T#Í ^¸^ pß÷¿ßI^‘±I!¹ú ²F³t÷L?ÝÓ3}Þ©µ*M ié¡BÊ­Ãâç»°ÓîžÑÚ-ÐàQìâs)¦OåúÆñš¾´¢zV® SšÖÙ}yoRŽT¯ãrï‚÷P×3¼¿yG¼>ì-¥)ÐûýÐ´Òø‚–Ëiˆß‘œ~…ß–óÿñò=ñßyfN±ô›÷ÁÿëYÎÿKôŽøÿPS ü?Ú þ_~ø°aýÛ2ÊÕe–­àïzýÐ/–j ¯\û°£‡áÎT5’+n µ× @³*;”v0ꪶŽè°×k[`k^Y‰L˜ :uZåb’b$ÐŽ¼m™Tå÷”õƦÕëZŠX›”ƒiF¶9Ý·WˆÕ·‡ WÿXEc OÖÔÃc { íì²iɵipŦußXƒØ‘*ñ$fõÃC ÙÁn%€ÇÖMo;ó0i[¡I³ZY¦¶¨¹#lËJªVì¿«òŶø+»oFŒSjKjÖŸ‰¹6Ï_Ö`ŸÑ¨ý¯õê_F̧44Äúï9:δÖ~°Rg@F³|‹0þ2l˜×öT¨&.éã±P‚aîw´ŒÀ±z£!Ø0»Ö±¢kHI`g« ¿ÿaYõf±Xª×w'bldØëëNo¨­X6·ÿÈîFþóv ^û}:ÒõÁZ'î3]zˆp$ì€Àà˜fðÇÜŽ""…¤ÉͽÖ,´XæþÁ„ ?}ÿ Ó=n OÈdáíänŠ7ÛBxöZ»¶s¶ÓS­¨çrΨÅÝuð.FãZ²¢ä¾7S©mÞ÷{&Ùóf·g‡ã†–îH<¥Ìx¯!û“ÕŒÈ@:a„læHÇfa@l®±°=G  n$Ä7^{,‘ǽP í!aÚsˆ/ Jh)ÜQ€ÝP4R\°ˆ0…8q™¢¡¸\ëèÍ·Þnvfn$¯Œq¾ñéÔ/7ý3îú•Ê™±î‹G•ãf£äŸ6+%¿ÐhŠŸüÓrã“ß(d”(5JÕ½Ùõ£âߥ†\,ûÕf¥àö÷ËÕrã|îãòQ¥Òô+G{¥Cx¨5ÊG³¯Ë•ÂAÉoœC*eóf¦§õz‰<ýiöóZ©^l–üû'³¿Ô ÇŸÊÅzÚêÇ£â§ú’Fk…Óg¾¬Uçš«7ŽjæÓͺ¿¿W\öª^h– òïòì›*祿?&Oå ~ ‹RÖ”Öö ÅR&“æk*áÔM9é^©Ø¬küfi¿œÕÊK‡B|´Œ*Oi¶ Qϵ^¬—Ÿù¸X®Õšs’\…ßgŸ fKµÔY_NµZãc*–¨–ÈßfZ/!N¹>7‚tªQÚ‹M‰gZ­ŽkþÉa¡š!8dIÊó̚ϑû`n"î•NÊ0`ꔫ«¦OéI7ë%ºa¼¥O–jÿRwu_¦ŽQ7ÓÊ·\ÌÞ,bëø¨>E‹` €YÖÕëì$Ñ igh’»Ùà/ÖÏ‹êoç~r{ŠÃBÓXãÁ(¸è`Ÿ‚Ë|5‡@WªÈ3@°€vÏf•¶T±A&µ&Z£oƒUã /â$Œhˆ…5´C)fÄÁäç)WQEØñ(•^D…–kŽÔkÃ*¼ V}³g£$ó*Þb6&eO%€il÷ÇÞlÝÄ%T¯#[Ý™Hñ>ÞLDÅÞxkϬØð²x q`¿ƒ{%–µŽîÐI³cšö–„ÛV?ÞìIwkâmé‘j™øŒd”ö©ùwõFÝkï¡eœ}m^Æcžûzn3”'³#Ý ·ê[ƒÁè™Ó¹²i¿ƒžëÄ•|#=“Vþ¤cã½/°©tº‡›tB£ ±A½ÁH;9¤ÝTÏv¢/:É^{úµÃ8"@Ä¡LÀLÖ¤Á ]/ræ¢Ù¯SÖÆ[Å0d»w™tDwÕm¯Õ.ì-_¶ÍŽïÆ„\œ*,hàPK&©ËCì臜x<‚§¸$̶~ÖJ²i ]ÙÞˆuÝåÌnnüpÔ+õÛ³I«vÊ@{\Ç¢Ó2­v¾Î˜<Ë*0å"¤–¦Ø‚XR/ä*r{2ˆdmøž!¬\]–äŸI·aÞ{4< Á|‹a„1',T®nB‹q´I…4Ãø”1]–ðzð´Æ”vh¥¹Ò¤ <b*9£ˆ»¯Ãé8d ¹ç±8 e-&Ï÷^xN(@®XàJ®‘:X.ÁöÐk°øq4kp×Á*P.ӮĖÌi >CÂYȨ;ËÝ4šb–¿ñðŸå® ûÐþ”Á„¸HqQD" „ A’PäRí:ꕜ4»t»Â]½OºO•Æ2 eà, G.ƒu‰9šj)0§Ùëq–H ÌFC‡³@jÆi "M”Kgù;Ž7›åo:þçX<¸oEÙõ‚)ÐhQHBÅtH…À‘§%À0M#Ðm¯A¡¸Éu&ÞËü“¿Žº]) ãœÁ$!1&aòB©G 7ô\üJ‚œŒtÙRâ÷ýcœ ‹¸ˆ0w),ZÌ%ŠG®™©aÏ-½Ä@0{ds+BB¥çäeâRœÒ+Çc¡Çç f˜#` h€SHý:´œú2—/ýë‰BÆ\OE!,iý% º1ÀV’Qâðè5ÄþÎØ5¸`¦Á" ¥çº vQ€Xô]Ž‘¯ÃìtË'7cßì§‹#ÃýTçÿó:k¿7ê*+­ÅúßÍÄÝc0•*´a–P›²9ãü9Q!Bx|µ”¡¸)ÿ‘ñ¦ŠÉq SÏ*h>ªÓê&a¦þè¾2‘Õð{g8‚Ì™sæ$CbÏ(€vÍ&àtsp%ûñŽç~b_o¦^tåzÿ¶Bû|dÅîÝÝ”bþØ©fܽw±ßjRäöêa3¼=–‰™‹ ô¥YïÇáÑPÂ¥Èó ˆq8$FçLëOÜý+³fŒ)øäõäMëöŽùéá ¶^Üç´3ðÎ]ön&¼wL›6Â×0-»áÔ†&äwÜXÝáËaâ¼›sý]ê]˜zÒÓ+Jõõ]Ël2ûÝ‘ñxú•޳­­¨×·}:m1ÚòÄ›ŸÜ$óîõo8¤aÁßg8Ö§úéQ¯*sîÜÚ7Dã˜röŠ•‡qœÔ’ó*ëÝJÎL¥‘BÈ#Í\…mö—ÀJcÜìžò†w1Mçvª·G£Ôf[c½6‡‚þóv{ŒÄ›¯u<‘!)4Å Kl&µ²ƒH‡æömÇAžÄ4Š~¹s¯€¢…@ZÛžFÊ6.\[pMmP8nÆR|e&œuëø Î½’pîu½#­ëHŸ™?ö4ÝZ½øA§éÖk{ÓtëŸI‹Þ±ŒÞmTtóäK?¼÷¡¬ímPWB¬!}w7'¬CY mc²u´ømuô÷…=N×¼}Œzè—Ó žgöÐfŽDvŒD>W¢×úJßµf¨½Ï;wJf•5]ª»V\2òæ¶“!²?ÕçÍãW4¨Ü…x›{9„¶û~ÊMÿ¶=­³mØ´lr ÿ±’5–ËØ²«¬Í¿›KÅ£ê~ùàÃÎU¯£wG£öÎ6,?;° _µº 6ÍÃÍ(ÐÉ`õBËîZ“õÊê®,XQLÞR=ØðÖ3“U ”®,xm‡ ì«žµQ~øØ<=ùíUÛòôë]pz‚.Î>Gçô#†ßîÔ©Ïå¿ÏÉÉmp †gµvØ×᧯Üý܉Àa§Ú._£VuïãÕÑió±Ò¸^4ï+-„ÎOOnO?w.N+ÃóÇ®6š÷URúZ!rë¾ÐÏ·`QÈSÜií*8+´Žëå¯ÕÇsvÔ(;ðï¾òxNÊ]tY¹þr_Ù+¤ÿJ£J±0)W½NÊ;OÇ¡>?\œÁXÎ>__ÔË¢ õœ7ÚíÊcÉ9<­µ+{åaõ`¿}QÄ­‹ÎÉõáiåú‰+{êªÒ¨v.ZåA¹#䩊ÔAhP…qá{3æJ#$G{7G›‡Ê^…T[ŸEyï ›ö³ðõðºp9-wŽãr—·×§íA@p[œ<œ‘ê½:´ÂÎÉc@OÎIÓÐUJÎE£òõ¨Žo.…‡ÃFíêâôËð¼sÑ>Àו½&д@ϥNjÎyë°øù.ì´»g´v 4xTûðhÆ\¢ÕëK§r}ÿ ÕëóVT/Pø{JÓ:»/ïMÊAãrï‚÷@·å¼,½#Þ—fx¿HSZ}G4­4¾ årÒw$§_á·¥ü?2¿½þ;ÏÌ)Vy|Gü¿.‘åü¿$ïˆÿÕÙ9õ„ÿ7 ÿ/?|ذþmåê2ËVðw½~èKµ†¿W®}ØÑÃpgªȃ7…Úë Y•J;uU[Ç tØëµ-°5¯¬D‡&þË:­r1—hGÞ¶LFÉ{ÀÉzcÓêu-E¬MÊÁ4#Ûœ‚m&žÅÏ:jƒ«¬¢±F €'kêె½…vv Ù´äÀÚ4¸bÓºo ,¤¹ÁGbf?8žïÇ­ðغémDZ&»ô!iV+ëÏÔµÈ6ÀÝÄŸjÅî»ú'_l‹¿2a‹‘ÚYŸ(Ô–úÓ¬?k Lž¿¬Á(¶=£Qû_Kê_ *&æSbý÷gZk?X©3 £Y¼…®Â†‰pmO…jâ‘> %Øå~GËÁŒ«7‚ ³kK º0†”v¶ºðû–Uo‹¥z}w"ÆF¦M0°¾îô†ÚŠesûÌþƒ‰ñs7 Rz­—›6±•|cÉ LŠŽÌùé¨~ún@¦³Ûnu£¾„Á[ o³7ÝÀ/Ü ”­tà?Ý2è´º­Î¨3»€·3¶:òëÓrìÙ-ˆ â}ƒW^ Qåb"iÈ#eò+ÉPD4Ã'œÈܹš!+Ïq±v\­¹ ’ª7÷ÊóLÉt»ÏH;:Š€d&µbWÚõúƒ±u=N{¦C&[ÊlÆ•k sŒ8Ów‚Ø)Gª5ôÇ_13Ž©gË>e‘Øô"[‡®E@x zâŽïƒè^>L>T àA‘ĹÕXÈmî¡À&Nˆ¤rhH¤šûpìÅ{RÌËËv/m<ºñ&ΈÿcïìzÛȱ4|¿Àþûw[Œùý¡E¶$žž¦“Æ$=Ì 0X$Ë£mÅÊJrºgùïK–dI–)‹r$Yª>ÉEYŪÃ"Ïóòðlýçå›Ë7+áÌÕðá“«ÿ¢´Ö–¨mPóéð-÷ŸÇPÛÈÞâÇLD‘õ°üŒ{ÏN¹ÝÜ„õ*4±n Cœx‡ ±9jΦVÔ›ã80â2±[Æ«4FÚ‡”8xíb™¢ËM¨´ÖöÕ„¶¼ÿVMˆ-›Píëè›‰Ž­¸v©=‹´E~lÏAPO›tÄpó° Yaœ¯µBuâŠCd‚¢H±€­"RºÜ„Jkmo^h»ûoׄø–MÈQÎsîR{ÆÙ›…ðºáF`ÅyØ„­™vœ#×ð:m]kPêYkRãâÁÓå&TZkûjB[Þ‹&Ä{d²Ùi€4¨0·“þ`Ü>üUûc7ÛÁàìÊŽÂUüájÙœ«&Jäv¨6 “ÛQÑLF·!ŽëÚ‘ §ZÌVMäÇ8Tš¹]í`|q{ãv<î7ýhu²2wÄâÂ6¿í`üÆ•‚áÛ© ßv—ì îŽ/ÂÔÂÒ¨Œ©¶iˆáÈÔ"MT­ëڲƲ唩å‚ϧÉ5Ñ%-°óóÊïçDMÙ3ýföjæy«;bÍÔèR[v™'Ýø>]f1 ]dOà×3º¬‚h6íà Üûl ƒ˜À'äôgr¦ÆwB&z}¬r;û.Œ¯¿¯¯ íNÎëgúË£n¿tX‘M¬ºüWK¿Û•C_²§ôQwèÕŸ~÷û®=Ñáj[Ò¶­Ãm;õÒ¢ê¨mvè¿§c‰>Ù;S£¥©  é§/†£ë ?²Ía~1ýìßÚlåYšç°þïØRgÙ†ŸÃhÒŸ%β˦ ¨³/ÛÑÈþ³ÍŽöþ¯6”s5ûÞâ‚XÉiå÷×¶òÆÃÛ‘ ÓŒ³ìWÚ9««…ùE÷þ:Mxm—œÛÁOË¿K¦¯Ó{ÿÏm4M»÷¬¹›~ÜTàšã•ù1Rq.ÍeröÓ»÷OGkÃ鱋¤©4lxÊ3Ë: åE:kð„èà]ô Aqôm Â#Ó4†ÖFPB[õv?…ð^B'º_­H)­לß9„mÈ](h«ð‘¶]éï¿îKi|ûÄÔý¦wÑÄšv†j$l0ѶÀ‘6’ U+gjW3Ìm^â(Ì@âì_âÝÎKÞýÊ›’¦±,oÑ…w+ö(ÞYì÷ ]u×áßo{„ûBná°Ï¼à‹Ø€8g‹qûƒ1zn,¿F½f#ÖÓ •—BÇ&èû’÷ÞÕ¶.ivùLÙ¾{{ùþï>LÅè$­/,šÐŠ^ö¿¯ªîóOýëÔí³¢6];ýýòƒÙ:‹™2¿ú{ëbÈÚu1¾m ÓÂV¯Z³šæáàœÔ^x)8R¾QˆK"Pôš£ó‘^‘mSñÍ–ºáÀ?£¥Ê8gP°8ZšÚ„%ΠX5BÊê4µtäÂl|Á-Qªá9BÄ,òÜ"M‰cLZLD“×c„áÍ+½A£ {\‡•4‰\˜ å¨*ˆV‚=ê#ç3Ú?]¾}óÃÛïOI{7ÿ=yó]‹í2÷»½õïKë‡²æžØ¶·“áÕdÔ¿¾nwz¸[Žy~›\nãkï//h^Z0{WØÄŽ&+ß 7~å“fßàRñ›%¾šÎ3¿QâKyðà·dÒ—¿ôÔ$? «Kc;5 8ì”a\€~:µ9»mdóQЬwo¿" Dˆ¬ß«È:¿3Ã×O¾E&õoâ»<ߟöÚBt=ryV‹ÑŠ>÷±@ûÔbJç´ØÜhÐb9-F·Öb5 ZìÐZìÞPc Æ@ëŠ{Ê©Øk&};Ȭ’’2…Y!E+&žùtò'¯´ûn±îðe¡,$8;S?¯…;…BÁ çé©ÂoèX»Û:£!>VcH%#_)Gu)bŽ«ÈÙ†Ñéòó•­3 õ<+Žÿ|ùúÝ?^¾ÝçšãÒzÛךã-ïÿÈšãvî(¿¸˜>GùŽXUTCm†yv±/íx†ùa%„-NPE½)K%`0(Ç ‡Ù» ®Mˆ •ϰAÅO¯>¼þãá FHv¹ñ…Zì]É¡¦æs1퉱] Ó!± Æ tí_ìàö^ß×$aÁ±C@B awH¸”- <,3—ÓÇc¢’ŸÒFOïé5ã=ÉI‡Ñxàñž"@9 ÜïˆrKéŠ@¹G(7ŸFl»[ü·%ÙsBUJÒŽCÐ,ô’é  ·z  Ðèôº=^i¹ù`š‡ÎA“ép ËZèq€@ ÐëôDe ޶;mèa#rÐK¦+€Þ:è €@ ÐëôT…U×s8 ÎBon:@/= Ðèôz݃ž®ˆì~"K6¼97 —ƒžèôz½îAÏTœéŽCªìrò¹é½ô @ Ðèuz W‚v={kšÞÂt€^z ôz=€^÷ G*y²{ˆ•/YÈÇÝšszk¡·åÞþ=€@ w У•âϰs˳7ssz Óz9èÁât€@ ×Aè±*Öqèž o&Óa‹èµÐƒÅé=€@¯ƒÐ&]ÏÞ$$·daa:@/=XœÐèô:=Y‘ÎC›ìœ^2öÞ\ =X§Ðèô:=UQÒùð&&9è%Ó!¼¹z  Ðèôº=]QÓùmȲ§,,Lèå ‹Óz=€^¡g*¦»¾dëÜâô…é½ô`q:@ Ðëô8®¸êüœžæ赦ÜÞ:èqXœÐèô:=R ÓõYòç鵦Ãyzk¡‹Óz=€^¡G+©º¾÷f~²…é½ô`q:@ Ðë ôX¥L×wdY3Òc•ÆÏ²Nàøç_ÿå4ØkÔ}À>`_ÙÇ+Ã;åäYö%Ó!ʹz°F Ðèuz²ÂÏg!4·gk:䳬… Ðèô:=UÙõ5êØäÖ¨·¦ÃÊ…µÐƒ5ê=€@¯ƒÐÓ3]_®G©ÎAon:@/=X£Ðèô:=S‰¨é» =ÂskÔ[Ó!‰s-ô`:@ Ðëô®$'‡6¹D–…é½ ô¬Qèôz„©T÷Gz8wÂPk:ŒôÖBÖ¨ôz½BVºûÙ›Dæ 77 —ƒÞÖkÔ@ ÷;‚ÞûŸ_¿¾¼|sù°w„ر·9Êw;éÆmÕ\µ?~<{mƒØ£G“¾œÂävt3>›ŒnÃYÿæŒáŒt‚Ï8Ä.êóÐ1ºóËãIn:1™n€·À[à-ðxûûâ-«ð îÿ9þnéõ´ýeqœ5;¹8¯@`[n £µž&ŸØ³²8œ•8…Á‘\c8ÕÞ#ï˜A\yƒ4æQÛHæH¨r-WcxæÉ4+1½ðô»Oýëļô›8nˆU8gõn6¾(5yçôÚúÖKàjà®â™¯ ñº1eqF$²MP ÁSVuì¥•š¼‡—¶å­—_ÚÇ5§x?û^noâ5ÁÞÜ~Þéö»…~Y¢~ÛÑmnÇÓ…ñ€ö ]@û‰¢ýië²O œú\úÂÐ÷áзxhºŽ[lO[–>ä|øÓå‡ËFcµÉójf4ðjk^5–Ž9|oÈyj@5ï¸ÚO.àÎ]BÂØø¢P¼b•š™› ÎœÁé:ƒò®Pì„”§ã®Òà bc޾jã ÕHØ`¢, i# Rµr¦v5ÃÜ®=xa7øð§í¶ìÅŽA±gÓ7Ã/¶¤è r1m¡Ñ)Æw1ȇ¨ˆ¸ ÕMpÈa!V–°¦ n©5óVŠGpë¯hѯަzXq ô…Çã ÖvÍXcŸãû?»{Üß/µ¯wåûwß{Ô¹TVÎÊ]FÓ÷ƒú>•ÿ‡\l ™€X°Q>{P­ŒXC_³&ÔOK™=ý7”±â‡¼“˜¨šp¦öfcc¢ªyˆÂýeÉN3¯´œÖRj§‚ós®­5÷Cûê‚…î‡W„íg}î¦Hû}Ëî7¸°|Ï7ÕÉlaÒIy%«”âZÄpí"´©CÖ)‹šØõ)¥ŠzB6y¥Ò2žÑ?6ϵ1¢@ÏõçÓÎc[>Ÿ…Ù JJaÞ» ù¬§£GšÞi_QRÞÍóÞ¦0ùù«×~øËeú,Vн™\ME5”KIã0åB+S7&ʈ"ÞÖ:]pKž}½©µ¯¼æX5¦¶Q4c¹¢ÎJ“¾þ)Llì³6üu–’õC{µŒÅ[©ØL´³ØÕ¦ ,8Gm-DXn¨×µ•®Žõ€é5k˜H¥ö?Ùë°T‡{oDßJ«Mbl”±¨ÆNé:‰™^™'Xš§g[‰Û¶‹öaÆEÏÐÎîŸ7ûe8m_Üçö•È·ŸÒOT§t³þø—ÙÇáó?§0²éyqz¿Úϳ‡£þuÿÆæ3(ŸÈ‹ø>‡ÉšðÛdd¯ÆŸƒ·wúǯW£›ëž †¿†¶Ö>ŒnÃùׯ‹<¸ìTÁ;_L(ägXûë}dÎ8LïWÖNãœ# º “_‡£_¦ogæQãø¬àtcÒf‘½H›Ï§û½{.ÿúýðÓûÞ]–BÓÿ-øû¿C?¾zÝûdÝÕ])íÙc¡'|Øv³·b#éÆã~úÂӷΗ?‘wŸ=çYìŠ7ã~ºÇ]øâb.¶Ï^¾ü¯¹O¾Hd;?³M¼úŒÌÖŸ¥Ò2!+Iöshͪèå˜Jô‘ÝÑjn+ˆÞUÑ+·½äô‚ÆÞÄ'•E‚ …xlF±íX¼ ºŽ-Û¬yKËØ¤yÿóÌýÃŽ¢ê}ùó‡? }ô˜ÕìW”l±ß¾Nþ0¼½ñ­2qCŸÜçmÙ\ðœ[yΓrŒi‡Œ$Ž_”#È£Z2˜¬}`µ#ÑÓmÌõ,,㨽ݞ‚ž%]°$èÙöG%µ­Ü·= }”÷”›Ù ª-ë{¶:÷\–$ Ì1äM=JS;d´ð(ðš¸ãZ5n“W*-‚ž;õ\™ gIIOz.µa\3ˆzBÔóiQOJ6D=“×=pÔÓì"ê‰m¯="Ž&êYä öõ,»÷iE=ƒ¨gqÔ“VZŸNÔ³tìNnë´l+èçUý¼åQÚ§õ8ŠŠ(pm8G\( jbk Ür.™ß¸Tª° ˆzîWMoõ,òåQOVa¼ŸÓ™rp£¢5Ó.6a×ð:¥HÄvêņ#Œó¸±´Ööupã–÷ßâàF‡¸Üغn¢Å­ÜXReíY,÷HX6x•ãœÍtg3mÛ! gÐXEØÑÁ¥â5³r`Ù\pà N×”w…b7ÀNÉ ,RgeÎÛ€t <í, ÕJY¨ãnzp£ÑyÀ4œê þ þ`Ë>Qì{¶!ÃS¢Š¬&Ï‘Á::E#$ÒRŠ47KB°˜»À’>àk‚[‚Á6¸Ûû‚“š h´rVxƒ‚H1 ¥‘uÁ è(•´®¥›æJË8êÀþžüJº`¡ûá•b§sîL‘ï!/¢™9ß3·|ÏV¾'›àGOÎ+Q_sÉ4G!êÄYÀȲÈpY+#l­¨3õ&¯TZ$øíÔseüJJzúfŽ”k­(cêø2ü„©E”µÊ0a”6R «˜kœª½eÄkËšà…ñŠš(Eç… ¿Cfø±S›3ü~r#ÙEŠ_zxÜÃdz›c‘/ØSŠ_Ù½O)Åõ8œÜXžâ'*-øÉ¤ø•ŽÞóÑýd«SÐÛžÜx‚)~N6^j‚®-F\I†lD7²‚ùd Ó±)-Rüö«§·Oñ+òå)~²Â§µ›£ªq¨c(°ˆnhl´ž:DiÔÞÄ5Ôãéñ_Ùyd.ìæ¸½ç<))ÿŸ½kknãFÖï®ÊPù%/‚3¸ Sû Èt¬%y%ÊIv+5…«Ä]Þv†”ås*ÿý˜r(’ÒH¢e)áCb‘C\ºþúCÐp<åÈYH‘‰s 0X$VX,ïLwÛ¶Žgv_ë›&Ø2îÉvSñr²9¶Äž4]ÉÚ‚¬Û ´VbÏý/±yyqÏ ‚4'@†áD…aØÌd$M(LøÝq϶ulãžE®U—Ø´¨éáqϵä MÉó‹{nO6¯‰{ ô¨¸ç §ó>á] ç{âÀ'ÙHÜSîi²GÓg÷l…_ë›Vm¿¤¸'ÙƒÛ[lÚÇ=Ó]^îì{qÏ– :ádƒžÉºeÐ7túç{ ʸ‚ $å#½ã6T&©†ˆ¦wngj[Ç6îùuùôn±iƒíãžé®`ßfÃÕFN`ʰñ]ñ(‡ A lŠ@Šm"SÈ46àhº|§MSøoŽ£Ïr7ø=±t{´ùOt´¹amîh³2Êkr ¸Ò€pC¾Il)2Èg[>ÚܦÍÊø-9øîÕŸí€s[Ý}­Î÷lÿœýÚÜ~À™ï&ü©î~ßàç6*‹ 9V²ÿ ôö€óüֳvNÏÜñ|ÅÎm ¢å›4¾ ÙS¥ÞÈç¶vu(`&î VÁ­W3nÁàÙ€A{Sh èÉ2…oö€³5Ú¦ °á|¡ÂŽ˜©@‚&I£Vnì™É½Åƒ-¼l<¸§M´üdüà+¼0I,†&‚†”î'€ ¡Ajlb ×&µ4n˜^™)¿M‡ò0tؼþÔ¯6†µ¹€—E¾>çÍ“H2: ”hcÁi‚$U˯6}ü3çòk«µ¯êºgû÷ uÁ»B]D<Íû톺ڨ,ø+¼òœ™Ð[µe³/—ÍÞ× ZSYúí.ã{Èú¾%yMÄÊ}ã3q·`°ƒ— íM¡5 0ú2sù%"QšX 'Ž4Pˆ`àñÐH-“DAð€ÁÕxÀžÉy[<ØâÁ¦B]ml¢50¤ä‡ºƒ„Cœ©„Ä1”L°šQçü4ðS ÂW^Ý;~‹ÛP×6Ôu_ÃÚàÞ.D¬&¾!0 ïöÜ›*F0áÄRNZuµéãŸ9ÔÕVk_mW×ýÚ¿W¨+¹ãÚ ¾+à !´÷UY¼j~Í«™Jè­¿Ú²Ù—Ëfïk-©¬ØMÈ ¹É¦\ß·$¯­L Ä}i©·`°ƒG†ºH7WÃÄ/„ÜXÖsB‘Zƒ„I ˆJ(¥ ȘêTPnåúÐw{ûl-ˆ-¼<¸§M´Dž&ëåcò'Š˜Ù¤§m÷h­ÜÑ=å›Ûú³;Ü}«¯8ÜʨՋ:Ým$K ÅpCÃ%O’Á( :b¤e NmYËúÓÝmëØ¦GZkŸk³…‡e°Gõ†~ÔY@¼’†fª«RÈ4bûýdþÄ|e´Šnï3 á,œÃ§p„ýÿt¢”@*Á4a¬óô¼ ùPöó!Ù¡T}k^7CTÓñë»"1áöâF†Ó+b5YneÑ̼áF¹ö_›Ñça¤#†šn( 9=¦}»¬€Ù“¦èº$I!¹= 8ÜÑM¼üFR"e‘ŸO/EôÛÇ®ûDXL€Mƒ•J„€J˜©h “’RAÍ×Tݨ"5ůá)y£'ý°oìµô¾ß6WƒL7.ÕÀQ^xÙpow€¥ŒRê(Š4ÕP§ÜÙ„ ðÓ¨Þ¡ŽLšz`HR¯ß’Z C2áHà”-‡ª Än“ï^ýþ*$æÙÛ!ùU°ðWžÞÚ½%bCÑ›à8þgUb^Àc°ÿXRɬ";Ù¸?½è #@o í%Ì{£ø1³%[Ë”,z:‹„úMƒÅý¾>«âû«J4¢T«{Ë÷HúSÎqúÏWÅ4æÑrÓþ·êäοvÓþ¤7–ùäU“×ííLìõäÿ›ÞðêL,Ó‰ã¯Æ_&—£atá»w±ç93 ƒüÝ2ߤhW`úxê¼ ÏÞíòl”F'骃PQ¬ç±[ì¹ÑhŠþ4Zyò‰(N5Þµ˜( 4Ò@Ô:) ¤ZÞE£ÛÖ±¥ÑqMÿº4z£¢¿DM¶4šli4y^f/x7ÁÈÿ„¤¬N…gìDöúq_ÞªWsɶ¼ì±¼Œ¾8VÆBŒ¨; ñŒJYü”`ƃçìÎàfÛ:¶¬ì6½%»{•ew5,Aö²`ÉsÑK?<á,FMt‚hÕ™‚¹€[tº‰N÷¼““ôå¥ÖuTaëÂËH‹ Šù%„ÑPʰ– J©õ]øÔ¶Ž->µ°Ô•0ÕøY¹„¬°_)æA˜9¯xÍ 5v@Yfi Vå=óâY`˜õþß»‰ö J¸’66*¯“úÿ£st~ãÑüz€– ÿUt7ë…»^Cá5ÂxØn ˆ­•‹æ×ó[#Ú2þö+‰ÕÄ5\.PßóÀcVâÁ(ÿ’ ”ÿœ²T”Üe?»ˆßˆúçÙ´ˆYÝ“f™úK Q£\ó§.·6Ëå j²´þ2¤ìo4âçmî'^âÈý‘¬ËçÓáÐOªìjPçðåªôý}›õ½pA!,V2žf½¡E½Ê\_M]s–±¨»ÁÈ”œ;;§£WñÁ•šxÆëý£¸ |2ú£‹/±¢°\­¯Å(BvûI­<=Êmýdréõlâ§x­†õó©|ú¯Æd‰ƒ_åõѺïúÓâ2ü©½¸ÛA¦cZ¸Q!–[ ô$ËÜëB–)ûÇÒ+¸^R†äÕuYÇu?×ñk&â ½r`€·T§ýg5õ†W¦.BÛeݱ ÿ«˜Á§Q-……äøLšX}qåÕ®³ú2Þý0*®>—bÚØñ…m[Õ_ØØüÀÏÑ~ïbè>b3}çÖÙ‰Žj)¾„æúõØëXXFWñézcЇÆõïÄpâž¡½B_Êá… Ê[—‹BE‡±ÃÓA¯´øŒÿŽu0í›ÿÆÝÿ*5&y>ÓuÝå«A%‘•22iþ=-&µjŒŸýÞ°JS[ixX–¾¾°u ÌcëePñW\ž(Ùºò7Qk}yé²þ œ vÖ=ÁJ¦±ŸK¬§TéU/ŸÌžêœ÷íE8ôPÎØ°®Æãm^©§œNfláE™òÂxqÆåð° ù¬å,RƒªùøÏh¬‡“²è¸›¾FÞå—Ý­þÕ×qÁîMÁù¹œã‰ò¢:ÇÃ^láR‚ò/Ýÿ\u¦°%ç&—ÃR®k…–6önì‚õùÉÕ/uRNø)ª à¥)-A_-Çå½½²ì0÷“¨6©Üx4­ E}Û|<)IËʦf“pœÍuëGê÷?b¤º½H¦ ≠…ì–ø¿8ä /„ÄŠÄ[¸¯õA’oå¾àj÷Õ6ZÓ> ô×r_)zÆîkéjŸ0CžÚ¾—wY5è®4ÁE×Pcpí·jªð·†…~VH4dz¹ÝWÈVÏw1ƒ®4dK7fµWyåÚûÎ1tÁ‰” ]ùÎ ¾f-ù¿†×¨Ð»F¾ÎVYÑkô_à ´Î\Ö w»@+šÞ¿ákK4GÞ Jîé&¹©=DKLgØtB•kk¸žš5,z®†Ã›±œ·Y1ª¹ÓYòÇ3ϺÜ‹(?\`?æÏ]RŨ*ÿ²ài+–s““5ùÕ‚§Yò‚ñ«måWgL§â* >4£Y7ùWÍ]*Î6wŸ ì­&œ3öãÝ׺0N6p™ò#ÃDþkmƒÕ¶Xú¾Œ¦¹¶Ù8]õBHä‡6ËÉ|çz“¸™¯Ü…4ñ<6ó®Ý¸?SÓ|ƒÄó )õ½›Þõ\ÏšÕµø*àLêZV„Èëû~B¥áõá$õÃáè;ït^ÖL{Z]äÎð’N‡Ò"àRÆåq@2Ïø0²V2!¡áîa¡!?YyªEbS$D‚ˆM)¢J¤ a¥`sÊ£…TØ.ˆCÄx†ÅˆÁšú9n­{òÐÐÓYçÊRù(r•÷¿dϳ_=k::ú5 ÜÁÉÑÇón'ûtòáü¨“íw»ûï³_»ï³îþO+~ÑùµÛ9~Û|pvrðs§›}<8ÌŽÏö³ýw-><9::ÏŽNÞv>ø§ÝÓæããýŸ:Y÷·¾G‡áI£§gg´üU³øiçì༓ýøîSóÛŸN÷?¾?<8«ZýñäàýÙšFO÷¹¥äñÉñBsgÝ“ÓPôÇó³ìÝÛƒuÎö»ûë„üù°ù䨫ïÓá»Z=G¿ú/ðÍTCsxÜ휾Û?謤Ś:°zM;ë^çàüÔMvÞywX~ò}=9éÞÒ›¥ÁjÊx~öãòи²ÍîÇ£ fhí´Ø?ï®›ÿ88ù­ïãÇÿym½AcVÌä£óÝÃJ­ëÆéôp­((KÖieYg7fÔíJ=;8;¼¥ðÁáééùÂL>öß7?ït>tN÷}gëµvÚýÀ!ëpÜA?³^£œÃ³ º¾SÝÎÛì sÚ½¥Õ³ûO³OöWL´N%‡‹®²‡ÛÔýÓ‚!¾í|:ôöãMç§Ãã»Ì§³Ôͳ~R?,Auva‡6—Õ]ž®!ŒŒmà\ç½ #Üùxr6gŒÿ±_Љ÷qm^Yà¤'I?LI ³ULç’}[xÓÎ(ÝÓ½¤Á’"SõoOÀd™`68Ö m±ßS¥\©p+@R+G©˜c­(òßÊîÕT”‰Ôq¤ÖPXm¹²c,($ˆBô7Îeb˜ÁÂ9HSŒeê05@™@˓ʄwQ«OãÕL)<Ša¡\ŽLIšÆ²(>r>\ªaFÙ6‚|õµÃ»óàßÖ7ïÖû¶ db„‰Q„0ÎT"©…\¥!‹ÊàÅ-÷Ç/X=8M0!˜@qš ì@•KëºÓƽ<ÞDÜ–ÇS{•€”©«÷ÿç]Ôû<ùuð¹{œO¾|Žâ.”^Ø ÆKèö‚ÅKÅ{E1½eûäÂo«?F•)6ÖÏ=B$«câç‚:Myé×î¯Ê²"›õ©¾¨Ù¯¦ìÂ;X›(­¡Jû5L¬BRä-Ç2¶Íöó5¯!pK‰ïªP ¢˜é—.\’$N£„%ÍÒÕ¨Æ|CÞdtQvÄÍxÔNn\€}Ñ×§¾žiŠcöР­$3®!µjÜùOñ—a«¨“zißhn/‚)k*?œ”A£iã­µ)–­‚jì@]Ç›¹IWzO æÕ.ÖÕ³Nmü"Î%&±’Iáü*Jœjn%dIˆ#˜²VßgÝFÒÏS-¸ÓÄúî ©„m˜¬ÔEýú¡7 Ó¦ÒAÔËš±®7vV©ÄŒ¥”(k,Oýl2‚øµ¡Ÿ¦’Cíg›é¸ÕaÍøòÔ/FÃ&‡Vƒ¼Ø{‘R­S ³Š(&¹M¨¦P"²¤É&†øÛ4ZŒ.…FF,“Ð’CŽRÞijĉ&å €zt»}Ä¿utít’†Fˆ%†Ó{¸ÂÎI¯(ígRⶬÜý½.›]kÃL°vûÔ}ÙP:-UªˆV Oñ¸D¨ÅV È72ÂUç7a½)g"(‚½[!JZ±Î"Ãps|‡vÞo-Œo%ÿmC\|î¹Éë^Cyê4Ò†X…€Î3I Ç嚣½ ð²nn%såm UØÃ¥_€¥Þ¿)ŒrŒál¿L›PUÝê#4Õðe!”Æ3 æ&"X9a•F4ñžÅ2畹™);c#ð—W(Ø—"žšh­Q–iÏN7žOs&šCí¤` ‡žÈåÍÁžià¶±Ö½¡_%\áÆX{ÜPP8ï5“°)FBI""‹gInb¬ËV[- [ ö²6‘~¹áWFÈ/|uŠEšBB1‡á²[Šäf»’c=8±Û$ø}M@ëî{ˆ\ïÚ/z+ïÿûÃt;ïFÓ¡Ù©*Úù¿ïˈ3ù•‚Ê[ H%@ b²)4Ì1áÙAˆ’õ‡ßß½Ôe¦!œª¦Bé‰ÊaˆÄW‰wøÂP@šAo˜Å}VÙtìKuó;û~0™ú¾,Zåìt?ubxgª|»áËgøûâRæñç»rý}¸GWþ;*²ñÈOÞ/e¡_ òIV„àSoò%«6~Í;j†õ"?´êÉG^Wùž½.'ÐbŸb€w¯ÒXV‡ÔBÀ÷*F­f?_~ñÚ–ýzF4:Tÿ¤°÷c0«ì2¥œQÿ“x(ŸÖ«ýPaKЗ,èË.vÔ\z<{Ò_‘,l~°E‘zû\uÆ?cëž[è¼7®cmñ 5 {œ¼yõ—¹Cr‹º1ÛêÔ`º»ýA쟡žùÙÂÛ~•Û«^xÍœ §!ò&Ô;³ma;n”ï”v…ÑÒÝ4ùñu´_Àq¥ô&Á«üÏeúæ[+6T§>ŠÃ­ãue!¢˜%(.$„ONË”à~‘l%? ˆÁp')P‰Nýú\°G®êúòj”W…”3I’"3¿  ¦þ/‡S“ èŸE"ZYvå½ëlìm€:¤ÿãéÞC÷&lê8 ÛU Á€Cè•*ü_!¨×(q\ºäÿÙ»Ö§¶umÿýü¾|é93$Y–%fzç¦!ÐP’P’ðšéddI†@ì< ôÜó¿ß%Û y’ÐÒnàúÃÞ%¶¬ÇZ’Öo½$#Þ\BXKlsIT„\bì ‰”+}„/”·*jÝ:ÞAù yšO$hN8Ö™}vuNÜQ0yc¼™½/àw­Ï^ðóx^ÛVo©TÝÝüÞŽ §†=?jZÁF)W®çâ@ˆ1*ºÌs;£…Œœ/qE1Ì;’ý8x¾Ï?™}ªšÁî'hg¡w›mbþ¶²fŸC\mÑ`¡ïÛŽ¿S ý‹‘þ3Sý=öö’ý¥ç!®uò‰K½È ã¹’€G1Y)DÖ­ã‘ß’ì¿:yQIóKhõ1'éS½x˜$¦Œ”ð5ÝÛ6aT|À‚¶HX­ÒÕº¹mºQ1þz Ÿ'¨°.„ž—·/ òâÎô·×ê`ê1’û?J²™;=Ù¶›ÑcÅaúØÜ^™¶éIÛ_›xÔ¿—·éŸÝ^ó²Ù± üÈýŽ·€/q¦†ù,mØÌ~ÜÒÕ}£×¹Ü‘­V÷>N‹Ú°šñ†ÍuÛHâØ©3 áÇA©6üT‘TECb¦Éø„ÆâÑ1nü„ždh%ºíu/-aS¦CéÂYÍÍ]ìÌ™SFDUq- Ýkޟݘñ¥Zé¹GPQõøÄ­W÷wZrرǘ=†ÞL¿˜€«Ç£–KØ®TkÕìß4ƹŒé™h©Ñ}¢Ø]û±P8l¶ô|‘[˜Ÿ½q©xš÷]kéêÀ&ãÞu[öéï¤ÿBwV@Û‰_Ö²‰qö×(fÂBôØqk Š¿X ƒMFÞ74$‹¹w g¡aðLhH‰÷æ ¡¦2"DF.3¹ÔÓD˜ ‰òA€©È¬>ä~Í:2h˜A׆†š)Ÿ0©GŠEA )öe ŽT„( ³0/ò “¾4\3† VLfòõAÊ ƒ”¯RŽBÿ~Xy+ï;oT.;Ñ=V÷$P¯ÿÍ©Ú~:°Ø:ý¦m#Ý]·'`µóñãÈâÈ*p°Ó7öP^ÇV¸ '/tmã+†·há1‚ãqgðvÞ>óâqLß å3°ÑITGn¨­§Ôf|Kb"ëÓ¾Ña`’tò§àíºudð6ƒ·¼Íàmo3x; o×wi¿C ì ¼‰ðêXÕ7 ?…?Æþä¸3ø9?4èÿü”,Ây`E{o•Äå6‚OQaS‹| [éx_³Ž ~fð3ƒŸüÌàg?3ø9 Ãè&£ïعO¶ž·~¦ãÎâ>ÂÏç^ñôá'W† Œ”0ì¹4ŒËm̦ „ Âhß Ð*ø¹nüÌàg?3ø™ÁÏ ~fðs†±MîÓ÷ ?ñA ­ŸvÜ~?ÁÏ禽EøÉ+•}ê".¼àJ$™«…‰AQò{ü\·Ž ~fð3ƒŸüÌàg?3ø9 Ãø&O¬€ï~¢-ÌŸK“Ž;‹ý\?Ÿ›ÚÄ|úæà'¦AD9Ì›(PÔ¥FJ7B¹*`"Ф‡©^é|_·Ž ~¾3ø™œ—áÏ ¾þ´¦yü¹Æ±ÿ³g!&Œy¼ô•¦uÆs ٠ʷП@ Å#@2éÙŸñIÓïÜR.¿Ó–ª1ª$’;˜íxf‡Óäï ™ò#Ãɯ'dzòyXyÑŒLï»ØøCz>Ñk=[ì˜\®¹;ã¿ ;ûK"ÖÎà§jÅù[‰dÙ¶’yœ¼EžÊÞ‚^ˆÍ€²÷ŒàA€.Bðãqg~Á?7{ë-"x ˜Fs߸Ì(äR¢±Ë½Ðw W…€„ì¯ Ÿ]³Ž Ág>Cð‚Ï|†à3ÿ~axv§O}ø]ürNNnÃ}1¸8;n©–¸VŸO‚bç ¥ˆÀª]n¯Q³tzÑ.µ÷nÊ»¥Ae·ð½RE¨Rûúã°vóPj”kWÍ‹Úq»²¿×.í×ýbó¾z·X yŠ[Ê;¾ ÏrÍ£jñ{ùÇ9­ÔJ÷¥ÝÒ}ùúÜ/vÐeéú+üÎ¥ÿ†¥|.-WôË?’rùöü8ÌÃÁÃÅŒåìàú¢ZÅë½öÅõÁÕÅ®íÛå÷RífPÞ½A¥ä—®nkuzÞ®£‹ë««‹ëO­JµØ/¶Åƒ<Õ‘Þo ÊèüßÇc®)RÙ½ù}‚ÿÎI¥z Š»_éc?s߯s—i¹‡ ü—ûz{}qÚꇷôþÉÃ)ßë3Xâí“¡wòpNê1.Úçç§_mßh©Vðk_ý˜¾µâÃEáÊþA«¼NÏOÏï/j7ÍÃüÁj·:gÞñ-Ðà‡Þߨ¼sÁ+__ú¥Ч9R¾¾iFÕœWºÎ=Ò´Jï‹»i¹ë¯R‹Ë½ ÞWjçKy_Ù-¾"Þ&x?KSZ~E4-Õ`^-§—ôÍÓïðl9ÿk…×Äÿ‰54yEü¿.åü¿ñ^ÿÊ“kjŠÿ¥øYÌÿË7œÿu¬peÔq5ü]­6ò…ãZc·xüqÛ Ôö£h ªÛj·‚dÕ®’n8ìè–‰è Ûm9 `^9‰ íí•32õ±ÊÙ;Š‘@Ûò¶io*¿ˆl6>8ÝŽc¡ˆóÁã ”‘-îma"–àŠ`õ¹ ýþÕ7'oUP $à—óhÐqÝ™vvùàȾóÁâŠÎ}s`Aöû AêÄp¸°|æVÎ[ à±yÓÝŠ:ìm­Ð‡¤Y£¦Z¨½sÓIì§Nl®«~nˆ-ñ¯…[݈µBm©ýÌùg¢¨¶ó/§?ŒÕÎhØú¯%õ¯¾Z4&æ< -±þgŠŽ­µœÔ° Y¼éQÿyØ0™\[“jl>MJPÉm#ûCÐCœîpÚËŽs$èv €¤%°³Ùçÿpœj=Ÿ/T«;ãilç4° Ö3íîÀ8ñÜÜúÇâþÏòþoð<ãö÷mèKwØ…eteo;" 7$0>j(üÅ1w­ê.¤ÚÛ¹·¡sÍAßA[ˆ’EK‰×qXÝBƒ¸-<&“M:Òi€ñSNƒ–]¶ÝÕͨßâ¼ ¶ãcX¤£Zåx¢ØÍ l¥®}ßëÚkž?tº®5´Ô1O™‘wañ'+G’ú<€‰D}—zˆº<ô+0öö5öÿ9ã¿D”@& B BMà?Aèia¤`£3%C/Ò\ЈP8aT{Ê7&úãÆÿ?·:º’WV?ßø|ÚÈÕgœ5J¥3«àç+¥£z­Ð8©ÖK…F®VËå?7N‹µÏZnA‰ÂY­PÞ|Q­ä¿j£|±Q®—rÜÞ^±\¬O}\¬”JõF `Ú!ü8®+“¯‹¥Ü~¡Q;?‚”ŠöÍDO«Õ™4ùùq¡š¯ŸöN&ŸîçŽ>óÕ´ÕO•üçê’Fs§O|Y®”§š«Ö*ÇöÓOõjco7¿ìU5WË-ä—âä›2露7"Oé x³RÖ˵Âñ^._XÈ¤éš 8µQŽ»WÈ×5za¯˜ü‚¾V*µ'z3ǬÉ1Ö«ŸæYCñÂ6kG¥n¥Ó"W¯-›_ó•S²¼Gyø½´^K±Ã3¹T?¬S².ãÓqqéPH-£Ê<ÍffÔÓD­æ«Å'>ÎëS3¹ Ï'çÏŽsPgu9ÕŽk‡'n·ÅÊòÅ.ë%Ä)V§FPƒNÕ »±6ñD«Õ£ÜÑqãä0W^0qÈ2’§¸h=…¹nV Þ†5˜ÎmÕKÓ1=™ÚF1^h Å›þ;#vŽ*ÕGÄhg³Ž+ÉÛ–’¶$Yè-¸ nrd/œcH÷»ÐÛ<ó Á DêÃk€î``N`¬)ºZ €Damof÷\ª8u…ØHȰ&$Â?{¦Zè3Dœ¨ÈSXexh|Ïó„­'•|ä\"Í´'¢ûçÉ òËQ,6é—†Vx´úéi¼)ÙW±{Ùj–]€¦‘ú/zëÁ‰Kèn[6;Q#GÞDÅîÈ·gƒ ÖjX; Cxò(õ˜5°ÄÓ¬mÚ!ôÏzKÓNîpÛìÅîžÔ_»¤‡ºiÃ2’Þ3zp§ØQ-On*_v¯£è˜åâáN}=ååÉÂH¡±‡¾Ùï—;M§Ë¦=þR®Nò|R& ôã>_ M™Ôu›´oP¨–"T c`dB‚}ŸÀÊ1,Ä¡g&ÛïÅ[MâbO¿ö)tU„ˆøT.i(Ḑ M~r5öíîeÒÓÑ·Ýfg0ãR¾lYGïÆ˜RÜÓXx¡O”‘TzŒ+ì›+NÁ¯¸$¬±^zJâ+†ÙÚˆ¥Üå„7þQéÄ•{­É¸€¤U7å;ªcÖâGy¬vºÎ˜<Ë¡4(qÒÈHLÐ|"бôÅuäS:7ˆdGø•!¬ÜS–äÛ¸ÛD³w}¬CͨaŠ<̽( Ah*©²»ÉwÓ ŠIþÆÃ’»f8èAû &„!Í}äÁvåE‘B)˜I(bža¾~!'Í.]ÃL°õØ;×}ز±Œ” ƒªqÄ(ìKÔ7ž‘óápÚù—X½g°Ej%0 ©b…†ÒPî…"2D3o’¿£0³Iþ¦ãŠÅýûf4ؘØ/¨öy)¢45ÊG‘¾Œi¾…â&×YxtòÏu$íʹ03NÁ)¡µwP J%lP’Ú÷¥`*û29é²­ ¦ß¯ñq²ˆ‹sæÁ¦EÑ<â píJ3<µtµÀ:Ȧv„„JOÍ—±1ñ‘–XûUEœ„Ѿ€M($ „ ÍËÐòÑŠ¹|ëçkM…C`Žli[ù%} ²QÀV’zÄçÑKLûg˜a×àvˆ©t0` Ä. ±›>ã(K_Mr{jÀóTxŠÝ¡ì… ´Mì¡¡Û%(`È*…#F…… ûÔ4ñ¤µú ”šdøü ",5 “P/Œ„ ñHÃ" æËLÙñ0– 2¯#åCb×WHš(Ê S6 ›kÀÓœ‰IVƒBê¶e€\o’Ùc <ÅkeÃ{wÞ¯aßí’#kæ—ö$ï,€’<ü¼NZ]K^‹Ùó£0H‚ºšÅWžL}cíù2ÌNDZ|sbOàÛƒÖêkÇâÐðF*ý¿ý¼‘ÎÙë;ÚI+rþý!±ø0­h Ú aŸ”„È 5nh¬YÄ k%±ä·åŸo¿'jĮIJÐ~ u»ÙIbMÃ[øÊVÃóö`?à[2eÊIRBbóÎ0„víCuú¡%{±Ïs/ѳ?¤†gtå¯n¿qÛ…Éû|díK¶¢noЇ^ÃøÂVÜPÚQÝ)ù¶[O¯ ´êíØ€Y;¦ûxwRŠ5F&5k𽋭Vã"·W@m›4‘R÷±C£"}si÷ýQt4”ð}Î|(b ‰ò9Ñú\|{ãÊî# ν¿iÞÞÑFš6Ñè«nÜç´3ðŽ-{7ã;¢M‹@ákXžõðHC÷;j, ñhÈAbº›Éó ìÂÖ“æy¬(Õ3wMëfnt†Öòa'Ôœtœ-ãDÝž“LØ‹ÖÛ Ø’K³«}LÛ×"MÃFÑE™Äcz¯™L¥«=;Í£M Ö|rœ$«¬›²•äJ¥…‘†ÚHèR¦±KA sCl/m޼@ûˆ¦+;•ÞÃa aר¨mFÐþœ‚’Øðb ‰!E”y®¯B ôñËC¹J è¤ðáoï˜qÀ#8ˆ8w#ßJrË@¦\j‚00f ç+3]׬ãdº’ßéºfë³Ï®ÎßœJ·N/~W*ÝZm¯‘J·~BZ óŽdœu·qœÏ•îxý**”6§úÐM„ÞèQck×A[Äc‹$ôxÜïPBÿbä£÷̣Ƽ7xW…¯C°‚»\H˜gþûi€ EÊ”-%Þ¤áCbÄÚhtÝl/}ÙN^N†Á•,üä X\±°|ï½eááKxu_?Œ`‹á­¬–~›ÌÆ]ÁÛex«ü néµM…f‰¬Ék¨SËf5d!€¬†ÉÛ–Ž@ß>o×­£‚·¼­àmo+x[ÁÛ¿û-½xk:÷?¿,£1m_ãwúû»¬je(»º® …nzÕ×6¢PMÄÆÛ«›Ø- ¸5 ºÂñ‚,˼ :^õµn ­Ph…B+Z¡Ð …þÝQè ¸}Е» ?EŽ/ŸdÜUøg)üÜ𶬭„Ÿǃ®G«"Uc%ÐÕ¬‰LTNTÕRLÙ| ~®[G?+øYÁÏ ~V𳂟ü,Â0~_wÚû©èzüÌÆ]ÁÏ%ø)l¸c€Ðö]ÖÊ+6¯[†Í"SE¬$Ù2«ñŠ€Ãေð™!~ƒ_·Ž ~îü| —µVøsgð§À½Üe­Rüðe­¼óž7ßüÛ¹¬µÂÉOzY«À=óe­¯~sçSagIúÉHÚ,d–ÄÑ&šåkæ4ˆV}8ˆVö~·ýÇ*Wà³qWþïà%ÕäLVº¦Z2+!Mf QÒTÁÑQåíGüºuT¾ð€¯|à+_øðÂ>èÞ]ÆÎ_êüÎÆ]açeì,l†á[‡9N´ÓD¬¡Y ªyƒc5$s¬È‹H3E3yõ1ì¼nv®°s…+ì\aç ;WØ™`_¨ï°Ó9}åΔ*Y®fÅƈ¨†f†?òFb{%%]”c8Œ»6š¸9BÀóÁÄ6ÊòõFÖ#'ˆ¼¸¹„éÛ](ñóo{OhCÉbÑ–˜1´véD‚Ý3USÃÓ´Œj0›èO&ì Mloͼûãücãè¤ý©yüá ?ôÑÁÝxìÔ@ò€,î»èJüp;6Q²ö™¡Å°“‰*&Œú |)G,ü A”áK£@Ó²¯Y 4œÕ2{ÍùÇóË‹Ð^Û3.góò‚»¹úâ\‹yH›Ø—2<7ÿ¸.Fæ±ß\z–§¬Ïj3øâY‚Î[~Ûk8·uÙä®;ç³ö ·/ÛîõÇÔ/¼¯¾{s|_ ßåÖàp~ÒiM[ƒßt§®)~Ýð:g\òž%žöÍ«C÷ÛYsÖ¾»–H¾ú÷y{p~× ¸^kðžé¿Æ¸utHó5åö]’ïÈ¿?4ÿ2¿¹‚±\}Üœ5õæà“Û>nð­ÎõÝ×ÎÅàÚoÄíz¿9ã¤kÿÔÿzÙ¾…:¡·w­zSjŸ5£¦¯ÏKÛ±= A›»¾ä§dÌK8©ã|‡\kpÍ·æ_ôfý»´èçáìëà°GóÁØ-‘䛎7—^d ¼g_̯„öÔ¾‚%î_Ü™âÅüZ8't¸œöۆКsüµð¥ÿµó]j_žÇ'Ç_no\~puBåÖе~î~=ú2±|/¸OG@ƒ;ûøSlá17Äö ‡óMÛõ¦Ðî´\çìúr¸ é™4mÖi¾Á-Œä{sÒ¹^9÷'õÖšûÆ<7÷÷hÚ¼š¶:ß¹Õ|ŠûûføhÐ[=ÿæ[šù5%·;ohþ0_+çÖÿÛ™ÿy;¿¦ óÇÔHæ¿÷áÃó+WEbX~Ÿ}í5N;ÝzóôÊ­ƒ…j ¦[ uè› YmÖ2XsØ" 4= Ì>“èÐ(óW.éÔE•ËWÅq:w`Œ\|aä 2Ú{Ç Cæ¨Q&Ô4±Æ úƒ¸âAßlõÿdް Š<1 ‡—ÚZß1Fļøâ3uc ôÖïÄqXÚu)¾bdxto‡5Ï/Í‚>$Í"›ù•Z¡øn¢}&ñŸ2Ä]wö¹«×ôßJQeîñF°j£þ3æ×ÄPkç7&³Ó{ÿ»^ý«ˆyŸ†˜Xÿ_ c®5oÎP@I³â¾¸|ŽïcØ0a®Ú‚©2ô·”)Á$ïúȈÆ`‡0Ãq ÖË{æ›DÇ,vmÀtº¤ÿÂ0gçGG³³÷cž†i‚…Èƈ!¼Yû¥¤ÿÒ>Ç¿þ÷J²õnŸÅöG×ÚÈû}ñ“\¾ö!uEs5EÊ> dÃ}õÏ¥^oœÙ œÐÄ®Ïð5éE? lx+‡ÆÉ:òï:ðÝÀõÇ~þ“_ãJò³ûùþQB»ðκ戶 †hiޝ· ‰s$ñª&|[âDGA‚ ë¦ªÙª¬ðHVÒtÑí÷Î?ñò)uÊ“ög1uþ@™R ¿ÒÃBŠ,ÌszóböÆv#’ÐIåmó¬ig<ÊJø ÚÂ9$ªŠª»¾ÙM<8Äö—y!× v¤. I¯OߥÞg-ŸÏÉ-5â™Á5Ô¸bš.-ÒI»i:WËú“Þ§*'㱦2LBüÒxuÁÐ ÑÄ÷¾ÒVWÍÅjoW5Í…Á©º©h+*ŽÎJ–Ʊ†%:¬‰›3-šª„}å%OÔ÷EÝEý*•…¬’á¾k Þ¢~7>ö@¯l¥`+ûZ –|üÂ+µ›uhfycå¾(Ð Çð‚,*œ æ)ùm€õ4‘BœŠû|ãuq„¡74R<޼g·;ñSEKÊÑP5u=&ˆ*âJ€e8$t5B«)5Ó”®BhG œÔøv}Äž}ÄNÈ‹ lé¹wØJ;Ž†Þ°7'YÈó25õqœÏ†(}÷Î6y"Á£ø)yû³É"$’˜:ÏñÆQÿ4}WÀ^!¡³ß2Y #d±Vzøa Z@hÖq½‘zÉ,©c‘gߟ‘dÐÌ´ ž<û6 +Õ$l?5ƒ¡Lì´\Lê¤nÒä"afÎhLÈYl“Œ’8RR}42âÐMÖê“8Ça4™&ÃD¤;£Ê –Ö!Ò¼<ê¹½òâGцÓQˆød›ãæ¼tJ°YŠ«ò‡òöÖ±o; bÀl¸½ÈêA±¾Å&1¶Qd&Мtxì»ÉŠ÷ òwdyþسÿE´ÌÔìÇa˜Ñ:íòħÒ JŒ®aÆQœ’ÆðÜ ’)…ƒ¤ô¬‡bsB&ÀF 3NLòÉzþ’œV^#TóŒ¾Óõü„PÖ+›A:¦ðR‚jý„¤7Œ³·V¨y¨gXsʤa‹ÎÇ )yv²Gˆï‘émÎ(a˸PfýK¸ÈôióäÏpdqRtä’¦g¨ü¤»ô¯5#†,,x¹‹¿OÈ9 \ÒBß`“_–7¥‰P"ŽC;4‚d\³$nÝ@¤w#¯>`./¡IÂð¾Q€Ñ$+Áê³–1Jb\ݤl¥K*´AšÒB„Þ(ÅÉb² º¦2&u´…™úó/bLnfÕ?¢¾V{Y^K}ñåêKlU@à †ŒÏE6«`ŒXxÀœ–ˆª•©¯ÕÜzõÅïŒú*JºT'd’']ß÷ïBd¥B·t UC*ƒS½•Š *S±ÉO*‰òl±î©d£‚g…ºÈDW*4 ’Š¥% ³©VÍ´rª}2´ D!Mu'_Yc÷ô_NkPéJ¾LÎ&Ú$“þÜ@Ek¦²–ÔmVäµN×&*h!y©(Í©§ep“jˆ¼,Í! ¯„¨jË©ž55WNáe(§ 6)¢Z({ú8Ó¬EÁ]”òAýP™¿PIQQýRдå,c²<¾*hš{Z?ªh©^ÍÅ*9<”Á¬eü•bŠÙê³€ÞRÀ™¡P_«ÝDúöDƒ$öö–a.Š.6BX{ÑïDÏ~H\„ÄÔ-¨öº1u¸ºöÌ1uЈ¦ˆÏSGê_qúÓ3ÆÔ*Ð$~{8Å~ yrs|Ab”¯Ä¶w-èã›ÏmÇ>Ö¹ëËižy38õ¬̆pê‘¸Û ýîæ²=1ýÓ»+ñtbŠÐüËÈ pL²Lã›rË•p¼ô¸ÕiοÓV}(ŸÔ{s||º5]ÈçC=Wyûø0ž Çn›Ççcœ‡ŒãR¿%tó½[H_/.yp(µë‡I\r1¾[<éw˜>Ô{AâºK¸˜‚|k½L<žÏ‘k\ʸîq? tñ\K0¾9ž¿VýP9éô¤–‹é3»9–0ý¡~j_z_;‡ãkñ4‚yúœo®ú0#˜?ÈÃáqĘo0=ŒËSH_+Ž]hÕ{\ëDZ·Ä¥ýsòîpûù±]¿]Ú?r¾+ü(,ï79©ï ?ZwKûf»ÂÀKûY¾ï ?ÊíùÒþ—»]áÇÆô$¿ÖîÈÞ”]Û¼µ<6:o;´¿f#_×ÀýX¦ÿ”-è‚ò|¶@Yý/a ðû’¼¡-ð–ö×þ •-³¾®î<¢«ÏžEWÏÚõóù [†¼{]={DWÏžGW7¸v§¹Â–!ïž@Ÿ5ÑgçÑgï|Ë]aËàw;À%¶Ì®ðc‰-³+üXbËì?–Ø2»Â%¶Ì®ðc™-³3c+±e’±í’-“áÈW¶e ÏoËðû²øŒß5Êê[F׸-¶e„}^ز³zCËèY~]˜Çhè¹vÂ.\/ÝÃH†)¾‰ðõ·¸‡QÚðø`]ª-ŒÛ¶…qõ²)%OwŊ숖űŠÀáh4ÛdMYamÉ,„#‰È áve Ð4XüÙ—{g$V*Å|Èq`š¬99ÇÕuè”íΧ¤o]¼/ ¤çpœÏÜëôˆÀØð˜`ì›ÐÖÐahD“î± 5ÔHTUàæÇºúxçÑÞ¿ÿùÏ=ÌCðç=ÿ¹0=¯}üH™š¼åþ¢{àh7C„CÒÝ]¿¿‹žzˆE¹‰˜´Âçêpv@§ïöÈ´`ÝÞ^´˜EÚ[–3 ý§í.9Dq0íòA°?°"Öeðü¸„j?Þö5œKh@IÉi°Ê{™{/iÿÇqï“ ôãÂñ¯6pR!­,\ kM}Ë: §­º(: u$àTi$HWA‚'€¼ÌI&Ø6L°¼ZD¢…8Õ°EV3U‹•Ib5K7XK–èµG¤Æ2ÕOäh ”2÷ÂS‰÷ÜàÖíúÊøo½(è±®èn ÆH¡Ç1¿¾è‘`-àF)¨mLŽ3ŽOfá'ÉKP •,Î"x1ñ¡ã94–)à.s΀Éˤgb3Ó¾ëÁ#Â±ìØ¶ÀÀŒ†˜¹]Àmº¸ÃјNbÌN©ÀsAìíCÁ˜qcÜÇü uÓƒË#!ºt›FÒ«Á$Çšc$‘„ »C»l@9º>b0 'Ð7 ÷YF¤‹=ÇÔ]˜o‹1z½õ2Ú>Ô¸ «·¤ÍkàSØ섉â)BO‡Læ€ÀN[ÅÆ>d…™v±ÃÀa ê ¨=Ö1éK®ûxß}¿œ.ŸÆAâ2ÁÛ:0Õ³öªsG0—¹â ¹>Ö˜O@:º5eŸL£ïyÊ1IÓÌÔõ¼\Ý8'LÂ8ší:ÂDMAC´6‡$/¡TC^䨧d ñþŠ}†&>X€,â2Hq1yHsãP ÔÜóñnr¿DòoPl½ìÉ‹„B“Êîw!KOŸ¡–¿JGh$òŸ»ùô¸g¾œý ð3ƶŸ›‡vñeÇE.·£¸oaÎq:>F°YÕÖVÒEŽ5lM`‘‰mÛŽ¡KV‰e—¿È€-’•ÕdAuNUS-³‰VJ¥þ&`"²†d!üãÏ¿ž Ìþ4ŠZb½]æeI’+RXIÓ$Ö• Õ±-ÀˆŠc–£h•Ó*ýü šR½4ýbèuX#¡_b ?ºL{wSó!+xÏŽx*ÃàGÖë[?Ù…¢‰°‘:†¨(¬ š q9ÿÐ=_P™ÏhNPߘõ¦üC¹ª0FàdmFPôÆ/ë¸J©m›g(¿NJ5Z>C‚ÏVHõq°=Ž]/"­wÉÏ?™#lºŒ¸BCìHÇØ$'ËVçE)5ÉKÛ•Ô×ð\ÿ´C NypL;*”€§ Z±»)h¢Å©å|Ònœ}>éà©g¡ß¾/b>]1"9¶#sa ·ÚG²¶é ÆöÛ6a¢EBš©#‰u…c%YŒ¦X2Ëi¢ª’l)ºµ"$@Ñ+!¿•–ËÃË:qÏéÏ–ÁNITDNzpfñ|k´ëÍöñÖY(¯!V =|fE™Ïž8yŸÔ~ZOX<‡Ù´qËEké¾2(ØOÆ8vãÐíõÈuÕéY±šÅÝpt±ïxQ4wÐTZY ¨e) ì¥gZù³x·Ú$™W%þi¬6y Þ–Õ¶þ¼ct¨­ÀO²ò6ްÝ£Žç*_åšu༷ NÚÇ',¨`Á6Á‚½t6²\,ªX¡n€XnïùÐÂ0áâ¥èAÚWÔ×ø6übèçJ?gã®ÐCz6E|å®ÐË¢²MªQoÔ+üPᇠ?¼6~xÊ/BB×|0Ðê/BÒ¾*nÙFÇ ½ ¿jÜÕÎÇ ·T¸¥Â-n©pK…[~·¨Û¶2¢ó{"gðÚþ°6 (Ý7)¥§ W€â)ÏWÛ(~be­M÷ïÅ9n`cZgwú½Ü!d< 5îÕÎ5HûÀ/õáåŽ*È÷kÄqºî8‚)R V’ÏêšX¦Ì;² ª¹¨´M!ä3 ±ž74¦ŒUä¦lN“¹Lî¾OÊSœŽ©˜æ_šOÛ¸öÙ;·Þ6Žd¿ÈìÃáH}¿p,|gìÆb{da=}Q¸áEàÅN6ð?Õ3CrH¥¡DɤÕû°‘‡3ÝS}©úªººgµÏsï‘wþ?çµ&ç¨jó% ÿôòÅë~xùª¢áƒ!\mú]¶íØC‚Ü=ê_ǹíæÄ\ÖQêó°øa;iw*ÈRúÄ0a•‚"'Í0­¦S#¸$LI˜’0%aÊž˜²7{ÈØÎÎÔWÖÑòöCB‚z~|þöÅwGÀ=•ü_(÷À‹&7Ž Ër2ÂÐ_—š°úRf5o—Û >½LXÒ)à“`)ÁR‚¥K››½(=.(5<ÎnZã$OmëÐè £ÆCÄ—Ò¡ôôÈQ#‚Ó‰¡ „%J ´¹½-Ð ´L-*´1ü·€ÏÉE²ƒOù ¬ÖQ%ݸ5j)}â¢&.’‰‹%.J\”¸(qÑÓâ"Ý!ìó¬·=.ÉF.ZJŸ¸¨‰‹tâ¢ÄE‰‹%.J\ô¤¸ˆã'¼™¬õ:iâ¢Bú´ƒlqœ¸(qÑÖtúFùÕ³DG‰Ž%:ú¢éˆvYFHñ&:ŠÒ§½i;éˆ&:Jt”¢F‰‹%.zZ\Ä;üIDn⢥ô‰‹š¸ˆ'.J\”¸(qQâ¢ÄEO‹‹dGÈS;ÚùN\D›¸(JŸ²ŒvrQʾN\”¸(qQâ¢ÄEOŒ‹tGª'}‘l⢥ô‰‹š¸(e_'.J\”¸(qQ⢧ÄEª‹pGò§‘z.¢Û»Ò*éS¼h'¥¼ëÄE‰‹%.J\ôĸHt°O‹¶O½®KŸ¸¨‰‹Dâ¢ÄE‰‹%.J\ô´¸Hu §^«íýhué5q‘J\”¸(qQâ¢ÄE‰‹žaÔ¡Oâü"Ý”_´’>qQa´7‰ÄE‰‹%.J\~óîÅ‹—/¿yùM"££#£è÷·"£Ù`>ë¦EÓôŠ?ߟ½0ƒ(üɬciâgóIœ·“¹?ëƒuåT!AðÙÔƒwÍPÂèHùFª)µi%}B²„d É’%$KH–,!YÁœáS$£éßjEòë{¤TµI”t JÒŒ&H:MHºãÌj¦ªÄÒ,¬¦·ZåÊÚÌ) æÖ ™)i,×HH¯Eî #½ñûøfãT•;¼ µ_Íè*’ÒӋúèR>÷‚¿ Z¼úûƒÛµéeÛF8¸IÛ»êš5+^`Ù$c˜Î8U8c†²,g”f8/I03ö(ÝX’ãf§µfѵmæºvϪë]û~|ðäçÞd>‚Û½ͯ§‡ ”ümÅõ_·úâã­;h ’;ÑÀ!b&˜¡„§‰w›Y7Ð@Y`©oS@%TR@%Tö ¨´xìB©ùÃ# tøçË·/q—TÍ(#uB™»¡ÌQË‘Ã{0¹ëN³6PêøµA´®Ó˶.Ú>µ.iÒIœ®h?Zk-~î̓h€^|¯T0½Ôs¦4Éñ"cJ±Ìp¢3fdp:U„"#DŠfU E:ì&©‚/@ì9'ZêÜÁüàË¢-tB\Šh#<¹À—åàœ^✎͸͆÷à=»Y§A0M³ÞA3DIcÙóçl5¥^ÅvØÐä‚‹ãQ;gåÂë_¼î龜̊îݸqßz¥scãlÔ2)û'ë»Xü+Ó.wÖš„V!™B¬%b<×X"ìeYJõö÷(cC9+–9fTqä‚¢½ƒúÉ™·:|Ü*ê¤#Nr!”•Þ:‡SÆèGWA5[kž«ú¶—T;B³fµÃ!©&µ³ïÄB4àı+$l1ÖàÀcTÆp ¼xŠ‘91ƉüV…Ô²Œ;¬ë›Òºu]ç•ÖŸçeç0–Ï˨}›’b4w†¯fz¶K_ee ¦Ð«’2±H˜Ç@øùóo¿ÿ×Ëx ÚÃŒf½ê-$u>.ps‚™V"§”­”æÁrEu€‡’·cA0%”¹œ1·#Ã=V¹t„x‚‹:‡~f`ºš(ë§*•ïûâiÎ&D1JT ¥c˜é,6 ¦9ˉ za¸ñ€žÀÕØ KíÍ•¯5Ÿ@Ê`:F­: ¾l0<Ë@kîÁÁ¥jc%`3.ßm#2ßrH/þt›w(@ÎÃÀ|—ÝÿÁ^]‚c¨Þ ã_DÅõ”þô·ê²¿þÕýÄÄ÷E±?šëêÏñ¤Õ™Árgˆ/ ?‹ÿ;Œ…ÞôÚÛiQÓ¯{“ÑU× ã¾hµ·“¹?ÿôi•?Ù˜<‰é/ç«%ƒÆõŒ‹[Œs`n¦¾¬ïÖ!ªÆ’޳‘Ÿ}O~+;¦Ò£ðV•YŒµ˜uÞøE‘|ñúMöòç·Ù÷?¾é.RXBÿwx»µß²ž¿èí- ¦‹E—ú.]œw ®úÀy›N¿ÿñ‹wׯˆÅ•í¡S,éÜ}Øì­IÊå£ÃÛýê~_6í7/¾íƱ ÔúW±Öž¿z÷üŸEêÐd|@58«ŽxþK×|0ýÉûƒþìÞAiÇçâ[¹»EI=7éðËQ ×ó˵Éj… |óÓ¿²woþÞ˜ùìùÎŒ_C¥øßùús3?„ÙLžFË_îj2¾[_òt>˜ù`¶l‚(Ô›·0òÌô·ÞrűÈ+†f=_¿éÃpuK Àð7\Ãlœ,ï‰ó}<Í`îú¨âìÃx0úi·ú/¼ô,rŒ[æÔíoÅ¿‚LýÖ:l%ÞÌ\•YxŸ—óH”ÓC3Wý‘€©ÆU¼(&NÀÜÌdßd$|r¼ P¡¬µ(SÚºŒqk3ÍÉ$Á>0jˆ è6^n[Æm¼ü×3û«™1ýîí·™:z|fGåóôÁ¼}5ž};ž\Ávì¢ö„÷,s:-ñðüû*û笕æ°ãùÀƳ˜êbáçÍ“v°z„œÎÃ7C Æ1š)ðõ2¦á/MˆË8@) Êä5(MB£ KI“ÒÜKiž”n¤ÆQðÚ ëYÔk9·™‘ÚfÒâ8¸h\‹ÛtcÛ2ŽZÑ=Tp³Ålܤa©õÁÍvj|þfµS‰™ÔΦÚÙ÷;"§ÜDNb„±ÌrE1(Ê2£Lž ÏÃB ™«ÛRÛ2Rpó J«)¸Ù¢¤;71áô„LÁÍܼKpSt9¿=¸I/¸©ÜT¬‹x™ã n¶™ÿÜlU÷i7‘HÁÍÖÁMÖ‘è4‚›í€¹ù0õ•˜ ˜7™}ùÁM£ ÅÄóŒ1›gŒ(’iæYK¤8$ÜÆËmËHÁ͇Åç;7ÛhŽöÁMÞ!\õ†õÈܽ!4Ëào«?‹Ã ¾^ÌNtÁyc¶æRºÏ®(2q{_e ®Ìѧt§mé{ÏŸFÍTÔÿû¬Hx¦W?˜kaYð… â&3á7Ã듪ðïã#+?½Úä»üÈ»¸ÐmZ'¼åsE=óëåC?Oâe°Ozýbo˜C9Å ŽZ”cR«&:c«â…ÞÕÚíxñÛƒUõ õ;ÑFµå†èbøú#Õu¶º^Ô»¸Ž.–ï³ØÉ-D^–Pb̃÷+¬²¨íÁVçÌ‘Â_,gj¯=ÿ»Ì ‹±Àæê†û…WÊ2p¿úeÙ¥‹_]­yúÕ•zL`ùèz¥º ×`Z쾩Üòªë‹†mïîä( òà rƒ¤Î…RúÂ*”KC–{áñqM‰=è _Kü’y»¬®HcïÎý™4j°ûSQ´ŒÔz|OÐã'çc‰½ðšd\Rš1çY¦ˆÓYàœ!Œ41âÖ-;mËH‹H7MЖ‰ªÐ]ƒ¢¸ƒõƒGîÞÈhPM…tÇ‘xŒ~(Ý÷x´ä‡&?4ù¡É=)DO~èÑ ò䇟ÊDG¡/`%8¿ éÒ÷¯w û "é|Ü€ ?ˆSmCg,>ÓÛº÷éuM+lÙa]e“G¯ìDO³ê›SbÔdE—R|v+zl!Þ}-(¦˜œ\—^ â ƒ!Ì5*3†‹ÌH+Lì­Ç ´-#ywÎÏÞøci§óþÈЏHŽÍâ‡Fçv6žI¾`2V¿øÁ­~/¿ðUª;î48IÜeH‰1Ém¦…ÿ³(Ï5Éå…›´HÃ탠“‘¬o¨Ùû ‹q˹،ÔowRBO,\v㣅[TǘÆT×ùÀo7Àò—ºèpµÈuÏ(æYÎ@~g83aãéTD¿¹ïqsß#í5Õe^ò©\ˆzŸT><·ýÙ0¶>Ýää~ GäéíøtÌbk⡳8.´xeæn&R*(Luîn㸶e$޻ߤ¾ öbXù¨¬ÝÝu»¼ ˜2¬÷Öí ÚÑWÏÞ?‹;“ºgYÜýYîÙ¬?ôݳ U¨»D\à9&~©žX=½ÿ¬¬j¥{׃ùUTtáôbjAÀI|±öÅX7ÿè±Ç‹š]ø&^^Ø…¦'jŸˆØõ¶T\0*%Ç¿<›Î‹„a>ø\/yöï³á|0ë_›ÉìYÝtÏb€ðîéþºØ2ŸõìúÙ¯ãÑ`|¯wÕýË_žiý-ýjÓ@Å^épy€cd×ÄéÞ,Naœñٯ߬¬óoþé Fw›ÉL/ X¨ËY´PEÈ„n®P—ìóšÞM-²´§wµ”Q´ý,%Çš–Ve:ÏãúW6Û¶î5Ë·†·Ú4ï¼ÔÌæƒE€ËFrŒ@”b‚»còXÎ…–A¨ÅÚ[¯rÏ)¥šã¸ç˜|­”AN8ªCÀ1uÍÈn3fŸ;çÓ­¬5«ú4[”q±švÓ¶«‰&«b×Ë\ûŠâ¦ÖÁrÈCkKbtPúŽJ ´ÆËä® QÎúûˆp«ÞØ)Èûåkƒ%µZË`ô"mlÀXfÐZ”m±8r¡<…£ÖñUí²£¯ôYÖÆœçœå`”„Ñä4Ë%ƒ1n¶!(q˜ž.{Gÿ‚ªbâ·êäõ·×’Ûœ„ Ÿ³\å·¢â´D‡èâ=œ”½Ë±Ë`^ì¢XÑç`-QÌ2*ê½[sIÖÄ¿±wý|6jLˆ@BŠ(£!h( # A½(£‘èà²ÚsXhÑ®{·^Ÿ:M°&/ÖæH!Á@/1î©7«ƒôpõò‡˜½R P‘ÎjÌrF-W,7ž)šëà‰´Þ¿‹CWêý[ÉSO?öÃ켦/˜ãJK¼¥Zã ½Àò48“¢…Š*ÛeK<÷ö»^ |ëXØS+F XˈBŒPPÒǹÑÂJ4KIw©*~÷—q5Xt®tÀJPPZL§‚ƒgªFXà5e0.Ñøt²¦ÊVºi¼€ÓfýÐjm‰—ÌJ†”b0ø%”°@#N˜¶\V|ƒêW­†BƒBº`A¥)í—ál%bf†QÂU8İ_ pÕc浄”B€ÙE9Ž'N …¤&Øp[ïí5·[á¦îÎÍ$Ǭ¦Cs êœ, ö…íò ˜Öà”aÎÀÓ‡hªE­÷h©z‡o °q@@ &a4Úç–p–Å‹y˜!»c—!£¸•ÏIœ_94±Ly—{aã¡dÊO+¡ë] Ng64#¹I½³—-pS_Ûþ\Œ´Ö× 7r¬XMSž ZéB³%Q|ˆ¾.kmå$·êìm)<2àn€[E=Eµ”˜qª0èXlj9LgWrìVNâ& j½ î7ÇXGÓİZáÆ€üðBu÷H¾ƒ|Y¿,‡·O¬¯ä:‚@ÝQfïì{2„O-C¸6O#‹DH½´DÈˆŠ €œÉLQb2Ís#86L¯±]Qbµ²óyyßy¡ÎbµñW4¿ý£8j²ª®8_P·:6qó˜Â;ÙV„ú …²¿{Ýwªxy:c+O×l@Š.G]¦þ¡n™ ±¶àV­Ÿ' Ö¯mçEŠœÓÏ¿sŸo«F-¶?%\î Õò5ô¤)¦P† /ð9e–cj2‰5ö@‰÷l®Ÿó¸ÜC7[oÖŒR©ñUáì³ve0­†Âj8Ní¸@Ç¿¿s¾Æm†éàí%)“$˘³>ƒ!Yȃ$‚‰ n¶ˆ¢E^G²ˆ¿8vŸî¿Ñ*¶kžÑ#LÐÞ¾&»xhËn/æî¢¸Å^\^?]÷P–ú.sïÀ6ûž¯°n½WúîFS¾XK”šÂ˜XYô-ëÝdåwYôSsÙjEMw9Tì µæë³¥M§ç²ÕçI£uªßpÞ|üOë‰4ŸõÓ2K¬øóýÙ 3œÅ„°¾œMül>é:›ÌýYTN[…øÙÔÇMÍìÕ)ú¥R¢»d¢_°Rúó|Ý*öö êñ*nüúÕË7ß½~» …~(܊ʾÁЂ)6+®*ìÛq{ ÓKE<†¸,¨÷ïz›å¹ð™ÕÞQN¼V6«_…þŸ½kknGÖï©ÚÿàÊ˼˜A$SS[EI¼_Ö–gfgkŠ…míH¢–”g§ö¿ŸHJ”EÉR¬ØqÂT›\º读ÑÛÙótÖû›Œˆmý¯É`ä¡Ý³v†Í²²Ïº'oŽNÞ=©Ÿ°0¹Ýù(;õ6›‹_ÂaغåE?aY .xb:IãIÖ¿ºrI—UŽßÈÜNÜî#›K>/Z; `& Àë;o™‘¾sÇåÚת¿ß_áŽ|þJ´ïïâHÔGõW6—»µŽË¯ÓýZtg¶Ü™ÅŠ„ïOŸ•?³…õì@÷ôäÝi ºßèVû´=mTßjTdŠÝö_‹·á†âU̱›ù>"Ï-–¸6óåos×én±¹ ›ù¶ØÌ[ln±ù+Âæ‹ËN§Û}Ó}Ó¢s‹ÎÏïObÜ2Ž J[Ççûú¶=öpù`•’î¯ã›'­UÐZ­UÐZ­UÐZ (=EFïŽòþZÌS;U~Ü®W8ñ%#Z¸Þ\Ó·pýìàúk££?çû8ú#my–³jlZø‘Èéa M8 =&p4>•á4™#ô¶&Â]t}™$>K¢<(o«SÒcJH ®#¸Œ”`/ðwØWƒTW¤UôÌ …ónçôø¸{Rš ;Ãçs_mÊ´]¢ôÚ_Äêå•ßæL4¾Ã§ÈÛVmÄ$ P¬ñ´0Ký·œ;ö¸bÒÔs¨fS#*µÔbÐ-çBÝç•ídûß'”> ¤ö:ïÔšwiÌèÿFA &˜U¨v½*&# tüÒ³à;±7nÄ`ºzù¿ß i몵HøÝ a-»¹EÁÇEÁ†â|}l’Ï·íï!¿1ã×RO¾ah|d¯=t¦E¹ïåjéÄ-Ê­A¹Ùrž›kÕ—¾žô0ÚŸäs z _‘¬Sß‚^èaÔ‚^ z-èµ ÷Þ8ù@¯éTGý·} èáôZÐkA¯½o ôè>÷ŸÛƈ­ü9êÛí+An zQ{@[ zß è-ì½haï+ƒ=Lûÿ–ûÃB(÷Éê}ˆ¶]ö=ÀmÔô ‹9õ-ܶpÛÂm ·-Ü~pîûaôa/ÿk­Êb#ÒÆ(ì3N´Ø[žŽ0o1ð™bàgN­5{üJ@¨ ÉP%1UÄ#‚À‘1ž¤~äiƒ$ðŽÜ·©ïvcôlF§²ÆÙ÷gÓñËb—¼)¿,¸ËïE•´¿Ú”Ü£×ÖM×€Ëu`&0BEÀ5Ô H䌙'C$<ð@ 2O$°ÍÓë†LùbÝ®éUbEœjiî)„¡.¥'}żˆ2Œ43”E"Ö|`̲`7!òKvS¶|ÁnÙt]°›bÁªAxç‡.º30ÔÀˆÑtœ?õy Qc¦ØŒîÖšÛ5Gy»ö™síy m´ãÉNkXX…WAøxE>t{ÝGLî ï3z[œÚ§¾j8úÊ¡†|1¨ùÜØy³6ÀdçÑÉkƒíŽm^€›QÚêV<_=ð =›5ÁÏClù­W·Ñô¡ñ9É­*hUÁóVÛ~þ¼I'øyñû‹‰¸‚Áá}L³?ìªé {bêë½Å¹ƒÁ¯ˆ‹0Å¿•%æ gpYP—ó –éUäºäÊŒDÖO–/íêm<öÀØ‘)sPÓ*ïáÙñüQ¥_ÖWÐÜwôšø$Œñ{‘OaZæy2|]Þû×Þp:˜ômzÕ‹ºZy½71·“W âþèÿÔµÈ`ˆÿ8$ìÅøÓä: Ò+èìÕk#òáÏ_^4ˆlŸï⇄½^KXCìr”ÞˆMFxp€^¥¹g•P„å,»¥ƒùè{ruþ«7W‹'–Ì;Z=8 á£©rÇš-×”­Õ¹ÀË1ˆy¯"äv.AÏÉõÎûÕ{kQc-Ûî´’’óúÚÖWžH$G¡Ï=IõH2 s$4Ó*JBµ”½@ŸÕ*ôQ$ÁŒú:a˜ú>ç@’Å“‚BªÖ£! d2¥µO‚?zô3çgc@³zXðdté§b•Ú°‰¢S5I³—eÏü‰ üùó"‰§?RÍ}Àím—€¤¨òX€á?åKÉécêæþ ±ï»sÈGbP­”Ms·Ü:r`ôÂòÙÔ­­‹®ÙøîËê箚83„ÿrñ€qëô£½éŽwáÃ; Èa"êéÀ,3`ö¤NºF‰ïG<ô˜G0¢0\~-(ÂGŒ§çBúzÙ£fÙûÜp̑‚…#‚À“~È=_  A)§úK2€î”NÕɯԓ &é1æV€yg,†ÍÙ @=é$R^B5Œz Œ×Ä £RšPÂ%©³Á¶·+àÇaº‡,ÐQŠÕ @k ¯)ø¿Iß~C"b_ŠäsY°·Õ±}?ÜÁ ”OaFEþJ›‰èÜV3Þd ÍHl ´‡hôÙ™g0!Á ƒ* ðˆèŒx"ä‰/‘PÆ„÷™g›ÖÑšgë&èJ Í”‹Ê+ôŠž©~ëôF˜ yZWSÈ_Ú»@i«¦îª)¶šÂ$BÏNQùÄØàxDZë2ý"c£„û ”¸OQmZG«¨6˜©úªöZáT–618F2\ÀaÂÁ d¾'N\ê”ÇMV²§NzlЕw¦œq1@-ÛBy6ë_1Šä°lÞýHÇj4)ŠŽû®éÛ ¿ènùSÝ:¦Bc9¶“ÇÑ?tìú®…ká¿©ÁDz3¹)Ôq¦31*èºEŽha\ïÆ‰}0¸OŠ?Ôy9€šb&¨kO‰±ýAÒ/ÊŽ2DÕ”Ê4hÓ²ã·ÉÆ“b2)QΩ٠ÇsÞ‚¤~ÿŸ‹‰ê<‘0»žOà7†˜gÃ\`ItÀ6€¯Õa“§‚/Ô _›Æo6 µðõÕÀ×¢¦«0a¦yªù½¬xç*«RºSp*\áV¥‚Jý[©…™þ,5Ñ\ŸÍç}©ÙJų.fª«Rš Yª¥;f®*T¡r…¾sº"…’.±³T_³Æ–𯆥ö®4ßLÏh2Óþ vC©ZgunÌŠ:ú×°¶€ ¹æ-Ui žî7BÔuiÍÒÕA¨„¶ôTVÃ"rÕofå,ÀfiQÍAg gȺ¨¸µühÁú)uþ’J‹ªÄ—¤-­œ»6YݾZ@š%, ¿hK\Y:¥­R³‡ffÖ]û«²]J›mŸ Ö[epά€¯Uñ"ìïàüì]Å‹Ü7~ìôÝÀ…N¥ÓL™xœ¥7}yµ‰_ù úÖŸä.½1AaÆ’',­Ì7›±iüë‰- ï<@²~Ò7º¹–ð5E¯‘_ÕÒ4'eæ•­Ô®,N²t`ŒROU ­ U-s¦ B5¹7ÎáÀ§Œ»0ÂÚ#šIOH‰ìîZšH™ .Ôçň`°²HqßDç~@LD*y$±æFððÇD‚Ú'šq’Dƒ©…1nLòè1¢Ç›Á¤â‘3ZÞÿwÎ.ã_Á|:>þÕªºÎéñÙe¯ÿ|úáò¸öz‡÷ñ/G½÷qïð]ÃÝ_{Ý“7õ§¿w{ñYç(>¹<>Œß¾=:9êýs¡ðÑéññe||ú¦û.Î{G§õÇGLJïºqïŸgЃã#û¤ÖÓ‹‹n°|«^ü¼{ѹìÆ?½ý¹~÷ÝùáÙû£ÎEÙêO§÷+=?üeMɓӓ…æ.z§ç¶èO—ñÛ7U.{‡«ˆüûQýÉ °ï磷{Ž…øî ¥hŽNzÝó·‡n£kê¢rwÖ½nçòD_vßWÐ×ÓÓÞšÞ, «NãåÅOË¢!¨±ÍÞÙqŒâ`å°8¼ì­ÿèœþ¬îãY®WÖk9ö¡a$_~è•l]%§ó£•¤±¿Š+Ë<»3¢Ö3õ¢sq´¦pçèüüra$ŸÀýúõa§ÓýÐ=?„:/Vsí¼÷!ÌW¿pÒ þn§õ æ],PЃNõºoâN÷¼·¦Õ‹³Ã³óøç‡' 'XÅ’£E›æÃ:v¿[˜ˆoº?Áü©ó®<ÓxÍôé.uó¢‹ÝyKª:¾2#“9õo]Æp…åÒìLü|Ëí^ÌMÇ?̧|`·É"~%ÀZz5±Ö’µ1Ya –$>­%x g¶Ýã-Ò€àÂVʧòß`Gx“eK³fl-˜£÷ÚXOT ´¶žNèk›5 ò±Šà¯ÿy6–¤!¨+Ä2LŠ1æ‘€¢àGÆ„¯Cy’ a,¢S>2Ìßù¦tŸõÙøÙd²\ hh&ש.¬§±Èói¦Ýì—6soèÔΰZØO›DLήB—oÊ[6ŠT…Ã9‹"mÍSC BŒˆâP2°ñ Á¨^ºœ<ÞýÓßCØÜ<ö@+¹74CYøÝUÿA?Œû0ýj_ Þ¯vÎ÷KZ¯þvŠ=ú¦s‚ÇW£÷Éqï×ë8ÊJ/¤Ž±bŽ”©c¿Ù6ûy>]“f¶ðnÙã‡pUè@2a ŒLˆ$¡òƒ$ä"1T=˜«E[y<ëžKz³`ÌÂZ­ñ¥RHp©@ÆÈ72@”0ŸL(‘ĦޕÌ) —µP¹¡„1Î¥PL¸Ï† bƒÉQRúõÒ¥€Ý¶y˜b^1#=Nûå98ÎÞ¿Xâ^ΘưFK(#ˆÀ!Sˆš)D,+÷¦M2M„ZÊ8Í̕ݲ[ÔT\œÁ¥iæâ²Õ-ZõJ1zUó‰šß¨×<àÁ¼ÚÅ:{V¡4øx‰¯}#‰Áp‘À‘b:¡„,Q艇p¯¦YIÈï³nšæ,QÄ@÷Á)N@Déó°àEµLÑŠ«…aSòÀñe…¬«”Т5Ð5”i´aŒ&Í ¸Ž0LC*IX¸I»”ˆòG\2ÄFB^ì=¨’A"ýÐH"CÁŒOE"`vÏ[äïBÄ[¤sl ]Š´Ô!1¡@†ø1œHPOFŒ(R,TÒ­å /¿Vºf:ÉÒQMÀAúšQû˜`P~À(#ÉOBlÂ"o|.š]9‡Cn&Þ¥îcmH”‘$JúÌ è%B 6‚#¶ —ßÅìX*R+Žˆ$XQF¤0„aÉè×å;2»¶ ß’þu"Î?ö“ÉËš¾ š²ÈÙ}Ä(Ì9J"#À$38ÑBî‚C®ÉÍvg‚Ëþ>Þtï wèäŒ$I0Ÿ *RBS*x¨¢íh ”®RU0üNã|°pÉx‚XˆAi‘0Ð,a¸v¦r…hA¤…³m¶  .­/³X㜗HÓˆ¨ˆøŒ˜a”ƒ’ ×eN˃y9r®Výl£¡Ð@B–²•ÆÅ/A`¥OÀ¶”%»ö[Di7¶DÄð:…!À®/¥2?âÅ€©¤½@ð2Ö‰[ŠL‚+WÓ¡œrnYøB×2 çàÆ!JÀyã»`UÕê8Uø2 ².-0Áƒ–àIPÅ„ 0s7CvFÆ* Ãh”—_’€i¢3ZšPu™{š…¼.jpS½¡!—Õ…=ãÀ:Y«þ¼„\“5è ‰x¨éÛäθÓ,`%NäCe]´º‘[½‘°—©0¾w<£ À §0"D(fˆ$FÓ@ìFØ%«•SXR°" uÿjoÒ¿O·Äùßw­Û{›NGz¯¬qïÏŠÐ?A'Aâd·ñbÊ=pÅevؼ£zTyø¶[O–ײ׿¶=‹}rÁß×%Çâ*ÊfƒÁ7.5{e|ý)ïÛ„ªŠ»óU¯äæÊ*}ß*º lÌ¡ð;km—)S6kèSlwÆ×VmTü[z<{ÒߨæG˜³æ”p϶=.™x,Ôž™»þÿì]YsÛ:²~Ÿ_Áë—ÌT™66’€«2uYv”X’#ÉkÕ)@€¶l--Þî=ÿ}$%K–dɱ“Ø rŽE‚Xºè¯n´ð¡kÔ’×Ý^ú‘Š4BQ.ó5ve.,DðWD ïb\šÎõGwׯ²ˆÛË-ÿþy‡ŒÄ§¯އLD âØ¥ˆI—…Èw ¹Ë©¶wMhì…á» Ÿâ #¥AHB0ç,ï€é>®ù·¹V˧V­ã7Ÿ"? Îó‰Ï‰ã‚U¤ÏÎΉ›w'ïÁ…7oÁýQs Ç/Áýþ<¯mkÆTjîv~gËzaÃò5íñÁZ)W>ÈÅncœt(èê‘Q2:–‰+Šß¾ìÇ>÷§—ÿ¹;=’v§[[û{ÞY8Æë½Ó¨ÛçPÙž”£y'åø µöË&1~n¢ ÀwÚDR ºÞ÷]0Бò0ê"*Sa<†–^ê´b¿6ù!·¬S^U异}oútPÜKb\F¦úÚŠ‡áÖ‹aT|„¶H˜¸ÒŽÚž„ÛEµ=†ÔYVÏêàWPƒqgú›+õ!Îg“¢û¸ÿ£h*Ô“mû±ÁAVE¦ÍÕ¹i›ž´ýµ1Lýy•þÙí5ÏškæNèñð%ú0·ÀÓ† 2éÇ-ß4z³-Ùjuoâ«5kA¯Ù°¹QB¿øÜç±çN\&R«y~IMùØ;!fšŒo…,î_³ãÆOüÑ“ -…EW½î™%lÊt(]8®»¹Ó­™m—Qø–†î5¯ÇÏ.Í8wDz©TT«ºµÝ­–vìiSy'ÞL—|œÉ1íJ­^ÛÈþec™^¸–îËO»n?RÃfKϹùìKÅbÞwí~XGí^w[öéo¥ÿ‡î ¬®¶‚™äB³1vö×È_fb'é¡ãv×(þb>\$ë°ôýp‘Йܒ#¼›7É3á"£Oß»üá¢ñ|ªÜÀÆÞ»€ðDĵªÚxZ(éepqÕ:2¸˜ÁÅýˆhI&òuÈ…¢\`Š“!Ôé1M@íI`ÍTxÔd0ómÁL’ÁÌ73G“¿j^É›Î;šÞ‚“ÂcÝHPF½þ_NÍöÓÉÖé7méêº9µÿ=~<"‹##¨ÀÁNߨ[€[᜞°u„Èy#ó ¯%@víý\ÈKŸ yßá©ñ±nŠnèy6#¢®QèrN¤"Æ–BÞëÈ oy3È›AÞ òf÷ È»úqøï ޽u†ñI©˜I¬7"É éÃ÷¿;¾'hsôG@kP)s uLœAëyÐZ<Z‚‚w­ THCìF¡Ô. RŽ\j´ñc¡o–Ǽ­XG­3hAë ZgÐ:ƒÖ´~ZC}¹z½ºe—6[h¤zÑF8h]µdÇl˜[Ù¾j‹ÏÖæ|Ù´| 1žÆ£nÒs$æ}uâÞ»nö»½«Ž³h<»y`T4Ê+`ëè¹¾9“Íû6™W>¡xÃf͸fð-«-+l)¸¶¯' uÿIµõ¸îKÓë˜VÚÓ¹ã‘m+—O•èv m®›4߄ߛ×ZÎ++½T-¹Þä§V±ò Úö×^ÑÚ¢oäÚî5Rž6®ZCP@–o@Ëþ†’}ó—“,÷°°8Ö ‘í|øz𩯔wŠ»7Ï»m³y?¶67`Ú„eù¼Ù j\•I–§:nǯZN¯îÀºbÓ®šaß…ÿ÷`U³‰°@ÿºÈ×nz/<ï:kÅ»OG‡Ÿ ½rKÝ^«£Ctzü%:¡Ÿ0<»ÖGü.~=!‡WjW N«­°%.ÂχA±ó¥Ãv¹U¼@ÍÒîa»t_¼©l¥û:©!trŸ#{õË»“û³Ae»|yº[¢§ío·å£òE±yÓTôËÕ)HáVH«çê8×ܯoË÷'¬R/Ý”.Š7%ø¾ØAg¥‹o7¥í\ú¯0,åsi¹¢ÿârùöì8ÌÝ—»ÓcËñ—‹ÓZQ/>µN/Jw¥í³Û=h£¼[”wáÿMä•Ú%¶W?»?Ý­^”Éée©~xqrWìÛâNéHï¶€etr„oâ1×CRÙ¾¼/m¡¾‚Wj~Åío졟¹Û½‹ÜYZî®R¿Äq¹³«‹Ó£V_ÜÒ»‡wǤ|£ûͰ}x¯èáÝ 9°t¸9=:¹/]äX©† êù^½zQÚ>Tê_.*yÄJ¤zyr¯Û§Û|BJͽü—ë°ÝêÓêÐà^ïî ¼s–/Î<àËÔw ôjFµ…¿hZc7Åí´ÜÅ¥Wَ˽ ÞWê' x_²¿ßï w¼Ÿ¦é}î¦ü†hZªC 䯲ñväôž-æ=÷–øï-œS÷¹[ûïÍðÿ¢@óß¾{3ü¿+OΩþ_&ü?ûøqÍùÇ*WŸ9®†¿kµ½F¾P­7¶‹Õ›fn>¨F€ó`Ð @¡vÛ 4«vCéªaG·L¬@Ýn˳óÜIth¼¡ùH§>Tù8ýhS^5mÌ@ËfíƒÓí8Š8(lpº‰xW<¹‹ÛïŸÿåä­ajürv|œA÷Q;[„|pdßù`qÅç¦9°&5OvçõƒGŽWÀcó²»;†Ø\`Ї¤Y£¦©C6ô&¬N¼ŸWûÜâ_s¡¯i›×ˆÝ$…ÚÒ 6矉͆Ͽœþ0¶@£aëV«1gih‰õ¿Stœh­uç¤ûs›å{6L„kãA¨Æ[Ôû#¡ë¼Ñ6²?“Äé`Èl9ûˆnEL"-Í<ÿ‡ãÔòùB­¶5c+ÓÀ&XÏ´»ãIJ¹ñ¹ýø Ýž÷Œ £›Ð©î°–Ë(3\3" W(3 þ☻QD¤TÙ ›Ð·æ ï  äÍ‹} É/?[˜»un Éäà X[~âñÆRž/‚ˆ“0¢!&4\Ù–¨ð0#&9—HûšŠ(Â^@© "êḭDØp¤_cáeë»Åx>d²¯âchkkvu‚žFñì·g:q‰$÷„7Áè”oÂõb{tð·>NM¿‚óÃw8nà€a.ˆ©›¦4wÛÆæ³ŽOUÓþÃúpÕìÅgAéaN|t=ÔMëÉ‘Œõ¢¹P®V_rÙ¿¸¾ßâ‘O}=u`ʓ韘ƇúÍ~¸øpuºlÚã—Pu”Q5ik”Ã}†Œ-“žö¦]A )T<ÆÈ(‚=À|2¾ÂŠšÉ®ôâ(9•O¿öçB(D<Ê„ˆK¡D¾Ç|4ùuÊàøP&†luÏ’Ž˜Ž¾êÚ´íÓ§Ðg-;¸µ1Ñ8ÕXPå‘ÐH&©ÏC왇œ<‚_qI I/3&9^NrÕ¯ÅJðlâÜ7þQéÄ•{­IW‚¤U7e£;ªãñÎ ä¡Úé:cò,D¨ÁÆ‹FFb€a‘ˆ% B®#±™A$ëÄK†°t¥Y8¿ÆÝ&4< Á®‹aka¡ö…ðZŒüR¯¥ Ƨ4ˆé²€×#׈¤5Xk<)£ @š´`*` ¦’ã0Џÿ:œŽFðÖ<û«¬ÄäéÞ‹À ‰òbÊ—Ü /ô°$\‚u ×`ñ33¾Ä†!jƒ‘,O&$ ¦õ'¹›ú]Lò7þ“Ü5ÃAÚ`0!>ÒÜCQFañB… I(ò©ñ=ýJ Nš]8‡}á¯ÆÞ™îSm°ŒB©ÅB…8ò¬KÌ3ÔHù«p8íükÌÞ€û°DêP`¦ =Δ4ŒS%"Ctâk8âïÈ5m’¿éøŸbqÿ¦ Ö&Ö ¦=D! 53!G‘É ´T¯A¡¸ÉU&Þ“ýsc¥»TSpFX“„pĘ„*¥ö<)ü0ðñ+ r2ÒEKˆßËÇø ,BqaîSX´˜O48(\;SÂ>žZ º‰±`Ò¦V„„JOÉËx¯ñ–X{ †8g0Ã<‹" lê!ÍëÐòa“sñÒÏW…9Cð)‡°¤qlõ—ô$èJÄ[IF‰Ç£×ûgìÒ®Àm…™t0ð}P»Ha}Ÿ£@,q{jÀ³TxŠÝJö˜rk¨£Ü€Y€~aRh!(ÀŒÃ`%2"^ƒT£V_@©I†Ï"ÂRòAa‚­À$R!ñhãG@Ì×Ùñ0)2ŠWÑòŠØù¥@“q£•ñCëÄÍ5àiî‹IVƒ™ê¶e€\o’Ùc <ÅëÐzLö®é¯aÝPXD 5‘=8\Ä+  ¤Äˆ|)¯“VW2«Wböì( ’`n€eD…uŠŠ ÀÌ£³ÈhÈ×av:ŽÅ‹“ŸŽà»÷ìb¿ñFªçÿz…Ý:g§;ìh'­Ñù¿ÉÖ;AG$²÷Vy.£žpÁ|$.X†”€N2Êxv»ÄRÜ–‰'½­gãa+[¦íR·›Ä!µ1¼‚¯¬#6 |íóÿ²wíOmëÚú÷=sþ_~é9s£ ɲlçNç\6PvzšÐZ w:Ù’Á7^çö¿K¶óÄ š€ö̦‰#ë±$­ï[KK’Í©nà Gp×ÐÌÕ£™ÌÐÌ•¡™/}Û«¼b-áYþïRíô&ˆÉë!ÒË ÈìË (/P:åFŠWFy™»®9€¡¼“”×y÷ûÀÜ ¢(r½<‘ÞÙ ›QÈBÈ×ÛæÍÃP^Cy å5”×P^CyÍýÃSɱWðÞ%%EÇ'y”t CI')é¢÷¯#%å\Ùž¯8²A¹#† FB CêE!°Ðñ ›3CI %5”ÔPRCI_Œ’ê3ðßþ0Ìt혩 þ›ˆ EÂX3M`®÷Êe¦ ^ïµ–ÌÔ—4ûˆEãÊEBù qW†Òq…«¤÷ ³tÎ< 35ÌÔ0SÃL 35ÎRCI§RRZ­õ().ú çQÒ % ¤ö¢;œÖ‘’’(’œ8aáîaᣠ8r)€2J„|ˆ’Λ‡¡¤†’Jj(©¡¤†’J:•’:Œß¦{RÄ­]Ö{@EÝo ËN1õÓJÕ=(K$¢)­wÿúöçîö~õCyïýæY«¡6ïz½úf”Ð&¨å³¸ ª¿\ô•ª«Z¨i ´–ÕîœY W€Qœ©^Á¿mÐjúŽVÀ_„-ø…€{áYËÚ(ßþùíèûŸP^µ.Žn®‚£ïøäÇÇèØþ“À³+yäÀ÷ò¿Žé÷Ë`ÏïžüøZëþyø×w·ÜüX©OÂFµ^>ÇñIããEåèø¶rv+{Ç7Õ[ŒO޾ž}:¼°«GߺÇôkcÿ°Lª;û;[N9¾Žûãå ñ±8"õÐþzüØŠ?”oªwÇlÿ°r]9¯Ø•­ÛrŸVο\ÃçìÿÝ^e{+KWv m’n»q¿êöãíÉhËç'e¿Ü8‰Ov>4*ç»ö§Ã?º¾Õ½ïÇØ©Þ}¯:ª^œœ_ÜV¿ÜžœŸ^ï”;å†+Žd$÷ê ƒ*>>"׺Íð.Ýß¹¸«ì”ïªwP¯ø£_Þù†õܺùt¾uš¥»Ý?¼ IºÓËó“£z' ¤.÷¾ßþ Õkù£‡ïwýýö˜~9|l7¾Üœœ—µ,¯O’ú~­Ÿìív÷Crr@ÎOöŽÊù7\iC™ñ§íWa£Þüa½ÜɽÝpÚ ïVÏOÊÝÖmå.„z•ãè`Ë®œo ezÀ®Ë;Yºó i’n%ú~ÿðxJßWtW¨ïwoGú~\¦¦ºB2­~ÁSÆ)´i‹­Ð8½gÓûÿpw•úß™:§î Î;+Ôÿç»tzÿCW§ÿo«£sj²ÿÏ·Òþ?}ÿ~Ãú?Kƒ+g’ðùààSm{÷ëam§üõý¦ê†›Ch:]µÕY%  zMYW €v[­ºf癕bhgàМÀÔa–“73coŠËXßÏ~ lYm¼³ZMKSëíiF‹ž]$ÔŸÉ+fzq;³ŸÖ¶6L5‘€oÖÐãcu[候úÎëæï¬ë¸ dAt:`MÊÔ³˜[{⼊Kä1¾h“È}M-Ô!-VIëï™EjÑ"ÞÔÁj%þ¼ƒ¿j~ÑÿGn!„Ї ÑNRÈ-s°YOm60|þauz‰õêÿ1%ÿ‡oUM„y_†ZXÿ=&Ç‘Òê·VæÈ-–»ÞbÜ0\Åá ¸¨?÷%X絆˜$V«×C¦d} t=À$’º3nÂó?,ëàÛööîÁAi0Œõ˜†n‚†µU£ÕUV26‹äÔß+P…¢ð3ÙÍã+ ›Ú©5ZRÕÿ9ü˜Ü{ü¾ï´ÆENü¼„A»ûB®\'Ž›Q[€ºqÃ"Eö¢‹‹ ç÷AŸÿýU†FÜŒ½Æèê)âœtâæ~ºÙ÷¦äïŽ|á{‘-9¡Â½H ûR0QňëÑ÷N$õÕ%\QêûëI×áD9\)Ï·…-_Ü‘¿äù“ë¿OÊ¿éf!xgA·KòÊÐPÏn=ü"ãNò :·3j¥ÞKÊé]Þh€’kßÂC—»þøÃZ#¨¥nÄ à:RŒv¯_H\%§cÉIÿ·¾wÚ}0šOÛÖ=£s(âñW²çlø<)·ÿõéßÐì Sx(  Ä˜bðÉ#Š"*|aLÒħŸÎÔZ}ÔMXïI5âúÈ,m%Í.Ç¥“ý2è–Ô“Ÿ=qègOF]ÿƒWÇWK²Ç™ç0CX¥É^¼çÊž÷e<¿¯yêxÇf¼/g¼ ìú÷&_q‰…’và²ï˜Q;Ìs^ÛxÇ*²)ö²1 cÌ‘OCy¶”¡Iâ„¡^ʳZ¼Ã+Ö½â¶@›0P:]-u1ü¯Iµ^FË»9iîjq¯$Qô#ŠÌ'†'®Oœ:kréa_Ç@›CI˜N!ÞÂ\‚Dä‡.Á˜cÅÁ*ñàMŒËÑx14.VÄ ¦ŽCÓh^=)™Äý0³E”p'l%£û~þz.:ðd šz›VDÚ¾BŽph›(°mE¡#¡¹. ™ÂCˆgxÈóó²T2Ñý³Ó9†Æ(÷x‰)ü,`ÜŸëµEY×àÅYôkYŒê13wÉ´ê‰UçVCm9ÓðΔbÑñ\Ρý}ÏÖγɧQ]ío‘(‹š^CÑ´»Sî³¾RÚð²7ÅçÖÍÞ'¹ 7š ¥l3UÅ̉ÔëÆõNRz-ùøÓÚ` ×EÝj«n¯ ÓµÛî)+nêiëaÎYv4PþöÈoÝ»üdë&1jhî¾äAã^©v‚Á5†“µE Uözf*ïWwþÚ?L¶2BƒÛW‰!“!ÞÐ0ÍgðÐâû¯·U:›Ô— ™ˆ\Ï¥À+•ƒ€Œé<ƒ0pJ\"ó5·©QÝki¢Ì¶Læ³¼¢(`ºŽC¸?sþ â>ïVwÊÕ½5¶J– 8–mÛÌ7ӟäY¸äqKæ¾Z³mD¯ÛªuÛñéi²£¿nÒT7ÝZ»×¬2Ù 87ÕϬ Db"•jʉ'Q«ŽFöÈ_ëg¼žG)â¼ ïs ÀP€ ÀÈ¢À9 ð»(@²YtwgwÇC }ÝŸ‹,s¹„mlûŸ¾\¢ËõÖu»Í¢ä#ÏÿÀlÀ1äÃC> ù0äãm’Ê×–ŒD£ü3Uz^¾ªK‚rà –Å V°v¬à k®¸±wÕÆM©eÝjwúº¹­6g!V¶@ðG"&]ŽDHŠü( ‡K/Cr°(y^(?­· ýVö›6 +_w·÷+•ÝjFX–†Ù#rÞœW~ËDî'”?Žß÷—Ðsc A[Ûî ÝWò¼½•ly²óA+ƒ­%€gŽ­u­¹fS.R\2¸4 —îš-Óz›+úñ‡t]e˜"9ì„”NÎ yùçc$"aò–å½µ}yë yœY3 µLå÷Èó±±o#,ô¹yÔ#(A„ˆ§°Ë(óæ¦÷øŒWc°Ì Ïòë»}Ã3Ñ<Õ®Ð+QËŽ<ÎÎÌK}§ ÒV/¸:›óŠ`阵pÑ#p•T ß\8JFhDàÙˆ¹„¡ ‚OR…6vyÄ]©^ ñiû~—Í7Äž£cçË3tì‚Evì4[Øñ>¨üYIÂç­Ãí¿^ж§XÃΫ>‚¿†%=*6°¥¯¬ƒÁL¹þ•¨÷Æf㯟/hBsã÷]S>aLè'™Ð#ØgÌç—5Ÿï¿ÎÈìÅOÏ[×+*—ÔŸåy¯ù¼¬v»Æ’6È÷‘od˜A¾È7ˆ!J¦ü› ÛïBVÀô5î4·ÝHsCb0@˜„¶B„ ¾^ äJ~ëÉ/ „Ž—„1 ÌBn€Ð¡B„¯½‚ß’k{<b0@˜„ Qe€Ð¡B„k„.8ÞÚÑô˜5B—åa"n€p :Ø¡B„_/ÒO÷[¼ „ÑŸ„Z æÄ©@H  4@h€ðõ!+¸o ý<×èP ó€ 4@h€ÐáëB^ðÜß¼ßðeƒeÉÂ æ¡ –1@h€Ðá+B¯à;o*XÆÍ‹MÄ`¢F§¡ –1@h€ÐákBR¤€ßÖi¬9ᨠÞB –1@h€Ðá+B»@ø[¼í£b0@˜„‹n¨÷Ì ßß"ŽÝîe p¥ PÛ;sAáR¯·$E‡ÛÔ!Óî·L ¦ök¸Új~¯ìý™Ìò¤Á`ƒÁƒ ¿U ¶×ü|·'\âÝ¿>dT$o]úÿí¥‚£¹zmÁñu]"2†Uæ‘u½FdV7š‹Džé"‘~Æ3’¶ÃºÍÞeçw_íM1š3 ¼Uv°\£›û4×”˜K E½ W@ϲx§˜Ãžq›æ}cŸvw_òú«ûq¸£-7àµ0x­4F­8þ°gßÇ:móõgÏè [º^ÐÀÖÙœ—Îú÷-ÉÚlâ0ŒFXs0ÿT˜[¸ô{]PÓ5¬CM+"m_!G¸°U!Q`Û.ŠBGuI@HbãºùJ!k¼Q F)¬·RXpNÌ©XÁö¯¡ÔóˆÉf:L;›Q IJáþ0%Á˜u…BùÔa4‚þ¥Ày®ãkÐæß®~ áäªj9LèZtøê(„©ó$v ƒÀêW÷fØ‘(éÞ‰ôýt35La¦p&Ji§ýƒb©óƒo(PÌv¸Im1yÈcN0ʸ«¨"J:i.YíŸÇ„2’!ÇÄ ³=ËȳŒ}QÀTèGï#F¸z¶t=‡3pî…® ¥ÄŒyBø/®Œžk ΩƒœåÏÄö+þçæîÒ ^ V²r hÁ#¥÷èÚ©&O:‰dˆ\ê1Ä@) ¡X„¸gSQ $&xH5Í›Ç#\þ«¦¾tù¿ úú÷FšÁŒåÔ>ONÚÿÛ÷¢g3=¬¹PZ"œ9ŽÃ]÷WŽ{Ú‹¾±µ}Xþ¾«Ÿ%/vk}ÿ¾¤¸v@\& G¢HðÓˆû"RN¨_èAÖýä¾ï¹®Œ(“Š)B<&¸cóÀ㑯˜Mtò†ê ˜¹B7ûWVNÞö©ïPÜqpä åP;ðmr ¹pbÒfÈ‹„ƒº^ |ŽmobaÒ©®ë6áÖŸst$•élÎU‡$^`#ª‹«V:®ÂˤKˆöó‹†þD=äw.²ÇêòL5T[èúbÝ×â2ûØjǧqSÔ - R„þléÖ¨ µÎ¥ ;IIg×µvó´$êõÖµJ¤vØî©_¿†Ñw¹¡w”žl ×òX’DH ÈÓQiy ŒV›»ÌŌڨ©º×­öEÚE™r…/,Ë]—Np‘`0Ûá¯.tÿíþ8DåÏ¥~ðCß(9þªlm—"¬õs‰D‰ð’­J¡*‘uÐëtÊŸ¯˜Nµ1ú„÷ŸÜEÉÒÐãGÐÂú%]†ZÞ^¬ìŸ©hw¶?”ô0.ŧºÔÊVõÛÖ§$è¤Ý:Õc!§YGl”Ä•ˆë"ˆëq÷¶vª\¿§k™&9Õd;¾Rƒ Ï/Ô`)1‹÷„ ¾~GßöJuÑkÊOeEœü·1þ^Wµ0w&#I;otåNÛ-`}i7÷§—T‘èÕ»èFÂÈ‹Ú`å2 P±nŒ'ºj “h÷ý•šHp ³=H£§~«ƒ`«¦T]µê½†ê”²¡Ò]Ínä «^$ß"Qï¨$N¶¶ãËn:…²æuÅiºŠü+wYlþ‚î¦YÛËê)®ƒB=I¨<šŽ²v|ZÙ@O} cBé€7´‘T" (n‚‰"ñéyóxˆOÿ—ž‰60ê÷ß? oåé5[)ï0A˜·ÕV÷C«×”ÿÏÞµþÆm+ûïú?ùÒ{Ð!)’"}Q\8Î&1?êGÚž‹B )ÊÞÓ}ծ㜃þïwHI»Zïò½qìt ´õŠâkf8ó›Ñ ÄöS¯Gaœ‡æy_îûq€VÚj¤9lÜI·zýÑ–¾ñí—Ët'ÇŒXK@»,¢Xa¦³X E­D F©³”pk}2[õs~Ûçž—ú|VZÒ*pḠÈñÖ‰‰0µã`Ù0Sa™e·jɦmgÓç¡ßê9ÞžŒ§ÚÀëS¢ìhèïÉc/PRÓy~s%õ=VzǼ6ëÆcÝx¬õ¹"øÇútä}ã±>i•áWDDßBÄ‹b˜çÓ8éâ)"ÄHÝ !Jº9ú}7ñ[Ä5—Šö+˜QÝnRœv ÿ–iOSî4‚3KM-zÀÔýƒÃý•—%ä!³J-6©ô‰˜Ô§fw¼óšDÏ06Ì”"†û}2ãˆÅ2C2¶QžÅŒÛ˜S“ÝnÚÆ&6¼t}. ûÂÂh›vO•òp‘¿AqlGýaÈ'm2-qž–7YЧ ÇO–Âï æ„ÿXlŒ¢G2188w¨kÚÆÔ=lQ¯B~>ôü¤Lß½µ<ÃÛŠÉ;kyPòø‡¼ð;¢v¶ßvèÝ‹Q»ëv¶n¨BºCÙvÌ1òeiàÒΈâù`¯£ó|ë¿*s[ªÊdÐ_´{ùvna²Ãv{æ¢Ô@•¾p‰Ño¶kã´(ÚÓ LÚ£/oŠ7*Ãñß œÿÙ|ÃnýßVwܵýýí/ê–`gˇ_ƒdµ{ÿSí~2ù¢`à Êx±×î.Z@Ö‡ë¥[™Éº­Šãwá$SÛ8Š0ãK8y/Ú„©¶]>K–ÉÓ™·ÎÛ¶ªóeñ0ÙN$¶ŠSàß8ìAÍÆGÝ=x7ø2ºì÷:ý ×ÅÎ?¾ …ýp]xF¼"ëȇœÎdgÅLÖó"t>²>¡ï.=$æåIsǘUñ³ƒGØX0€"E\‹˜ )Â"’f¶,Ò«zõW³¡sÉPwˈˆ«‡ezaÕ Èí/ñqâN_Wõ‡ãžÿž\u«cîB½ò„»ŽK:09O8ò ÆI»—õ]õÐ^zJ]K‘ˆ@»m뵎ßC'ý®CW¡àÊõÒpVäË݃·þÁ¨?èwú_BCÞEl/ðûFñl誒Ñ%Ð9 ¿Âñ“Eð<ÈtMXóóÜ…cm'ëŒóKÿ§é¶iÈ "l;¸êZƒÂ—êPcà,²£apm¯s]ì’h 4ÊÚQRÐW×E×yøÝí^‡Ç`zË.Âi¡º›"X©&ˆýgÓë·{WiU/éFEÛ¡ xË„¢Á8%·(&‡2†æó+ £?ñÙËpœ.éôd÷×5gº;=;:ñUßœŸ&ïÞî-+:Ý=Û]6ÉŸ÷ë%‡@¾Oûï*òü¢›/”¬Ù?ÏŽ’Ð¥b±{~¶L(~Ù;ú•.ãñü^Ú®§ØÇ’|pþñl¿$ë2>ì/ Mð2ªÌÓì†D­&êéÞéþŠÊ{û''ç3’|Ïë¿w÷öZ['»Ðæérªœ}”$RË_8lÑŸý²^BœýÓ™œÁ ÎZo“½ÖÉÙŠ^OwO’Ow]F’ýÙ .Z«Èý~f!¾m}Ú‡õKçýþám˧57ÌÓVôÒ_t1§ª“ ×saW¶wÅ)Yeqjù£AE²u|t:ÅŠº/ù¬[“ÏÑk ðèõÈÃ#ý":¿ÅºœSôí¡ßMã7s÷ÓâLºk”?Fæ¡e ]ÍàÏ[A•y䙣ÈY%ûŒÌb$9W)ÿFïª *Î$µYd‰rÖIãxEÊ7É ýIJS‘F*Ë×E‘޳ˆ§„‰“xígŠÛ@Õ½Åx1FòE!Ôu£Ë~ZÀ¥ÎóÏýa–»¿p,¼‘öýöÅZ`¯ºçÕôŠ´·Õ=¯ªü¬(‹\s˦LúC•R.•5Ì)ɕ뵜5]ïˆHB1g>ͯ<« u]×Ît5dPƒö0\ÏS êqÚö';•1«7¿¼ÿâ>Ê÷ôì@'ö¾DŸÃdgjÏd|ÉjëBø'Ü·ÕÎóñŠì°™wË?€š9)­ÓÖdŒaŽ¥ .3Œ¨ŒˆÔÚì>„,šÏ“Ɉª#¬À‡r3ß\6Ö­ŒÏ‚`g(áœÂªq¹zïàf^ÖBÞX/•2˜òˆ) ‹ÔÌ…ãLp&p½vÉÓpň¿îô/Џ^:è·{£wB]„Í./'t’QJTd8Z1 i w±’Æ2ƒ_áMŸši;—: õ{å`Å£"H4†øjµ ‹^QÉ9Tµ±=]Žù•ÝQTÑi³³m‡Ä,™„MÁuËpŠ&,¦ZeàûÅV¦gln…6xÈnÕ'K'òÇdØT“8Yæ`øJÛŒI™M…R¢ Eõ¹¡¸C°Æø’.Kx]%o½±ÔqÎŒKŒAšRÅÀ#1Õ’Ø,“b=œ© Kø+cpA}RC#&ÏŽ^R443X8ÃŒÐÒaÐ’DSé¶*Ž}|(‹ï–Ñ€»œ¤&`~5q GDF™1`0-•̲"à_q·–Ñ;3ý•ÜuãѰ߫1˜RSÉq„#e™BY$œ‰È‰"Ã{ .º]º†…ÍØ;7ü(uDgV›Ø0ëÃ?‚^bÜEN+"×ÂárðëX½± "S«3,²\2£“‘Q€½RÕù[]Yço9ÿU,Î?·³ÑËš¾`€âÌR›2g#¥H; ÀËEYªÍ:(ºlvxâ’&vöVY¸1O%e,*1ó1@[r®•°± käb¦ËTˆßÃç8e$¼-EJ‹ šÊÌ7èWªÂDeÐ/\¿ƒuF#TZ%/“â”–$å1³1ÃR2Xa\2,€JÁ”¹)¦å4v¹\õËF¢°` "N3 *Mo¿4×`+1l¥YD¹ÌÖ!öw¾6à¶!€×c`,˜]l¥/$Ž%º8µâȫ穰ŠÝF 8l5j"P—à|Å`_˜V©ÉS œ5¸hj¤ªz}¥ê ŸŸDFt H€Á¤,2™rÆRŽÁ²8‘1×#²“i,3dibå õëË0€&–I—'¬¿RY¦€§¥PuVƒ3Šºº@nXgö„«xmþò«¨ÆkÐtXMì“`4É”TA³J*î³~(¯‹^9Ϙ=? ‡5¸àQžŠTÆ#IXæRNõz˜]Îc¹r«f¸½* µ2HîwNJðÇ}Âs[á–È­²‰­ÿüXÄz¤²IáP‹¶’A³g<%‘À!`â‰ïß_íæ‚i‚ˆT·Zûª“ûÖC|è3è+è´ÛîGi&ãÔò—"Ãóîh ?ct&‚SÜì¢:cýú‡þzàóK= 9ß.öÓó¦›å_ý<ôAn¿•|XÉ7ÔޒɵÉeŽ×t i¯òï}?¾a5Üñ7{Ù™Sˆèî”KªHšð^ÚO^\~žú»ÏKêNT½’» ¯òC «2•ðŠ9~g­÷¹»©“K¯6* ÎOJÚƒ+–”·Ÿ'¹í‡1—ƒ2±¬¬vCsE›õéL°2{öË”†þœŠª³ò®öDŠˆÝ°ÿáÛ™n\õÖÐ]µýwå¤7öA/PmM2À¶²þp«ØùµÊé+‚×pÖêt6 ~ÝH[t›’Eûq¦³ùæY_å «0ýñk¢«Å—R °¢ˆeøˆÉIqÁ<øÅ©âL!ošK#†d¦92ØÆà’+£O³Ž¾êËJ&K1Ž©AL¤1p¼!1ü•Eq+eE±XÑ¥Á®×m¢ýáº÷>ÃëîŸ IkÛ+˜žj“"Â-Eà¤"#2‚Û4{v[À»À)× §€ÕÎ$A #cBŒ£ßm[š¶ñlu¢·}€¹‡`­Ø}Yÿ Ð@úüêì´{ÕÒI¿¹ë„’Ëa±Î¿ö( pÙ¹^vu ºçîÖ·¯G§èíÞ»Ÿ1 ?kûO/vÏwCÆÃ ]ÖÜp<ª¯-¡¡ïŽuòãåo‡ÿþ]ŠÏï­E—Œ;Ñ5\Èñ¸{ôu ƒeŽ[ærÆß¡e~Xr#§w=G¼¸JñY™ª"£H3ðiÿŸ½3ým[×ø÷Ìÿ É—¾D 7Id€ÆuÜÖ½±“ÆÎ \$E5N½d¼$MgÞÿ>‡’lË[¬Ü¦m’«Ec‰âr——ãJä+7Ä2RžÁ2ðѦá#o¯`øø9gøópÉ“Ž1?@©³ãFïNªÉ™“ɤ{+ç:¶ÝsÐÊ¿`Ñ£“=IT¿žbsFyÑyyœ}‚¡.ÎÌp7W€¥§ç?ëÌj »[ïW·WææÊtÍ@ÚüÚ3EÃ;y“þÙ´¿´{vÂ>YiÇ; —ø†ùZmÙCÃ8¥«»Ö ÷eOv:ý»øÄÓ– oÙcl[é8^¿Yœ×z8ÞíÎ~W!qtJï2ˆ•&ã;«G·l¢¸éò¤@Ÿès3豂M•¡+çM·t¹·d>™UDZ´Âõ°–>ûjî'Õ$½Æ"jŸº'{9îÙ[Éf{læßÌ jvsÒ,„ÍJ£ÙØÉá×™{šôŠ³Ô¾ž vÛRãv'\rõsæ'.®æC×Z¶z¡ ÝÛ~gÜÆJÿ‡ìŒìðl+¦µål-¹nËX„f·ÖŸø‹ÕHH·9G¯ =¬BÂi‰ $\DÂÇúòe/ñZ'xœÈÚc$t•¹ë*>õÔÆkrÆQ a„O‹„WUÇŒû_ÎïЕ0.%~Ö3þMÀ¼Î×Qîý¹Ó ñ6…dX™Ûž+Ú£™°×ä¼Ò= ‚ù«¨}Zâ‚Ú©ÿ ¨Ý„20Ú¸à…ʃ¤+ Unz= Ílµç£ ö‚Ú j/¨½ ö‚Ú jÔN¶}ÿ׺úu›z=¼˜ÓÀ¼̼¯‹`?xqÀ,¬‹Î#×ã±w|z.° wƒêC Coã}]yã(€¹æ˜ `.€¹æ˜!¾R³y¼g;3h2¾¢=êÜtdÏì˜o²{Ó1¶V|Ù¶zéi3m¸“n’óÄSÈRzPÝ·íaвIO=S<:yPD4¹­ßÆ1pQ›Þ]Ý„£Uቷ¬'Šoó ž“ÅâØd+[ÊÏà cÓbt_Í g:iæVAvmU|(D¿?j…æ¶ó.üÞ½ åªðñÈ–ŽU?tóÈO˜!Yé¶fã÷ÉÑÖN›‚…ÞîäÒ´R5¶n:cev¬Þ@–Ø ™?¤O‡¾Ä± Ù 7œ¼«”ëï«Þî^õ»f÷ûxÜÙÝ~gzâ«v†IûãëX™¤å;}í¸=gÚQ9ƒá•]‰õQjÆCþ@GfýIÁ ë"^»7}Õw¶ª÷ïNÎNßAzõŽ<ûv«ÎNÑåù§è‚¾Ãðì6<óàwõ rz£>ˆÑåùqGwĵþxT{Ÿ:š¬»õNõµ/÷5=ÜÿtuÑý<ª5O¯km„j¤Þ>h~ý~¸¯GõæWrxvâ]\_à rÜ­¶ïÚŠ~º¹ÄÉ3ÜÑôøJ—ÚGê·ú÷ vجÝÕ¾¹¯__xÕúR»þ|WÛ/¥ÿ*ãZ¹4 ·Ÿ„+w—Ëaî?Ý_žCYÎ?]_6ª¢ÚýLëïÅÙ§¯Í ¾ø^Õ÷áë6ò =zÐ<ñê×ÎáY•ÔÏê_/ÛÕaµ+îåY…: ƒ:º8Ãw¶Ìµ¦&‡û_¿×ök¬v}AŸDuÿ3›å³ôíàºôe®ò-÷ùæúò¬3Tw§÷ç¤~žÃü¸{ú]ÑÓû rrøôµþ]³Z÷}û²Œ¾ÕÏj÷ÍÏß/Huefõ{„›Þe³Ó®_Ÿ^_~¸h”?Ýên§wNo@ßÃïGº e¾®Ðúõ(_ tåºþÚŽ%Z».ÍdÚ`wÕýi¸oõ$ܳÐ=”s½î›úé¾rŸÑý¢LáÝó‘i­ù­¯§ÕïϨž~ƒgëõ}ñœôï=Цî›ÏHÿײ^ÿµûg¤ÿûz¶M-êÿûI¢ÿ/oßn9ÿçØÁÕgŽÂ߯A«\9n¶ö«ÇowÍHïΆF x˜µ`@íwŒ¬¡«¥«Æ½°câtÔïw˜[^9É:œ*ÆÔY”‹^ä@»ò¦m}IÞ ›­7N¿çXqÞPS2²Ãé&âA®xÐ;^ýé”íìÓ‚ürf–gÔ_Hg7Ž:o,W¼qîÚ#€…Ôxb1\™Å»n$Àcûk'Þ·ajA’dMèü3ƒ:d871œ:±®ñ±%vÄ¿V&0±9kü„ØRÙóÏdšs9Ãq<éŒÆÿÌÿ:a.ËÐ ë¿çä˜I­s邏ÿÉÒm²h`ÞĆIåÚ™Uª©éùhR)aBÞê9Ã,ÄéG0wÙsŽ$ÝV˜…ÔÙîÁó8Nã¤\®4{Ójlë4¨ 60ÝþÈ8qÝÜùÇÊüÓuðç- <Â3ç.ä¢?ÀTeâSm¸ÈŽ„«”ŒqÌÝ("RHª¬çÄ]H½=:ÖB²|ƒsV¿}‘`¥ ÜžŠÉÁ;DüÒu‚/qîH˜Ãvûa;jÇnöVÄâïyxO7Õ¯:·‰’'6R×¾ô­¾7½¾«' ­]vX–ÌdAaõ'× x„¸–ÂsCf¤ËÂ0p9fØõ9AÂø’Oÿ5{¿D´@& B ÂLàO‰@ÑP)ü·‘¾–ŠF!,",Dœø,¤ÚS>7&úåöþ_×:W®$¯ìÌ|ëãY«|tÒ:ç~«V;·Sûòaíè¤YiœÔ*­R³Y*lU›[ÍÒ‡!*çÍJ}?û¢qXþ£Òl•«­úI­Ô*½_­W›sWkµ“Víp¿r?Ž›ÕÃìëj­ô¡Òj^AjUû&“ÓF£B–e??®4Ê'•Ö»÷§Ù§ŽKG«åFšê»ÃòÇÆšDKg|Y?¬Ï%×hÛOß4Zï÷Ëë^5JÍÒºBþQ;©ƒøN«ï'â©Ãº UMµÞ¬¿/•++•4S§¶Éiö*å“cPMë¤ò¾šü‚¼6ÈÍ’²²e<#ëóxT†ßkãµ;XQ“k'Íj*Öuz:®®- i¡uRY–ÙBzX¨r£úÀÇåêññÉ\M®ÃóìïÌAå¸q6ÖKí¸yÀ1ëÔ+ä۬קژ+A2Õ¬ìÇóˆRm•ŽŽ[§¥úŠŠCÖ‰¤:_ÀUíá!q˜kˆû•Ó*´h:ªõMͧ²”ÍF…nYSéRWݲ.m2µŠb¶Ò J·}Á~)*ây«0 €YÏärX½+vG,úQÌW£_Z¦ß‹~‹ƒßæ~·-S˜GpÀÑp¬¬/fw´Œ–ºšãÏÍ^2ÂWv™†¿”ä@BúÂ×JKþ}f*ÏAĉލÆÂhÕñ(¥ÂÃŒx˜¼å\¢Ð©ˆ"ì”Ê ¢^D'6…O UxTýåj¼š‘ì«x5ÙÎ&ûa‚K“)ÜÜíªM"ñ|ÝQ‘.Ýe6MìOVó¶'>ÜóìaÈ·åsLÇ/ÜÔá·Û5Ö×s¼:šf:„›ö ^àIWhâ%èqض{0’â•JŸ[2¨àÏß ;­Û-ZŠ ;÷õÜÂ'OšEºð/Ç·‡ÃñºEÒŰiŽ@yöŽ÷:EE"…|£˜ò%7ÈÞ}/ —0é ÐS¨ø›erh×á }f|‰ CÀD4R LM8ÓŒúYí¦[&²ú‹ÿ vÍx4€ôg †‰? ¹‡(¢ŒF‘Ai¨I(ò©ñ½ð‰œ$»¶ bäSïRöih°Œ´TbZ!Ž|ýó 5R`þ$N3ÿ­7à>t‘¡˜)FµÇ™’†q»gÐЧYýN6•eõ›–ÿ!ïÚÑh+Ó_0  ÒD‡Ìh*Ž#¼ B©žBBq’yÞ…™øÇVžqvc]X(§àŒ° áˆ1 T eèyè5ðñU䤤ëº*¨~?^ÆYeŠChîSè´˜OBÙmKûx®3è'S» 6×#$Rz¨¾LMˆ3YâÐ ˜âœA ótBŠÀ B¤yYÎl—ë»~ž«*¬(‚„‘†.c;~IOÂX‰°•d”x´a´ȰÛî%ÛJ[ãøÊî †çÝÑø5v22gÁI~ÄV±‚tíC»ÁôÍðJâEÎ÷ÉûMjxDVþ§?lÝô¡ÞÞ'Y³’¨?µ¦{¬¡|ª'”f4ìMæ÷6Ï ‚ìÙ½±¶îÌç)¶èî¥kM,iÖÂ{Ë~äæêtjF¤Òehdh¾Ø.² BN™A¬Í!™wfR_ÚÈÞº²ÝÆD‚K¯§oÚ7·¬•Žh u?Îsšxç¯{—ÙÎ;‘M‡@àkh™=}?“¡Ýâ;I,ÝÍÑ’£Äb·°7ž—6žô4džPsÛ¶ëÊ­ÞØ=l…ú·“–³cœ¨?p’ »¢­ÛoÞ²ò”u2oPÿ '1ºCÉʧ¥ùí»(žþ¨åÜa´Ç/c¦ < ±™4¶˜'§QòÈJNB¥©(D( Êe~ˆíaÄÈU8€¿"„Àð.1#&-:°ÇãÔ°–£w¶G~þýë–‰7!<ÕaC"t¶µ!æ?ƒæ°'Ð'ÒÉ úÐ)Ö¼q¼‚S¬ä'œbÍw@5Oí³­ó瞕˕‹ŸtV._Ú9ÎÊå?qãÝ‘ŒÕmÝúä㹬í>ßm­>Ílú;w<þ,•:h‡ •‹Üӿ‘ù77>ÖÅ}.&˜„œÀ0ïE @#’Py070»R$#¬6Þ–7ŽW0|ü”KrqÉ“Ž1?@©ÏÊÅÄ›·Š» ~þ]Ð%úî2°½æsuñ*Ðçqר/~•›ˆõÎldãÎKuÿÀ·yðk 1¿ }² ¡Ä¼@•HÈëuŒà‡„£šÈCm TžÈw¹TÖä…3>'‚lB¼qHX áÓ"!Xµ@‘ŠpÉ(àÌà€EˆxÄ· œ>“’j¨ŒÒSÂn-ã„I’Ï%W\‹U äoBÉ_íuìuú´k\Øæv0ÃéÄ9¢DŽÄ?~Ø?FÛÞo=Ûý3±6@+°vVâk±Vü œéj&žKxh—Hs“k0¦aD•Þ„µyã(°¶ÀÚk ¬-°¶ÀÚ™nÂÈ6ŒW¯;™ÏVaç´Äv.`'~¬[®—ˆ\Š€aé»R{ÈeF!—{Æs‘§MÈP¤áÉ&ìÌGvØY`gvØ™…0ºøùñíIè?þñ¢è3À«œÂÎ ^Ðç"}>ò0‹¤OM…æ@m.5ÔsíµF.'˜»Èà†@ß0&7=sÆQÐgAŸ}ôYÐgAŸ}f!ÌÛÆÂ¥FÏ•WgÆ% ì\…ì‘Øé3ñâ°Ó ±]F0Щˆ»"RÆ¥èÿÙ»Öç´•%ÿýVíÿ uÕVΩµ°ÞT¥Î:6!äHlâ×½)JKÀ"ñòÝó¿oÏh$68øg>$F£yöôtÿzÔ=cت,jò.¤ëÖÁ`ç^Áηpµ*Ã{ƒ;Eå…®V5s°ãéW«zïEû½®¿™«U8ÞæÕª˜ŸùjÕW¿isK€YŒ_t“Íüa‰“l¢VްRN=dGb†Ú—Q»ú7@íŠ&9 mŸÏO²ÌÛ¦¥ð²«Z_rm¨ò£g¬YCí µ3ÔÎP;Cí µ3Ô¾¨];4¥= )Ó‹·¹³3À¼ ˜µÍ³$júÎfS²M¤‹o"Áæ±ÞÃkªjhžªz0¯[Ì 03ÀÌ3Ì 03À õ7›gï±0ÙRý*–œ8V•ÐÔ  젠¤ç¥ç lᦠ|ÒsÁ)*ÕvŽý¨?lᦳk"6n& *JÎÇu ùÉXèL½¶W”?¡x _ 1]œàZ,ë&Ìl?Gè¦åênѰ‡Ú¹Â!X!fŇrôûqËEc?Gæ#x>»VQ~¢Ù¨®zä·0u[sýýãÛÁ6Í&cш˜X1´=lÑil ‚h™ž7 eTSý䙲„ƆÕs¹wþøX>iÔ?U+Ž:ýÝFÁQ äÎHâŽß5‰nG6JV>×w8¾Çe‚ŠFD ¾0"þAáË@Éò¯y”›ÓésÕÙÇ—¡½z`]NÇöå…psõÅ»–?Š6v/Ux®þy-] ìŠß\N`vÏzµ÷%p$StÂzPí ~­{;©‡gÝFå:¾¾¬Îjç‚Pïvü¯—_ü›®×êpSùÖ+ßÕZ¥&Tý‰oË_7¢)X—bàÈgûêØÿv^ÖﮕF³6©ÝÝJfU©ö„v­û}R;=¦ÿÊ£ÚÉñ<ßi’ï$¼?4û2»¹‚±\}éÞœWÍj·ªÖNon¯ï:á×ËOÐïr\?½V®}Ñ¿¯å¯Í¿^9ƒ>ŸÝ6š»õ“jT Í™uézn%Ô…ëKqBÆÜt¤Æéí]í´¦Ö»·³ÆÉ³zú]™÷óxúµ{Üžç+ÏH¾ãA÷æ2ˆ@enåbv%Õ'îØÇáÅ-_Ì®¥˜³FóXº©Ô”_ì\w«Ó¯ÍïR£R¯C ãL®¡Ðgáæôvr}÷Ýÿzòeì„AïJ> îÜʧØ9Ác.Ëõn[­Ýß5š×j­Ûö½óc¹Ö=žÓô\™TO³|Óz’ïMÌ=ôyõÜ7Ûohî˳ÜÜ/ÓtV{C4­5¿ «ù´*¼!>BÚêùï:oiþÕÖä}Cóß-K«ç¿v÷†æVϯ©åù¿»Næ¿ýáÃ÷V®šÂñ.ü>?ÿÚ:)Ÿ5[§Õ³G(vŽæª1€'n¾“ÃÅý¥vÞKÒ;Ί¸wW¼ã&~ `ÞÍìöCUû1°<ú·ýñÛÀ7\A’f‘ËýFmPN*ÎM6N9²Owþ¹e–Ìß ÑyFðæ'ÔF7θß3 lß¹hDŒNoüçzõ¯"æ}bbýÏs­3Žÿ…ͪËGñ>† æ*Í™*Ûzþ–2%ä­YѬ®?ŠÁvyÏ}³€è˜À r-˜N¿éÿà¸ó''åóó÷cž†i‚ QØGx³ô‚þ‡’ðšÇ}Pb­w?,¶3Y*ú ôÕ¿ntãÌ~ÏZ@‚Ø9±¤¼è×€ ¯Ò0õѽûû_ B¿ç‡£0ÿ@, ù¬éý|ßüT@»'lÈ[¦áÉ®&Jx[ÕsñE஥ž„Q7¤ªç*‚ìiH’LÓÖ WW5©B†)[²ûâò[^>…ûð¤ýiL7} Ì†;+¤ÈÜ0§$fo\?" -±QÞ*ÏÊ‘vFƒ¬DBm8ƒD]ÓÍÅÄVh·’bõ«¢”ko Î ­‘öBv1}—n9ù„|Na©Ù!ž\CIX,BÓ•y:i7MJYÒkÞtK$`<Þ–@†)H_†hðž'Y¦%ÛøfVzꪹØ\lg.,A7mÍ0xYÃ!.Ž!ð–#{¼4W°+Û:Þú-Ú5’åCCyÍk žA³*EǶÎÊ4kf•7<Å€iV¦Y™fešuÏçâ4«b‚ÍýšÑÚÛ׬z¡ÍJú6‚´ß¢fU6¾ëÇ™jeª•©ÖWR­Ä‘¯ÔVºEЦN0rQîû<Íð+.|I ®ôM6‰MÍy“Ñ”¼ßYVtÑU&†ý.,Š \iÁ{î 4=%ëúnO ±¼ Äòl,n¦¦Ê†¦í‹»:è(ËvyQu$^‘›7eCçUS3\u\o5Ԍǿù¼x†~ÄÏ}Ó¢#ÈìÀg‚©C?:´W‡~o-pAÙð.YÑwïŠGAÖÎaOiÕ}ª‰oª®rÀÓlAÐ UE.¬[ \Xc¥‚Ì\¶hn¦)ñU]­¹—”o¡ÏUžº€/×~,½š;“ã#uñ¿Ô“ÒÇô¢ ÑŒ’(IØ¿<•뾓-°tÍp=Ýá=Õ5xÅ@:f†Çkº¦ªª§*¦ŒwÉxõ‹±VGyA‹9äÀszHÉÞEŒ˜Ãš¨)B®\>«7DAHd3M¤§â~ßñZØG?è[)Žzø|‹Ö8LU,)G½Ô `p˜ :C•€=Ø'tµ†NSjjh-ÐŽ˜=8©üíú„?뇈“cÔsI ÄÁq-9 ´?èýöŒTä  È<ÖÄqJ<§?D雸tvɉ½@ÀOÉÛ昅L~!™x¥^0Š:ø§ú$ât?qɇ Ã\” ‡wâa€¦‘•à”„æ=?ˆ©×O“:¦yÃ)IÕK›Ésèò°RmÂö»×÷{c7-×C:©›4¹lòj0"d‰>‚IFI©>qðïtH¤@?O’a"ÒAåKëi> üvòâGÙíõ'ƒ!òà>’m†› Ò)ÁÆ(®*ìÉÛ[À¢ëîÐ’'a'w€Ä6™î¡ Ã$ bІYÿ.²CÚ<ùÓ8½8):ðIÓS T~Ò]úי󖂼܋‡Œ?$äô|ÒBÇâ“_N0¡‰P"އîÐê%㚊dÐ"½xxõs M†݈2Œ&Y N‡w¬A%â'e{C`¢tI ]¦´¡7âd19]SZsÚÂLýü‹‘›ÙòOµx-õ%«/C /Y*¨/¹¼i©ˆwð€C2eÝ(R_«¸óêKÜH}ÉoX}-JºT'd’']ß÷ï\d¥B·p .ª†T§z+ATþ¦b!“ŸTÍåÙ|ÝSÉFÏ u‘‰®Th.(H*––$Ì\ ¤Z5ÓÊ©öËÐ%’iª;©øÊ»§ÿrZƒJïTòer6Ñ&™ô_À T´f*kIÝ.ÀмöÏéÚDÍ%/¥9õ´ nR ‘—¥9¤ÓË+!ªÚrª'E ‹š+§ð2”³ 6)¢š+{ú8Ó¬‹‚{QÊ÷Еùs•DÕ/ š–¢œeL–ÇW šæž¤À*ZªW3¤C±Je0k¥Ø…b¶¹ú\@o)àÌШ¯ÕDæîDn$8þ–ãÍ=¶†°ö¢?ˆžýlnà—>§Úëú¥C?ôeßä­û¥ãF4ãùüÒIýks‹~éªp(šâîpþŠ˜Eu|S¹ q>Wr=¸–ÌÑÍçºçVLáúrÒ†gÑîNfC: HìÊ…ywsYÛáÙÝ•|6v+Ÿ"4û2°{8®G¥1Beµæ+8æhTkVg_»åIí´¯6NÛ3csÓûtkû/„z®>ŠnåG\;Q»ne:±+ŸF7çj€p0ž Ç?Ù•#œ‡ŒãÒ¼%t ƒ[H_'¶GÀñ…f9‰íYŽ;ì’wÚ!Ô{Ab£¬Nó!σirfätߣSv°p¶3õukáH(›ýQân´xŠîA³ƒ@øÅVÀõF¡ mõ=Žúòqit©¡Dü©z~þhi kˆ£þý¯`‚?ï9øÏ‡éh£!ü:Ä”©É[á/õF»9DØ ¹­õû;ïéB±·—Vø\ηý6‰9ë­ÛÛ‹7/C{‹rúÃp»Ý%·ÎÌu_>Dý +b]ÏŸO¨öô¶ŸÔpvv<¡Å"'©k€‚Þ+Æ Âû$4‚^°ptº œ´Vä¨ZSwæ¾ùAåG¤b ´`€‹-€Q†v ,¯–1€ì A·\™7lÝáMQxÃ1-ÞQUIB ´@aç1©±Hé$ ³ïy؉”»‡¶%Øsƒ[·ë[”îOo}QÄc-ÑÚ†‘Ba1br#|2AYÄ© QPØÄ?fÚßhÂ1N’—@@-Yœ‹°ÅÆWuäpX£€¸ìf.—J{nÒñxDØÛ³¸A3·ˆÍãwÀ×L Ø1">ˆ½C(s~Œ[¸ß nzÝÇïÄ-—†f$½J°KrƉ«°ßw‹D0£"Ãázâ÷è}ÏébÅ15¿cæÛá¬v{ˆÚmj\‡UŒÛ҂εðÝ%vÂFñ¡Oú\¶¶Š |È 3íãM³¨ý_z¬3rÒ—\÷q”}§˜.ŸF½d›‡r`ªgís!Tç`.s=Är},qŸ€t4åLcè÷ò”ã’¦¹‰¹ºqN˜„Q24×÷<„ƒBæMAC´6‡$/¡TC^䨧d☊úôm|ŒY‹Ë EÄä!Í <Œo_ æAˆ#È•L9°¿A±õ²'·>Íz˜Tv¿ Yzú µüUx©@#M|ÙC¬Dî[ãü‰Ï¹~LvØ,*8|Û”XŒøè°öñÍM8 0òL—W Açî%Ä;’kƒÊQA ¬¹üÅ?ü"YyUÐAé(É!X¿l¢Ò¹ÞFDNŸ,þüë¹`ì/ã§%Ö;’mG7]ÕæMÕº›¶ c³eÞ‘‘)8®+‰¢WŒŸuÁ`ðùù᳸Uø¼4ý£ç5X#ž_b ?®L{kSÃ!+xςؖIð”õºe»à»°hÌe䃛AT– Cæ{B÷öŠö‰V!]ß•=!‹È„‡Æè@PÍè@gZnk?H˜:۵ݠü:)Ôeù 2{P6<¸F±D¤õùù“;ÁæÚÀÓˆâÑo GØ 'Û¸ý¤fxa»†(í–ÕBŒYY5yÅpÓ‚&lm ”hqj'7êåóÏ&~‘nÚÌuÚ|§‹Ë‹/29˜#Û JW쇬mfƒaý¶–èH”EO•“WEKÌpÏ…· CÉæ‰"Še»©éL¸ï¤­ò°‰²GÜÛàç‹€&PÆÔÌWivÐηrý´Z¯ìœMòòBeaïŸHQ´;O¶s·j/­'*žÃLÚ¸åEëè¾"X°—¬QÜoÅC¿ÝFøŸô ؚƭá¨×»Äó¢¹c¤ÒÊbÀ*K¹PÏ]JñúC'ÂîãVÈYQ·c¥æÎ\F°ÁŒ?äáGG¼§¨é…?ê Âã§É2MÿÖ̸ ðÝÛƒz¥Áàƒ»Òa¸Èñ± âA€ú=Ä χ6€/D Ê¡¸Æ©P;‰$½è–Àùˆj(B Þ¨}Ëd¨áEQ {*Ÿ–On`¸á†× º°íï>RI1 Ë|÷Q%å5oÚyÎ]½ðÛP6b†WŠðŠÂð Ã+ ¯0¼Âð Ã+áY’w7ä\oþHä ^ÓÖE7ù°È­ Q4Ø9 ñ +k-/¹ÏO3ð{.¦uv'ßËe@b¢àQ* ¯v:AÚq©/wà@¾X¦°Èv A•e—7¬ðŠ-:¼-¨/Ë–$)ž¤KyŸ³M¡ã3 °vзÿ¥ŒµÈMÙœ&s™Ü|Ÿ”g8S1Í¿4Ÿ®?öÝyÌæÆœwð_9’«¥y†ÏÊ'Z­\§(xkà-·üŽÖØmB¸_hÈÝwò(v¸-nî¤3þZä!è¥ÐÙ#7C/[A/óÙßiô²Ör*„,  0€Â (”û>±ÛÜÏYéÖªªÂK»µ~;nž|~9Ä# F1âQ…}F<°´°²Å¼s”,C`Šþ ‘@@z»%]±YèÀ_?_&™l“‡Á$“Lb0i9€‹A¤—…HÅ•‡?y©Æî=i§hn2ö7½ðN‘$²³>bˆA –ƒÖze.DDÃ_ÂT¯‰ˆ´CMÛsD¤!¢lÜ !"!"†ˆ"bˆˆ!"†ˆþ^ˆÈ8ÔÍÇ/ÏÛaD$J…çfãfˆ¨ 1DÄCD 1Dô7BDÊ{A<”Ý9ç ˆH5îïåÇÍÑ=Dä"bˆˆ!"†ˆ"bˆè"ú¨~<ùì5.’}¯q‘`ܚϛá¢"\´éq 1\ÄpÃE ýpÑ^#"õPÕÿŸ½këmãÖÖïú ¿ìSæý¢"(‚ÄíÐ&ÁN²Q´Îãèd,º8É.òßÉ]=’GòH–ö!µF#’‹äZß·Iú¤‘º{ á¼Ü‘U1"QdD‘EFQdD?#O>¿ZÞÍ&š—;2¢*F$"#ŠŒ(2¢Èˆ"#ŠŒèÇbDê\Ðý^S~§5ÎËQ#R‘EFQdD‘EFôC1"„Î%ƒO™!È*ÑLîȈ*Úô²òȈ"#ŠŒ(2¢Èˆ"#:rFDΕ8ž+M·Úƒ_# rÇsW2¢˜YQdD‘EFÑƈø9OûŽ3Uµ×,ÈO%ZɈ6Ϭæ‘EFQdD‘ù¯ß}xñâò2ÞpvˆœÈãÛ}œè~n0uóaèšNøóãé çÎàF]7—v4x½Œíiס+j1F­³à¦š” þ¤ÃS°ò@¤ wLê^IÆ6?4;’±HÆ"‹d,’±HÆŽžŒardÇf™› ŠÏj§x£j~TöAäG ð#EI¤GÇI¶Ô¬JªT–X Á/cˆÃŒ…Shf5*Ó@Î8¶)rˆày©›@{5,•%ú<í“î]yŽt«;~ZwiNnnv>¦ëÔÐô#Úð¢n'4fW=‡c¡“¡Ð‚r.)˜IÇ—xŠAâ~ ´‚ ÆZ1Ñ^†±àŒËƒVošíbhëv̆vêç‡öã f@p³éÍÁ¸çÞµº7¾6ùeFçŸÕáò!T²‚ Œ"h*T‚(Œ\à8¹Àv𵆠Æ6ÆQb%ÆQbe£8Jí8Ç*>Ce³«?wù u¼á÷Ë÷—{ÌH椚ǔÂF³19h¶ràL„l»hSm ˜Üµkó@SàquxQ×™©<Þt&f4ѯ¨¯ µÕŸ“gVûF宊áIR¡ K€bJªåøqB@J¬‚©1ël…(åv Úã¶êDmƒ $Ú·Aðku$Ç-tQÌÌáV7¶@'9?Y& I2xBM’Qã§Þ) •7LÅ|t;ð'˜éÓkßKæ·?°R%'žþ¤¹_g Âð.½?yo­Q9_Û9Kµ Šñ]ãËsŸ€Ê2§<V±Ì㤣ɜr€ 1X:µàŠ¥”­@KöǤ"‘ J$ƒ&“„A¨”³= µ©Êžeq–:¸’qŠÎe*¬SUH©ÔZíÝþìJkšqNq³›ƒî[aÙ¡Íá´’{LeŒ6ç¡‹)œ±£³Fˆ“ŒqE:´vHm‰ƒiÆ„54½ÏÕ-c‹…œC³X÷.äìÑbýsVpææòY¦¯S’ßNâƒJcŠâë|Š¥XL–ýÇ>î}öüÅûWÿ½ôÏ\oèÞ¨SæP+ejuê*¤AɱÍŠT†\ÛÒ>»¢Ë×IFl&XʈbTœHäJÝø*ÉTê¼¶#í”U{I¿— {¯J3”*˜%™Î„¤ šAÌ0×TrNµçÚ:Ñ,QÆJ!S×CûR»×úÊÎu‡Æ¸6(ÀµT€BÌ4 L…L¬âÈ¥ÀÿrÜ·m)_sB„Æ /jµ!${œe¹¾íƒ›Þ„!A>2¯¯ý_Xúå“îðsùØÞ|²×v }{¡Æ/ú¦ü³?è^u{:Ÿ®Ù\£–ϰc¿ºéÐÞØtjúô¥3è]µuž÷¿ØÐkïc{öýû,K²2Eò¿Îf+ÕËÅ+Ú6C[Ô·~‚:¯™s„=;úÒ|.F¥4¡î- k_þ¼4ç‚·”¯æÍ;pùç{ðêí»ö$W%ë~uM[øüñüEûZ§I!™vílÛN³6JÚB”ƒ¡² ‡¯ÞÞRÿÖÙü>yrwÞ„å›íçÌÆF¤X*jnÒnV÷Ç¢k_¾øµí'¦# Y÷Ê×úÇóמÿr„ý+?úåÌ,âù_m}«»¹Nºywô­ó?g¯ýï|+Czn(©cÝ[;’îùg;]‡,WS]ïþó_ðáÝoí\{ÊW&õ"ڂῳÅßìàÚiËrŽïЃŠoÜÕ ï¨Ýâò¦±™ç£ix¡Þ½w3O?w¦«‹!uØuëÙâK·×³W|¼ýÖ.½pãTq0}Ç+{œâÚž±Üöóñµcžåÿ]£GžÂ˜iò\?ý>e:Ú;k®¥x#}U¤Û}¯\º“çL’eêüó=eDeQö2Æ]dG”å¦YGèèx2äP%© Þã¦îŸ„a­8ÇÆB©è}<¹n÷ñäŸOÓOzà˜ò³ïòài3=(GßÑ=§·¯û£_ûãž ,#ío:];Ù bxöªLó9­e9Òþ87§½þÈçôd¾ðÖÙ*s)ØQ„3ÒÍUK1 $M€"R¦¸²*qsÈ9•ÛZ§bF‹¹‘Å<*Ãh1±<5XÉ©sþ vª9È$g†é ;/ì>ÃX·Œƒ¶r; gÖQÁšáLuŽP³w¦í"œYÓæê¼ª©ŒÑæ<”¥c83s …Ì„1¤0ãÔ“ k1÷Y£ºeÄpf£«"œY§¤ÍÙR*Έä<†3c8s›p&n3t8Sî)œÉ g2×à¶bά¥ú; gÖ«û˜Â™nÆÊάÎÄð“Ýå&™usXuèLÆH”—ˆ²{òäÙL¥±OÎO¡ts‡H !1 U‰±‚ê,cÉ}<¹n1œ¹[Ú¼y8³–å¨Ît¦DÂfomt#º§Úk×'ù/³?à Ï&ª ÊUedÎD{t+yˆ™ÙªÐÁçlÇíæëO¥Y õ•ÔÑý¦3ÎÖVP+å~ÿ˜mÙ¯úú&·^©‚Sï2sÏËÍ»Óoç:ÎMÎs»éïB=ã›é/®íuà7 .ÔâÃÎuâÊ “Ø›P†ð\5Þ ›ýÀ?è\-¼Ž&ßMW9ÿ`þM¸Tm±Ñ9ìî^üIùœÎž‡z'ÏakÚžÉm¡Änâ;#F­sº‰$È2¬•& 58¸û…¦vÊб_Ó|àbB˜Ë’"V”PAóËo¦#QøõåÓ9÷¾|2˜þt1vR>vžÖÿ9¥Ø fSþðŽ¿P>Ÿtký´š•SÆ)ÞÌ×P8r"% kû ’•=¼GV“ø¢G$6B8; °fÞ|[”f¤žœB‰r}l?)è¶“bSx·Û,={ûáÁ|ì¢Î4t¤ £ª$þ™œO´ýS1±¾ïÅaQ»8t‡X–%Äém’aç] ¤Ì `™’ÂØC™ÝKâj–IÜÔzÓó ZuÛvÞ’ò862ìήßN>žø Ôö)ðYޞȌº×¶}Za [ŠBé_å/f?p£ä>–ZšÇÎM>¾êöÂ[ÃÔ 8èö[ 7~ §Ö¿U‰ ‹o›ñõõ·éý`«šIE‹I¡$üëd8™âÙ8ß{ëNÿ>½磮¿‚ödÞö·O}0ðÂÍ¥nïçI²áx”É“›o£Oý^Þ¿ríºjÿë_'ò%Ä?U@’8‡¸Ù-»kyèšÃUß͵‹Pf¸I¥222•èÑAö 6ÄUÊe\\8¶Å…9=©Ä­I ÕÍ^£Rš,-”Q$Á(–h.9M¨²óûÐB‰%48£3» ãePI_mØ4¹dÅoHêfåPœ5|«Y!d]¼Xb«Šo”X}ñ&o3ئrvñæb—|ç2ÎJ¯ÊB©ŽÅ´Ïðqfßù*û®âáò+í»ØÌ¾óâh–hßɾ/+ËZ#ŸeÎÄ4"~}šéèQZá>ŠTË ŒüD᛼*hNžº­mОo_û¢Q÷¸ÐÙZÃît½cúîÑÈiEÀÐà`Þ œ ƒQ·Ürë_AᯥˤÊ{¡¦Eœ–NfØ^î¡-Þ ƒ\îylŸ’–_.5{ºF[j°ÿ [ø{Ù6\U±ëG×ë+.ÞY¬øì“ÍóþÙ÷ï•»pœ½G ŸÁvŒ¡Ó·oÞm{;äâañ᎔ÊX ë0Ž]Û ŒÍ¶Õò” 3§ @5•@j«¶VÊioXœN“ìeß¹`±[aB8œ¨Ð&*7µ`ÇaÚøï‰i®ÅæÆï)ÀØ(² h,u±¾ë°ÍMCÍ DÈ8|Ô«HA¼I{¤5J –†-'¨35æ9Á>T¸!è¼sÅcm_¾âqZdc7"n¡  s6a‘ðÌŒâZ—¶´}-Ä© læÙÞñb«¼Ý”Àéé±x¶ówÉ…¥ÁªSXg"=Q:°_¯6fDŸS;¯'µns®Î%¨§HãQ7/×\ŸO_è<÷¾Ë¨«óÓþãÁØžv{Amu³ph}’Nµ; :.7¥H/]á”Ò¬áúü«Ûà‘”˜6sæ'˜vØ.ÄðB ’!©00‘€f”i…P!’n\<en/ ŠáÄãôÖ; ufÄ "¨b ºæÓµ*4ÍYx{ùúå«×¿¾‡° âass£>C=Ü…«°qÍ‹Â]c¸à3èñ¨ß ºWWáxÌÉ>îžý: |>+cöÓ¹Ý5“ÂF¯—Þ²=³ô$¤«Ì¿§ÂÀ’4ã©pÒì>ò]z*õG<¤_TÝ»$ŽŽLSŽŒd1w|žÌ,êð@÷ÍëßÞDР{t'û€±i×ÛàÌT·g‹Ý*;Ââ @xÍÏ+±YM¶P>Al¨ ›ÕÁl=HlV›b3‹Ø±yŸØüîË——//_FtŽèüƒ s“q|ÜBL(®ÖÄñ]½{N7Ú#+¨L¨JYAd‘DVYAdË $?š=-ó ¿jì5éYí{ÕÑý¾ DÜÿÒ\3ìÇ×P¬Z©EÿÌö0v{Æ÷u¿<ªÕ° ©äˆ&(’fP.ü=1)— 2ƒ4+Ž&š5pаð½Êû‰Ãù‰hy¦<â?—/ÞüñÇåë’I4†Ìs{Q·ÓšÄçÔ¿ˆÒw×|«sÐÔ¹"ÇãCnÚ=ak&®†&×~ƒ&Nb.ÕQCS-mªÄ£ˆ>}î ÏÝü§&=±U)Lž;k¿g0{ûüý‹ïÎªÏØIþDáìo¿‹xôÉÏ‹B ݤèûû†Ýt˜†·:/dc~ÿ¸G ŒùO œKxŽø·_ü»ûs ×D"8 v<ÙCÛøxªÊÇ›ÉýDAña>Ýð^)W‹øöãàÛ\nqÄ·5ø6]¶ º69ÿ1៓#J‹Ùî0ªÚÎ2“;Â]Üáwî"ÜE¸{bpGÏ<ž}›Û„eêdÞ„´OGöëè g·÷súIÜt~6eòäæÛèS¿—÷¯\¯ÚnÈtÿýTiÚj–ÉÕª"4Ùëßê:3·ÐE¼±éºá gUò:“íÑÍöŸ`fþ^{1—¬7n1~8&»b½+±Ö¶º¾¼qã}:äëlA×¥÷'ï­E‡óµÝ¶TË 9Ð5¾<÷ 8N#$…$ 1¿.ALS „AIši›¥Æ¥”­@[D8MÊ! ¢Ä¹_&“ÄY]¥Ð$Ô¦*{–QÄY*‰kã'œËTXW¤Tj­öáÜR?+ã•“/‹ø\ÒuÖó[±‚èêð‰ŸãtÔœ•™9³olžÃÙ÷EjN]dŽÀ  €’g€ –‰‰û'…I¢p GqýÏõˆ?œÞÓùdl< K©=äÖ,,ÃÚ×}Á3Ü‚á¿Ô†b:«ÝàŸ-n:¦ÿÅ? ‡‡èàR "šqnïvÀô›yÑ Ê ŠL¥_Šs35¡N~£Õ"l‹ à1ˆ¾~ìQõØCeQ+X¨Æ$;×&Ñ”k͘bf—Àí€`‹æÅŸ˜'ØJG¹åØ–ýª³ÃfÝ —&)Ș_’uÞp$5\pÆXƨJè|7øúšê²Ÿ.@÷tÄFgXÖÌu« (Í,H³ k(±"Bîª è¶]°*Ü.ÅÓÜwÅÌ B1¼0v¤»¹'g•çÏÄ‹äì¡äŒ5ãIJ!ˆ,ÞRAçz*P"5&™D÷Q³ºeDj¶NAW²3ûÿì][sÛ6°þ+¿ô%´ $AÏôÌ(Ž’è$¾Ô–sé™W[$ª¤$;íô¿ŸJ”%Ùrâ$vʇÄ"qß]ì~X.÷½xƒnJ(zzº Pé%H@Ï"««(Ÿ®ÝÙjFù8UžºŠÂ$FONI…˜BK­eâ­C24`1>`-ÿN%µm’Úb¦®ÕUµlåbÒaaXñ–C8Ò@xA} ¬=®"é0-^Oë{@î†Ü7ÀáZY«¼Š¥ü­sx~#ɉ5¤/ùç€oÚ·çH£(Ñ]Àß^ºå3¤þsOì¿ýšb=„5×ÍÄØ•Âï¡fùçtÈá9ŽâÄÞïé…}“TÙÓi¡LGýz™êeˆ‚Z¹zV+•ælè@Q\½„î}ª5rkbSSã^d¬*ŸOG#ªt6,Ü[ŽÍ@œÌèÒ Î$Ʀ’ñ4ítféÊraõ¾¦QYÚ 3Y†ÕtN>x§ÙPy3›0S#™™KÅvÚ‡6öh’³AvñÙVd®¦ud—‰OjROd¹ªR&—@giŸ µy*Sÿ¯&,–ùE¡°Ý“4Ѓiqi~òa?05Š„íÑPpÏ~O³%ÆJxb’ÛïuÁfªŒæB{º?˜”Ž6».ë¸.ìópxm_ƒéuM û<”ÌTnÅþвþh&«ri6ž”uÛ& —Óã©%K!¼˜lÓ˜´Õ3 #“2÷Äå'ó"+fWå0•íÎøBÕëê/Ê€ä!Èè 1‚¼æËQv5ΕVaÉR|6Í *–¨k[X ³™MýÔ{$õÀƒNŒ&yy½^!.ÙèByC¦§ì ·ÙO‡ýrÆY-Ãé@þecÎxnkNò|NëªË³¡aŽ)“N‹IE 0èT©O…Geéë 5á3Tî/+…qÆí]\œ•0•ïZª Ø¥NÃRÔ¼/bÎA7¦1ÈRT§$鬟Oæ©"§uaBíJù° Ç¿UîÈSŠ“+tQ^Ï'a8ãR@-›BE>ï_)E|èš·²±MÊ¢ã¾mú:“_v×ý×véSAƒ,§fòØñ-9Ç£¾má’yå/1¸r)T©Žs™³Q9®kdÍ”íÝX›ÙÂ5(iR üPN`4åL—ž`cÆûƒþ¤_–å DÕ”Ê%hSWÈÒ[åãI9™ssj.„ãtA[àÔÿZ_H©Îcûõ€J‰"ð‹"ê7FÂ0'2 [˜¯Íî’e¾Ðzóµ­ßf{з1_hùŠˆ¿Æ|¡Uóåãdù¢a¾Ð#6_Ëš®² sÍSÍïUÅ»PY•Ò];—MC¥ƒ+»U© §+µ0ןN-ôÙbÞ;ÍæÏs1W]•Ò\2N-ÝÐ0 5PYÕ¹U®¬ïB‡.‘RI;ÛéÔ×¼±ûW³N{Wšo®gKk2×þK¸Á©Ö¹Éºan—`EÝú×lmi‚š×©Òšyº n* Q×¥5¤3ª!gÚj¦§B Ë–«fðæ(gÉl:Dµ0:+öxnY—÷²–-¡§ó&É!*g_–,­C971Y_-Yš+耟3´Î®Î‘ŽÃ*5<4‡Y7ñW…]f[˜Ï%ôVÎ9úóµÞWDŸùñ#‰0°÷ñ˜©»Å2:”Ms¨oœg³¾ñ‹ìm³¦ÜƒÖû“bóFö99~¸Sic,ÙœL-´$ßÕ¯Doó+ ÀÖy`Åúº¯äúZ¢ýí£ùkœåÄEU™JÍ×ÄIž LÂ(óDÕÐF7Õ*e*Ôú"wú˜¢$ Pà…"‘ ñ¡á1N°”˜©$_æa¥±H|IâDÅaò$æX&Š%ѯšƒÊ`kI¢"fEDb‚Œ+¥¿»èûÍÎµŽ¤2É–×ïÓƒ“óô@§ÃÃFÍžœ÷:é»ã·ç‡´Ýëµ^§ï»½×i¯ýjMŽÎ‡^çèE=áìøàM§—žtÓ£óÃvÚ~ù²{Ôí}\*Ü=><žÀóÆz ÅÞ®‘äÃó·½®#ë&>v7%HýMTY¥Ù ‰º¨ggÝ[ tOOÏ—$ùÞןÛ·Ó6Ôy¶™j§½·áds†£NðÆLë Äéž- êu^¤ÓÞ-­ž´ONÓwoÛGk'ØD’îò×͇ÛÈýji"¾è¼ëÂü©óÊH|Ëôé¬tó¬ƒíþÿU^¨‘Ê­úmDP#¦? 5¢ÖÉñÙ6~RŸ‹ ºm>^à=Hiob’AØÖ£@7¼‹oÚÁ9®ûVnÍþõÅ%N*¦üOÀÞdeÖ€Ö½_)0ü±ÖÊC*æ‘<ð¸$‘Ç¢˜$Dù˜ÈèËð£$Ö4 ”(¡(W!Æ8  BüJ)óe$q¢5 cŒY¬q(AÌGŠú¾YÝ…¯¾XŒ×Ã%“dDC5¹Ìd‰œÆ¬(®²\Ú™KÙÜæ™™j5wŸTšMv\¹,_¸WÆ{TfÂ+‡"š*NeHÁ‰Jh˜ˆ¸^ÚMoíÔ÷EJÈ ÙP y¹Ä®º ºa܇W»Ê÷Yµ÷½ï†×ŽßÿöñôŠüö×ñ›w“np1ûsòwÛv©ôRt-§…‹ûÝ´Ù/Šé-‘dKy]¿‚Œ(J…b‚kBüЧQ 4'(Ñ(’Bè/!dY}‘Î{dCÙŒºÏjéK¬ò¹ˆ%Ö5ùŠ( ˜5*âˆcUo=·jf§æWÀzš$ÜBLkʈqÇ: Iä×K;žÚ½î þl]”Q#9Îúîäšæù/FõïÌéD±D æa´" GT Pi$hS O6§ ÕL¬Ä‘æ@¡l”–5•Ç¥ëhš[¯k5 ËV=Ç9¯ªcw1‹™ØO‚$XT»\§%ϦA «8íK_1Dâ€%–ˆáXP©CBVQjƒ¯Âúdã@þ˜w;`(Æ"¡ZÝO˜Ð°6ˆQ’D%-ªý!»XGK— ¼®=ÝÉR…!áJ*ƒ4É„ÀâÄ”Q$´¦ÑÃpÚ– 1-9ܧ~D@/‘PaÅD„îó1{cŠ”"A„,BJ8S„bžhÈ×ù;Ró•k‰¿nü·±¸¸êëÉNM_@±D œ$HÇŠðRXKÆ‚B¶ÉíöV¢üuº½SnŒ3¡$ &I@}B(¨X0†,‰D¡är¤›Tˆß×q!, §›F”‰Iµ©ÐÌÔÄGZRY¹$Üš/i„’J·ÉËÜ›¸ %’aLDL|J ̰0%݉à"V¾š– 7æfÕO·…5Cˆb©¨4ŠŒýb![éÀVŒà ¤ú!Äþ~Ø-¸Íàõ:G˜]ŸÛs#êÇI`Ž©s{iÀ«T¸Ýœål5Ê1¨KX|Å`_K$×IX¬¡À-yRU­~¥ê _„FLŠÀ`s(.‚ÐË¢" Ä|‘c“!Ãh+Ï3¿8h"U’«H:I¨I ã~êO>§.lÑQ9ª–ú¦SOž¡ò}u]ŠÑrŸ¬ŸwßQ,­œjÆï;³´Ÿg_~.ú&nª¢î¢CU–B]íoÝYe—ŠIYŒû¡\‚ÖZw±Q&<èsj¶ù¥—FƒT\Iž§ôÇ3’š@Ui!2Ûg×H‹6¥IUˆ¼?®¼möCu`â`’ŽÄç ÍùUc‹ëJçÝ’(ØâßM=‹‡·åÊÕ¬o¾6§£©ñú·5ké,o•»fÚ&Ïbÿ‡m2 –Ýì_°‰©…vq°öÙùÀ~x˜ÅÃïÝ©6hY?àvŽ»²€%¦ J£cÜ(§å±”°X–IHÏØkHL<ªYèq_İNO"[̪l–å®×Ò÷ã€{$’È#°ó8Šá—ƱŒi¥o±œÛ7Ž™ßFO›£(ÿý~ß"H`ƒj‡]`—N÷´ 0BèµÇò=Àé±F"U³~r»¢À¬¨Ö ^¢ýÀ#+b%<@ycÉb¡Ô]»¢¶­ã'Ø|ƒ­›·ìÙ¬}ØFúÌ쬓[?µRnžYû­æ@‰‹oYûå¸_ÛÑŸy/^î›àjPøºo¾ì¶ÎÛ6"bŽ‹.õŒo¬FªO0¶" ôNXaCéOþŠ®ÅÇ«ÑÉ[¼óïºÏÜ¡ÿ,ù–w¤ëMþÛPl4Jü56Úþq\”þèö×&÷½Ï' žœ%anK3 £°ˆúžéP0s$x@ï²$ÛÖñX’orÀVåAÍÍ—ãÕÅ¥ççÝ·åF•j!¾³ågn’n^0TS•™qšÞFŸvmé9€®‘`[½jqÀèÙÎ{[õÁ^4ã°¼íµ%ÊìäÉÙÐü ÌcÝk5¾TC•3Ó_³©¸bc÷3Ëûý‘YÄWâÑ.ðÅîÜP×ÀÔÔì)lK—Wi>ºØgƒAve·Ií˜ÕñŽÙûVݱg?ï¬ÄD$6­ˆoËâ–é6Á2ÙC»'3R1nþ&ªÞ4 èN4γ CXÇtÈÝùÐóڿﯸT*¢ [K*óþlþßëàND‚ŠÎNßyçg¯öl:2œ-]XKŸ¨à»y¹¢ëÊYïlŠOé|o£;-͹ßkÙfÃE&>íäj–1Èg>ÏeżðŒ·k$•ôfÙ`:´åþBw&Æ:Á,/)3åÌSSó-:nAh”ÄQEÂL‚Ax’ÄcRKOvL$ùøÎcP·¬£¹ Èm@nrׂܠ¹ÿY»ýÇíÍ~Ö1»=U0  ã¯ÃuÔ[Ãs²8(Lî€Â Á'xªö=ý½ ]ëï¾Â7¡pø€ÂÌwäŸÂ! <³ÍÑ‹‚€E`ÞéïݶŽ 7P¸Â n p…(\Ã`?ôÐ¥ï@IHÖÐGr$Óc ÷½ê)Pa*ã@zšhãG#¥=ÌIì+|!%wÐmëhh@ÚЀ6´  ÷}ÿ™ù?=¢Õ“áëƒoèMzßíP¡O€Òc8ó| "CÌ/î#ÐG$Ö\"ß@·­£ ?- ihƒ@®ÙGu‡|®œ’Sreq5qš‘o®±ÜõwãéžqgCÙS‚–Ó¼ÃöÁþ‰´ªD³}ícµEûÈß×Ä1£É&[‘¼T^'Žî4äï¡Wƒëà™Y*¯`ÚÑ‚Îô+czçñ 6ˆ¡4+{Æ&W È¿-„Áö´þÔž®ñ »Á7äUoHóð1Ã8ÀÜÀà; ¹Ç9¼À2EL3’Üy_ø¶u4¾ð €o|àßøŸÀ£g`Ûz讇ÎfðA:€âžtN2·wúðÃ\wÏ}sRcñÇJP¢ý;Û¶Ž:7йΠtn sÿóÐêk÷z§ûF™™L•yõwÅd0°‘ÚU×l8(ƒÁvÖ”ì¾?ÙyÈõÓÿ¯ØÚÎSÇÅt<˜‚‘Ù5lZ»œêV©ÒA•´Ì2ƒdë—7çÏ;ÇG/»¯~ݻ̆jïïét°· jgñeVÒ<|šrUNüV&ZÞ¨5×S­¼¸l&1—£ªiáÁßô˜¹È l¬ç· Ù`ÛÄeÖÚé~~~þþÝshïhÀÞ_ÏøûwþïþWÄϼ›É÷!=»¯c޼*n Zºõ¯³Í‹²õäLj¬èÚŽ›}ròwšÕE7vëòÑÎg§ÿ #;——³[I¹\çù8ÂñÙ¸~ c¹>kÕË·Z•ÇZëú[AçÕzË9µ‡ÎéÉ]½Œ›µIáñÜ­°z+èØU[s&7¤Þ´V‡½j§m ãÂr̶+H17±ó•GÛ½ÔŠå3nå/Ù¢ŸÙ§óVöfQΚÄå.ï[õj{àÜN¯Æ×Äy ®Mѹšøôj\#IlŸZOµV;9Ü©MJ­s·t[?­ kûÉÎ!\<­Ñzë¤Uts:µæyîìAtÚÝkZºL‚Ó“¡ÈÉ1¨ÓºÑìIíPѽkFå,º-hZfV~^nì´ârï‚÷E·¶ƒ÷wïˆ÷…ñï×i:±ßM¡Ïh»œÚøÉéü¶ÿ“›÷ÄmÇœB¶ûŽøß*íüÙx?ü;ËsjÿN^$ü¿ùüù@ù·"•«Î5€¿ËåóF®Pry«ôù8Šã…jFÛj¯ãƒf Tá©þ¨´ÃX{½¶¦å­’èÐÁÜM¹¦SU®§¯C{÷M™Äòðqxp¨ôºŠ„"Ê!5Á"#“f0á›q…†^ŽI nÿQrÒø”@ž”…GöÖÚùDȡ⠔C‰+•ÇæÀÂ4yâ/ÜØºvQÚ½à±y×Ëı2…ô!i6 ”?§&¨B2s·©{éÊ_<ÃÿÚØˆŽ÷hDº>¡¶©ÛLù3±ÒÀÔùKŒb›3µÿ{Ký/LJÄÄ|NCI¬ÿY¡ãRkí±2µý74KްI_‡ áÊ,„jîx¾˜ %ØãNè F`„(½ÑL—OÊ…D—"FPà;›]øýE)Wr¹B¹üi.ÆR¦M0°~Øé C%–ÍÌûOè;ÙxEvÐcèPoÔ‡úfÉÜdžg b"®úDziC™ØT£ˆxÜ£¾ÌÞx ­7‡e{~WÈ29~ùnÁFg¸,<'“‚3°®üÌ ²kàí5Ûéͨç÷ÛP‹þIßð|ÛaÓùN”c”•ªò}¿'v{ª˜5´uÿá9ef; ›?yqó{†© jª>%Heº‘òÌP 5ŸÏ x ¾1›”‡ Ó…áÑ|nø4à¡ÇõÏ‘uáù4 LÎ"ÂdTh¾n†aôÓÿ?ovnÜ H^I#ýàkµ‘»¨4®M½aÛ×ÒÊÏ틊[h\Ï+v¡‘uÝlîk£j¹_nötC‰Âµ[pòË/ÊÅÜß·q‘³NÅÎ6²''–c¹µ•­¢mWv1_8‡‡’k—_[vö´ÐpkÐÛ’o–zZ.ÈóŸ–?/ʹJ¡ñåäjù×ÓRöâ«•+O[ýRÌ}-oi´”­îøÒ):+Í•ÝbI~ú¥RnœäsÛ^•³nvÛ ÿ¶–ß8@¾+ëdFû~ ë¦¬±·P:Éæ ™´ZSO½”óîr•°¦Q)œXÉôµXtwôæ³–ÇX)yΆ7¶é^Ø Ü [Å"[q· Åe®X%Ûûx‘ƒç­õJŠod»rîZS²nãSÉÚ:Ò@Û¨òœfkµ›¨å\ÙÚñqÎ*•*+’ìÀïËÏY5ç…Rê,o§ZÉ=71åÛ 8ò·œÖ[ˆc•WFàB§ÜB>6)v´Z¾È^”WçYgƒàm$±V¸i>ì"÷éÊDÌ®,˜?0uN-ç¥éSxÖÍrH¯é³¥º!séö½©ƒë=¢äHG¿,¯&wÛì´n¸WþìcÒñP"%‰©®mF:Ò~= \׃s\÷£ Üs@¦<=8ù2´:|Ž2—€Ö }_y‚èºïE* €"ÕÔHÁ3D`ô·ZøšÎÈ$"¢óP„¦j”R®aF4L>›¦‡= <аfPêÕ̰‡ph¢à­ñ~ _}³o†KòU¼Å,mÌ^ §™# žùr/'.‘dß^Š˜íç-Räg[|G³”òû6ì†MLÆÎÕiÒqµÊ|Óñ–é´Ë°6Ü7ûñ¶Ïtß&Þ—M˜‘ /[&-WËß—¼j'ô…Îi®<¸‰»òõÊn¨™L‹énh¼Gß FÛvN×ËN{ü„Ü' äµ„LªŸ%V_Úþs*œîÞ&­‡È{Ü`d`úkYê>öi¸Üz?^f’]öé×Àz“s2QhzÌ0„nDºÆt´üõ”§ñ&1ˆ¿×îÝ$ »Á}OfR_ÝU¾iË¥ÿ`N'“˜S_#@+æQÝX #,Lb˜<Å%a~õ#0T’íâ$üA¬æn–öqã‡b7®|Ôo/‡$­ªSΩ³:Öý~„“Eµ«uÆäÙ6€¡…f˜>˜Ø£†0ƒHcìÙ ’Õà{†ðâz²u ÿÌ»M>2‘Î`]bZHCcóM8<íü[Ì^ÃÔa‰ ÇÌgTh&ó½™20$N—ù;‹4[æïtü»Xh"˜~¨ †m€§M/³ŒQµãuÈõ—™=§À.^ Ù K¼†uÇ5´&’~~GÜäñÊ(‰â·àuÒê^Æó^Ì~>Šy`n€eD…uŠrÃÀL£&fQhÄ{fODZ}qÒw æö.‡ÖN]!Þ˜"€¾ÓS§œôFÝ@™Ö¦üïaâö1u  ©‡*5°PT5¨¡ÐP¤˜ê(öH>Èò¯Œ—ŸÎkÄ®¢4¢üÀ :ÍnwÚÝÃW2Â~ï Gð€#+Μä`HìàùЮüQF n½~¼õy’XÛ‡SçÀ+ºò¯Þ qß'I“¬¨×6æ1Ø0>¿74íhЙú²YO¿„ê’Á³RŒVûûy?M)Ö˜9Õ¤ß÷!¦ý¼Èýíxó½=“‰¥ÍŠ Â¹úϤ¡1)Ó¡ˆt?$&èRëÏÝ·r™QðÙëù›æýkLO4¢÷yÚx§o{·ï;£M›@áLÒ®/h(c€gMÃ=Þ0qÞ­x€È'bÔe=ÓÓ/”ê‡M¹ÛÜ莤ÿC Ô”é8Û¡õúJ"°¦­~„Ù/KÓMVÝìßphC¡òMv9°š‚{åØÚ«¢Ø55®ë±;%v£”’s+ûÝJÎLM?ò£!ƒø*Ó¬2°ÆTðWDÀàÞ%¾ÅdnOµøh4õ¶í±NËÃAÿùy{ŒÄA ou*1Ò<]‹¨©¡QÀªœë†jjžF¸ –Øßí¸+Å>˜ùºPMC Uf‰¦©:a!%qX’_:îºoà¸+ùÇ]÷;ɺôÉÙùcOÕíÕ‹tªn¿¶÷8U·ÿÙ´è]xñ¼ƒàô2ørª‘«+÷`óÁýˆ¿—àÈÅ]e oÖÑœ¦'lT\ú+aÖŠÀ÷}Ã-€M G¦êë&V…¡i„†4/_œ°o@“ü‹ö‚(oªn¾¯¾«¬s}Þðãï?+â ÷Ì‹¼Ãì½îjùÅÏÊ<±=Ÿ„¬lÔþ]3J˜GDûeΙŸ)27ÃùàSp¸_Ò,qküVàÔ%*,_•ê\õ‰a¨§žîQR½÷­#‡)8|SpH¸¼´E~„È‹ “…Ø`"ÑåN¨Î< Óó=Íç2ÍH0IAåû•F *ß ¨üÙ)Í>f¢2@Vú–L¹{g[Xë$ßÂz†$åy!ã?2ÐǸ o6ÜùàS€»p_›2íwÌÙ‹ä¡“ @©ÂT™àÊMĈêº0˜øL¼p÷­#¸)ÀMn pS€›Ü4gïƒa|Ä]øÛO 8CÈ&k<ø"÷}¿6å×ï@b¦h¡¸È£ñ\}ÍTpAˆ"–D§í û֑Ѐ¦4 )Mè·PyËú¯?>$¥GyùžÖ߇¢Œ¡“M8t>ø‡®ãÐWž_ø-q(äy®ˆªFUÞ ‚êöT@~8„7 ÃìYGŠCSšâЇ¦84Å¡©#t ƒiG8I@ô¡(Ó7]ɾ| @×({%Õÿí¨ÀŒE&ñTŽAnf‘L¾ÊU- !ãˆÊ+_ ûÖ‘Ð@ßC×~ŠéOJàŠÑùž ®Ôû$Ä»Éàšâä·Ìà*åñgpýå=ß;“mQ¬{ÇÓÎgãhÚD¯K¥< ¥å»Ci±~„é/»/ÿ§xN6ݦ¿| à×¼öÿÀGˆ ÀØg*“wÊø†©! Q€e*%ô"€ß·ŽÀ§>ð)€O| àSÿ1¼~Ä5òá±³‰6]”¹|Š×±ó+/á"X×;ìL4Ý`ØŒTÀFeT¶©›DõyùAä‰(|;ï[GŠSìœbç;§Ø9ÅÎ)v†ú²®[ú$W3Yh¦_qF Û÷m¯fÂ'¯sß%;ØðeSòEÊY;³Ô¤ç(ÜôÕ-ˆ{ÿ¡9èõcd:OGñêæQPÑì^~YG_}êðæ‰76œP¼!ÓO<­2x…ëºI ÛJvë¦õÚîÂ~7lOû¶q^GJ⮽ް„Í%*ÃóñCàm*k¶©®zᑟn+ÅvÈBW.ÞЀÒñª ñè ¡í~cÊÅÆ}{Z&#Ù´d|oþ£$k:,%Š´3¼n þ]ùRÈëôóñm¯OF£öq–cXˆo›]P“òánä‡ÉÄWzBQ»Ê|Rúƒ[V™—4 Tø¿ë˜Ì!JVE ¼V(7qÛS¬ñ—Jõê ´ç´½êÓƒ_½Bõ볨F¿`øí!¨jðlý]#W÷þ)Ö¯KmÑæ-ñõʰºgmA8§mµP³ÞººuZW{r3´;6.–ªW/'çîæ´Ä°˜‡÷®¥9ÕzËé\ÝYÍǦOÏîë˜#¯ŠÛ‚–nýëló¢l=9“+ºö£ãHÑ­=Y]tc·.í|vú¯0²sÙy9»•”Ëuž#Ÿë×0–ë³V½lq«SÃ5·†ë-›»g-ǽ:§WwöiP=woà}e\t¯:µI½]ÏY«ÃÇ^5ˆ‚Ó6ÐÀAµ*~”c¶]AŠù»‰¯<9­;b—ϸ•¿d‹~fŸÎ[Ù›E9 Åå.ï[õj{àÜN¯Æ×Äy ®Mѹšøôj\# ÃYÇ©ˆS­MŠ94®M*Ú¹[j×óö°èÞgŒ¼Çvë×;6Z7Ïsg¢Óî^ÓÒ=Ð`œž EÆÜ*P§u£Ù“,¶Ýð£ÐŒÊYj·² š–Ù£•Ÿ—me¹wÁ{ø;ï'ÙwÄûÂx‰÷ë4Øïˆ¦¶{‰¶Ë©MÞ‘œ}ovðÿî=ñ_Û1§ÝzGü‡5s;ÿ/ñ;âÿØYžSküwò7 ÿo>>Pþ­Håª3E àïrù¼‘+”ÜFÞ*}>‡âx¡ÀƒÕ6…Úëø YUxª?êí0V Ã^¯­€my«$:t0÷S®éÔE•ë™ãGÇÞ}Sæ||*½®"¡ˆrHM0ÆHƤLøN\±Ó1;Üþ£ä¤õ)<) GŽ2ì­µó‰CÅ(‡W*Í!€…i ðÄa¸±ÆZ„ǽà±y×ËÄÁ2{ô!i6 ”?§6¨B2s¿©»éÊ_<ÃÿÚЈq„(¹éû„Ú¦~3åÏÄJSç/e0ŠmÎhÔþ?ö®­·K¿èÿ õË<¬(“,ÞJƒFovw˜\¶“ f»ÑX,–­i]¼º8É6òß÷ª’JrI*Ù’-Ù ÄfÉâ!y¾ï’ÿQ]~¼=BÄ ó¶ °þkIŽ¥Úz_¹ñ_Y-—;rÃÙàj-ÕÜóü¾”`wúV§`„4†Ó ˜.íÆ{ BwCŒ TCwvþ¢ÑøðéÕ«‹ÚóaìÆ4t4ldûÉmø±ÙzQñýªIÄ‘,är«w#­3B:ýaj{?,~ôW±}_ø¡q‹ÇUGÓù6GËÂFÏïaœ?I»cŸÐu;.èó|¾žéõ ÅÍÔN‰ö‹éMS[ZÞÏ_¸G଀Š@…üɼ#fAhyj)-O)G­Í³.úåÉ×£á¿aNì`˜g¼ܧR­3u*Fø¸Ë¡F¸ˆiäB–£§6Â9NHÂ9C™a1€~”‚W™t¡³R‰l=#D #¼‚,ÎaXŒ'Nâ®øë†p‹ð5DPã8è(‰àŽ÷ñ°˜xj"½›åýUÄ7–â«Wã™ï ‰º-+‡r{ªp÷ºïTñ<ŒÛçëðAÍ¢Í1˜tÿ‰q{Óœã/E1õ·Kik€¾äa>|¾Z@ŽI54HB4ì ¤Š4œ4l˜7ÁÁjYi4Š5ΰƒ”NXr“j¢ËÊà°Zx2üâ"ÇÞ”&n®E¾žíJ ®Û†=ÂÀÝk_Æ']ÚgÚ‚Ö>,ͺ<;[Æíܹ¶£I7߸UVßÎÌó‰Ë[ Î>^Ù†«©1Ìø¹p׺÷Ÿ¯ºæª1°6m¬Œˆb»ˆÉ}³¢ãôú>}îözY1þ•24¸×ZU5ó’ÿßiw4Ûdq»ÕÕû%STôh×N‘Æûwzšv'>n¯ŽAE£jÔÌ[øDQs±·+Ò ššD¹ ›ÀÄŠÆHÑLrÆ9áQrvk_ÍÒî&´,Vr®Å„Üe}½‹›¡Ù¿ÿñíPTàÞ ´2ôι¡‚r)ÉDŠQh«(":ŽTJEU²†ƒ8Èá9Ù+YéþÍFi¡Qæ1…ÄÅ\ïìʸæ7Q¯}±©»ÌÜ=Sª{~Â2¯ZhËw®[ s"£…Ý}ËÆ®²Å×ІŸ¢CV{EÑq«$Ž2`Ytî[|°û2´CüÛéÙÙåyR påftmšØ>‘¦“noìkïøÿh¼Ò`m7éê^cd'ÓL×ÉhjÝŸ¶D‘âÚŠ Ìq?Þ%f÷¶j¼1Cª\€¾aOÙk ;»©<{n¿{{ñá—wý;ÐàÑ7`r¤[øÖù ¶-­;re|ŽQ¦-’Ú/º&%ÔFˆSÁÓ4SDXR­µcLƒÚ>IÓd³ERgDlò„¢*bK,H´qþÍcÞ_¼ýñõÛŸOØÙƒâØ·MSo¦”ٹæe æ¶Z^²iôt2ìLFÝËK¸\Z2°_&ÑtÐeP:À¦U6±ò–¤+)ÙpdÊq;Û-©8&³=XR€è„žâ£:߯hVø¹hü¥3÷3´8ÞÍЊYXÑ<=Kk¢vÔ¸îO6¸øñâÇ€ìÙˆìÅ.+”ZÓušì GÎø; ýíìçÙ7€ýúH`fE±Üè#¡·òû`ăªEáEãñÄ#@<ñÄãÙˆbìtyé釙zpsòûºŒW­ù.¤ÁW,0‚“c÷˜Xµ‰ÿZl›éR'ëáh\èåW cÂ0‰O•E,ÓépUkÌ“$6)Éì‚ìÊB ã—½aT¢heÑ´9UùõâÕ»7o.Þædeox]’óy]ùíµïQÿ2vßö™W€¶f˜Ÿ8vÕ’”ó V X¹`í°ã°N°jͦJ” ˜0i&Ý^UÞbµÍÍ®{. óèClß¿üøê—‡9ÑjË…ðDAf™S°nÏf$Œ¡» Æ"p6…otoº;óíDFL¹€ŒÏK‘jw÷e vŠGFÞ *ñ{0Á…ʶe8@2 ÞsD½wo~Po;êÍ—ý´ƒÿ=²=&Ò¦<Éûî‚DVà\«@ @0€àÓAÖTê$÷Óì®A@0€`Á‚Oeãø¹€ ­t‡‚Hˆç\ ‚"€`Á‚Ÿ.ÆMŸúþ†Ú1¢²Òœ‹ €`îx]Á‚ž Š6&MJŸËF‰ªÒ\a¯5:ñ @0€àÓÁ¨ÑS?­¼~tè탃s„#Íׂ`@0€`Á‚Oy“Ñ“<ïí.îÐXT  ¸yÁ‚>]”MNž‹;+^‚NÁºeÁ‚>]Œ›â1O–yà-·/)‹ €`†À˜‚>]$¤){. Ȫc¼ ¢ë@ì£HÁ‚Ï—.à0xT0zl+ nÇ€oŸ¢¤E™ˆäÚë§|Åñ³9Á»Úõ"žØ€¿þü}žøK›˜nTÎø‡R7Í.‹©½WCUAâ\÷‰á^Æ“…Ä;ά ×0å P ”޹ÂZÆÈrÉ#„´e ÑH',É4MR7âêgì¦Õ•—X\éh®ôàÒ]sx£;nXw½–Ê „:Góý‚Ûø¼®öŽk;W]‚4ÿEWdÆH¢@Z%ÐÂ2¤…ÁH&q–r%‰¦Òýîåèv§Õf‡èÚº‚9@×îXu¹k+n»ò¨H"¹W’àoº4=«Óëñ#_ȈãÛ2æK´k©À®G¹âp¿Õ‰Rp!c0á:ÆM¦í:Ü¢ìиÅþqññâ!wXæÞ\Á0ÿîÅí&Ôºj589ð°ƒÏ]Ý²Õ !ß…|¼ ¡þô>Ä~ u ›­ƒ8y%P*ÔŸþj¿·tdúwÜGõ Šñ97TP.2™HãÔžUG*%‰¢*qz€GkôÀ,Æ,è N[ì8'j+í7¤†Bpžæ:-§-r>™ãóŒkÁ³H!jxŒ˜M#ÇB"Å5§1ÏŒ°©3 ø>7óÑõÀ¿Ðb>½urXQ´ÅÅñ耵S$v ýÞ(>÷Ë¢#‘ïÞ•÷‹÷6*•æFá¬Ô2šõꦮ<ø ¥‰„iÎ8Rq 8IGqÃ,á<¶‰Õ$Jí¬”üëïQÆŠþIÀD&„EŠc€äˆcÇ {fMœ}Ÿ1"¸QQ*Œ&B(#­IS̘Ò:~pýs¨)XSíDM"÷{QÚ6úuŽˆªÎºX´1èœ{ºÎaîð“ÓFFk Pœ¢Ì&b,‹Q’ ƒ`èiep¤·i£ºeÜÁolk«ßþ5Ö_g³Î`,Ÿå«¼5JrNÜžÏtT©¬Ð¬xD7‚k¼Sçü>{ùêãë^¸4ïGŸtòxf•2V›$c s¬µYÂHœ‘“¹ S(9=Ê"›Inxs¦R È«Ø@÷ÆP©ñKÛ};Ñ0Wµkè·Ò'-èÏ¡ký£¡3¾¶fìkºúÜ .Ûº×~¶^jGS{öíÛ":®24‹ßÎËÕkÔ¿¢Ó°flgõmŸ"âB4°“ÏÃÑŸ³^É5(üÂòýê”sȃÿºzÞ}@ÿúˆ^¿ÿÐ."²î—ÙìXüÜîéé |m4'‰ZØÿ9[Î7±£>L—Õàα÷q—£!P»Y73*µ™žö&s¸F}ø#OÿìÌ×}Ì(ˆõlù¥›þâço¿±+/\Ã\Íßq³}8F0sí µ)ºö¦}`žùÿðÑGaÒy¨ÔÐüéËtol}èêØŒº×“ÙÊ›7Ñ—³õÞo• x¬íù©U¢ÌÀ> ¢ ʳŠ(C䢨£#Ê;Þ”H99žœÒ4²‘ÂHÕŽ+1R©tx É”¤‚mµÚk–±'ÿ½a®ô˜ò÷Ÿ>þ„ÔÑÓfvT†>ð=˜·o‡“Ÿ†ÓAêi†¦NuÂwz¶9ϘáÙk÷cµ4‡N{ic0œ4Èá o­S—,ÞïÁ*rgrœ„s†2ã×tR‹C0â*“ŽyK%2§1Õí[…ÊÍ s'yZŠQiœÐ#0ö`ˆH’ 8 &‹ÅX ÊE›­Š±fG­åäά3kº3y“Ðý^tvwfM#hÕùõ¾$èœ}°4Á7¯w£6ŠÅSÁЙХ±E± p[Bá<"²MÕ-#¸3÷ª±*Ü™uJÚÙ)b)¡hÜ™Áyw&k³x»;“=;SîÉ›Ip;cGãͬ5óäͬW÷)y3Y›ÇÁ›YÛ›)š”vÙÞÌš<WÛæó6ž¼Ê“w¼òþ½™*ÃVÆ4AÚ‚€fHÉØ ¦‰#¥Q–l5Úë–¼™‡eÍ»{3kiŽúÞLÑTøˆw;ªÝéƒLz?,~ôÛÑ¿/¦&nqŪµ¤ÂÇáÁ<ÊÀì]5%Sáüç“Û\¼}þTª%_ÿ—IN!O§|¾R+¤e&=·}̶ìÝ¿îY7©¼Mï²,Ìs°É“^¼äžçö 0ÓÆen7Ïçë™^Ïsôm8r;{¥ñrb§Ÿ@9~;Ê -Uã̰E—й\zÏ ÃU•Êoâ•jG®g\ -¼œ%Og‹t_o‘Ž[óï)vCK-1…‡ JŒY0ºEÊ2ªc%,¥ÞÜŸÍÔN>:ö‹éM=\„9áb³*X~þdÞ3³>O-Y÷yJÙ0Ϻì:É“ÁÐú7̉\6yÆ[æBž>?5¥vPÍÚŽÃßÏ×XƉP E"ƒ¾0 #m¢ %V¤XC×$’l„/; ŸÐ¯éìXCübBŽ~=)‰v{~?~åéæóV<:Ç;yKøôÂß)ÉxL E`1rÄbŒg ^¬áQ™Xl3„ë–Ö‹6MÐ +B¹¯®BE´ÉÕÃ.iïßö¬jc΢i®—ŽÑöŒv<â2ØžÁö ¶g°=O‡™ÛóxFx°=ÌödªIÉ¡C¨Nühñ[4-¿ âÇv¼xæMà}÷Þ÷H¼oO ¥ý†Î(.í˜í óè£gÚ;µ8ËZtèÃ.éïâ8ΨQר±wëVm×\4áÑQôØÜºLíè:‰Nб‹aFF1i0b –j„„”&ÓijuosìÖ-#8v×Îϵ^]÷p†ÓIw ½ö°ÈÝ85“áÈGòd,žØ^/žÏîdÊ-‰4Æ2â)s$ƒîâïƒ N’˜&8âÞF*bmÝÙߣî-o(áý \l9ßšÑRtíZ– G’ÓáçAayp\ÀØÅ³N{ö¶æOÊMOI†AÓ Dèzs% ÚŸjδƄÂx:•¦oî{RÝ÷8¶qƒÙh%OÀФ%XÄ'š ­9yzHð½ Àë¢ró·3¥î¥Pi& Êx ã@Y‰€ög ¬ç<ã,NXY E¸y5ÅÚQÑF¬#f÷Êz*?Š¢)èjÕ„µ¡Xs‹Œ£¨XÑ8’j³Pî>.Ø]ÇÅ:JÆ£ýÞC^EÉÞº7%;¯3·Q\r¹hçämU ¬oG䨬ð`9#:–,вF°1M„T z>S*R`ÅÐ$åÛx\Ý2»ß¤ÞDöœOù¨ÐîîŠ]µ%„ò;èuüÝ‹?^¸íGír[ü—{1éöm»Q¡ [œ—~Ës,2@/Á¯9ªæê±sÝ›^v¾ Ç­±ŽºÃÖÒ5Ÿã¹öoUbÂòÛÞšv8…¶t`T‡½nê‡Ôü~ÐÎçî䪣§“au3T›Å-Å$¦ño/ÆS¿0›öŽîë¿7úÓÞ¤ë®*QÆŽvùÏa,v/vªL'™zqýur5ô†—ðÝ—í¿ýíqpÿ]%¦‰C^Þº[K÷ì|©:…aÑà'âì|¡±<9Ð6\ÂgÇ B#\€^`Ý‰È ¥1NX¼õ°¬ºeÐΗà| Ηw¾Ü‡Ž>ˆž•«EªýºZ®ÝÞñjÆ&ä ¢“gl§·X–0lI"$µ5ˆeJÀÜ%)‚Ä4KõmÝQ·ŒÀ×ö¾ &oí7îQíË+@RÇÃ%½Åª®LòM?Ž+O]oELžÞA& O¸,C4vwŽºuúDi… – ( ©Û®¹j–4W™Z©ÀJ¯ÍÌÎÝ¢ªÙwŒ![¡‘•T³TxqtÚ_¼ù´òhq›sò¹¿9EîtÝÁsg$‰Õ"”ºsÙŠ èÂñ½›•Pßú¨&».v»y6i[„º¹¾ïu.“"’ͿޙŽçAi‹0¸^{Ã˯¾ gâΣá]Øú¤žŽlñdrrNýoþÌB ãiöô÷Ò`ñ?[¯ozYo:¾r?&ý®ß¤’ñÿì]ëSÛ:ÓÿW2|9_0X²|3}gÒhzH $á6sÆ#É2„æöØI¸¼ïó¿¿+ù‡$ZÚC[`ˆmYZí®vZKZ¡)nèï¯ú1À&1‰ôÔø>fÉ¢þ1Fa¯?IBlvŸÔqëëÁà^ß'œ6ôõ 0`¤r­öw|8ê gAöž?O’ºuPŠëGã©fK,Œ„¬Ÿ±@WÏ€êÐ@CÜèöFñì.é¦Ô䌯e¡³iý±ÔÍ@Gû½ë!”U—V0Ý#ʉÐl‰TsýL$jý®ªj0šé§_{c£‚°oà LVU{±¸aÃki „‘íÇH›×ÿFc1œ$¯Ž{ºé{ .?!7ý/îõ$†Bºì«Á£û?Ðì{º…f$¿Dÿ.%&–‰9Ž‚ˆ “~Ý#Ýi&5uãP>P®~“DáAœ*ô& âÆlœœ®ØKÞF DÙŠ°¦éKšß2O’Á$X:¦r%ûsÞ‚¤þù¯Žš¼nÛÛ îk}`åßr_hµûÚ4³yäès_軯EK—ù„Üòdã{ÙðÎMVftWÁE×ÙàÌoe&(µ¿™YÈígj‰æöl>îSË–ž5î"7]™Ñ\p©Yzbaæf óª¹Wμï܆.8‘ÄH§¾35_ycKþ¯à5RëY¾ÜÎ&Þ$·þ ¸!5­¹Ëzân`EÑû|mâ‚æ–75¥÷ôÜd¢hK HgXtB©k+¸ž 5,z®‚ÃËQ΂ÛLÕÜé,ùãܳ.îE+?\@?©ÍŸ»¤Q¥þeÁÓ¦(ç)&+â«O³äSà—:ÚÔ¯æH'Å*<”ì§ø+Ã.)f›»Ïô–Îý€ûZ@¢Û¦ùžHà=„Tãyƒ¹iÞÎ8Íz*X²»ÉDsèèMÔšÓ^ub®æÑûˆ4­Ý–™³©‚v0}?Á¦>8@\[/ìÉ`u-Ξö™Õ²êôÜUU©ú9‰F}õ`82Ä‹™s–9“E¥V¿òbà‰0"XÀˆáb°ÆÄd–ABƒ‡7…E¹½o ²z® ¦t1¥&&Òµ±Í©Ë­€JF!;¸%!&`/‡–°AÇ¥ zÐèçΕѥä‘F1ŸÎýÚI׿<Õl^(ÛW;nžt;uÿìø¨Û¬ûÕN§ZûäŸ7:ŸüNõpE‰úE§ÞÚ/>h×þ®wü“ZÃou›U¿zpÐh5:— /7Ž›Í®ß<Þ¯ÁÅi§q\|ÜhVë~çò(h6Ô“¥ív/ß*¾~Zo׺uÿãÁYñîáiõäS£ÖN[ýx\ûÔ^Óèiõü™7[Ç­…æÚãSõêÇnÛ?د­{Ô®vªë:ùw£ø¤ì;kdìi^À ëiT4V§~zP­ÕW i±¦:J?úæäÕkÝSß­4’+ õø¸ó 5KÂ*ö±Ûþ¸,‚V¶Ù9iúÈÇkÕ¢Úí¬SŠ/µãs¼žÆ“\¯­Wqìh…&7»GFÊÖur:m¬í öÍu\YæÙzž©íZ»ñÌ˵ÆéiwA“[p¿x]­ÕêGõÓ*ÔÙ^ϵÓΑ‡,º¾@«ŽÿVÃz sí…t€¨N}߯ÕO;Ï´Ú>©žœúgGÕÖ ÅÁëXÒXìàªñð»â~ý¬ã†Îa£õÒð©/‘Ù®[[*—Â’©ö¯åPêÇjªn¡5PÒ"Ö»‚’¨rrÜžcɯò!ž€÷Ûä3‡µ µÜìN|RÐÐZ™vÞç>uŽ9Øû\G_÷ÑÆÈMÀS<åêÔc² = èkŸ¾¼®TP/¹g ¨åvܼeIƒPŒ<ÒÉðÛ@·ê†¡%•Bz\Ú–eQl#üÁó˜8EÃÙ®e17´ìÄL$=óÍÏÓ@/®oVãÕJ=Ò¡¤œÜŒ‚NYߢ@›•åJ—Fj_!0˜%„ÙžgâÚÏrÄlgëÃ6ÉŒµÙ±HÈCØ´‰Zf˜Md ä€'“ñŒd0ã^¤3ÄŠlôÔAFI÷.ìÑ…¤ç_¤WïÚ׃«º³ o/¬8ó’a‘®8ÓIžzq<}fuÚBÙ”âï`ä&0½–‘Iõ±ŸS”Øs,¹ðÍVš\ÄÔüdJŽ‘mc5Òáˆ[²Øz¤ÍÌV!d.Aô¥ÜĶE(ƒ Lj *»¡cÇ,¾ÊTgõgýÑuBˆãQo8y’–躯’[lå|ò¬Q‹ÛxE˜åxÙ2DÂî•.©–£†L,­M€CàQ’š’‹ã$È4t|6†I«F*9#«cg>ã™Ø£˜âyµ‹u&¤¬é„`jš)".f4„¹!b–+ÀÚ„,u"±ßÓ…íÉÚŽü““r-0Ö¡ ȧL„y˜ˆÀ¡ÔIx‘}®Hןò@óe¬³Å£Ik$¶M¸Tñ@›J`ÆjÊ<$ÂÐsÞFÒziÄùz.LQÕ¢ˆ„¼H=£ÈqÈMGrÂæI¬$bØS‡:¹æ[ˆøË:6®8D: IbZȳBÎÁa ìA’™t +Šºÿ¬tåt†cì˜g›– @+ 0J€&™¡Ú ’¬0'Í®Ãu6ïùV  ã.'‚›žé°KÄ––dyo"á”ø·½®ç€‰ E„KØáLÏâ4”8p¬¢|³T…Eù¦ýNÄñ]/œlì4à†‹@íÏ¥…®d¼¤Œ¿‡t“›?3õOþ&~öE]xÒOêLB$Ø3 a` \ÁÛfÔ®ƒÞH‘“ž®3U ~ßßǹ²PÈyŽF‹88ðBU¡©ÔDZ0£dJ¸5Z° —žÓ—<Ä8ç% l——˜žG`„ÙŒÇàh. ]ÛòݼœÇ6×›~o#UXÑÇ B&ÍCÊ1›¯4 `+F,l{á[¨ý+‚³H›#Àë.è:¸]“#Œ¾ã™.LÁ˜-ŠÒ^èð2ž7g‡ [Á†r Ì%L¾\ð/„Ñ€‡¡&kÈ&0E£oÁª¬ÕïàTQàË 9à01Ì^C*¹À¶ žE:!0ómT6ïÆ:Gf¡M¼<Çj|qÐDO\:Båñõ©rÓ¢¨a2j Ø€\TvÎçd-zC˜%̬‚¬Ánp°Aà5Mµˆ†¡zT[@Iz Y'­n4yÞHØË½&ƒéÌŒ0¶Ô1bÔu±-‘P6fo#ì´ë“ó\´´×´^Þ¥S û)øçG„ï*:«a%m¢ò¿%± ϶zŽ4, ƒ˜ê@€(†¶Ú²ST”pTùWæ]V¯æIÀuüè7©^`Á 7LŽ™ô§cxKåí…ûƒÉ.!x!“¤×QŸ)‡vÕM•Áö¯ø†Eú#éA2ÿk~üò¦¤ügûcà«xH^Ra'UÑ(šøyfßt ÙœÐ`˜ÍÿU;ªžhŒŠöTò]¥[‹4éˆð^Ê1?‹´©ñLó>/2¾yˆ{jÙUÆÝ9AY‘X^+—¨&{q ˆŠI$óÒBëKé“ýeV2.=ΟôÆ3â§)¹ýXŒ4Í)1ðÌY÷¬D8ãM«åR0r‡âaÎCuNGÖXš@Üg“$¢·Â{ؽRõÌ·6>W*’³žú.í§*(¢ê¿•|…Y%E•Da—Dz·½ ÆòÏ ÈãÅ€ü7ì–ªX;„® ÅÏ{û¯¯Òø!ÇGéîëˆá«Ž‡Y¶)Ø ítTÀå4I‘Óê€Ú„ʳ$°ˆá…Ì6¸)\˜ÑSÇ´4º ûl6ŠÒ—x˜¦‹¹AœæmG.ü -7p)‚gI2ð©¿ÏÎ¥ÝÄx«si¿ç`¬W~µ X¯qx³­|(¡Å‰Ê&!nP ¿"n”PÚ¿ÞA\ç,DÜ’jõ/AE40F.L`0°|i§Õ¦uü;­ðØ#úÌæÐâG„ ´OÎ~o˜ Í(Ys˾·7Q2ÎôHtÚ8YXIúF^׶¾Çmc¿v°§lƒÁ{ê ÃV³ÚêVõ‚Š,]?™·dktEý°X/Ï÷Z½“/ÎxyÿyX3Û¶¶Mï}}%ƒ#6`»:÷ÑZµ¼RsäwuÜß·¶ÒƯ=¯ÛÁ¿ž{1]0ŠcJ$‘ 4˜D਴…”®É^>2jÓ:~÷òcŽ Ø·¼©úv;ß õ±Û8JvÄdSö­ ¿’« þ櫞¦GRûœúíUX°)²^vÃoà 51ñîF4Ôξ¦¿˜*bƒ­,•T!‡”ßÈŒ˜¢WíxŠïØ8ý9Šz×½¡šîgßñÑÈEo‘÷ T_mI‰uK7w~4¼ÞcýþèNïÇÚRóè-µÉn+>ë¯CO—TØX¯¥HçÎÏI'ôz ƒÓ'P6Nf$\~ÇÉî”ÈèEd4ŽF׊±©Ð¡tý¢cT¯ö–‚/S…®Å"•®,½÷U>dj’ÒµOÏŒnûp¯Ï¦CuæÚ|Ïâó‰ŒsÍÏ…š—P¤´;í½ ‹¿Î¿¤¸¥ÑûB±Ù`^ˆO{ý`¹ÈôsžtM«yl¨¸Ø01õ§€`é g¢¼³RL ÚZʃVˆ'Í W±#ýÆjÄH¶-û}…q~"b¤«£âˆ]"ÆUˆ‘¼69.þõÐ]õa(4°ÊÉB\J Žò!IfK›½„7­£DŒ%b|SÄèf ™´‘k1î…Цªõ5ÄuM̹ -"]4“ÚvhÁ1‡ Q"Í÷‡4­i¾¤™-­ü÷Ñæ˜Ý a¬éš«±fŠªî¸Ÿ(þ§ÒVtV`° ãžj#µ®»´]ùðáòÛ[*,„ *¨Ku°pEU¸‚{ÛuñŸ‰z‰¹êÀCÍ‘w°×è=¢^ûµ¨÷Œ“b„XzØLÊ B‘m0¼­´Àá”Z/¡ÞMë(Qo‰zKÔ[¢Þõ–¨w¡ÄæßÅO|ìmSú»äsz*Å;xe¶mÍ‘2ÛöJTêü¨Tz¦ÃUJlÓ ž †ç:ŽázŒ Ï#ܳ_üz¿i%*-Qi‰JKTZ¢Ò•–¨4Ã`·MüG®)Å;&ZF¥)GÊ5¥Ë¨Xcþ¨”’š”S[4ˆ0=ÃãN`„öMšÔtéK¨tÓ:JTZ¢Ò•–¨´D¥%*-QiƒYÛ.zÏGËÿÀ/øŽ·œjµÈ‘•>E¥Ö+Q©C¼_•Z’»&å‘®gêT@”¦kÚ|=±yø*Ý´Ž•þN¨493¤„¥%,}Xªb˰ôý\:*'‘Ê<½I+T "S¥ÂÜ1wÜ*iœºIOÒç->3šÕÚÞ€ ?«$d{ÈÙ³ä¢{6ݳ‚T%v~GØY«äëðó*uLÏIÞúI¸zy oQ3pKI§µxýKx¯Y{°ñÚÜ|®^™›¸•]å“óe¹æsër ²M½5+„oTv°m­Bõ9GJTÿ'¢zЛ›!7:q`6vÏÏ>B{­>;¿Ÿñó3óêâsxi}DpoœÛpÝøûŸù!\]œöEŸÞŠOgncø¹/0EbÐê7nÍÞÕþÁà_>^Þ~™4o»V«mš­ÛƒÞQ§ßo=v'ÍNÝláKÒz<\uºwÞ][ŸÇWˆšìõ…uzÃ/ª½“vã¾õxIŽ;Í»Öm7;ÕÇÆÐ¼nÞ~¹kîWÓ¿ú´Y«æåšI¹Ú`¹òáóÃÕôåâóíU»Aƒ/÷WƒÖ ‰æQ§m­ýËûËži_u:êÔï[ûÁàx_˜Wƒ.jÖqc@Øy‡}àA˼|þÚ<¿º½ºmõZ5ó¡¥iû‚›çÉñ¹æï}³óźº½¶Z‡WýV§Ú;ª}ž‰AxaŽÁáÁDÔ Ï·u«u{m7«¸y{ytôÂvÕjÞVçäVxlÞt qÔ‡Éø}HšÕ¡õgj‚šs[Vâ6µb/]ýƒ/ â¯ìF_Þˆq}Bm©ÛÌú3±ÒÀÔùËêc›3¶þµZý‹ˆù˜††Xÿ3CÇ©ÖZ÷Vjûg6ëºd=l˜Wa"TcÇóÑH(Á÷ÛZö‡`„XÝáL—ëHÑ€J`g³Ïÿ°¬úI©T®×wÆbldØëévw ­X6 d÷²ý¼ ƒ5ÒŽnÛ%„ëo{ÒC„#a+#gšÁ_s;ŠˆlúðmèGsзÀ"¦™öcýô-„L¹)<&“ ,?táÉ{IZLÜv7lFÍ8G`F-wðøiÖ™Q”\Øa*µÍû^×$Üìtí`ÔÐÂM‰Ç”m7d²tGsXh‚Ù\ÌfÒE¶”ØB› Êw¾ñÖ;‰<îiÓžC%>™‘ä<Ÿþ]¤sP>.BõÅT;npLÅâµ2ùÛLëÄ©ÔgFЀN5Ê»±ñD«õ£âѱzP¬eYD’Êì³æÃSäÞŸ™ˆ»åÓ Ì˜:û•Ú²éS~ÔÍz™nW꣥Ú7ùx{2õšbžé&õ¶¯ JâÙ±`E€E×Ñ+eëÞ†Z®¶>hH±› Çcþ¹Ðp^9ŽÁÞ÷ÂuQšC°—€§þP™DÓöà1ôœB_3øt)èŠL¸™íŠÐ±E­áÙ.FQäGiõ!Êq…qD4ÀBš+íPJ…ƒVßq.Qè†TDvµQ6–N÷y“Ö5RA€¥PXiE°ã˜5ÚUXQ=Ýz/^f’ýøôk`=B!&’`ÐpÉê> 5–Q •§X G.ƒu‰9šj)0§‰Ùëq–È0˜)F‡3%5ã&äP“Ð¥ÓüŤMó7ÿS,îß5£ÁÆÔzÁ xQ@‚é€ #OK^šF¡T/A¡¸ÉU&ÞKýƒ¿Šž]* sãœÁ$!1&aò:Žnà¹ø…9颥 Äïùcœ‹PJs—¢Å\òÈThfª@ØÅ3‹A71 ̆ÚÌŠPé)y»'´Ä¡ã±Àcˆs3̰)@„ ¤~ZN|›‹—~¾’(d ÁõÂ(€%c£¿¤#AW"ØJ2J½„دáœ]Û ^÷ ƒžë‚ÚE ;°è»y‚`éÓÜžðc*<Ån%{ ¶©5TQs/My _˜¡Š\&kØa`¢‰— Õ¨ÕgPjšáarAaFU$´ ˆƒ@³h7b¾ŒÈއ±H‘Q¼Š–WÄÌ/ÅšŒëPi70Û<<Í]1Íj0Fí¶ìëM3{L§x˜XÉÞ:ÅkX7¬A 5‘qþ›¤š`ö›•PÅ/Áë¤Õ•Œç•˜ýxI07À2"„Â:E…çaæPŽY¤C‡È—av:ŽÅ‹“ûÔbn³/Ž%÷SðÏ÷pßY{Ýa'´Ò&¬ÿÝL|AܲrWÛÔÃÍP@mÅÖƒ"'ÄÔE±CÅ0Ç”_3ÀÞ|:>íû–¨Ió ÛÍN¶êoá+  ÏÛƒ!üÀŒ‘Or®$öú ´kšÖÍþ•ìÅ›¤{‰ ¾™z ÖèÊ¿»}ÿèÜ'·“©¨ÛøãnŸjÅ ¥ ;#ûß´cêéuP½{kdk¶O±Gx'¥˜?ò´ñ—˜öã"·W÷}XZ#A™êШH__•0ↄSæBã“HìÒ©ÖÅÉûWfYQðÑëñ›æíæ§g/ü~ÐûœvÞ¹‹ÞM… hÓ"Pøfn'¸ŸÐЄK£E|9H) œÇÀ~aAyAàx.ü##wÙÚUëø ÎÐ’e8ß X«]EúÌìü¾GõVêÅw:ª·ZÛ+Õ[ýÀ[ ÿŽd|ªocpYm½6=ýP¼ÙÈ>M$¶˜‡_•V~þ «ÝBB3ÓkŒ)òjîgWŠ5¯<£.ýåÔK :À¶&5F¨„-(’vF2ÞÒTÄ«Öñ¨—ïrEÃJ¸åEuÐ3Pì«Ê¯1†ÕùU ßÿª³$.¿jA¼Ö<¿4ZïóÅÊ‘±8ó…©lØúEs_`´¶ÒÛ„ŒŒã È8¡Hç #^;#Á¿dÔ*”„…æÌˆÃázÁ=ÏvCÁw”–{$V­#‡Œ9d|YÈH Ö@ HEØ‹däq¦±Ç"Dâš VH@.•tŒ9Ã= 7Ä$‡š¯jâŒ[½r¨ù“ æNÉö[&Z‹¡Õ‚]ÕCLàv’b>_Dšâéä˜l9Žó6a¯“™òmB‘öÎÃ^²v"â_ÏS*÷\ Â#µÙ? \aKá„¶fÊEH•Šô2Ø»j9ìÍao{sØ›ÃÞö晈§AÝâÂRF3½±†"nK³`éº9Ë~EXêP©w”i$m&³e ‘ˆ»ç óÑ2Xºj9,ÍaiKsXú`©¹£ý×9:ÍÑéèÔÝBxù¥²¿!:Å„¼,t:¦HŽNçÑéšÀ~Itª$R( …-TàØL <,ävXÏñ<—"¬–ž^X±Žæè4G§9:}è4‡¥9,]–ò-Bß(,%Ù°tL‘–ÎÃÒ5Ïðb—‰_–ºXiJ0¶G „Gk[rMmá)M"s!Ë`éªuä°ô·‚¥¯!3mŽK\êü Ì´l –|sfÚ€ìh¹Ã¢W“™6Ï/›™;ß93íOÏTúR€ÚAÏ ÓÇãÆAº‰ZÙ6Jy¡+–DèŠ-Ìßh(„ , Õ)’£úyTÏߪWÚ‘Žíx®c3­¤IîÙ:dB©cG,¿*gÅ:rTŸ£úÕç¨>Gõ9ªÏQýïêÅÞÛÔDˆl@R$Ôó€zÍËÁv½_P‡. OJ[Ñ48 ][`WŠÒQšk­É2@½j9 Îu¨s@êPç€ê+6Ç;f13…Fú‚Aë¶%;º ¿ÊömK¶‘ñeÓð¥@sÔÎèô£¬¯®@Ü{_šýnÏ7MÓl¬Ý<0 *¥0uôlúðoÜì+œU>¡¸oÒj|eð -æu“¶_÷—è¦ùênt¯£[iç2‡ ÛFŸ*ÑíüPiN‘y~o eVùX³¥ºjÉ5&?Ü‚2Ôõ'úûähãåÌ*Í帓h»ç§lôo[CÐ2Ã7 e¿ d_ÿc%k:¬%–14d'´6ÿ>y_.Öö*ûﶯºm½ý0¶¶ °îlÃJ|Õ쀚4?n†J'3ßê–Ý±Æ •Õë_Y°”˜„«zØ·áÿ=XÈLr,P²6²àµ€r ®ºÖFåþýÉÙé{h¯Ö’g_¿¨³SôùüctAßcxö%$åJíÇãÐ÷ï?ŸÃXÎ?^®WDå:¸«6Þ7á;vÐøxuq]Ôö÷®>—S½.Òƒ³OÐOTkTQõì‚]4+ýJ[Ü˳0 ÷[@ƒŒ ß™1W9ܽy¨î^<6NîKEe÷›ô³øõàºx9)W%q¹âíõç³V_Ü ÷OïÏIí.<ï7ƒö郢§÷äÄÐÂ8ï.®oKèþâ¬rwÐ8¾º8û48lTîj÷øh 4=þîµ÷+̓ÒÇ/A»Õ9§Ç·@ƒ‡po”̘˴v} ¼)’êà ®î^6£z‘Âx'4­³»Ê'.÷*xظXÈûÚnåñ¾|?ÅûyšB½¯‡¦ÕÆ'´XN?±W$§_áÙbþ7ʯ‰ÿÎs ×v_ÿ¯Ëd1ÿOè+âÿ}mzNÍóÿº˜ðÿòÝ» ëÿ,£\]fÙ!ü]¯ø¥òqÃß­¿ÛÖƒ`{¢ÁƒÕ6…Úm+Ь¡H[ ;aKÇ tÐí¶,°-¯¬D‡öÇŽÊ9:©r>%h[Þ6MbÌ;ÈzcÓêv,E¬MÊÁ$#N ˜ˆ'qÅ“îÚ~ÿê«d¬O$à—5ñäXƒî\;;„lZ²om\±io¬5Êmžx 3ûAÈl?n%€ÇæM·Ç}˜ `Ї¤YZ¦6¨E €sÇ©ûéê|Qe72ì‘Õˆq~Bm©ãÌú31ÓÀÖùËêc£3¶þµ þåéªbb>¦¡!ÖÿÌÐqªµÖ½•ÿ›%h úzØ0®ÂD¨Æ®ç£‘P‚Aî·µìÁ ±ºÃØ.;Ö‘¢+(”ÀÎfžÿaYõ“R©\¯ïŒÅØÈ4° ÖÓíî@[±lþÈì¿çW¼esµü»Æ2ñÛÐdë¿'Æ9æÞ¼Ó¨à¢¬Ëñ&„øé;™ŽpS¸Ù‰zH0h¶-\`?r·€¬y/4't©oÿñnB»Ùi¶‡íé]\@åä×Ç娓»´û‡½<¢¡‹‰q»F¡I´J†"¢ö8yçD!C4r5!B(‡žãbí¸ZsA% ¸Ãþ…§O¦Ÿ>nÿë u ™ ¿žç%þdb¸§ &ÇoÂf?~ˈìO[íãïâv†·ã/Ú°èõîá¡çzbö¡ßV~âÙ‰½&SÍëäƒØur9SÞ\Ò|úÁtI4×lÏpÆÔP@³Ÿ¤ÏÙäyÜîè9*Œû3JƒçI<[b®gðÇÜŽ""…¤Êd¾MsÌ.âZ•#Ú?ÁŒ‘º3@ð_z€ìrG"O(—s›ºf·0àÈ–l¥ÝIRå1ãUÏÀƒÔÝ¢‚½-]L²tqLˆ×ûu1]óÞ…\çº8׏.~sÜy†.vÈA¯ùlÊËëbOdI‰ ñ:nç|ºØÁëÞ$P®Œseœ+㟤Œã`3Sý‘®Ô_ƒÖ0ÔS1iç„&5d„;¤oÆœHBÙÒ§Smé“騷ñ§³á‚éãÛ^÷&ÅaŠé‡B$Òçc²®zõ|Œ“‹ø šï%âŒ0â¦ßMÂC¬6q<Çf.VæÈ¤cc̼ˆ{,ÒZŒ©óšo&ZKÏ]v@iÜãlc Œ°¼eãÔ9>̇k&‚äððWƒ‡‹§M&,-;ÄýöζÇm[KÀßô?ý°æ„¤HŠòEPd“¹½n^¶I‹»mƒ¢¨ßÈö¬e;“-òß—¤$¿ì‘'öÄž9š±e‰/‡äás)žZc$(–V™'1ŠyرÅ1Úª’åí u¸ß­Nµsë<¸ýÞßç–ëWï3ij›Iñïý´l²öJ,o9c{½“Û¬¦ÃIûFÔdûÃ¥iMF•ÙéxÛ¼Fi«œº[•AéS8óañÃþr(±•ëÀ©öö_þÙv}Èþé¶ì?}Ûfl?uÜײSû_ñ×’0ÊbŽMfÀrAóò.JºRB·H›V•à¡ <fô/üü>lZÚß^·Ï”¥½2ãt4ì·¸~â"ˆ=hþ#¢i_Þ/à¥v÷¼ï”ñ|¯€—AëQ9/ºw™üOŒ»Eà|¹ác%TÞZ†fåÚl`á1ïÔÜ©µëO·dì‚Òz„(…±„âä¢ÙÚŠŠ3ÅÒ¢(µªÎšjR*¶Æ:!‰µ‘â4•Ñ2NlɧŽ*ÞØÛ]ö·¯ÂE«R)í=N!KiZ³=Î#wÏ}u2qóQoWàóÝF}>xÒ¸#º<Ï9[Ùm0³h0é—Û ýŽ}9êëb#h g|V_SX‘ÙîÞšØ+E~ æh%^$Åg×gÎZîÁ™Ê¦¦õçnþøóÇÖÀ(G'—jÒr»´[å;|mBEÒ¹O{=©NËí‰ùóÇH¿,¥cæ}ªUÒª¹‘„‡Ÿj{£½½\쪶£¹!a ×þúµvWu>®ÈGÒz÷öýç`5MúršÙ¤s?ÙnXÏø!Ûë æV\sšFÙ‰»ûŠfP*y –$:kð{ygZ+¢”aÎD@«aºË°žkÉ”u®G¾ÿññë¡â›ç®µ®÷TèH\”¤‘FŒkƒ$Waª´ä‚jÔ£KÀâØ=  Ù+º¬5ÿVFiÒ5–å>†ða¦ç¹ŠßÏæ6ä´}ñÖ]Fñž¡ë‹°J^ ͹զ/ä…ýoaÚß0ãëÌýM\ñpL{å5IÏ­Ý9¦Àa°)À€ß›Oa<9û}yœÔ΀Ë7<·UwlHÓI?Ë}î=ÿñcë…Ê2+kú©¬56“éØYQck¡õ‡~Ø2"Xysý–tÃqЧj yˆmð7JJ°º²½me&ííŠ_åã¥iýöÍùû¼ýà•²ϼÙSΉ 7DË¡2ÀÛtÉŸibš² ,CĈLQÄ”ý‡ ÍS‡\GõºZF ”õIZ,Û •&=¢¡3ÕáfèÞInkóКwço^¾zóó±Wš(Œ}›5ÍFø!¬™s^5bnêÛ³ÆI«7÷/.ü9‰UxÓÐ\Ozãé°g•ÀÒQLK‘yUb‹ kw™a²v%õrìØíÆ”Ä8 Ñ~Œ©¨Á §bL5ïÚdÝ‹ßy ðrÏñVì;=ckj;•Iþ훟ßÂ$“ü'ùj7 JŒî;ý‚¬Úë ÂíÃÍý;Lú[¯eÞÁ˜6o颅‹“ln øwÝɶº­•“þ¬ŸØ«ñ¿çkçþØþöRCp\¶Äm9ñöõëó7%Üî ù–åӦͽOðû†üWñïfpF}¼*ïP&"þ4ŸgžÚCqæræÙóPØÒ~ÚÌÓh8Õ‚` ` ` `Í^°æfì>}GƒXy'kw n½{þáÅ?î“6œüã$ó—ŽìÐsS´ë[O‹aj;ÍèªÐ)V€Ú,èy¤ÿ×÷ WJWWWW[àji€Õý‚UÍã|û¢'ò†Æ´UTó\.”¶îÛ+''''§Íà´´³ Ài 8ÍC£¼Ž¶=}OŽ ;›ßêžW÷pGÍåUÇQ!pppppppT—G!Ì;ÂîÆQµÛ×çrŽªã¨8 8 8 8 8 8êÑs”ìbÒ‘ÁÃÙz¿§u½R.·…ð89ʉ8 8 8 8 8 8 8ª‹ƒNDù®½›þ¨e¹GÕqTÕÅâAy¿¹«oY.ÀQuqæÀQÀQÀQÀQÀQÀQvB”J䣿(Æê8j.à¨:Ž’ÀQÀQÀQÀQÀQÀQÀQ]‚;¡™£pTçòr8óME0pppppppT—Ð õ~=BDGÍåUÇQ;¾z8 8 8 8ê°õ_<x44õ½hŠu8}Ô4U÷^¼R. hjM1 ) ) ) ©c¢)à(à¨ïÅQ¢#÷©æ8ºyç²\€£ê8JGGGGGGGu‰ì„üqG›µþ('—8jGA´9pppppp”ìRÜ‘ìQs–uQR ¹GÕp…hsà(à(à(à(à(à(;!ÒNÄõºÁu§x¹Gmä(ˆ6ŽŽŽŽŽ޲"ïàèQÇ™“ îôƒ…\€£ê8 NãŽŽŽŽŽ޲bØ¡øqŸj^ïšË8ªŽ£Â9JGGGGGmæ¨÷¿¾xq~þòü%ÔÑ‘”õD#’ÚJ ÓI?˽hzþãÇÖ •evOú¶/Íd:v£y<5­þ°3`JY+7¶Ç'P%Š3Âá¨.Ä}!@8@8@8@8@8@8@8@¸-Hþ°H*ÿi©íü~Ö8à×SU)# ª}PƒÆS¥ª;­ZÂ*S,¦ŠjšÕAD%‰8\Kd§ÜÅ)Ö4цêTPîgõµbìBõóV™¢kp_K5¼púk¦z®_÷­ú*´÷ZÓÕ ÕýãÞ§¼üiS!ì}¶Û9륉ΠjŠ8NX[=Rf“1Ô–¡1’„¤1ÓB˜(¼—f,Ps½Ñšu³C4mSÁ iwÌzSÓFBÇ$¦!ŠTL“A*µÓ¥2‚ˤ2¦ÉQÐfñÝTThì³^nì8‘í™{ãéÐÞkÔpz•ïÓ‡öÓÂä{ÖÄÞóî´¨ü€ßþÀ àwšàw·‘µ…ûŠ e ¾6𵯠|m{ðµ5ö…m¢Á÷û‚Á›”Ã,MüóüÃù=Æ{‰Ús\e!nþntsÔ sä|ÂÆ'w]î«W!Ç­ Ül›?mlâz%PV”(ÓU͇Bãá/ƒþ=W¨Ìf‘?:×%i¤î3Hr ¦JK.¨Ö_ãÚàê(ë zôÀiëÇDc…‰C;@o(çÜnRszFž=3b‚ã(ˆªØ2RÖp¦8DIÀãsÎ_gPY¯Êj~w=ð/´OoœÖÔ=ãâxtÀÆ!YYúUq¯ ‰|ó®Ý_Ý·U©t¶ g-—qÑ>¨Ÿ¸ôì7DCCl<¶Ã"ÂÅš…(°BaEÍi‘JYúoHcMÿ$Z`Æ„’ã$•Ç8Š¬î‰™ÑQú,eÄ­ÉIh‡'£±R‡F' fL*Ý»þ9Ôl¦vÜÁâвºîr0C7,³,ê:ç[—Xç'§ASaµ Ò ·Ôžª)Fâ’R¢a2nÓFMÓ¸Ãòαi¬[—wîQcýÕ.hÛ¾Ü.œ÷MRrîÛÊï^ŽtT«¬P‘<¢$ îaƪð€©ó{·Ÿ¿øðê·swÍJC '½r)µQ:NÃKAM3¥D$Z§Þßn“.oÒÀ¤Ö6äAÄ™Lh,.#mÛ7’<Ò>*b`&ÊVåjúµ ê|埦6Uá4N‰¥Ê4”Ì¥˜r*“BXXÖV±âq”JEB¨Kµ?PfIx'‰-C„„’bVfH¦Š£ëPÆ&8kŽÿu7¸+Ûš#¾a‡ð…±Ìܤ >(¤fj6*¦¯|“ç™W÷‰J·|ÒÏ?•—ÍÕ¥˜±råÅ®?««òãhÜ¿èU6_É3Ûž~Æ\ÛîÐ˯ŒÎ}N—Ÿ{ãáEWeÙè³ñRû0žšöׯ‹HÚÚ0ZýÞ^¬Ô/„þ•$v²ÉM‘ßöjÍ !ˆížhh&ŸGãOE«”*Ô~ae‚.Câö^[üÌwã·ïÑù¿> WïÞw«˜–´m’ÕßÐëç/º¥{U"©êÑ LWÓ®Q]––¡ìÌ–ç¯Þ͘»«½|ETWnö¿|s÷>³³)–Šö×iwËûc!Ú—/þÞuÓCÚ¿p¹¾~þæ×çÿô‘CãÑ…ký²g– ñü÷®š©~¦â~ÖŸ|éýŸÕ×ÅŠãLùnŸR/÷gfÞ%íõOf¾:Y®±ÚßÿòúõýÏÝLM‡v*ßøMøöÿµWŸ›˜ñÀŽ–õ8ðÜM*®pã‘E»ÕåÍĤjšMæ"p•zÿÁö<•êÍW}x¹k{õ¦Ù`q‹ó·ÏÌÚ Wv(Žç÷¸Á>Ê‘¸f˜˜ÍFÙt`ɳük =q“Ìã'Gú“ÿ–ª,77Ö\ËêMÔEqùµné. î÷´öuPfÖ>¿PÞ´¨#€ò(d×X$rrœsš„©HP¸B,dI•D" 5)¥J0q'7Mã6Nþ[K_ª±%åg¿~ø;’GÍì¨ }‹{vܾMþ>šOz”8ÕiËéa3Ï 0l¿*ƒZ4‡M³¤5M\¤Oê?koR—ßï!8rg&$Õi3DyÈ$F‘±Ÿaa*-hŽ;3¬;ÐW“‚ÆÜYcž”bŒxZΰ}‚‹1«GŠ%F:6ÔhkƒÑߦ›¦qÔZî@îÌ&C°¡;“vHÄŽÞÙPçHVR±¨#èœo¥4Á·¯w£6"¡r¤‰Q¨ã1l$R4¤(aL1š+v›6jš¸3÷ª±jÜ™MRÚÙÉ(£r¯»Ój÷V&ÙO‹þ ƒgÕÐÄg‚Ô鸨Úwגǘ½³¦d>úm؃¾óø©UK>ÿëI‰ŽnoðòQlÕ´BÎô$sÛÇÌ™¹Vƒ«Ì¸Aåmz÷È¡Åé.~¤öÊÐ3×:›ú颿ò†o‰+R¨Áüò—yKv}yuɼ/¯,;æ®úNÊËÖÒú·;ølÊoØ åõ¹XGÕlìâºø~º¸Âa )Q Ò1-1R:HQlD‚•I‚8dëâ«^ÃÔÃz;jÉu0½_ò»Y[‰ö3¿ë¦6°ÇÖ"Sx/€wzñïQÀ¹áA‚¨Æ 9 É MŒb«Nbš˜˜Üº|Ý0 X0Ú6@·, •κÄ¢Nˆïw‹ÎŒO^wò­¯ZxzéOí¦›$æ`{‚í ¶çw²=ÁH:#©çí„#ÙñƇ [¬¯Mî_G]·¬µ¨ÂwŸ3åw/­±žÍ'’$Ñ %X$–ÄC«‰B•¢Ð°P’0*ŒoÝÍÚ0  ùãs#Ê»‹Y9î•×Â>î¹wMõd4n—Q‹_L–áÅïÅK; ]Ç“‡O–"E,äIØ4ŽãˆÆ8àÞ)SEXômEÇC•­~-Í(kÓÅ-ç2ºS±qJGcm/'£ÏÃÊ ã§Â5ä.Šaš™›˜ÿ²\õ„¤Øjz(³ºž„£˜Ùú'îøN… 5Åñž§PõímOêÛG& "‚‘ yŒ˜¢ÅXDÇŠ ¥8xrHð½ Àë¢åêßÎEåt ™¤¡F)Ol?&´ÊJ¦H„Ö¨ä)gQÌ–ÅPíCÁýˆ`3¦—çãÒ$ ­bETq+›Š7H;üÄ’FA(%vW8Ã?<ùøÄ…"u[È…û¹þÄZƒ¦Ûª›3ÉÝ0ÿ½|bñ€ÕÁökéì.a§w•M/úC¯ ó³\ÛŽû£³•·åsL;«…·Õ»›¿KÈ…WöÓ/µ5a¸ËÂ3ID¿?ɧ>ª0fÇXÖ­Á4›ôÝ«2Ÿ,ó`·åŒË§¶Kö‡«bW¦“T>¹ú2¹ ³Ñ…-úE÷ÇŸ×9~¸É©wp°ß³n¿­²ûeó°.˜bQg`óÇÈæMe… c1.B{Ic”„ÂNÜ4 2å·zÚ¦llllll~'6¯£„‡ØnGàºý´¾ÚpêI´qüàƒ#RªÝI£bˆ\`ƒDÒH÷.·4–:¥2"ámÈÖ4 @¶½GØÁKÙQ¼_xoVæ¥íUóѪêÂõª‹ÉÛN]u,<½=N8Á†aNŒáÅÜRyª”æ<1‘d·îqjš(¯#µV‡-ÝVŸ»Åú.ß1¬` &ks)ñjWõŸ¿þuí§Åþlçísÿ— Üë»=émY‰yF(ušª ͵æv{±[¿©­ÐÜ©G^Q¼ž0{XÄC¸¶ÏzqîàoïMóyäÂ"V¢¼XÄITÏ-ßšŽ!Ԡ̀ˆ°ºXÆOT™Ø~ëÞÛsníl¤ªçÇÓáÐvªÞlPm¢öÏ•û§3Ós¯s —Èմצ#/W5Ö—NR×Rô„—r—ÎßýÏ ôËh`ÐÌÿ03ÃÄŸ=Ð~þÚ¿Úm2ºe£‹/>!gèÎc´]0õ¤žMõËäÒÊ9ñßüqÆö§â×?–:‹oü<7ßè¥Ù4¿tãAßâ¡}‰:F>nÂ?agO¤'co _çjV¾e× ¥ýlR8&ÔìºHã:÷߃kÙÎÃeÄ$ÈŽÔØwûÏñpÔÎ’ê¹ÞèjR¤í³°wùã‚Ó«©K®QnÙÿ¦Ÿ|>¸7<%c¤/ýæûQ>û\TÓøâ\]˜¥Ê–éçÆg?°}4ë_ í½îk GŸ¯Æ&5íÅ’qÙeU“¸.—Ô`4ó¿~ê_¡Œ$i†l!†k²ºüòâÝÄh QqêCžÇE¼/ðtÐ/Fü@ù¿W:L³äÝç,û”“ñx.ëªÈ³AY-¦JaôTòïi>ùö®¬9eI¿ß_ÑãßáFµõRŠðÄ`„e|ÈmŽ8ATWU d¶ h¹ÿ}²z£ -۲݋^jÉÌÊü2»*3%è÷†ñ9€”ÂÃøíÛ = ®#( ãuýN/¦ˆ `/ETë‹nØébYÐÙXdÆÁdNc%7žNLÒëÞd–Ý•¿¯/LµÅX>¢ŽeÂ{=IÈ‹“k|±{¢`:ãX@-›—¦“l|±ƒ¤ûè¿ÑXÆ1'jÜ‹º¾%`òãá&ÿËÛÈÕ7%0A–;fñDóDä{Q]aÇÉþM2˜©ŽÕñDMÄ0ž×-Ž&-t4ºqhVW?¦I,ð5Mf¯Ùµ¥ljzñ»Ã Qº¤& ´iòRDo=ÏâÅ$E²¦2!wæ´NýýŸ(vò´ÓXÌ×úðÊÏ2_xµùÚ6γ}üèû˜/¼Ê|¹ ­0_xÙ|!ÊW˜/ÿ9ÌyÁækQÓ¥6!Ó<éú^V¼s••*Ý•KpÑ4¤:8µ[© Jôoª2ý™h¢¹>›¯ûD³%Šg¹ÈTWª4 d¢–h˜¹H­jf•Së;ס F$VÒ‰íLÔWÖÙ’ýËYD{§š/Ó³±5É´ÿnHTkf²˜ÛX‘·þ9[› ¹æMTiÎ<=7©…ÈëÒÒæPbÚr¦'E ‹–+gð2”³`6D57:Kö8³¬‹Š{QËÐO¢óç&)AT‰}Y°´ ÊyˆÉòøjÁÒ,YÁø%†6±«ÒI°Je0ë!þJ±K‚Ùææs½¥€3C?`¾ÖŨ󼩽Ÿ=†Dj³¤·pO³®Æ“‘) Þé6¾æ ¥7‹67 U‡uædúéÁ¦µ‡u22Y¸DøË‰7õÁÚ`ÝzaO«Õ­¸»ÞÅY+«RK$YYL£æ«äl2ê›Ñ-7æÕ]¦L˜ZýÊæü:¡Ð^8v(@J˜žÍC—Û’{\Iª´/¾r1«ïIŽ´G8G„iÏ!NÀ½€*®w߆¨ÐPùœ…„)€_.ST: ãZ‡??„ÔkæNn¤­V•,_Ê¿~TmUŽ«wïOòW÷ʇj•VÒë»fåCkM§GåÓGÞl4 ݵÚÍ#óê»ãVçý^eÝ­V¹]^7É¿jù; ßIí}Jžú\ HXSk´«GïË•êJ&-¶TÅÉ×ßlxÕÊñ°¦s\}_‹ÁX›Íö#£YbV~ŽÇ­wˬaxeŸíÃzwÈZ±(·× ŧJó”¬ãa~¯m×Pì`…$×Úµ„¬ëøtT[;ÒA먲L³õ8Q[•Ví‘—+µ££ãInÀõüïr¥R=¨•¡ÍÖzªµ|LùúUò—YÖkˆSk-Ì  ƒjW÷:•êQû‘^[‡åãÎÉA¹±BpÈ:’Ô'¸j=Õ¥a¶ªô•É´¸¤ª;z¨£“iÆ[§î4éz/î‹$¶›­9œü¢ï¦30€Û|ì ;ÔÎÌ (ƒ)^³‹"™öÏE‡íc†÷~ܧD‡¤[¦WÉhbÏ–Ñg€-@Ô¸Ë$E‘ómDLÉáÐÓ6g>ü…}1®„p¿wŽË½Ð'2¤s-µh‡RÊ̈ƒÉ[ßH¹Šò0ÄŽG©ðBê(Ì0 @í£g?h7ᮯãÕ0ÊÜŠJ=ëŽTŒ¨Æb:½MT¤Lìè 5ˆÞ0L3ƾ™§êÞK“ȾI÷Šm“:{»”=ØÇ9Ìl9LÒæØ=b—<2èŒqo¥ÍãÖ½dzÓ©ªy·äèît4•ÀÐfsܽ‰&»ðöÂî3?^Éî³( to:½Z¿SmñÙdÄß@Èm’=•qóÓN6¢4›¸YzáË­F”Xð@‚ó‘v«F»¨Î÷>‰ÔÌ«\à\ë}ÎDʸŸÆÌ„–½Ðu˜»í=ái”†Ä_ôGñ@ôPG½áìAÞ⋾É~ù*£“Oæ4pЊ êú;:ÄÒ'ž¯èI³55riŸê(F%n)þÑŒCMW“(J›.øW;᜶Qš/ÇéµÜå„“y³‹mÆ'ç×LB*ðîB³OA`æÁCp± žôUèÄ Ù&kƒo™ÂF}²v"gÃ&{Tr?”LÃð¹!Æ>aR¹œ»1-ÒqfûãDtYÃët#iÜSÚqX MÊ|&Å™ÉË#¥ð± Cß}NG$Öð×÷ÀK5[#¶bòâè9(Å€„ruÀWø–Ä‚ø&Û‡‡žƒÅOØÜ±w¬å2í ¬¢Ø§a€Á”Äg’ÅŸ Rîæv/LÿQîê«Ùd4Ì1˜)ßAQFÃP¡$H˜}ªÝx·ù308îvív¹»{—†O•Æ"”"ð&ä#—^bަZpì? ‡“Á?Çêõ|T¤’³€Qéø,šù4à¡&Ê¥yþ¦µ òüMæÿ‹§7½pö*§/ /”D*¦%帼4 •žƒBQ—Ûå¥gýCg;»QÌÓl(c!,â#Æ((O å8‚»Òsñ3 r<Óuª ÄïÛç8øð´ïRPZÌ%ÊMƒf¥r„]¼  F±K¸u² b*=&/Y”qNK¬7€|ŸÁ s8(¡€€à L@²Ãå›i9o®WýþV¢°b ®§B *ÍÇÆ~ G€­D °•`”8~øbÿ„øìÜ0àuè¹.˜]`”¾ë#,™çö„—©ð»1 ÀaËéЀ‚ºçËûÂWAè2ÎÁYÃ?©Ò^¿Ry†/O"ÄBrÁ`Fƒë@eÑnÄ|‘ͦ±ÎQ¼•ˆY_h"™¯U ]i ýøJ›bE<ÏjpFí›ä™Qà1^ËÞ¼„kšã5ètXMd¶ÒrŸGšPÅÏÁë¸×­œç­˜½< ¸àBAOQîy&‹²Y¨•CÄó0;™Çzåä>6ƒˆÛ_Ç‹juð÷wŠàYQå+éÅúß×q8Èw²¾«mêa’Ôö¥ØZ:(t¦.Šb*†?æù'Öf2¯f…¢ÒKi^jÐÆIÉ:WcxËÔöëƒÙüÀŒ‘… O\’, ü\Я¹hªÜ¼žvÅ$úTú>öÂ_ϳo;”¦1VÞÅ/™È“ih4™u²ê?Éf²ù@Õ0 ˜~L;“j²k ôñZSÞM(ÖIƒm&N|Ñ>{dܽ›öÌþ«”ºó¥Lõ…± ±$DC&>e.)É9ö &Üe¹Š‚Gq)µm« Æeü’—‚P!ä‘Àf®Â6÷Ͱ…ÔSÇp/FÆ‹>1ûi&Ãm¸ÉdøŸ÷ñ‚‘h·ÃsíÓÔçÞum´´™'}Û÷²%}%¢@Ú_ïØUè;ˆhÇÆ0‹aÚà¦+›KþzàðÀÙ˜æcÛ6~ƒcWdÓgœ¯¬íŠ«n#}fu~ßB[â;zÜ®ï- =n_.1B€‡"ª ùê²õ±Õý÷EÅýx%V×Ö;ŽçMÉú"²lCy •ˆÃVï„(¿¡ñþÆ–O-Ø@]úËYå†!ÖLÚ4:”K°c â{¶'Ü ðP‚Ÿ³1Éë–müæ»d%Ø º<«ú ;?õî¸v‘ùi5¾3d£AQ«û{Õê6*qc­îä‘…ZÝ/£ öoŽžVÛ¼ñ°¶¹ö„ò×Ë÷×”¹^[¼:Éëöxùêàª×WË,°ŽÄü°vœ7Ä{ágv¾'jä+QcF”5>DÎS븒_/ UÚõ9ul̰A|,°91òBG 7PNèëM¨qÛ6 ÔX ÆçE¾BJ í`ŠÀ¡O/4Ûm˜ç!:¤L{x-ÜqB WB žŒ”Ú|yh“hóÅ Ít§åÏGœcq3ü…ñ&_³ U7ìÏdú·Õ2ã´`± §=ÓG¢]wrˆÛzûö¿³Ë)Y,B±¦Úä¶Lƒ+Fâ¿áëFòÛ#_Rr¹¿ ù¢‰W"_÷©È÷Œ—8á.çÜæÄáÁ!¶}x¶Ç%O€0›ï¶mÈ·@¾ò-o| 仸ÄößÈCŒÌwyƒÈŸ“%%D–·áå‰R Ód ¤yju_™ºn ˜¯™-‰MaJ­:6÷]å3Gaé¡MÈtÛ6 dZ әȴ@¦2-i„™í”üE¦¨Äér±Ò˜(>*é*dúÔ=¦¿"2E”PŸhi›“¸6s…¶}Œ¨íI0øR¡+_mÛFL dZ әȴ@¦2̓0ï "ôE¦&fê®B¦Q dú™>yë/ˆL}íù‚úØVØóm&|Ì v BÆ<•`›é¶mÈ´@¦2-iL dZ Ó<ãoýS¿æãAt25Dá2]…Lý'"S—ñ_™2×ã„9Ò&c€*±¹r 6{ʤÇ×OXmÛFL+dgº+ iMŸš‚ºu—¡é]Jðse^—% š±)ˆJ¨äåIíN’î4J|¹xÏ®—+»!;i#¡ØÅî.Õ».ÛõÜ]ÂføùáçH$Ÿ†¡W‰cRàãÕÂÖˇÍò¨Z€]Š«®ÅÔø'aêu•F·>E–‹ÎÅfeÇåôv;AÆw1zƒ]ü‡"{T∬@ös¢Èþ!²ç²„0 |›HŠlÆBϤë>' 4±qŸî¶mȾ@ö²/}ì d_ ûßÙcüQòÇbjß]-Ÿ¥ÀÔ05~âÙ7‚]ï—ÃÔÜ P,±bÈ„Ø*üÁ´À\mÜDZm¦.0u© L]`êS˜Ú+·ÛG»F™™‡RûŠJrÖ÷ÅP—ô­ŒûÚ€°W+Þì¾ k¦ý¤ìxäqù¼¥þ@Ü'×½éhÒ1]g…ážÜ=0 J+a™6&vWçê óW=S¼c ÁÝ.2xm“¶bO7ئ‡Í}Ñ“¡î'ƒ[910¢øØ£Ñ¬£ôu/Gæø½s­Äªç#˖ت Éö~¸e¨Û™ÛïãÃWÏèY±ÇoÄ úžt6vÆý+°2%Ã7 å´ˆ©þÛŠu:èË8b¨¬×¿«Vš÷µý·;ÝÑ@ïÜ_]õwJ wv@w{C0“æÇ—«@Ç+ßIËZ™¢²&Ó®ª`CW_MmøŠÌ”s#k# nÛŒ›ìެWµ»wǧ'ï ¿F_œÞ^§'èóÙÇðœ¾ÃpíZ:ð»ö×99û|öùì¨/ûüR~8ñjÃ}I8–ƒF¿v‰zŸÛuÖlWYãò|V¿ìÎ[5H´/h}¯<;'U|~zÔ­ïºoÜw{µÞM/ ÇŸ1Gâ÷%=êgåÞa«vÛ¸?‡¶ê7ûãÛúÞ§›Ú]Ô/?Ý@;É¿êU½Rž?·?W,ÏCß}¼û|s9ûxù¹UãµÁñ}sïËmskìó :kì©Ëf±Æ}ùæà´Ñmœ¾ÿrÞ~÷¥~/Ùy¯6­ ø8U¡Úï èüߘ9×Û’@[÷õ=‰ëí2ªW>òÚÞ'6gùöà²|1î™çÊãËϧýi@p_íŸÜ‘Æ:›öäàä> 'wçäèð±_¿¿pêí Òè¡»æþçîAû=¿¿˜5÷äM½‚/ÏÛ'ÝÏûÕ›Ï{uÚܯõ*¯å ?<£Gc Á½Ú?“˜óe•6.¡­û2m´«@¯r/l•iý²<§i‹ÝÔö²ç`>Ñs/‚÷ÍöùzÞ·?½ ÞWïr¼_¢iãþåдÞþ„ÖË)ÐûåÈé-\[ÏÿËúKâ¿óÈš"ËÄÿË*y„ÿÎ âÿ]#¿¦òÿ¾óÿâíÛWÖÿYƸºÌ²üÝjt*Õ£vg¯vôvGÏäÎÜ4‚¯mu4À²*€ìvp5T}ÐÙhÔ·À·ìZ± fÊ6uÞäÃ"Έ£1î™Rî7õ«×Öhh(b½¦>¸d¤äÓ€¸GqÅ£Ûé´û·U1Þ§ðËšGr¬ÙèA?»„¼¶ÄÔzmpÅkËd­±˜NÁTqÄpå8œ¹)ÆÀcï˨mÿ0ka q·ZYÿL|Ps~îN­(N×úÐá%þ¯•`âmîÄ?¡µ$pfý3vÓÀ×ù—5½ŠœÎðªÿ_kÚß¼Y<"æ2 ±þg޹ÞúwVâü¯ìÖeþÓ°a,\¥¹Pe¡çÃT(Á!ï ´˜^b®fà»ìZ‡ˆnD¼ %€½!\ÿ‡eµŽ+•j«µ›‰±‘i`Ll¢£™¶"Ù,ýcåøÁ•}Ù_ ²bõ[øìYWiIãéŽ'ór¹V©7+µÝÒ\5ʵôãr¥°_j6Ρ•²y’êi½^"ó·Ò¯•êÅãRóÝÞIúîþQáð}¹XOZ}W+¾¯/hô¨púÈ›ÕZu¦¹z£vd^}w\oîí=ª…Eƒü³œ~Rò”÷Æä©œÁ ú°@š2@£½B±”ɤٚJ8 _NºW*kšÇ¥½r|}­ÕôfŽYé1×ßͳ†áÌ6‡•&n’…bQ8n,ŠÅÚ)YÜÇÃ"\/¬×Pì C’+Çàý$d]ħ£ò¡&ZD•yš=¨Ç‰Z/Ö˼\,ÏHr vJG¨³¾˜jGŽ©X\ Z"ši½€8åúÌЩFi7r5iµ~X8…“àK€_×ÕË,AÑm j{h”A‡”ef™˜a¯:|h'x怒ÝÙ6ù×€-ìá<úL°ˆúôg9B,,B[a¢lF}Çæ&#ô}Ï•ç¡à;7.úŽ+¼R……VšûÚ¡” 3â`ò–›m‘n@EbÇ£Tz!ṵDXs¬wá§p×w‹q6Œ2¢5iã“ö‚Q‘F0k?Q‰ ×‘­n*µ`¼˜J½Ø¯ šL„¥3!–KÜÀä0ä ˜‰„¬£;>ôά±&]qÓêGËDÉ:O´= Z&“#Þe­Q`óŽJú¾Ü…)Ø ~ væí™åSÏødù4ZÔo £ÅK­³e“ÿ!—É@y.!ãêÍIÆËeàféd¹7ÉÁA¾RX _ó‘ö v³F»>ö©N·ÞÔL¼,Ÿ¼ ¬çBøˆ8” > —àJ)× ]‡¹(ývÂÓhUÄ_¶{—qGt7¸éµºÃËЗm³8¼1¡§ *@E “Ôå ;:ÄŠ‡p•„ùÕÁ‰×—á¢+Û‘ù»L-üFµnTù¨ßNçÄ­Ú çìqã„Diµ³uFäY4€w¢i‰™.Qî!–ÔS<Æækƒ“údá@>MºM$ö¨ó]É5-‰%áüb­‚ÅÏH¹Y‚» (ýÀeÚ•X3D1§`€Á`*™bÔMs7I¼Hó7þ£ÜÕ£aÚŸ2˜ÜA C „R I(t©v`E Ž›]8‡]á.ÇÞ¹îÓ@c*é{>S>âÈe —˜£©–ó•p8éü*f¯Ç]P‘˜ùŒ*‡3_jÆMæ¡&KÓü§¦¥ù›Œÿ1n[áp#¥/ /TDL+*=-xiÒ_…¢&—™xœõ÷Íeì쓲ð`œ‚3ÂB˜$„#Æ$((OÉÀq¤p•çâ r<ÒEª ÄïÇÇ8ás(Í] J‹¹$à¡©ÐÌT°‹g”A/v ̲ڌFˆ©ô˜¼L¢ŒSZâÀñ˜òâœÁ s(!Ÿ€˜©WCËixs±êçK‰BÆ\/¨4Žý’Ž[‰`+É(qx¸ ±F|v nûðºô\Ì.ò±JßåÈKG¥¹=3ày*<Æn_ö}pØR:Ô§ .ÁùòÀ¾0)?t™à¬a‡‹&VAªq«?@©4ÃçaÜW@@®ùV9x¯¡Ð¾"ˢ݈¹‘ c‘!£x+ï3¿|ÐD1®_»Êämóð4wEšÕàŒÚÙ ×O3{BÇx­LÊdÿ Mñô†:¬&2ñ‰CÁE¤Y%Q¼ ^Ç­.å <…$·¥Ù“>¬°¹ Äv¥’S¢x žÚQ»l¯`G-yµËm–]FúÌì|Ù}{Kõâ…öí-×öûö–ßý!ÀCmñÛØ;}Ü;½ÊÝ€‚”¹^î¼Aø~³aÊG_8Î:{#"J~öF¦A{î©pô7<{Cà@#íy6w”áá®Í]‰Àj0nV…öñ“ßlX²ŽW`a^ä› KA—•š¡²kuöÆYoäŸ^xùO/•øä§’"kx†Æ«@GÏûªyãgŸ±øT SÙ¨ý›ž‹½×ù¥¯%Q#B, 5zù—¾¡F÷¹'¶üû¡Fî’:Úö\ˆÏGÄæØÇvèÀQÈu˜>‰—¬#G9j\-j$P«(ôCì…2ô8ÓÐÛ‡¸f±ÕeRRÅ¥ùðœ0inÄ1ˆ? “£ÍõB›úÊÑæ/B›?ûĶWy[­Äž1EÜñ©’ˆŽ Oœ!Þ€ ým‘/a" ù¢¬Áî£uD¾Ï=îw<«8!õ©ÀðCšeØƒÜ e Q!¦ž| ù.[GŽ|sä›#ßù®#ò5û™Ñü‘àüÈâ_• ^*qöuT´åeÔ)Qr€ú ’gÂð[TEO:Ú–·˜É±'Á$:Á”+’§ê²uä5¨9@Íê:Ô™æÈô×!Sò†¹ ‚¸dÊ2SM§DÉ‘éCdú̽¿%2E"Pœ»Üv•[(°6 þÊuœÀwB$ùSÈtÙ:rdš#Ó™æÈ4G¦92Í‘i„±7ˆº[dê8Y;˜#¢x92ÍB¦ÏÝå:è·C¦,ÄT¸ž´]Wp›)ÚQ Z`éé'·Ù.[GŽL_2]‡ƒkshúj )ÉØ=õ"×b”‚&ß}rm@wˆ·ƒÈÚœ\›èÕž\Kè Ÿ\ûË2]¨fÞæìN’s£ŒÝØ®l«!ÍßÙ‡÷C 0\"›Q €¾ Yi†©ï¹ÎÓÈ~¹:rdŸ#ûÙçÈ>Gö9²Ï‘ý«Aö|‰ƒn_-¨ö29&DÉAõ‚j‚]þÛjÐ*÷„´©c1¦ÈæA lœÐC@î>ª—­#Õ9¨ÎAuªsPƒêT›ú ÆÑŽÑf¦ÐØÀâ-5lß´eWo鯲sÓÖ…md¼Ù2|騷3¾aÇ=õÜ\{ îý/­A¯ß4MOÎáxvóÀ(¨h|ð€©£o? Ž/C/«|Lñ¦9wãë,ƒghñÐ8aK0öà ãô°ºÏºßÕí¤s™C#Š•èõ†Í@i¥È¼ ×Û_™U>2m‰±zâÛ&?Ý‹2ÔmN øñáÆ ]+úÀ‹¸•Ch»ßLØØ¼iÀÌl¾-[¾èOV¬ÔA—XÆÓÝÀÚüóø]©X«î•÷ßn_õ:zû~4jooÞÙM|Õê‚4ŸG¾Žg¾ÕS–ݵ&ŠÊê®,P%æDV=Øð·ŠÌœžVÖF<¶X7uÕ³6ÊwïŽOOÞA{Õ¶<ýúÅ?=AgÂsúý/Á©×å?ÏÉÉ¿/†gGmÕ×êý‰Wî~h+"°êTÛåkÔªîV;Rº«5 ËÎÞõùB£Ï«V­¡†ç ®î*\Ý?FÕF–[·-Ÿ~¸¹ÀÉSÜVôèÊ?+´ëå¯ÕûsVkTná/ªíVX¹‹.+×o+»…ä_iT)¦åvãrÅÎü8ô݇»‹3ËÙ‡ë‹zY”¯?Þ_\W¯*ןoN/®ÎIehútQDìüú3=8ýp]m|¤ÕÆQ»º{|[½+Êq'Oƒ0Øo ªèüßš1WŠÔv?ßWv©î^Þ׊Dy÷#›ö³ðõàºp9-÷щÊn®/NÛŸàv°rwFª·ÁÙ ¥:'÷>=¹;'dž¨BÎïÏe§RÄóÓêõéÓþÇam¿ìTïpëüh ÿ.1ô¡uPüðEuÚÝ3zt4¸ö÷†ªhÆ\¢ÕëK§r_€¿Ð¿ûËVX/ÐÊuaJÓ:»-ïNÊáJ\n-x_kœ/æ}ãxx_ºKñ~ަµÝõ¡i¥ñ-–Óó¯k$§_áÞbþ_\'þ;Ì)R½_#þ_—Èbþ«Û5âÿ]5=§òÿ¾óÿòíÛ ëÿ,c\]fÙü®×šÅÒQ£¹[>z»­‡j{jÁƒÛ6ƒÚëø`Y[IÛuƒ¶Ž è°×k[à\^Y± L"•lê´Ê‡gæ!¶åMËœœy YolZ½®e ˆµI9xcd‹Ó-LÄ£¸âÑí`põÉ*÷Ó ¸²¦¡kØ{ÐÎ!›–X›WlZ&"k?C†™ýp|8øFxl}îmEùæ|0èCܬ¬$N¨E¶çÆ‘S+ ÔÕß7Å–øgf#{O7b¢ŸP[9³þ»iàëüÓŒ"§3µÿsAýKsž††Xÿ3CÇTkí;+ñþ3šuÞPÏ}6Œ…kk*T“ØóáX(Á!ov´ŒÀ ±z£!ø.;Ö¡¢/(ÀÎVîÿaYõãb±T¯ïLÄØÈ4° Ö×ÞP[‘lný‘Ñ÷ bkþÑ脞ËÑkœ“fZmÿ÷ôgtÝÛq„m¹®“µZ`h±'ŒdÃMáV7ìK Á°Õ±ðû©+ÎóV 8ržŒïϯ(tZÝVgÔI¯à­ŒtžŽü:_Ž=ºB‘A»ïÚKÁC¸˜˜Ðk˜ÃØÉPH4Ã'o0`ˆ†®&Dßãç¸X;®Ö\PIƒŸ´_ñôÉŒÕGí&q!3çŸ|‰^™úîÉ ”“'AkÝM"iÇ}ò^ÔÎèfòFô^ÿnz®'fo6;~3îD“T3&È:}!Šž\ÎÇãgã°4OßH—DšíΘ¶Ðì+É}6½µ;¾¶&ý’çI<Û' Ã˜fð‹cn‡!‘BRßœŽ›œC»ˆ(çÅjx!‘'|—s›º¡°™âÈ–Š†¶¯ÝIPßc&Œž~㑵;€óůG2ŒoD‹õ8›s/ÃÏýî‚À¹õÍ­on}‘õÍÌLmŽÝAýUµGN­E$~$_!®!cY%y2áD¼fžÜM-'wÒ‹ì“Wgó’ÛÓCǗ͇H^œ[ŠIîɺüojÖÔ¼˜ˆs‚‰pY¼ÀûšD\S.0w]›ðPÚÌSÜæB¶’ôÔãþb¬¸öùϲu—= Q’c1Ûže²X`ÄuIç| Q’CÄß ".ž6™Ðp¬yˆë„T)d»™>¾í;…¹åH¬•ÖDéÜɬ6â¤;°¯“Ä£zTÎ, Ì–ÓalRw‰¶HX6›7”XíHõ  ©Qw¸1—¡±Ñ¸ÒÖ°7”m0ÉÚê…Vb¾­±SÕ°åàu[é´% kÇh÷ÿõ׆‘!ø³cÁ-`Ç¥îï7æ2êè)ú– Œ¤›}ÝPØ`ùþN{:ÓC÷µ5®ð¥:ù+µ·Sä-Á^„pmáIm3° ¶Pnhs¥âÈ ´ò3@xz/€=KV#J)âñT}ÎÔžhÊg(ìêE2þ¿Ÿ¾½Šøaûõ@ö¶±àÜ×^Ji¾¶MlŸyÁ¥täÿ³w¶½mãØþ^`þCàb¿„‰H‘”èE1ÈMÝ6¸“¦·MggfQ”D%Þ‘_®d»™]ô¿ßCêŲ-Çrê¤NÊÌ$Ñ E’ç<çèr|¢âf|ñ\ûžìðï_–ºÿNNi34êœò(søalt¥ç·e´êÆ–°¶+èºÏ4Þ1y}cñk®:ïôí y,„ë°š‹¿âÎ7¹ýkà‚qºopñ .¾4Ú¤§_åi°pxÓfÈóV?S°øFG~ËOuǧæÇ×çI£¬_3Ý:õÁ6N¤é¤Ÿdæé=óëçƒ3™$ perªÉ4ÕÞT žZßÄ߸Ï|ZlÙ<=ÌöMm}³O¤5fÎ ~¦ Ü‚=ímKaÅí…—}ù®ûñíå•ÙϜΌ÷SXÆyD¢!úpXô(¸ã¥AwC±Ù‰çc…EÌóhˆ(óCàPu:<¸±Ó¬±}áY•ý$}—»]–6#¢eh­r'9æ”yœÞ9ݪt›÷Ýw¯Îß½y&ŽKK±k§Ý$Ïfë'/:4«ZwÁÅÑÏÞ$í__›šÊ¬§¡ºôÒé°z ¶D-c¯,lì°t•FKGâQÖsÊ69V0ÀA!¸l7Ž•pž•cÕ~PhŠñýfŠÎs¦˜Çõ»„»yl7ê<ÆdåCñ ¢±(µŒRF<¥,JY”²(eQÊ¢”E©ŽCŽ\ÿ‡J9+ûJ-ˆÆ¢TJmùµú§ŠRB¼ö~zaÊ•* T¨,PÝ Tôˆz?ü:>ew©R4vßZ ¢?PY”²(eQÊ¢”E)‹Rw£?âØûÁQ ÓF”ªDcQª ¥¸E)‹R¥,JY”²(eQªãøGùá7êtVv—ZE©&”Ú>ùÜ·(eQÊ¢”E)‹RëQêã§³³n×~ØxaÊ6ÁÔæÄ é¤ŸdF4=óëçƒ3™$`ÒIÆRª&ÓTÏætªú`sÝc—S"™‚5£Ší»Å•¯.—¢±yï–â,ÅYгg)ÎRœ¥¸Mç‹çSÙϵî3søeëÍ×W¾c³ & V;+ÊËUO“«î9³«(17¥¡õEˆépäa'F4 ]0¹¹õÉ­On}òøä­}æfÊGŽØmNî*åP ‰_ºWÝÇÜL§Ñ÷­kéfkºÙk†Ùs>¡Æ'÷}-Ь 0Çû­ ´µÍNÚº8¼1?L7Ó¾Y\«îü³U{£ÚO…ÖÓŸ`¾ÿÓ¿§+•À#²,|?PGBJ‰¨À$t¾”L:>Q±Öl vÉÕÏAl9'Z+—?ºBŽf²MËÉ1>ÉGfvBÝØ•D8(–!(AE#äÂCAȨÇàoæxféhÖ.ß=ðšÏ§wZKê€3¾?:`í”,=ý²º·óŽD¦{—®/¯»S©Ý)œ¥§¤yÿ ~¤Ëƒ¿öcÊ\†Q ÑƉP07\Ì}á)ÇR䥵ÿ†2–ôOr{¦®Ïœ(ö]æ8B€î ¨ Eü2¦˜³Ðw#Ïgœ’€s?ôTE¥0gţ럇š‚íÔvŽÈƒG$ß»< Î¤IçÌÛhuÎV:§á Ïë÷¤´w™ÅÔ/]2,‚‘¯˜¸à^HXÀÙ¤Ú–q×;û¦±6¾ÞyDõŸÃ¼€Cˇyð¾MI:|[ÆÝ‹™Ž•Ê‹GØ£œxÜǬ|Í?ÕqïÃÓ³«ó_»úHC'½âU¾*1¥s|œPp 1Â06ñv(º¸j¬b…ÌŒú üˆù"„þ>¡©î@M$LV©[úµHþ:7w(5NÄØ‹eìùTAuc‡0Â%õ9§R³¶ $ D¤|Ïo4ÂD—ÚÈkUw¢ê —¾@4r)òcÐz²‚;®¿ø_ƒëº-â[S™ì¤U¾~ÖBˆ9å? ǦK°ŽÌËþøúõI?û³8¬Æ7j R©ëëènü"Çů£´Ýʤz“3ÀÇПæŒº…á`ÒÈ2ó¤›/½txÝ‘I2ú¢ŒÔ®Ò©:üúužqטn‡Ý?çoš_s‰Œ"06™ÊŸw÷ÅÃ9Æ.FC5ù2JÿÌ{¥P¡ð- ÔÄz™&¸àðýœË¨ûÛ:ÿ±S&§Äý[¨ÛÂ9tqzÖȰW–ËæWu"·C¼ŽCŠÞ€ùµ>?£úªÃú^Y8æýÍýÍÖZ$W´»Q»Ý³?ç¢}uöº£G&CÜ¿ÖO½8}÷éô“”Ž®u÷C³èˆÓ?:r&û‰ úIòWïß °óWŽ3ir=MI½(íÏT5&áøŸªz=Y¼d…?~ø}úø¦“ÈélùÚ Qâ;æŸÃÅû&*ÀtYNÍ´UÑ•»NGÀv‹ï7#Ëi2©D õñ FžÌþìU¯M*ˆõpñ¢Ù`~‰¸ÏÔÒc˜‹iuží£ ÁÌUÃHEh6J¦@Ïâ'Tz¢&ª¯FáŸæ¯X&™ZyéZ4o"¯óT­¯Mïî0>ÿ ¤Lõ&vCÊ QšHÚHö#]ußHãm“‘ð“e`,ã( Žƒ¨ƒQÆŒ Çã<ð%NŒ7rÛ26òß™*¿ütõù{ÏÍt¯<}à=˜·ïF“×£é02˜Ž"­:¡ž†6³,'ÃÃó"ûç •æGÓ$:Ž&:Õ'Ö…®S—œ²§ÏT®/0`4"€¡ˆz¡|Æn(¹¹@¥ 1 iZ9išÉ­ÆÜZc>)źö. ê ”÷¤ÔCDHyæ„«Mбm{­å(žÙf ¶Œg’#âù{Ïl©s¸»òÁײû‘6þ´tNc<“=9mÄ¢PI!8ò#ò#A Á=—ÇR‘MÚ¨m6ž¹SÕÏlSÒöñLŸ`"8Í£€6žiã™ÛÆ3ýÛÏÄø‘â™Þ.™œv<Þ!bo™­¦þ…3Û=ûi…3n٭Ùî‘+6ÿxáÌ–  €Ñʺû‘|¼w ìþáLÊqäS9RF@¶˜!ßñ Ç*t uãáÌ–eØpæÃbóöáÌVš£}8Ó=‚ÎØßõéµ{IòóüW³%ÁËrj:Ç0Àšµ¤l/´ä>¦fo­)©À{Ÿ´mW¡o=Õ’yþí¤@G½:¸¾iSiVðq8Iô2u¬nå`œ(=©ŒS¯o™»çÅêÝê 0·9Ð7-«³]uŸyÎt\Ý1PƒQªW{Ü‹{ƒ@¯]ÖƒX«P†Ií1Ú ›ß ô®.Çå¹ÒqõëêW:KÍW:›Eß‹·Çéü¸ynyÜ9®êS­ø–žC`à¡€€£ œîÀÇ>Šc"…tãîç3µWŒ€žº “©1%0|KŽX^BægªžÈýúâhͽ/ŽÔÕ­‹±“â0xZÿ‚I±E̦¸qÅ_(Ž—bmŸV³vˆ;vˆïfˆKÇ÷}äòX ú’¡£@ñÈ‘*r>Ü_ >£!Þ2Üш~ô³ÇE¿û uí':µ‡5í54oÅw§¼½ó…·ýtèÓ{e;!.öP¬D€¨+B¤D1ÁàAáX2Üä ·-þ2ºk‚ÞñR¨ˆÖ5¨ "Ž<ñÐÉ4î}â¦]BæMûîzi½O²íë}ZïÓzŸÖû|:hn½ÏýâÖûÜ7ï“zG.}Ü„Æ]£88.o@?Ó´ýÈcÜGô£[º¥¾Ã,ùYò³ä÷ÈÏ"Êþ ÊZ[JÅn¿ã»ËHî('¡~¨2³RÓ Íy¾»ÍÜ·0.õ¶ýJ›ðž\ 7T”«€EHÀPG”QŒ$b±‡=­ 6®DjY† 䮟k£¸údn•ƒþP-lr^‘þ(å4œŒR“» b~F%‰3?ŸÚ)×u,ŽçBOóƒßÀBäþ:A Hà¸ÌxDevmše²˜ô_³(KæbÃnÖ”Ôòi×Ú¡x”†p8}–1…KÈtë4Q«¨ÎÔ›áØM.]O]ÌP@¡ý‘Þ¼]:˜Àxz*M¿»ïqsß;B W`)ˆJBPàpœ@R.%c‚E)¶S]Toþf.*̽Çý(öB³Ư<#îqÆX̨h] e‚ù.Dà>ŽÖczñe#y(VD$ÀÓ@s3…BŸŽO„ëù%~_hs~zñù…NCï ½ÔCÏðà ªÎAØ3ì0îÿQÜ1¿t0üY„š Øé“éuhtvœ…д?:^ø†\VaÚq#¼-^=ôô#“‘ŒÖ|o®¹ê¤Cűã²?^dS³„$ž&{Qム¦É¤¯¿šü¢N|í>žÀ ëÿ^f&O'±ÿbü×äf4LF×P×ëÎßþöëîÿ©‘DÁz?Ü7·n·¸ÍšÞNšFîGˆÊâöwÀmxbÊqÀ.A€Í.ò]¾§G€KâÈxãÂÿ¶eXܶ¸mqÛâ¶Åm‹Û÷Âí&zñèn·¬{\D[ÉmmþÊò¼–Ò¾•Òž^nkä°Ð*”.ðV:°‰QÄÊ]êoÌmm[†e´ç¶Âäõ]ò„•pê €Ñl´¨«š6Œ›7×êªoÔU.õžÞ¢ô EG¨š†øÈ±‡\B¬"n\”Þ¶ «­ZÌÔF¥U»,w/·K›ß¾e.À.6"e­ðrœÿí^|Z:5ßPGðô ÷úz¡C,@"Ü?Æ„è=vÊd6p¨çÛ+µõÚ{ÍP«sðê9U²Â<‰A÷}Ò»ÊsyošUéó‡â`žÜPÞW¿4N•ê¥rP<s¯ïq#;“ñ£ußÿ~†>Œ Í̉™Ff³¨ÃÓ ó5ÞÉh¦ÂÓA?Ÿñi~ŽÃd0M¢ÿÓ¿'AjJLÒ´’uYåÙ h•…0z2ú×4›”¢‰`$ýaž9[Jx˜ß}{­&ÁÌt@¤òÁ8 Ì/qv2€.üØH-‘7q/äcAUu «,Ú4†±Äóæä"õÓIu6LýD]ëdçãÃ<8,úãß*-Ä“§h¬ðµéî4‚æŒójYß”¥UýòQ ŠÇ›£q˜Ä<Æ}óè[&?¯nñ3¼5μþj9Œåžž<¦ý#Îñ°ožp#Qþ[˜|)*“©\§Q*‡y»n±i´T¦vãXÏ>\I.“|À¢¬К|&„7(”ã|§¬~~ï0…ATN©4mZÜdä­Òñ$ŸL¡,æT5ǽ¹l¡§>5Ñ‘í0l0_ë(ßË|áfóÕ6’Ó>BdÍ×Þ˜¯EMWÚ„Jó”ó{UñÎUV©t§à¢i(upi·JTèßR-Tú³ÐDs}6Ÿ÷…f+ÏsQ©®Ri.ÈB--i˜¹(­je•Kë;ס F$WÒ…í,ÔWõ°ûW³…ö.5_¥gskRiÿn(Tke²–ÌíVÔ­ÍÖæ&h®y UZ3OËpSZˆº.­‘ΰn„ ÓV3=%5,Z®šÁ«(gÁlD57:+ö¸²¬‹Š{QËè§Ðùs“TUa_,mA9ËLVç«K³b ð+ maW+Ò)X¥ÆCf-óWÉ.³ÍÍ罕ÀYј¯µA#ßÙ³ XŒPé9ÜÂ…š¦i¨ôš£Y_HNÚ8—'ðôþDç+8ëÒƒ ¹|÷èÒÚ%5•˜ð1û`JÀè!0gý¸¯¢æRx‡ávÊRš–_ûæéBõ‹ÆI:Jô‰á…?}°*™2Õ|ËÆ`SQн#—‚(aÉSðßc®‚8 ~ìß/PƒÕ÷Bá(áª]œöN_¿>w~õûÂÍç—Ÿz—¯º¿À®Î/ë§Ï/Nßt{W¿¿‡\œë3µš~üØ%«‡ê·è~<ûÔíý÷ë_ëGß|8}ÿöüÿÙ»¶¦¶•eý¾…/Ù» æ"i†ªœ:Ž1D ¶‰%¡*¥I#0ñ…í ÎÙÿýôH²-cùBB²–Ö –F3=Ý=Ó_÷\ºêf­¾kVß»+mUÎ×|Ùh6šs½fK}ú®íúG‡ÕU¯ÜŠWYÕÉNþMØwæMÙS¿€äiL4N뵎*ÕZ¡kª¡lAwF^­ÚnhüvíÈI­Í¦·†š%aåûØvß-‹†¢Â6½Óº|¼R-*mo•R|ª6ÏñjO«ð{e½Šc'š\oŸxNÆÖUrj9+»‚}cW–yöD£Ö3Õ­ºÎš«N«Õ^Ðä<Ïÿ®T«µ“Z«uº«¹ÖòN"|uF TÃzsw¡åÕýj­å­iÕ=­œ¶ü³“J£@qð*–8‹,ëØ}¼0kgŒ:ÇNcÓð©-‘éÖÈŽº {iªö¯d_&çÇ”{Nx!|d»¿ìA°ïH;mºsüøU>ŒÆ`ñ¶YÎ û ÓþXA& )º;éç+¸ôë©Aœ¼_·Xhbd§€i4 Ô)}¼ 7sˆk“nZÈä8ŒíH—†JmÆDB›è„Ø€!)úÎóÏiq;fP; —¡d4 ˆÛD€ç~˘0"+"<Ž‘i"옘¢HH2ãÅÏ?£M@ë»Õ¸7©WIȨ'Ç׃(…P·b4‚%S€ÊL’”ˆ=Ñéç€ÓKüwçéS§÷úïN÷{m“Íd»{,CØ0©Ú6˜]%¡÷d/Hî)É0IÜv†É­þ¹ð¡˜DuñDÚ½‘~öíê¬fxÝæi­fF­ÖéÃI%éìÂ× ;ÈX:â³dIbŽÎh4Y³Ûl¡lFñ0r› 3žËÈ´ú‘?£hzÃøUramVA"Áƒ¼ dÈ#ÓÄ0j¤ €È|ëÃdšÙÉ…Æ%ˆžqØ$” pb˜ *x ž’I-#ÿu&Ó$3¨¿è®RBd?ºtúã'©$®ºêBòŸ‰'‰WT‹…È”1 ¶Y ¿’’j{i,Â¥½¦CàØ‘´¦ôG3 &M†Iv: ÓVõLrú´Ž½ùpÝ…s<¯v±Îô@ûŠN„¸s±R jcÁcð‘ vȢؤt©élð#]Ø8Ÿ¬ìÈ—ÙX ›„œÅ!•@>aŒÃ4Œ,έ”Óe‰4ÙPNð¾¬õt3hvµQ$M“Re1mŠ8/ÔT0Æ1³^FÒɈòe6¸¥jóÃVB^¤žÃ¤à80,ÐÀL0K"™º„Ã6^BÄÏØ¾±…tM‘E¥%¤AŒÄA3ÄŒ†4]˜J7·Cx¡ûk¥+'ãá Ÿ0Æ–1Ó ¡$Ž0*M2b‹H+Ý1þN›]9†-nm'Þ%òI$‘ˆCØ ƒ…y‰š’HÁ{ gÄ¿Äèµ™SdrDJB“Q­ x,qd‘¼|§é¥òòÍú¿NÄ£ûN<ÞÉÍЀ‡8Œ¨ ç(¶¥à%I‰à%8”4¹Ýu1à¿÷·±³uáI?9£˜Æ0H03(0AÙ¡ˆLSp+´-ôBŠœötÕTê÷ã}œ+ ”fI‹Z8b±ªPTn -LƒÔ%Ü:\˜R.­Ó—YXqÎK™6 mj0Fa„™&¡ƒà˜€lËórÏ\=õ³­T¡  –Å!Li )û%L¶Ò €­%ØdñK¨ý3²[H;@€×m ж,0»†J:ΨŠ›c$Ì0/í…/sa¸1 ÀaËÍ¡éœ/ì < b‹rÎ2ÁéÃü%X5mõ8•ør'b$"@@LLIs„Ø4À²H+f¾ŒÊκ±Ê´•°_hR&£@Z¡Ê½È"©òGò¼¨ÁÕ{¢@n˜öŒëdvúà%Ü‘œ¬aÞ`«i¨Í2Åœñdf”DÐKÈ:mu+çy+a/÷BÜ ðŒ0&0OnÛˆš„!ËÈÄâe„õcõäd­ëA"íu­µ»$-¤Ÿ!€//²Ó’ìSZV­ö¿oÒø³€•Ì’:±Q¨S#$:X¢ËÐ4b3BÄ2’ Šˆ*ÿÌü˜êÓY²Ö$f´Á4ªDÔëôÓËÁüÉ-|¥ò+ÂóÞx?¥x!ª“¦…M"=“ÚUU¦Á7£k1LCR·ûÍüŠÌmIù÷`äß7Çô#jR †c–1Û6'4êO}~ÕŽªg8F T’D¥O‹4%‘߃Œcþ4º¦"Áw ïgEn¯Fµ¥jÊÝ9AÓ"#y¥Ì@*ü„d̵ ˆŠC¤¾h®õ¥4—þµšJ¦\z={Ó¹½£~–:Õ…ƒ„æŒxg­z—Kö8åM«­P0Zûá܇êicY¢W_ŒÓ(ÞBæL|€íKUÏüxâºRCy×QëÏ~¢!J¡þ£Íviñ`¨¥ »<~Mc—ß¿o/Þ¿ãÄ“¦¶ïIzˆ~Èý§œïYH_ý¼»}1·,ÆíÔGK"+­4í¶)œÓÜÉÙGA†ZÒ)8hz€lø+&vdsïÒpc:Ê3Ã>½Bp›[]!øŸXž`Ï[ž 8ÙÀðRçñ “…â¸Ý)áÐF8t;\)ÆfB‡Òµ O¯\,…Y¦L “Züh¨’ÇdϾʇ©šdW*AEnëLo»Ç]1é«Òæûsßå€Öü§y EŠë¹c1ú:¿˜?»n-‹ÍçŠBš &n´\äôsž'Qó‘®"`ýHFúÝ ;éîÊþrÆÊ<+ÅT1Ÿ¥¬4¹ÈÑœp%J¾(†‰x× öß&Z…AÅVÂÄ"˜ˆž› ÿy0°VÀ©JxâP§! Òp  #da›ˆ—¶lYG K˜ø²0C­!7â Fv,b›Q‰lØÄ–Z0µ¨P¹•D Lð[$³=V”fa+áåë‚—¨„—¯^NwKþvˆ™­rüÁÓ\13`u/À G_4WÑ©Ápë:ªl~ÝÏlííÛÿž>Î1F1T¡am$Õý¿šª²€²k™¿}ò—Á]“£"¸«¸ðW]ÃüA¸Kž wÿÀ¨(h 1l&uL¤­SΘÎM.õ(ŒÂÀ˜Ú#ºñFÕ-ë(án wK¸[ÂÝî–pw±ÄöKß«c¯·â¾ÿ§ÂbaÖÂâ<þÍÁâ[2PL6€bs¿ºË–~"(¶P!(žq¡ÅOAñ33•ÿ‘ 8"“ À²„"CˆIAÌX'Ȳ#Ë´@›6^ܽm%(.Aq ŠKP\‚â— 8¬] ÿÉIGŸ½kÕ*‚¢Š e¾«B(jý  ((5ˆë†`ühŒt†×qr] aQ`nŒÏn[G EK(ZBÑŠ–P´„¢%̓0¶‹ì?9oás· Â±Š ¤„¢EPô¹©W-Óøã hcnS°{ȶ-‚’€ñ Šm#21g6—hãV-ë(¡è_ Ц—Ž”X´Ä¢/ƒE­e,ºAA—îÚI¥2Ï=F³ UƒÈPy2÷àÿ$‡EœSÀ4Ù]SÉ­C‹ïôz¥zС?­%È: ò °<0I&1¿"ÄœèäóPs‘>f·+ïü"4½¼K8£¦4ÉÓJ~Š^µ·`ëÍ¿³í ɇԮì+«<ÝàÀ6lp`»`>þ>Pž˜EÉh¹Á¡Ê?ó6Ÿ?Ês$ˆ@*[&‹b<Ôy`ØzDŒ€€BÀÇ› ü¶u”P¾„ò%”/¡| åK(_Bù¿ ”g'‹ÏÎ͸P¢èDÑYìCѦ%D€„­ @I:ÀCç’Ǻ‰·9'µù&½m%Š.Qt‰¢K]¢èE—(ZÕWñ¼ÖšÍT¡©E{á¸{Û}¹'¿‰ÞmW*¶SðeGÉ¥ÊÙÈ>ÐSÊ4}Þ¨ûð®3 }Õô,ñƳ›AAEÓÄªŽ¡NÂiüÞ¿‹DQùÄ´eÆjÃE(¿ÜmRÜõç¼}ºó‚¾ÔÓ çîÅÚú™ýÛîÌÌž’ðr´ˆ‘ü¢¥“:Ì%šò4D?ÒÞ|l¿«U›#çøíþõ '÷'“îþÌ;û0_wú`'Õ¯“@¦#_„šÞ×f•6]k0•¨¬r2Òáß!Ld*]XYÝÐൂu ¯ÚŽóð®}~öÚktÅù·»àü̸¼ø&ï<»‹ÎÁz]8?ã³Ûà˜//ZݰËoÂ÷g¶ÓÿÐ Á³ {®sctê‡múù±ò­éÕÆŸojøÒ5ŒËã¶qâ}ÅŸqóðò¦~Xylxm³q>8ûN@>Ü^"nˆsÔ Ië:¸¨tN]ç[ãñ3mzõû&ÔÙ<üD¾qU¿ùtßgÿÕ&õjeVêLÊU{Ëý./ /n.]‡;7Ô<®ß×½¯ßNΡ­^{Ü8nuUÃlôê'ÞÐ m<¶QÓûLêgäôøƒ8âè¸ ×HãæÊ¬?Vhû¢Ã«NìVHý¦2ç©KïÃY9\O˽ ÙƒVËþæÓ+’}í!'û%ž6_OëÞ'cµž†÷¯HO¿Á³Õò¬¿&ù›kÆ”ú÷õÈê\#óÉÿ¡‘SOäß êŽz“£ÔukxùQþóVÍ­¶kþ»£³üÓãVåô½Su³Vß5«ïݶ*çk¾l4 ͹^³¥>}×vý£ÃêªWnÅ«¬êäG'ÿ¦ì;sަì©_Àò´@&§áÕZG•j­PH‹5ÕP¯œ‘W«¶[ ¿];rÒ_@k³é­¡fIXù>¶ÝwË¢¡¨°Mï´î#¯T‹JÛ[¥ŸªÍs¼šÆÓ*ü^Y¯âØI&×Û'ž“±u•œZÎÊ®`ßXÅ•ež=ѨõLu«®³æãªÓjµ4¹Ïó¿+€nNj­ Ô鮿ZË;aˆðÕ5üQ ëÌqÜ…x@”W;L|‹5­º§•Ó–vRi(^Åg±ƒEãa»âaíÌñCçØil>µ%2ÝÙQáÓ¥©ÚW{‡"‹”bRå»ÌøýW€ Å²à-€çÖ—[åíÞ™öÇ 2V§¦Sý|IžÄÀûYXn™™Ù)`M•~Z/ÃÍâZÀ¤›/v‹dÈx,u* Å8×…%bP›…L°€šß™¿-0-nÇ ‡1TÍe(Y MB7Å&ÂoFdE„Ç12mB„3B IfD/ ´Ð& õÝj\Œ›Ô«dÙYyƒ(…PÓÐ@2¨Õ¤Dšì;·{`ºÄ—Û]ñÿì][sÛ¸’~?Uû´yÉ9U¡ € ¦*µë±s";±8öÖ” @Y6)iHI–¼;ÿ}àEÔÍ–&NÆöða& âÒ ô÷¡ÑöŠU¿7ÅUöë;¬›&È¡Èõ­üŽs+Vúzk³ŠšWŒD¿“˜… |%Ç,UeGkdÍûýK|qäEÍχ“«Ögy¸{µwk;óõÌ)ˆE¾@jÖí;i:¼g1u&m^ãïä:A&› 2˾¸Ç½² ó*•/èf¥+¹˜m`¤‚‡À¨Qn€[UKOŒ™ÉÞó¯Aõ0jD›ú&1ŒSÏ3Ù8ÔEÕ¯sšucèþ<êµ³Š¨®ì÷ôÅí³ ÍíH/ÿ¾*åÄl‰};pÈŠrÛe;*Ä‚…ðˤ„ñ•„0cÉV³ûê_¼kW–vÍã®É|˜DÕh¬T+לUä1ï $>™f;›§ϪF Ó¹I¤8¦ÌB˜bn{‚ÉСt¡™5øž& LáBäsbÌ0öÝLEèI‹TQ|.#—º.¢²Ò¨TŽC¥ƒœ 7IŸ…nÊaÈÜÇÑ´‰ Y¡_æyÔ„¤¬¥äÙÚû`ÈU \Î+‰9@C¾‡CÅÕ¬¡]Ë@ºT¹+ŠlÌì00aTPÛ­j7­¨ê×4ÿ^íªá ò§ &ÄE’9ÈF6µÃƒ ô$º¶rùH Ί]9†]ß]O½ Õ·¥Â<<ð*ÄKÁ.QGÙŠû˜=ІóÊ?Æèõ˜ &R Ó€ÚÂa4àŠ2;êEdnRè·ˆ>«ê7oÿ}*No;áàUÅ^P`^(ˆT Û÷qè)ÄKÙ¡äÁcHȹΠÀÛ0;ÿµµÎ>ØæÚé3JhƒDß©A9(Opé8Üw…çâGêÈYKW™*è~ß߯igñ`䘹6-êÉB¡©>Â.ž1½lJ Îf,B&¥ûúKéVœÊKǣ£ˆ1 #ÌñÁÀ—\=Ž,§þÌÕ¦Ÿ­Õ–4Áõd(À¤1¬ñ‹;°QàVœÚÄaáctû ²kh;ÀÀ×=¨ çº»(À}—!Ï'˜;¢ªí™/Já>u< `ÂV±¡ æ&_à å¾ B—ú>LÖ°CaŠæ?†¨ŠR¿CRU…/6"Ä\r0 µƒÐW dQnÂ|œ.[6cÙx”ˆ_j"(S2P®Ð¡ÙL*^îWU “Q+æ] rIUÙ¥îÓµÐA‘ÉÈ®èìF6Pi‡?Ç¡Ï|cY€%Ùø1t•ºÖäy-e/¶Bé5! 3#Bl°S¶ïy˜:6Ã4TÒ!üq”·cµqrïkÑö}­{w&h¼•3€ßËe×xßve#϶ñ¿¯3ÿsA”ÌU–íaaQ$l‹-±”pPèHl»È8Q´Btú Ãçõ§å^ã3zõ\Æn’Úöá+} ÏãÁ~`JÉŒW'Û5b<=ÃÊÕupêëôŠ'f1ô}6í~{ 6¨Êï½´ÕiŠIö‘v5éŒzÉ UÆgCû‚È”WTv‹9¿.Gç“ô@PÉ[W«ûÓlŒç÷m.±Vá]Óžà‘‘}™¤5IaàGEç¨T¨H’ª¶†"„RfS’h?D6­”¾ߺҦ¤àÂëòM§?¢­|gE+=Sç¼2ðÎ]õ® \È&"øFkWL¦2ÔáÁEay$H‹2/^Õd“·Ä»Ôùä[AH•¨QG¯?·ºCíÑêFÞÎH5Â^ÒÈ:ìüøÅo‘ýá‡Ã]~´ãÌ:ÞÿÄÎŽ†½EÐbFÞ§ñø{7gv·m´_Í÷ r0ÌÛ ¸hÇÊI¶¹eÝ ^ÙΪü£ ”y$°¨+±Ea~–݃MCÛ“žá]æmÌyŽëÃaî[Ã`ëDü¼Õ JLüÂcm^Ä*ô}jÛXTšøØ‘ò„œ¨‹ûüΖaŽƒmP¥ ˆ‚žB= «öš:ˆ`ôЮØuóx»bÉØ»Þ†×uzŸ?vëÝZµøA[ïÖ+{­wëo`3Œï7»ô^Çûd¨ìá¹÷^/®€˜‚~ú—ñ÷´°Ž¨õú¸»¸>^• ëԢÙð¸2Û%ÏRì ¶£¸Àœ€Ùv`ùT!É‘b.~ðŒuóxòCZX‹«<*îüyâú¤îÀ(™ô«ú¸„\XDòÀq Úh>Õ»,^Úì ýÅϺÇbõí:³aô,ï§€þì¼AΊûƒ_"KtÅ«Òr)°š%.c‰ßÚKž¡ã‡°Ya@˜E]èA »Â"J1ßUNèù ãaÍè?þQÒgEH1zƒçÏY}Ñ„Ô]æJ¡&¤ó„tÃÍÏ’*½s›)Çò¸Ï,„ŽÅ\ϳ(µ PŠPÄ~ˆ®›GMHkBZÒšÖ„´vÖL´ÂÁðÇwÿ>L”bºŒ‰–R¨™èÅxC&êÒçw;,Q8Àì,.t†,À¹ ¾ít>Žî.èñYóöxOLŽÎvèaµ›×Ÿo›{;ùûÃæîN™îè,K·/¶CM>L.¿A[¾}¸¾<=ô¯ßG—×7ÎÑ^óîãù‡èøìpptµ>ENóìëÍdzûâîïí£Ë½CÒÜ=LcÂÏe("Áº8Ç·¦Íg‚ïÝÜ5÷ÚvóúËíñîÿpÚXÖsgüñz§=MwqkÒíô¯/Ï£4 8’_'ßÈÑ­ü–vDüõ.°¿N.È#‡Ëó dvלàÎåÙÍäãÙÉuónp|¶/wÑíiB;Ú㣃ϓ£ëÎÇÝ#GÝoöIdp'ÞÄ®nó¾}tÝvšw;ôèîC};áéÔyg*ÓSz{¸W¦#Í,Ý“ÐýñÙÅjÝ__5‘€_©§1èÍ•ó–× ž6^k^ñºqÛYÈoÏü…KëAÈl=úÈc禷e‚;ô]\P‡¬X%ÿ̧  ²47s›6Œ—îô×–¿åÿky!ó§V,+D»>!·ÜmÖøg6Kƒ©Î¿éÐÌ9ÃaôŸ+òø$b#ÌEjaý÷Œ+¥E“F>÷_R¬ý¹þfÜ0ë\[ÓNU:ž?æã­Xñt“Fo8€©ËÛÆ'B×]&A’ƒ:;]xþFãôËîîþééÛ²ë> j‚†%*î TÃôÍ­,­¿ë<µE‚\€ëÝx«g#­¸'Uô_Ó?Í oï 4ÚrزÛ=¦ÿË×–º¾uâN7L8ˆ`Љx‹þÔõ oø`ÈyЛ¿¸~wºxW×ðÖ’3 c>^LGï]X"»?á¢ç> mébÂmÁB©¯6—œ¢(Š=FÞ9¡¤È]Eˆï“žãbå¸úàf›Ûò§»èyø,õÌ›òǃÜß,u¶à•ÎóÉt²ž_ïX¾‘Ô·}×l~«ë*]¬v|ÕºØHy~à2fÙnèg[c¸°C+P®D\I;ð¨v›/a|ÄC¼‡ßsG[-C[ÓømW¡-a5ÚÖh[£í°ð5Ú>]|ÚR}-zñhëÙd ÚN_£í´¥ßKä£nk¸­áö/‚[ƒ¢Gj«p¯ª±ˆ†RUÖöóÿaâ».ó=×®±$L!Sj"‹@ËŸVÑò'ÕµòÓÙ(¿üq?é]Ã Ø º0ÿp!´!^ˆ9L ìc+À®²¨TÔò]A,æ „lÇñ]Ô,æ ±˜ÕÅgã[_P_3.o7Äþs>³²—ZÓH·t[‚è;t=L— 4mî_ΟÚ.êlÆmêág· ‚QŸqN‹"ÿ#¶°TàwC¹JRÿ¡]ëæQï‚Xc¤.å•d÷Ü <þtäë/…õJæE@ùçýæ—¹WÓÐt}”³þ¯ÌìôÅöA".Û„èhõÂÖwDu£÷\&COX¡#õvåY0ó-×sÇ êY{׎,^NG4DUIAÉ6¦,Dë>BQ “¼5LKf1e(ùC—¢ÊwÕ¤a¢p„8/Ù~ñ0g-ú©®ôÛ:^ 95I†]}¦@K»æ»è\Q&“¬ÃÇ2Í;´& âʼŸí9édßvèDÅJ$XÓü##o•ôÙ`<Se'ì·¦²Mýö‡™Wn6½¾V»[þ*øÂËá‹éyú.€/¡¤åsGYB71âÛ[_«XÃד¯YKW`BiyŠñ½hx§&«0ºK‡à,46¸À­Âåö·0 ¥ýÌ-ÑÔžMÇ}nÙró.JÓUÍ€ÌÍÒœ…™šUKT.ÐwjCg@$3Ò9vææ«,lÿ*¨‘[ïÂò•v6C“ÒúÏð†Ü´–5·3´¢Šþ¬Í hjysSZ§yrS DÕ–V˜N· B9´U §` ³ÈU¼’åÌÀfΨ¦ ³€Ç%²ÎîY+ßa?¹ÍŸBRΨr|™AÚœåÌs²*¿šAš̉_´9®–L'ç*>TÒ¬yþUp—œ³Más†½„³d?_«Fû>Á`Îèòà«Ù<ñÍ>Š.ˆ?¼üõ(”>º8¿mÃotO"цù-9‰Ì†€¯þÝåùÑ(ˆOî¾Ù'#yð>U“ý «7K8ùÆ‹}§Ù¡z#ǰyv8ùx½ÛÜë9Ç{í‰Þ¸pÙ}t ] ù|û˃/ƒæ®s-Æ·ÁÁûáå©)½Ià`}ÔiNõÆ uÕ>ô/áùZ ÎvpóìÆÉ6À4ÿŸ½sýmãÆø÷ýûáŠßCjQiâ¶Á­ílì¤Ýìg†£(ÖÃÐÃqZ俇£½<’F¶äH2 Ô±çÁáóœß9<$çî½l/«ƒÛàu»5LÓÎj¸ŸOèùK~{úù5”ïÅ—óÏWüüÕk·Ð¡ýñv螃tÑoïñ‡ üÊ€Ãß~îCý@yÞs·¨$üõÝÐ=“–ã}•Ö[»u×Ë,˜§¯ÞÝž_^LÜYÌ•Þû¿° é¾Oœ$}ÿ9¤â*‚ú ]y~ë7ÍÂ¥=Ìvœ_ºòü›Cù¾ºö;}õBž_6øiÓÕÿ‡Û¿rWÿùÿù¶õûå‹á¿ÙÛ>´ÔÏ»á‡??Aü܇öƒg°+ÇÀõWæ·p½Ì›«/g—'âüÂ-°9es êhzï_ûßÏ^]ÍõÇ«Cét~!ÔéçCéÑ_s çÈ¡ôÇóWïæÚ5¥?г¯3ý‘Ÿ^J<ùr>;ÖøÙ«ƒ)Û×Óù²ezí€þM8òû.üƒ|PRbMÞƒþ¹Ì/ÌÛä¿4ý’«(7¸ð>ÌG³ïÓ¿ûäÿiÛ2—+tõÅvtõÙ_ÑB[ÆÝÛ€®¾]¡«o·¤«ÙÙ_ mwoúìd…>;Ù’>‹Øb[îm‚¿s,²e¤?Ù2Ò‹l™ÃèE¶ÌôÇ"[æ@úc¡-s(e+²eÒ²–-¨Õ‹lÖ 4Ù¾-£„ܪ-s'ýǰedU±}¶edU ºcÁ¼k-TitM«Ÿí7:û ÒKHQH¯+4Û‰Þ\à%× ëÕšúõ]û¶¾kñ°)Œ¯Í× P)EIŠ]„N¢P Æ–0ÄFÖR3š¥ÎBŠ>Åå\·ÌxÞ£‹ô9§bfŸ³IÍ}M7šn&Y“Íì¡›EÕݲ¥Ýá(cv»Ò£ËOâÀ´*a;„ou“JåTÉãÎÓŽÓH“Nsz _¨×¶[›qô÷ÿ{äúüS«À&4GÃöà·ªû3ëÔé]ü-["”e³g]˜Žur°l~'9ɡ졭ä n+ÃãM„ÛÍFº@§S6·ïO+“w²ÜºP…n¯½Ùì¦~L6Ϟ߬ú#¢lŸÞ§;­µûû^ïÑÖAÆ';VËšÀ5®þãÚ(h<Ûh}f‹êzÒ̵ÂŽ ŠÅ^ïÀ2Ù$úùÂ9hÀ…«ÂÇÅ÷аhP˜{hØ7h(3€–⃔8d6fH@i·‰AÆD YE¡F¨TŠ%Óø°ð+E ZçìáY¨d"gc½!u1UeKµAqÿ¯Ï*§{êëÂ]úÒ*ÂK{ë»MÙ- "“0 ØMÿ´½f7N-‚µfÛVœþïÝ´5;Ù±·ý `D¥aƒÌ4¡J¢Ši4z¶1þ|ª>‚’±ŒŽZ¨U˜ÄØ…'¡€²3îp†¥™íà‹µÊàK·2¶Ê!C ó¯:k…Êh:‹=©˜Ì?^™ÈË·ÂÍóAãþ¡m+\Rys~qOk†qs:BZ`ß)WZtÔØ¤¨ª\'TMBÇc£V Îu„Ç%”iË‚(‰8.ìé3/Ðlµ"Â%SŠXç£sÑœ7ö:ò¹uÓýŸß€ Á2dx°²šë{Ï-%$A‘ÆqÍcdb#ãÊX•Gq1«T{VÙ>«²Ê\ó/Å’2]cKe oG-磽¾.’_,Åf›¢¬û â £Ö³0Ë[Á¹ÔjÏäã1 91ÞïêEý– |×6íX¯'¤Â£îVù9ŽÀ²p³WLyÀñ@#}©Æ-8¶Ôoܶw6úô8)TzÓŒn‘¼X=†ƒf«Ÿ~½žþú±òÒ´ZP?`äÑÖ³ƒaÏy€{CgÊ¥ÃV(­rS®ð»,`ß]N=Øæ™:ri TDA›Ñ˜õu)+{=³™ÏÏN.~;¿t7rgÀD÷Mœ ³…Ô¨Þmˤÿ<6AȰ ÀEœF™PKj"‹­• ËeýŒë~$Ëí2=¢”{Á$c”h¹t„÷ƒxsröêõÙ¯a‹,wœ€läܨùRn¤oÃjYû˳ÆÊ]y;c¾˜á [ôšFzÐx¾Ó`ÇÞê½a§î¢“W§6&É&Ì=e;ñÜ•¤Û‹¦·q\m41lÆhââûÃÈCŒ¦ò½ÀÁYPtøÄ¤XצҜxݽwFÕĶ þüì×s¯à½‚ߊ‚?ʋۨéä ñ×ìX„¶§÷×PøK^/ä]l¿§ëq€*œ£ׂç€"Ðëróà9à{s@ºvääÕÉ+Ož< ”&MN‹¸Q‰[†µxZDW%'O‡@‹jzñâ Ĉ'O O’@Ì÷š¦âO~‰7$,뜅«³\µxçĦЀæCž÷ 0²J…Šý=YÝìÄ®®Çç-=ÞblÐC÷)zŒ¿Ûúê<d.·dz:N?Žö3 s‡|!EÜÁ~ÇHk‘ÒáŒp¢ù„ËÖ¥ÁG‚¨F«Òåm¶‡ÛyÔ¾££#ïVï[wÝÕlþü\ÇÍ›f Wï•Á}zãÑÿM5ƒÀY;Œ±öíÉËóÓÓ“³ l7ySCòyÙÆÞ$ê=àû³Àw7£8UWÙo×ǺU–:@ cG]]xÈÆ('SÀžrö•rJ §B´ñ ãAƃŒ™ €ÌÝÈÖMú‡§êªf«7<Ü>½yqùò·G$#ºÀÿ“ÕÆ’ 7§”]z>šÐQº×#9˜„–âqüþ·‰SÄ;|…uÑÆ “º8P¾zlÏóÛzTò¨äQÉ£ÒBTšZ£æQi *CœR ÿ¦í{’­’ý>Uâ^ž)R4g7© ONäUãÉÉ““''ONžœ<9=yrâUNž9Q¡‹Èi\žœŠÈ‰{ròääÉÉ““''ONžœdUà½>žì~³uEÑP“ºðäTDNkžUæÉÉ““''ONžœ<9"9©ª’OÎçÄDÑÑð“ºØOrúù$?<Û6?)ÏOžŸ¢LÉé1y>ê™À@6Ñš3†Bë(bi"b„ƒHsExL¥ãÂY1¿»øMÆÓ™«‡9q@…ܰpHæ–~žÝÛIC¢´yçžÏŸ[*TªK+gî+½Qû fìÒƒ¿PˆqÉH!+›0©~$kb5á6ä£T²Ü? 9ùG“ $œ)ãD11tW¸Äm¤“N¤ˆ‹%$§æ£ÀFqŒ9ŒY£]þlk–;¬Êéf­X5ë²5™J®Ø1.£—9kÉœ‚ )–Â.J#Oj0ÆHp"«)Á vÒˆsŠC¼J•Mã“;»&±VNî<¢Äúûh”Àôå£l¦ DJÎ}›ûݳ‘Ž …%´¦XP*y$Àй½^¼¼|ýþÄ]ƒÊ0A}”íR‘5Q˜pŽV’Ú$äD'DÆQ”Î !åìq–0›"LCï‰i¨b¡tÍ«•ÐQàoÛ€ãÀ¸‚~Ëâú^b U Ë$LH˜$PÜ’€'˜ * WR‚jÔ6 C[¨˘P—j³mvªî$ŽcȃFÒ(Щ1ã U€®õ)1Ss~ÿy/¸ËÛœ¾dH3Ó^*iüÇQÒ27ÝQÛßD×i“ç˜7m÷Unö¤Ù¿Ê.ÛëO¶m{Æå»füb®³_»½f£Ù1­ñ4N›C{¦ó/özC½m£~ú¥O_ê½N£fZ­î›ÖÚeoh¾}›SFRbúáh2AP<;0zÄÄ1èš¾}oyÿ”LHItòޏ™§Q«dþàY‚éÐêÆ`k÷™ó tòç%zý梖‡¯$Í[ÈÚÌ=túâe­m¢zžHbjDÖ˜­ªfeM’¬1 (¶~ÿõ›îž:š¾"ó+wûM:{sÿ>³¶ Ím®Ó®÷í£ª}õò—šë˜À I³á¾zúâìÝ‹ßÓ°¡^·áZ?ë™YC¼øP37¦Ù2a³Õ|­ÿâÚ½çr™Fñ¦)Õã^óÆŽ»$\¿²ã©Él‚¼xû½»øµÖ2Ãhò…±¿Ð]púßÑì{ÛkÃh™î;â2×èuìfg7c›˜ak0®W¨‹Kèy¦UO.¦ÆP­G³Ý´'8wû{à†boüŒìÝ>‚k;±ÑM·5lxfÿB¦Ž`âq<]7ºJÿJL«oïL¹fŘÆ(ï[á̯ ¹Ùu`óœÌÁ<Nv‡°"N—Ñsò<'óu‘ÈÞa²˜P¤i€W r!µA€4$æ\È„‰U˜\6U˜üÏJôÉô”|wù R;OÍ|§ì|À=·gÝÁ/Ýa'N)#êÆNtB>SØì÷G`xô:‹ü©”’QwØŠ+îÀ…ù$.ñã£Eâ2Ûv+lÄ›‰ð2? ‰´€£–#-#Š”Œ0fBhP'15/–˜Øƒ.÷Kbî•`䌇†(0Q ÛŸøÍ†1ÒX²„JEc­W Ʋiì´”Û’7³Ì,éÍU¨¡÷f–”9BRš+ãn¬Âß/™SèÍ”{'¢0V a£"è<4D:–YC_$&Œ‰Y%ʦὙ•XÞÌ2)­íÍ$TCµê@2ïÎôîÌû¸3qMàÕîLþHîLÂ6áÏ Ãµ5ÁvÆŸYjìoÉŸYîÛûäÏ„.+½?³´?SV¹vÞŸYÖ:/Ž5reÜÅ•;GÊòðý™± BÇ!Ct4â!ÍŒµ@JÄšÆkKå*P.›†÷gn—›×÷g–’åý™A•ðm‡k?`qºcízê¤õÓä×tׂó¡‰%/ôaº¢ùÝh6&)¹öKÐ÷n úêñS(–Òïß2t„wêÓûqåj…Gƒ–[?fí­i_·¬T©Uï^™ØçÙâÝñ`îôBì´þ4ÛßK¿3¼¿Ñ¶ínÏ-<d g/ÖÛ!¤“vb'B¡SŸqvØäw¡Þ˜yœä÷rËUM_˜~Ï}v´Ð9]ñ=ûJvO®§ßͯããq~òUÛ 0…އB BŒ[°ºCEJj´a!ijïFj=ëu{µ†©ºÈ9{à!N•Q ˜ŸÝ·ÄȰϮNÙ÷Ù•iOÀøÕYçIv,­Ï0(ÖpÚd/Þ±²ëyµ–·Cvqì»øfº¸Á¥RˆÉD#)ŒLÄZccc|k]|6 ò€zxÉè­äÇ0Ýù)¥j´Ùr¦°ÅÇðn,¿Û9SxÝó]ÅÞYÂ!ÐÛ9˜­±ˆë˜!Ð neœš §–.Ç)™†Ÿ2Z6@—L eκÄhU³ÇÕÞ‚ñ‰q\J‹¶“Ù»h|²u—çxãÓŸÞøôÆçþ ¹7>w§‹{ãsÇŒO®ªrç}ò“E“³“¢yò+ ?¾¦Uª¨?~ü¾ømˆPòº_Òù1/õ;Ï>½¦), Uk wwã“š‘í;§®*š¹ŸừÐ]sêrµ¦ã„ºwn]MŒ•hš n„E&4 F˜°Œ¬rë–MûuŽÏ…>]ws¤¤ÃfǤR8 €Eî¬Ña4èöÒ@^Г;¶Õ“û£#¼F²NÄC{€Ý $´T "¤(ƒCMC0–S)µmBA{Óš]0¥ìçÔÅŠ­9 ®]ˆI·Áå¸û¥“D©fœ«€¾ g¶ìÝ ß™.zL ’^"ÊAÖsæÏq(l7 ýi_о¼íIqÛcm5Ó#ˆF)¥(ÄR#.B‹x› 6Z©,š.þjLÊÔ} UœJD ý@Ùó'HR‘®C>] y´y1_­YliRÙÃkd1ÄjDÑ8@Î"jÔ| i'Ã#§XQ͵¼Fîß)ø};E1é*–ÛŸgóîÁ<ö¼L7t»â‹¢Ãÿ&å<@hû» c}{<Š£AïbÇ!Î&2 T‡HÆçFƒZc3¢4 ÁF­‚¸²ixˆ{Ø ^FzΛ¼Sªîþ‚]+×ÄdmÁrÿðìã3·ô¨VAn}Ÿ¹gƒfÛÖ*¢ð+"´þ½1yZ þÌTj&ë×­a£ÙI›°Ü €½f÷xæHØþXúê„Ù§Ç'ù@¹…jÍž[œo^äXcŽ ä»?L× &ÃÖ÷Ïnå?•ö°5h^›ÞàÙ´v¨Uœ»ð9ô¶fçŸù:”á QÏ®¿>u;­n2Ú¨ýãψSè?j-ºá‰ˆuжYg -Ú ~RÂÔËt¦è5)T{§‡µÂB†QŒ‚˜2С‚ ÐEº%ŒNcM¶Ò™R2 ¯‡½3Å;S¼3eÏ)!ÌG©‚'å=¼¯|vw^à:É éí¡ˆ¶‹%"h ¿0‰¸„*fIk­”̨0T«­lÐ6¾ˆ/g{+¡€P?A_ íwgUÑj«´¬~b~‚Šñ`ÿv‰ŒÅ±ÐaÊAÌ( ¹À03",TóD«DUÙ4¼¨*1R %ÖÔc#Ãr½ èÉëk†|Íb!LN%žïuö¯“Óws·&Û¦9¿û?ƒàzÓmwD4ÔˆTÇ„R·“Z³œ{«×³ÊÛÅ8ëB­§cÅÆAh“à4×ö­z#ÌcÏÒÇëÃþ8Œl¸–]­åïM?šô¬­÷L;û‘A~1 fË?ý¶o¬@²÷{ÃN:UýæÿÙ»ÖÞ¶qfýWŒ|Ù/U"JÔ-ÀÀuœÔÝØN}Éí`!P™(•l¿’í\Þÿ~†ÔÅrlÇN›mÓ­ ±$^g†3GÔL”‡6“õ²¨f!sEvvAKLfn0âcIWÓ[A©ÛtMI;y°SÜjž]5”Þ8bÊ\>˜³‘/CîÕÛ2ãút<‡ã›GÙØÄ‡×Å)óiN<:ŽYþdz tö啌2È@žÒ§ÿ[Éü$aòòp–ÜŠŸ^ÈØŠ™TŽ(¢ž"_šÊF:åæ÷!!éü B+<§©ÓÌÒ6yEò6˜Þ¬ ù.D¾+Õ“bïÆÁhîçõÜñdš¶-»€Rž|4™I²$TI€ÉòñeóÉÈ(¢ü)ôV†Ä'óûtšLgrÃJ“ÍÚO˜ì> ƒ›”—º?ßObÆÙ”J²$¢»0g‰8n+šŠÆsùôk0QBäóPAŒ¦°ý%ô–Œn˜Q% Ƙ$^zlìµoô°ÚuTfiŽ£j˜Y†fxŽåé¾ÃˆcþÉ=PÄÓ¹o;˜kذeb_§È8cü‡{‰~Üê\ëNJIØòéÂmœ ÝKPíö¥Pvnûl8hºçÝÓa»éÖƒzã“{Ñ|rõ“5%š—ƒfç¨ü ßmüÕ¸g–Û¶ënýø¸Õi ®–*·ºíöÐmwš§pÑ´ºåÇ­vý¤é®Î`í–xRi¿ßÔVo•«÷šýưé~<>/ß=éÕÏ>µý¬×ÝÆ§þ†N{õ‹jvº¥îúƒnOTý8ì»ÇGMúõA}Ó$ÿj•Ÿt€|ç­ãœ<íK¸¡?/±¦Õ4{ÇõFs-“–[j¢ì=n1¼fcØÖ¸Ãæq+½‚±v»ƒF³Â¬ò‡ý«¬ÁhmŸƒ³¶‹\m£XÔ‡ƒMBñ¥Ñ½Ð6ñ¬×Û;]#Éíáé •‘uŸz­SÑ\uUViöL¢^&j¿Ño½P¹Ñêõ†K’Üûåëz£ÑqªÉ“òkœírzïãàÅ?·IN_ú_—˜@· ì ÍLw“§ÒK“ÃÎÙwà™"Œ·‚}+6'†â©Ô‚M»cªº¬ÃC2ÇY%ûªjiž‚M)¶fЇ,øÅuË·ÏRGcºÄ3“ž‡ƒÝE]‹p°ß’ê•/&p—û­>ÀCpFL(ÌLMG!C ÌHƒTñ½Æ¯÷¹¢ÜP=®šÆàaK!¶ªÃ%Ó8!°­2½­ŸKíØÆ¿às)mÛ+šo¬>é,½'ØEúÄê ƒQ¾4ãôàpÂB¹noãtÿÓk ÉYçð2"©³è𺾼íö•£Æñ¡8u Ÿâ%Â^»ÞÖå!‰Ýø™<ÛšäïcdCï‘Dž±Ÿ=g=~×1‚„¬ÏTmh ËzO§&ÿ)×Ô}ÃZwFR’Àþ—šêï; i¼6¡˜n꿜=}lù:óf,®ŠCTSnè>³MÓmöd×6þö䉰PyS£ó°uñ ÓÇaë4ý%ß–ïíøê[Spw?rð< ‘ø<©%k8ºDƒ]±ôªá}Û'“ì4פ—ã/ç_ŠI´—'l*ejb“[±˜ˆñŠ•’{2É~Žãà&‰-}þrí_ä—ì¸êŠ/IÙÓí½nIŽïågT{b¯¼'¾Û˶Èò•Ïós’$²ýñú"š,’mÚåÁÉ4"ƒ?¶Îæ8g\qÇÌïTXh+šÄãAØŒéPºy9Pêׇ+–œ¨T¶âú±H –ÝûÊs1É¢'ACýÞ¹2쟆d6ÁÐÇr–ŸOY (k°iQB ¥?èNIòu‘a%‹¬–¹äKÅæÑ¢7 BµÈäs‘ÚLŠy¢ß×Èg¾2‡³@Wö†3æY¦ðöì­d+ùŒþ!Yc=FÔ?€iùM0¢¶6!ö‚F|Žõ×&Õ~½-Ù–æ KÑ|†¬™ÂCLÛ"-Ÿº5Üç®mT±Âˆo‹5h•:*÷8²8á–²0W5C3ÅKR‘0xÄðq<ͦªé#­Â–ï[ê¶|7Ø2?!ùóñå„Ü~atin@—¬º'`âäïZ_Œ³‹m”¢L»”ðuíÏ?ÿ§¸“¥F84PCµ„‰¿5Ñàš‘tíwñ…âµß‹/HPáÜç8¿çþ‚¾P›`G× öÔÁ®‰§@•XÌD7±eòm8w×6*œ[áÜ çV8·Â¹Î].±ûÛî'"¶>€zýMp¨µþ|A‚ ‡>Ç¡æo€CM›Q‹ØT1ˆá+Ø15Ŷt®P‹›&Icݵ ‡V8´Â¡­ph…C+ZaöÃúÉQ‘~œ?T_—æS’W8t}e¶í_‡Æc¦aèŠÇ˜ÈÅM…0+"R XwYfkºí]Û¨ph…C+ZáÐ ‡V8´Â¡ÓUõƒfÿ6þÐ5¹LË$¨pèsúÚ\¦&v~9jÚ·L ¤ë\ÁÌ#ЇEÂ0Ü"¹n ²Ýº[ýWáÐ4¢GD+ ú6@ÔY¢[t%MÊ•E>/œ5(׆Ȓ«î«ûF ‡´ÎÏdAœd8ŸågJ»Þ8ŒuóF89Dæ¡Î5|h°Ã‚Z~GhYŠäëó:qÌÂïý $½z·Œ¡ Ø¥4oÒF~‚Þ)kç3¶ÅaZyÂ65+Â(çÇkí—Ž×ÊAتö›Àx0¨ëa|F‚ Æ/ÁxAšßÆsß1MSå E 73Kq°àAcªnéÔ·}´ ÆïÚFã+_Áø ÆW0¾‚ñŒÿwÀxô} f µŽpT} öFZC¦õË!hSço8Q|fa[Ql‹š çŽÅM‡qÕØz c×6*]!è AWºBЂ®4´W z‡B™‰B¹}EûtNB2bûìD“ ¶·¦f ø2¢¬X¸ù %92ÖÕºqçA2Ž]Ñu‘ÉâÕÝ£ ¡<˜¿h#VÃpzoó`]ù”â®È\ñ°Ìà%Z<·MBØ2@l±MÏ›ûÊâ ³Á­‰„(¾Tb<žº>›%2ÀõÁÜ'ëÊKË–Ùª-QF~ø–IP×]ØïáÙÞî£tcyqO¦Ðwìflt'á ¬Ì¾àÐ2Ù÷HÂþ®¥:tIMl4Èȯýñ×ðc³Ñí·Nþ<¸Gìài6 öAï€&¾ F`&ÅÅ×™ÇÒ•_Óš2ªŠª'·5P%"§)›% üA‘‰üS`dµ ÆÞŽk{­ÇËóÐ_'$sïâ\½¾ü̯ôîÍý ®[]içïÄ™^_öB:wôÓ¹Õ}©æ uÂÖ´/®Ôvÿ/†Ó«¨s{ÝWÕ«§+ãôâ8¸4§WO7Zûˆ>¶ut}7T[Á}àéŸ'×ÈQÉ ©Þ»õ.ëÁY¿õÐyºÂÝAû¾;¸yh?µQk¤Þ´ï¾Ü·êÙÿæ¬Ý¨å:wi¹F´:öøùñúærùùîºßrZwÇQçè3ü?O/>ß]Áx;'m­ÛG·WÑðáô¢;wu½}×¼ï\\¡N£•´"ç‘\øÜ? õêÝË9¨Ö=úúÔ>úŠÛƒöS§ÿÙi}Á‹qÖNïê7‹rôA–û2¹»¾OC¡rþx©uîýË$ Ñù“§Ÿ?^iCI‡ë»/ðÿẂ+ Æ;èÝuî¾N¯.>‡í>ºë]ÝwžZí£ó¨3øœ6>ÏiŽ.õÞhðäŸOiC̹©ŒöSÝè5ŸÚOÀ÷Åë šöñ}ë¨(§wÒrï‚÷ÝÁÕfÞ?ÑwÄûæc‰÷Ïi rñ~hÚ|Q7ËéÍÿ³w­Ïi#ËþûVÝÿAÇ_¼[eaÍh4Ò¸*UÇÁØáÄ`Ç@²Î­-Õh6 ?rÏùßoÏH`À`pÖÉ’,\FÒ<»{¦Ýóè/$§wðn)ÿ¡ìMâðĘ‚önÿ?Uðrþ¾ß þß×§ÇÔ<ÿ›­œÿW¯^í8ÿqŒr¥Äq%ün4Nãrå¢U/^í«¡ØP€àÁj‚BM» hVé î&£žì(«@‡iÚqÀ¶¼vršM•s:õ¡Èù¨sóöy¿mbOÞ@V;»NÚs qvýL2\ŠüÂìI\ñ¤6Ë®ÿpÊÆú4@žœOŽ3Lçê9Àx×ᙳkpÅ®sÛX(‡çÃ…íÐl;úÀcûsZ²;;LÌ-hC^­’ί… êààÜÜqêX?]ãMÌJì·…•ùÎ.ªÄ8?¡´Âqæüš›i`ëüæd#ktêQçKÊ_½ëÛó1 ±þ9CÇ©Ú:÷Naü/¬–EÏùp•„jâz> %äqWñlVˆ“ކ`»8çˆnD¬ Éí¼ÿÅq­r¹ÒhLÄØÈ4° :6PÝt¨+›¥_´ï!L6ià¡=÷¡Yéh¶Ë8[¶òÐÑÇÜ›ÍÊŠÀ¯E®Ö˜3î'&ôâ>ÔÞfŽWkѪ!J°« â&ñ„L*aö]žŒòÑá`ÔvSÙÖm–oA)ô @h²ü°èì§gãL S¨k¾R·o·—ºb\ÑÒuˆÇ”¯0,βr¡H&ž ]h)”„.gDºš)¦Žýµ'2¹F¡`ž 1c&* p°0ñ%SœÑW:ATðÄ×2bDc"½S"}$4RJ÷€ï7:. 䟌©¾óæC\>oÅ¿G4®Õ~7¶~ù¬vÞjVâ÷g§­Z%>l6ËoâÕæ›¸yx² Eå÷f¥~4ý¡qV~[iÆçåj\oÕãÃããj½Ú¼œÉ\=«ÕZq ÐË)<\4«gÓŸ«µÃ“Jܼ<‡ÔªæËTK ~üj:ûE¥QnUâ×Çï§ßž\ž¿©–E­¯ÏÊoK*½8üðDÎúY}¦ºFóìÂd}ÝjÄÇGåeŸ‡ÍÃe|[þRò½¯ÉSû^øó ÖTëÍÊÅña¹²I³%UPᬜ4¯Rn]kâV帚?A[ÏΚO´æ³¦ûØj¼~Ì‚ÖÙ<¯Å(ÆKÅâ°Õ\&ïÊgðò6ž—áyi¹†b§ $¹Ö:mV ².ãÓEuiWpì-£ÊcšÍIÔÓDm”Õ'2—«­I®ÃûéçC€6§•‹C(³±œjÍÓùly‚z¿5Ãz qª™4¡QÍÊ‘5,ž¨µq~x~¿?=¬/¼Œ$ÕÙ.O‘ûdf UÞWaüÀÐ9©ÖW ŸÊ£f6*þŽñ>šªcwÀ 7)úEñ¡qLV4“ì°Ùzj­ØûðÒþÐà%ƒ}ÿq(¢“p”r^NÐÝ·raY€Q˜£¥l”˜`Îîð1Öœ‚[3€tõÝøÀåH™ÊT¸\S솚 ÄW¡"_‡²’€²PGXh_ ¦„Šø¾ÏDp€ð«(➤ÒgZ£ ô}j?ˆ î!yò¥QZ…²¾ZŒƒ&óÉ®7{3•9~;ìø7ë:6E:{jÛÀxqoj[ÅÑx½oo~]ëmÊ@Â^@<ÊÜ"b¸ÛU&X´]?-š 3D¿=°K@ÅŽ]¤ɶ٥‘w﫞fŠ%ÍÁ[÷üêä÷öqùíé•íìLÑ(ÅÒ¨]°ogÙhÙ2ê|ڢłëì.y.!óâÇQѧ–ÂÀ¨RÅRn^»ò!g‰SÃ\4ƒQ`5Š&(ñÕtí;ÍäKîEn`}ÄXâáÀ'Œƒq†‚†š„zÓ¹ žÚcÞI¯ò†¨žì§& úìóUÇ,üîLèù1? 0ÐÊ\Œ (D„ÃHÓM ãk Á\É׎óèï;VÙ]M-êÚ‡³ž-|4èLïÈku ιã2æ}€˜á‡bgË´äYÖ !Á–ÓžôG$Hƒ1ˆ¸ŠHê€GÈgƒ?Ó…•óÉÒŽü1i6æ(ô‹´ûM{Œ P„‰”1šÓb¼é$ß„4Åø‚–.Kx=Þ÷×F¤ ’(³» ¤I2’„Ä”GHhÑ—á´Ý²„¿Q»e-&϶žÁ¤˜`xT%$¡LZ„biS ©ÌCÍLin˜%³™!§ÒSò2ñ)>ÐÉ $"$^aƒI(Á ˜ÀÕËÐòÁ™¹|êÖ…] ¡Ô¦´ýźÒ#€­8ñqé—ûgxc×àv‚¯‡ÐÀRP»^‚˜ôiä… #ˆinÏtø1žbw lSshâÃt ÆWú…p&M c`¬¡€€‰Æ^‚TãZÿ¥¦þ¸q ˆ‚ÂÄÄO4S‰ÀšEQ Ä|‘tc™"óÑ:Z>Áf|% ‰ ‘’‰¢ÂìÉŽ¤2ûÊÙ4«Áu»¼@n0Íì žâµ0Û!7þ¯aÞH`­éo?GšEÌÎ,€’|ô¼Îk]Ëx^‹Ù{¡<æXFû0Où,  ü­d€ùË0»èÇòɉ>ÕËí§ZOzíìvñ¸@¼ˆ¿Î9NG=ée:ÿ·›;" tŒ¨rý —xÂw#À$®§‰|š:5Ü0韹iÞdœà°£zÑdà²Ûîå;QãQr™M×ð¾;Á"ϸtò³"ÖÍ3J ^óÒìIÝÍ®ùÀ.ƒç6÷ná"xFSþfq?A¾Ï3?“)( ãɶlè_Ò± •½±Áoê1å R ÔàÀl§5Â4Û&ëó=((]kÆ|ci?IÒ¿¾Ï`ÔwÆ’1Õ q’L]0Þ9 )pä IŒ"7D§j´÷=¾6óȘ‚>O¾´û7$.ÎSÄ™Hm›‹ÆÀ7ºìÛÔà1m:‚¡Ú÷44»‚Ç•@b>Ì]xÓ~ àð£)§8²"Õ@Ý´ÍÊsÜ/ˆ¨ÿ:E?;ÊÑéÀÉvÁàõ÷`Øÿµ.w<ërÿŠÓ*ä-r¶›îE½³ý›ל9Ðö¬#jay( ¬ÕzT.òó,ëéÊÏR™-=/ĉK¨D.ÃÌMP¿´Ê!ø–»ó^(ôѨp¼­1Y›CCÿý~ËÛ] /u\,8ЗºR1 ŠÇ"—k:¬ÁJFŒ*DñwÖ×À[)#Wh¸DÂåt £@8ˆ±Uç`×-ã'8‹¿Á9Øõޏ®#}ft~ÛÓvkµâ¶[¯î5NÛ­fÍ¢½snæíTî&j'»SAvŸ öÐûv7ü^…uèlvÐþ"EmH°«â›x¯‚ÿÌ›É|Š~8}’(¤@JWa.]‚s9M|7D9¦ž$’ø«ôɺeüúä›Ü«°PyQ¥óÕ u£Â\LPôÎör„o9‚™W\ŽIȦ†«ø)Ðóî09¾W¨Šå(La£Î‚‚î†ù[ D"[„ ¶7o-DˆÏÉ‹~¼»kCÐß8B‹(M\pÏ\.±’æê"ɼ•¡ÐÖ,c‹·ñ%b$=©¸ Pèó$ÒPg¨Í†N¥}¢ÂP3Í‚@ûðF#°\„Ø"ËÍC–ÁYn ²üÞÐ~Îðf¬pô'ƒ3< ë<<Ã|̆÷ÁM;K±©zrqð³«FAAã»SMW|ÖŸ¼½_”>§xl. ¾›eð -æ5“¶NgOj¦ùÂ>«AOuЦ-ìïA|*Ešc©L,Ü ‘÷áyÿFòEé­^+4ÕŠƒßÝ\2´´wë|çm(„žWØ„ÅþÃÉgt'ؼ'Ý·­×•òYý¸zòjÿ:íª}îx¿³Î>ÌÃ×í(Ióðy”¨|Ü;©pÜž3™¦œAví<,vçâc{|v¨6q:;Õû×­ï_C}ãµÃ»ù!€çêZ1Ò?~ºøTk¾nך—Ã'­ Öð<ýôÃq·vÒÖð¥wvT»;k~ì@šûõb¤þRÿR¹Ëc¤¿[w¼þ)O·VÜùî¥wù¥r{ù©‚O?\tΚ•aýè08+£ëŸ^wN›õnýèêK­ùlVp­½VÜù öEÜÕlÜùwdy,wqoÓ­Ëý_ÝúIí®vôh£Ï›ŸïN›ïLÜøáå‡ËÛ ïËÇOP×—JPï¶î꟪ëÅroÖüZ³bb¹ûµOS±Üä¶z4Iç×ótÁû³æårÞ¹Ú ÞWî§x?OSRÛ šÖšï¼årzåmœBž«¥ü?;›Äÿà‰1ÔŽ6ˆÿ@ƒåü‡¿Íáÿ}}zLÍó¿y™óÿêÕ«ç?ŽQ®”8®„߯© U/^í«¡ØP€ßÁf‚BM» hVé î&£žì(«@‡iÚqÀ²¼vršMœ”s:õ¡Èùóöy¿mýÜ ¼£™R†(cÚ%Ä'fÿºryÀ´+(å2 L˜­• ë–±]Xc¤.ôøO%Û™Š‡Ë½%4Š\Ÿjæy.¾vE¥Ç•ô“ÐiýjïÏÄ51êÏ.ñ|æ ;UßUj­¹OîYsºÊü½í¾uÔ2 eƒ±ñØÚÚrÝ0å¬ç!¤…«¹$R¡›„‘viHƒ ÐaIÞßµ½k²ÙŽÄ Ë²‰÷Ã8wÇîõÈ.EtÓÁ}ÜMà9¤!Ë}(¼_Ù7lœ<eÖ¯‚¦óŒ_RâMå›NªJÅ õ‹ <Ÿ_ZOU^‰iÈío¢@ ‡Ú`Ô3ûIã›îx=Àæ›Dì‰;Ð9CÐ7…ôGq»§SKW>׆Rw©¥]7•¹«¸r~Yv/@»7öÃêI»ô°sXËÏä¦ý´“^ÝÛ‚„êtƵgÆ¿4O¤5þ2¼6a™í“]Í1Ê¿þï”°Xæg™²¡ÃDGw@s›ŸI·m—±4¢v-ç¦+W@çl”;³^áŠáÀ†0»ËxîIës ´«ÛaŽßÜåeÜeö¹Û½³¯AõUØo¼+è¶+ö·I/m÷nä8_œö‡yÙyœÇ¤oƒçéþÈ’%Œ LVù†->»2šåW\[ß{šÝÜæÝT¶9ý< qÑÙ¢üLÙê» £öUÒšG_öÒÛþ@iÀõ–,Ù½©®3f‰º³™E7½±_?·ûnIÝqoLØ«uÓö3qÍ{€â»ÂÍ}²,±ìÙºí|Äw¹ýßî¨#ÿm݇ÉÀ–ÜZ›|Ó-ºExA ¹j” Ǥ‘ vNnBá^žûîJ “Ë©ra¼Iì]eÆÂ^ʃŒðkwº¹,¨I[Ä„ƒEŸú K4ïNNÒ›ö`8ù*QG]qq_ȇ­Xüø¢yrq’}…®,»ºÓϦe“)LÚ—KQÒ-ª·ÿÒ¾ÈãQd¿m«¾Ã òóæÿÅ]©‚¡ A–cQ+Õ]KÎ~¯mk¸ænþKtn‹ÆdêÿÙ;÷Þ¶q-ÿ¿À~ÃÀbw±¡CR”H˜½èv:³fÚÁ43÷âî- J¤RoýüHÚ-úÝ÷¢,É‘c9uÒ8á½@'–(>ÏùCR*Ôñ\ƒßP´ëS± Œ«Ýeng׸è“Bà'záZS̄츄—ź˨xv:!*§Ô\ƒ6õ¹þ6óËe1™2åçÔZ/‡UßÂH½ÿZû ;WS%J)µ¯t`ð— å9URE©ýübóEù"íæKPm?7U1˜¯ |o©bƒ2Û`,¨ŒŠ¯¹nš¯í æëј¯¦¦+mÂZó”óû¦â­TV©t[§`Ó4”:¸´[¥ òú·T kýé5Q¥Ïªyï5›W<[ÌÅZu•J³a ½ZÚÐ0•(­êÚ*—Ö·Ò¡ #R(io;½úZvÃþÕ¬†×Þ¥æ[ëÙš¬µƒ¼j]›¬ sÛÀŠºõ¯ÙÚÂUš×«ÒšyÚ„›ÒBÔuit¦u#äM[Íô”Ôд\5ƒ·¦œ†ÙôDUöxmY›Š»©å§ úñ:¿2Iž¨¼}iXZO9›LV竆¥¹a=øyCëíêšt<«ÔxhY›üU²‹g¶Ê|6è­Î5ý€ùzߺŸP|ôŸ½<%9£àQ”fÊ€J$R©!( æ”`ëbª"@ˆ‚µ}y«êŠ'Púbß'£ Ûí¿O¾ìám¦vå}X<_ÐD_­–³þ·|rß(>¾4çŠ"cX†˜Ê5J“”¢,‰sK‘âxç·¼ºæñBT÷ñmÈ}4CK«Mc&'Q|ôgX»tK k݃o» œamUjñ¾gXããûV:%8S…ã ‘#-„8Ƥ;ßÍÝ5' ×îe~— Üm~—œà@ß3Ih"šñ‹__ÿüû‹ó×o~vÈúÝ6âSÈ5“8OsÂsûMLfg9¦1M”ýþS*Ê„JUœJmN4qL6â?ÔF|z“Ýñ[Þx/ñc[Ì·nħì,6gëÁøþñ;Íþ{ڈ߭ìcÚˆ+ø kß{e·¾Öñ±žg•'Qtôß¹éÈÒ2ám,½î‚ÀÒ›,½ïwnŽ‘¥s(ªc†¤21®,eˆÊD°Xˆxçû`:æX:°t`éÀÒ¥K–~b,MñÍ}ÿO”¥ñ ¬…¥«.,½ÁÒpåé³´ ”²Xk”J à` œpÅ̤$£„a¶‹¥»æX:°t`éÀÒ¥K–~j,MO˜Øò%ø'ÇÒœµ¯¬º °ô&K“gÀÒ\3 €!€ƒ£,·áH¦X"B¹Æ:%9§bKwÍ#°t`éÀÒ¥K–,ýÔX::‘‰|&,Í’¸¥×]Xz“¥÷|gùQ²4‹šë„¢(%™*$„QƒÐç9e;÷xtÍ#°t`éÀÒ¥K–,ýÔXšŸAžKÓÅmßϬº °ô&K?‡³‡”%WPDLŽ˜ÈR+<ÅT`E#“(Žw±t×<K–,Xz+KSX:°t`écdéŸþ\Þãv©…¥]„ýÒ­,-žK3¥i”€ÜG <,7g)¢\pˆ8ærç+´»æX:°t`éÀÒ¥K–~j,MOü<öx£moµ]@ÂçhÚX:zû¥c–j*p‚,`€åNÀh§D#Íd¬ˆÒ8gKwÍ#°t`éÀÒ¥·²tDK–,}”,ÍNpôd-Ç—c55óIM.ÇÆÎá~¡Œ—mOà­OøR¦3½O›É·çï’[ô®ŒÃl¬‡#ÛmS(ØJJõ¶ÍSs½íÖúòjµŸÛRùóÕtêCNën– 7KY V¿BÓv[oßW³õžQ·¥¥¬–öû#Ýi%u§„|OÀÛ¬É{ø;1ˆâPÑ1šé}÷‚F[bn‚„÷}ŠS’ð£3ã$O%8­eYJ‹±D©–üŒÏ"òHï2ã]óf<ÄÜBÌ-ÄÜBÌ-ÄÜBÌ ò{q~þû™÷b:8=›O®}—²œò*jNâ¶§>€¸Ï¯F‹ÙÜ9På³ûH[hÐ9ú</¯E>jK_ô88bÚ|jp£/6m“6Ô‹¶i3»f>5c_¹Ö&¨‰ÅÛRÌfË¡6W£Z7ŸÂïÓ+­ÚÒ;ËæmÕÍ(ê÷ ²ÚÞVöûßú‡Š¼Š´üˆü¨kµ„–Ï»(Qrj‡k8™i3þKõ§óà(‘,ÚÜ'ÛòÇñ¿VïÀ&Mó¹‚.XŽ&öõÙ…"¬ˆ„ÞêñÜô±@!&«IÝw"Ü’N}º™ŽÝê³µtÞÜ%­”jwRæZ ,µb8§\AˆsÍp”'†R)S.4bâÄ!#éwc<Z½Wþ§¥7•ðL«=Ú2tTê |t\œ»ŠÝ]–.êºlýœ+gu¹~bb&³ùg¸È.›‡“tXØ;§+cBkÅXì¬p墑œ”÷JPõ õ”x£XIJ9 póU×]¹åuòëèÈðkq«·ZÚ¨E϶uañ!¯vù-pအ\­Vó¹úì¶1€ö‹åþôU‰º€ vè+žµ‘•ÕÂn|8©Q.ÔÝ_u«Ùåzå–']š%ŒåâÃl¬[ôã([ö®ahMï£ùÜ-zªW´¿äñÈ]…k€ŽÅ¥F g© høeázG¶T©Þü•Ší˜NWú “׈6šòµ½ñûæÒì«-ò­4¸åò¸6£‹ËÖŽ˜;äò>E¦ÆÙjl0F·.{o@ ­ ÷¬ TPžÓžg7C±¿èÓ]GÀçr˜¸kf»Ç£Ê¹7ÞV6¤øÚ¨ßm– ÁØ\˜eï ŵá·†hÌÍm› Ì¬WfÖÚÝ;…ªXËÝ5™ËtÕ•¯åö©aöa6ÊÌeôa¦­äØ„ÿø×E¯H;è» mÛ•}ÎÆ@AshÄg'E9Ðò¨yöÁ¶ ž_ z/m¢Þõh<îÙc7V\mŽÎÍt €´l.‰í·ÅlR¦™C®³IïßœC b¦ÎU-Ê,üÜÞÌUúß½Ÿªâ]fh5Ÿö à—˯—Ï!³1 ECÀ+MYõxß`íU¿VT[G½,ê—u- …ZºÔËi^Ò(Õ͘b£Y»B-ô€Oà† Ô®ßJ1ë©‹‹¹¹(@¼ÔJÞì ¹žð‚çFÓgh5ñb4¹ÃXB+.;þÔ³^ýô²m"0¡±f ÕGЩKxxáÖ*ŠÚ¸m/P![f­ƒÞ_ o«  hÎ=:VP_¸D¸!ËÌè ²´[짆ŠÂÇ"64…Û V¬·”Ç º<Ò1ic(ñV=?8Å7k’`\•U<^ëÃa1¡Ú¤â§ÕÔÁïZÊÇ@¿@á#oµx^£>Ë: L-¿ätâÆÚÔ¡¢èbNUy/ˇc=ÊsÐ ÓeUäs³=TECì8»UÜo']0‹.ö$€-ØS›ÌPÒ´ëàßþX·äýÛ†¼ÈìfÖ×ËßE.Ð`Ûíf²-Š è®Ô,¯þ»ž5ú³>ÂÚ%tT U aƒ]Ê©)ѡܶó‡Sú}ƒ!¤÷ÛÛwwŒ†¸ÞÐÖxì°Ø²Ï‡Ó§û¨ž$ŠsÉ$EZÛmA ’yJQLÓ˜PIILUKÔ³¾]5»UÄ•ÞÔ>ÞW9Øû8Ћlæ„ûÞ=|Dç%þéÅ?ÿS×ùæ€Â†ž®uf(G"—´P0$.PlÒ”j¥”árË)RÊB<éþãIä ñ¤á¿5zÔE4êÑ£™É÷L)güp߸ÙúÁÝ´C…Åî2ûÆ*4d•æ¼u=Å+ÈÇœÇqµ¬rc ¥m©eIÈãÝC¬œÒÚ]\Ž"8ÛB2ì>Ô ÅÁÞÛúI}ž´»z‚à¶)‹Ýiµ®ô¡ûó}ï¥õ@/x’ª ·:·Áèbá3¦Løw»´O`™ˆ#ww¬~"í¯tY7ï‰ê'¯†­î‹Vþqï9¿}óêÝ¿=/¢¯E¬¬²zÕŠÐÆêOûšÊÍ%•-« tsÅ`G”{3°Ø FáöpÆ[#ßâÑ7‘+iKX«s´äë×{ðçéÉ-Ns3LcÄdJ2:Eyš%4å*a9k·g„ÆÁƒ;NîvÇ­‹Hì^öGmü-¸ÄŻطª¦õ.ôß^½ùÑ¿nþ˜=·#W¬õHÿ£Ô±ˆôåB¿½}óóÛ€OŸ>'>õËfh“¬G`_FSƒpÿþ¨jœºåñ6Êbä„Èï¼õâá(«õ¼mÕ²Z(‹‘½)+”(ë»RÖ»?^¾|õêÇW?Î œ8+pÖCp–ìÄY‡\k¦J&|ûZ3”Kåñž3Þï°l[®º ð]à»Àwïß¾ |øî°|‰Gõáå;o¨üK¡~­Òû¡3x‘vðò}Àë à•„×x}ÃÌê´µùKõ*ºÑTÛ¾žÍ7¾ðpï¡sgt€àï÷þ³=*qo/ÛV‡‡yÇ^Y:…Ò­•^Ó;V8e\»J pœ%(J ̹¡Ñ0¿â À÷eþ‡àå‹ñ }XŠ|SÎígòºÈøïö¾í×"-tìÕh¾\A—O@ý„8Q/;}ó^­»ûÿÒ¯uqô©ÕG9LÖfÿi×á<$R~CùM°ìL[­g7€-XüÏPˆ·:u£;VBÛ!‹Å2@Ö¡ +ŠÂy°£†¬NÓ©•¬GŽ 8ê¸8êæÖþ]a0y¯a°8&Å2FÌÆFMW—‹Ççòâ\ÁBœ+ðYà³ÀgÏçJØa÷çß*àòË«óWË’¸¤vjÝ ¤5.=rb.Õ® x„·*Øo»¦HÚ•€ofPA ¯ø¦ —[¦¿”úïù I«’¶—Tí z èãÖû¾™¹«BòÁy`:»R]ZNä´LP‚>þkçns |3¿»øªæÓÛê€âäñ耭SÒo”î•ÕýT $rû‘¾Lw«R9¹µs6J™ãƒFÚæ¿PDRœÆQÒÁá©ÁN&,C fD¤$SYäëZ~ïüîylè%˜ð”°HÄXç"Š1–tOÊL&órF’8‘æ"_ˆmããx…é£Ó9tÏÕœ$ŽŽNeà±Sb @ìˆi¡Ìô)’KÃ88í1Ù¥ºæq‡•¤Ç¦±v®$= ÆúÒ/2(Ž qý9ÕϬ•Ÿ.hUV¨ÈñXÀļ<–¶²Qïþ‹—ç¯ÿ|e¯A_¨érXÔ@1#DfT–æŒá‹„šVW³b诲K7$öiså>•FʼnûäéGÙ\~03wg›ìY³Åµºô– q땚 ÀxÎlkÌ'÷}Îâ|Û‡ëá|zq¦ÆãÙµq½v>_ùäù­­‘ý½_­´&aÄ%QZƒ©YøÏVÝ.žI' !AS³´ëKŨx ?˜ÏÐHì›Á¸A|û½úÛ9zýÛ»³òìe>úUkÜC¿¾xy6QÙ°Ì$Wg$9‹ÌãgTÃ~0صÅâõoW̦êׯ$å•›rãoî.3{«b¡èpB»_Ùï‹®ýñåOgV0òÑ…-õ×oþxñ‹;!:Ÿ]ØÑ÷’éâÅßÏÔ•ݲáòóðÿ@[Ûçl-‹Ã6§¡ž®ÌZ$áúG³^}ôk¨á»ßÿD¼ûùl¬VS0ä[ת@\°û_¿ùÜÒÌ'0[67-¬I±•sŸõÛX«/¿ VvmÔ»s<µø8\¯-ºýIþ8n-ÑÕ¤Jb£íWf#Á%LÅù:쳂‰k¦Úht5¯&Àþ¿Pé¥;Ý¡F0aݯò`as]Õ7o©.ü·Zî¢I»A}“xç„ÉX´¾YÁ¶ñq„è&G{b2!GGÉ&2˜ÙHçà=LêœÉ·:ç®Î!fÒg§ŒQØR„I$HÁ(˜æ¡eDD"Õ*mÔ´m0s­kA0³IKf" =3¾ gnÙ gâ}ŠV‡3É7 gÒu„31Ù§v²ß?œÙHôŸ(œÙ¬ïçÎŽÛpfãpfü’†O럯#œÙÔ9_ ”aŽh ”åøÇgº¬ÃTÄîäPj¢b…M )§<¦”"iVáä¦mlÙO ›Îl¤9š‡3ùK ÿæîƒwP;éMºÿ3ýÓŸ¸ûs%šáž]?ï§o„–Üȼì‡jJ·»ÝŸÝn÷Õò³P-ùþoG%t„:IýDÜʬ ==êºÝcvÏÞÊÞ°kPUG'S÷|rÕ-_˜Û?HÀMËëØnRÏ÷3Njôlo¹ÝÅ1‹Åìä§ ÏÄN…R„kÝ87lZÁ=H®f^GUYå¸òúƒú›áný¦æ](õl•ò9™>÷ýVÏA_UÏ«}Ù±ŒC Œ( JŒXpºG`œS,…Œ1¸xxIMJHì­îŽMý`áò…¯‰©-,€ùeÉd% ¿¾|ZsïË'õ@À¤êlì¤| žÖ¿@(³)+Îù åóÉ5÷ýÐ¥,nY|=,.ÃX(Æy±TÀZð0:Je™ ¥5‘ŠÉ“±øLäÄà s·–?Š×{ßÊS|P2@ÑN×_<¼ãQL6ãmœ'üÐK‡Ÿß#M0vc[ž A ß‰°àg‚;ëdkeö{Ã6¶ŒîÐ{> •±º9DöÁÅEâi3ŸÞ÷d "tõ©}w½´y¾'ç¡I‡[ßsë{n}Ï­ïù| ùÖ÷Üßúž›ä{’}$^rúmwf?ð›wHË©mß2à‡Äømßøm‚UÜ¿-ðûÁY| ü6 øEô%°Ñs~Ñü)€õ©mßà=tËømßømßó±‹[à·9,¾~›ü(z?sà‡ö§ €ŸŸÚö.ˆeÀ†~<¤[Ü·Å}[Ü÷pß l@YjK¹ø¶¶ô!‰aƒuÜ¥hît¡EÁ?º6s³Ò6iz ¥ˆŸ]â& “”GF¸_E2àqª‚H šªØ-ɪÄͦml7—ÊçÒ¬MWXXeÕéK¯…w}03Ö£Aæwꃘ–Øn7œ–~¯z¡ë¨aQ€ó‘$¦:à8‚ÿéP)UQïU{é;0Ѭ/»³G|Ô,ÊsqïÅudŸàÚîù¥v(d›Áç~åySx‡¹Û¯>îÚyLJêS7( AÓ³Ðõ$B4Pæo$%R†?=—©ß¿öhñڇŠH 0°1U‘*d"•ñ•” jž’t­ðº¨>ýÕ¸¨4÷1ã&uR|ÀmÈO3J]`H(R'CuœÄ:H},‡é 86q Š5À µñXIm ü 9QÌŸŠä±$p,üÛ‹?_¸C'öww°‹“ðà ÚýÀfOD˜àè²Æ´è`øYšJ°“ »ã«Nß+è|/×0ì3ð?[ ´$ŸÀ´½…àmömG½é«Éì¬U[_Ÿí´ÇcDyüÇ‹|ìIÇÝõÎ?wzãî¨3”ÙèEùíï87ò0_§ÿ÷ê<‚ñ(å/†_F׃~wpã½Úÿé§ȱÁß Rü2äëÝ‹ðˆ®zÓE jÓ‰n¡÷ÿGèmBp6–v>'`‘(à"RÑT ®¤ab呟MÛØBï-ôÞBï-ôÞBï-ô~ô^„^0%ϦÍïmgh1R+çºEjw‘ÚCïv{~{ÛyÊA ´06ð2 i€c3à ±•8­i[œ¶ö½í ¼¯÷¼öïâO^K(Í3újáÖ'?e´ÕWkÐW‰Ÿß±”€³ÜÈ c´pùoÈ}^æà‚€'(Æa¼Jc5mc«±HêBÅU{­p3–07­þÀü€;°q!´¬5^„ýkëèòNÑÍäHmÌsÿ•8é¸cÄw‘Š0¾‡0v§lW nàXïNXoê4÷6ƒ[——WÏ3˜$0LÜÚw“+Uå-ø×“q>IA˜&=”‹„‡ª^ýÕ4³6Éd¯ì±¸zX&BTßfÀx‰‹Ow²ªŸû}`ªä¦W{íë•G^wmÒ…É9‚Ä‘kd8N:ýtàé*3}í(uËYÂ<í|{Ô:ýý08ôlpã nlßøãâwŽÞ¸£ÁpÐ\}ñ 9—v’éèRGñô ³UÉèèlü/½~*JÿYc¿øyn#÷‡î¦Ýq~íþT½Ž¿I5EÌŸ¿ÓÓ*ð ¾ÆÐê@2ï ßæ²HØJ tvº£"!on‹6nsÿ»×»õÁô–] ÿ»gTåÙþ³ê:ýSÕKÃQѶïÞR¾h8ödÉuÃ"û2i|óù Ñèk^ú ¿ù\LÓúá ¯lm²eû¹õÝ÷€G»«>¼ë~F¦?ø<ÌljGÚ“%ÿâºëVKâr³\S½Á/ýwgt‘I» ¢?çÔõ—ëkÙ¿²AOÅAýy®ŠÄ?àq¯SH|Oú‡ºÛwÍÜß]•ù–{£,›ÐºòM¯œ‘%1iþ5ÎGi 0@·Ó/²i+ ÷‹Ú·Wv¤nü[0ãò¤ùU®dA×øž§ZW^§I·Wð‚ŒEOV°œÓx‰Ó)HzÓÉF“Rñ®½’úKɾc]®ÇÿÚ¬$OÁNfhÑ•_îÌÀt†€Zv•òl2¾‚‹T¯ìÞÿ3êþ¨¨:ìø®o1˜üb¸å¿úÖ;õ )ðrâ„ÇÏ¿çÉ9ìw|×2(þÒÝÏå`r[¨ãÌd²_ÌëùIKëG7Lôsu š ß3yÉ0›Bôu å°8+¿SÔígÀD•He´iYÉÓÛfÃQ!LZ–25aÂa2¥-¬ÔŸù(Éö4¬0_Ë)ßË|¡Åæ«iD§y¤hk¾6Æ|ÍjºÊ&L4O%ßóŠwª²*¥»PgMC¥ƒ+»U© RÿVja¢?KM4ÕgS¹/5[©x–˜‹‰êª”æŒ,ÕÒ 3U•UXåÊúNuèŒ)”ti;Kõ5élÎþÕ¬F©½+Í7ѳ…5™hÿÜPªÖ‰Éºcng`EÝú×lma‚¦š·T¥5ótÜT¢®KkH§_7B¥i«™ž 5ÌZ®šÁ› œ³Y"ª©Ñ™³ÇË:«¸gµ|ý”:j’JDUÚ—K[¢œ»˜¬Ž¯f,Íœ,_ihK»:A:%V©á¡ ̺‹¿*ìRb¶©ùœAoàœ 0_ËGt##Ü`5´urÜÀ'…Ñ Æ™¶n/ÒMÇI^5q0_Aï‘Ï]À Ó†m6#mxéV› ™vЛdê‚á À¤uÒŽ5‹[aûí£É~E›²ËÛ3\£î£ã(t]Aè• ÎS¦ŠF-®²2à$™’iü§aFJ2\ Æ#·³æqÁ"`VkÚ bbcŠ©±ŠŒ°R°ŸSúCª(5\Cß3b"MÇ­M¿y°èÛIç¨RQäÑËûOÉáéeòਣ£ßœÎ;<9:½¼h%O>\µ’ƒ‹‹ƒÃ÷ɧöÅûäâàÝ‚7Z¿]´ŽßÔ ÎOi]$§‡íäøòè 9xû¶}ܾø}¦rûäèè29:yÓú?Î.Ú'õâöÑÁ»Vrñû)Œà¨íJj#=?oáùGõêg­óÃËVòúíÇúÓwg§ïÛ‡çe¯¯Oߟ/éôìàÓ=5OŽgº;¿89sU__ž'oß.+:?¸8X6É_Úõ’c ßÇöÛŠÆÓCø½´]G± 8ùèòÃE»$ë²u:k/ NÂeT™§ÙŽºŸ¨ç‡çí{*¶ÏÎ.g8ùž×¶>´Î ÍóåT;»øÀQ$–¿pÜ¿8±^BœöùÌ .`P­7Éaëìâž^ÏONÏ’Ž0^F’öìÉÃ}ä~7#ˆoZÛ ? :ïÚǫħ57ÌóV´ënÄ›SÕÉ•íÛ¬¶%l „d½Gû?B¢Ó“ó)†ü·ý’ v“ÏÑ+ °éÕÈÁ& #¾ä£c9×ï ïÅ Èûv )Få÷µ|¬Ü ÁhrÖP× .]7*ãØ]j&L@8®0 RB´%<Š™Œ¶e"N9Öi¤‘°ÚreiE‚"‚)Â?s.CÃL$ÒÑ8ŠdœFÔ ‚dˆ,×¾7­[fãÅØÉùÐQÏŽ®¦€QC™çŸ™ñjÀÝQìß0ƒžìôkÀê:Oçï–ÁÌ7Õ Ÿ/«ü¯&÷7;áq„CJ\ayÌDг=U8ßÕAQ ;™¿ß³F”cÓq‡RÓkñßèëOï®Î/å—OGðæ4ýãW?Ù™Ú3e¼‹2£Ì_ÑÛÉóñòì³ÙwË!›¦ñPBÍçÉdDÕéà[Ù™o´6TZ#)”…ÄR Rc™B*²õÞ3¯fvk!r KÏ…P!¦.‰ "Ç)£„…õÚåšú;býewpU ÄöÍpÐéî\*{ÕuWîNèÄ#ƒD¤(Z1®µ)Òƒ_þM—nšJ=—{š…ÀŽ-?NŠ Ò8óñØJ ‹^ƒr傪½©8æ7z_`§ÍζYlv_2 mÀ¥KCZ‰HŒ¥HÁ'D2Š57)%dn…6øš)¬Ô'K'òçdØX¢8Òt5±0|!uŠÇD&+hQ}ž(®¯-|IO—%k]%‡½c)%ÊËcà&#xŠÀ¦’#¦œ­g¥}*Ä’õå1¸¦. ¢Ñ"ÏŽ^€RT8U!³Š(&¹ AK"‰¹; #×±ÄHãh°ºe±L"KÂñ(U ¦ÆœhR| ¨V·–1<3ý{W׎GÙ _[`ŒYh8 £0"QšJ ”N SYVd¯a‹n—Ê0¬ÙòÎ ?2ÉTK+¢UÈCF@/j#+âkYárðëÞ˜3P‘F D‰4åDI¯”H-6,ª¯ouÑ|}}Ëùß·ÄùçN:Ú­é h N5ÖÆ¥ˆ ÒØJ^6JTë ï²ÙQ2à¡¿OšØÙ•¼pgž‚LRÌCB$(¨XKC©LÇ ­‰‘‹™.SUÀ~_?Ç)³ÅámÎ"PZ„aÃS× “T"†f”Á p ·f3¡ Ò}ü2 -Ni‰ ‰ŽIÈ9 £”Â`„Pæ²|5-§1Í媟7b…S`±I5¨4Žœý’T‚­ `+I"Lyº¶@P¶Áj+x=†ƌ٠¢ ôc‘¤º¾Ú3ž§Â}Ë­d¦Àa«éPºç+ûB¤0*eDpÖ%ࢉuªêõ+(U_ðùI¤H@@ &&‘J…UÓ,‹e)s=,;™Æ2C¡&V^a'_Š4Ñ„[£,Ó€N7€§9õ¥g4èÉ>¹¬¾Ø Ü·ÖºÓ/á&ª­5è :¬fè’f$J^³JŠÐ:ֺ赑óÜh±çgaC îxFG §"LjЈ#’ZC±\Ïb—óX®œØ}3ð«½$ µúûoÚ¹··D®3l·ãï¢ß)›ÞùïOE ˆ3 'g6ˆb¤º=¿M«i˜Rƒ"ú@Š[÷þýî/˜,æ½QPö㪎l_ö]ˆÀÇV˜GWAš^§_–Œ‡Pë"s¡´Ÿz£1ü@„à™ÈÎÁáEûcËG{Æ úuÿù§ûy-3ÿQômázÿ4=B³éPþ3È“áøùKQÉ…›\Cƒl”ä.Õ}IÊ\±é@M¿òû]?®l„ÊöímÁS³còàý’bIasáOûÉ+Ãë/yÇ¥WUÔ¨z%·W΋yD¼âb…?Zë½L¡rYD_ Nºvꤢà\ñ¤¤3¼!‰Ë—°yžäzàÇ\ÊØ²2csu†UèÍÂÆ.- $¶¯¿LièÎÙ¨:Ó™-7#‘¼z8(Âû8þõ3ݲxß[™½é¸ïÐIì‚!Ž¡þÚ™d’í¤ƒl§`Ø2L^²Þû€Ç³øGì‚r‡^ ¾(ô>™åwÏÆXÿ~Ÿj‡—>èôß4aÈãâ|k`9³©Gœ¡1‚8K‘€§’*Ô1xð‚…‘¯“våÍ ++©Ô„aŒ]ØÝ €€Ÿ(Ã_i›X (+¢Ž… —ö½:e°‰Òv§ þõí¾RìsÖµEO3Ê¥À20&L*ˆ÷¬·H£ÌCC]£5vS‘ ¦_»DÒ€­£ÑMãÈh4£ÑŒF3Íh4£ÑŒF§ŒmSñ›Ñ¨Gæ¯o–DF£Oi”þ4j÷Fqcwg•ÏÄ›£Qj”A!c®À¡±k>µ+‘.æR‡A@´‡Å:Ý4ŽŒF%MÎpÎp4ÃÑÀQ;,2£kêçÜÑå‰VÒ~°4B› F;¡ûÿ))Ö¤Ç÷ǹϾsK¹ü^[êÆ(–Hîaš½ïþži#ƒæWÍq|8/ªé…u[? ¨çÏZ˜Fi véάiü7´¿¤7>8a¼ç+Þ–Ø•]k”Çç$5ÛÀø6¥ä÷Ây,Äy+‰Wp k†óÎC ¤‘¾ ÿ‡Ê#¥q¹ ‰)?¤©NvÎoG†óÎg8Ÿá|†óÎg8ÿkà<ßæü·:Oíxtá¶±$2~ Òüy M°ï¿9Ö.~"WL7—ÜU ixˆj†á„®éMãÈ@:é ¤3Î@:é ¤!¾\­v¼g{³¸ïNí+ÚуÖmKvÌŽyíÛ–±¶µà˦ÕKG›qË=p“œã`ÑWWPÝ{wÍ~·×°I¯4~vò (ˆht«£çz¡ü&‡¤¿(|"ñ†½ÂøaVÁ3²xj›leK¹º¿Ú6=íÆô:¦•æma dÛÖÄU!ºÝÁè·QÆvá÷î](…-[j«Ö*ýÓ'+ÜÆÄ~×¶^ΛOÏd»—H»×HµØ¸m ÁÊìXµ,û;JöÍŸNÒ§CWâX?CvBçÝ—ú‡B¾RþXGçô†gwá©¿‹_ÎÉÉ­:ƒ‹³ã–n‰kýé$(v>·4X·Ë­â5jž;Ç•ƒ‚Wj_ï/š]\ðaíòþžUN/nʧ'Wåý;¿®Óbó¾©èçÛ ,<Å-M¯ÔY®yT->”¿³J­ôPªåào;è²týõ¾´ŸKÿ+ KùÜ(Ü}e? —oÏ—Ã<~~¼8ƒ²œ}¾¾¨E±]"åÚÕU¥öùêðôø¦tp>(œ?”«ˆ•.®k­öÅþIë¼öõ¡rPÄåÇb¿Øò4ŒÂƒÈ ŒÎOñ½-s©¦Ieÿæ[©V€<ÜÜ—«ŸEqÿ+›ä3÷px»‡Û¿ü‡ûz{}qÚê+‚[áÁÉã)߇gý¦nŸ|SôäñœÔAŸ¯Ë×uv^»y<¯â›‹ýíÃÚq»T«*ðïó*ò.Ú_ñÅi•jWÍrM7óŸït»Õ9£Ç· ƒoáÁÇÎC™¯ ´|}镾 ^i¿ÞŒª9ZºÎMdZe÷ÅýQ¸‹ÿî×_…î+µóº¿yEº/ žÇ†IåÚ™TªñÈóѨR‚?ÞhÙ‚ât‡p]öœ# B·Uœ P‚:›xþ‡ãTëù|¡ZÝWc[§AMP°žiwƉëæÎ‹óÏ_ãÝ$à¢iÓ¶ÃëýtÈ]wØDz×´Ãß» áH¸Š@‰™að/޹ED I ß…Ô›ƒ¾ƒvP0gß´lþö¹ƒ…Cã6ðXLÞ!â§NˆUÓ- ®m»6£¦ Çâïyxu^´-±øÔµï{Ý–}Ñéºz”ÐÒÙˆyÉŒæ²þøO#`âj/\ËURx®ÂÄ7\áöצ$ x 2fxJІÂHá¿öµT4 ¹`a!âÄg!Õž²§™D?}àçµÎ…É+ë±o}:mäê3î7J¥3ëòç+¥£z­Ð8©ÖK…F®VËå?5N‹µOZî`AˆÂY­PÞŸ~Q­ä¿j£|±Q®—rÜÇÅr±v>óq±R*Õ¥Ê~á~׊•é×ÅRî Ð¨AJEûf*§ÕjÌ?šþü¸PÍ× O¦ŸçŽ>óÕ4Õ•ü§ê’Ds§+¾,WÊ3ÉUk•cûé‡zµñq?¿ìU5WË-+ä—âô›2ˆï¤øq$žÒ< O¤ª)–k…ã¹|a¡’fc*àtÈrœ½B¾~ ªiÔ ‹É/Èk¥R[‘›9eM—±^ý0¯†¦Y;*5pƒ,­¹zmY¥øš¯œ’åy<ÊÃï¥ñZ‰.¨É¥úa­˜Šu™žŽ‹K‹Bh™Tæeö¤F­j5_-®ø8_<>®ÏÔä2<ŸþÂ9,ç Îêr©×9¦by€r|±Íz‰pŠÕ™Ô SµÂ~ì_¬Hµz”;:nœæÊ *Y&’âlµ‡Uâ>˜iˆû…“"´h:ÅòºæS˜Ëfµ@·ìê\Wݸ4“Àô¶$X4<ŠÑ6 Ö“÷Ï@HìUª†¯<¸ŽÙd®‰îJÀ¦ÝÅ&‹„”/ZN2)ëß‹„Oâò~ÏÍÓ™Gp@S¨®(ÜÁšþ:Õi<} Õ_¶º—IFL'¼í6;ƒ'óÍ—-; ¼5–§!TydÅ$õ¹Æž‰°æ$àüŠCBûêEàµ$Éð£#[[±Í»œšáT:qäÃ^kzÑ@’ª›jÎÅñtD2‰v6ÎX<Ë ¡Cpé""#1 ÀŠÀ'Ä’š‡‘ÇØ\!’Þà{а¶?YZ?ÇÙ&T ipã"$¤Ž0æ„éÐÂOd1Z’,IšR|*ƒX.Kt=Z‘¤ÆBãyL™ÐðjS(˜ TSɱŽ"¦ãå!Kô˃€Å+S6RòlîtŠŠD ùF1åKnô’X.ÁÐK¨økk6Ю‡CúÌø†(æ4R ¦&œiFýií¦+,¦õ¥vÍpЃô' &ÄG!÷E”Ñ(’ ( 5 E>5¾¾‚“d—¶a_ø›©w.û44XFZª@1­G>ƒ~‰y†)0 §™‰ÖpºÈP Ì£ÚãLIø]chHèÓiýŽ¡Më7-ÿ*÷ï›Ñ`kª¿`@A¤‰™ÑTFx…R½„„â$7ix<ôOMììں𤜂3Â"h$„#Æ$tP–À®Rø:ðñ U䤤˺*¨~ß_ÆIeŠChîSè´˜OBÙmKûx¦3è&.@›é)­ª/ã¡Å‰,qèL qΠ…y:!EÀˆL€4/#Ëɘæò®ŸoTÁÂHC—Ʊµ_Ò“`+¶’ŒG/QíŸ1(»¶^ ƒïƒÙE {Ðéû‚`ééimÏx^ «Ô­dOÃ6Õ‡* Ý%8_Ø&E¨"Ÿ Îö¸hâ%D5Jõ;$5­ðùBDX†@@>LÂ¨Š„Qšx,‹ñ#æËTÙq1–2Š7±òŠØö¥ ‰fÜ„ÊøÚ®Ðæ!ð4÷Å´ªÁuÛ² ×›VöX«t­íÚÈÞÒ5ô ú °šÈúK .âž(‰â—Ðu’êFÎóFÊž/…AÜ ðŒ¡ÐOQ˜y”c™Ð#òe”–cyçä¯*A¬í%Zëçãµã”þ|Éa;çcwØ 4jçß%c@Üqr߸4ÀÚeHS—š¸F{(òBL}¤X¥ØðÏ\Io?oëˆÇÖ˜Gû ÛÍN²<µ1¼…¯ìBlxÞ áfŒÌŒì$HâÑž¡‚tíC»Põ]ÿJöâIщëý.)xFVþÝí7n»PŸ“ìp“¨Û4ÆKµ¡|ª'”f4ìŒü~›Ž§×Aõöì[[§fóï¥kŒFØìˆð],ûqÛ«Ç>4þÖ¨‚Leh¤o.­)­¦†„SæC;‘ø£S©Ï­‡o\Ùîd$Á¹×ã7ÍÛ;ÖH7Y4úºç9Í ¼ó—½›Z<’M‹@àkh±ý8‘¡]*ûj_‚ß*"cì#톂`Ô´çrl+o4RÊüõסâ¦qd¨˜¡âË¢"Xµ@‘ŠpÉœ^ƒ!âßN úLJª¹TÒSÂ.]ãù!&b¾>Ĥbþ%Ä´KÐýñ#Hóg_ªöK^•„EûÎ&´Üñðôâ‡äš‡5·<`›Ñ׸åü‡Q/Þ!/¢Þ±$2ê}J½Ï¿Bøí …½€Pí"ɤË|é»\Pâîy!ÞòõÚÃi7#£ÞŒzÿŸ½smj[Ióøû©Úï ¡j+3µZw‰ªÔY™Ø$@Bà åÒ¥…’í#Ù`˜ÍwßîVëf$lãx^$زÔÝzúòü}Õ ªTïªw¬ÂÂËÆæº,½±ñzC¯Û侮ÈÑI9:ï¡c/QŽúšŒ<›¢îÉÝàH—cS5±-8MŽÎÈQ£ GAŽ‚9 r´,¬u]^ÅK“£*’ëä(µôŽÖÊÑ9÷jz‘rTU=Ë”,R"$ÃUIñEG‘ QÂŽgX²mÉ™&Gg ä(ÈQ£ GAŽ‚9Za²´®ö¦ä¨!+5r´°ÈÑ 9*Ϲ&WÒUëÅÉQEÕ<ÓF®ˆ°/‹¤¤X¢é†h!W÷ˆ-Í™:X?k G_•]…£dA¾=*£%%[>uòÉ'ɪ֖§oÆÊœ$ ¢y±'ÉÊè™O’ýå'‹.JH› Bzæù·ùD[6û6u+›Ô)gSo­Ç§Þ’D˜ò›ë * jž8kPóuj^zjÞp-EWˆô¶±¯Š*&%ˆ(#$Z¶G„,Ù2žºàlÖ0@̓š5jÔ<¨yPó¯CÍËëŠÜ°šîÕ i³n“/f „ô„´,鯋Ò¦DÔ†lcÑPèú3ÕwD ˲ˆ‰¾1- 9–îOÒ³†B„4iÒ ¤AHƒ&ámŸœmÑÆŒÞ”ùWiƃÐîá <¶£Aˆ©[«y2 ùÒsq^q³ bšrɬ{ªKŠ{|$ý¸C£ÎŘ;z’Q$ ìHF,þ5¼‰{C'©»?µx‡ƒ1®fpÅ“¾‰6®«“)¾i2¸k÷pÈWû vD‹âcwôûÃŽ‡o‚’™7É÷ÍÏ®»Ÿy6ìG²tr¢Öíþûëçµâ”"U!âÖ’¸ãÏÆÎ /³AóØ2Ùpì_i›NÚ‚†Ýó„wÿúúaoç°ýûÁþûÍn?›÷£Q¸¹AÚMÒwƒq“ôËõÈÁiÍú® ö„¼¡â¤+¦„ŠG‰HþƤ!£‡Y'+"ü,ºÄ¹¹Ý¾°vp÷áëé·$¾vhŸŽoœÓoèüûGÿLù ‘k7Þ©F¾üëLþ6pö­áù÷£Ð ­+÷oÆAïcèÊ–äFíðà ­«k¥%·Ðáî—ááI#ÔÚ?Š>þ´ö†mò÷üê_¹¨½ëªÁmà(ç’…ìS)t•£®ó};ø||0nߟ©‡'­qëäà®ußôÐeëêËmkw›ÿÛµv¶³ûnwÓûv¢‡ïï>Þ'ïòýãÕùñupu µïÛWíÝKôéäZ;¿º¶w?\ŸR÷ìêCðéä[÷,:SÛûgJ{÷‹r¸sDÖ}êùÞ~HlÐFg§Ò-{çW>ܽ¾oìݵ®H Ž?Z»_Ô"ÛãOWÛ—ù}»—»ïËàêü4LY ½ýowßåö­÷= ÜèÛ½£|»;“¿R;Üž¸÷g÷_ÔöÒOÏ´O'_nÏ÷φg§·g’ÎN?F‡»GQûþ jß_Ÿv>Þ¸QØû® ˆ î½ý߇î}ç=¥}u©µî÷Æ­«ƒ{ò7ð·•ÖÕvaÓcõö`7»o[%6¥÷­DÞžœ5ç=µýÊä=ù¼ÛhS­½B6m|AÍå”Ľ:åtL®5åÿ˜\[¥üךëÔÞmë~…òÿjOnÌÿ“my…òÿ®]®Sòÿ:ÍÿË÷ïׄÿ¨sÕUAôÈçããO½£“ÎîÁÑûMµrò;d¡M{Ѓ,o‰@Ækï„~O RDx§˜Éä SÙd«IWÈS»i“¤{!ìPú¤B‚|ŠžaØŸˆ‡„úN°áÕï„Û`HÄ?‹<í1¬M‡:±ÑïÀ&â1¸îo°yôä.’†4Zì ÿà *ÈD禧ë§;þ£cmXÿ¬DEæôHhç' wœ ÿH1°Î?…dÄ Ó…oúTpḟ6¤ÆúߊK±…w‡ÿÚhMͧ ÓµQª¼ëùsV( w"l'#B!B4$ì²%|¶‰Ñi äÙ$;ƒ¹þ7A8þº³³w|¼•cZ¦I6‘‹qÔb•Ϳդ_Y×åUÜä™q¶sr)‘t¢¾‡ÃߊìL¸÷Y¯4Ú0´Ú©6¹~ùAm8½9èù±ML0 "AÚP—:J0çQ &Ò¦öé?Eˆ‚^¢ò耴jî³ÇïS•¨±Ý:êmËôO—dÚÝê{ô@tÏV‘/cU2Lù½æ{*R|˲e9†éš.aMÇØ´[ñ–ÞQ¿àêSÛ?ÏâygyfÎöHìü@Èü/HØ…i{“2­çϱxFƒü‰ˆ4vñ¹hè†U½Ø‰œNÚ£Ãz4I.EC;V‹X—Éeåv)û-ëŠ6ËÊw¢‰hYCGCØ@ÕGøuµ¸ÎâÍ®£<=Ùñu†m ™<Ñ‘I¦b•|2%Sô}Ù¶lÅ¡'Ôò³`›òA^,&/ldXŽnš¢¢Ó.a×D¢íÒåÛX÷=Å1TÚw^£úk]VVqÍÚâ=®Žêö•- ·Æã*æ¼»'X\.¸\p¹¿Èå²á1ZS;øá±Ž<\uà7üÌÄ„4„šþKžéà8¿Z#çWÊ£éù£Õ ürqð÷¬øƒ]øõ̬³æ‚’Y %ó\E\Qt„LC7_[ wuÍ´-Ù=ù¢êKšh"ß-ßÓ°­J¦£ÍúPÑ_úýD,â“M˜?Iñ“äºóµØ+›+¡Wm–¦2ç^ZŠj¼¼óµ<Í4ŠlѰSTËM[REIR°mj’âûS·v5 ˜¥9CM­Õž¥ÛRý9Ÿ™21§Ù¡OøäZ×^ <›ïöe¯õuâ§bæ=ˆþ˦6‡Î"ÑMÒJÉt2]ÖÞny¥MÜ•ç®èk)h&6DB¾¨º¦i¾¦ZNú¾Ÿš_°^’P7U¹â(”ÍûˆŠLh°Û;£$W…Jáu•ž+ßêÇñbe¹r¡Wi:H¹IÁëÐ ‰aßÎäI<êÑÅ¿›(s½ì9>³-ļ5ˆA5+ûÌ®vìv©¥Æ¦ÞÑ™í ÑK{ŸÏvÄ£~„Åöà îylVèÚv+ÝB­?è‡ýË;‹Ã0wüÔC3ã¹ýg¿ »ÄÎûÆ&šbRžÒ_ÿ,–ùI‚6/ôÃQÒ¥(`Ók‰&pYŠ"×]òr=öÄ»¢;ŒCúeœØ©~ØÄТ„C̵oÆiã„}¢1»L\/Bbß#O$5ÕaÅþÖéõƒÞ—=×!|†Í¢ w9ì§Áˆ™%qÅ„d2N眲à“bF:ÓSt»lZd?¹¹M_³ä .qéeyø fÑG¤Œ†ÁeÜK¿*^¯;ˆ±‰d·ÝÑèÂ,K(£Ò ¢þ ûõ:ˆ¡äù¡HÑGãKܮݻÄbäŠé|Ü$qR¥Î<Š‚´ÆG6û;pÃhz±y]NÌBކqœÛ:KòMÄ_Kµ¹1:¶w5J†™iÛ‹I!ʪTì‘Ö”?ÄìãÁ0­L®ÍëT^¶$§.~0¶œñŸ<¯ôW¹/©Þ}™²gDЈ²­÷åbO´l ‹.}adÊ–’®¡˜}Þî‹w_Ò\îKYa÷Umé2Ÿ·ZÉÅy·c7-_Ú€bs½©íÌÉ:ªORmÙ°DÏu%Qõ St|ß‘âØ–o(J½X¦wë"à"ˆÃ|AÚÚü>¡U½û>É&÷Ž-º |žek•õd¥–wòU`n”zÿê žµ“.&‚3rp,ô}!»=lw8²éÜMœÀƒó6˜ÆéåµmÄÈXûÏ¿ÿ½F ù³%ÿhÊ/qL>­Ó¯¼„³_Ñ>@ÅÓL•qhàŤ‡F'p–Sÿ\‰w‰XZ ÁipK3øbÒ^2x9õÏ•øt [žìÙRK»féz7/€+ ¾,[/&Ù%[/ÇÌé²ì“›­*üåVþ¹T?¯‘ÙF5ÅzïÉõÕOp\³ú¡òÒrf½§Çý¤ˆóeåÌ|Y@Í"k}KC[ªù?m¥ |o€Êªj‡¸r­AÖë½tY_¬mÞ¬FÈT}Ã4AI ê¤êeÅTAÕ¿4UßXmõŠ-鎬"QAX¥Û¬H¢…E´1Ò Uu}eQ_ ºNΟ“;„Ê‹jþKo8k²èž{ÕP_Ò™—©ØCÓÀŠ­‘Ãtçe†L¬£x“WŠY§,ë7N»è;t^ßW†"Øql³Î3Rˆ£êO}‡Î|b1TCKb—…ľLˆŽ>y„þ.øq?n»Û- i.6X/‰Ø˜î M;«=ÒVÏ6‘-s„üƒeË_£ Nwƒ(Þá‚uázlŸj;ü\~S6s‹=ÊWyvý~¸ûÑêÞñ8I ¿—í—©¶éÖ›)äÜz³…KSÌ/?÷ A ??-Á³sªké̉lûœ-A¯¤d@gS6T–yCÂÜRåš3QòƒD5•ÁyÅë[-ý¤DÅAŸnJT—–O‘ü†àž©R?E/Ǥr¬šOµa(ÔrËü”çË-ÓOÄÏ~Ç=fÇ?Ù0k‡~Yg#¬„؇ûüëüK‰l.J)©†T{óiÕ¶Ãn¾Þº\Ì2-kŽmòÓ0o?&å»R’ˆ“ÎFØŠ²STúÇ[…z3äÕ˜›+ ŸŸcöˆ¼7[ž2£Òy¹Z=‚òkX):_¥Ð‰›ªè;’,ª öEË5(Y„#4dù¦ãÖô”wñ«f%‚¯Šb ÉÄÞ<â0Ëìyô|âöY¹ÿóâÇsåOÍDÙÛ´}]A¾‰‰GTudˆ¶k(¢¤Šb©’"^=Ñ’ @ûü@+-h'²ÿQŒ¥h”1v)uøy(/«íy>°™åEêO©¹ ÆõŸLB•Ù‹ÖòÑž\Þ(n±<*:ttÞÖuò6ˆóåo¹’Êûg Y {LâX^¯€Xr.,ô~q=¸åzRëíÊ7¤Ú­©Í˜^‘Fà LXìöñBØ!¸M©{Ø¡ãá(¦H0¥qZm CUø±lõØRWc³ŠŸž”säGßò•6S¤”UɦlúØq]i¢jÊ’h#òŸiºDîÉ:v¬Þ‘Àó2çqΙ¥H4׉ubÕ´t#]ÇÑXsóu)Ÿ÷Ú»íý— 8¿´Å©;кñ冞t¹¹K4ï2](ÅÍÖ =¼Ís•Ùº› ÅÙ£a¿3ŒƒËKvnL¶9C‡xÔ놪´5}iWØ(¥‰»pÏ›¸â÷c·¼óÅtv´$鿨QEëHñ“æ( T³!«F³–x¥šmÉ“þLúp9‡¦\arØÞ? ä-+µì5<ì´ IÛôH)Y{>a2‡"yäñZ¡"¯KŠò¶„ 2êV'2K¨ T„Š:çãD¨X T@¨ü¡ÂZØÛÝÛ©R¤Ê‹‘*ª4MªLwÐsŽ­É’©ê–Ú<¶Fâ•ÑjL&\¢Dª+, $H$H ‘@"DZ%‰$ÓO*\u©Ršiõ[Ú’ÑÖãý¬ÚE¯;?®0 h—hYä^ vù‰š5Ó¤ÈÿG=Ú:ß…üíEœÆˆÆKŠÙJlÕ”ž%ïí”%5˜eÙÛ55¥gy;0M³È7UšbŒçß'iF[,aë£rJ¨ÒË0ÂT=ÃÑ5x\S?0m˜•Hb¬Ó/4Fa ¨/ BìÅaHQBJˆ1åœ}wýóPK°¦Ú p°ÛD¢m{À¦sŒ‘ck%ι—ι½ÝkÖNðä´!‚P(ýÐæMpbFÌÿpµ œ"âmÓFuÛøŠ­æÇ¦±¶n5GõûYûF–÷ó½›-ÙðmlÏW:X«¬@Ö<@ÔÃÂÆ²)Gs÷Þoõºo;¶ÌpƒfQ6Ž•qù±Æ†žÒ1FL£P á²pæ¦éüq_ûJ“@> 0•^Le@™0óËhÀ„Û1ª7‹•[J¿äÙ§Ýœ`ƒ:Öˆh® Å ¬¡x!Ç4 1·X›Ç<0î§¢„ JäÙVCÞWæ…PJ3BN™Ý¿Â€j€ BcÅBèÓ•ÀÿjÜŽm%_S Ü`ÒçµÆðåƒe‚Nøõ8›ük1qS‚ldží/ÚM“Aú1/V“+5TSnÇ í4~â“üçx:èF<)÷ã†èÐ̧ÛvQ7F¢t¢DêzºúMGýO’ñ'å¸Ö›ÎÕþ—/‹”ßµù¾È{¿¿Ø!X¿=€Ý#\JclR•õw·€†~†È8`¤fŸÆÓÙ¬ä*Ô\à¼AÛ!2°ÛnÔºI<½w=Ð=»hyrzp£äò=pÜ>j ¹ˆŠF4o¡°å«f-¶É'ƒË–¦Ý³klŸÚ¯–„EÉm¹qÛ7_/3÷V"ÙVÑî„ö~}ÈXûòèUË ¦ zз½·O.Ûo\~âtÜ·³ŸKf>í÷-~Í É`öÙ%`Ûzv”.×ܵÉéàZ•"iÊ?ªr9ß)7 ^œ¿—¯[ ŸìfঠuψŠûg¹ÞLM‡fµ¬&¬§Ö¨ØÁõ§cí–w¬¥Ò|žÌJX¢.zFòxú1*w]¼aëþòC×ÃÅ#6Þ~­V˜˜¥8-Ÿ±‹}œ³pÕH* ò½ÎVþ7*6AËбøè®4ORuk§5'oÆûYÖè—µ[wáÙqÆýÊðÐÃpP.il€ò*Pï ”‘ÿ䀲bF) A¨C0õCS*-ÈÅ,¦ŠÅ!Ú”ë¶Ñå(7@¹Ê Pn€òÏ”FøK(ÚíEVá/¶ÁÈï @YKø» É=á/BOý2­™K báó ¹râ{FŠÔ…@Ÿ“mè·nÛÐï?÷ÄŸüûâ²÷ ÐG†ñ£Úç2 άۓñìÕx>’;ˆ±´ªÓŒÓAÈ4ÍàÞ~7Ï+ß«¥9ÄxžÈ½Ñx¶«=m?Üߤ.YøÐÑ‚ìæ‹0 œyÉÐk 57’,Å1¢q@ìn~°öeJKf³›ù´#Wfeð0P#"ÄÜ7¸*_¢ñÞªk¶ñ¨µÜíæ×Y‚5wóéA<,JÛE²¦Î (^§sJó­(í)îækæ1 Ì`CÀm> ×*!Ä6mT·&H¹Sµ&HY§¥{)}?„’61Ê&Fù51JÜ ðö%ùN1Jw¤”¨E£&HYké?P²^ßO+H Ãf7¿v8“„Ôôá̺Î9Z›j_ÒØåU Ì~þp¦ÒóFbB0ñàaàσ> cnÍÁ¯ÛFÎ|XØ|ÿpf-ÍQ;œ‰àÿàç|ÃIqkGCÓä_‹ŸîpÀÅÒ„‡¡·îeKj΃ۙ¦Ä¬9.ôÉ·}ý¬UK®ÿ›YM¨zfraVС˜%öøu¨nøp’(»¨œSo«,üsã”ÇIæÐ¸;s»‚ÈøiiÛ•õ\?óIYc¨†ã©=J‰„„-FÃØ´ã„تÐy•n¬¶¨` ¢þÒ㨸Wx®´ZP}®t›îãÎy[®’—ãE¹ë·(‡‡åxŠÃ§'Ð3‚bÏ(1¬Œ×SDÖgܱô²ˆ‡[©Q.‘ºÉÜ™‹0ç|KâWÖ˜Ÿß)g"sìóÒŠŸ—T#eÕåàI^l<­¿Ì¢¸GÐ&¯xË_ÈËËÃÀj'Ëlq؈ønDœCÂâRà‡v.…€ _ƒX…r%ý˜àñå°áO$á5£Æ}LÍ·ï(ÙÙ‰u…ýu{F *~8È{l®°Á¾÷xOpÇÈ‹¦߸—#iÃÓ”£°ìsëŽQÍ6š£»è{By°n òÂÈúdŒw>×ê¥i?\/=FçÓ ç³q>çó1 óÆùlœÏŸ\Äçó‘9Ÿï|8Ñ ?¼îÚhî8CCû!›Õ´îŒ’ ?Üp>¶Pî}&2ÎÇ“ æ’ˆ©=€¥íK—I„\z”þ¶`nÝ6š`îÆõ¹1’kof¦9Œ¸ÓÂ.íÕ0i$çb6žºô]c wT’ÀÅýìãÊ™® $ƒÄ$0ˆqH µ'ÁRã˜y1ôç ¶CètÄ“åÄÿŠEY1[>çâ{•”ÚvH§ÂËñ§Qá9S¸Â€Ô&±Îu›å*éih4}*pín\«‘tUí·_Ú‚Ùx2NÆýÏ®!ëî–)•6÷qV0OŒ§ª¸3»2|–îÊ}¥Œê+0 ;",Mã,¹È x>d+~ÈÝ߉H†óDþ×þNâ©ky8›NK^C¾ædaž3#âò¯y:+X#$ƒQ–¶[px”Õ¾é«Y|í&@ªL¯c÷C§ý4æl㇎k ¿ÒQ2ÌdA•cå æ4MŒ,…9K¯ÓYyWLi¢ú\|ÎåÃu,òùøŸšæìÉÄINê»éžJCÎ$£–m¥tZŽ/“¢x˜wïþŒ'b4˪N®ëϘül¸ù_qã~³´‘åÈ.Gÿбs2¸®8È~‰äS>˜Teêx*§|”ÑuƒÑ\¹ÑM´]}F¸’Œ'™Àe𠀡&[ â >ÉéduGS#DÅ’šJ£MóJŽßj:™e‹Ið|M•B8‰¼53õá‹‹ Üïå‰-æksåG™/´Þ|ÕöÔ"5æëј¯eMWØ„Róëû¶â]¨¬Bé®]‚˦¡ÐÁ…Ý*TP® µPêÏ\-ôÙbÝçš-W<ÌE©º ¥¹d sµ´¢aj °ª¥U.¬ïB‡.‘LIç¶3W_eg·ì_ÅjäÚ»Ð|¥žÍ¬I©ý—pC®ZK“µbn—`EÕúWlmf‚š7W¥ó´ n QÕ¥¤3ª¡Ü´ULO–-WÅà•(gÉlæˆjatnÙãÒ².+îe-?ZB?¹Î_˜¤QåöeÉÒæ(g“UñÕ’¥¹esà—ÚÜ®–H'Ç*OM÷¤×9Õ>ꬤå–:(ß.‡×9º<7S]v^u³+3ÖÓÓÞ£¹5YU//~½=5­í³wv¡ÈÛ(íËÞ&¡ø÷ÑéÞæ1ž™ëíZ޽Y#ÉÇ—ozÝœ­›æé¼»‘/‚›¸r›g+u7S/Ž.ºwT>ꞟ_.Iò‰)¯^·Ž:o:çmÓæÅf®÷ÞPä³Íœt¼ßí²ÞÀœîÅ=3¨^çetÔ9ïÝÑëÅYûì5^‡áŸ3ˆq ™–fqûžˆ¥ôwÀ׬·4*Xbü0µ´»«`,â,Æ;APÅ Ϭ)Æ(öUu0S§„ö+Áu`J‹¡gD„qãôPŽmø™è0À!¬ÖΧØ}ÖÂ,žŒûÙ@ÔHNƃÑlå;}GÜþB}‰˜žPs?¤J#A=Bµ¹rOÚ$VÍÅ­ŒÖ©ê[ “µ”]œfá¨ùÔEr‹Ešõ ò‰E‡‹Åš^‹ó˜·hv¹ÍìUü DiÜ? %Taâq¦ÿˆ¸O•:Àø™®ø¶j›„|(‡íqdô5£Z`e†Ï¸ÐÈ %dÈX˜ñ¢ØØÈ>•T™øœŽ/æºH9ÍzÃÒxæ8VöLFš$ÃÆ«4bÊ)ZÓp73í’(6Ì/%Ƶéµ&yyôŒ"öt Cã8äTÁ@ˆ{Ôž!Bà.¦ø 5f7@òÿÙ»²æ¶qeý~~¯_rNUhc#¸*·®"+Ž2–ìX’·ª)‚±l->Zì8÷žÿ~$%QÖby¢dœ=ÌÄ"A,Ýî¯Këˆ3˶ Q,h¬5˜SC3,]Zs7·yfø+¹kGÃ~¯›c0!E"@QFãX¡ HŠ9µ<Ý—¾§Í.Ã\òõØ;×}Y¬b£t¨™ÑH Î@/±ÀR«$ápÖùMÌÞPpP‘‘‘˜iFM ˜V– °?±%§yþŽ“cåù›‹­x¸“Ó, Db"f •Ç¡UË,k§7A¡¤Éõn»oþcs³û¬,<§ŒÄ5Œ¨S‚ Š‚@InBŽ7$ÈéH—©*¿ïãTX¤2Æ‚SPZŒ“HÄî227S%ÂÏ(ƒ^ê0ªíÏh„”J«äe†œÒGAÈLÈ fX A i@F`²]0ßMËiüs¹êk‰Â‚!ð0Š ¨4ýR[‰`+ D¼ ±Aw nk̬ ¡ƒ!ç`v‘Æ(}.P( VÉs{fÀóTXÅn­úܹœÕÔ%¸f!ئd¤cΤW ¬Ü©Æ­~¥ò ŸDŒUˆƒÁ„)¦ciµ!Ëby ÄÜŒÈN†±ÌQ¼Ž•×ÄÍ/Íš&l¤-7.s¤ˆ¬Ë~)ó¬WÕï¨.¹~žÙ ¬âµiuÁK¸§9^ƒÞÐt‘ÅÈm·Q8–B&šPÅ›àuÚêZ®õZÌž…E Ü ðŒ¡ §¨ CÌ*0‹mµfgãX®œ8Œ`I@ëùãìIÖÊffãÿqAð]­ÙÈ¿ïµG;ØÏþ…î ±v‚ébF;syyr‘§iÇ]”)ùb1Œ”oÉ&R/þº0’£ùì=]¶0r!Œ/ÍÙHÁ»°¤‘È êK+bŸøKqÄ}èPRM#Ëå³wa­YÇFnaä„‘œ‡¢2pIÞ”Q€º¸ÛJby(uFX mLë0Ò&„D–aÅ(ÛÂÏ×?Å~¾ø9ÞùçCÐ;õÐýu(Er1Í@ÖƒkÔüîÕ\?=˜lÝA˵‘i×½÷Þ½ûïÉã1Y<CñÖ]bì¹ ç{ÂÐÛ-éÉß 3º(¢êèl¯U\…z)þ#ª€±õmh¨Ð òµ;aÄq»’Ÿ½VqÝ:¶Px …·Px …·Px …WAáõ—Õÿ’ ™‘·zýw4ý@¨R¾ª:ºÐ-T]U_š:öW„ªîX‰A"JŸæPÄÜ·T!‰ŸƒªëÖ±…ª[¨º…ª[¨º…ª[¨º…ªË¡*}+ñ_+êK£ªhQŠÔ)]¶Põ)T¥¨Š8ŽQh}a\¢,¬/©uw0 èsPuÝ:¶Pu U·Pu U·Pu U·Pu9T Þ‚Öú[CU¹p€£‹ÜBÕEPõ¥Yay(~9¨ª–Šî³À 0‡Ìä A1åšk„´žƒªëÖ±…ªa¨š^c²Åª[¬º¬ÊØ–ÄSÄä³O¬[Çso1÷so1÷so1÷s¯ÄÜP_¡^?ÝwºÍ_´k†m‡í®ýª:wmëÚ΂/[Ž/0&óxüÀO{Žå¢¯®AÜû÷­A¯ßtMOò†¼¸y`T4Nšàêèû·7òkç¶µ°|Jñ¦Ëòu–Á3´xj¸œ°e˜û¾3FÜ:ÕƒU†ëiå·¶ßµí¬« ¤:N0W•èõ†ÍÈÞ·rD߃ß{÷‘ZT>1{™!{æÊ•Ÿîr9Z7§Æ½q²³A?Œ>Ù‡þ †Ðv¿™1|£˜ ]Ç6 å`W«ýÝK>hÏù$ªyo~k¼/«ʇïö®{»÷m4jïí‚Ú½|Ýê‚ u?nGÚ¦zÀëÏïzµåõ×(—mÖŽ>üÛµærö‘¯}–Ï\÷¼òãûÆùÙ{h¯ÚVç_ïõùººø_Ò÷žÝGçü.ÿvIÎîô¡^]œ¶M[Þ˜ga¹û©mˆÄ¦Sm—oP«róéºRoêycX!Ÿn¯jU?Ü—¯nn‡Õ›ÊÃÕM#¨ÜÐeýê¦Üzhiúéî K¤ÎqÛÐÓk}QhÔÊ_«ß.Ùq½òµrsI*ß*¸ÜE_*7Ÿ*…ì¿Ò¨R,ŒË=×ÓrÅÎü8ìã§Ç« Ëŧ›«ZY–oÊ—õ®ÞœµêÕÖÕacX=8½¾*âëJç28ª_~«^âãzù¡zX"—åA¹#ÕyG‡m A]žã‡dÌuCŽn¿UêeãûV­}’åƒÏlÚÏÂ×£›Â—I¹ƒÛ )÷ùîæê¼=з£Ã³Ç R}ˆ.-Ó9û¦éÙã%i8:}·g‡fojσK7ƒÚëh°¬‘o”¯Gݨm:ìõÚ8ž×^jC“˜æ›:­òiÆ?$Ñžºk¹¼Ÿ—íί×õq©ÅÀA#»‚îb"W⊕ñÝÁàúw¯è\S$à—7 úxÃÞ“vö yã©÷ÆáŠ7ÞCk`!Ëäžöƒ£Ù~Ü)­ÛÞn²—Äe:ƒ>¤ÍÚÈûgæ‘zdPocõ’^ícSîÊ-l„qþ|#.N µe16ӞϿ¼Á(qAãQû¿Ö«1çièˆõ?3t̵Ö~ô²ÈÀÂfEÈ^† SáÚ Õ$J}2JpÏ›«#ðI¼ÞhžÌ¾w¢€èNÀ'а³Õ…çÿð¼Z£X,Õjû1v2 l‚õm§7´^"›»ÿXØI^ÿ¾žäZ݃¾öF}phÆéð{¡ HúšÀø™eð—ÀÂc¢¤¢ÚåÂ܃·†í"¶ðâ” ¥þôU‡…AuWxB&ïùSøª…‡¶¿·Ó‹Zq+ɸ ¾à}<¹,pÑV”fq•úî}¿çR(¾éö|3nhé:Æ-±¦\­—N?Š¥…Lš­©„³xæ¤{¥bãXÓl”>”Ó_Ð×ããúŠÞÌ1+?ÆFíý'ËûxR„ßKëu;Z É•ÆQ½œ‘uŸNËK‡BšhUæiöD¢VµV¬•W|\,Ÿž6f$¹ Ïó¿ €wŽJ§¨³¶œj§õ#©\^ Z"¿¹i½„8åÚÌêЩzé ñ6V´Z;)œœ6ÏŽ Õ‚C–‘¤<;ÀEóa¹g&âAé¬ ó¦Îa¹úÜô)Íu³V¢;. :§ª›.q_e±S"K÷„¢W(ñlz\ð(À»ëÚµ•ï)Q{C¢IZ½…ÛRÜÈ_@|j"'ïG¡»y¬¦j0Ò.Ù¶?œ 9 6ƒRŸ?l)¹D\Ä@zùLJî«È1CXpN¢à& Ñðe bbj°´Æ mJ© 0#&ï„P(â•qŒƒRÆ4ˆ0à a+P´iè…Ÿƒ^XŒ#)÷*Y¶vži/JAÕ8|(·””HS›çvŒs{5Æë„n³ÂÚ›%þÐN < ›°Ÿ%x÷;ÖåöN–a³€Ú¸kõ“µ£lñ'YëE-·÷#í}ý¶5ŒO¯NKÇèÅÕïï’±Ï|=³Â*R­°&ÛZƒÁhÅjìLÙ¬ÇßA×uö¬|']ÓÖÆ9ísKjà‡Ùl8íŒEÚ¬¤6à`d5ÁA@`NY®±¦6ß™~¢„Ò…üìë€ !¥FDD*pz„bahxó€q”ÿ:cq² “Cµ{_ÒŽØnt×sIìg®¿$ƒÛ™Š#°¤: Æ*¦(6ÆFPÄð+) ³¯ƒ‡“®Hîjï$öñKn©8ùqÜM*õÛùÝi«~ÆH\ÇÓX"‘dZíl y– €òc1ŠU˜…à3Åà?bEC#¢8`ln©®øž!<«m–ä÷I·‰Â!5RÄ\¾IebŒa&â ÒSZŒ·²¤;rŒÏhÐe ¯Ç»)ÒÖXdƒ€iY‚4E’é˜*M ¾N'ûL–ðW„!K¶¸¬ÅäÙÞË00šÄq«™æJX˜+"8Î!Ú‹_°Ig î8Òg–+l¢XÐXk0§†fåyîf[5òüM†¿’»v4ìCûSÂQ$De4ŽÊ€$¡˜SÀцœ6»tsÉ×cï\÷id±ŠÒ¡fF#á>Ž ,µJb±gßÄì ‰™fÔ‚ie™û[qšçïx3[ž¿ÙøW±xðЊ‡;9}Á¢@„±!&bÖP)qZ°ÌR°vzJš\gà=ðæ?6×1»ÏÊ“qJÁ‹™Û u*PP¡QQ(ÉMÈñ†9é2Uâ÷ýcœ ‹ÔBÆXp J‹@±ƒëfªD˜ãeÐK·ô6£R*­’—IrJK!3!CB0˜a%¤ X Pv3´œÆ?—«~±–(,£Ø€JØÙ/(°•ˆ¶RÀ€@Ä›ûp×à¶ÆÌÊ:rfiw_8ã…’`˜<·gÕ–]ú2N[OË® Ò1á?±YÖ ,ýó䳜ò`–ÝSèÈ^À$ :éºÖæ o±Ýp?êàBÕu43퓆¥ð©  å²›l…ë‡äÇüûé—Ôóþ æ V¨Ê¿»I³òõÆéKl.ŠeÔûÍ|É7´Ï yA¢¢¤“¹ý¬–OܹÅ;lq.S©Ù:ñÉâ!±f6ýÆ&‡|†+OÒ»'0öÃL{¦*”%Ih‹!A¶*R覥:„ME¤îèTéÖÕ7o˜5É$øàqþ$è õ¦Ýh&^—×YTž™‹žM­'Îd"H܆ÛñƲ5ÆYab9I÷Ói¾™É!sǰ,kòDª˜öɺÙ°¹¦PI¢!•ün,¥ [0ÀmCYÇS4;Wÿá#ª Ó.š¥gm¶Þ~–þU‚GgÂëž0§Ú €u¬”3±Ù—“4¢fÙ³4¸K¼äúDQ,äʺITY'NvU ~ùšE,G…géÌojøb~k Ï–þzÆkµ:â‹"^*šÒÖ‰å[Ä–-ßG:®.cMµdâ¸ÈB–aiÆûÛ¾Ü.pû°#[š©Éº‡±ì(–"Ûˆ›N\ݲ”'Å\2 ÓE¯¦»\î2ÚÇFçëÆû-U‹WŠ÷[®ì%âý–šãœðÌC·Ì«ß"÷üôc°d…ŸÕmKµÖªŸ¿Ä2—” RÀ¹¥Ú çÏ\’鬸ÿšö÷_Ó,Åö5#À@/lÏÁœ{²ã붉 â=2Ëæ± ó*{A,Å^^‰^ŽÚ®Õ!!9×Þ*÷tø{:èÎÓ{:8ëzØÇFð¥ÕöG`oü¬ƒ>ßÁ2„ïôCÝFÎ:Nùü4iXJärÙÔi¡çñHCYõ¬9íýí)F ÃCHWeJÙ •ƒmÙ¦–)ÐäªGLü\6’G–<òUy¤ª±ÕÈ>¶›Í°j„zH¥YºgP“:Hñ<cj(ªA5ÓÔ,êX%ÿ\;þi(%ÿ\þù³›û±­•Ö™{jŠþ̃,&ì;=Ê"½=}’zü$ m›úfž¶¼$Ö´¢øö‰\J<Ï€Ñʧ-¿¿™TùÔE†-k²®Y,´]Å2U @,Ž¢ùO1àeó(pÉ€K\2॰Z2à_–ÿâÇ-3Nf,øê¿,cN©ñWžœ—òeí ¾¬o+–ó+óe΃\l¥äËE|Yûø2õùBdS6tÝ’ußqd¬zD&„êÖ4‹hOÏ/™GÉ—K¾¼!|™m9£ü×o%m.isI›KÚü:´ÙÚÖ€ƒü²”•žíP5‘KIYç)몇¿GÊ ¨îX.B²fÂHÔ G•]×ud„°é©ž¦(Äzв.›GIYKʺ!”µäª%W-¹jÉU_‡«:Ûºý /ÈU+**䪹\J®:ÏUí¹ªi9:®êò õË2Ay4‹!!‘5ìEEXÓ-òW]6’«n2W]‡S~K²º9dÕz›S~µ)êòçüzx‡:;Ž·6§ü–ûeOù5¬W>å÷Íy})Òí,XÓ°ôJä|_[‘¢ÌÌBdUyle…½£¨Û ú…§©ÕŠQ@ý…\ô’úQÿU÷txÔŸP8™çʆçbY7,C~ ÃR49®«)ÚSÔÙ‚a¾ :¢ìâvàÒÔH]O’;Rn·¤8¹‘À²°“oé ‘áo vC,+<–=€>ï¦+mUÇŸÏ//>Cyõ_ކîå…Ò¸úæ_kŸU¸7$—\W¿F=÷Ðé7®NB/tÚÞ× «ÚùzÈQ½¨VÛJp¼r[G×Zc¿Õ¯£FT ¥~XUŽ.îkg^¿±µ¶7®ßŸk5øW îWûÖk¨Ž‚/ÕÐÓNnÜ«ÝàÓê¨~­ŸÕFµvkT߇´¥Uk¿«íÚÞn–îîø,M·=l7® -WßÚÓªSm·”Æ>‰êè»~tF¢F»Ú¯ïŸõ=õ¦v ]~7®ÛU êªÖïkj}\Mª‘3Æ—Ä'‡!È ®\_ªw¬ÍÐ.t¼ í«êµ³ïö›SÝÿ®Oê¹;:jï¶&évG<Ý]¯Ý¸ ©!9¼_¡ú¹J/º¸wµ‹ñ5:grÐë‡ßµF›Üï)Z#º}W®Ûßû× ›úX½=¾¬‚<«ZýÌ»‡ÁÑÞ·¡…+í¤2¸'‡_úÞkóVo· hßøxÿ@aiýÓ]hãîD¦§ú]u?OwWOÓ­Eߟ]/êûQmß[£¾?Oõý¼L¡®ë#S¨³²XOYk£§#¸·¸ÿϮשÿGÆÔèølú¿}€÷u¼Fý?®O©ùþoŸ§ýßúôiKú?‰«©K2ß§§Gͽƒ“³æ~õäÓGÚ÷>N =øt}Ônä²Ùò;èríw»¡žç”bh’ÏjÎaê$ËùÓGùˆ{;ƒôø2Ýú u;£"ì˜3ðÐPÅÖ**råÎð&ÉÍŸÒóM‘€+i2í#õ»såì ôA‰ôñŠÒ]в N•O§ ëaÍÍ4÷0Çà¶[áëIØ©kP‡´XJ¤¿ —TB ½é,«Ä'õN¿6Šó÷ÂB Íxº6S ¹‰Y6éo©×®ÏߥdÀ}Pþ÷‚üŸ^žÎ…ùP†LXÿ3#ǩұ$¦ ŠEÛºn¯Æ SåªL”*Ÿ§þ#SJðÏ›ÅÉœ©;èƒ+³#ýAèLÀ)"º3èÀýß$éô|oïàôt'Wc¦ÓÐMа˜FÝ>•¸nV~+¨¿¶­¼ƒT!ÒåÒšI®fϲik{úÆtJe®Ø˜õ Ë¡¢Ì¾"îë“û¼Üì¾RÉë“5haKA x²‹À†éT‡_¶j˾°ƒ5—5,õ]ÔJÙ/ÓX±×´mY3}GÖ=[‘±§ù²KM¢`J4×ÒÙÄzTímÓ\ÿMË^‹>î3qXëñqñW]1 ®ÄßKü-ñwÃûâø«éÛšúKú¿H-À߉8Jü-À_mÅýBKü-ñ·Äß7¼/ž¿º³íhë¿Êý5ü_T€¿q”ø[€¿+Ÿn ¥à€K~#æ+IÙHmfEéÈ „N­È ^p…šaÁZCñ$ï˜t•¹¸;µØ\Ü™^–ž¿:»’_ÜîÅÝ6Œ‘"Ä‹Ö'Šû™”—_]Òœµ 9?Iã d[Žn˜ú¦)‚Y¥ìÝðÀ°n2¼K›Iyuz-:ÕX‘Byñèh´:–]j¤Ó½ëÅÔ§Ày²1+.̺„ù³,«¨;äOoƒžªÄe¨D§œŽ•—x7¸Ó¢räÉiÔk’¸)çDA:â#Ìÿö¼0„äß<>ÊyÎQ?ŽsYgUF¢Y:ÂhbÒ$ýL4 :)ÕÌ$ÜIßµhßò 4UÆ¡ËøI+aK¸³Ì+\j!¾ñ›a”êÍëâå=(ÚÔ]2Óæ¤"q?êÅvH[Ø ýà{¢?îi,Ä“ªéQµÅ»;&М^ª`–ÙKIœ×/Õ"7Åó?Ýž×駯ö^ôä§Õ½÷€a(ø ËM6xxû#.Î^'à%Ü`9ýå…w¢2 MÍqLbÜIÛ5Ry£1åµëùlôr…©LR…H"Z“ŽïFöp/4 Òw;1(Q6¤bÖT¼ÄåMã^?Lc*WÂ^s"[è©?ÿâŽçjÓ?®ùVð¥׈e¡‘6¾”Ó¬yþ•qÁÙ&ð9ÃÞ2™³€¯ÅÓHæû ÷KJò­$?/|­c{É?9Î~J§Wf›HímƒÙX=L땃٠US_/˜­(ÿŸÌÅŠ½÷¡ù 6:0†Ã |¥ÕÃkä _ë>9t”ëË»\«nç$ôZÐè$ä¯Î}ã²>t£“û+ídH¿$tü­çvX0°!‹ŒZ ³@å ž=jÜÕö»Æñ~kÌs/·né"Èçê³JÏûµ=£MGwîá—AãÔ) ‚=…G,Í) О M»‡ç–†·ãÒ¹år‹Â[¸¿L@ð}í~W­ÝŸ§Áó›´ù³ßÝò½àÕ¾‡.Ú.2n=—ËÚó5 ð¥ÁòˆÀåÑñkϵí³þ«íïšÇg-½0ù7FCÉòQïÈÕIxt¶;¸ÖNè'Ïù qu}ð9þƒ4 kGŸé “¾<ûËC¯íŸß×OYyM›Û0ÂàϾ¿}¬ïßÎîW7EÑ| ýlSôÑ»ŸÛBß}<Þ?ŸÛHà`SôѨgô‘m °!úxpw|:×¶ûiÛxÎŽÀ³´m´±Å„G¾¹/`èKì9ñ\_ÀD¯¸±EQþ?Ã`›“¬è ¬ÓƼþïÈ‹{_æì ¬>}¬fû ¾ öX=z«G¯ƒÕls£ë¾ öxv𞼞±£‚¾ {¶úXàËlŠ>ø2›¢¾Ì†èc/³)úXàËlŠ>ù2Ó¶_&mÛ&ù29|c_êñúß5Ø&zú+ú2ùÿ _m«ú{öeÐ6Ú´M‚Z]&bÇýÙRØòvT9Û/o_ÇàHcÅÍù•±‘ï-6rñ°)\kžGÕ˜†¯yž"›Ha«Õˆ+»†¥ÁØ2°J=JNWlˆåxEˆ5j0øóc(¶Ny::³é¨ïC7yc~òJà‹.Ûš9EB¬ˆk²+°®ÝAº(ivƒþ­³ &²C©3ˆ\(«ëKbÅŸ”Å`ð*|ÕU'˜>Ää±È¥­ÿüë_[L‡àÏŽÿÐ-ïmv)”š?Uþñt¢š1eKÖ(3…ËÖwRÓ™2SïR)Ëðµ*œ£-ÍÖY¶¶5iòލ-[¶Ó£—­.?#or|Ìüq-?0"–Uðé“j¸Ô~¼ì*8?¥†Ë@0–‚3[ÌC£þEÙI(ÄÉC3‡´Ф™{…˙жf?½–ä]‘qNJ@“ Ëc4B-Úãh"’F¼°½¤ïF,3€%¦©¸%šl@keúXÆØÓdj#2m[ó§ ÅÂRŠXàPfkf©…”Ùœ­)Y,ÛªD‘/}J5W¥{ü¥§8Ÿœ‰Îæø{p‹ðåìü’ÆA—ðŸEô-ˆ¨ÄA<t¤„}$#‰ÄBjÑ~_øËýDâI¸ÕŠi+/> äHiJÊaÒãÇv$ÍT¶x8 Àf–=Z‰ÿgïÜzÜÆ‘ü`þC£ƒ}1R"%±Á Hzfl.g’,öÌ 0(‘r{G¾¬dw:3È?EêbÙ–m¹Ûí¶=ÜÁ"n](±HV}U,R¡š~Ujt1ý:¾¨à‚[—ªé,ÕQãt¦==lL8-½Æç~¡æz°Wdœ!×ÛXç3UZÐç¬joW+n/üì÷ï®?þãý'}¢ Ìíã<0±„ðaœ+~ÜîKöœD! )cHñˆ"JX€8è)ß!Êç\9þš™[r=Q¯e³³Ò¦G´ ª¢&äô˜C1Ý8ƪ=V>\¿{ýæÝÏgá±lT+ÁC7(îÕÍi7ÖûÙùÉ‹NͪÎ]psÄl:îMÓA¿¯ôf,厞#u7í¥³QORç·Ö¶û) ›<,]¥FréH'Uœ®ÃLý “*¬ƒÙ™-ÛJ°ß˜…rñ,•¬¥f©ÄR‰¥K%–JΙJX‡ΙÑA-ÇåÇ\eèaú¢m£y©¹”kqaO¸@ˆË-/œ/<`dµJGûs¾N|0’ZÖÕ7Ñ·H¬ÆL?Êéâ'[÷]¾Yz‡Ã-宿¶˜%é¸4ˆ8–òEÌÕŸ¦ #!ÞŒ%‹³Â9«íJˆ«~2óÊζØÃªvÎÛ7ÿþëªxÑǵdËë—ÚXnކß.¦÷é—ÿsYk†‹v¨P÷—ëWïß¾½~WÀîÞ°¯6$Ÿ·mì}Âßž¿ˆ€« ÍÙ®¬¾Áù"P+!æÙ¹ÍÜSHÇrÏ>¸§0É–{N•{Z §FرhcÑÆ¢E›= Íjæì>cHk“_YÇ=Ò—/?½úÇáX‰·™•ܳNt¨Í´îaÏóÁ ]g<É5 °ø¢a1®«5ß¿°ˆ ,YÀ²€eËÖZÀª­æ²puX¸j¸mž £ž{”ÌuàèÔšY¹B:gJ\‡ŽN¹v±…' Ož,<­…§Úª8 Oà©J•2þ5€ô”,åwÛþ±‘¿K5îDSIDzTKù–¥,KY–²,eYʲ”e)Þñ¼3Þe´õL ¦M,UIDzTKqËR–¥N”¥^ãë×?<³De‰Ê•%ª}¿Â¤ãŸÝÖ‚÷ŠN­æVÕ¥c‰j…¨´x,QY¢:Q¢²,eYʲ”e©=²”Û üãÌT?ltÊY]ÓW—Že©&–r-KY–²,eYʲ”e)ËR¬Ã™Í@oÜ¡.ËRM,e3Ð-KY–²,eYʲ”e)t°ï[–"dõÎuéX–jb)›nYʲ”e)ËR–¥,KÜuoY ó&–2Òá–¥Ö°Á–¥,KY–²,eYʲ”e)§ã›/Õ%N#KiéØÕ|kYjÇÛ[–²,eYʲ”e)ËRçÈR´CÝ3þ¤^û9>¿‰¥*éX–jb)jYʲ”e)ËR–¥,KY–ò:Ì®ã–rYKUÒ±,ÕÄRÞÎ,åY–²,eYʲ”e©u,õñó«W××öË|ÇHS:~°¦¶Ïcͦƒ$3¢é™Ÿ_.^‰$#NЗR5¥z,§3u1‹Kº„c»™‚/›AÅ lÚ{—ÕÍBëÒ±g1ÎbœÅ8‹qã,ÆYŒ[‹qs–ŒÙµ"Í ~Ñ:@Ö´iè\R–¬ö@Vœº¬N¬î9²!«(1·¥¥!x—(<…(WqŸ{ÈÃà’+Ž11†}é5v‚fãU”¨ÜÞõ5]ÝŠžîÖÀ¬üV9ø° Tóê_ön÷²çm…°w“·ó£kÖμ@ÙŽžã ‚BîFL„¢P Å\ùQÅ’Hï Í˜Óær£µëfÑ´móM»ã£ëMûe ?pö¨Ÿn饳ܪÄh6Éöhùqî¼h㘔îÆ4$-K{‹¹[48M4¸ßÈÚ@y¹îµ±yp@¦uÀ¤yü!ºWÀ*òP@‹^º>àô’ט%¤ënw¸ê5Ð9¬ÐGƒ•ûN5kÇ}Ôo‚ï]3hKœ=oëþ4O9Wµ¶:¡I'lÜiÍê„£Ñ í‡B{mÀ5QåQ´AO¿cÈž{¡úL0$¤  C…ØáÈ$ñ}ŽC¥Þ4ÈsÖ¨n3Q¬Z8µ°ã˜h­(åO¬ôÔFA8]ò<ï¨Ùó€J?ö¡ö~;ˆÒ"áI:¾ã3ße†iV ”Ç:ƒ£ùðz§å°¤œ.óŽG%¬¡e” |Ý»yC"Ó¼K×—×mÔ1ÂYzJš·H]ü…B*åaÜB…j¦–ŒröU±¼”âíPÆ’:’‘‡‰êpe¸ cÎA…TE<~Spm£À•~À<ꄞD¾Š¤Ä”Bðƒ«£Ç‚-µPÐaΓNà<š è7}fc^e«‚vRA s5^ÀNN9Åq¤‘ž!éyG(ô(GØ   mSNm˸Ç<ѱ)°­óDT`^æ\B_¾ÌgÚ”¤#Áe¿é¨îBùÓ °C<Â}^æÌtDýòå«Ooþu­pÄhÚ+æAûTÄnÈ¡M˜ä@ÅüGê:Q(¥k"ùPtqy¸bL0siì.aX9Hz£/ª©€±+tÅ¿9…oòéÄÂLjԗ>w¥ŠÀW•ŽO#¦<ÅEXÅ0aÊõ<×WÜÈd0}U“¥‡¥ËÊ‘'ލt)‚’nä¡âvƒ¥)…å»~·¥Ëþa^»Í;˜L“Ë8·ã¼/ÜFÓ$DÇüÅPÿr=13È~/«ÉªTè÷ź¿ŠIñsœúƒ‘Hª¢!éB{š©u¡—MT”™'Ý|í¥£þ•H’ñWe¤ö)©Ëïß牜 ³ Z»þz9Ÿ{hžxðÍ%àY€íÉTþ¼ú+ô6â°À ÐHMõWÞH…‚…?hQ¾é9ÀèÜ÷®éï?¢ëBo>|¼*ófâÁ¼éÂ9ôöå««¡ˆze!±¸"Þ•«®"q¥øж`÷²ì͇[ª¯º¬ñÊ#«ÝÈÌÝ¿ í¬bò9©ýõáÝžý%íëW?]é~ 8úú©o_¾ûüòŸ&_)÷ug(:jÑ/½·bˆp ¦ßz€6×÷é·4 Ŧ¤žL·ªê¡püwUM‚S¹PàÇ_þ…>üù*³ú5Óbþó»Øüïrñ¾©J‡0x–³’3mrôËõÓ1€ßâ<ªT±˜%ÓJºR?AÏÙï½jÓ$;ƒX//ºÎ/Ñ‘ü[µtÁFfZ]£Çþ8C0ŽÕH*‰nÇÉl¨²«â_xé©Y%ò£ßÍ_±H2µ2¹[To*úyêß÷¦9Bw\và9ÂQ5îN“coª|SƒGGÕ|WªÎ“£OŠª}‚7`É»­=õ Â78VÄßFÕm˰Tm©ÚRµ¥jKÕ–ªÿZT}ެL:”tŒbz(Vn^1Uü°¬ÜÀÊÙuµ99T‰}O'›…ôì†`‡F¡ô$Ç®¢žlCå¶elCå¿_D7"X~ñùÓO(8zr¦G5¡ˆãöÝxúÓx6’†,¢±ÔšÞÓf–å0xù¦HÏ¿h¥9¢ñ,‘£ñTçâǺðîå:íéñ§Î9¼ÄGæ1…ÜP*x}‰P]3€k*¼H+PÞ´ÛÔšYº³=)=ã8bÌÃq€(Ó¹xh»8ð"îD1çÞV=Ù¶Œ£Vz”EÐf¶Ë"pœsÜS‹w¶TAA3Ãé*GÚói© Æ,‚ÍIˆÇ¨œ°Š¢…‚z $CAÄ$ÂÂá~@}lSNm˰ñν*°†xg›’ïdNàs Ò¶áNî¼_¸Óõ·†;ò4áÎ`áN]±ø*¤Gîl¥)ÜÙîÙ§î¤Ô&´ŒºtÑ>£mýz/h‚j]åÀBuT»çÐg#«QŽÒôƒXG~3"E¼ÕáoY† Œ>.bïm¥9ÚFiÇ=ôbììL¥¹¼7%?ΚÌ^”#w=§iSSÓã†ãJË'sìþS'·ÿÔöñÓ¨¥Ìóï¦XÂ=½ún½¥•!ÝhšèÝ"TW݉á$QzP™x€¾eîË;÷Tg€ÈÍøtYüªûÌsf“ꎡŽS½ëïù|ñ`oB9¦k NZí1ÚI›ß ôú —“ò\éåõõ+ñÒcó]ŽÌvO‹·Çéü¸ynyw«÷)·lò…èx(ttÀK‡$@qì.ÜJÇø‘ùHí= §î¢df¬G‰ÓÅ{L?Ë lð Š3UÃä1âh-4P©ª[ã.ÅapËþcd‡xOqãŠsQ/¥Ü>GgmǶÇï§Ç ìóÐ äêeh`$"7F¡ò$Jº¡OÕãgÔá[FJÖ`"õ¼ ÿá3WÙœ¡â$™ÿÆ­mLìÖ6MÖ”âÁß%ÎÉ¡ =0Ž¡dèˆz@¡€÷"Çe˜FlEÿ¶eXô_;>×r¿>™Ûìp0F)›| ¤?v;‹¦ãô²ÈËšŸQI‚ççó/ÆåªIŽ}Wç ^Œ¨Ï"8n¤×L‡!wBì2Ð)3;PÑt$’Åü³ší_²[öIwZ.ÇZbˆÇi‡åøë¨ àC¹$€LgO̵*€êL½ê’Äëõ8T?u C!…úKÁ¨˜8ПN¥ê›Ûž4·=抻œ`¤|"*À7±Çõ„`Œ3ù˜`{€ÑEõêo§¦Âúû ‘b?B1ÓÛqÊGàÄÈó=ÆXÌ(i] erS3ní(w£ !íáYÏôEðß‘¾z9‚Dàiˆ Pß‘fU8ÜõƒÍ¹§ ÷íëðÌó¾5á‡ÏƳçmz%0œKx3ÃÕ>C†û³¡Ÿ}?Ô9~CdãÈ™N*°l¤ˆEŒ Ê¥ƒ€ž€Çx FžF‘tÓµ-Ã2ÝÃõ&ðÓ“aGeùî­ç)îRîoî¬çAÍãž}y¦_¯.N.×\÷l:ª«‹EUÈðñºqv~-î˜ß­¶P½I2ëF¦ ³nAÓÁ¸»ðâêÃO¡±ÐÒÝš©X4p²4k ¹éìé?L'k®…£sžJ1ó~}–ÍLþzéõÃ2Í\Þ›eUJÚ< ®8˜'À•÷Õ/S¥z© ž_,ãʇ@¿M¡ãUv£¸?FЩz·Ãrs_±G¢z TN Äwu!“Yo0ŠÇF®"n´¤î¯—¯Ý1I¢úÐõ‡ÿ{…~º5'nÕHšÍl._¾}­LÇ“q2î3i‡¶Z©£—ÔLKáEãT•g¦7 giþ2ûã(èOùÙßjÅ4~–)³L'Jâd–ÝèŸápà˜‰n’o˜t;ŒBd¦XÍ¡hšGø.ù‚£‰A£xL󄸽Ë˸ËÌßÃá9 æ¹x1%‚‘šnÿ5£[YÞ×O¦yÙæpUhNMfF,Y„2hdsNHS|v bÔ;Ò èÆlß2În¿æÕTæu&}U«lQ~¦Ìã‡ÐG“A×ê?]9¤*VÓȈ%û¦—”M¢SwuQÃñ­9ûû`‚"ãÁKŒ¦àšêçeÑõF(ßF(ËÂ<ÕÓ¼ðl8ÈGüP˜'Q2œ%ò¿úw¦¦äá4M+Y—¯|;,ªEE!Œžÿ™eÓR4:@2å«ÁJ ò»ïújÞš*¡ùgý,¹tá]#µDÜĽd˜÷U½KTµ`Q§ ô%/¯N.ÒÛA:­ÎFi¨¾ˆ¾ýÃ<8*Úã•âÉ»“œ(Ò7ÍJ¨Î$ï –õMYZ½_Þ‹ÂañxóÏx¦ù­“yô&?Ýâßèθô0bèË==xLý‡Fœ“ÑÀ<áF üW”|-^&S¹:Ne*Fy½îˆ©´Pæí&±}й’\&y‡ʬèP›|$D7(“|ëžA~ï(…NT©T‚6-n2òVédš¦Hcªê„“Þ\¶ÐR_¾›Én+v·˜¯õa”§2_¤Ù|µç´ýÅÌ—sÄækQÓ•6¡Ò<åø^U¼s•U*ÝÆ!¸hJ\Ú­Rú·T •þ,4Ñ\ŸÍÇ}¡Ù ųÆ\Tª«Tš ²PKKf®J«ZYåÒúÎuè‚É•ta; õU=lÅþÕ¬F¡½KÍWéÙÜšTÚ ÕZ™¬%s»€uë_³µ¹ škÞB•ÖÌÓ2Ü”¢®Kk¤3ª¡Â´ÕLOI ‹–«fð*ÊY0›QÍΊ=®,ë¢â^Ôò£ú)tþÜ$DUØ—K[PÎ2“ÕùjÁÒ¬XÁü C[ØÕŠt V©ñP…YËüU²KÁlsó¹@o%pVôæk]ÜÈ÷½ã‹ш”Æ-\Rx¹ñ,ýö®­©meY¿ï_¡ÃKö®B ¹Hš¡*§Ž1” ›Ø2`ªV©FÒL|aû}Î?=’|ò1‰WYÑC*XÍ¥»gúëž™îPª«ômå#Ùßľ܇¶GÉÁsé¾ø„4ïü"æ”LÚÃüýø˜: ÷tÐhí¸-£üZ¬ éQÅ'ú$x—ªTí8ŽýŽzÑëëá«¡Û—)3qFåòª¿‰c0Ý .ôȶ¤N¹t†Ï™ Ï ÌøN_+³CnHsn`*m›·q)¸õ1`ù‰#ÆiŒiË¢ Mq)ãŸî+úy³3ש”¾JÀËé¥_>oúW£\÷J-yåš{Þô*þEí¬éVü’ç•ʧþ¥ãú^é$§DåÊ«Tæ_4jåÏÏ?/;~µé–üÒñ±Su¼ÖÂÇNÍu›¾[;ªœÁºçÔæ_;né¤â{­sèë¨7s=m4*xùÑüçõJ£Ü¬ø‡ÇóOOê¥óS§ÜÈZ=¬•O+­—.×|Y­Uškxµºúô°ÙðÊ«^5J^iÕ ?;óoª@¾ çxB÷ —2Ö8U¯R?.•+¹LZ¬©‚²Ýi÷*åfXã7+ÇNú úZ«ykz³Ä¬ù16‡Ë¬¡(·MïÜõ‘WŠE©é­Š/åÚ%^ÝÇó2ü^Y¯¢ØYŽ$»Í3ÏÉȺŠOugåP°o¬¢Ê2Í^HÔz¢6Ê gÍÇe§^o.HržÏÿ.•Ë•³J½u6VS­î1DøêÕ þ¬¦õ â8…xÐ)¯rä—+uoM«óÒyÝ¿8+Us¯"‰³8À¼ù°ŽÜ' ñ¨ráÀü©sâT_›>•¥n6*dGÅç]ZªýÙ“É5ce¡›4AÚ»Èz;H;¯5fò«|Ž@ém²©Aö ¦ý‘BM †ó¡ê;Ør|©§ïçmš˜f‰k‡ã@ůÒGˈst-ÀÒ×÷ö, g‚¥73xd!]ımC2Œ6 W»ŒµÓâvÌp“qJH“ÂMD±‰ðGÆ„YáqŒL›aÇÄŒEB%0¶8½†µ¾[Œó¡“z•8ŽºrtÛRu/†C˜XQ² ¨ü I‰¨ßíÞœp[|w–òáhn|wrö‹RbÛÔ’ÌŒE&D(4‘%‘`ó_çÄk[¹ À4´öbŽL=‹™¦we7H-ñÉ`¸o’Øãs>E1ŽÚ*ÂZ:Ú¦q%þÝ,=Õ»'÷ò¶tuŽÝz)ûÂ× ‡ËXºd‡Ë’líáp¼æ ÚBÙ¬Ç?@W!&¥1 Ô1cqSœn—þ ]ÓÖ†þ´ƒ“Èr`xÉ…ý[iaˆB0G!ŒLÜ’V€"ç;3H¡9÷¹4)cœ6 å¬&¨r0Û±eR˘ÿ:cqÎ&‡èôoÒŽÈ^tßo÷F/âßß$—w¦dc$Bœ&¥ ‚X,D¦ŒQȰÍbø•”TQaeY:•:70³Ð|éZêp_íd’¦­ê#õI{³É:|8æxVíbiœ”ƒ#°÷b#2¤@ÔÆ‚Ç`0"AìE1ˆÄÒ ÒµâG†ðêj³r L»²IÈYR Ýç"Œb˜†‘Ź•Òb²u‘&L™c|Fƒ„.+x=96š-<‘4MÈH2¤)âÌHSÁPÇÌÚ§“c+øË`áKHlÄäÅÞsÛ †%X‚IC]K˜©ØN¶± ¿áˆÇÜ5QD•–@’Â:ÄH NCÌhHÓ̓ wçÎ/ -wåx4è÷æŒ1ÀfÄ ”B… IFli¥gË·Àà´Ù•sØâÖfì]ê>‰@Æ¡쀆Á ‹ÂºDMI¤àˆm…ÃYç·1{mfÁ…Ñ€’Ðd4’2ðXâÈ"óüäÄ™ço6þu,>¶ãÑÎÜzA#“ÙqˆÃˆÊpŽb[ €e’Ä‘¶A¡¤ÉÍ¢ù~êo¢v_•…ãd‹i “3ƒR ”ŠÈ4·BÛB[ät¤«–*¿ãLXxÀxŒ˜E`Ñ¢ŽXÌ@áª™Ê d¡…Å Ÿ €j +BJ¥uò2õ;Îh‰"Ó¦¡M ÆyF&‡E(À x* ;çòôœ9 oÅ Ù"=Nmí³xð›våßý¡ß~J?RÞ'UQ0ò§¹â²ƒc³ŽF½‰¡¯ÚQõ ú@¸ÁJ禄h±O‰?ø £˜?q¸)ÿðCâÓš¹¿}¶ÕY« ugšÊµö'2v™€hr(¢œ©:×úRB>ÿV­ .½ž¾iß?P?ËùèÃ~Òç¬3ðÎZõn.-Ý„6¬ÎHÁí…O3ªø“Ʋ •¾¥Ž½áALr­ê™Ý^\Wj ÚjWÚï•÷C ÔÿiÓceZÜh©ÀæLi¾k¡-„îÿqw<^tÇÇ…( ïÁäÏsÄà ±ñ×;âÿ¬hP³D¼ßåÑË2[` H—øYÿJ=M½¹i2Ú4 löQG†aã@§V„t fšºÜÅD¥ÆEð.AªÙ´ÏÔû$ í&Kº Hû½a¯eö¶- šFßÖå½ ÆA¤²ÊS Ó6@n#Al2Æ¿^èÔ8ŒBl0© Š@ê€W©ãØŽBÓ€1¯]²Ú´Ž¿Á%+üÚfÎwÖf©º7‘>5;ÿÜÄÀõâOJ ¼YÛ$Þ<½n‚ÏE’CxçùßvÕ½t)}<»ÈI¾ 6v‰½…Ðï!–À&ÔÖŒ=›.%´ÿMÕ÷«|cz Ц¿^H(Øœ 8Ô  ¡¡œ0Á4C‚a;”Ìb¯i•Mëøh•?%ÖÀFpe«ªgkPvvê°éœ¥Wb&æûΆ;åꃿù…—¹ÛÔE''ùzŠ­ç(²)¾^VÆ[ЇIg†ûõ÷æ'ýŸO[7ÝIž»¹wòþVvå@¨þª+OÃGqŸýÙ´oÚ=eúO6ïÑð%¹#"¿K}u'e˜´tûèz7¢Óé?&²v”M½£nÙíd¦t²%´t¬‚'ç)2;z]‘̸O.$LI˜IçüN7}bMžøèU|t?èß(ÂfL‡Ò•+O/],9b&D “Züh r)fϾʧ‰˜d1™ ¢FýBo6N:bÜS!Öf§xßä×, Ô¬„êJÃkŒÄðë,ïK¯-sÙÏ{èÎ ãv'Z.rò9Ë™ˆùPW>²^$#ý¡ßwåð ûº3RÊZ ¦ò í,%iœó-Í:®üHÉù¸ïk I»!ÜÈí¼U3B¸ñnÄ踑’_0F .ìS7i,u*-À|œ FØBnIþjŒª ë(pcÿLÜ(d`Ù*T*Š"aJ-R  s"ÔNº´))…ú‹Â8$ WV7ßÞĨÀ›ïoNNUþõ˜ó^<ö~aÄÉVœ È@Ö£m4þ¡5T?5˜l½a;‰™Ÿ®®ûs˜[ûøñ¿§'dÑD hXJMXSæô„îZl yì«n+ç…ÑOÁ 웇}É[±ï/è35D€bz`F†ЃéL F.2¶`º¢WÞlZG} ì[`ßûØ·À¾ë°ïæ;åO”líšæ»8j÷Óü² Üó°é”6}‰MÍß›†aˆ‰´-Ýd*º±`BW·{uS˜3SXBF¯aÓMë(°iM lZ`ӛشÀ¦«±)Û5ñï…M¹iåaÓ)! lú›¾ñÂÄ/‰MqÌc¥] %< ÿ+Öc) €¥Ípø6Ý´Ž›Ø´À¦6-°iM lº›c—pò[aSfæ¥0œ¢À¦/±é[ïAY6ÿå°©Œƒ´y¨KS:µbu‡ Ù  j‡AL¾†M7­£À¦clšF)ÀiN·Ns.P½M\—ƒì¤\še#£YªÈP™3÷Œ={«8ç€y²ÀRI¢Åwº[*tEèO*‰Å²ˆ<0З‚fÌ)õ;BÔ‰ˆ¾ Uç‰gYyç'¡í壾ó8[€ÖJ³>­DÙè¯AÙ­ˆ6°ñÞéaÝäoªfö•ÊžßEÆúó»í‚ú­°>§y!‹B˜ÖÏÁúÄø °~€é…1OHua¢KÊc"4›Ö«‘t6­£ÀúÖ/°~õ ¬_`ýëÿX_Fx9¸~Êν%7#D²_¢ì7FˆÀ¡_ea“[Ž Ûá1 é8Ë…l^½%·aÊ.Pv² ”] ìe({=ʆúJžW?P‹›*4ѾÆ^8ê܃¬Ë=ùMtï;RA´œ/ÛŠ/½PN'òäžöy_Ý‚¸ÚÃþÀWMOÓt¼¹y`T4ÉX ê€¡€D^ù”â¾JËñm‘Á ´x©¹”°e({²ƒÉR0\§¹^VþUz²“u5w@¢«s]‰~äGò¡=Gô}ø½ÿå9Ñ{™&{%8ÊO7²­ý™vožïlÑò²_/#h{àgLõï;cÐA{Šm@Ëá^ †ò-]ñ¯š2JD/Ò>|nVʵê±sòqÿ¶ß•ûÏãqgV¡}X—oÛ=P¢êÇ×q Óu@뇚ÞӦ˖6Þj°°¨ä®r<Ôáÿ,k*Õ¨`ÝÐൂê oûÚŽótؼ¼8„öªqùí!¸¼0®¯>Å-rˆàÙCtiÂoçs _Ü'|t}Uï„~ž^ØNïS'Ä…Ýjǹ3Ú­në©Õýb´î¾ŒÜçÛnµl-ìгËÊ“{Ô¹'õ[÷94[Ï7´…[ONû±O÷׈âuBR¿ ®Jíó†ó­úÜ¢5ÏýV=rŸàêôŒ÷îË£{TÊþUÆn¹4-çzi¹rwyòéÓÓõŒåêÓÝuÃáN÷S×í~úZ=qŒ3Ï¥×ÐßêIµ]+£[÷®„ϼï-Ï%µK—ÖNª]·í .—Qt€U£u‰Õ˜]/ĵ£¯Ï®÷åÙ½ƒoÊŸ¸sô…ÎúYúvvWº™•«à¤\éþîú²3 0êD'OW¸ú] Ûa÷â9 O-Ü:|j_ßÁ¿£zhù\;iAëw­»›QËs«mãñú¤ò\}îÜÕŽnï®ïœöYùÓCØíô®HýhðÂ2Œù®Bªw7¦û\1Üg¾¹iÇñÎhÚ ÎÑ´Ü·š—”{¼¯y­Õ¼¿sÞïÕxWÒô©úŽh ý6VË©Cß‘œ~ƒg«ùt}Gü7×Ì©çêÑ;âÿ¬E+ùï’wÄÿ§êüœzÁx—òÿæãÇí5¥\-ªéüÝhœùåJÝóœúÇ}9 ÷gªð<Øt#P¨ýnš5ÒC¡ã^Ô‘‰õû ,Ï[-աéSó…NUù2ÁžÁ}qßVi6.ËZ¿§)(¢} 4¼ÇÈÂ|-®XëÑoÿÐÊÊ6U@~i3¯6ê¿hçãšj®ø =¶G²Äé©w1·üÅù{à±ýµ¿—QiÆ i³2Òþ™Y¤ÞÔ›:YµÄ§×8õùÿWn#Ô"¯7¢¥P[ædÓþ™m`ùüKŽ4wþkEý¯BIˆ¹LCE¬ÿY ã\k'-s ä6ËMú6l˜ ×ÞL¨¦nêó‰P‚yîw¥ŽÁ&ÑúãX2Ú¹¢+›(ÀÎvžÿCÓÍr¹ÒhLÅXÉ4° 6ÝþHj‰lîý#§ÿd×°ðûÛUxC.Ó}è\< f’|n¸o åF3¸`¬®ôQø‹!¦Ç1\@åšÜ‡¶GCM¹Qòn•ÎHó—ï3äºÑUá)™’˜‚?u«¯Ûjè0t»ý¨·“|„9µX&:@ÓcAyWQ4RªTWï}•°ðC¯¯‡“†Vî\,Sf²'‘ÿÉ«ÛB’XX1Õ‰-˜N±eéœK¢3F(¥&¿oË@6³CnHsn`*m›·¨R n}Œd…" qÄ81 †-‘Ð ,&eüÓ· ~ÞìÌÝDH_)ƒ}çôÒ/Ÿ7ý+fù®{¥,þrÍ=ozÿ¢vÖt+~ÉóJåSÿÒñN}¯t’S¢råUªGó/µòçŠçŸ—¿ÚtK~éøØ©:^kác§æºMß­UÎàGÝsjó¯·tRñ½Ö9ôÀuÔ›¹ž6¼ühþóz¥QnVüÃã‹ù§'õÒù©Snd­ÖʧÖK—ÿÏÞ•5·ké÷®šÿ ë—Ü[ÚÄBpUWc+i¥-9±å8öT— m9ÔÒ¢$/3ýßç$µØ’%wœ´ð!±H‚΂s¾s¼Ù8hÌ5wÔ<8´¯¾9>j½ÝÛ]öèh§¹³ŒÈßk³OÀ¾Oµ·{êŸá¹[ M­Ñ¬¾ÝÙ­.Ò|MU”'0'Ý«î‚hZÇÕ·µì úzpÐ| 7÷„5KãñÑ›û¢¡ha›Íõjá¥j±sÜ\¦wNðò>~Ø…ë¥õZŽí/Ðäúñ~³–³u™œkKIÁ-WîóìŽF=ÌԣݣÚ/ïÖç4¹÷g¯wàìWw Î£å\;lî3Døò*þÝë%Ì©ÍQЄN5«{.¼x Õ£;[Ÿöw /cImžÀEãá!v¿›ˆ{ÕO5?0tÞÕ«†Oõ^7ªdÃfPï™ê–=ûw òd)A ³£d­(æ; H4-Ä ¿uÍZ'o @M[C‹š,"$háúnr?üO »>q‚ñ¾Î=òûʦù¶Åt$íYÖÞð>âœ]s°t%ÖŠ¯B,¥ç3"<‹ØãƒK¤}mBŸBþ=¬%ƒG1Ã*& q£ “& „ðQ ü+cÂס&<ŽQ"¢˜Q$|d˜¯Ÿk¡UXëo«ñbèd¹™i{öt†¢Š³vŽÇ•ÈNŸY`PLûÍ,ÇØ+fíz„µ×Cü­ÅØöbŽ/??Ýë{t¶›hÍ);ÑoÜìP>½ãf³Gºm—wä˜ñ‚‹úÛÖ—æÍî%ß9Žþü“ž;ÚçÞž›CeÙ(ÉçPÝL;MGËç[çËæ=þ ¾®³,å+ùšµV?3i—ɧ€³Î_*…— Âä‰Q`S&”H3Û™3BÙT}þv@³_~Ä¡\@”Ã"FqÐП};±›i†Á!’ÞyÖÓÕýž=#~~júÜ’çÚÏÚbD#Nd€•T)˜)†#Õ+ £oCH“Í9ÃEW$Î!žÏL»‹ƒ®«|4Hf×d­z¹ ½¢Ž»ÙBÌñ´Úù:{–¡4Ä{±¯}# HŠ!`D‚DŠéTâ™­øVZ›¥„ü1é6("гXAŒû\¨!†©Ò!çaÆ‹b±J¶˜iFð9_–ȺX/‘m‚€J£ ‹@›4§2¢ ¦‚!Ç,|I»•$KäËÀð¹E,k y¾÷< ”ıôC#© 3~VS`& RŽü§ñ#–á¬!Ýi©CjB ;ÄH,%¸S…U”„³ÒÍcÌÊבÿ tÍh8€ö§Æ8ô5 |âJâX£h’‡Ä„~"gÍ.Ã!×ï½î .0VBF’*é3?¤`—h`ˆ±'‘pÞù§½ ÁDjÅ•”¨€Q) eDòØ`’YùËÕfå›ÓÿˆÓ«v<ܘ±T,ŠVšE8GqdÀ2Cb-äSpÈ5¹Î @[¾ÿÖZÇí®Ô…;trF1a`æS*À@EJè +jU½ŽèÌ {‡d­ì2ÊÁ˜ÌÈì†D<¯éÛbθ³,€’z Yg­®Z¯%ìûT_@¸‘ÆìáQ„h@¢±ÑO#윎åÆ) '´˜¿2wç’·rÿÇfí*o{£®®ä5Wþ÷U–¢ñiÈ}Ï y0’¨{ F uã“lFÏrÝ–ÿÊEö¶ªÉ[ß*h_ºÓîfkU[£>¼eiÃýÎpˆR<—èÉöš¸äÏHB»ö¦]µú*½7Eú6‹µ_噂GtåÏ^Úê÷@o²—löÉVÔ [“eÜ@ŸL\CyGu·ôm;¶žA7ض n­Í÷É僷s޵Є›Í]NkR¤q“ÂhO }™éPQ$5çÖö+­¡ÕäPÄ&²t¦õ{kå[Ö~¼÷xò¤ÝÓV¾£•ªžësÞx.{6³F¸àM‚¡ð% Ñ®º™òЮ.Ë—ˆ´Ä0Kìͦƒ(ßÈ™­'ß@²¢ÔÀŒÛvVºÕÙì‡U¨¿*9‰©Ä½A%SØC:xÍð³Ø&ŠçÓñcHoRºèpGdøÏ'â¿ÉйMr_³í ÖPœ¥‡l~å0Û³îF±l‡Vþ’ŒµïGXz4ÔÈ£¦yEð+&‘Ž8‚g©æÃ>wï£Qü®aÒíÖ£¿¾ßÅnÃSm‰ y„T(¥‡|“BÄÄS4   |©ã·×–ŸsÀ}žVÊ·›e™'‚(òŒ1Ha^µ×vÝ:~€½¶xÕdÎßP¬õ¶Ñ®£}vt~Û={kõâíÙ[¯í5öì­¿óÍaÀÂmïÛ¯nåU(«ƒAgcñ>¢ð5àÎçàš¿þ ëp»âo4Zä¾'ŒøÝ÷W.«|ìYräž×!„‰•‰c=j˜ò$޹G”’ÂÃñJ¯²n?€Wù&_pX ®<©ëy2(û¬Îë˜`ëòC ßãC $Xù!†¼È3úœ7¼8ÜÈ}ÊE`¸§©eZÁ-x<Š}"&q¼ò,uë(qc‰¿%n4ÜlÍ&òC޹o¸›ò7sdtµ)!…!”…¡oX¬}Ę)ñæóÛQ‰7Ÿ ÞüÞç¼ý˜§·ÐbKçÚçJL1wv²ÄÝã&²Ã%ðÃgKPÿuˆÙO„}Ñ&^8å9eD‰}ïbßÇž#÷Ï8VÜE*c4ömÄ€pARF¾ÌÌxû®[G‰}Kì[bßû–طľåÇKQ2ůCõêÙ›ú›`ÊaSËTbÓØ”>òD†‰M c’rx˜Ð£H`£ˆzƒú€Œ5¢«°éºu”شĦ%6-±ésĦöë:þýRBÔ¢>ˆJ_ø'ƒ¨þ¢%§SF”õ.D}侉 QÕ a  Òpƒˆ"é ö"!8B #VAÔuë(!j QKˆZBÔçQKlZbÓç‚M¾íPàaSˈrj!6}ìv¨—ˆME $AyZDÔ£q <†Œò$BÌ93‘Wn‡Z³Ž›–شĦ%6-±i‰MKlº›²×ý¹–¢pÑ'ï#žÁ'ïŸ#6}ì–«ù/›†QûX3O*yÔÀÌ'Èi!F17«°éºu”ØôƦÙðJpZ‚Ó'§4¼N§®÷¿™I)7°pAól=%Ðß´ÿÏ€•Ú=ùÇOÝG2çŸyõÝíŽP­¢–Xl£p›˜mB¶C³ˆ\:%¤~FÚéèã`õ"ýÌOÿØøNpûþv´Y -Àm̓0ýC0;D_¹Ïl²¡Ìí2ËüÌ–õÙÅ3´jD?Ø÷Ñ¢O#J°¿쳟ìFÒØcQʃ#€”R/ˆ  £Hû«Àþºu”`¿û%Ø/Á~ öK°_‚ýŸìþkÊ—€ýfû›`uÀì)#J˜}f?òS€'ñ‹ƒÙ‘A”EÜ÷˜jAµ = Ѐ X­‚ÙëÖQÂìf—0»„Ù%Ì.av ³WÀl¨o§Ù<ܶÖÍ*Ü/ÚTäÊn6͵èôc1ÚÆ‚7ÛV.]e&#¹¸áe=GjÑ[ îƒq;í Z¶éÉarnçjÙ:ñ}ƒûƒ›Eå3Ž·ìáq×óžãÅ]×e•-‡ÙÊ–…-Hr]w+ÿb]“ä]]HèXÅ|¨D¯7li3nÏ0} ®·ÆZ,*ï_îÊV|Âï»GY–×­©{?þ°ñ”¡×Äþ•BÛƒV.ÔV?Ú´b^¦›R¤æJfòA®•ˆ®®¼úýøMu÷ ñ¶öî×­‹^ÇlÝŽFÉÖ&X¡-°Ëí.xQ{ñe$Mf*=Uñº•‰Ùª Ò‹ @f”zðwfÍ >Øó+ðØSàûÔE¯²Q»ys|òé ´×HÄÉõXž|òÏ>¿OÉ÷Æú$€ëÚï§øS_¾ãóχ‰Jø¥úíSTë¾OàÕi$µK¿Ý¸üBê'u|Ú© ëÍ7_Îھ߸<»Üo^tÍúðôö#jœÔoNo¯N;‡Zûª-Éûþâ¾8A‰"‡òóNûÃQíºq{JšõëÆÞñUcïKPëúçõËWõ½ü_uTßÝ™”«7³r»ût˜›÷7gŸ–Ïï/ÏŽj¼vy4nß^6:ïÛûÍêÕÙ»ÓacïŸÞøôìòøvÿ¤î7šŸ.ë:ª¿{tÔÒZ‡ßˆëw ð áŸž +Ks½©ðÁÞ—Ûzó#ªï} ŽÞóÚÞG:íçÎõþåÎù´\•ºrû—g'I*1Jô»O7ŸqãJNÛªóéV’O7§øØò4ÕõéíYû´í_×ßvö›q£S¼;Eõt üA§·ï/Í7m £½¿û~¬:I÷39ìnõ»·Cµki®’ÆåyP¿­m;þAóK;>Ú!õË)OèUmoR•{²?hž.—=èÅó‘=ðmo9O·Ï‡§Ðo¹žÖ¯ž‘ž^ýåò¿­?'ùŒ©ÛÆå3’ÿe? ÿàÉÿ¦1;¦îÈ¿±WËäþ믕ÿ«XçÒŠ§á÷ÑÑ~k·zØlíÕÝ2Cµ5u€ç!¨‚Cíu$xVí)áÉQW'Æ9Ða¯—T ô¼¨d>4d5ïøÔi•wö¹¿%úm{üÀe³ñªÒëV,©¼" b3¼ÉÈ&ÂüA\ñ`J7M/þ¨ìÚàÔ ¸ªLÓ>•aïN;Û¿ªˆ´òÊâŠW•«öÀ‚HS€š:K/.êG€È|?úÀcûKoÓ-±‡áB²f®ü;I+xPo–e­¸¤ÞÑo-¾Éÿ³¸‘»û5b3¥P[že«ü; Ú òùO%¹4%ÿZRÿêe(Ž™÷yh™õßs|œi-¹©ä¹Í¢×4BÆ™rmN•j’§þP(%„ç­Žéb’Jo4„Hf»òAÓ­ @L¤ˆ³Ý…û¿T*GÇ»»Õ££í‰[1aÓé MÅéææ/ ûú/üt¦1` áËb늿‰È¢Ïí9ŠI9°`þ xäçö¨þ‹›?P”QePäQjà? Áf'¹§"Ó™Óx姠׬£œ?Xc¤.œ(˜)–¥ž²†ð#.CÆ<ÆÜ£ŠùžP$ö¤ µ/Œ&2KÐ¯È ùKsB“Ũ??[Ÿ§ò"Õú±Z?¾óhšµµ6³ÿŠE»ïò·8‚ËÁØ&r]k™‡˜Éé‹(d:Ž”šy”¶ÉˆÅ^…AÄå2£÷NÎm9º:BZàÑÒIĦ|‹,abyŠñ}ßðNMVatÁy×PØàÂo&(·¿…Y˜ØÏÜMíÙtÜç–-7Wè­Î%ý€úúÔ¸&J»œÄ©/|xÿññ÷£ž©ÜYˆ{’4º•– ò ÝJÚ…øÑàÒvÍOù¦”?÷°9» ßÏãçLÑQ‹ù¤óíÛÓùªŽï<™NÓŒi™ $¥À1(fOŠ)E!i¬É.GUÛ4ž£Š~¯®…dhpc5ÉMÖ%D‚Ü|²mü¬I^.âÊË{ºáé¾§eãã“n4VÆ„’!c0…ÃQœq2še ‹•Ü%ÝÚ¦ñ ¤›ßÆ¿iÿÏoüååÅÛw?:˜õ;ùýNþûîä©ßÉïwòŸðNþ[—Q¦ÛÖÛ(õÜ,ï vä\öî7]OãÂï{in~À¨”¥Oœi…¸d I‘êD'\+Ųdp·M÷nܸ=p{àöÀ}bÀ-º¸Å©†çÜ<”MÀ-ºûf6÷¾&:JàNc£$NΔA%7é1z{wÑÞÃ}¸¡iö<~”Ài‘h©(ÂR%öòAdŒ2"Îâ”ÒH+¶óÛG-ÓðÀíÛ·nܸ=pŸpónÈÂnÜ“4lnÛþ–’Fàf'Ü"œSJ‘‘vÿ57%š2 ƒ#Ó§;M¶M÷nܸ[·•¿¸=p{à~À-ºœ±Óî†=Üõ†ðÀ½ܧphRtÃí‰4â$ÍP1ŒHÂÓLÄ,¢"ÜÜmÓðÀíÛ·nܸ=pŸpGݘá“î¦C“õ†ðÀ½ܧph2•"à 3eöS–š”Ä"A:NU ÿd1Ý ÜmÓðÀíÛ·î¶ÀzàöÀíûywÜ é‰ÝÃÝ ÜˆðÀ½ܧphÒp“ˆÄ('Ú~’+Ê0BaÃ"š‰×¶M÷nܸ=p{àöÀ}ZÀMHùI7—M·”T á{ ¸ Þ¸åñwHÃHe Ð% 5,XVš‚jש2„kªÒ]ÀÝ6 Üϸ_¾ºxûÛëïKÛÊØë(#­™¦œÃ/*nË«`vFF$Æpé)© ¡4e0°„§íƒ£m‚=m{Úö´½¤äªˆG†ÙtÃQÉ‚,o¨àéìSðÑ–3€Ù;ž l5ÎYei/^ü¥T6gVqw•A‘4òd¬›bcQ9ò/ï@÷-0 HcÖŒôEM=Ò¯#ýž÷ êÑG™Ê@ëQ”1%O A*bQJ˜ÄDŠ,Þy JË4<Ño™ È^½Îu€ƒMbId6YLSÓ/:Å õ²H/¯@ܘžù¢FWCcçp'Éó¦xcŒ"—ñDï“ÅzðÍé»à–È+1êþÀ6Û2¶#%g}«ÆæfÓ«åãÅb?Û¦2Ili‡fžSÛ²áû%Ð AcVÝÕ©˜u“ÎiMçðÚÖJš2,`“f¤]ÁOëšÜ6: – áµÕ=µ¥„ºâ†0žf1¥SÄU"Q"’Ñ4Š)É2%ÔÎß¶ixuåPÞåPÞåPÞµÃé½¼¸øå¼€ùì¿s‰ðe>å”—œ¤M±>ÃpŸ^f“©³#ʸûg åÌŸ‹Ô)bz5ýÚ>oq°G´ù²ÚÁ+m±®ºì`+0»¤ì¤”³mªk=ñ?Ìtl†EQ+¤Fv`n 1™ÌûÚ\j~¿Ï®µj ï_¡Ên;¿¯ÿѶu¿Rï¿~è<”S’u>Àë$nÔê?m#XÉ™í´þÌòá_«?iû¢¤|ܼéždWÿð¸ x0Φ š`>åÈŸÔê¢{.ûAwI·Í2ÒƒÑbT7·H¯aÿÀH}¹Žo5óï–ŠeÆ´ T±TfZIkÅqF X?’¾3Í1Ë„¡4Ž“Hê(Ä„ÂàÅô“[>< —ÿ—y¡>!N£ŽÚìMsQ*¡†J2̡νñîô]gu‰¶ŒçòY\-cŒÌhêì<ˆD¯>ì’~®Ä ­ecY´ŠàÔÊåJpR¾+i^ÖÔCâµl?ͦÐëQŠç¼zîò-ŸãÞ²<¥Ï/RÖ~Â1J(1nÀI$‘(˨ŠK¸¦2‡Æ}±™|_ìÕ Gq"¤DLd` ¦#•Ú/€¡±2š%¹1KÍ~1A ¦Ã…ó—*»p ²i-Ã)Þ,û%7C‹§5k´xR·[—QWMýâ1Øÿqµ‡‹¡ˆx‹_Šçe#'M4O8b2ãÐȉDŠbÐßZ±(N¥L3ºÁ£ u‹99 ¬!QÖ¸úÆÑ¡Cĺïñ!5k<ÖÖ¼‘òÕ?ÿ“‡7§7œwÃCüªì#À nòÙTõ÷pÓ7|ßëöcz¸ñpãáæàÆcÍsÆšÕmÏkÚ¯lûJÞs|#ÇF\9Ç_N ]Ζi/Wûa@’(n¦÷¢ÖžÞ›è{×äó§÷M³¦‘ÙKQc¨`:@‚EˆK# ‰TŧiÌR^ßOz;yw(a0åºÜlÕ)¥Gð_õP&Ë ƒÒ¯ná +:«³²Sj¹¥©:ÇÑO'‹ñ¼8ûPÛ‹Ò¹øl@3 &YðÛÏAíìÖ|$&¸2Ól2Ýs»ǃú†-hÙ‘é?ÿ½cGüï<€Ð!—f uíÏbX»·ø[kÅÝ^Èùd®†µ¢ª…†‘¢ƒelø+(·2=VQmVZMµÛ¾”oÚrûú®4J~­† c‹ ¢s1´e.“ –ÉìUà¼îXÞÄ@ošv.w¹>nÝ9Îj[çú6Ê;Ìß¶²¾ƒÔµÛÝó¾SÆËÝ£® 6ìn/¥üŒÏÎõͯ;FT=Û€62<ömeÅ,˜š¤^ÉÀ2æÍŒSTß3Î0ëÁ3α1ÎÎé³v°I˜HÓ m2Ä)Ö(fþI£LÆØh•ˆFØYÉb+ðÜ ùPÚ¡Vó¶Õx@q÷ÜWõ„U5ý}ÙÓEÚ Wj ïí=.­¡nÏÿÍÅÑx=ÇZÖÀáçüU°˜à¨Y`ë:³‘3{÷Ípæ°¡<+¢¦Så6¹ÃtgWŠWÐV%ð<Ø®¯¨Öz]3{©[c]({ñÔ%)O lˆéÂÌ¡/gŸ'CÝX¡é<¸®5Áæk0˜*Èë äžÂ³KÈüÑJ '‰un‡2ê ÙP¤zõs`ÊO;YY8¤ ‰h=+ßš+¿o*«mµ¡` N7å¯\7fpùyÞØ€” ‡ŠùøË"UÃt1´·iäJ·‰1ƒw0 íÊ#V*(Fà†i`‡³ë‹~ñ~¶ëèË]{ Håa:⮉íî*åܹ-oñm¥|Û&0,낾¹4óà3tÅ‚ÁoÑ$˜›Û6@™XP&ÖØÜ;U~vb×d.ÃUO¾•§ûéçÉ 5„Ñ牶#Çüý_gA¶\¸ më•~M‡@AS¨ÄW7Š2`æ™QÓô³­ÄŸõ‚W6Pp3{Œ®6Eglºz@Z6ĶÛl2*ÃL!ÕÉ(ø7gÖ°Îcg°æyæÖn0q…þ÷^ð¦ÊÞ%Óq`¿\zA6…ĆÐ+¼’”U‹w\V_ujY55Ô«¼ YYÖ€FCä™[ÇÈKãAlžµ2ô‚ÿÉU¼-.h4 9u¨ $EæÖáº,5ƒkHÐn¶ŸZ…GbMR¸ó¢ùZLy×E›(-ƒ®t%Þ(‡àGDñí’Œ«¼òèµ6ìçªiT¼YŒü.C ä d>€îþV3€çYÞ{`³,ÃÀ´Þ*–£º®_ N+C(Ï:ŸSUÚóÒÏáE² äÂx^e©Ùª|"¶ŸÝ‹ªLî·]0‹.÷$€ ØS›ÌÓ¸³µó·Gk¼³­ËóÄnaù¼ü§r íºÝåÜ òæJÌüÆh¿›ÉJ{Ö{X» `ò®*!¬·K8­Žh†aP6ž´ãa—„ñY |xÿñŽ>çÏëÛrxã›6 Wµ}¦Êù™]”ò0FZg qœb fPJ"ÌÀN'¡É< õ#³hµY‘!bJEiRíc‚•Îé}¬èY:q#ü?}{,·Î½ý kCïŒs“4ƈ†Qˆ¸æÉTj”i.SLâGüIeÞôøî$ò î¤µîßêS)ƒlEoö÷¥¬"zaC¿÷úã¿¿Èý°¹×¬Ò€ÕÚÐÚ:PóêÊíÅ• ë t}í`‡¿{ÝŸê–ÂÍŽ)Œ7úÀ[y¦o»4˜Ëiƒƒ«µßäÛ·ûu[µÌÃP½ÝÐB(aŒ¢ˆEqÂCã4C'1yb2Jšµ¡!÷zí(¹í6\›!±{jbq*¹àáVÑ´Ü›þáõ»Š/'³w䂵îó?H»â›¾µpX,”ÝZ'sKYj`·¥aWïóª9}›V lµ˜OúňNucl¾ÌûÓŸo÷UÔÚ±¢2±9PìZ(3ÖkO²É4­|ÙmÖ3NXHƬçᆯƒYß~ XóAÊfž.â™òôÓZý„ÆÞÙ}|vÿX|õþÝï=DyˆòuœÕ)«¡M:°r~Œ ÂÇc«= jKôFÖŠºá!~þì1YK4}o¦jÏZM¬íÍZþ&ÏZß—µ>þúêÕë×?¼þÁÓ–§-O[ž¶‡¶rõ™öHȧ[VŸ£.¨¬Ó¢¼xå á)ÏSž§$XÞ#ÿU¼lÍ\Í';¢®$Ïé0X«ÆÜ|ïžm¿žù`¨Å˜?3vÔ¨Õj:5ò•§)OSž¦Ê-÷– †%mµ{ŸØƒš_zóÑ›北]?êîÛ|Åc~z}ñú =ï¤qé²îž«š¸Jn㪃¦§'#þhdtWßy³d 1>*ɰç¾óÆÕ8[k¿ïÜË„#— ÷Ú9Þ, hô¨×">Š4ØóâÜ;ßeõ½Xðbá¸Å¾×Ñ·•áãn¥n!Æ“kÕ¦!hœåuv&∤"IÁlk!R$³¡”‡aJÓ':³G3ØZä”ÚßP5½ÞÙvX“´ŠÃ ghq$(‹û¥êHäºw-|n«Œénmœµ\¦yÿ ¶éÁ/d"k–e(T˜!˜ EJQÌ9QŠEœk’§R”þi¬‰# L¢„p&CŸ’…Ç1ˆ¢„›4Î^dœˆ0•LG2œ&BÈ42©Ö¦¶Rñ“‹£Çš‚í¤Pˆ»,޾çjÑ£‰ Ò“’5ˆ ªÊ^í%‚†„G'œ(Å"‰aÈÀRˆ'©F’‹1#3ÅRòLìNmӸâԡ °‹RO(Àþìä ä‡#§¿MJõ“ºå×\ÚÈ.”ç†HˆååáÜ…u¨w^¾ºxûÛkû ÚFçý¼DLcÍXȹ!úʨ äÁŒÄ¡R4r‰, å~y¿:‹".Œ 3ÅI(3 ICˆH”d4±ÁGf®`ê*[ïòxç[[™DD8b!ÑšiÊ9ü¢2á¶¼JH Q‘Ã9¤§¤&„Ò”ÁÀr‹ƒQù×¢)±ÖqÈcAc`[Æ¡)UˆœF21±ÀL®­(¬û×mÙÖ<ü-‡‡+ Œ6eøæ>¸› Õõ$ ×é•ëû É©r“¤²ë> ýGñØ\}6#3u'<í‰ÛÙº*þ,×ø–‹@#ÒƒþœØÚ˜/0ÜŒóS¾ŸoúÓñå¹'7ƵÚÅtQ|F´Ø„Ö°¨€ÏYø÷Nµôмî ]¥5¨žYña¿½†+‹ŠÂhÍÜ.eå½TXøÁ‹ lˆÝ_æ;ükó}ÿ½þÛzûáãyy$=|²®¼C?¿|u>Ri¿L%SçDœ3sÎØ¹0ç¡*zGâ›ÍÞ~¸æ6T§þD”On$·Pt÷A´·ŒÉ¥nï—÷§¼ixõæÜŽTà‰lpisýùå»__þäÎO'—v8Cµèˆ—?W×j0tK”ó¯ýÿqnãÙRægÄmJ}=\›å…ç˜åJg±^ ~üå7ôëÇχj1M¿a] ŸsÑÃî¿Îj¼¹™Ž`ú¬ï©œYc 羄º¶/ ü”bÙ¶R/`ä©Ùýå:¦ÛªYÜRP t=ª‚XWþµY pssº cgÿd†`&›±6]O†‹‘™ÿ‡BÏ-áèNqÖtÜîWyÞzu ·¨Þ\]{°š CÚe’°ª,äßA\à{«*îØyUyMäöG·:†ÿ’~Ûü1|K§ÕÄ.èGŽ‹ôá_=x0Ìg½€ójRŸœ_œGC¾O\ëgåÐÀÆ€Õ/ 9O`7P´ uÔEáØ1‡FÛ6º¯„mÐG¾Š‘Mo@Éù¤ •>¾ À1Õœé'S—çCòœz3«ó!t>„·Ðù>óµ¸$“ªó!t ÿE1|çCØÅ±07N>rÔõ§Eì¤GÙnŒõæL;ľ±ÓSs×tˆ½Cìbïûg¾—`:ÄÞ1üÅðbßűœ_cñY!vÜ“t7¦y5Ó˸µ|‰ˆŸxmPá°w€½ì`ÿ¬×¢~9¨Z)6j&ó “)y(î‘=Ù‚š3úä*ô²NÓ$Òœš¬Y?¿à¡ÎsjAü #£C\°-– ¢u´¥¾zôÖ}Ë6ºó4÷çÁÃ4éa©¤í`l²P~™ûHà–n1™å{± /6OÂpˆ7ÏQ¾ZŠ>áuº”îVÌèB€MüÏak5µ˜‰l/Õ7W0ÑÙØ ·/Ø7Ìíñh‚WØQ´qWõ ZŠ“™ƒb?y;®í£¬`žn‡.‡a—ë'Í©{1~‰(ÑÏÈr˜¿7‚ƒ ~z.S|íÉþµÇ:h¦ F¡H×ø ¥Èb©¶†Kc„ÐÂ?!˜8+²,jNÿ8Lª´!•…CQxà@N*"YH!D\[Þ$C}yû<À> £ö’Šú¢ÁЍ@è i#r bE5+Ô‘€É÷%AÂcø/~{‘®xß\¡F!íð`†›«À†ÝPÞ¢Ð\ÿZÕØT ?+·TvúÓáòv0ÎzÞ›;˜ál0É?û¡mù>ÿ&×x¯ç~…'ßÕj,÷XåþvÞòý“à7÷0aL¿¾˜/s †¸^ØØ¯þ~5Zƒ©™-^4QàÍU²0_#ÆÿV_ý].¢z1}·¸›Œ‡“[õíÍ«W/Hb‰?c×—S3Ÿƒøõ/S c)¿á'# /7Žêð#É`¯œ®#’¬•—ÔÖH’¬Š@¸ãÞ(XH¬+eÍ‘ R{%"„‚Õ‚9€ÂÊ£FadKlYDÅt0Ë¡I*U•#êä<¥ƒj¦‹±¾—ßN¾þ‰ý'Ç¿¿ýëjñý·â6Ï{«ö–fT•¾*5cŽ64˜Ï—‡´èÃw«MÖ\qp!—p"Jè×EÂñ±@]ÇhZö4ï¯Wó˜M†µuSÄ:GŒ¶.RNp°”Aa/i‰e¡9Y>¥Ó¬ª ûWim1ŒkãuP†'¤SD)¸ÄÍÚÕòæH7°) (£r aì§À¾BãÜ&GMh`(æ‰fVP 7 ÌN"B$NQ“ð+¿™t4nNÏÂmÒ1eKåïǹñå,Ç<ª7gÙ+ªÕmô6›t¾r7šjºiv»ÍÒ§x`ÎSÉ#ö8 jtTŸ ²à|g¥Œø)•2'òÛzØÔ‚9­¢ã†¯ p)Q”;/µ–%-ê`Ye0µÆÂW4Èt9°Ö5Þ­Áù RþqTÜä5·65Š`Vò<+1ýõUEÁ³Ç Õ"o^ƒoA×a,·Ò¨€…ÄP•¾ƒøK|‚Ï£Åê â­—Ç ³h«t$J2Z\R¯¢…›vªÆD’-a0) @³³-‰PRé1~Õ… ä -‰wLÉa‡ BÈ áÚƒ 0á<´\wüˆèW­XaÏdᣑ¦HÒ_FЕ˜¶2œQ¡â9Ø~3sˆKxÐ °Ô.¶D€ÐOáR5%F¸æjoMx— -·53 f\C†ZâL²ô 7Úƒ1ÁµŽ†›>©ê^?€RÍßD$Æ’ 0)g6ê`4Kˆy–]Oã"c¤–·4í/Ëš8®‚·Aº[VyÀÓJêæRƒ‰ŠFf @nÖ\ì5[k7ƒ•°bµ¹a‰Ž 5qúìnHÔJgÉ(‰‘s¬uÙk+“ºÕbïÎ"`æXF”2SLá‚)Âcð‚šó,v5ÃÂI6fpÀ¡u<QhÛ¯týoçuÜ]åpyWUãWÿ÷ªô‚NCÀ®, 5‡±8¤žêüé5-@z¿½Õ Ú.¡¸Žõ›šY¢NmS‹©‚ñ£Á¸<›Ñ_N¡VŠ å£Å~Îé–Ÿ§ y}?K ý¦Â5õÕüÎÌBêõ?J“ûÕæÀbÛ¡üs2ïO'ÀÇïÊJÉù”šÌýu4ÙêƒÀf ~\Ûû©ŸÔÎlD›Ý¤€¯‰—¶Ç´ŸÝTë×þ¶Û0«ìÒZ¿2½{7‡M?¬Ù¥1 ú•y¸M* d‡Þ NóY‘sÅ\ä´eœÃ ©‘HËà€¨Éº3 ½gwøˆ‚ñ­m‘Ž$HÆ`¤=wˆ©P†õÑèÄmÛø Ñ'æÓ.›GîK»óiS´Å¥h×w‹Ôíðg øƒÉY^þéöoô›¿þå¿ãHü¼/<3(}Í¿ÕüáQàÚ<îÅ{Õw¢Åe\徬S­ Ùœxª•_Ò¸DŽ(ÒQG$œdˆëX mœBÞ‡"šjGì1ÅÒ¶Ï@±¨§Ê•¤ã‘|PëW.0«ýgNK­”jÀ Ÿˆ9•Ï7*޵8e3v鎱Ȱ€‘¶€ÐXôÚ꣸±mnìpã“áF.ˆˆÞð`"E Ï=Î`ì,ƒÉsåDG® {™SÖá͋Û wxóbðæ¡Tžsî>~6XSÑýX³ÂVo (¡Ùü·«ŸÒ8¯`›çƒ|Ϩ”«¯hûêÍ›¯‹“Úzye"T¾¢Wóî@^¥ÆöŒ‚]cu†DvÏ ñâžÄ»!t*Z\À£KD¼ôTÄû =¥DïÖHBb•Ùtx%šÊˆÔî1ÄÛ¶ñvˆ·C¼âío‡xŸ2Aý|jÞŽŸ«7ð˜>pã½-B.¡p¯ Rác~ók‰¿8|,p±¯iÑáã‡øøÔøXÏ‚õŠz†¸“ñÂzd"ñ(jg¤+ jøÑøXmÛèðq‡;|Üáãwø¸ÃÇ𱼆ûåaSµ›®iÑaÓ‡ØT|ØÔ¸@™¡‰ËŠš#ÃANªH„ŒÄ*w ›¶m£Ã¦6í°i‡M;lÚaÓ›À¦ÅµdìKæ\³}ØtM‹›>Ħ§&Ò”{vØ”EF¼Ð1ÊdºÏŽÊ#NZBi°ô6mÛF‡M?WlZÆ5éÀiNÏNå.8=! íNhŸr…*É ?xÕxêœàÁ¸—þß*ßþ€§ k•Ãm?Cß}õõÍȸ~ÝJ47DÞ°pS°noàýre:8}Ap:óçizo62#| ¨ýøâMî̃›|"ˆ-$àj}€x}"‘(uÌÖùauä|„º&L~q8_‰}8M‹ç‰8_eH, ²4!sZ¤EäÈá„,Œ4†½1ײçw8¿ÃùÎïp~‡ó;œÿYã|ޝ¹ü‚™Ñ#ûŽ gZtÁÌöB샙Ñ*ˆâ³‚ØN“ñ0ÀŒ¸Äi…=bÒD¡8§>½¢×¶bw»ƒØÄî v±;ˆ}bC{_ýüó7ísO?¬9Hë2va½‹ëTŽœø}µî€Ýg«Á|2ë§®×ÙANî ª3$¤6fÈØÙïûÞ/)ÞOÙ@î·x‹uVb¶ f§…_£êù£:ëaËÿ³qVãÜ;3J\ùؓɢïÃjРøkøýzå;÷³Æ«tØEbyó*º¿Ñë¿üðò\6¹&â2?kT ¯ÛåWKëÖM|þqógÎ)ò¦†÷¸'‹}ñÿ2 .ã¶ç^K"½<Ç™,£+ÒãÓÜâ§Æ$’µŽví1ÒƒÑrÔ´³HïyÏÜï¾÷ø1þ=Ä{“Çh™e˜ShÖ€jq¤ÌEßÈå˜E(Õð±/@k!CPšvö$ÏGMž3–Nîÿ~Q©O¨³WG‘ƒ:*WÙȵ*£Ðú Hø\ÐÜ:o µu½ÜÏrº®1 £Éì²ÐÛ…ý‘í—:0 M¢nÝTÈšåvëuR?«‘¼j4ßĺÍ.µÐÃÛUªr¾)ÏýÖ帷Oò¤0¦ÀxÈRb<€bT£©Ñ†Ù”Ú¬J"vh-ã…n-NZ ƒ m¥RˆÉv SÇ"²Azl‚g¶È¹”K©Ù¯v#hC7\úÐÐÚÕ g²ýËÆöž›®ž­—¥´@«Ò†!Z•4MÖuÕm+¿*Þäkë]¨*î ˜ª¼¦qKCå°aôùŸË¸1æ_`X;¹/°ÛfÒŸÊ\š×˜“Ó` ãyv^cc¨öšF$¬™¥Aʆ èËSÖË£—[¶Ñy[ìÔ½ ©ñZ œNS(ïíx £÷ªúFãµŸí¿¾ùî—6.;’üð_m£¦Ùy§"Rõ¥É‹WKük:sMJÒ ‡¢ð q °9"YH!D\Ûr¾­.û!JRTM °F d’Ö~ £ùõþr¾FÔRJŽõš¯ÆY€FU˜éº°B2©4øvŒ×OžÐáÄÔpe¶§ƒŠýÕ¨V¾¹Þ:Uc“K)XjÀ Ø7“LW3sw‰R÷Jöe¦]†ñ©è›þçkôãdÐ*?X…±Ï®é—_}W^L'ÃÉí»Ü ÃáZõ'½¨‰ç&³P?YÜ}þ•½Ýø©|ú÷³äÅŸÏCvè»a.çwéO;d(‰ÌyvW#g‘ƒÉåìÆÉŸÜb–S×ÞÏMéO™ 4Šƒá¢Ì lV÷e÷óü{4ºÏÅ z«.rf_3òvªÍlÿÖŽ'ƒñÊ×õú`–m—ù½í4'MŽÓe&ËÜ¡9,r(ß¹ùù Ș<ÌÈÝewìd¾z[N3äáLoCc²Uûó»·cx7ýd~: WìËÔZ¸mµ÷èîÿôEW`¼IWVeoÚD­ntW˜b,i²Á⛚”ÛÀ¬aú¾Éõr/¸¸…çÚÐ`_/žG&ÿÉ>a±´IÛ’ìK°ãÜ%˜ó,_w¾|ÄkPÚÁ ÉrO›l.°NÀVoU6—J¾µÝò¿³A^¤ŸÏÛpiø‰ÝWGßÕ[jó·ì­“é8×Wiÿf<îG¦¤¦6¾/žÔ1çëú+qÛfímUr¥½íÊ55v‡WÊýÖÐ1§ïWám Þ¥¾}mµRoIýá[3͆C“?<žêF /Anë&¦êQÚÉg#©²ó{QN­T~ëTËÅ&÷êÎY'X¨Éɰ\3Yv© ”Ó‰k“kÇJ±•J­ƒ»VÊÍ»Ž]n¼O¥òÁؼÕT—_݃ÿƒ!U‹TŒ*¢TêÚ íRE·5 õZ·Ì÷¹¿n™¾áùö|:²züÓ.µöÍ]»ÊÚŸ€~œÏÿTýQã6—µš,–Ôxñí¦éf\ÓÕ CŽò6õbÙi¥A˜tÌú¦Ûýl…õŽsß # œt¹Ê6;óI·UhfcÒ?–¯zÐλ·ïïIÇô ZÞ7UZµ kW\ƒŸ) ›`2AÃ%<D‘ÇýÐ,Øß‹3Íbê ¸ß‰©¿Cè-ªÕ£@5ˆÌW%ÜÛ–oî‚è'ñØŽü?/oŠZ~3§Y{§†²ÙÙZ$ljðTF¹—D¾…ø‚ÇA3§•4DJûð”–î•Ò.uÿDv›¡Q'²2‡†ç•³½¿+‰¯n\Ïæ÷ÅÕï3s÷LØ¿± ‹¬}n-ïŒæ:£Ø T(¥˜uW¸MÞ50"#{0₺Äï›Õ !Èš8®kì3…Ç%èòžZ·>Oý]ý‚½Ýi5îœH³é`8±OïÛ_/;ç@¹ óžô°“§ÓYnhy>K #7Ó–)Z~j»i³.ñe»o&=ÖP)¶®Ç±ÝCqEïÙßf¹Û¹~ûæâýÏo?Ø(48ÿléóƒó°ucˆúÏ…8ó6ïIÍ#Ç›ÒÒo/oœüLNÓPgL‘'ÍûœÔ ™=?%aH8M"í¯ÉÏ#IÏÓ$=wsm†ÄúE;¯ °*©‚⎵3·zCåÝÅ›W¯ßüôtIÎA-NÓ B°&˜ÏÖÄÓÙúÀh8Ý+“ÛÎ =ÛùÉ‹¼mÕÝ,09=›ŽûÓ|puew´,7j¥_§ý|6ꃡªíˆU{£«,l Xiéªt”,ÉÆy\ßcdf³7êó}ðGÖ¥þsàÛ@mDͨú죶o¤—lÇô‚éÿO`î€*ƒ¼}óÓ[Ä ˆAÚŒANÊf$i<06ÐÛ<Á(9y8h²&¹ãöF¨Â»ŒˆÖAÙ ¯tP¥ ªð¡ŠB¨‚På Påýïçç¯.^!XA°‚`åé€XÙü‘ÐWØXJ"epÇ ïúäXÒ  $­I0ºP’$!HB„ A‚¤cI¾z[MÕs®~(l™±/¶ ñ„þô¢p3ª}¡æèåÉ¡—o˜Y[¥Gþ=ßHj0JŒ®«}É´‹¸™y. ³£Øj]}y¯§²dZ{û¦uõy¼™6iä7YÚ Œ‡ß7iK]<ÂVHõš¬Wñ'%Òˆú@$dD<.cæ)!‰§¸8Âeñœ íʺ’·\ ÇP§ÒN6Çjº•c­øpЪ‚3ÇÝÝЧ‹¶°6 AÃ¥²ë—̯¨+þä?NêfŠ,kî]Å»Ô\Åú%ÛTñNƒ±m½V&jUÇZÍÖ]´cÝÜ´Ù¶j+§©jë.º«j—õˆÀoçoýõâ‹ ìxÖÂé¶“vŸôóž¿HBWóÿšßá].ŸCஊ³‹ë²™yq‰y€ûc^ÁæO?!ó:bæµÕtj¤[H®\!¹Br…ä É’+$Wφ\­¾êµiÍßÇÛZ¼+äñ,˜½{ùáüçÇckk³|„äϘ­Á¤3DÁŒªÓb‚ÂpÛOµå)(Ð}YÉMäêíÛÛËǤx!.®!ÅCŠ·3Åûñ\ü÷?¾G¢‡D‰=$zHô—èÕöjA’÷¸$¯áv~w²dð>ß³Wæç4òL™ß#¯Óq‚B"‰C‡ëtHß¾!}Cú†ôíÈé[m›+¤owзêÅ9‹á§¥h‡dsAW ÕN6GBÒÄæ* ›kbs²9dsÈæÍ!›C6‡lÙ²9dsÈæŽƒÍ…Ý08–ïÇÚ\¥dsMl.D6‡lÙ²9dsÈæÍ!›C6‡lÙÜQ°9Aº*l+›£a›³ÁϬcs‚ ›C6‡lÙ²9dsÈæÍ!›C6‡lî8Øœß%R¶“ÍÕ”i9ײ¹&6ç#›C6‡lÙ²9dsÈæÍ!›C6‡lî8Øœè2ÒÒ÷æ(k\›P‚ln›ÈæÍ!›C6‡lÙ²9dsÈæÍ!›;6'»L‰v²96½77ײ¹&6'‘Í!›C6‡lÙ²9dsÈæÍ!›C6wlNu}EZÊæT#›«4‚l®‰Í)dsÈæÍ!›C6‡lÙ²9dsÈæÍ›ãg„v¹jí÷æØ ›«kÙÜ ›3êA6‡lÙ²9dsÈæÍ!›C6‡lÙÜq°9¿0¿¥lŽñ&6g4‚_(XËævß…!›C6‡lÙ²9dsÈæÍ!›;n6÷þ÷óó‹‹W¯ÏŸÎ6ñ¹Íìe6 'V5}ûëeçü@Ò|:€a–§ÓY>‚™˜ÏÌ´ëPÕ#‚øéLRÀ˜I3m’¬­¯ì)u§FH"‘D"‰D‰$I$’H$‘H"‘D"‰DòȉdHžMšçä‡Z¯Yüb[n'W7×tÚÁO%ì‹ÛqŸO”ÚÝsf5ÒµÞ=,YÖÁñ˜ƒµ³4vC SV÷ë¼#=Û½K×—×Ýi_ºw*gé)yÑ?Þ 1åÁ_^A's{Zjæñ,Œ<ÑØóa†1̉¢Wûo(cÉ%q@¨Œ(÷CA’,ôá f(âi¬²§ˆC?‘!`zAË4NÂy¨µztSôPSpK tù`[lZ:~0óÃzÌ'MæÇ4÷8öxZægu•˜R=9ÃDa “0õ4Ó™ÇÁ x`¸'U<#Ñ’n2LÛ–qêc3^W¨Ñxý}Rpcù¤X¹Ù¦$õ-côn¦{›ì–W<É£TøPm¨Êü¥™‰œŸ¼<ÿðú s £GÓ¾["Ї\‘j·¥Ê'i¦0Çb€‡„Ùp=í.T¤J•ÊRÊc¨9hœFQÇŒ´¹ü:j˜·Ú4úÖ%³¾¶wgY 3c‘ò$Õ”Ñ8 ÷ãD«$…‡2A¤*•4äii(RP?µú\ë«´¦Ç€$‰\y•Yã^˜izŒe¥* ~¸´t°H7u[ åo96le&§[ÕáöÒ(!êÏãb|Žol—PÛ×׿7še—Áä“;œÞ|L¯Ó\›úÓ_ôûuœ®#=¬Vô®iúÓ.ܤ_a0ô'7i<±Oúø¥Ÿ®Îôp8þ’Z­}ÈgéÉíí<ƒ¸1}˜…ÿ:™¯14/0p{‰Nð;“´xÞÖc•Âx © Œx£túeœ*zÈYVøƒ»ÂÍéɡ¾ÿšg¾}ï]üóƒ÷úÝû³2/|…z.œó~}y~v­ã~YJ¦Ïhpæ§gÒ?ãÑ\_ôŒ7™¼~÷™›«NêG‚òÈê ²«A÷@;—båi#x·g_ª}uþ㙥$²Á•yê¯/ßüþò›ù˜¯ÌPpÃÔuÄËéÏz0ÔÑ`8˜þe3ºÍ}¦–6Ý–ÔOòÁç´ŸpüSZ-Y»…w(ðýox¿¿ÿél¨g#³¶¸.ûÝzÄÊÉâ}Ó4¿†©³œ ?1ÎÆTî*ä[\OÒLφÓJ¦Qï?ÀÈÓ“Oýj±ÒæØƒZO/ú|=¿ÄÄì?§KÜÀ¼Ì«kÌÌO<˜Åé(IÏ-ž¹ŸýrMµÊ.ÇŸì_™NÒ•…[×¼©¾*òQoWe7¤ì±°47€í1°ôÚ=¼ªæ"–^ÆÒ;~)•Rúä tÓ$ Yì%YD=ÀÂÓ1¼€ŒaÄWà,6AémËØ¥ÿ«Ô9€é¿øÑ Yó£ „yûf<ýq<%}ÄãÄXQ¨§¡“IO^»”ÎV–#φIg4žv¢´“™Â{'Í–3ìúêÑ,ç7%°4Þ¿õ ˜ÿj__xQÎRÒ²q¯ ÓJÿ( æQ.‡ìl4zô %˜¦¾óüi´Pöù_§PÂ=ýú{¥‡¡½x:4©i/ýª¯o†©™T6`n™3x íѰ 9ö q{ LnRG|Õ}ö9³›êŽëôzœ› OHµx°A9vk Ô¬öÃÎæ7˜ý«…Ëiy®ä¶aý@ýJ²ôØ"éЦŸ/ÞâŽóùqûÜò8éUõ)sb¥–„ÁÀó"F 3üf³Œi¥ýˆ',,hÔÚ¾ Øûé M¤Š‚0ôü SCâéØÏ¼( ¢ÓÄ$·ñ)k5ûn6öÓ¯ñpf½xIiÜ{І…UÝÍÃÄÑ6w®ê–"&ãŽÖB3îH=ˆSݺ÷r‡ÿX«âmîÆz玗:Þ’º¯Á.‚˧´‚bRCÃëDcbgÕ ƒÃ”£ãuáŽE<9ZÓ‡ÈD‚¡‰" 3!Ž<å‹f3œˆøTm¤uÛ–+$wMÐ;Ö@\ªÁ1Þ5&âÙ0©€Êe[yY$ÇȤ؎/ü"“B&…L ™Ôsï dRGͤ|Õ ƒƒ1©À.AS¬meˆØe vñÕnØ%$¡ B„.]žs_l]šÝ*']BØ%þ1žX„40›FåMîsÞšƒ»Ïc‹Nîê:)SòÉÅ'5K"!Sá%!‰=ãð%£žY¦3‘ho|µdÛ20>¹v~® Nš“…ƒŽ#m ²ÍPôÌ'MfñtœÛLKðó3épHæç‹]y›H‘&tL ó¸±2þ‰I)_Ø<À2r ÍGz¸˜¯]s.KžcÃÖ>«e?®uIÙ8áp2þ2*y‘õŠK ˜˜|ÃÙ0]U@u¦Þô„fŒ~à1fŸûTx‡ö'Zp­ e0žžJÓïî{ÚÜ÷DU”x©‘Ç5c@"å‘Hó@k!”HRb¯ °¶¨ÞüÍÉy~„I&c Œƒ0•àýÌ d À` ®"^WC™¼ø£‚õˆ½PAÈ)Á°zL P<ÍSZ¤^l( ™òeøP*à÷UÁbäß_~o’†Ï:žÉÌ73üûô&Æøç§@dÓI/‰®{ ©=?Ãh6àü;0gLdþÓ%œPúÔ÷%'B08Ï¥äßuÈžëÑ(3*y§óƒ—k¯Ûtþ‰ pJ¢]”ÃôHzèj HH„R±àÐõ@9Œ˜ ÷;t=P#f åSÿÐõ@9Œø=?¤’ãüo©ø=êµæ‡®ÊaDõ ¿ñ_KÅì!8Áþo©Èž’T0Ä-³««OÑý·ULÿBb°¥bö}aœ h©ž/Å埶 Ø?ô™8t=P#fýGQ&]”Èê).T€ó¿¥â3TùhÚ)¬ô?¤ÈÿZ*€ÿe þk«˜ù¯¤ñß–ŠÉÿ€º(‡ÖƒÙ/úÿ–Šê1ÆEˆë¿-ó¡WF)öKŬÿ Åpý§¥"{BJøÿÐõ@9ŒØ¯ú ìþ¶ ô¿@ûßR1ø/axèz F¬ý§!òÿ–ŠéI%ÆÿZ*¤ç‡Jœÿ-;ÿ9âÿ¶ŠÉÿÂô¿ö é1?àÿm«€ÿgB„hZ*¤Ç) öK…ô„Ó?Û*ÆÿSŽïÿ´UÀÿ*0ÿ§­bò•Äý¿Ú*&þÃ$Áþo©˜øqý·­bì¿  ×[*Æþó7€i«ûϸÂ÷Z*¤P( ´TˆÙÿ“!þo«@ÿÌ8ÿ[*¤Ç¹âûmƒÿ•ÄéßV±ýÏòÿ– E)àðíJyO@€Øÿ­ @qLj«(Ö!á!&µSÿº (Jd/T¾"hZ)àÿÁ_h§PFzЇø¨– e´çó=îC×åB©ìœS\h§˜ù/Fq¨v e¬2öÿí][Oä6湿bÞvWBS;÷<²°jºR%v·R_"“˜Á"—Qâ@Ù___’LÈx.UÅù^˜ØN¾/öññ±çð`ß)0Š—bû‡ðÿïØ –Žïz.¿K`/Z"ûðýÏûDè/=1øÞ'– § ¯嬠Í2»)–7äþÀH@ì1Ï–ç hóSÁA>FgØÇ®zÈ÷Qï…s¶8É7mÃI½XœqZ¬EO¼Øî­úÿ)><žÞÑ:éÞ/Yç튕KiÍ’¬Ù’dEw”³ª\~Ÿ¯ïªÇ?XÃ/t‘ªÎÙЦùp¾øˆÎѧ_ŽÅÜ3È:’'5mª¶N©z»0ˆl\’\'FÞàû:|Â…ª3¼ ,IÒªä¬l«VñF8¶1 ^ú@K55£ “‰O@)a¾Š4v°² Uóƒ•$gY"â>NèØ”-Ym¨e q"ÛRÜuU®ºI”:Bÿx¶Ö/µCä„ÀÆ3ÍckUñ˜- ÷²¯Áýn8ôB*¯ulæ8Ñ^&ô:…pGr ²„WÉŠ‰¹ºmíeI/I0×n±IÃ{ʽŒ Ã%Éb1™Ç0 ª=×*ª6º_¯&²è[_¢Zݲœ‹šåbU‘@K d(/%5”__æ¤i-ä5ÂÈJö>Uw­«.Éš¤Œ?}Ö-z‘Ÿ”ŽËßµëšÍ”6i‡Ò-bÌÌ8ˆ÷0ÒÝèµiŒé]äÈ`ßÒ.vcŸÁDHèØènBJhö¶òµ©r&t9aLWFZ^)uØ‘›ƒÓŒÒ|yÍš¦ìV÷ŸØ¶y§RøP$U}ŸW${AŸ’$‚²“™ö §áä†åìç6=ap*[ÿ)¿"-تÖ2rö0¾4T¹ŽÜ_ØöÒ‹C1Vù£ø«k3q€s‡uú£Æ{L‡D;lÑŽÅšREåv±Û\©ó\´ÇT0‡n¬ìoQ󵝨®êÕq×â"¹KFø_çqØâyþOÆêsìžÿã#äBþÏ)ù?ÿù?ÿù?ÿ£É!ÿò ÿò ÿòž­Ýÿ3AþÏlÿù?ÿù?ÿ³ûó!ÿò ÿò ÿò ÿò ÿò ÿò ÿò€>ÿ§ œèôrð—×ó¦ÿÇáïÿœÏÇÿàé_6ã/öR0þ§@?þ·DxÝru5þí0þnèú0þÌÅ¿±-ó#P2././@LongLink0000644000000000000000000000015200000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/stestr_failing.txthome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/stestr_failin0000644000175000017500000000000015133740601033476 0ustar zuulzuul././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_results.xmlhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_resul0000644000175000017500000002562415133740601033546 0ustar zuulzuul Cinder multi-backend feature disabled ././@LongLink0000644000000000000000000000015400000000000011603 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_results.htmlhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_resul0000644000175000017500000020420015133740601033533 0ustar zuulzuul Unit Test Report

Unit Test Report

Status: Pass 68 Skip 1

Show Summary Failed All

Test Group/Test case Count Pass Fail Error Skip View
setUpClass (watcher_tempest_plugin.tests.scenario.test_execute_storage_balance 1 0 0 0 1 Detail
TestExecuteStorageCapacityBalanceStrategy)
skip
watcher_tempest_plugin.tests.api.admin.test_action.TestShowListAction 5 5 0 0 0 Detail
test_list_actions[smoke]
pass
test_list_actions_by_action_plan[smoke]
pass
test_list_actions_by_audit[smoke]
pass
test_show_action_with_links[smoke]
pass
test_show_one_action[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_action_plan.TestCreateDeleteExecuteActionPlan 3 3 0 0 0 Detail
test_create_action_plan[smoke]
pass
test_delete_action_plan[smoke]
pass
test_execute_action_plan[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_action_plan.TestShowListActionPlan 5 5 0 0 0 Detail
test_list_action_plans[smoke]
pass
test_list_with_limit[smoke]
pass
test_show_action_plan[smoke]
pass
test_show_action_plan_detail[smoke]
pass
test_show_action_plan_with_links[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_api_discovery.TestApiDiscovery 3 3 0 0 0 Detail
test_api_versions[smoke]
pass
test_default_version[smoke]
pass
test_version_1_resources[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_audit.TestCreateUpdateDeleteAudit 8 8 0 0 0 Detail
test_create_audit_continuous[smoke]
pass
test_create_audit_event[smoke]
pass
test_create_audit_oneshot[smoke]
pass
test_create_audit_with_invalid_state[smoke]
pass
test_create_audit_with_no_state[smoke]
pass
test_create_audit_with_wrong_audit_template[smoke]
pass
test_delete_audit[smoke]
pass
test_update_audit[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_audit.TestShowListAudit 5 5 0 0 0 Detail
test_list_audits[smoke]
pass
test_list_audits_related_to_given_audit_template[smoke]
pass
test_list_with_limit[smoke]
pass
test_show_audit[smoke]
pass
test_show_audit_with_links[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_audit_template.TestAuditTemplate 9 9 0 0 0 Detail
test_filter_audit_template_by_goal_uuid[smoke]
pass
test_filter_audit_template_by_strategy_uuid[smoke]
pass
test_list_audit_templates[smoke]
pass
test_list_with_limit[smoke]
pass
test_show_audit_template[smoke]
pass
test_show_audit_template_with_links[smoke]
pass
test_update_audit_template_add[smoke]
pass
test_update_audit_template_remove[smoke]
pass
test_update_audit_template_replace[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_audit_template.TestCreateDeleteAuditTemplate 3 3 0 0 0 Detail
test_create_audit_template[smoke]
pass
test_create_audit_template_unicode_description[smoke]
pass
test_delete_audit_template[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_goal.TestShowListGoal 3 3 0 0 0 Detail
test_list_goals[smoke]
pass
test_show_goal[smoke]
pass
test_show_goal_with_links[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_scoring_engine.TestShowListScoringEngine 3 3 0 0 0 Detail
test_list_scoring_engines[smoke]
pass
test_show_scoring_engine[smoke]
pass
test_show_scoring_engine_with_links[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_service.TestShowListService 3 3 0 0 0 Detail
test_list_services[smoke]
pass
test_show_service[smoke]
pass
test_show_service_with_links[smoke]
pass
watcher_tempest_plugin.tests.api.admin.test_strategy.TestShowListStrategy 3 3 0 0 0 Detail
test_list_strategies[smoke]
pass
test_show_strategy[smoke]
pass
test_show_strategy_with_links[smoke]
pass
watcher_tempest_plugin.tests.scenario.test_execute_actuator.TestExecuteActionsViaActuator 1 1 0 0 0 Detail
test_execute_scenarios
pass
watcher_tempest_plugin.tests.scenario.test_execute_basic_optim.TestExecuteBasicStrategy 1 1 0 0 0 Detail
test_execute_basic_action_plan
pass
watcher_tempest_plugin.tests.scenario.test_execute_dummy_optim.TestExecuteDummyStrategy 1 1 0 0 0 Detail
test_execute_dummy_action_plan
pass
watcher_tempest_plugin.tests.scenario.test_execute_host_maintenance.TestExecuteHostMaintenanceStrategy 1 1 0 0 0 Detail
test_execute_host_maintenance
pass
watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies 8 8 0 0 0 Detail
test_execute_basic_strategy
pass
test_execute_dummy_strategy
pass
test_execute_host_maintenance_strategy
pass
test_execute_node_resource_consolidation_strategy_with_auto
pass
test_execute_node_resource_consolidation_strategy_with_specify
pass
test_execute_vm_workload_consolidation_strategy
pass
test_execute_workload_stabilization_strategy
pass
test_execute_zone_migration_live_migration_strategy
pass
watcher_tempest_plugin.tests.scenario.test_execute_vm_workload_consolidation.TestExecuteVmWorkloadBalanceStrategy 1 1 0 0 0 Detail
test_execute_vm_workload_consolidation_action_plan
pass
watcher_tempest_plugin.tests.scenario.test_execute_workload_balancing.TestExecuteWorkloadBalancingStrategy 1 1 0 0 0 Detail
test_execute_workload_stabilization
pass
watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy 1 1 0 0 0 Detail
test_execute_zone_migration_live_migration
pass
Total 69 68 0 0 1    
 
home/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/0000755000175000017500000000000015133740601031472 5ustar zuulzuul././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/include.txthome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/include.t0000644000175000017500000000003115133740601033274 0ustar zuulzuulwatcher_tempest_plugin.* ././@LongLink0000644000000000000000000000014700000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/exclude.txthome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/exclude.t0000644000175000017500000000065615133740601033317 0ustar zuulzuulwatcher_tempest_plugin.*client_functional.* watcher_tempest_plugin.tests.scenario.test_execute_strategies.TestExecuteStrategies.test_execute_storage_capacity_balance_strategy watcher_tempest_plugin.*\[.*\breal_load\b.*\].* watcher_tempest_plugin.tests.scenario.test_execute_zone_migration.TestExecuteZoneMigrationStrategy.test_execute_zone_migration_without_destination_host watcher_tempest_plugin.*\[.*\bvolume_migration\b.*\].* ././@LongLink0000644000000000000000000000016100000000000011601 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/expected_failures.txthome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/expected_0000644000175000017500000000000115133740601033344 0ustar zuulzuul ././@LongLink0000644000000000000000000000015000000000000011577 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/tempest.confhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/tempest.c0000644000175000017500000001427415133740601033327 0ustar zuulzuul[DEFAULT] debug = true use_stderr = false log_file = tempest.log log_dir = /var/lib/tempest/external_files//tempest-tests-tempest/ [identity] username = demo_tempestconf password = secrete project_name = demo project_domain_name = Default user_domain_name = Default alt_username = alt_demo_tempestconf alt_password = secrete alt_project_name = alt_demo uri = https://keystone-public-openstack.apps-crc.testing region = regionOne v3_endpoint_type = public uri_v3 = https://keystone-public-openstack.apps-crc.testing/v3 disable_ssl_certificate_validation = False auth_version = v3 [auth] tempest_roles = admin_username = admin admin_project_name = admin admin_domain_name = Default admin_project_domain_name = Default admin_user_domain_name = Default admin_password = 12345678 admin_project_id = 04f446f62a0e4f12b4fef666aac121fb [object-storage] reseller_admin_role = ResellerAdmin operator_role = admin [oslo-concurrency] lock_path = /tmp [compute-feature-enabled] preserve_ports = true dhcp_domain = '' live_migration = true block_migration_for_live_migration = true console_output = True resize = True [network-feature-enabled] ipv6_subnet_attributes = true api_extensions = address-group,address-scope,agent,allowed-address-pairs,auto-allocated-topology,availability_zone,default-subnetpools,dhcp_agent_scheduler,dns-integration,dns-domain-ports,dns-integration-domain-keywords,expose-port-forwarding-in-fip,external-net,extra_dhcp_opt,extraroute,filter-validation,floating-ip-port-forwarding-description,floating-ip-port-forwarding-detail,floating-ip-port-forwarding-port-ranges,fip-port-details,flavors,floating-ip-port-forwarding,floatingip-pools,ip_allocation,l2_adjacency,router,ext-gw-mode,logging,multi-provider,net-mtu,net-mtu-writable,network_availability_zone,network-ip-availability,pagination,port-device-profile,port-mac-address-regenerate,port-numa-affinity-policy,port-resource-request,port-resource-request-groups,binding,binding-extended,port-security,project-id,provider,qos,qos-bw-limit-direction,qos-bw-minimum-ingress,qos-default,qos-fip,qos-gateway-ip,qos-port-network-policy,qos-pps-minimum,qos-pps-minimum-rule-alias,qos-pps,qos-rule-type-details,qos-rule-type-filter,qos-rules-alias,quota-check-limit,quotas,quota_details,rbac-policies,rbac-address-scope,rbac-security-groups,revision-if-match,standard-attr-revisions,router_availability_zone,security-groups-normalized-cidr,security-groups-remote-address-group,security-groups-shared-filtering,security-group,segment,segments-peer-subnet-host-routes,service-type,sorting,standard-attr-segment,standard-attr-description,stateful-security-group,subnet-dns-publish-fixed-ip,subnet-segmentid-writable,subnet-service-types,subnet_allocation,subnetpool-prefix-ops,standard-attr-tag,standard-attr-timestamp,trunk,trunk-details [scenario] dhcp_client = dhcpcd img_file = /var/lib/tempest/openshift/etc/cirros-0.6.2-x86_64-disk.img [image] image_path = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img http_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img http_qcow2_image = https://download.cirros-cloud.net/0.6.2/cirros-0.6.2-x86_64-disk.img [enforce_scope] barbican = true cinder = true designate = true glance = true ironic = true ironic_inspector = true neutron = true nova = true octavia = true keystone = true manila = true placement = true [identity-feature-enabled] enforce_scope = true api_v2 = False api_v3 = True api_extensions = OS-INHERIT,OS-ENDPOINT-POLICY,OS-EC2,OS-EP-FILTER,OS-REVOKE,s3tokens,OS-PKI,OS-TRUST,OS-SIMPLE-CERT,OS-OAUTH2,OS-FEDERATION,OS-OAUTH1 [load_balancer] member_role = load-balancer_member admin_role = load-balancer_admin RBAC_test_type = keystone_default_roles enforce_new_defaults = true enforce_scope = false test_server_path = /usr/libexec/octavia-tempest-plugin-tests-httpd [volume] catalog_type = volumev3 min_microversion = 3.0 max_microversion = 3.70 volume_size = 1 [compute] min_microversion = 2.56 min_compute_nodes = 2 max_microversion = 2.95 flavor_ref = bfd0072b-46d1-487f-b171-4f37d791072f flavor_ref_alt = 7379c4fd-49c6-4f7c-ab2b-1242632f2408 image_ref = 60dd9549-6a89-4d34-8fa5-b0c78be96038 image_ref_alt = a7c4a0f8-8b3a-4006-95c1-54b6c466c9a0 [placement] min_microversion = 1.29 max_microversion = 1.39 [service_available] sg_core = true aodh = False ironic = False ceilometer = False nova = True sahara = False trove = False designate = False panko = False glance = True barbican = True zaqar = False gnocchi = False neutron = True swift = True octavia = False heat = False placement = True manila = False cinder = True watcher = True mistral = False horizon = False [telemetry_services] metric_backends = prometheus [telemetry] disable_ssl_certificate_validation = true ceilometer_polling_interval = 15 [optimize] min_microversion = 1.0 max_microversion = 1.4 datasource = prometheus openstack_type = podified proxy_host_address = 38.102.83.129 proxy_host_user = zuul prometheus_host = metric-storage-prometheus.openstack.svc prometheus_ssl_enabled = true prometheus_ssl_cert_dir = /etc/prometheus/secrets/combined-ca-bundle podified_kubeconfig_path = /home/zuul/.crc/machines/crc/kubeconfig podified_namespace = openstack run_continuous_audit_tests = true [whitebox_neutron_plugin_options] proxy_host_address = 38.102.83.129 [image-feature-enabled] import_image = True api_v1 = False api_v2 = True [validation] image_ssh_user = cirros [network] public_network_id = e4e36f0b-5d81-4267-86d3-3c3d6fa91790 floating_network_name = public [volume-feature-enabled] backup = False api_extensions = os-admin-actions,os-availability-zone,backups,capabilities,cgsnapshots,consistencygroups,os-extended-services,os-extended-snapshot-attributes,os-hosts,qos-specs,os-quota-class-sets,os-quota-sets,OS-SCH-HNT,scheduler-stats,os-services,os-snapshot-actions,os-snapshot-manage,os-snapshot-unmanage,os-types-extra-specs,os-types-manage,os-used-limits,os-volume-actions,os-volume-encryption-metadata,os-vol-host-attr,os-vol-image-meta,os-volume-manage,os-vol-mig-status-attr,os-vol-tenant-attr,os-volume-transfer,os-volume-type-access,encryption,os-volume-unmanage [object-storage-feature-enabled] discoverable_apis = symlink,versioned_writes,slo,account_quotas,container_quotas,staticweb,s3api,formpost,ratelimit,tempurl,bulk_upload,bulk_delete ././@LongLink0000644000000000000000000000015300000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/allow-list.yamlhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/etc/allow-lis0000644000175000017500000000000015133740601033306 0ustar zuulzuul././@LongLink0000644000000000000000000000015600000000000011605 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_results.log.gzhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_resul0000644000175000017500000147045515133740601033555 0ustar zuulzuul‹Áoitempest_results.logÔ{oÛ¸–ÀÿßO! ¶˜v1rüŠó¸›z;™i0½M‘vîÅÅ (‰¶9‘D•¤ìº‹ýî{IɲcÇvKœ0‘(YúéðuxxxØïöG~·ç÷»^ïì²ß½ì ;ÃîÀ;ëz7ï¹õMs*•÷‡ÿÙû]²lR¥D<³‰7f õNfDœ$,<±OxN39ecuBUT¦vð'ÿÑßøÆáú; þÄLF|FE'OŠ Ë¤æ¸£&‰c¦ÏHRÒðÏ¥7<õ>YRóÛK/$"dÉ|´ÜrÚHIJ˜ŠÖ1b*Ù$#жÈ0IHÑÖE1¥Dµøz&xÆ¢G¥0jãž.¤âm$%“¬HÀÈXBÚÇ€_ ’hŽ-g `dT͹¸‡> Hú“y`ߘ뭂 *УùÔ™1âÛ7ø­ FÑ„¦T‰Eë¢ü™ÑÖ)f êѤ}Ž9QÑt‡pÞÇ”)ò¯¾­Aû•ÜFÉœ!úF¾ç˱wÀð°4öÂÅÓôØÆhöPfcÙ¥Ñ6²‡Z{ÑË#ºmc {(¸±ì¥å6F³‡ªÛ ËN}·9–ÝJoc,OÒ|¤Û­þ6sÜÕ~Šps8;µáÆPöQ‰ƒÙG/næIÊqóxnaíT“{]Dùùúï¿ÿºb\þ¯gþç%|s0#IA¥wRHc¢ÎjʳAçâD‚ýœD÷Pä — Ì·žDãI'_\öÏ»Ãþâþ}!ʪÙ„¨©Ž,.Ÿ‰ìô0²ˆ§Ð½Ç^Â2ê1‘—ÞŸŸ et(J5s€?0{ðãs!Ÿ†|õÌÿžé+.ž"x¨õÂÛôïêÙJDïìI`z.i3X…ä‰_!y!"ê’xcoë¿+ï¿k¯éàkL;v›+ÙùUð"­”ðxø' kP^÷ëÙ8êžÇ§çýhØýŸ#UoÛWI‘¨_žÐMäƒBCÒ/ùÕ¿^ß½ÿñ'OŸTurÅ«“/9‹«ù%! h"éb™TÄò ;PèðéWuÀ€D« ò¤L÷õ`£´÷5Û´ý5¥~7™°¿Pp…%ƒe Hxù*aÏ®@-rZqÅd![Fch][2UhÙñkùv4Ô1ð9 ê…­ìT]´°–¿$T…”¾’/SI#ùª;€Jÿ2<åkµ)#xœÙƒ?^¼œ$<„|°zD€Ý\_;-$pL3ÅÔû‰/ËÞã•„wjEت„´î[ɧÙWÛ¾Yô¾üøÆèF— $gDÔ2ºQpŸ5s}Gó‰~¨6—¹ 6“¼}?öúîîönù‘õl÷«VêȲK¾²ÕÇ”<Áq\¥cž–éC :2MÁ@wYßj7Øß-“ZùÒ”|Åv~ð¬"Sëä Û>˜dßh†«`ýnKd9¬ %"æó¬%Ív[&LN*Ò-6JBÂR¦‚°R=`;v~vr™V̘#–\oîn>ݼyý®u¼Íš_[b£0†AÉ03ÙJQÛÊf ìQV{¤}¾:9¥IOIó„ꉆ†ŸÛÐRÛãp»èÁµ±+èIT ýlpv DZ?¼ˆF|ù$„/éõ‡ýÑ ?î㢬VѧPNÅ T-±Rd](+mc½@Œºq|q:¼ðGäüÂƃ¡>&§~ØÎÎCz1êÎA_)¨ZŸECÒŸûçá€øÃnwä_œF=ÿtŽ¢áh]n»è8qZ®Ñri]½òú‹Ó–ÑØÄ¸–1j’Sn&A\(«K4k97pn eAÙgf<.‡¡Gæ:Û͵¥ ŽÚEƒñg¼æ„©ãL±=kÂø¦)Óv±pBfjNÌ€Àq)"&Ô´2P<€NšÅÈ囹íÒYý5¦3fgÚlfÎâ°U2L‰*õi†ñ¸C”"Ñ4 Y$9 z3CãYCm _6ÇcPl6£Ë$7±y4•¸ -OÈ"Ežs¡šz8C/aÒ „¥0úʦš9)ÜhJ2PÇ*Ó3b=?’'qÓ…ô`D³€J@}rPò„¼PpÝMļr>§"HI¯Ki¦Ü,ñ4Ê­mûøÆ¡lLÞÛ‡;™ËæoP-8©5=îÁbí}Æ_b¿Œ)ö­l…,˜,†Ž§h¨«¹8 môcYn”&'!kúH^ ý·^¥¦ åøÓëDL©"1Q$hN‹¨“ÚõÖs ‰ñÐcÎÉ2(Â8@‡eá:JHeT¸Yð}sMFS (d6'¦¡—z õó«_t.Àµ oHNBôïdT./Þ Ù÷ƒà9N¢Õ/|„F ³–Çœ½½Þù-¸TÝÇxMOQ韧.q¡çÅ1hp¯xö]཈¥EZy:ð¢ã{€îÇCõ/ ‚›V”|&ZSûÒ›õ£m®.²ºæÑ íÃgêîÀ†–4í&–]•|íÀY/?JPʶ‡µ…’¸†åÈ`ÃýÀrÁ¿.‚B$Í­ûÙ†VfèCÿãHä®gnÄby0aÎ КI½ãÎß~ôoÞ¿½¾»ù„ó»pvýþç·7ï?ùnßݼùw™ú¦_}ð¹y÷éúΞß]ÿóö·kSz ø=<Û^øðÛ=út÷ûÇòñoþñáݵÿæú®L¹}ýû§·åÓ¹þùúîõ§›Û÷õ«½cO/I<šqÎú›ÕÀuÙÿ•Ô§+ nf4ñ48Óy5X+ŸT–ÏP–\¶‘<)ïn¶¥¥E0§ެ»¹ŽÖšA!Aëª6`:)Ð*r8‹ófO$Ó˜6jî?¥iaô€Âîqâ&«ž9Åx»:B"CÿsGIul‰vK$zjtH¢+†Òžåh¢møIhMÁ…Üž¦5ûp=OÓH€šÇɶ„§Ñ&x¼¡U6ž)耡™3»e}K¡jvbú0îõ>›?äèÊG¿@¯Zƒ¯¾àKÄçzP$È|ë—̦±þ“Æ÷úoÌìVFöâ×£àè±Üe¦Á83óik‡)ÈÛ Ã¥+}'bBpéG /âNFÕI·3êôOl²>ñ¿ž‚ÑÐÇ|…®xÒú§é2´öýO3= îA¥w$0tssò»Ù$®™dcŒýQk¤‹~mKP†ã‡e0XÏb[Á9h0ü«ÞáÝ›õpP+=èê·êápyÉD¯U00¦ï&³ƒÙŸªíSç,I´]¦ú•BKn¬2+[°š›ÃÊxÓyÆaôcù¼Í8ÓÌrªÃÐlMæYimh¿oa´›»ØQ´] Ý”8­:,Õ.Òšü{+Дð‘s¦¦Vã3Çrú¯¿Þx)©61éˆm˜üO).ùii®´/ôLtT¸‡d |cÂZ”DD¸Or¤oÊøü9ëÊÙa™½”\3|žYŠs¬DY~õå F.ƒ‰ntq ®‹[¤ !ØZhÒý¸ÚMº‹lkhR{C»t¥ëU S9õ:]üï¤7ÂQPyö¹]ä¶cnîâàXèá²v³¡ êpº]Î_Û áÊûßÿsl–±h5[Ñ÷Ïw •¡ðm~F,¦ÍëvzݲZ¸Å˜y„f¥JÿÜ-¶ÙȈPoJÖ»ŒÃóËË“¡{uކNáIÐ `à®ç›Q^vñŸ¡RzÖ…ØèFãnèŸÆç=4ñ3ÿ|üA4ˆGcrÑ;»è:®÷øùñ‡ó;°Z þ¸ KNa„ùt!YD’Jqp¢Ê"„Ãeº!³}܇Hƒž/}=ÀÔ–i› 'šuÂFmú IøœÆ~yGN˜Ð¾B¤PÜÇ«züé+žsøì…¾d¼ôeÁ7èQõæòF÷óÔrÎýL¿-¨‚eèôLú¨øÛ•Ze’™¿÷õšâ ·•×ïéý0õ-ôkÎ%Õ?ña”<'"} ~åYnn0SØ>pÙsA ™X¥è*‹g&„‡¿ôÈ׉VóYþàU1•‘`ù~·*Ý®»ô¹À¸ƒÒÙ[̯MšŽ.w<©~Y_µ¹Â O’rÄŠ úâüI"Ü&JÏoèöËÊÆŸÌ}4)èÍî¬x¨°ùЗÌXlîû©*j‡þ\0=÷mÓt{¾±ü”Å0ë×ñRNà•ª•„vD´ºg•œ’¨*ÉÐäÑ =–—qeº_®Li@K½¨.–ûúv¯æ­LµÒr YVŠÙúº*Æ4®~^N©ëÓñú,¶g•è¾piÿøáÜ×ë‚ý˜ ¸Ù~¶½b]¥¡xOð+Ë+¶ö•§¶äãá0' ™bDaŽ‚¾”Ëò ’|t¢„6Y»Zꋨn׋éê…q²¦L—µÇ\ÚˆèÞ|•¸¼Ô-BÈlÏè2áAK§SË<¨e€„-¦ÏÆPlT4ÕÎ’Šd1TŸ(%üò¹¬›ËîÚãý “ ûí&ꦛnA[tZêõûLi%g‹Úê=&e’ÚÝBÖPhÄLkìc”>_4÷?^Ì}%¢|öŠêÏ]¹°ÖäIÜ„~\$þ4C€ ¹Ý ××VI[ íeû"¯4ÕÅ%®\¦¯5aËŽÇ7›ŽúÜäô*¹"¾M=’j$%Šì¾:¨Jó± vû¥‹``¯Ø®?I\#­L,oÈû@@–ÏFMMÅ<-(‹;”TbvUÛ\ì–zØ&r²»¬e[ÕÐhãPD«à˜( nÔjÚHÖ‚ÅÆÝu‹úu\Í„s4Ï¥›ÒEÎsmEhnIm)1»³¦vkl./ƒÁè½_€áŽ<[3èíä*û… ª±5Ê{À娆˜ñ͹pìË¥CG׹޽=ؾ`kÞ% °~·u2QduõÍ’ü¶Zµ2Éx͹‹ÖàRó}Ø ¡EmmNÅ’8Á†1­ô!˜B;¶Hˆù´ð|îå,§³äoއןÞ^ý'þÿòD†,»Ô°xô7'>cÝW¬W±­d:¼`GD„!8ú ɵe,ýæ·ë÷?=´r–'ýcÛ ÷†ÚcVì®n»Móé‘Ñú£mY£vü^n®‡kÔš(}“m[£veo8v¼¦xµE^ëáÍȼU²m«³sHÜÁg½Ë0ÿÕËØ¬ØiRlq°a©nò_}öd?jyu¹+ôjs È·RƺÝ9k·roÙ|W£µK¶m9Õ±}vv`IÅ–?PsxͨË>¾ùxsd¶Á£l3hq`TYm!»d»Íiæ}4Ñ Z%4µvm$×Dï»7—qÀŠâÚ°<ܬµØ×mbíãNÇ¥¯ç5}¢½q´S¦Õ\AüÒÄh±ú–¨¶Í“>Ÿ”¢9…'1©Ðãjé•-ˆJ·‡‡ée·ºœ¶·è]tK÷ŒS^°¾5 AϪV“ËŒöæ­ÿö½ŽVyëù8›[þbi‰²"™*Ùô»ë©E¶’®Ý:|탷mÒWn-$|¿Ù4Á¦Ø\\}¿M´{N£“O9ñ³¼ÁøÄ kifõÞ¼ú¤¼1e-—B®?2‰dëÆgÀçerL×SÑ/ÊĨÓÞvòêm•È>;UYLioh‘÷lQ‚s¹ ‰D[V}kÎjF€Ãƒ(í>´¶Ý6vû˜æ‰×ˆXÖ-¤Ý<•Æ›öœwPÊkÐî£Ú˃F·{;wm¨ê¤HW¦n¢ªXk¢“„.—Á¿NãYÙF`Pïf]© ¤ž Õž(rŒûWÆ4¡êøöž§ Ó\.}åX6q9ç­ ƒ˜M0úßÿSw®=®ÛHþ+B¾œ]`l·Ý×Ó@Èd.°H“`‹Å@ %Úæ´$*¤änŸ ÿ}Y¼èæ‹ä>U™`·¬v?¦x)«ÞÚ¹SHi²#«ÑÃÁÎ0ËHá Æç:ÙÔhùêázO ÇRˆìkKº(¹"@;>Æ ´¼&¶Ž&Žf[ì‰Á°¿µÐ­vlS,hM¨í9èå $8Íð©§Ó‹Ö=T­ŽV£4Ÿ­ bK ÕME§“¡™ó›°Êïh>¶ýCÙÔ4³fÉü{F‹(KxªVh¯Ù"–ÅU®f‹©d[¤GØÛŒB¢÷f»VHt›ñ(Úuê\}› ú¡¿›ŒçMk˜QN2;J ¬àŽ ö¥ÄGÅÆ„²ü£1[È2ˆ'PÛO|OCù`§®‰žp„Ÿ¹f0[J¶Y™úœ¯@ËÔ+¯]n8“… J¶Œ–…ðšÏ3M­HÙ×Úµ‹®„}° ÝÁMk™1>uù¦ö¼Ê9¦€°f¿æÀç¡l{Vˆªlˆ—fŒöZu>/&´/ä"P<ÑV½¿öîvêfk£µv¸ÐZ;H\h­ $.´–±Ž­e«cA{¥Y˜(Rl­Ö²Ò½Mlw7ÃØfº¯f†Ö²„‘¡5-a\h<*ÈžŒh•ˆ´˜®Ë­² ‰.´¢Åb¥ÇœsXUNË}©o˜šïdö«¡“~¸“™/Ár~ûyr´S™€¶šídJæd#ÁèE XÙOÝÿ<óîŒ ˆt˜hpqª§¡A;îiXÐNô4ˆ’ƒ‹?NÅçöx¡½è’jtT}â‰4´u®'­Ìs¬4ß©!+Hº|å:MíóvU*gï /–]ÈäC¨®ø(ÞÆ„^«Ó™_‚ÑÎZ6½—.…X.#੟ö99O¶ÕGx­M觪ÝÝ™dÿ8“ç«™{H ïç:QÍ\«6Œ-Fy‰ìl5s—ÉéÈÎÊö¹~‰–â¢H‚“†Ì„OT+NA‘I!¹þï_Ó© ™8œÓqjhÊr³aï'¤®l<ÈU@òh,ŸGse¦pƒÉ×ð´òß^ǦË={òO\fÃØ±¶œÅ3‹þ!´etÐÒ‚p(h%ªh°U×å6\Þ?Þ.ï–¡©­[jÂÏ·ð9!²F¬N¢ì4ÌI±ó3-^AéÜ¥} m•(„V9»)æ<1Ú&ø¦åµ•³Õ؞˃Tï׳Z²s¨#â­kžÉ–†øÅ0OÊ-Ëæ&Ñ­ÖüüÈ~_æ*³í!¿r8è‘W –^†ñ4(½Ð¨‚ ­-ˆm °ù@5ÅìmÖE†þû‘ö“Z¯aá2:tâN¢¦|¹hþ‰ ¬dõwæ’&¾ý±btûá\­ý—–=¿™-"G [Xúò ÉK –ô…€Sí—›žÑÔ8a{PA¯…F—´¿»Ħ&©-…5œfêJeuø1z‡ CõCð›ó]ÞËCÿ‡¥ÌÓ VeZv\Oåý4×ÿ@n5¼P6v^õØþEOGÝàôž«ªGeÍ5¸*ÇbÁ³…ÑfñÌ5„®ºR§ ±<`ýº²_ p«˜’®®!Í{3ó^«9JKF¯aA¶æ|@­Pä3¡ø²•™ö¡ŸÖœVÕBã¾ì‰!hÔ¾hkÚA‚v\~i|Ãu—­t×ÉÆÒdº4·²Z«Ãa¡;QRËÛ7¯åà üyr† YNÌSÂt%Z4µƒf—\\l'‘“‘SÐûÑä«Z6e¦õ½Õd¢Å “jB_ö¡xÎ…µùZ|ØO·™±;Ì<²”;]j=£IKóÙQ™ÃÑ+S !WsýB4á5ÑìR ­S' Ú> ê+p¯LN¨ÉHñÌ$'ŠØŒøtËžÀʰ-ô%¼ôu yž™€#ØH$Óòø”Iæ°ìigŽó1Åõ“ÅÿOHlBQ´Nž®S´]û²ý€Q“°Ó†:õ }g…1ˆuŒ‰b ‚AX›Ž&dOVmÿõ‘† ©î€‰ ñU-hÊlòç6ަæ»-]al<)yÄôÁO=óÁ¤79˜S|3;‘J/mö¹M ¤Šª½Å^³±kÞ÷£I ­n˜šÏƬ…º ¹‘ãAòTš2S¢’š€‹ ‰(¼<á‡7+X³Åýä`ÝϦËmÈ+툈ßFWîg´fgC´~²F4@G?@NãែOù;"PÓ»¨LFR ¥ÇLШ@„«{©¬£²ûÉÎèôè°ýbr¸ÓJ=žhNDÁ´[Çs0Ñ5h-`Ãã+“vš¶®ŽŽ9&f…w1²O9¯FË¡9+“¼1 ¼°­z٨ɠI邆P!*¡ÒO5Ù!tÚö~6€¬^ÞÛË)’Ǫè¨V-nä.Ô¥EOÞzN¿ˆe{µóââ`2¥p´]™åj)eòè0âfz²™¤aÝj6ÖÏ‘z?ÜÛŽ'ÔXO±g¸žÏòp„æmsÛƒv¬“Û“?½îj>몆¡«ýQh9­ îS3‚“ËÜgÒåõˆ’o ã @ü¸ Qf¯Ò·ðD?'Ë Áµ;ÄøHYðЕÛ=8Ñ{žbÏùPÛfÿC´®+1éÃlßn4 f­Ûp1C^¡ÑdEÙ¤Ç_‡ÍnXÞ]Ù>xðwâp%æNÑ e s–y ‰í2¡4÷áÂùjRÄO¿õSÕ¤·¸)ÕdZ4õ3jÚf®6PSÒE²¨ù4å”\If«¿ýºz u7¦$ÏM{«ýF»Šð^ݶW¢¥\h4ÊbY^ÐETQ¡qGu³¡Bk§AûÈ€Œf½ð,–~”ƒétFæ-ÿùlÕ“EõPÛ)nhšÎ®QfÉêd·«©€r£ö::Ü#Nhd‰ÓŽdoòWÁ5ò¯7¿! Ë/xÄ“zI{ €–Æ#ÃQ20¥ðÎx Ô(ÔÀ bƲ ÓR…¢PÙN¤cƾ9Fæ$.½Úž=hœ§%è_Ë5¤p©eebÀü*yèÁ×=-”e:YxÐ@­¯.Ñl5+Ø7-^ÕppÇßUÒ ‚ñp®2‰?'ÛãE¾MBö\×x b¹úû¤hædô¸¢…¶OÔ“žAÉt.g^¢/£žP«V[¸a69aBÖ4‘§æå_›Ìü§£›íkìö¡éUöhˆ N­›Ÿ‡ Õt…èøTOó¡§yNsÇÌj?Á¡Ì&áoá:Q«‡¿ÓýÓe27Ö¯+RÝŠc×ßìÁJŠSPScAˆ ZYIâ·jÕ00AóÄV¼s›Õlüyí\½»Ñ j á:Qêë%¸¿™tLF$'k–€PºÞR;6‚§¡ÌH.w¼p!~¬ô¡¼‚ªé­¡¥œ?LÜœr Ÿ)™Zháœ7ë$OüóP:»ùq.h»¿ý~÷ýß~BBXìLUÍê-$ªïLIËsälæðnŸ: ÔiT¿ËÑ'ÆËdf6´& ßv43%¡Ô0&YtðAx‘5†5//‹ECtØþ*ø¤|6æÎ,-Ð+‘|sße4½¹‰Ôós‚qSÚƒ!ûž‰ ëù×Oq™¦‡OÏú‰ÿ6%· ˆh¾{E™P©¥£ÝÌhò¾áÝ=é{¨ZªÏqn¯w|Ô‡›¨,? š)Ä?Ÿ"†µ¦kÖÁF)xH´¯7L”É–œiW ¤útëÌߘïLñgo>ÖË|Æ9‘Jü´“b±)ÉXB¦‡Óõ%íâÈÍhvp38`é;gÆ]7%1¤³ƒ¦í‰¬ñÕüéiR4¶!ÀJÚvômvZv¾ÕÆ&[^$Ó:»Ö§ÓžY<ì\°uÍm_§…—ÑÔŠåŠÃÈnMùO£×óºÌL°X[2°Œ«Y€½Ü—áNw¼x[{°Êì’ †oÆ‹DŠAE`Õªä‹Ïòýôv2h36&Lú^€ƒÛ0ù žèGÛqž¶ýV},ß?tZ/ÀÂf‹£—™}Q qT-Ø¥ÄWõ:m¸æÂ„ÌTM)‘áò²éwÇŦkÌ'nѱGjuz˜rzÝ©(IœRI•ðå±)oû0)yAº³Ž—ìEk”:@$Ívâ Õc5Än7ÚÃc5h&\p¢¥øJÆj¶1RWÈHË^§0ºúÑÚ# š.*¤ÏEȯÓíî"šîvn Ò’òàŠ€V¼ ZˆC˜•éZ  @SsÝø}ÖfÂÕ‰Žò²g€¥¬O(%¤³{cšC€ã1¯ UjŽ!Ðì`Hú™ïp"`^C>{ÐÊö92¤Bp5Â(¡$+sOëçE:wº¡Ý}õ!4Ü·tÉd¡:!Ó0¦úÏ'àŸÛ¥J;Ã= =œÉ&KVÛ·9øU䙬ž ±à_¡TÛìh‡+\áIJ2®°ø^Æë,åw„õðp»šMF;š’vÂÉd-Æ ¸Ô(ø(æÿüó·ß™!{ÿ¼ÒƒZ¾2Z Œ žŒ8 Ö„ÝNÕ†pÃÌÝêP¦ùNY²¶ëbO ß.xT=#3{ç\]Ã%†UGÐw´ˆîj»ª›Æå~¸–ÌÅ]®Ë¬(QÀ™z&°ö Ø^ÌÀ±­0ÃÝ"‚;JÑx îG€¸‚¬á¬ð c6Œì(‚»3ƒ£`ad”ÏÕµžër…‚Ì™ ú¼Ôød!ºÀæÇ3{ì~o¶ÀD.T“Ú4tór‰‚ŽIΩkzUxÂg£M+ÿ­‘~ÃG›T–XÙˆ®ü Á[«áÓsðéç ~4vM𭹘[çº:š¹´_]¾7(v¤”"ƒ‚ÈWHY þÍ×kNDäe¹SÕŸiÍ(øÄ¿Ð\ÐD|’0"¾Qužè7MÛ åõ«ùþçÛþðý¿:W¿ªIë}~4’èßÐlÃÔ‚ ono#¿ <*Ðý6ø¦õý¾ ˜ âúÁ¨_@Ñ…ÿøŽg’',Öï¨6àúquvS’˶óÿœÁ÷… t[)9kõ¦ÚdErØ6ãBŠþŒM Éó¯{0Ç_ÔÏ)Ï0¼wгTcòȼ ë4=>#žæj.Öï¹g¯Í_à,£Â};›ÖùJpsµ_-xÎòÁ}7x3¨l!÷î<øQY¼|óü¤ºûý5˜é vJ‚i¥ý‹óàÛï~þþ¿ÿþôó·?üåÏÿ«îÿù_¸GÃm¾†Tÿµ=oÐûüî¿sÓÈÜOC¸“uØÙ @ÊßèãulMñ]d§ÆÂ³]¡‰3þ/OçäƒÐR ‡¼áìí;±X˜®·š/ç7‹Õ6Ô‡ê&~\?o>oŸo6›ÍóZhŸŸ˜¸Wg›x…­‰WgšøQ}Ôýãó]´¹y^='lM\ûs»“½¹j{Q:ŠiAªÜ³û¨Î{ |8Ç?ás[±ÆQˆEÆ@'HC„yÞú,ZêÛbç!c`7ïdô“¤AX2Êá3«¢O ¸Uï;V7ùjƒèÎ +B­qué¸ÈÜ7+ÙlXäáÔh ½lùþB—¸åÇ]?œÑE~aåŠÖÝÔÍ9œÏΊ9Ñӡàï4jôPý ³<)·,ÓZŠr¶+Š<Æó-&è¤7ƒñt. Œ&O{ŽkÑ2Îs_aÿÃØö,?müÆôyI>¯žïW·Ï7äÆƒñ;¹Ik¶K/;·K„pf‹µÍ\¼%‰zø)ÏXÁ…WÍ ñ&wMu­Ÿ¿ûFÆÇŠñР@´Ùèn\ÃN<œ¥Í ×9ÍšÒ ¼±Ì¼âm_ŽM’-j’M%þ¡ºnJ‹2YÂDŸkÑ?À´ ©Ô噇q~¡—Î!Ì]w¿#ï#°)ËtA’"‘(· 0â0WÐ" Év«vÑ&™º0<¨¡òœR’á`Ü ’•êù áJ¯YTE³¾Q^â +v‚ÊOª²VË雬,¸ŒH%gX& 3&LÂÔÆƒ2PujΈ²¦s­ ’XÜú<ë~j> #e¢%øØò)àÀ)¼¯½r?¨2< []ŸÓC:Ò•\o„ù ë'kØ2$§^{Þê<›óõ éç7êŸåóç›±KšöcÂ$Ccþ–…ݹ<°î“S‚„´Í)t-©Á?ô¼XÔ-z;=«c”vqqÊbjÎ>È_4tv9¶xF†²î³c xÕm«ˆñv#_ªàÅ,}Yzr» Dë„Ùy ²;ÇgúÛ…²pæ†Iá&/ätŽL½5‘¦öD™ë…¸Ñí¡æôãmÙéûRÝ01ž{qØ´|š¼é*6À¨ª#6ÚÎÔ²C©ìƒÖâF¥Äé{Ÿ‹Ç‡ ¯§„ðI½ôB¸äýüq¾ú¾ÓíÔ€YM –«žWæ[Abz¦/NÝõµa§­Ê{^Î2ûÑR2zolS€`+èÖy2ªîzÑ´ÈJ§ß©w;5X™…›2IÚºQ~ܼ}l&‰««f¢fÁöÊlžš®yŒÚT€ñvžÚG¸çI™Òcc4Ù§&£g¶œ†P@^YD è„d$9HV99æ„Ç;7áaÄ2Èèªoñ1nõ) îvÜf<Šv¬‰°;îÔ7¡sïK8\ÔúÆ8·S1ò×'ï¯‡Ìøž4 çË%>ÈZ'¸é±Ý£þÒŠ5x>@üBÖkön]p>‡ÐV¨–•*[Qo˜%/EÔ­WS9Y'ä9…©´†ä1Û0OŒç0Â×rMͧV¤;Õ„‹/e™,摈)QëP¦à‡úv,_@W°UÄž{Wí>5_}Bµù%ÎB]>âÕxÐôhnûˆgV'qVßVwæ¹ÜGxèêbC9úyßÃhê%T[ª&%ý›©ßžéß6Ú}­+Õ«9|Òo/8‰#¢¢"ªõzBãD7ðAäˆäÛ<}øATè8yB2ˆ(¶†­ &Ñglª¿õ@†Ã6çi¨.7Æ·0R7Vñ‹ºOµnvo™Žl~A{#kíêçYõóoH[ËI›¹àM½ÕßÀ&à%PöÒ‡ 9y¡­áAêɘ¾áZ°x -º3ú>2çÓ‡9!™> Ù6ÍÃ_J*D˪ÿèøñåã Nî²pÔð–¼ò¨ÔWfËyYu"”ìÇ.œœ©^­Œü]µT-1³¯¬XqY¶~SÕŒ ¹\aÆ¢ðu­š™n…¯J ¿;»2–ÿxðe _9t²r—jˬ`{ÿ¼)êFø¿¾kÎ2†óëd<¦PųkuŒ=V?®Õ²h¹Zaf.³Œ&-fØRíCyáÃÍÒö ƒ(áe :ì•hˆvªÛ1Šíj—>¾ã«¿CC¼ÝƒÏãÃ¸à Ž%ìt"5M Š›ûÚÓóWFD;’ÝŒÎr²ˆÈt¾Œ}«ûuF¯ñá¯#ø^ë|ÇNÈÖpòã|ºù0v×ïïÕéÿ;p³l¯fI.'΀#6Û’Rx Ö¿ ÇDj À õ/Ïi‚þ«6×dç¼í.Ë4ŠÇ^˜‡oâmUþ(+DÏæü ”sjÊz-Þý5ÜVÌ͈¿ù«—ýQd£Öp¬r Æ÷a¾iÅ-1³î-k¾_–ð£¤ÆŸ 5à Ð#£.¿ µ1 £æÌ‰^Í—«Û»û‡Ç'Ô¬þÖƒr¾±,V³©® ;ºnk¤«c•ÐІ¬Û¸'hU–b¨–"8¼tù0®]¹¥9äÁnK­£ìA“©¿´g¢wo¡ o71‡/AMŒ–’÷ÐÕX‚ci»Ùíòöö[ÌäkSšDåU ☴\MfaU‡ª¤Ðn‡ ÙI¤žÙP ‰wˆé)isÆE‚&i²òݤú›ìlhšV›A áÌNoZ½B¶0á¥Dëxý›—Ï¥L(L¤ÊÂTÓ±3:ßn™˜²Jgodò yÔš>ÖÔ1z964ÑÑ$Y†ñ:üö®¶¹mIß_ÁJU6ÉÕHÖ›%Ûu¾:ą̃&‰}¶“­½© "!‰cŠdR¶foÿû¡ß$Q–@z³™ª±€ÄƒFh4ÐÝBLO›ÔP®oªëÜÁ¶Ð`‹3£ƒã­tqV×ïw†M'm4„rsä›ÈÇmþÅœxÄ’2,sÌ[à·Æ ôB9`“hb“â›:ɵôN¸@ ¶Š[Côæ+~P—'J9Ú$2 G2¥!Yì¤(òâÕ˜¡A@4¶[9º†Ž]~¸Wo—Ø1¹×'%«!ô¦`Êk†FÐX„|Ši$¶eã©—`‹ †‡PK5 ÝÒôPCÙŽAkfŸ.g IÑÞÔȇOñd<,sLšQû½=O Ô)kmd±Ð F¬9ô{‡vÚZ[Ø íƒ?Iª½s­7ìuƒ&‹IÇl‡O‡"—×Y+éº4ß§h2®HŽm£ÙÑÝñqØlÍj$ÚìùßžZqRÒŠ¼}3îµãH †ma‡î¡iw¡A“xt]i²îMaSã÷”4]_Ðu>s¬‰Ïhü+â¥AÌM-Rà°›­gÚïÿx D°¡jc0¯‚j7o™ÜŽm®X†œâ$Å9 îòŠ–ÿýÍXñ“K– .D-,§TÍüÊ·ï"÷xR~ŠYÿ/]ô“œŸ©`Æþ kIúebA!¥^=Øa®˜“´ìX)•à"pK2¾‘…í½ô›B'ic8f‘ÊŒ…éÿ6Û\„¦|tgr¾°¥‘Þù ¯n%£ùh-,¹æOÖL\TNÒ>sc)åB7@—6‚«2™Téù!D û ßó·´·ËЬËK¥ÃUß+a÷~µL3Ï-~'“`¥hSÀ÷Ìf0ß|žÎ Ÿ¤~n¸¥ÆpQÂ7š²9`åjv‘ ˜[£ƒ(JS±t‡ûþª85‘‹š6ìÐ4~M>ôíäå”×ux7v·I. ¹ýN'NüHÒä.Mä±Þá ü×µ#ty€ÿó'-™b›Ý’Y!•¿Í¼z!73ÜD¹IÜbî1ñÆwáâßðžÙ{·$Ku %…Ц/{%]•hóÛtNæ•\÷\‰6Ë3šxEê073#d-‰r‚û€äñ iN/ïµ+#ò–õdcOö«÷d¿x f2Efò¾ð<[Äu»¤|RUZ@ù¾VJ(*õÞ] ËÉ%\Êr‡´ü:æ °TvòÒ‹’>X6¥|’‘}7Ï“cgŽé²„Í sfWÒë‹/÷¿R¤„.~&9Ã¥7.¥•%ŒÎP`#ȧܣ‘'´YzÅL îÌœEzYÜ8’¾ö3 îý0%“ÈC)¿Úýƒ‹…´(Ÿ#!»Ê)•Ï)&ì}‹IŠæ9ž/‘1—$ÖÏ‘7ØëI†ƒâÊJt.ÊL3XœLò«è=]¬d–¢0²øwÈCcùE¡0Ä::ÍJ¼·„“¤ÜmI*¾q{T¼C)ØÄ‰¹qýàƒë?"ߤ ÒVâ²Ò”pÉ*3ý§òÖn%DJ^x†jåÍ…›~ød9Ö"\üŒóÑ2ƒy-Á&äÒüÌ^åÌ®ýgïLf‹ünÄÊ œÃâƒ@ôì\bj É£‘NÉŽL;ºß‹c*qÃ*Ÿ“Pí®—·t°É-ûÆd4fR£Òe3fdU28y¡–Th›1šÿt‘¶«’î!´>Y¦ic8žE'ë*Røed•$‰¬ÒÙ¹Ýgô­ÔC™iW”.á<¿Âžz!ߣkÔJg1%þŠY fVÕ¢ ;£,¢ÃúÎÃÆZEÌ6ÊŽtÅiÝE|[̆ Ýü»~BÈ,™j²©÷>rÈ45_¨œ~ ùŠ3Ý€òs?÷«òsÉF:dV¸ Lþ3"§±J­¿¬ÌÒ3ïg×êÌ ÊéAÅ)ÎÆa¶Y Z6"Jev4 Öü‰“¾öˇu‰’²x\þÐ#í[|B§ Op"*P&\Gâ ŽsºÝÓßæL?¡]äïÏ;Ðáôe·dªáùmžŸ™j$ ütIÄŽö¬ Æ€~ûB?X4ûäU)E"oÊb„Jr;™}þ$D³éw,rjf€Á ïßp¤ú–šŽc驤?›NÑ7rtÌQKŒüùKgoá´`ÌMsØ ¡c¬„³ÜÒ%5W´xuÁwd¾B#î§BÆ…S‹Ø¿Å.þøx \6HA¢ØNÝ•®hMWñUó–•û÷Ò©xn9ÙßÜbbP¡ƒ{ÄçM,¦Ctæî „5MWågx2ÆPÊ–©·s¼˜’C_ŸÁ…”*éi:¡tË4,ÜïoGþ’ÿÏ6egÛJí0ÞGd[ YÏéÚÒSà¯QRbÃõM’a)³ÀNL]l3¿Q€s;/ȧßò.–2(ð,e¾WO^Z_ ‰ãE&ñ³2bÈÆ—/}b´|—ÝÉ߃Ð5‰®V•ŒÌ8¿xS#)œòÛlO‘¤¬[Àãû^?ÞêôGúÔÜæðÚ`¹Î¦®ÒS¥wê¸Ô¶êª±üÆÜo­tW½ø¹ffÜasøT©ö‚çók #ů UyÌ/¢QÅ»·d+* ;„FÞÓÙ”s’’U›^Þ¨„B·C¹zê£nv,íG"ÞUÜœY3ó²Áy™3qÜþb©ŽI–/sCq\ÌŠý­X‘‘%½(Šè­ïÞŽ=P²©àôÿÚûa{à¥O® ¥…Zâ;­H¦~Öd`»ÈÔ'ÈS¿œ%¡X+*VÌš^©d–ª©ŒI?ÒBQùt ô—rJz×ËoºI‡sÙÁüÙâãˆÝ”\É)p%km‘}¾ñ]ðª˜+Vxy±ðæ®R7/ÙåmÎ<³9¹šs¯æ1üK¬òÇíÎVC;Å—5 ñÓý q*€/ñ^ùÈO™ÞJÊΞì %Gå;ª{xñÇ5cRÖÁ}£a·˜ûLÐõ!:ýq¾[ ÿ²YbÞvŠß{ZnUhS×F³­AŒÕ:'J¨„=©–™öÊP÷« ÖWÂO  VxP1@LhMIl×Qš9/þpc†¹\¡¬-â2è°ô‚G>ûL}w¡Ý ³V^ì,s%@Mò9­šcÕ½šêflñRÙ@p£­¦&Yß«¦Æ¼"묧çp¿uÊš&U5&ÚE5‚ÔlV¥šÅkZJ·{³ÇŒD¢ Ä¡ÐÅ»<5uØ]°¿RÙ`IæUSáÒ |æšD]•(0æV±Ñž«ŒýðrÞŽ¡¢ŽÊÿDßQ9ɇíþ@ 9Í0B߇«RmÛ5 Š<¯îÂøZ>w˜dn€)©Ù.¨kÔ>9–Ô$ɲšR2€s×iJS›Õ}Å7I´A‘ó70œµ–©¹^ÀãÖhý«†¹«±§7š Áa º£b½ßŠ]þ9(ÞµÛm±óÂ:+;NߨkŘ8æ#†™mÔ{ÃâöËÁÒ·mÿåö­ž"˦Ýð?Y`'†‚œwßý…t÷äŸý~P2ÐöÖä“ÁþZ\Ðã„ ôxÁüÙS´:VÐ¥(ÑZ-æÖ.ÒýŸF7Üݾ-Mþ;Zøèn&Wœ´{½Á3¸b?”içô:”*=mtš’Xÿ¾âó®ûÔXÄ\$Z×Ù[Ó€tŽÄ x¥¤Æ~¶Æ5²Ç­ÐòiÈ4-ÐáP¶hD¨¾ÝÔ'Ê€¬×©(ƒ±FÑ¢ Ãzí‹2Å*Vý@Aõëõ4Ê`lRÞ(²^££Æ:5ƒq¬ÆZÝ2UB ­Õ)ñ­êH ú$†d¨É:%“24OÊplPG©ÃQUG¥ÙVˆF ­ÕfUF7jÖ n&LV»É±ÊÐl!Ì*òI¢Ud ±V–5²­2 [¸Ê°l%å*C³…¨«ËFyW–ÍB¯2,;I¾'êÐm•©$+Cµ ¬ÎFiX”mDbe`¶‘‹ÕÙI8V¯Y°6‹É ÊK ÛÐTkEʵqL² æŒ`°³8Û²ãjÈ¢#Ûr°†ü9Û[$ÂΰÊi”øäP¼©pzðf_GÕ ŸïùßžZqº áé¨÷µ¢û‹MÙíŒ%«ƒIvl÷ÛÚ$òšxδÒçÚJÕ´¡>]{i3§EAàkÜ3§†­ó4šŽp÷»ÓÓQç¿êj I¢Cå6^b›ä˜-¾{绸ý 6ð@AÅÏ7pã‡ïžeÆä»lð‡½J’B“œÃ ¿@J%ëùd‹¸'ÃN7þTdRÑŽÈÑ}›ëó:Üü Ç/lÈ~Ä+u‹àšKÛI8÷õ‚¬h§¼ˆÝØ&U€ÃeÒ.È¡²Á›®” ò0µÝÇÜwQÌãDFTv…%MPÙŒÅi¦;óè4A‰”ùϬipY">uý F}TâL{ý6 -óù¦ÕŒ`ä7 +Tj¸¶ë—MZÌt©Nll¶Gž׳2Øö{rh&Ü–+cÇ×o½^´^›Úë_Ï^:{}wXœýΜ%‚Ù[ð±ÅÄr¥·Øf#ÚÕך2é…µ&¶Yrgõ!ôÝ8#2±K#ì6—-õ\3ÑŠÔ \Ù¤"¸ hÎÁGùh cÄWbù`×IÀîHÃ(‹ˆ·ìÞ‘öë· ‚ ò®Ó§ƒþ­ç»p{ôüfbX¾#ôIüøýõÛ™íNh?9B‡e€ægC‚!Ò.µëÄë·ÑêñŽÐ:¹ æw¤^ 1Ù7¦O8ZOb|; ãsÔx0¿å8£t¡›dÇ¥$ª:p÷Ú¹­†ö~wv0Ò<‹NÒ¶mìÕííõmÒH¹õ¶*5F’%ù\ Îy<4ûm²Yì'¿]ªƒnt“ñ&ï%Iµ´¢¿ÒŠañÓYŒì$ÙïXw30Ѭ/&i`{ #]™‡hWêF¾é>:õH¶¥ØÀNŸÌuìû`SÝ(l> 6¸ßÔ'¡O‚¶Ní¸ø,ÆÕ ®ËÛñýøòâcíðŠ%¿ºÈÆÜ¡R!ƒ+ÌH£XM€bî5Ò+RJž¯»ÀFžÙAƒúíg¿WmE˜>öCÈ`~rÒÐ>^ÿ¢¹»º­L¼ОuÒc@-Ï­ÃF\G«Qá±7Hi(6ÆvÍÃÆN´õRí@­Ør暑à !Wƒ-ÜyÙ/ÊÞà™(s–鉂…나up-8A—Íݹ œ-RO‹êF×߈ÎC„<Ò…7͇û;2´Ôކ°A„èä~=×X^íØøfñpbÀ3 IÛÖ˜tÍéT@—¨èTaðnÜ ›º¸€HÛ½ÖÙ©‘RÊH~7n¼F÷3}ˆš} 3øQTˆG %)‘ öÁ R”¹¢]hrßjŠXnPzkÉ ÜNûÜÿ©Åóp kö´Ö«S/2dÎ-Σ5£ãþ(éÔÆÃ²Ó ¶²QPZàƒkw“»ÇlBþWq­¸U¿Žþl¸”çO™ïb õâ›ZOÉ‚šÈrM Ý”¹5ŽÆ‚DºÉÔìtF½Ik04»­ÁÉhÚštGô×´?2G§]š7m tÙ}Ôƒ©ÙœC xd´Ð„¶¤Ûô†ýÞ´7èœúñzèsʧþ’ŠZ~Še•0Äh©¹QfˆaÇ4O§­!:9m Ìþ u2EÇ­IÇLðé°Ó?iô?€h=2¨3=iLú¨5èt†­Óc£Û:L†Æ`84NQ§^èppD¥ °Ñ`þš“£öéqÍЬ¿Z®› I2_: á՚МspÍ€æèÑšé¸f´% Z?®F;Ö î?Í•ŽäsĶ;®™å™Ö d–T¬p§Sf6JÈ5\+@þ óy‚è«ÓEÚ2W‹äÖ‹Nȯ&f®Ú%QliNjEÖšb„>naâf2æ:æÑíiGsèj¶Æ±N˜‚<™Ž§T°±­%N’š Û5æ Ò<­tz{RÑÑCE¨àz뺑À˜î¾œf$®1GÎ 'ªÿf’յ͆3id@åÓñÔT€Äµ±î†Ío&D/Ô=÷ûÂët¨aÈQ5¤æÜð„nûðFUlyWÓËññ¿zlp"M=Í 7»è3ýnÒý r¬Àú3š…Ș–Iž4’–LG?…ÐA\hj$HI¢”¤UÒõ›ÙCóföx\EˆÄb1E^¬ ’]½Ut¤uRö ø[€sjx°"@bêpav¸ Eˆ‰âFö.…fýÙLh¼Æ‡6ÈD LÓIœ0êKþÖ–ÄBó9òa’9µïïzpˆ&gðbÜ–Ü ¬(–Xqtæ·†‘‹Å Ó…¤ÝÌÀõQÍä6-Z|J>ydîÍ$ Ç6šý|Ë]ꔀàH O+" Øö$:`æðBç„U-n»AŽ×¸&Bä$âæ³‚Ñpt$¦ôf2Cþÿ‚Pæy ‘Ø‘—èÈÈ©!žZúÄU5Å`ƒ¦E ›HC‡_“b¦eD ÆA§Æ¥é!=­XV=ÏW†<ó—Ù¢Ò¾«ûªlE*ãs µSe€ü$”Åý2ó§uÍE¼íÀŠ}MÄx‹è„¹!£(r¶bvþ{· {&6¸@¯Ü2‚c·`ãÏIPAᙎ¡|=C,{óL»fN#´Wp‰]i^qþ3P&h¯¢6½Ò,¢™ñ«,¸.\(;…´eO»¸kˆðL[oÙ‡·ƒ9Ö\Ç^ih‰,8,¦{+ºÈã¸ïÚš6¦Ë"#‘¶@+m‚5bÙÄo¥Y3LJ ”–ðÍiLÛ.¡GwS_IM—ûŠb>lGmf ]ܦŠG*®„m­èzüyÒõ‹¬lÄä`™‘3$¶5›Ñ CQBl¹ƒeª\´6-¾.v®ñôk5\Xu& }k‡ ì~.ÍEbãÁy±SsY0§ßᾉµ9çWÃÓ)¸ ÙßœÕÛÐ3´‘…¶Úó ðÈÙÑQä"²ÅÍZÌÛ+Ol#Ï#-Ã7˜1|È.Ü¢!:h÷УƒÏ×Û¦šp}Ì éÔÆòçq“pA¼LØS©“–eÏ^ðQ¹ÈZ„‹ø¦ƒN+:ü Ðí°Ñ­ú÷ë6‚ >î­©~ê-{:—6Ó¦CBÖ<¸ÁÐ6øøØÍTdÒ´a_/0»Šð\‰Q©¸Ð2l‹¢$m˜%CI°ai0ÏwŸVzèÛêì~Ê Eš¿Ì~ë~öÌ*4–Õz–ZÂ"ÀÉñõ]küù׫Ûñ=œïÒ§«Ïïo®ÇŸï[7×Ç—R/{ѯ›Ö‡ñÇû«[ñ|{õõú·+æSº¸ôÛ"ãæ·±øuûå.úüÝøÓÍÇ«ÖåÕm”r}ñåþ×èë®Þ_Ý^ܯ?˹ÝC/sJVÞÍRr.{Åb`–ö/I,Ü…­(j5»‰ÝÀñÅKá¨Ü‰—ú{à¥&ëHvê»~3çÒH#èavÖüº¹¯ê„eP-v(“€v•)0•´2ÄÈs¸ezÍD8Å&Vªî¯ ÐZ,B~m(DŒ“fbe'§ào—yH´àþyC‘2ßõr$ÜÔh#› p9ÄnnD» 5ÒðNÐTïÁÖ‚,qO£ÀAÍ6¸rîi”8¨Y¬Ä= SÁCc;^‹ÍuºÓiŽ;ì&rH¡ ò1&d±?>ÿóÀþ¸Ë)ÿƒ¾­XÛf”·à»á>²M‘K[²œ›ìÏÂ|`MK„2™Oõ6°ÄËŒB?3ëñ1mgä2Åpt•¾mX¾ï’–a»¡ÙvppÔiÛ½#‘ÌZO'C}8hA¿Ò¥xV{Óeøò›ÆWˆAÅ"ðEZÝ™üfll&­)øþˆÇ)Y¢×B+qÊpx· Ö^t+ÐJ›á_X„wmÙ…M-Ñèª eÛá^’Ž×tcŒÛÚØ›ÙŸâð©–m3½LüÛB—keR!XyáI¬¼iïq½®ŸË”3jÌ©Ã*ÐÄHvHÛ fï€Qw»ha ­ŠœU‡Žµ`W¤òç 1!´‘V0ÿ8ðéßî~k ×ÄLÅÄ<¶AòWË\ßB?%êJQ¡Æ½£Ò2ÈYA¶»b¤D¾q’ VÈq÷9V*vvB¹ŽnŠg¬( üÆ—è36é‚ X‹™µR¸¬Í5év¸êpMº Y©kRQ ^tÑÕ«Œ´sê¶;ðßQw» ^òtè½Ðh=äº}nnÂN±à†KÆí¦¢ê àØ¼ìùn&@ùö6ØÒ±Œt·*‘÷7A‹\á‹þ4,Óçs^§ÝíDâYˆ<èn©Ò;i¶å“%ëž™““³³£Á¡AžT)Óp8h<òÿì}{“Û6¶çÿ÷S°ºv¯g¶†’¨·z¶·¶ã8ßIl¯Ý“ݽS)D‚ÓI¤º•l¾ûâàÁ—ÈÕnðÍu*¶BäçAµºqgçj”—Sø¸Ï¤žpá¥ØðOæÞhmÎÜ¥eNÇ󅹜»sâLܹ‡VÖb5Ò:«ñäÈ/¿?«§ä§`‘-Ýá»v¼=ßAA®8hÁ…$[ÓÅêA³.îCÈu©žOL¶Ád–iÑÀšYÆîÚØ‡ ˆ°kÊ1òæ+„²42á*ÛšiGôµì÷N`Êì_éŠÊŠËsÝÏäT‹£(`·a‰ÀØÓìÜ…}§!ï]¡@ù¾• 5‘G ½—f4޹(k2«¤`HqY<Èw+#¿XÀ%E{M„ É‹Žšé*ò5¼'˜zhËŽAJ“,¼Ï?äÜü³f˾t´Å±ôÁÅ‘®ÎCš›0üX‘ö™ýx?Wuó h¶dwÊ©þæ°–P™ÍE”Ôq`óÌÉúb•²JÑnã\ˆB9€=‘½FP¨•ËHžÖÂw¹9z¤jº®C4—½~`iAã˜èI]ÀˆŸ²ý'í©Æ>Ø‚ÔEd»ŽèŠ4È?‘5ÒCäz8„%/€õ|Ø;N]B™[8b—kç‰VÁ͆Uš¸1æƒ Ï¡Ù¨3>¹C*Á›é²$PÚm#·d¡›p°ôŽŽÞ*kfà!µmà•/Â×XI/³™±ACðCˆñªw„ÜÍt­&ÛrôË—\>øö³ütLh¢éEµ‚b¢²&skì\,“Á°Ú/%€»ðiÍÌ:‰K® 9(e1ÊÀÅ CxD¼:Ž®¸Xêè2®K—ë ¬æ]B 6õŽ,ɲú&]~ÿÖZ™Ä½æô…¦0Ô¼ 6*h©¢V«Ï‰— -°ANë|H(˜Œ9¶º3qf˜‘û1†œ%5>ÜÞ}ó_àïë!Yûá5 ŸþªÅkÔ}ŏе"cé,!"Ý‚ƒ¿©…±|sûúïoÞ}k[`å”_Æ—¶ÎÆ'ÓÙÃ#v«e·q¼íZKŒÚåW¹.¸ŽcÔTpßÓÈÚbÔnD‡Kçk:¯äUOo†zEÖ¥Ì!ñ>áí,Óüç–A¬ˆcR8 XòNæ%=ËZd^-ªB7 æ}T@žœ€ÜXJæö`1êZsñ]­_dmáT—öÙ9‹¤QüGÕœ4r¢’Q×ÿôúÓÛ^±í©Ä¡»Ê¼„lí}ŒCãÏVÐ+B>kk;9«ï´+.î€åj…«!<\XµÜ×}ÂêâN“kšˆyã0§h+¹‚˜Ò„k±¬‹S*óľoä‚È¿Ò;ù$«Â+…ÞV:I·‡ãv¹¬¢ «¢+Ýk ޼ |kž18­6ËÈöú{óûw,Xî­gÂi®üE S¥B™¼™¯»õÖ,¬´3·“ùàU@óöJ׌Ð÷çED‹ÅêóE£¨9 N>òà§èÀ}b€„¥6=«wª€€Ž;Ãè’‘ú-è ¡°~c¸}½x¸Þ ~Qu.ïºÕ†7Z3§~±Ë?²Ê‚O…ÀêFÙ›r=hç7{iޏ1à“¥¶<·9„Nqpñ$ÿÏÃ'|ô࿺m[M»>(½ŒègY»IIɦިŒ‚]ÉJ…Xh‹¥ ¸M­~’&° 8w©"×ñQ´Þ*ÛEœMÛÃÒDV£,<©ëN„ìë€J÷´(ö¹ivÏ£}ÄaÝ‚A’4 XÒFä0÷&»ˆF+†¨h{ï<à5O»OŸÁÂ/£dG<œ‚óÐ6Àž%,t÷vCÞ¿ü«‹œ^ÞÞó§q”^(ÕQmÑZ5 .ÐÖ°óR³Q§`°;ˆ[Š; Y¾†¡Œè`;ùdX~DZ2}Îà€vol„¸xûî¸*û/–ö|Ô?4léÂË ’ƒ.é[ §Ì.×?F^ãÄßCô"ñÀÅSÚwÄF…ÔÃŽCÚ’kj”Þ.ìBõC°óóVÞKþÓ¥ÌS'¬Tµ¬™ž Ê{9`ÿAl5|˜¦—Ž«ž/Oƒm°/*:êîŽí¹òzTB]ƒP9Vx¢0"WÚ<Þ¦BY]©FC]˜}Îõ—Ì*¼¤«$$¿fòkàõ]*#¡´¤so§hÃÏèÚE !}&_éƒúGËO«ŠDãªô‰.ÐB¨}ëàŠØÑÚqù¥Ë+®p‰Jwå$ÙºŒ•æ¦zC‰á”@[­Âpº k(©¥lë¯bÃ1ÔYrº@67Ú!ŸU¢ÕfPkÐÄ’«6ÕB¤´FÏ)= ‘{º(xYÈò{Sa ÅOR­ª²°w…'íWº’¯‚O7â1šq½“§™WGÀŨF²e¥ÖCTr>êì¨ÌáÅ+SuA¦þòú¥Hà M,:A«Õ‰ÑÚ~g§‘ÍZà žªœP“QQFíN‹Ø\Ü!ðI\â–ØÕDßNe®d;‚ǰ‰ _|üJ„Xö¸&ãzq%dî/` q¹+ Ë“ÇêmÖj¦¬u`ˆèÍ\d×hȼQGÚ Ã~Ê$ cIº†„Aº,š4YºýgG Ú1šA¼§ U›”™M΀FåÝu$!‘㳃ŸBòÐë˜Ìø`‡‘+“TêA3æ,°£¨ª[ìµéš÷§¡µ„„æúÆ'|ÖlFˆ§ãQ3ªã®Ð¨šâd˜;\xÈÁÚÀ‹ƒèð€`+£˜õ¬^♳œ‡î±¹E‰ûpñì§1 µÓ†)ZŒ,O@/}€|B˜Mÿb¼Š5Êù±Õ'a‰Ò]?ÁNª\Æ¥¤ð"(ÕöãŸFËÞNA„iÑ¢Í È©Ä+æpbSú)_êF¦¸¢Tîá½cÝ<ÕÊFQ¬ö8zÀÉIØ—†;é 7A¾ÛÀМÏ6ÐÖÖþ/» Ð'Rj\<~±¾Gp¢·ƒˆ‡ò*ÔÚOBóüdÇ(ßd;[ìÜ“l§':î#®´$ (¨9k0”z ôwÚN¹x×ܹ/oûœžBÖ’§‡¹í§½ƒkÎÔ£`DOB‹Q’ú̬£Ø™èh!Naã*’¶4¦]sÎ{Ÿ|…—>²*O9Ï…kMÚ[}•¦&Ø0 ”Ò)¶¡BT€ Ñd"MXýaØidÅò^]N• ëì4<8¢Ã,kq)þpH›†;wÔ7<™¿È÷tç%)¥í²0¦K©OŽ#Fý#k˜z #Ø.¨&ü`©Ÿ÷°Ì¬ûØ3œOÙòp>4eû˜SÐŽód¸â$G®kHíÀLÕ0u™=J[œB°÷;ìúHÌù¹0}0™« º<"‰¼”ÛÔ ÷Ù Ó$ ï‰êħqúašDÌÉøP–F¶,·{IGÄyŠ8çÓ± ûWA]YbRW´?pÅÁ äX`Vºé…â yNV-IZþÂmîâŠå™ «êN΄¹¥èª G‰Å.¶“ãX… gñ¥HUŽþ™`+ßr’NôFI…iZ"êJk´åXÝ€ò’.ä:%˜ËžPz)@–dù·ïÇ÷6«âFìŠc^Á^ÅjߣïÊŠðJͶgBã™Jô‚†¸”,K+hÕ$ªJ -;B‹|×)Ȧ´j´ŠèÎЄÞw‰šÌƱpF¦,þùØò‘ÕjP«!nÚN¬Q|ɪE·ÓŽ8r£¢];¸G8ÈD#˜b&+KOq¸òDþmô»Èâ$J#' Š%íÆ´Ø½0¸–€m^ ¯µÀAÒ‰Ó½õ‹’g(²©î„jjüÅ7GÝÉ—JuÏÐ"l4§ ¿ÏÖÂE—•žÆ› Gغ;B³Iæ@ž,} A¶¾¢XD™j"a_¿è"çžNyü­h0Ú*“¨3²=Ï Ð>JŽëFÜ.ÿí²Ð–£'¡ñ“ÑãŠL?¡#mBÉôˆ˜*¼O@mÈ:–¯¶ÐÁìa€Ö8 Mrù·ß{Æÿ©åÍV4wOBc«ìÑÑ`nÈ”hõø< ¨Æ*D»Mœ¦"Ÿf8²E  ×õEî'8”ñ‚èÁ^tõ —¯Ãt ¸³ÏyRFÅK×ß<+H›@õ \éÊÊUµU«–V` ŽQñNnVÃËO̧¡µÕ»»xA­.¸J}ݳKŸ–<ÌA1Zû$Jg{@,¦‚—D;›„(&Û(•.J´ôÎxLÅ[ ‰–p¾ë™K8ÉîI|ºÐÂ9…ÞXµq¹ù‘& ÝwŸì×o¿û¤ ÂtË«ÊpoVU.Q§àµ”´¼ázÅÆïö;©ÊÕ7†uqÁ8~—†B% öǼ$Æ(tJ=ŸÆêšgiCÑæ¶ÿ+N¢^ñ Ÿ;¾´æIòȾ§¡±Í…“Ï® ÊM&†Ä5î Úóo¯Ül·;¼ºf#þ{Ÿ¸…〃ãí£d&,u´”Œ<î®zäÒAßÒ¥º ç†Ûz5êÇ­@C ñ/Æ+Ç×j®\_D7”Id#f뵪²-tÕ);ÝjüžñµVfc]NžÂÇí˜=e‰ï­1Yì…~€úÇêKŠÅ1â³Y‚3á4Âw°ÉzšÜ\×'bg‡œ¶ QããÁrÙ+4“Ôæ©m/¿Í>-l§Z¿ÈXž]aÓ©J;—ÓØê궪Ó§¡ÑK‡!õšò¯.^ÏëilÀ`‰ï2M–1ÀÊ`5 ÷“àŠ;j¬­Ó'aeáS0˜¾a”nÁS *Sª¢_U–8þ‰Œ¶K['˜ø17ǤÒyâ4´mÉŸ5§Ÿïç5êº`ÅѳP|ȧ¸V¬£Ô \ÎuLqî2““’h7ÊÊvw½°±ó\tÄ‘ZA@DŽ<EÌT’|)$åìÌÏY”¢ºÔQBÁ“Ð*'¥ &dk8EÓjXùÄà®Û%Úé0¬wìi)>c.mxª+Í&~x߇ÒuZufèbç¢ÜF¤Öèö44Ævr RI9¤ÀÓZîðžà49Øa¶[³„—†6? ʺ°ª¬ÍÔWÍ;JÉž½,ª}B)!Ýëâ =†ñx]ÈC+L.K ¦ Ÿ ÿ™L­ËçÓвö9ÄÆI%PƒÁvŒÂ,V´~>‰Nžn0s_qˆ„»§KŸ¤” £¤Œ;öø à±T1c¸âÄAmð‚ñæavÒÕÓ#,øË&t›ílUÃZtƒeõ„%Ò¸ê+Úw]¤ ,æåwk>ŸŒ{‡Fœ-Þ¡jÀIo‹˜Ô(ø˜ >~sûšû‰óøãèòâ<ÁX—얻ݜœ†ÐÁ”lÖA ¤»xK5¢en×áQ0Ñf9)ÚûÈ=´M'àPb˜2s¼Ã©#á¡ö°ü’wÒ 7¨ w¶ÎÂ4Ó/ ÇkýO‰¸|¶±Îà&; Ѹ1f÷€8YÉX¡ Y7dGÜ5 ®FHŒ¬å¸rd•qµÆZ “ª;/å6Yð.Žù®):˜Å5s?× yBI*ÂÐùÇKÛVÐù„¹s²Z„J3ŠwÃ'¼Msû-Oý¦B—‡²¸TG”åÁ ^h ¯®Ww[l¼çzqË› ÞuÀª£ñ¦ýøé¾FºE©Ab¤ˆÜCȪñK´^G(q¼¬ vÊÁìžB‚;~‹ã;ÄÇ@ˆyôVíˆ~׃´5W^u.¼ ßÿ¾ýøîí»¿¥ŸèOÒ‚ ×Æ{žý ‡^”@-ü ÷6äÊ÷(ƒñ­qUy¿+Ã'†[ ý±`QøÓë($Qà»ì ¥AĆ«¶›"8Mýp3øóÀ0Þ¦Ä`´0vè`¬éEº!Óà`ø›0JØ]Ø=¼ r$¾l`Ž_TÍ)O7xÏ’ÎÉ#õÎ.ÐØüt¢]Le1»&'žh3Ê?6 ƒ.³B¾ˆ«½tÎ÷«iGòA¾\4r]H^ï©Æyׯ'Êî?¼1LÖ Dˆ•êÆíë»·?½±?Ýݾûö›ÿKûß=DOô¿4áV£.„ÛÑBý×â¼íóë;üZ'pk»¶€¿KkŒgb+'ßÕYÓ< ð‹kP$‰ãö/5çäÝ í0òÚèÛSéáønÂYo<°£áxªÔy ªç.Ö×ÞÊ[\<Ï»žÒ…öúz8× ÷¸•ÄcÝHÏ‚ø+Z¯ýGa‚S7…Z±Bµ¬ÕÙ†™DYâÔëÕäFÖžF1ѹJ¹¾çc·gx†}Ÿ­1¿kîAº¥$þšeÁpà$Îp‡è:Rð¥è®Ë ° ¶ô!âÜ;§{ßøŠ*ï³Ú¬|8ø?Ò/†fu‡ÆfsÕFlŠ<‰fÑ­`æÙ;ú /eƒÊÕH#hô#T[Ê…û¢ xËÒ˜ÿ¸µÐ”¶TáӛD¹E¥h1­A–òìDZb?6è‰sÇV+žþ._ª,±¯¬ºÂõÃõm¤b¹ìÐwìû5%3Þ$Š*¾c´qÐ xÞ rÍÞTÑ‚qO¤{árqóã¹K'£U7`" Mb»¼^} ×6Ûàâ`7Ë£, §Éè“ö~’ÚÛ[¸·sŸÃ#vz†¶C¶¬±Ç D°ÙÄšL`s}ro»˜¹&ÙiIå)ÕSø½ìÚÊ×ÿSÐb*Ìì¼U1Iu&„H!Ù´€–<‚OO†ËW 4ktÁf<ÔŸGwè-G¥ ÕL!4…xcÙ‹Áeëo‡X¯_¢ ü¹¨ ¥RªaRq,•Ni7†.=£ÌÃÙK‘<š uk2½X7h,¢ÕÁA`ÙîÚjzѨ L0C=D‰«áàÂgC'Ç:Øâ¬n&WMà•‚6QÎ:m‹÷%xÀï˜A\S†eŽe üY”qV.¨]ì²C|צ ¹•>Ìvèò[Åîãí@ÀeÉRÈkŽêDF‘HF[’]ÊNŠd/m¦slªí°rtšÎ]~¸®·{º<듎cByÝÌI•!Ÿ‰‹-±íµ§8Áj‹ ¦‡0Ké„nïÆHS¶cÐôÓý4):šöŢЀvø ãq[Â`BІ’¨9ïíMÑ¡o|ÌX Ÿ•qrËÙt2]ZštÇ–¦AA;m°ño%ÓÞ1ž­éT'p9éXìðj®é¸¾ÎÆøò%]Ÿ-æþz ã†ä<6šÝÍf“¹6ØJ4ë‘hÿí…ÿ¼Ð[,[Þâ8H÷y%'ðqH÷ŽðjŸ2‡6Èèz0 d3øMa×à~J†m‹;ضA¿¦[lˆÛü.â7ÉÁ€š›†4à0ÏÖk㟿½"ÄÐ ³1„×Ë¢"Í[íêŽ*Ç7,Õæ7(ºs<åíÿÏW·ÅO^³fèp+ŠháraEÕÜŸØùð'™¯Ô{B±ˆã§‹~qåªÀ„ ÞÁÁZÑþºˆ (µ¾yLqÈR1mß±c¥JC„ -ÉÛ¥Æïa{_úš‡BmoᘥÔç­ýÿ“6·™ë§?D›òuKSúÍßñáòËh~ðw~ùÉ?úá¨\´½ãÁ¥–ÿ•E)z p•©µ–¾ÂN•ÂþÈßr‹t´Ûºoç„/Zi¸K-ŒádÃÏ´åtÁ(ÊÕÌ‘ ˜G£ƒ*J[Rбìh:52Åm›hw“Ï’ øq%ë:ü6O·7©. W'£QÞ*óHÒf‹6òZïpþé}Xžèå þû_ŒB&ä1»-R¡r½‹\¨üàH2|W‹ñøˆyÆÄIŽ?‰æ#óâÃR¬20”aJ'š½· ì1à=º Ní'GÃóF¼sY¢‰Ÿ”,ªI„ú¤å3±ÜÝã°øú¢Ï(¿èPJò¶äääHNÎÉIóÌtŠšð¾ã@Ôu{M5 ¸¥jiåûÚRCS¯o£òã†×e½£´ü†î`©ºð—íMMßù¥|q¡þÛcž|n1]–°[cÎúJúþöwßS¤„.I­¹Æ¥"J+¿|3*¡~ÁNzÜr‡6¤,Ð6Õ0º³ wÕeñäLúiRu—d¤<•ŽW»?Âäb%-Úe$\>G@–úÍ)¦ìýˆwë ÍT@øþ9Û’ÆúNfƒ}¿®qP~…²R Û.V,o&Ç«è]¬Ê,EaìÊêß"÷Úò‹Beˆ t••Dxo '•®va¤R÷“Û£æJÆ$oŒÉ‡(I¿‹’”¸´¡´U€º¬´åp²ª‰ÿʵ'·¢åXy†Ç–7QõË~èï²Ý7(t|7ÝÖÐL ·^¯íU>BØuòÅ;“Íîx7â+œp…ÕêÙG•9TžT$‡eÚÑýžœŒ•Æ L«ã+Õ>€{yú‘N¶ò›ý検3•Y1‰)àZ&'ïd–:u™£Ç·nR£ vµd{È‚û}× 0O”U§˜Û**üµŒJ*©ì¡_åàZ_0¶¥ª‰] к„óëg¬á•èf%¨³XÑGäÀ¢k«j“À®‹è´þcçICLcGõÁUÛEƒ~Û̆ Ý’O)Jø# Ag©=¦Þz— xyÙ`rúÉ+ÎhtÖÈÏ“ü<9—Ÿ[6z,С¶ÂÁäß rRŒ5ØúÛÀʬ½öûúZ]›DGvPqŠsrš¶‚¶ÍˆÖIYŸ M“õx‚äM?Mf³öiÝb¤lž—è™ös~B’§ 'Opd>è#'×PÄÀqŽe­.š³FÉšQ(²w|Ù/ˆ`ï­Qïøõš¨)á§K¢†tþRϺc ˜ ~!ô†MÒçØ”Ò¤ò$nù«˜¡%½‚¬ÿQˆÖÛ?±Ê©µ ÞÇÒôsEç4²ORÉþb:É{ÑI¼äµÄÌÏ‘÷ÂÞ³—co‘´à%˜›^a'„¡sÉr[—Ô£®Í«k®y èäãÔÈø¢seûOõ‡«? ÞC!—Zèö¬áª>è‰¡â«æGÖï?—ίW¶¸LèñË‹›¥;haMÊ•Èë5žÌ1´²eå×G¼XÑC¿2.œRªTÅ Bë–hظßïFþ–ÿ7eçÀ¯ì0¾•7d[²3 JßÒä #%v¢Ä%U†¡)5°`؉•U—À=Þ(À¹]œ·äC\º@ßãÒXíîðõÍc\µ×BãÛ]­ñ6ökjÈŒ/¿vÁè'óÉ¥k-]«Zff~½yS‘#ižœå_³=EÑòÔžû{ýñVïb<ª§ž6—@Ö? O •]éý¬«Ü¡ÓP½-ÿâÈñRÍ»·b+&‹ ƒ—¼£7 (/]( Ùc«ËûʃPØv(W{ úÀÍ¡ —±ÅŠ÷„)nË¢™šyY€à¼Ì™8þÃVÓ,¿Î Ŭ™'X‘‘¥º(Š?=ãgŽ@˦‚Óÿ§ñvzó—‘“¢½LqSêÔ_$ ‚¹ö ´³$t3e·fÖðZ5³Ê“Ú˜ôÚIö)Ÿ®ý²ÜRÝõrO·ÒáFAºý‘*Ši9â‡ó”<”[À¥mQÿþ!‰ «âQ·ÆÈÛ]¼Tñ¼dÎ;]Î<ëWŽž|ôÓc ÿ!VùÙ`ÔijWøòëŸâTßãYäeŸ6»Uérýd_`h9zhßQÝÁÿxªfNÊ>¸o¾˜4sŸ ¶>DÅç»Jî)›ám·`ø½£½Á«Âð¢ÍG5V3Ùpöâ±,ìp܆zvj}u+òÄjõˆçç ˆ­)‰}ç}LzýöÝwïsÌ [ ©Ê¢n ƒK/dàÒÇK¢q'ÂZy·ëšK@Ë3/ûÌò9­š'æ¦{5Û°ÅKå Bm5O*Û{Õ<ñH…JéY¶4©zba PôDÐ:PÀ©æ‰ÂÇšö²ƒñ桦‘¨ÂÀ q($tó.OͳS€-89<ùÂË~h¡óªyàÞO–šDÝ#PêlO¬b/ýÈ</çán u)}<üWôµ“|<MK dÒ 'Kp•‘sUäùãnÏ™Ÿð„Iνqöeü˜šÂîÊXŒ+)-˜^¸fÖ}ÛI0ìyD;ïï‡!Nºçò°†9,Pü¦£Ù¿ÙÍïƒØ SUöÜ»n‡øVc4Fä…ÞÔ]êM¯*õè&ȽzλnqðÂoÚ˜of<˜Í aÏî ¶‰Vë#t+³B´]Ò[8m¾å||ú–߈ϯä­^¤lÄ lH>î@(©;hxÖd0•GËjÅÈIÌ£p@(Möì7|“D_Hæ7ÓÙ0]cÅ)¯[cüë¿ØÙFûöʈ 8ŒCwT,£÷ŸÄ.ÿ  bç…mÖ)Oœ~rÔš19æ!ÃÌ6êãyóûÇç¿ÿëîoí!? Ãð'üèCœJ3rcýùú_HJwOÉõ¿ÀJúAàÅ^y9myãÉ‹Œ8¡ =Þ±|öT5³ÐOM0ŠÃ4YZ;i!ûÝpÇtû¶g4ùŸrá£SXW®˜?‡F¯_–2ºqÎt0žO4Ç‚ ÜQÖþ™àÏô·h5–¦µœ;æÏ&ær~k¾÷oßÛûÏû7é-ƒ^ùõU!#öçßá™>!vú.ŽûÆ<Ìe4õ¦Ó¹7£žzÖx=õ°7ŸÏr¬±å­ÉÂ~Kìüq?í¹J PB>éŒVÎraY.²¦hMçÇÜY¹‹•Cé½Z-ÝÆ[ËãÑÚq,´Z;Þ˜nðzlÍfc:;ð|m­'¸üㄉ“ʯgÓårµZƳÉt…Ü^¢ébáÌÞ|6ʿޱƒæ«ßa Dj]þò¼I¼”ìÏm»W9—— õlì`4E“ùÒ±fسœåx±ôè7ÖS&ÞƒÈÒ/p@ÙüNùi\É’ÚätãO5ŘšòƒbÚ‘½s½¯ÆÅm«÷däi{ Ç¥ ´7rG˜ŽÕbŒVÞrAÉ?Y8K:q¦Ó£—à³þK^á¤Üh}‘ŸsØcd-&Îjé9Sʽ£r<ËZާŽ;_­æœ „Ù!çJyà ]ZƪÞDšºx6›®±‹— ÊMîjº^L)›¢¥åxÞrþ2#Íj,µŒ/UÓá~<°: rýj1sÖco=šãõt=GK<š93 —hI®ÑK 1ÃÞaAxê ŠÑYîÚOñYx:šXˉ·^Ó…Ñ/§Ît2/®H/X_öúOŽ.×hK<ÏGîr6šŒ&Ó‰ç!J(‡rÒÈ›Oð|æ¾Ð M½mÏWónÃ{âb yZ/ÖSg=ZŽæS*—¦3<Áhe-_d„ø—˜½‹åœŠH×YYÓõtâÌ–Ó5ÂÓåd½òðØOÊã+N*ã+Þÿ©!&¾—^•äÅÔ-ž3¦Jv&«•å-0¢ žx.Z¿…Ø#»Lkyßì.+ðI^¨½çj9ÓÛ:Óñr4"* rg3´š;‹¹õBŒÌß´MTQöûòw,˜eµ^®<ªwO¨ÐšÎÇîÒ[ÒfêjdÍ­Š0(§{)s §ÒSü’§Ã,hi¹³ÅÔYLGËå”ΰي ¡õ˜®T—qW¿ -ó?!ú—X¡áæ ×s¨H[Z°~ýö®¶¹mIÿn¾x¦î(á@¶\»³‰'™ÝØ;ÙìÞÝÖ” @[Yò‰RfœÙü÷k”DY/¦lʶäS,‰$ºèçén ©¹¬D ¸•f”p™µ1í´áRÌœJ`€‰»(Åœ¾(QknêÖ^xU ÛÌ=Ûü°PUJÁ]B•¾0­lš ¦e˜3ÅTªš=õšª|Uˆ k H`FÓL¹ÔŽYœÈ@™íLÙ¹›€Œâ&(Ÿ¿¾RÔÄ0élê„vði)TÝÔtΓü5cÏ5°ÍÖ妓O´fkð)V &bxΔT…g–Dq¶.ŸÚ(HndìU)Òn@dD?EU’`Æ©Äàc-'ºcWrlvNb›5kCøÍ1VšvBIõ|7ü*ÛÒóˆÝ6NUÈZʬ¨¹lJD&µ~*‹îú‘¾pÞ7³}ZÂMóyN®ÈÙ–5}fû ~1™ï_.6…]l?ë;EÖ] F×Þu¢^ÏïwëõnqýØ; ˱uWÆæ…§Éžeã&EFñí<1 rGÅÒNtî&½Úõþ›½Š¥º¿Ü~ß禺Å_>üéäÕé»ïxsܽ€t?O§ƒnÖq·zezÞõ|œB”RLhd¢xÍ—‹×‰WQÅ£ãâݪq ³d`ãÜ €´ŒÆÇe®su9þi:ú!ă\FÇßx \ØŸŠuýõÇ5ü;‚G±=êEq‘ßG“ñÔ…’¢DrDe#Ò‘´ƒ‰:*rÿ=sÙ‚UÊ7²ÂÄCrƒø¶ôž_”KÊe½¸þƒE–2šŒnŒý%!G‘Σ#o€£rãôü…°>͹v@磸Òc}Ùÿ8êLf=|f‹zX¼Ž<ú¦ÚZ¿o½šû§`Ç÷ïßöTG}»þŠÝöŸqö̈́˜jôM‰ mßÖª°¿»õî[Ô¸ª=¯¦?.ip¹â[VÃíÚ‡&µä5ÎV½E6šm'šMs­÷‹Ëãò†³æš1zx§¢ÖmÈàD“*ZH3hŠKGcF¹5„1R‡xHi*pÔø‡VÑB"ߦ޿­}éã©W´ØSªh5Ñm¨h}¥­§×W½Ë×ä'óJ¼9“o?óÿú”6«hñ*Z­_¤È¾;û!þGí ~¾Óˆ:é_F¸Slî^J°-eán¦Š:ÄÝ…|·D!`I=¸^$øÁ"¨¯úñeùö¯¸ÖGwКßé_WÇV÷i«îvO#" ±0µM PkÙYÍPFÉ$Ç<³Ie¢TšH›pÎIE5m=ˆnK#Þu™¬Í"N§U6Ã8 &‹‰t"fœ%±¤DÇŠ§ZHŠ˜Zâ…vzyyí?°ýˆÃuož/ó_Dþ±þ[—ùþ=æºç[„–½|JW÷/ïßýáÇ r.Æ.«;Ï;ÙT„±+ÜtîY wöœÂÜó-_ªüYY[“¼/9Ÿü½DEªaze?õU¯~7pKŸ}9zHp¦ÈžÀáFQi§Qæ™'UËS_Wj-BxèóEˆ ÊO3Nh¬­‚IšPë§±»52µE@h]nÆý«j™¾˜Á÷º—µ N!¢²Š¿ƒ#ñA&îüz1•s3*(ë¿~þ²/P»·;½1¯ºF@€M2g†«˜ Ž!R$15€%Šd}¥ëÑTpÐtÿhŠ[EÓæßލ ¦FQböv…ûâ¢ÌŸ­ÝÙíf xöquAõq[(—µ×2ÞßsËÈ¿ðw[iÀ§8‘‚/ØÀ ò¯c͸¤O/TÔe_°Y±ÃI•o|ˆ×ÀªØ-V$(€Û¡…Šõe²Ùê?(yÚƒ{¶u–ýpŠþO‹>¯4 ªç{§Ãzuz¾5h~ál4v“霃ßÍê{è‚“PHHå~—­Í#ã¯ᦽâ7w²Rw1º²E«\+ižlTå](æI¾mÜÏ5˜ZÆÿÞ®T¯º¼ÊÌŸ¾;yÿöôïódó§"€ª¼ØÚ ø>ΟÕhÕ—}¹òv(rÞEÆXše8Î6Àf“4N%s±Îq˜#œÚl=tHÒŒ‡m‡šÌˆ]ã¡xQÀ”ËgãzóŠ(>;;y÷ú‡wo5>ZZê¿}i;bj¶÷(íüäåøhÕ).ELz:÷ÏÏ‹M®³=•Cßlo<Ú—úã)Ëj‡‘'7~å†öÆ'Ùh\”g·¿=N0Y({âqš¢â ÆiÍ'ç ŠäÛd aÜýÃ8É’€ÅÇíÀÀ°Oß½9 €ýuö‹™Ö™¾÷18¨þÐÅèÅþp|ßrùÃâºê × Ê·Ép} ®Ë]q]\¸þ„pýý‡W¯NN^Ÿ¼Èý)#{ò¸È~‡ÚLê‰YØÍ"éPœÐG+r¨føÐÉ JT¾A6Èʲ¢Y d%•@VYy¦d…yðÈ.y¾A¶p¢( {@ö€ìÙ²}È®ZNCx¨M(æ–† ˜=í=ë(ý–wÇÙ Ë7Ë{i‡½ð„örÈ›Üw]W6Åÿ¶8óÜZ¯ëÑ8Ÿ!ÔŒL(J’Ô9§)2¡ <ÍJkÃ5(^fiÙ„b1À]ÓM²ñ"ËÌ3±C˜ÆÌ˜4–F§±ÒÊ&ðgb´|±†Ž,øËù`”¯™‰6“gΛ~:yuúã'ï*æÔ]©)·ÛTim’–{<™º¬îøûù¡¡›‘ÖÎfÀêßZ§h (É7 Ÿäj¹0•,@×aB×¶£Y•˹ýT`¡uQ1†h•)b!XÆÄ­Œ;%†—­¢j^®·+B­ÛI_ÝoÞ‡ptU6»ªÃÔÏ­CDÞm*lëè°ó£kÀP `¦rÆ0fÊÚX²”Åð€F4æÈYj‰E¬ìŒûàæj6‘öaÔ¦*ÙƒQw|ô&£:J…åTƉ’8–±æ6‰)O8k)¨ùÀ¹³6qfmª”=˜uÇG×Íúà„M´—˜X!l½ôº~¶%þö‡›Óø¸Éö¬/‘ù6ÖXßWÍúî¶²W \1pÅÀW|î\1Ad¿\Ñg¢[c‰w¨gmÈ &(ôl ü0ðÃkYf˜a`†>f˜´›EÌá³Yêп¹WØõ±ˆHl8ˆ•$!b ˆ!hb ‰&šhâ:ž$Yr84±‘,Žç“|ƒ´2°ÂvX¡@¡×û¡’ÂFëhë)¾§Eûn¼寣ós8ÒѻӳèÒåyõ>óþðj:é-³{1ûÞ»|7Œ¢ŽÆë± ÐÉ]ß]¶|HíivÁUEeû˜KºÂ½GÏ‰È 9‘Jî€~!'r"!'r"!'r"!'r"užD@‘äøaãdˆ\·Ç~!f ƒ!’!!’!__2„úƒ÷-¶Ðã×£_†Ò—åÛÄ · r…¶}¡m_hÛÚö…¶}ϱm_~¬ý¶} S =NÛ>‰ õ4ùÊý:÷¥òmòs:÷…Î}¡s_èÜwû¼ëO䓇ºnヲЕßîo‚†= oÝ;ïC lÂj1s§z²ú6°¸S<+æòÑâYÖf±ù&È3PÕ_Oþ~òp8Ùœg$àüpþIÃù‡jöä ú&Sä9T÷Í·‰œJ¨î…ê^¨î…ê^¨î}EÕ=.ø“ vܽ³ß¹ßCÐpÐAý ú=Š òI{”žÔFÞ5"Ã’d6Î W1ˤ‰5ËHL L"E2‰’tc+€BÔPW®åð]ËŽKâñ}ŒRÍ7ØbkÓD§(‰S$²˜©DÇÒ i”F$•à;£Æ?¼á´^ÌðuAúN~ËN\é¿Îz彞8:;}¿Hx|t×ùlßÄXŒ5¹èNüÒõ¯;£|ãQj‡¾uûTO›~îæœ›;®ÜûƒU±ùç×8Ÿ¦ÿ Ë4ž¬ºÑšw[òµÅu 7T­”¸oý/›êön Œ” •d’˜Œ¬œq2uœRª8f„cr,¥FVXª€\ð„Rd”[̰FØIÔº ÷¹°;/‹µŠâ«êh x"[ž ¼‚%ùËhl‹S’Ó¼1{aG—º_þ¸ÌX—éé`RÏ\¼®>ò|õ£Œs¥¥M¹±L1¤$5™¤Ôh™$Z$õ«µ8+s–è¹_¯ú°&k%±yn£_ öúƒþüþü7ýÏü»÷£ïÓó‹ þ®úÒÕK‘¥œÒ+þýOq`'ϧ›£Ðåß^G~’ßC-ˆeŒ‰LË0IYæ2!„Öœ¥«j)®Í{óÇÍ¢ïñhàª|Iyki22ÁØjÌtš¥Xee@ßJI»öÖ³‹JÁZ¥&# #—Ì9ÕáDŠSêê w²t5gRÔ#Â)SÚ*'5q#’Lp&PýêKw™ú«‹S>z¢$«ýbC{5êWg¡~›ÿþ ÔG«J1©§“rbœfš‚/ÀÜeØH’ÈL”§˜‹,J¦‹lEùÇPʜ˹¯5”w*ÿ87ŸŽõ¬OùÔ¸²i<»Gg±ìòOæ¥"Š,n»|ÏB=›„0––!‹Ø*!Ze2õÓÄHX8Œ­Q®úûˆp«ßØ(ÈÏóaj€ý³)m2 ܈+”¥.f¹Çþeu"î† ½l°õpôI/”Ĭ㜥Î:™Àl²Š¥ ƒiª%6Y&E;–öÏÜd_pU¬û‰tp##/^%ܤ$èr)K…–qñ&Òóåµaâbì a› ërlS+˜;àïXÒ,M ‘Ì0*êÖÞt¬®nßBü­ÖuÓÉx4¬˜¬äˆ"Ê Œ× (3 e‚:ÁmK.»q %š™weøÔ:¬3£Ó$e&E ~‰qGVX¶bájðm¬ÞD p‘Ö(ÌRF —,ÕŽIšªÌ+hݾC7 þ¸dßJþm&Îég“5Á,—Ifg¨R8Kœ‚å(Äi*Ù,²ûîÃßßöš ð­sᆜJ2·5ŒHĘ•m9×J˜Dà–&r)é&WÓïþ2.&‹J¥‚¸WPpZL+!îuÚ¯T…°ÀKÎ`TRà§ã%PjiÛ|Û¸K༠]bËf†¤d°Â¸'”@à2Vi׎.çÞâúe£©°F‘ØÌ€K“Øã—æ°1àVšQÂeÖÆ´_ІkH1s*&Bì¢spúB¢D¬¹©[{IàU-l3wªÇ)f5šúÃàd%€/L+›f‚)Aæ B1Õ†ªfO½‡¦ê_"ÃÚ˜„Ñ4S.5„#@'2Pf;Sv.Æ& £¸ ʧ᝔51L:›:a€@€|Z–Gòg¦† 3¾ÔCí«5cÏ5°ÍÖ¦?„(á­ÙüFŠU¨‰˜„3%UáY€%Q܆­Ë§6 ’{U ‡4„BÁOQ•$˜q*1øXËË}£÷7v%Çfç$¶IP³6„ßc塉a'”Ä—¬µÃ©ò°½êv½«Áô¼?ìø\S߸¼sé&ã¾é@˜íÓnš×K¯Fì>û¶gð‹Éh4xU~ÆÑÕÈö³¾³QdÝÕ`tíQ'êõúÃþ¤×»]ÄõcëÎÆÖ-ÇÖ]›ž&{–ý›øY-¾ª ½Ü‘Ÿ­y':wpÛÅõþ›½Š¥º¿Ü©Î]!c™(öRú¦‡6:úˇ?¼:}÷ýoŽ»0€îçétÐíÀ:î^jsÑúô<üñqšú}Æ0=¢‘‰âa4_.^'^Ey޽š¢8†Y2°qî@ZFãã2 ×¹º€ÿ4ýâA.£ão<. ãìºþúãš þÁ€£Øu¢8‹Èï‹ýÏGÑhù­Ñ•ŒHGÒ&ê(r aÏ\¶`¯´bâ!¹Í›ªy~Q.)Ÿ§÷âúYÊh2º1ö—„E:޼Ž"ß‚<š%ëʲØê(páÅNŠbÃOÿã¨3ëa~5ϵ(,ÛoªTD:è?£jîÕ°÷o{ª£¾]ÿˆZÙcÃ#|ÆîU%„£oJlhû6ʧ´™ƒü݆»‹&j\ÕžWÓ—4X{Öà:ª¶Î¬}(U¼%¯q¶ê-²Ñth;ÑlšÃh½—X\—7,¸<ÌÄ=¼SQ|­Z$%;¸¤U‰ÅÄÆ21³†Æifl,©Kœ"ˆ×mÔø‡;¸Š# ¥‰W^ ßbµ (s¾MUÍ«]ûÒÕS¯vá§Tíj¢ÛPíúJ«]g“óÏÓ?ÿ#ÿéÿHúvj>}äçúoª]x‡jÕ®Pí Õ®Pí Õ®Pí Õ®Pí Õ®Pí Õ®Pí Õ®Pí Õ®[ª]¸£¸óIŸ»çïÑ1ÀŸåÍ»Å!ÞÍÇzær…c=÷O"Î„Ž‡Ö ¶L¶žøoz„~åô¼íç°œíº^+Ò?Ö;ïC–_9ÓÏ*S´ýΈRȦ"´xpþNnú¾ñ’#ð׋³è+í¶ÖOØC礃à‡ŽŨû“óMªðÚÓW^8ü|ÑcÁž\’º ‡˜Âbˆàh,yfbˆ$3%€F­y•L¥Øë6^ÖjŒˆAX rÖxc/3ë½±®™Ä—}!^ëç/!°,Ó*v Á±íciŽ C*å3iå†Î< P»¨Åû<~»n›L:Ü>È }”~:­vÏÙqñí£Î݇°Ì –ºçÜÒ°ÆÇ9ß&ôI·ë8Uü°‚Ìz‡¿Ío•"³íV!Ê\ƒ¹d·(“„7'tÏêFïXøùá=¸c£àžƒK ên%ïe0áò g×¾‡c©0é"1+Â0¢òm2=×0l™7ôvåˆ;'®¶ä[j^X}V£c_öåæÛêš•&”9*DL˜Ì+gpœbÍe–gé†v¦($/3¢ÚH5™»R«JÁaÅÀÍ:•ÖÞÉû|û”6Õ|û}Jw|òÃô)[c I="¡”zâñeèÀâ»æªH“|›Ü!ü»ø'YÈ|jÛñFììàÀüôÝ›Óæ_˜?BÓqJîÕt|~ùÃb>ë0ú¬1É$ß&wÀü5˜Ï«Fæ2æ%¯ ¨Pÿ^¨ßâ‹}Šƒ&4y¤Â ˆ¤Ä³&2‚çÛäD&™@d‘ D&™¯ˆÈðgŽúJåÛä¨P? ~@ý€úõ¿*ÔOZN_ FÿÏÞ•6¹q$׿ó w#¶1ur0d-EIëðÚŽULT×Aœ&Ð3âjåýïÎnÜÓG¹´œ »2«*ßËʪW„Zz´å et{÷Ö9ŠieXyQ»0³‚ÙŒÌfwf#5GfÓæÍø›Î«Z›÷ŸêîõCéëÁ°˜ ×„hðQ¹Ì¸,J§,g°˜†4¹Q.º™Ù”M}NDž¥DLbÂg‘Pž ïóÌx—gÖÙ áGíy¶„ªÌ¸Íû›AœgbÚÄž)§úáÕË·¯_¿z3fUQ™9ç^ÕuZ“„f‡÷/Қǻ94¬k­Ú‹µ¼_Ÿ)ÖYÀ·;ð).øÚ |µ&ÓR´ClCl{„m÷ù7™~«¾èµ×m{#›÷¨÷eX±Â.Š Ø ¢Þê}¡Þê}-X ÑõðÀÑ´Þ׊ª”ݼ½/‘Lñ$2ÇœF 9B2BN©ÎwjC5!% “”Òú”ä¾ÄA徂·œYÆÀFç2Á±çÀõ3#¥ˆ.·~•Ü—B¤=g¹¯:Ccm1AÏJí«®ƒ÷¨öµavPûœ’J³ÓN1e©–Õ®ósµ/»4Çœ†9æÈ•XaD¹/¬âªj*†O‡ò&uá,§êXûƒd—îw£ó¾òö‘.)Vؤ/P®.Ñ< ]8y]8“+)¤J^²‰<¥ÌYHš¨÷$D*‚²uá.I®ÎˆØ4ã^²/bbBÔ…Ûh.îgWö†o>]8~ÐQžøJ3¼e+õTUŒVÅ »q¡ ¡…Ô…kï!«Zì¬u`~ºpæG?b%w;b%rÄJw¹²çùK‹S»ó—`¾ÆƒÕˆùmÆü 9X¨¨¿ê7ª G5“D©p¢»‚«³&2Ëuá¦v#‘A"ƒD‰ $2Dd$gúVëìFÔGÔGÔGÔGÔGÔ¿<ÔoT Öèã-_(&Û{ c^¿ª6³!Å:G ³ÙÙà©3Ò…ÛšêluÊCæ(ËY)Í3A•ž”ƒKH`)lÉ)º¸z¦§<ê:m_§<6|ÿ‰òÐ]MY{1°–÷« +òÇÖ#ðí|¨ ×v]¸:“i[]8ĶKöÍuáN{«¾îqŒ­úÐéûW?½:ZRf‹u@´Ü-OOðÄÉÞÃŽ¥‡—£vËЕ*ÖY1gw†N%žçÝ{À'°€¡‡ƒáõm, F%ûúýo{–ÜÃͽ„ÿþ¢ÿyYM#øÇŸ:“?A††L>0‹ZóÚnB§?¸ï䱓ý0yxˆùÃ{èÿAõèŠÍ¼¢a÷+ûG¿Þ§Ð//Ö†1s÷˜‰B¿(ô‹B¿(ô;`M—R} ähXéw¹tÐÔºsWúM‰[-É¢×:ɇòºI•±˜DÆR&ò…D¥ÑJ(qJJ¿æÐJ¿ÚŠD2i„^¨U– E2:’qQsŽJ¿—ªôûäИ‡ÛCLÐsSú­åàý*ýnÒ„”~M—XAN\ßÇt™-K2?“ú¥Bë,Ã,sSÌÅMc(õ‹R¿(õ{*›ÀÊP.%õK…&ÌiË·é &Z™¹WH,M±Â(y™Z¿µ¨æihýšChýeUò&ÏTÊóL¸d2›h̸L.mˆò9jý^’Öo±iÎ-KƸ¡DJÔúÝh.îç¤Ý†o>­_~VXªN|-@ÒÖ­ÔQUAÚ+ Çóe - Øo{OÎ×¢g­Có‹ûE4?ú¹y³Û¹ysŒsó‚t¥µgúËÔ~ÁpEpçî ÐårôÛ ú"—ƒ°°¿ì?…~Û©ý «Äqj'¥IVž7“±¢Xg82d2ÈdÉ “A&sALÆðó†}Êm±Âp×Àç´ \Í5øÿ "ÏM-1€¦”©bùˆ¦ˆ¦ˆ¦ˆ¦ˆ¦ˆ¦Û£)ë c/!75K÷ ùsÓUhÊMMMMMë¡)ï’ö(Þ&7%KRJóq/Ò*4刦ˆ¦ˆ¦ˆ¦ˆ¦uÑTs~ hÊW ©æx ¢)¢)¢)¢)¢éŽh*ºœ³‹Ø…´´n:5Ñt š DSDSDSDSDÓºhj…¸„Ü”’bùˆ¦ˆ¦ˆ¦ˆ¦ˆ¦ˆ¦Û£©ìJj.BÃaéJïÔ|DÓ%h*MMMMMë¡©êRa/â„ÌR‡©ùˆ¦KÐT!š"š"š"š"šÖES­.bO/Å:óMMMMMM·GSÝå†]šÊbùˆ¦KÐToˆ¦š š"š^ š.ÜïƒxzjxªŽ‹§ Þj£ºÔJKõ‘nµÑ]I.bk#Å:ó‘" E@Š€)R„Ý(‚4ûÛ\å†_>õ_Þ¸¢8ðÝö†ë¬EøÜ>ñ’[¼ä/¹ÅKnñ’Û–\rû4úmsÉ-1Lqr´å-i‹èK®¹ˆ\AÜJ@Ò1³ÑÓ,§NZ­S©ºÈV­ /ck‘¾ }¹dúRg­¥/u0O_¢ÎcrÒgŒ1ø¼ ¼¤/ÒK“l€ŠÜ/¡/¬K­ Š"}Ù°óöC_6|óùÒ¶}aG¢/†ÑÆé ãÌpy4úb¹j}1¹R‘:›yÉB&ò”2gcʨ÷$D* ? «w N­Eú‚ôå’éKi´–¾ÔyÀ<}Qàœȃ/ Í! !§Tç‰;µ„¾HHD˜鈷ú²á›Ï—¾ÈÝè‹<}±\7N_j¦G¢/¦Kˆn}™«~9+ؾ¨[MÒK7cLÍG>³;Ÿ‘V ŸiófŒMçÕR‚3ÿÀdãN Ü©ñ•©½“â—Ã"¼éRÆÚ‡õÏ,ðb͈K0Ðà†D܈æpCâÆ Útš Î?ZšÌmsš\s×ѺXg>R„Ý)‚Ô)¹¤É[ocØ*Mæ)$¢r™qŒ”NYÎ\̈•¹4¹Q..áukæGà?¼zùöõëWoöÉ ê:m_ bÃ÷¯I”KÔ?|FÌ´m]F\ÇçkáN£Â\S1ÇUávgÄu&Ó¶1"Ú¥!Ú\N<Îb›ÜêVAäq²Ù-ùZ[FŽ–írÅÛœíÖÜäFÌŠñ±ùÿ»Ã?Ãõð³Iv·Þôöy²{ðFy°x& n|ÿê§W,ì Z¬3ãØ¦qì¤ãÕ‰Ç"qrµ¹¥XƒMÍ5*U±Îl 6lÎ"Øl¹ìqà`£9?Cí—U»uÇÖbŒÙ=1ÃÓG¨ý‚Ú/¨ý‚Ú/-Ñ~1]sÀ“Æ;&Á=%¬Xg0Â=¦­M)vB옲ätvJL+«·¶žKK3՟ʒóÛá'T‡gw0%? †áY%çSTkë¿? ƒ[×}x|Ò$&÷ps?_²ùzü«²‚1ÑÅ•Ò:r郰@É ÷ÉpîÑÚ)=ÿmÞUåQ®ãßïz0'ç`¦EÞ¸±¯_潟ÿócï‡w½±¿Éノ¹ýëWUÓ¾½°¤n&¥ÝêÿS¾³WkôV>{7”ƒ|·‘„PI1G¢H”å%oUJ9ç)£‹›êFn©¾[\O_7); 7q\(—Ù<±ÞhJƒ£Âå)§ÊÛ ­[kÂÒGO¾Iî=u6÷‰ JbΨ” fGT9Íyœÿò° ' ß–ÂÀwÂ$Ö Y¿ÐÚ+”€œÿöm¼ÍËo—ÃÜ2ŽÅûánÐëßš|þ=@†¯Þ?6“:¹d>:á¸2žÊ˜¨7L›?=›”’«Ê4£úîfTlz_ž=iôÃÛ~õð‡áÍ|¹kôÖlܧÙäÝÙ´+~õ_XfÙ챋ϬܳʘH„¾ÒÌyÐà~®!Æ%)Ä##F³~žŒ+ ùeÚlæ¨æ(Ÿ0z‰u>Qj˜ðAYHÇ*_LŠ®½[ 1ó?öAå—}ÝüêfNV%¥È#+ £)X‘kÃÔêS2ª™ž.ß¹ª!T‰«_Y—ÖêäÅÖ[-}ÎRNTÌE®œ‰DzI3%IÖ¤‰.®Ú^ÖY0ë]IC”ˆÊѤžò€Ñ3`»‚«ùÞÞtéè|ÿVæ¯íÝøp?ôç:˜1E‚‘„.xJåa$‘¤xT24ÔÁ£×®œÃʪzÝû¨ù××7rj &xMÖØ*²Kâ´‰¾½µV’\«³[‰ƒt2#Æ8Ä)nµ¦BrC!ÆÉ\3=¶cupRë,˜ëmH¿%¥¶„&A£²†x1ÒÌIH_¯Ç»¾»yxßëw˵¦žE÷6Þ{¾ iv¹,ŠùúÀËA?õÞ? ¡÷:ïà÷ƒÁÍËÑŸÓ`ع„^êÅÐé„xw3ø­ FÝÎõu¯ß»¿¾~ÚÄåm»š´íjÔ¶«Gm+çz…í¼!Û¿÷å¨íÌþÚ±´»SŽÖ¢Ûyá±³ï—Ù«ÙÔØÝíÎ]+G®ÒÊr„¹~è<ÿ÷ŸÿüêåÛ7ßüåÛW Wÿxx¸¹êÂ<¾ºuþC¯ ,øø—ªº0<:ßÉúét)}Rº¨èdƒ¥›:Y£ä&dE¼Ò2¾-Ãuï>@C^üðÐï—MÈn:2ºåƒ‡À…¡½ÁUùýs]ðhp' ϯžw²ÔaÿZ©ý>ï úrÏiç97¥B×ð.eöy'‚…×þ¶^)V í=è¡—ÃOjÂO=_³Âœh¾VàTéœ,ÖÙ‡éÜîéœñ¸¥·›Ôba­í·o¾}‹ }Y }„»M$Ùén“é׋í¼K¸< l7K±}jbûlgxsb{›±ýBn.CtGtß Ý·¨ƒÀ ¾ï¹›GÖ-O(z¤‚G) ¡Î‚°XR¬°O#aYAX8$,HX° a9Sˆ=åZ¬³ÑÑÑÑÑÑý’Ð’†—#J¨eFˆ£-Gp"O/û—£ØU†µ×'D±Î`d0»3©92˜6o~ßt^ÕÚ,ÿûìLt¯J_†Å¥¦ü'çÌg)pž‰ÀòìÿÙ»ò·‘ìü¯0þa½‹ ÕuŒdÖãYlÆ6¾}óþ—_Þ¾±§Ú(ËÌàÞT´:‰Ë/‹Q€¿¾­µÔG °møl.×¢æ.Jx¾BŠ8†8†8V5‰ q qé4qIr»\*.w€–­•˜ZŽJR`5*D%D%D%D¥sG%A•ƒN ;Ú¨â ø[S6ú ƒP Ùè'žÎ‘N…ËÎIœY#c¡àÿ%,–>£Æ¤23Zc6ú5e£WY5x›Ac¸Ælôöâ~|;ù²ÑaùQÅ 9éltÞÐLœ¼µ_} •„Vä®$ÅÀ:‚Å0/ý\ƒÅ*ñ±³ƒï«ÈKGø>z¨ß-TŒ%TL6 µ†òvéIå— ¼ÄpDùsFù+ GœGœß çëÍP×´(|wˆlXÊ/ºð|…¤x@Ô© R¤.H]®ºXk. çÍ*œ·X qqqqqþJq¾æ¬u¡¤>Ò…*þœ2&fólwã2Ñ‘Ë,á2 3,®6}kr³UF†Ì”w¶f¢3 ãTì ü+¥ÄÓÌ¥­[ÌÈ¨Š¤š‘QuÐö•‘±áûO,#C5¨–g–'H,Í׉‚(¶;ŠQÊ0j1QKX*z† Ì 3˜ƒÜklA{‘£P°qµZrJ‰5ù:)0§ô„sJÕ!rJ’8'ƒâa.ÄÖjû$ˆ@ý¤ŒaNé5å”VY5ø‚@q­ Þp¼Ù^Ü'hÃ7_@N),?X-LœtN©jpy.¡U–Ð:÷—˜mRÓÁ攞o(G%>vvð}9¥ßGäP»r¨£r˜†PäÂPÞÚ|…¤XÜxÊ ØD”?g”¿’€MÄyÄùmqžÖŸS »×+`Ó4$³F]”YN]$Ç ØH]º uAê‚ÔåÚ¨‹´úÒp^åë$EœGœGœGœGœGœ¿>œ¯7§Ti¢ÉÑŽ(”2çšSZ™Ë¬p·ŒDG.³;—ÁœÒ Ê)ÝšÜl•¼Ã=ÉŒ4¶(Œ ”lj/ÒpLê¨ã4x©32ª"é…fdT´}edløþËÈ0 -õ¹å”¯Qlw£Ê ŒaN)æ”bN)æ”bN©«© ÙE²{,²{ôcc¤ G;Ì2ÜœQú±!ù:)0ýø„ÓÍ!ÒPíIÐ!ÎúX$Æ€âQ<*¡VÍGÇn˜~|-éÇUVD nCÐAT0†éÇ›íÅý8 7|ó¤Ëˆ;éôcÓ°â\Ò«,!`$”¬ð”YéǵEý`úñ¹FýTâcgßW‘~Œð}ô˜³[Ì9|Ì}E@ËruY(OŒÈ×IŠ(ÿåatÆö"ÊŸ3Ê_Il/â<âü¶8¯ëO?¶†qs wH)|~iÔ…äë$E겄ºP¤.H]º uAêr¡Ô…Zza8¯Y¾NRÄyÄyÄyÄyÄyÄùëÃùzÓ5³†툂uY‘&Y•Ë,¹efVtä2»sL?¾ ôã­ÉÍVy^6¸àmfÊP‹Ôè8ÑVÄÔ;¢„3Ωt1#£*’^hFFÕAÛWFƆï?¥ŒŒRõó3»È½lñ5_qµí¬Hˆf»£5cÏÎFÓ‘1Ó‘1Ó‘1ùdÓ‘G§tµ οæÝ^¿ù%|ÝJÿPþ;mõ^»Üÿa„ˆ(ºz¯+ qhZ.öpŸ`ŸÏ¦O×ÉË+Ì:wÚH`$í»“vÅrösæì•6ÓRBôéûÐ.æÊ>ç”"§›îZ‚¬¸½£c3 }×j× ’Ã&gO˜«ì«6e¾b$$ÂfM°)6Ï6·Û^x2†ÐzÂÐzp:€é9öÁz:† †~¾Nv„S´BNÑ E¨D+t5PjVsÀ ëýØýÚyÓvy~à$µâTv$"â!&9`’&9`’&9\Q’Ãsè·ÝkLÛã%9h#N³T ÿYËY ‰#g¹zÎRe­å,UÃðvä,¼¡ˆ1\#gÙpòöÃY6|óår¾gáÇâ,Ï ßvœ…SnÆYŒd§ÎYªºñ—Üe?+"rä,×ÌY¶v×oê Ø‘³†`Çá9˦“·βá›/—³Ý8 9g1’ïã.{#ØÑ8‹å'ïªzg½Öù:‘³ g¹fβõõ›æ°íÈYTƒq­ r–M'o?œeÃ7_.gQ»qu$ÎòúmWË0¡ŽÄYXƒ0}ºœe×ÊWKó'&2#‰ÁÊWX*+_aå«k©|Å”г€»J]ÞH¡ò‚b@Ä*Œc˜Ôp]I U6Ó¶I c×c›'5˜“Njx,¶²kV`gË®eÃù³²k+A‚Èù:™ówÇ|´k/È®Ý:*r+»ëbýÃ۵œÇ1n¥Œc’äëEŒC»íÚ*›i[»aìÚ`ls»–Ÿ¸]ûXlc×2I¥’G³k¥>?»¶j ¼Ñù:™óÑ®E» Ýaõž£]qp»Vvvmå"t+üµšàýEh×"Æa:„1,B÷,*ÖŸ;Ea Åñüµºî+ `×VN¦²ù:™óÑ®E»vÃ}UŸ]‹—á%d·kVça×Vè2׆åëEŒC»íÚ*›i[»aìÚ`ls»V¸]ûXl‡l™áDzkyƒÔ}±ÊS 0\ÿþöÓÛÃÅfÑåÅA Y-bý6XÒ~âp-N.¼ê J“Ãvg£a*Z”Š|¬¨a–hŽæì4Ì–Á5 gòl4LU?¼0ù:YQà†¹ ³¥+ýÀFXr6¦beªx¾NVÔ0¨a.BÃlY\áÀFj{)÷ö™ÔET,[)¬ÍŠ÷öá½}xoÞÛw¶÷öñ†1ö¤Mˆ0ž“.ƒÆgn<ìÓÖ*Öš ¹:“®R)Ö¢×ͼ:¯ÎÄ«3ñêÌëº:S4ÈY˜ U¯Ç6K3&R"Æ/ÁxfÙ [Âôµ UêRn¯]ìYˆˆ…ø¶R)h6àíµx{-Þ^‹·×žííµ¢ÁÄ9˜ • ïÑ|”ˆñh6œ¹Ù°%LX«pn.åéåAJQ¥ Ù€HãÒx4^ }5H‹†ä ̆ŠOé ³AHŠfØ [ÂôµŠdìäµJ³èX6G~ãm0*$À=.Ù,¶Ü’Øy*”¥@xVzH¾N\T/¨^ÎZ½l¸%ޝgÌwjBŸb¡x"ocnù Æil¤õqJ3«˜“YHhTù‡O×­[@`aU}‹çóÃT_ÑèÃû_§ç_Â÷¼S]en8ÌMÿî¦_ìÔ¼ˆÄ¦+´Ùä²Í}ŽFjíé›è©ÃjHjËR®ßâ|ü7ìʸ¿¨5g”Ùœj-Ÿ›jÑÆˆ[iñ˪c»Ý¹E"•Õ™a>ãžÚàƒI‚äœ[I“”½6Æ‘T¥Üf•šs§3.S*¨#4R»Æ¢Ïi¬­·ÅÒƒ‰ò«Âà~¶÷]7-ím°Åóük·—¾(KÕå¥eù¿/Òî½k <<HCæíþìÅ£ û}ô£LJëLšHŸ +ˆ5Üg†sïŒÖNÍWºÐëEy0ì@3|{hÁžœ)n69Òh:Û·Ÿ>þö!þõ§Ö×w¿5ïÔm/Ë~(»>÷ôœAiÆ!Våÿ~+ÞÙÊóÁ*ãóéozÝb‘ï0,DdB¨ V/ "£,YÈ”RÀƒÑ,Y–òÙ¼9yÝØèîuÛatL2lÚxb½Ñ”¦Ž —d UÞ¦ÚzokMº´éñÃ@œ½§Î&>c‚’0*%ƒÝQDø'<Ì>Ü+ÕÉÜÓRÈN˜äºÒ ­½Ò™’B‘Ù§ïÃ}R<]L,s˜8ªþÛIº­N$Ôø÷·Àr}ùþ‘˜<¥“H惎+ã© õ†i“Á_/Ƈ'™+)†t\{xÔr[äB[þñ¾S6>èµg{†oGsÛhL·]þè_YfÙ´Ùù6ËáY%„O™II€¹ÒÌÙÌh~®½#Ä‚Ã]¿‹Ïê•‚ü>é6sTsdÏ X½Ä:ŸQj˜ð©²V Çb|äØº3;ñ£1(ÇeÅ\wºn:H" RŠ$¤ÁhXM©‰°L¡>ËŒªg¦‹w®š_PUâæ‘5h¥Ižï½ÕÒ',KPE‘(g‘^RÇLA5©cŠË¾W„uLgWÒ4IÁ†VŽ ëÔð,I=38­š]àMƒþÜü–â¯Ý0è÷º™ fL‘ÔH Μ9(+‰dŠ%Óš&xøÚ•{XYUmzºÏÓ@]æ]¢ábˆ —„ <8KM-3<ê|»W*2õ–ŠDp/H\†'6 ,U|v~;¡@üen~Gò¯›âük+뿘Ñ"•Fgž ž[K3¬ÀÁLLê¡ò•Õ ¹>ú¹YŸ] Oä´F0hÖ fˆ”ö.•ÒYåµ¢5-䡤«T,¿Ýeœ.››Q£8(-¡Xj2€[ìTK¨¢sÊ ;¤þÀO{sa8JëÖ XÔ>ÜçŽ%M¥^ bŒ€&-(¡„—I­ õŒåäÅkT¿©´–ˆ tšyPi†øå¤¬$¸•œI“Õ±ì§Ô¡*‚ÕÐA­À.I¨¥¯ Ñ–Q'ýìlÏ ¼8 ë¦;q½ ³špP—`diÀálšdJX F•L1[ÇPߺÃHÍNø¢u)0 €ÉO2Ï$d *ƒÁ¬gÉNÄXdœVAù„û+@M¼0!M‚òÀNÀ@>m”j0:ã{×q…“qÖ==usí[°ùÌ\ƒÞH¨Í5‰Hol©Y€%qZÇ\ßZÉH®4Ù‹RâÀÜˈ1zŠ[­©ÜPб©d®žÉɱZ9©uÌÌ6˜ß’g’°ŸiPÖÐCŠ™"°£c׿¨¹æC{pÛê4г¦–yã>ô{-ß3»8–ƒ|Ö3ð¦ÛÉZ·ƒÌ^ô~ÑïvÛo†_gÝ^ôÐM[Y+¤Q”†‡v÷{¡ŒQ³Ùê´úÍæó".ïÛ͸o7þÝ,ô­žë=ËþSè«6š~,䎊՚7¢ÛÍNŸ/¾Ù«ØÔØrËêr'.¥Œo¿?(¥,V˜ë¤ÑË¿þËÛ7ïßýõo?½¾¹ƒÜüÏ`оiÀ>¾¹wþ®Õ)Nãá/ƒ¤¨Ë#êú(îD“íRŒI1Dyw_ÃÅ1¬’vç¡ ¤¥Û{=<†k<ÜAG^t:Eâv*£Q4Ü. ýluoŠç_ÏLÁÿEÐá(N_Þ¼Œâ,bÿRV²u;Qq½ä¦A‹Jù¼A™}°éïk˜•bÐÊ…G̺XuøŸçwÃ-UnâLO)£~÷Iß_1ö2ryô²˜€—Ñ×Vÿ.Ö ½`K{¡¦®Î2Χõ¥Ûè÷\'èö&›ºx)lÛ?ŽôߧůÆûu“š©°ŠQË›Ÿ/ 5,uR_u¬ýT¾ZÙ}ЮyßMËïvaÚXÝb,oùÉL”›ª–©¶Tû\,6»L‚áÅÀµ‰1ºgx/²,¶=/À~ÞV4«C¦'-Ö-ÖšæŸH6Šœ¬C¤qfݲ,iw^ˆ¯!¹ƒêbÜTÝB,kw^ˆ½Ñ짇ӮÏg ®ÛÍC>êßV|rSДü!øø‘6îú÷í™Æ‡öZÒäû, ö÷þMùSà÷¥÷ªA6(Ç]ÄK&&£Â§Z¨Xkc'Rs!µ&AêDñ¨òŸØ e|ø\– ü±,NøCaû,Rש™ŒKõhÞ} FónÍ[el1š÷J£yã.kþ½óá˧/ï¿þúéÛ#ûÛ‡jEjÔѼ £y1š£y1š£y1š£y1š£y1š£y1š£y1š£yŸ?‘”òJ‹Ô²«+,R³¡ÜX¤¦ö"5“8j‘è…û-R£Êò/û*R3ßúŠÔ¨†`‹Ô,‹%d#×–g“ƚ§<ë3KXlˆÏ¬WL3â¢Ê?¬èÚ*£â†“ÛWgú­Î ;¨ÝÙ%´Ì×Tug×¾†êÔ]ꔜ]UÆ]Wê좟n;9ÿüéÓO_]ò—ö'öø9Cg:»ÐÙ…Î.tv¡³ ]èìBg:»ÐÙ…Î.tv¡³ ]ÇpvY³ýµö[)nŸl{sÛûú&Üß//š¶ù:±0ñv÷3D€Ì»=³¼ÛÙm²ô€q0tø‚òÉbf‚Š…:6œ¹ØÊÄ)ö’°s”±l±¬üÐÊS|oNŽÒÊY¼¶ø6d ¿ÿÞ,òZÙh* ª3kj(dUjL ÛêÅó™c#wÚ’sMõJP×&ä)O!¥‚M§‡­e‰BÝÎ|vØ´-Ý ÇÀ'®¨]r¶ ð°KÁ£^.xL¹“6œ§Þˆ8Í2X¿”g± †ÇÌ{“ÈÌØ`É’"/£‰‹±çG5¦‚hhˆÚ’¦–Ú`%“÷{ÐÈí÷é2Ï}·dºÿõû?v<½ðvVµO³õ³ÂIåbÊRVx[æLL­¨5R’,[Ž´JjDÚý#-­iŸLÿZ´­²4fÑö ;´¹)(Z ãÍ;nn¼ƒÇ}\Øfóí¹Zdž]X(Z0Rxk9©”`r†*,ЂeôáÐT®ì:9s¶¼DicÊ|\hcn ¹‹ÈÇß¹™˜³Ûd)ê=­(óûá^»AýV;/Ej–ÿ†w:èTÓõ@¯´ÛÍYš,¸ü.¤Q/ô=PEìlÔê •„Ö4Ê‹˜Þ4|ñìR»Yþf!Ë.ÝL{WFR³TR&éZcC#Lä+Db—l„ͳ†æ¦ qôøÈðæý»O{÷ùýç_'§ÛCÓK³!1(aj{ù”L‚žLî‹·µò' % 3ãÄ™4Ê„Ø:cbŒÈþŸ½3ëmãhÖð_!t“›ÓtïK€ƒC&’¶$NÎMaV[€")ù‚ ÿýëá"Šæ 5Cgã› #¦L «ÙÝÏ[Õ]UI`#–ÄÅ 1Zƒ4ƒt±ö{VUfÄž9ÿÊšÊ[¼üãìêÝWßuê-îή¯jÞ'ÿy¼yxº¿ñ‹ðÅ0ç 1Ûï?ûÃãWÿ*¹¿z%?,N׿þu7ŽK*9ë¹'–W}Fí ‹1ëv½<£à;87¯†ä¡AèQº×hvS)ä˜Ñ\|ÉçÙl ¹Íhšf hîÍŒM•v#F3"+6Ûàþm ššf hš;D³˜¦ÇŒfYˆæg³æ4  hšf ¹C4«©¥fÌíÂv±³æ4×lód9šæ£ùúê»k yÜhÞ§[îEÛ¬¾X['Ñm¾àɲ‡'¡½@øîÛ™Z½½}²ÛïäûyþxÜí\¾·S¥”¥²›Ë÷¹IVúôÝ–ˆ ±±±±±±2B±¢§Lª“«Â0ij٠;Ȳƒì ;È>6²sÞÉùß~¼ü¾¯½„í+ÃÇÉv¿ÓÌ¿,k­. /3ß?ç/½Yî–þ¿Ÿ–»éÛ«ËÙû÷³w~¥! jÖÓ´‚A@œXlæ6DDÁ°D§cBÛ®´w<Ÿeû̆×ßâ¹âx ˆâ‹ß-Û¼~• n;º~ §bÔ†¥ree6ä ä ä ä ä äÊøäŠpm\@Hþô¿à(¬ç æ²Ôˆ+4j%4XøõÜ+¤Ûz«yþÖ'ÿ¿ü…ÿí´ÌXÿô6›ø¯hó®UGùÉ_Ÿo£Ï“àö/üç“Û?üë&“/ŸÿÎüÀçNA6ò;R6yÊü’Ÿ<~~˜?}ú< ?m&¿~˜<7àœ.Ž –Óo«?üŸl˧lÁË_~úivõ1ÑK¨›Õ[-X§‹ä^€m¿ºØÞšÂÙ£~_pbÕ®üчóùÛÞ½e+/Žß½wÛ*jš•X„;ß íåh«ˆ¶Šh«ˆ¶ŠÛ¬j¥­âÍvTd\d%fEGÅșȄAL"Å™÷ÀCêg­ gX)m„]ÞIªÑ¯S#gˆuTÜϺÆ;*z^Äi&Äê­¥Ô§“€°ˆ§,YšŽŠgÙQ±ÊÔx ÚVVè¨:*VávT¬ù礼“J3)y¯Ë£è©Vn(ŽåN3Å’{É+“àY6%4Ð}7Å6Þàí}œÝü![ïsùQ‹G"c)‘)7Ä…Ö;Ae¤„uáæ¯î‘à×€ºHSjS.#’P&ˆŒ¢Ø(ý»]lü_MØ‹„m˜÷énz®M[Ûó|ˆøÓìòúÇÙÕ»å1bcÐ{1¸oªZ“Ä;âùÛ¸ÛeÓïÑ©¶›þ?ÕÙÕ#̰¼õ½^Ysf7«ŠËí;³_WG/ÎÍ‹n¶Ú\|¡=÷¿³7B¥4¡<"ÖшH!±Rx (?.4µ£º¬.*.±Ëf•qQ2ÝË—Ðy:­:†ÍߪùäÒûA;‘ľ–9͙ƅªçî¼qÃqç«O¥Å9rÉåÝ•Åðö÷öDˆ{¨—w+),@ {Mb;õ{ÇHIì Iül1H\@b ƒÄ 1H ·KbN§ÎÚ±’¸èŽÜÆbx—Äþ$‰Ab¸]‹)Õcõ‰ KKl,‰ H,@b$‰Aâ–I¬¦œÊq’˜‰¢S‹Aâ+$‰Ab¸e›©l¬$.ŒNçs¸„Ä$‰Ab$n™Än* )‰ ë)n,‰ Hì@b$‰AâvI,ØT7:]T sc1H¼KbÁ@b$‰Aâ–I,¦†5:My¶Ïb¸€Ä¸±ƒÄ 1HÜ6‰ÕÔÿYùĹÅð‰ËHŒ[ 1H ƒÄm“ØL”cÍ'.º;½±$. 1nlÄ 1H ·LbéÅÌX«]ºlŸÅ q‰qc $‰Ab¸móüŠñXω‹îNo,‰wI,9H ƒÄ 1HÜ2‰å”ÓÑÖØÒY‰Å q‰%H ƒÄ 1HÜ2‰õTŒ5:ÍhatúÙb¸€ÄèÅƒÄ 1HÜ6‰­çÒ¡m¤ý4}¼ îžûE/F$o-¼Cºøïô£¹(4JR>RGßÓÞX yQ /Ð` òòòò¢}y!-kÈÝdû,‰Ab$‰Aâ^XÙ¶Ë•üøöãå÷í$g¹lŸÍãd±ß#æ_ò¹ø|¹ ¢Å®”ƒ!éÍrŸó¯øeô´Ø£.ß^]ÎÞ¿Ÿ½ók¬E„„á'AøfFâ€xëß}{Nm˜1«ßÒ6âµTcÍùY‰ÅÎvS¤æ 5H RƒÔç@êέ:n_¤ßÞ/è(µiá°ÙB“ gc ñ«¬Äb¶Cu@u@u@u@u @uØVßüv”}ž é|Ñeo«ma›í³ >ÂR[@xh~±LöB¶*ëv0ßf_î‚gœ]¼[¬Èü±ùO“4õÃý}“}I¢ÛtõU¬w醴4²ª î o®œ%ú[E70(:.âKëа¶eh°É×?ãÚÝäŸóÎÿòlqWZfû '9þy^ÈFRë”Å"?y£0!!K •pmyÈR·2Yôpûeµ|/VBò±%Û£J˜bšs¡éZ×Ù`Öú¸Hðý{*Ø5ãëlæÕjmèå®$™Ê³·½ÍÈÞ.%|Ý&"ÙÛƒ½ÚUEguŒåë«ï®åóÂòÅÚŒ8‰nóuMüvs{Ÿzq:ZwçËuqçK±)×㥷-*w¾±ôÞ¥·buéÄmÐûtôþù—ËËÙìÝè/gƒßà÷1ün0SŒO™¶ÖònN(¼IBÑñJš•ØÌ I I I I I I-IüÄ+¿eÙ>›Áoðü¿Áoð{°üVº¶(Ý>~¾¹½÷_õm|³XœÍf„3*²óÞª‘ŽŒpd„##|{ƒÕFwÇf“Ã+ñ÷V6Ž=9<4&4RKâwº˜H'½”³iâ§µJ1?¹]ÝÜS«˜¡Œ3Ý£äðýÜk<9œK'œK¡i̽µ‰!NG~|Y")§Ih9GrøY&‡W™/¡ÛÆUrxÕ>arxÍpxrxÎ)é•}¾Aî?¤1lç×yâŽgûìƒÇy¼ÇɇˉDq$Š#Q|Aªü“U˜*"q(µ#Ê2I‡$`Ì Iý·Î´qQ¼;Uª²G:UªÚ©¦JÍç÷«¦@ì7YSÀIÍdg7ö¼³Ñ•€“y¹ãË P]èY™vf媺(¯Ÿ¶þpõëÛ÷?¼«]r`±d[Ô•²òä²RžäÒA¡ Læ7$Yæ÷·|þóÛoiðt÷ÍãÄÿÿ·ÿÇåbÝúÿùŸÉúÇÉþ·¯ÿÁËÝÆo²_ž'éüa’Þ&wñ›àÑÿ³ðé1™,&útòkÞ?Ñ¿å›Õ|ÿ훩ßÊïïç~S~ô;vOæ~ø–'áÓ'ÿUÏ\ÌùÖ{5mmÞ÷óSœôRí²Ë,ünœôâ¤'½8ém|J9ïMòÞÊÍçpÈë¼¢§Fqâ7ÁÈ4ÄÑÔ↑˜)ºÀÔ.0Ì…pFœó)oȘû‘%ÖÞs¢6%–šhIÃÈiø,-Ž’(£>å­25^·•:ªcÞª#|ÂcÞšáˆc^O*F­ëu pÿ!™ Cs4¿:áeTg%¦á„·Œº'¼8áÅ /Nxq‹Þ1ð¾ŽýOx½À£BwtÂ˧~5 3Ò³”m*ÛgÕ™îVuLš©ìA.o£`¼ÑÆë‚/ÏœßÎsñàÕñ»³’V;O‡ X®Z µ:Æ‚ñUfDÝ )rݽҰF£Ä|­µxšÄõšO~‰ùÅô³T›žGŽÄ#GÕ§Tyê@n9K –¬Ä©ÊPëÊTÒgƒÃùY”¦λ®C£øQuhžßÞ.õåTr6rêÛ¢ö2ËAýê˺ÔG59P¿OÔ?“úsà>¸÷›-io…ì,AΛääÈ¥ŒáÙ>Ë!e e e e e eÎHÊ(£Æ Ù>ËÁ}pÜ÷Á}pÿŒ¸¯­h‹û=Ìï?Ýl_õk'í%7Î}Cg~Ê€òH{AÚ Ò^ö‚´—L*¥¡W’Öé–ûýÒ€VùmY¤ID“Ý©RU‰ŽuªT´“M•zÏïY†Ôë ±Ñ )c¨íìˆÏûÜKþÆJa–ÜJZYxfÙR/ Xö#!ª¦cÁü T¶< ²år¶yQÛòŸß¾)X$¿}³U÷Ò?ð›ÍBYþpµT–?\/–üGùç¯m–ËËWó³þû¿yEÍÙ¾ø¯ÁïþÁ$òÄN‚(¹ýÓ¿¶þ½)­)§Vœ( ´Œ…-Ðp1Mc³}¶ Ösü–Œbš(¦‰bš(¦¹½Á:N[‚E³å3K³ܘ³6å35O˜·Åy…üÈOZ姯M#“pÆ’ÄÔmÁƬ¦Ò2§XŸÊgÊVËgR?œ‰°¡Aʈœ‘04y;†BxjDå3ϲ|f•©ñ±­¬ÐQ•Ϭ:Â',ŸYó#Q>Sæ-¤½.‚ ¦”¹þ;“;- µÁ³1ð&qs7ps7ps7ps7ps ¢Bl´{¦’wts@MeC ü-ã},ÛgǙݨê§öãò€j£šjê·é0Öš„‘óC’ª˜¸ˆ¥$J¥T*”¥ÕTÏ©šj•Q7bWÅä©aœ×˨¦Zk-ž&‡©æ“GPMÕO?+µ°=$z7aÄê“hqgQeûlEœ±®@ýÔ1¥!WRdƒøYÔOÀ;OBVÇ%!«N’Í”k::ÎÛÂVï¹­¨˜ZÆyƒr#àü9&åF@zþPÒŸ bªrÆÑŽEÌ4?x¡Ù>[!^ ^ ^ ^ ^ ^ÎH¼HÁÆGz“í³¤éAz¤éÏô †)rÔúõ£; SH'Æw—‚—ˆ´rxxxxx9;ñ¢\[·)¤GìûÙÇY+°w*Ûg.`_ö½fzÏy-{Äë–·­Ú‰‚J¿½´æH”œw®lÅÞr¼#Áj?´PÝUöÊ‘h¨ìb“˜TZÌÑüé.žÜÏ'a2IçO÷qʬ¾¾ŸWÒŒ‰îâJ†›ÑáÀ”HÍ•­ÀpGãÀX}š½sš8IÕme³}¶`o<~oDÕmTÝFÕmTÝÞÞ`­a-Á¢éªÛ2ÛgÐØ«n«¼oÄ$Ñ"¡D!'ÎEŠÈX0•0¿±1Y³¦¯4Örn¹ëSÑmÓjÑm‡,àZ¡BK¤8±^ í1<äž®¬è¶]Ç\t»ÊÔxIØ6è¨jnWàÖÜ®ùލ¹í9¥Œ3¬×¥rÌÔYÓWòënݬ$ζ2¾äñ¾$_Uw¨¹šÛ¨¹šÛ¨¹šÛ¨¹ÝlÍíŠS%òj=ô“(m™÷¯¼ì ¢PžÒÔ{EFhÃv¦Ê×>ÎÈðRqHN†—zÏïYñõ×]…&Û¶3e;kÛnó °C‰ÿ.œ;ª³}vœYñõª‹íü‡Ëë«?\ýrýËÏ_Õ_¿0|Œ8avÛFvª÷ÚõÛ¶ˆL„&¡¢~·ÒÑC9/ÉLb¸A2Æ ìUfDÝðmAґ߈üÒâµEw^EØ«~óYG5Ÿ\šuô¼3  {>g¦×±e;ej±åêÓhyi6Ûg+BÏuAQ‹´5u¸’,ÅAqP\õ¸‹ ÷ŸkÊ™¾ÕîÉñÊVÜB.Äw>:À7ð |ßÀ÷pðͧ‚˱á›ÑB|?Û |à›ßÀ7ð |ßÃÁ·œ*ÊF‡oa³[Ѥ ßø¾oàø¾õTóÑ}3γ}¶ßøÖ5ñ­Q6øî¾Ï¢ ù™ã{ ±n±u©‹îKiÛ#Jiç&´_J»ë×k´S%8ת‹4‚¥IÎŽî6€¡%‚Æ9š©1n|ôwÙ>[AÐôýAÐÿÜéoé Úšz÷›uঽä†ß~¼ü¾Iãd¶ÏÚqJ¿cÎ¿ä æ!ùrDɲ¼Áãçü¥7Ë]ß¿â7•§%Þ^]ÎÞ¿Ÿ½ó;N‹JÈ 6;”PÏ”Ðf)@ A K y¨iÅëH9ÅÆQY‰­¸žÙ˜ `È€ÎøÏ›‰-$í($b¦TœBÒïæÝ_ÞYÖœ©RX|1š&Ûg'äLr†£IÀPåL•e´WÎT-ð¿†ËR‹äfÜÞ?ÍŸ2è“ú_ÈiôIÍ'·£OØ·¬ú„š#ô‰7¡}ò:äÓ'Æ2Õ™>a”BŸT.%i³}vBŸèƒp Â-· Ü‚pË…[r&ž@Îh'¤éNÎh99S¥ãÒb4E‰œÑ r¦!9#qv¨r¦Ê2Ú+gªv>[ÃÅQo‰QœøQ ‰L#AM 1†©˜yºÀÈ>åŒ[£wåÌõÕìçï¯?ni™Ÿ¹¼œÍÞ]ËTûæµLÍ'—j™–íÇTöèB¸ð£â0Ïoo]¸¼B¿Ã„‹¤Œw&\¸F¦JWÑÅEd™í³Âåxáb„ËP…K•e´W¸Tíî»}Nä­Î>Ï!Cj~§‘!5ŸÝÍC/UÖ|ýiŸ¥ÐO³ËëfW«xLc äÅн©:$Mê#ž¿­Fv«“ÿÞ6¤¥5Ã!Z¥ÑÞÊ—ÖcÍ`L/wX`l¨«´˜ ÙR©v]Ý×ÎéU¯s¼Ž‚#áÔÉμS¿ Ó;­œÉɳÃoÊ;5X‹wzpjçaÞiäG9J‰Œ¥Þ憸Ð:Bc'¨Œ”°.Üa~åìѱª‚Šƒv2UPïù½ó_µÔCò_+Œö>ÿUKtØjÊ(Y0pÿµÂb:ØËÎŒeµ=\Öw÷5XæáJ×a®œaz˜î±µV†üðpááÖ\WÍy¸IH%óÿŽ0ÿ'‘Ææ!ÔÀ†~uj\¼Õ®\`¤ª ê JÔ|~ï<\KÕ€<Ü*£½Ð% ³ ƒ‡ ÐU^L‡z¸`Ù¹±¬¦‡û¢ÏP_=Ü×`q˜‡ë﮸µt˜nÕò0¦¤<ŒµÈ²†‡ 𲮚óp•‰ŒÒÐ?ÆDZžGi@«ü€‹4‰h²« ª'©*¨:h§R5Ÿß;÷4=tNåáVí}©4袠«±˜õpÁ²scYý[ʼçîiÚË0ãþËÞÕ6¹mé¿ÂÛVRuÃ÷—\mù.²b»’HNdÕ]¥ÊÅ ã¹G’\þû5@î’_ Áí.í.‰A÷ÌEUÝ7ïSÔù8…8µŠMmùú±Mi[ˆŠDÏØ†A Óè@\„±#WZŒi…Qµ}—ÙÀœÉ‰¸Ò€a:-u vîÖU·ýÈ£‘§¬¦20I´ˆ”Hxè\PD¦‚©È@oð·UKË­æ©—¨?‡ñ!jŽ|œ¸DÑ!åôq e÷p+@„SÅ%Œfmq+ªÒ¿ùQ±ä;º—àVìÈàG†«Ú‘¿T±¢ôÆx§U˜¿ÔÔ‡q‰ÖÞYص€tÝŠ˜ËùK uþa8Æ(CÍ©8н…z#_l”¡VÁÏ-_?¶;àdkÒ”ö¥m‡õ±Ñ¸Œë »1ï1¡…ÁF”-¹)Õ+ÞîFG‹³4 ë õ#RpF’ĤDÂbI„€eL‰1ëJñ–2c*$bLû1¦æ–8=Ø0ÅZ6 KRαփ>©Íˆ¥&!ZÒ$8mŸu¶Rù6™lVÁ†Q›6‚M•-qz°á²}`#Ó„y®*±ãž›¤šná ‡¥ã6j™ËŒ`ƒ`s)`SeKœl5­ëôJ{Â8èSʈãÞ–ÍœUŠfY6zƒe3“ÁÁæRÀ¦Ê–8°±®}g6"K³Db ÍRêˆÓxÆ|²(DiÙ°|›Ì66sfSaKœl¤nŸeÃ¥ÎEGh–r"U4 Ù®*‹’r;KIßp@<“ÁÁæRÀ¦Ê–8=Ø(!ÚgÙX›XG%áiæ‰ä’Ä%”0“ªTr—*f·¹Q3™ll.Ʋ©°%N6VU¯Þ ïDÒÄ$BÀs˜ð ••Š$…›((“YFƒ‰ëTþàèõöÃðóŸúùxŠY°zÞ=Ì‹u~xóvžNûsü5Ã\W™“3þp;.¶j0$øk¦j0tHu4‰k_®±' :&­&Ï*æDñ—_H>IþÛ’ŒWasÍ–°µüÞvf;ƒôÓâ“Uu»[zl¢´3™å!¹¢M"P•pŠI®¿³ÖÓT§ÂeSFo2¡R&™§,ZÚ8d±ç kçm±6ÿµüS‘ zó1ò¤e"èÍlÉÏÃQzS¶šÏË”Çޤþ?ýð4o5™ŸÜób¿™ýªH,}(SÊy›&*¤ÒI꬙"xkŒ×f)«6úº)³T§/Ћ¿<ôaO.4'ʵíÏ^öã«ÿŸÒÉ_Oþø’ˆùn0þ\¾úÒ·—2íc’Lùßߊ1ûy>Ù|Ijù³£a±È÷P •™”:ÓÜÓ(3Æ™ÅLkí}`œeɪZÊïæ½§á³AGÃû8Ëß>Úê‚5Œ¥žIŸd ÓÁ¥Æзs6]ûèÇ/Gš„À¼KBÆ%‹™3¥8쎨–ˆ¸øåQ 'KßVÒZ vʕΧ.Z/ ÚdZIM¿ý1~LŠoËÜ)N¥ˆƒôaØŒgB=~þý½„rü™˜"ÐIÑK/´ LÅŒËÍ৛ǬÞÌ—Ù³Óþ~šü¾hÃ1}Òô‡7ƒòá“ÑýbòtT2›SòøŒî|ÛåŸÂïw|þØåg–êÙ$DH¹–Mi„¹2Ü»ÌP¿0ÁÂÆ‘rEˆé®ßG„gqc£ ?=½6÷̈Ö^°z©ó!cÌrR휞êâ1¾ÿ,˜Å‰Ÿé Ôˆ¹ ?ù¹’d•’IL£5°šR'#a™zËB–YÝÌLcnš_€*yû‰wY¥I^~{gTHx–P™ho#UA1ÏmaÚÄ—ï^¶I0Ÿ]ÅÒ$Õ2j_¸Í‚Y‘% càV)ôâì‚Ýô0/Ío)þÖÙ“ñh8X˜`Î5M­¢‚ )²Ìƒ¢¬$šiµJšàé°÷°vºÚô®¼¾H#óYð`¦ÈPKµ\’*Šè³Ìðì囨½Æj€È48&)‚²2ñQZ‘¸,‚Y%çwÇ@Ä?/ÍïLþmSœîg㛼©²& Œ€„s,3уø‰I*‡¬æÉý×»¿ëUaàg×Âr:+9<6Hn©”ÊŸ*åF³†òTÒMPËoç‹¥hH•1«€–Ô<µ™Â-vª£L³%0NM°OGKˆ0ÕÒ¶õ.uˆg`¦³TŒ7[ÂS@(áÀ`ˤÎÇftù4ðè·•–´I³fYÁ_^yàJ*Á¶òRpe³&–ý\€& !a2:/h´Ú¥ SúÚRã8ó*,Îö’À«ZØ6݉%à˜-`h".ÁÉ2À/Ò»4É´tœ2¦$¸b® U=Žº‡¦'|UˆŒù, „É¥H2“Àf‰:e6³dŸÄØDd‚Uaù„û+‘`šicšDÀ:ìi«ÝâTƒÓI>ú/n¿-Lö“¶ÍuèÀKø$æp#a.Ö¤2;ˆeκYÀJ¬‰¹žŽZÉI®4Ù«RDêÁÝψs8%œ1L*a`lª¸of²grl'½M‚…Ù÷[1æ j’,jgÙ‘Ï!õBa½Ù¹koö¸ÞÃýä}Ð-Κú!æÝq<ê‡.¸ÙűDœä‹¡—ÃAÖ?Áìu~€OŒ‡Ãû—Ó?gÃQça˜ö³~L;4>Ü-À¨Ûéõúƒþ¸×{^Äõïvûøn·Ów»]y·Bxa,û·q\¬ÚÎü¯Ù ¹;ÅjÍ»÷;ÿ~ñ—ƒŠÍ¬Û_îÄç±”ñÕ/1LJ)‹æiçÅßýþÕË7¯ÿðý·w·ànÿ1™Üßvaß~ôáC/Xüðó¼”ryt†¡C§íRè¤PQÞ!ûBMB`•ܧ$÷`´ GwÓc¸îÃx‘»¿NƒâÈ} £[ï¼(&àEçsü¡óxX7 ƒ­} ;A”Ðû?»ã‘äÃÑÓ¦.…mû›Yȩûôß;³µ_F¿Þ~×s]÷ÛµC8-Ÿ¢8q†gÍ„;¿™rPÛo;ù$€6sÀÀÛðtUE«Ú+ÔôŸK\ëþ×Îì*÷šAY—/Ö Ú 5~XE‹l8¤ÝÎã2‡·-Pbþu2}`iËÃJ$ôø âÔZµ(íj´˜“J “(<#’)AÀZS-c‚¦ÊïJ ²«¥=g¿úêÙv®¥Ã#€¦R½ð¶Y[S½*™b­cm†Ì}òD/¹_¢—¬.•ªÖÃ….•ªJ;ÔR©9þ™e¢>OûMf¢R«¨9ÑIŒéR«[‘‰ÊØÚS–Bƒ™¨gž‰ªÒí@f lLAÓ‘‘:b3FI–É42Ct3Q¯ªÛA…ÑÀÁ`0ÎÌD­µt»³Þȉ ËOJaÅYg¢š.èþüC>UVOYtåÛ„Äã¢5F€ÁLÔ«):XÅks_GßdîS|Ì~s’€ërá.‡àõÚ{¯ ¤D‚ßDðs:àÛLð×RU))~7ІývÊDU‚§‰¸.ËåX-nƒÕ2­´ZÐjA«­´Z®Èjئ:—6ß&røþδÅB—˜‰Š™¨˜‰Š™¨˜‰š_*T$™R–V,KÉ•‚iƒÿ¥ÎgVÄ4:›®A•Іæ….•ªJ;ÔR©9þ™%-¢9^ù\'„<Ù¡]Ñ2µIËÂäÛÀ¤å3NZvÇHZ–,°{‰€Í‰2%6ôâD0ZI"&-_SÒr•ÑÀ#`f‚ILZ®µsÂXsä HZ†åË“š³NZv]m[´\eõ”IË"ß&$ž,6Ĥå¶F+™b­cî«HZFæ>ylÐít§ˆ rÖ5F^Á»u·’J!±¡ú‚ç ÓàÛLðW’þƒ¿+ū擖“šŸ&þ"ÙóÎhªgµ—o“–ÑjA«­´ZÐj¹6«ÅÉó<|]>ëN”Ážo“Y|çŒJ¤ñvÒøãVYŸ¸\~dÊ:u3Œ÷dm0³µÔ¶U¬ÝôÅ¢Šš>ÀÅ¢z#£—Hµ›/{b«…më¯^ ñ¢åëð§Ù÷Ôì×ùü›Ÿã¯wýô«òßitçóðÕÌ8øª&Žî*éḠïRÖhy§~Õ+õÒT„ dZ7®KÉžË‡Ž 7^u„ Ûh{t\NW#]™S7²ýŽùIŽýŒ: »?:Â:?2Ñ+¹è RØDô‰‰‰‰‰þB‰žéæžýè›áçÁË{ŸçǾÊdó Òa¦3r;æ aÎæ aÎÐuå =Ï~õ3KªU’(Ó™w¹¦gl®T®Ë¼á(‚k†æ š+X—ë2c]f¬Ë|Mu™+°ßNæŠSÆÒ“™+EQ¼ó5Wªäy•)<ß&š+h®\³¹Rem5W0§ötæ fÙžÜ\‘û™+òDæŠ8]1ÂPw:sűs>]©šè¡òmÒ¡¹‚æ &z`¢&z`¢Ç%z<Ç~;™+JÃ=™¹"µ:Kse¡iÂ×óŽw• àl8n‘U²_”Á†_­nøUw_5× ÌSÇ#è‘d2z"%OˆW`×P™¥*ÐªŽ«­|ª¦R\h+ŸªJ;T+ŸšãŸW+€~%Ĺ3]%ô¦u¾MF¤·ýéM , Ójz«´™Ör22Ø ƒ­vqi2ãñèX*ÅNÞ¬6LÙ“y³š¶Ê›­šëhX¾M\¤{ôfÑ›­¹¯šóf±1-6¦=º7«<{o¶ŠŽËëÊi‡ô†Þ,Ò[åÍ´«7‹ vm Vß›5gîÍ>G»]ÔsœΛ5V´É›­š ¿‰îÅTxôf‘îwÙWÍy³œêŒzØš!…- £9âL’f\¢-“©÷aÕ¨šˆ}¡¶@U¥Ê¨9þÙy³Öœ¿7[EÇÛêèÌdDzCo½Ù*›iWoìÚ¬¾7+ÏÜ›}Ž,v»ÇM™'óf]ƒ 6›­xSÊnˆÍºÿgïZ›Û¸±ì_éÕ‡8©JSx?¼¥šM'ÙÝÌ$3q¦jw'¥B£«ÇÉb“–½Yÿ÷½èæS"é&Õ¤H ú`‹b7€{œsxÄ«6£7é~§yÕž7«½Ãš3\ŽMʤåiÂ¥ÆbŠ<3@/~Ed»á>3µš*m_¶À–õ™7K;ˆ¿7ÛDÇÕÒ£•+g2Fz‹Þlôf›L¦]½ÙÈ`ÏÁ¶÷fñQ{³Ÿ'‹ÝŽùZ?Un–v°Øß1 4õÓë7¯· “54ãiªkižn¢ù£fó#gjvt«¨Œ—DÊS—†>Ƽ\#¦ŠàÁålÀeG7àÀàB5=pi˜n_ .1#¸Dp9 pÙ1c~`pᄸ4‹kù}Ölb°¤¬=Ë`ô‚£e=ÆŠ0› ­E­‹i¤±¸ f±ã':¨ô²¦¯{ý÷f®$–;ÎYær§$Œ¦\³L2¦Faë½íôt¨s]ÿT±Ë÷¤ƒuòrëµäÌÁ —±Lå·¢‚},Q]\µ½!l’`Þ»çY.˜;°×±¢>Ë€-QÌ2*{ì¦Áx´Ô¿•ø{×GÃ~o¡ƒ (WQDõÞ€¢,Œ$äu‚ç-up]íÚ9,´hÖ½šOs‡·&“xH!Á—wÔU+=.!B­¥MãBënÁæëç\2+RŠÁ ã@(#À`ËäÚ¸vt9«xô«FCa…BæÞ¤)øËp\‰ØV†Q•ocØÏh2Ìœ–Ð@)Ð.Ê0Ð IM°áv±·—~¨…MÝ™aŽÙ†fàœ, üÂŒÎ3/XØ1Š1gàŠé6T5­õšZìð‡Bxlr°€&a4óÚe–pÌâ„e¶3dgb¬#2Š›°|FÂüʘ&–)—gNX°NÀA{Z ½ØÕàt¦·¦gBnq¡³gØÔ×¶è—ðž.ô5àF†µÖD,;{­t…,`%QÜF_×µ6r’uöC)2àn€gDœ¢ZJÌ8U06çÄ´ÓÙ9Öƒ“Ø$ÁBoƒûÍ1ÖšvB+|à8$_X94‰»^OŠ»tÇo‹^'Äš ëÊέ Û7;„%ܸ\L ¼ê÷|ñv<„ÞK~'Fý~÷Uýµï“A?/|áò$ÉÝ ÛÿÀ¨“\_½bt}ýyW·írڶ˺m—Ú„§rϲÿàFaÔ&óo“É‹Aî$ŒÖ²“¼uPìüýðÍ^ÅÆJ?^îÌ”®’ñõgÇ•”a„™^ž¼øÏß¾}ýêç¿|ÿï?\]Þ@.ÿw<î^v`_Þ{Sô áûqN|‡á‘ôm’ö’Ùt : **“´Ô”¤)Œ’nž–® FKxU‡á:ƒhÈÕ߯½^hBÚM2:¡à!ØÂÐ΢Þ¿Zè‚ÿK ÁIš¿¸|‘¤>!ÿZDÿ"é÷’°Ð"yAU#ÒQ´ƒ‰~‘8ðÚÞ¶Ð+AiÕÀCjS¬‹þ—åM=¥Âz nøÃýQ=‚넘+í°LHú¢7yždVDâ>@k·e¬ž©Ï7©3e/Ú!ðy2³á3ë[.&38|FòiÒ6²ªbÐcµökSÅõ3Ë_ܸn·ñ ~̃’¢ýðཥÙǽ‰%Åç˃óX•Vrkiš$SFO ö4åŽRƒ2gH(»7' IƒnÓe­¦X¦X³é$ÜfÒÎ0p xŸ†ôi_ìÞúÞH‹°")&H×ë@´ä&%"·Üjï ãѬxB³ïó‰ÍVEƒ¡±tBÜ!æðž„k>Çï7/²Õ3â¶œ¡û8,n÷&,ÛLKgÄ}æX¶@x(œ¸ÅélOá]+"[²*FUs‹.S×Ëj¿Î>^ÏF|+‡¯Î{ôO¡à«&S(q5/7i!úè-,ö”(’éIźˤZI»÷J«™dß\)õ´)õÓ>øA¨oi8µMÓ¯šŒÑõ§‘mÄ^ùÕïy1¼2¥ýbÂ]_„f¸áU#mA3Þjh­¼éßÝ[%Ú²݈Ö¯$IMìÇ›ØBŨҩ[ØÍÎWˆ»ð£‰~T»ð<0Å)ß3­NãT0˜žŠa.×·F† 62ldØ=1¬À¢M†­å¹Ï±&Ï÷±ltõ™ã3™Î}uÈíÇÄŒª{xƒ” ’Ó”ZØ‘)7ÐÔÊŒô\I¾-Ri˜˜q„ŸïB‘ÌkƒAš™O™æA£ð›ñ8ÕˆºÆàˆgµŸ÷B‘&Cc鯾OÖ³ ›7Uö-†-›ð¨5#1¢ð‘ÑÃ(ùå›7¯~L6š6íJ™H~žæÅÿ„Ó¨G7ah^. ¹þ ¾õ´º‰í½éŽk¨XxèÓïtéE<•öä]úFÖqÑð½I¹ö¤¹v ’]MÕšq<¥êƒSp»Ë6?GÁ­Æ›°PkXÆCŒÚbѸ¡!²hdÑÈ¢OÉ¢ODŸJ©ýÓçÐÝöß»}ìĬ\#–~fÑo‹³Ü°”œ§Ì1‘fY@dÍ3B½a«vg×%¬@¢çè¦6S6·¤…Ñij©b(Ks`¡tžMî]a@°h@œu »ÉÐXc´=/ÏÊBhª×=Z[6áQ1mE…VÇ}r’ì „j´ÖnÒ›•Ý€ÊMÂ?Ó°vÝ+‡`s©óÔ}ïF–ÓQñël#¡ž4¡>6p­5‚©ñ$ž7PVæÙÖb× Yi±†eµŽ±ë5ü)·äO×XEþŒüù󙄬e ~â„ÿí£™3Œõò²†òkÀ²ß-ò <ªÜ.-7Iùññü¨5‰üxjü¸~Öl>é^pO­E© H¥ÌæYšqIajqƒuŽ˜|‘WUPaQÂäŸoúµz.yuÿ9ç=t“ýx]œ-ü¤ËjVš×¿ŒOz} P¨jÜ­ˆö¾¹qɨ?2]ÀÞÛ êêûÄõLÖuy2)!©J脗ǽb´˜j¹q·&”òÇ?þqÆü÷2 获n¿}>Nuõ-úTÓÖ´™@&ΔöÍÛ;oéR AŽ$sÉ´À}5¸çgÝõmñvXé½ikÿþçdþΤµ7ôýám»Íý½E;¥žMx‹ÖÉN/Û$ëÍñ’# ù¹ò ø½Ê49´½A¨8{cb.aéƒ) [í[ë&qku[Væ(.Ä>93ãþdùŒ‹í49MU&mÊc©²Ú¤–sB !X‹ÆEUâ*kâÛj^ö½n÷û¾QÑc,×´é-ÒÆîµ/sÇR€¡) -Öy3„'F0c*óí",« A¤á¨¨Îüãbf&÷|Õ¾g]ü¹žœËöPVô– ŒÑ°S.û˜ŒÀ™Æ4’»›¢ ÚÐZ6H2è‡Á]€)hM/ «/yÓOêPnU@uØ×ðâ()F¡”| eçΛqwôU/LòкºUµQT}['A~7,úù**c´¸uI°o†ï¡%Eê æeÕÄ·n:9 3³€þ¶‰yûvèÞÎt»©r ³8Ôª27Ãbôqc#27ºs®—ŒîúÉ-˜”€ehö´VÐlxzz.t€'Aã¶ó¹ÆÐº- Í¿†7oVëåûq¯B§d\†ûóú“[(®@_.´0<°ÐÆNò=¨Î}0@øÀ9¡o‹Þ¢æ’ºêä®{f^vx²ÚhT‰–Þ»a äYUPѤ´jVÏVZ€bª/´6šª´ÿÖ-é§ŸýзšËÓ`jjW¦OÆ!°¬Í ¨©cÉëÙâµf_|ú´ô‡¥Ö…=lÂìïÓÏP üØ”¤Ö”<Èå•3¹žÑrK—Y.˜‘)N–²\à"ÅS$<"6ÃÔ[jË-åA—[2£rá¸I‘¡.,ƒSƒN ñ¸<#`vÆå–Ïr¹e“¡±&Õö¼<«ìVS½î1»µe‘ÝV qäË-¥‡Ž.µ¸Þ²IwVwX‘rôìy¬·¬&øÂB˪?–Θ€˜»«Li' SyŠrž§ÌèD4à rg \^\OÎÏ­é\YU¨çâ-V%KiäŽ/:³\6Ü(bð¨Eª[†÷d}yv48Ny‘M#{sVÉVz¥e²b®î54öàŦ!¼Ç(΂ Ñ¢iâyÜz`[Ì$!O´l‡c|2i´Í$×,xÈSm-p1¡‘‹#G.Ž\|Ê\üT$¬Ú‹6˜áwý»Þ«®)ë[ðÛO¯ß¼NvKXE¹x å*)wÊ=jf=rÖd{eÍ&SbkbS'1M.QÛ´L"i„˜1ç1M¦ÄÓCŒlñ¾†ýBLãSe¹IÒ1bÎbv<¨ñУñ‰@Lã;LY¹IÒ1bÎbv¼$íÀ£NÆQjšþàkÒŠÅó>"ÄœÄì˜Á80Äh|*á^m³<Çš¥Ô`p<=`*~hžS'­Ü®¥5VŒÆ1Ü!æ¬ ¦É”8ˆ©Ïò:ˆizj™Z1ñÔ²1ç1;š"Jι•T0IÙcc\Tà¶,©Ôœ;]r¨ .§Ñä‡Ï!ûèc±öõ°ú£&w¿Î¥®_szp Gòýx¤{f°šìîñ‰4ƒ›7«ÅK¯}5ÿSJ8ž*¥/,ÒaEn ÷¥áÜ;£µSzùÛ.€)kj 4 èÇ?Op&—²Röy­”óÅŽ_¸“フêuø0)~8ùêkqülø¤^úÊ·W^*2s}×ÿýšž9¨ªÙ–VÆžNÆuî÷dz%¥ªTÌåQ””¢Œ¥RÊ9O-‹«l©¿[õÏWºaÓ«Yãaœ¿ÖLm|n½Ñ”G…+Ê‚*oƒ¶øm­ k§^|9æ…÷ÔÙ—LÐ<ŒJÉàtDUЂÇå/Oju²òm)Œ3Ÿ3É…uÁFã„Ö^éRI¡ò•7 c]^ ©xä¦ dCE…Óñ`4­V ƒëŒõs¾>/$óÑ Ç•ñTÆ’zô)á·zd*ÈP:?¯€¿Œš$I‘ºÒ»B¹ɕ½$däÑYj:‘ð|ñ]œ^m¨Èà-…à^Q¸( /,¸RAñ•"0q †øùÎéß&âêý œ>XÒ"H£KÏÀ ˆž[KK8X‘CÌXtÁ¡ú‘í¢º'?½ù¶ßÆ_».Ñi`0­ á@Aiï‚”Î*¯íh#7”nRU°ýnNãÅf±Ö–Ô(JK(LiÀওš|rª®VÄ!àŸNV4BÃ¥mû¥NB:‰£%^Ò µðZäÆ@8¤%T0°àËëb7¼<ðÕoZm…5$(J*ÍÐd¿œt`+s¾•œISv±í/èB5TD«aZ)0»yA%(}ermuÒ/K{…à«\Ø&îÂM Ì–thÁA]B¥Á¾gCQ*a-eT Ål¬Z<õœZøU"Jêx@ &¼(m,<“9X–¨J`f7[öœŒM†ŒÓ6V¾`é|\/L ET¼ÀŸ6Ê.‹‚NrâFàÈMVKöÍ9°MÖ~0‚(áŒ/ÉôFAm V3ü ZZckÍ^§]Ⱥyj« ¹•°¯RsáDFŒqÐSÜjM…ä†‚Ž ’¹n„=§c³rRÛ(X’6„ß’R›L“ QYC}'¹Ìï`ûóéú§ÃÙñ`ÔKwM«Þ¼„ÙéZ"Ϊe˜àéxTŽg©ÐYöFLÇãáÓæã¦`”©x`âépü!)£^ÖïFƒi¿=‰ë×v´XÛQ³¶£+kKÄs½gÚŸÍ+ ^|šÍ¿˜è®sõª^ª7Ø_ú~úd¯dScoNwáªXÓøõŸÑÏj*Ós£=üþ§/¿~úãóo¾{öøè,àèï³Ùð¨çøèÄ¥R°Àô˳"•]„í‘}FFÙùqIÌÆ£ìݸšf¹I]z†÷(³³öýIRIL«7^n¶I`PUïš#•îèë •ð‡‹[ÊT)quí0íÃÌUÙÃ$€‡ÙûÁô]¶¸¬k ±µ«/nÕeDŒ{Ó‰U§ãÉù¡N…cû—9ü”±^þE6ßû5öúÛ¾íÙ¿®}„dòºG¤çT)´¹SÍþÒØ0mͪ™nV ÿeÃìª ¯r/±é?V8¸ô¬á‡lž5¹ö¡Út¥5^\Õåx6 ½l±ÍaµIK\|4Ö¾<ìD’^©X¹†-Xiw·$‘Q_ƒ$KÞœŽš(P4œ"k=°5¸U×\hÄ{©æB×`§¶ZÏ)šïví‹Uvívµá-‚]÷ì:å/&ÓWÇÿóò){?Н>L~ÍŸõß·»ì`—E° Á.»ìB° Á.»ìB° Á.»ìB° Á.»®»lLÈGçø|ô•â».×Í6WeMdiLèÙp‡hw»CLy"X•õN¶Y®ÉÖb«m[Ÿ\ézr¹õáWõ‰\tØÜ>¹ûιmIè¼sîŽþœ:çÚÓùáíFÇ-Ï «¶ÑvZžå: N=)‡­Ì”% ð ?ðž§â®µ<³myÆ!4s6W„ ›j7‡‚årâ¨)µÎKiƒÂ–g÷²åY›­±¡åY×çò³jyÖ–¯{,J¾ãnP”¬’T–ó[ÝòÌö¸¸[áäÇtsŽsú1î¼yÜ©væºóÝ@Z¹Eh<Ñxî×xÞr«)r{P«ÙŸ~bi—w|1«hµT4x1‹³x1‹³]Û’›ôbìÔ–t{YKó ERvÏ.k c°‘Y ¥O~S®=16F›e`ei7øµ¿Íò<æàÜÖ?Xø¸þ¡<6ÿŸþ-Å=¾Å…à“BKO‰Ð\Ro<)—R‡ I7D«š¡1þœoqÛl è ìʼn½8²çgv~h/ÚÏ*LmËõ=†©;.áFw¼"½Ÿ*oy´*µ¹óÑêÇysòsž`XÛÁ½¯’hIïú½o+G Í-šÛOino¹½I·ÕkìlCï~_ÍU¦ÚFšJ¼Æ`¼Æà®í†fŸÀntüj®ÞP(fNÛç~Û[äZq¡4±š"xÄé¸á¥cEáœqz ;gI¼%«\%T€êÆjq¯w]жdš‘àŠH„pšºÔ$ð\§:¶(ó A©Ä—t?ëëÝ6[c%Çò'ô³Š-Ûrx±åŽK¸ÑU®¦Z‰Ûþº®ÉÕá]…n[¿µ‘iíQèj 0ÝÕ:cë·ÛÚú­•›ó‰[¿ÁÁ3ù¡uÝÓdÔZñðjý¨xn~FEï|ßZKÜN­õq2Oú'±ªRE;pÇþñÛoê¢z 5†ŸeðOSw~ø"[| 0¬e1`Ed­N·φ!§Y1¯S¼˜?Ä"Õ.Çõìµk÷àÐÎÝ~°çV¾-3°Ô†ÊVà æèÏ}^­|?.‰êê†Ã‰äúª›¶/þ˜uáãÕ¨nPÝ|.êæ#ßÝ9°ºá†îÖ\!§Ô³ÜU DRäI•ˆÎÚbÍZ¼¤¿^¿¿ÿÛ š>»á›…sÁªmÌØ¡ž¸qËû'ðüVõOhÁ[ìŸpOû'Ÿžþòæ§áW¯ÿ“”§Ã?Õà…üîçã6ý’WÒ¶ÂêX쟀ý°öOÀþ Ø?û'`ÿ쟀ý°öOÀþ Ø?û'l¸yS÷³Yx§´ß¡fá»ÒÍ»n~!OÙ,<­Âî·Y8®9ã6ËæÂéÎ`þÁqª©Ö$6À—û~i­?XÝs­?x„á{«õ—f‡®õG{Ö2¬õw™-¬ÇÌnµþl¡gQå½#ÂŒ¼Ì >¨hÍ©ËZll]dîVÍßû±þ`8—¨60Éî†sí‹K·çb· çjÃ[Ĺî)Îõô”–ßVÒ½|{òå÷“Ó“ò툟´Â¹Ø8Cœ q.ĹçBœ q.ĹçBœ q.ĹçBœ q.Ĺ®Á¹X«›ghír›xƒT­KÓÕ‰½ºÚ@•Æt­n®©Ò óµîZ¾Ö¥³²ö’ñÒ˜ÕzÆs'HISgŒë¡§"pN-½’ÈUŸøÆ]ªRФs¥e8v!ó)‹&ÁÞõØ®ò·.tÔ–†3¹n¸„Må)¢ϯ P–òH¨1ÄADH`ûRÅs#Bž_•œÁë$òºþ8ónègÃS¾Kå¼êÓ›¹á,îSDm Û£ˆv\Â&q}º#ÂFIèT¦Gð¦„Ô¼Œä­‘ûócEÔ(Îý‹¨-a{ÑŽKØXä…j Â&\D˜ÆFRQ]BN5—F¯9Eîìø#EäÀh{¶µ%l"Úq Ë"úý°¹¦¬'߇Ï[—'XåKÇ.ïѲ•­ý_^m£ýßü_Æú¿wÜÿ]98[ Òï=‰©,s9ž×7eKÿýöÛƒ2w&©Àâpv2ªêÚ†ÿ}iØ|èédìIú'VÕxB`gDò¯©6âúá'ñ„Ô5ÃHñ˜¶} ;sƒVOÓ‹W |®Žªè[Œ}?=rÍà0¨þ¨'mVÐbp=k›Ñ#8õ0˜ßÇÁY mÇW°Gçcÿâªà@»Î†Ó6r[lŒÍ„aL’-\1¦6ô§³vÿãɇvckŽ®Ž\Gñ‚Ž­Ä&R¶/¿.Ä\$®]|‹‘õÒ—Çý~iÜ?1öÜ{Ø!“LÈ!ë°rÔu¾™¡Õ6bÑ7Cß }3ôÍÐ7Cß }3ôÍn«of©Ø)%úR²²Ð©º%›œXã8)œ°‘y)©Y뛜½&#g%Ù¸‘Õ~ÈÝRUöÅLUÙ!U¥ o1U垦ª”ÏÏü[÷ysú?x.~a“wÇǘª‚©*˜ª‚©*˜ª‚©*˜ª‚©*˜ª‚©*˜ª‚©*˜ª‚©*˜ªò RU,c÷´$[—´ß¥’l;Ò%Ù:/Év.OZ’ VÁÅ~K²Á#¬Ù[I¶4»=tI6ÞcÂ`I¶«lÑœîi%g[º2b L&±ÎÀ´…Ê 0àšG–µx ¤µ”>9§±khK¬3éœ/í¡­}1æ¶C[ü6A[mx‹ÐÖ=…¶þv6ûyúv2x jú«ç³B–òƒhmñ -ŽÐB[m!´…ÐB[m!´…ÐB[m!´…ÐB[m]mñž‘TaÛ~x“LÇù/ódìí7OG¬6Plƒ²9¨n ”XæÎ¨#¶ÖDu®y‡®¾ ‰£þìtÍ; ô—Ÿ­‚Nï4o ®y¡C=’ù#aÿ-Ï5ug§aÃÐ9Ÿ.††8ŒçCëRj¨Wº?CÐeí°¥EçÕ6ZÐ"¬±C Y0dÁ历,¢GåݲTMôb7Ø**ÚªnlF/½`ôr/£™ï–—ÄDäN9áÞ{"LI‰ð“T¼ô,FfµÊZÜdd¦`àñ‡}ÖÚªÚÆö IûâÈmOH·)!© o1!éž&$ý¯ûÓógâ——q6š|ó<Ÿ¾xýÕ›'­’Ä I’0! ’0! ’0! ’0! ’0! ’0! ’0! ’Z\Eª{Zk¯KÚïR­½éÆZ{×Ú;—À'­µ« v¿µöàÆî­ÖÞê쪵'zF2¬µw™-²GÕŽ˜V6&#Ê‚X]¦\Àh—"§Yë×aZK¹²ÍŸÝ—ÛãùÚœ¤sÖì€ní‰7ˆní‚nµà-¢[÷Ýz^~øá×·/Ÿ°Ó'¥ä*†·/[¡[rtK"º…è¢[ˆn!º…è¢[ˆn!º…è¢[ˆn!º…è¢[× [²Ç¬¸yòÕµwˆ7ɺ:Ÿ)ÕÜã¬ÚFf]­¹3”»Ýje)¦]ݹ´«óc²>IøüãÆ ÌfóK±`©gyI a$Âbt^&}2hQ·z1åÿŸ½«mnÛÖÒß÷WpýŶpðþ’™ÝÜ´ÝÞ»½}IÚÛ»Ýíh´ÕqlDzӤÿ÷= )‹²( ”LINÐL3‘‘Ä988ç<ÀÁssk!ެЄÆ+>Œ¦×^´®=ZiÕý{?‹}ÕǬ¿ÚøéóEZ§—ö|4¹0NXZ<¬C\ŽŒóARÙ¼³¬´•ç¨~4•ííEʪýu¯¦·c¹ÇÊ i§rÄ%çHçÆ¢\J½éäóÁÁ¤öÙÕ÷—p!»,KЫ“ËóqQÊ4ûêÃh´çÓWh”JñFŽ‘¤X#žÁÏ8(a‰Ï½oÆÆœFëÉx4/ç9Í–%Ö°æÈcÂà¶¹ƒ„!c ‡1‡ÔmÍ·oÞ|èÒì—áBÖtýÃ@ÊŒ}Ûa”Ùóé+” þ½€p¬óôÌ“+¤µÈg¥–Üqã”Y‹~N{ž”ˆ ƒ˜qp-`P€'AÌsÅ´“S¾ ½ºZ‚•ñŸ~½&ë] ³Öh5¶ÃhµçÓw U,½eÜ@IB%Yä,)Úc&¸,­_¢ÕI~yí¯—kuEg·“jC‹}suî³×ð«ðñ«ªäy2šc»5Œš{>}Æk5ó0gÀü¯ÅÁõ#pÖI¬ a³Ä:?g¼a³Ô(,B07]Iz¨åo†ª¿ÏÚÜ+|(ÓìÃ@¦Ûïé«â¥²òåtÊ » 2¹"Kì¹V :ÍÏo'š×:ÿx4§a+¸å¥¢È”à©9 Yë d)\É]Yj3¿zRø01_Þ^ç~´=TöwÐ<¤kUó°GlÖ|hGÛ³aôÞó黪X^ ì´B¾ÄqÅ5rC•žEá 'æ?ž€^ýøôÌuç=ß…Ùw­ƒÄÊq¯=T¬Üëé+´j|IeÐ*vÆ#¹²¹&à×EØ9`Kæå‚Vè`>JVÒyi2ÔB/œAŽ a‹eÜ€'°m}^ÞÞœû›zcôïöºs²þ¾j•µZeaÇj1xÙ›>jÞ- È”|d@±>ΩùêñàÄg•߯ŽÔ“%]ID*Jæøt1ÅÚV:‘Å„V\ßÔHñǪ ©7TúI~=¾ºi–³.nÃ>Áìþ™_e¬s»Tª6õRõNËç; §5–Ϊ ÅG‡Ïø„Þ5ïF» r¬ ‰V=¸n3ÿà£3~~ytÿïÖ%r1¨K|Ì#{xǦWÉ;&còŽÉ;&︑wTZô,‹S9–!ÇCЬŒDZ0(·œ+š[Ãó,ºáw[—ðúÕD2ùÇØNµ‡<ó±›Hò^2}ªâ†Í¡WʼnêŠ[/ÛT÷™VÅýõèüL¾ÉßÏ^Ò‚žþ­¸=MUq©*.UÅ¥ª¸T—ªâRU\ªŠKUq©*.UÅ¥ª¸T—ªâRUÜΫâä Ö¬&)rˆýDnQYà"P°€©¨ðàP —E7<LRÄÉ*ÉÄc’C‰&a’=0ÉÙ&Lò3Å$ó !ÆòÛÓWo¿'L°ïéo?DòÐȘ¤L˜dÂ$&™0É„I&L2a’ “L˜dÂ$&™0É„I&L2a’k1IÂx/LÒDsìJ)¨D\ ‡4‚TR†qɵȢnŠIÎ#ôÃ^êL}òkIƒ„Š'K$Ôs¿äP"z䇕-È~˜%|sH2F¤Ÿ$‰’ì2‹Nl²i؆¶V@kÕvð¹½ä?ù¬ùAÖ f¼°î܇»® àãìiõŒ0W^V?®6Çßµj>Ö5­iy£.?›¾þ]51Ïî~áßOñÍ/²ÇyÖœxkÈÒ¿_ÞN¦8êÝÿ]ïÚ¬žßŠðÎã|”_ûb2OtáÿÈšËY}90ŽMrÅó¬c³ÀX.®!{> j=®qÆãß*"ÙõÉF]{Ǫ³Dvv–RÕËÝÇIÁ4FÜ:‹ „ l#Ê ÝÊó\K³è†{Y‚kôÖß°Yâã±Äû¸¡ä²7÷q~ñ`~Êj$‚V* )Ï9f‚ ðój櫌~´t’ìy_˜ vç†Á‚6wÃ1ZO+ƒ«¬µÓõ¶‡hƒBF+%-!è¡\he »% O)¬ÓÛŒ¶ø‘ìcÁé_ÙkãâóºØv L•ñl­˜ïöà¸%•½|X¡%…V¨,u¸.J¤5Èo@7^Y]j¸_½«â6£'«dïȆÊÙý΀ 5Ã5KÁ­…ÿp·ÿ2ÿúÚË_èÿ|}q=úeé4±KgŨÚÜYÅh69«¥æØ]¡>ƒ ëÈ“BšcUgs㌱Ué¢4[¸©ŽÑºÌku¸›eûY†ó)•Ìž­È^ŠìW3Í¡Äé‚1ˆòŽË "^8¦$Q³,ºá>°Àj“NHŒØ2"{‚CÉä3ÿ(Vxó™6êr ºg=çŒZGW…0DCvçëÍíƒ3ÇÍÁµ­I¹™a糈a§ÝªÏÖ¾û]k×\ñ <S–p¡xØÓš[ã¼\Éù]s¯ÃRúkx!ÿæU½ýîPº¼¶í. — ' ¡¸ÔÜ\†#Ì3F ^Ìy ó??÷×/¦»C¢»k{Ðî®æ0#Øf…°šž3§KïhžKÉ©Ö9YÐðu¬q`*^Û¹>÷Þ†ºY7ÆoÞÜÞ„€«‰·è÷º®´û 3X½À\à‚;îÃj7&Ì·V0¼°1æ²:£õòpÔ¼¶wÛm>X=¯íËÝv{·ãëú2äŠUíøb‰JÓo“BAÃqðIùö4GFSŒ +„ãØ’«,ºá¦‰ Ï~øyÛE›µÈcd>9 ª}d²J =öA ¤…O2Úp»C„äž@2ÇYCÙ±ñt¤O‡5O.®äÙ,ÞáeAÙ:YdãIX͇¡^ÔDAÕjÿÜb%­öÿã¼ë‹üíí>Íï8xþ/­ÍðÔ—í`“S¿FS†ÁÖ|påËÙ• …é×ÛA‘ánÍ7£eïñàzÇûL[Ô?]7¢Û¿Ø°á™LŸg6?Øâ‘AîKÅÔ¾¸DgÍÖßjê©òôãzB‡¨í»º˜¢þüEöúÖ]ø›é§W—ðò×Íä¿8Õ –ý–á4óTyË·’Â_„#íEÎòÒ0Ê1¥õŠSTÃC8i’ËÉ*ÉÄG C‰æÐ«ºå!UuÇÈ6-‡}¦Uݼü½üR}C^]ù7㳯^ËòwÒ¤êQÕ­RUwªêNUÝ©ª;Uu§ªîTÕªºSUwªêNUÝ©ª;Uu§ªîTÕ½f!@ŸI{a’ñ)DÁE\Œ¬ÁYid%¸…,ºá#a’ÑQXµñ³&xšv#ÓÉ}s/—xDr(Áì±<`dö¯`Œsð V z¿TUŽ´UQ€ŽIWÁ‘‹Pªâz="£ÛE´³*u#…É•6¹0à£(¤wqi_jfü¿«€jJæ@P¸ààïYÁ‹ÂÉ‚IÈÛ9Ú¹¡Áub÷£¬F«ŽBÒÉl‘2ÄaT ͵€•¢ÌKL©Ý ÈÍÇc{8FÇÕÜ(HÉn¯ŽžW…GonnžÎéGµáf/^þô×|?™TËCðÕÿþÎìu¨(¨ñÁ£Ùb]Üãß^NFW— ìÕOª};GW—×7£IPôøæÃè¾h¡~µâb†JÁ®ëå)ÿ¾qw­7y7ÃzÞˆfTGG§þ¿ß7kpuöa†r>ºWYóÓbÌj¸T¯)Vê‹ 2½5OµïìøÜºñyxó?ahŽÎê%ÈjábóýøêA,“ïdT-'O_®Èî+s›³‚Î)4üœÿEþa*«ºB0<¢Y±®ðæ.¸ùW¸ÃíU±¶MØ Ø,G ËÞs²cb;sBi¿[,Ï=óÌ¢€Àäå rÚjT8f•…Ù§d2‹n¸×Þ˜\ðì²swRKÏB¡ä²GÏ^‹é¨åä·7ù†¸»¸®Ð|B0>?Ïè%ijy¹y£ÞaÂ}±Ö¨8˯f[ã«QÃ' ßñ­‚ óøÁ„T|}03œ>Ã`¢1ñÎXb:®›PÂ8gmØô“Dܳ9¯=òÂÏ­÷Â囇Ó!Û7’h[\l´ÓÎ|Y\]^ž·¢9;¨ýZå¯íèÍeÑí*ÛNÁþ°_ÀÏg† icíýÈžOÕ9 ¯<èÇ]ß´Ó£ðjÅÜ=yÈÎ.a¦­Â’Æù†%(£6´é—xS*TÅ)ÓàªÑ´ßnhªÍ™r¨ô<Ô7ÃÁ‚ $½ÉiYhÈnþÖ˜†û‰ê07D`X“UbéÁk;\öÔbÚ*µon±‘Ën’ÑýœsQ^v„#ælYb‡D¡ âTÂìŽ 1pZ²´p_J¶ðîàÝ5‰ é*Ÿ¡woÌwIéý˜mvëä9–Ò—à2}pžÆÁ¿ `Ê]YJW:îÛ&(Ýb„?„ ¦qé%Èîa‚G¶†öýÊñ{pjã«ú¯£†æf6w^–T!%¼G<×Ù‚p”sjs*d¡d•_Mƒ…*Þ7ô„H}B(=¡„ÕPvxL.ªMZÓ§'ÿTBéÈëëcy–ÂõåiPjŸçÓöî]ûÃLµ1¬íß;ZñzûØ‚‡ÏèlSYž€ ÆÃ¸àÍ­«Óy÷óؽým…7û¾ 1ÂóœÏA­J#S†GzâJÍKª¨¢‚¯þ¦ÑþQ½7:êg¿íÞ‘È~uV/›ê®ñäò¼úG#Q˜ì&—·×¹¯NyMuW©îêÑê®>×7‰±Öp£~Ý]X&ÜHÒó¡?üê§*ô?~ss ªÅÂö^çU¯d³mëCøôu]R°Á@›[5<žªw®Î^t¶ržîó`ípþWÃÏêåÃãv“‡ë‡­Z²‚-ê%Äìx¶†Øzú’´a*ÁÅ|czeq%qö2‹k‰³k­¤f*›özâL†!G™>l–£Ô{qÁ°2‘ûeU«9JPw³BÄ©yÄ8˜mÌ£©YÇÌëö±ãþ ¿â÷¶Ò à3ý´0ð™.Ú(ø5Ï_š!áág°uh‹ë¹o^™ý49c†T¨ûЃ{%ħBCiá“L…6Kxb$÷S¶îÖxöLÙ &jx¿ˆ‡Ã±nb9âàP‘f…E4Ǫ¥… Ytý8zIM‘á=†’Ipbæ³™&'8 ÀINp€“œà$çð0æ^‰ äm¼4"GÆ äµ^ £CŽjA•WLê:jø™8BMV)!>J À¹Oxb$—œÏÀY=O.–a|ÙT^áeAÙ:YdãIÖœ”“ý1¾9«K5²FäU±F%-Hë“‹Ž[òª¦ß«¾ÈßÞŽáÓ|µÈý¸l+ÙG?®Лý8ëÅÂ!U1ÝèìÇùg>ÒáëðÊÃëÓ˦gÝÕŸ¦G…U³ÿâPV'0köŠN°ô¬`Þ#ʹ ‡ä-µ‚¿”- aÊŸE7Ü3Á%…îw\Îä0 %˜'Ip©%3š0M–\FTl­¨=\Æè6\®&¸Te!‰(*µña•/G®4åXRìeÕ‰ýX©:Æã-Õúb¢A .#ÿ4 .)Ä|B—\¬§ÃªÛì›àRÐ^39F»vAKZj¬W¹DÜòiÿRTj&óÒù²Ì¢î—àbtܵ—c&–xÏ>”\‘à2nò}4‚ËÙ¼¼„à2¦Ês`‚KA÷Dp3œÁå*‚Kî¬õÞH”8Gál+ˆÄˆB%æÆ¢„äxóP¢“à2•Ï\FF;‰àr ‚Kn"<º‰"¸ŒHivÈIHß½£XiMQ8Çqb=Ò®óá”Xf #¬Ë¢î—à’ŸÝ•ÛWb¡½ws"—§Hp9›ÿ–ÐÿE¹ìƒ!¸rO—1C%\®&¸t¦Ä†ZU†ÿnE97EÁR³m‚Ò-Føg@pI”®;GrC¤‹—±ÈWÓX$¸ŒúÙo»w$Ÿ*ÁeÚåðéìr˜’žÅØkÒ³……ÂD½#ŠË˜Wù(.ëEÄO™â’‹(z6уâ2ÆÅlcK(.c†ä<›_¬'ŠË=Q\ò8î@Mq¹vŒtP\ÆÄÛ ç%—ÛLöŸÅ%Qòà).¦‚GS\®¦Q4=aœõê;æÓiú¶¸œL³Ál’‘ŠƒXÍÒéWŒœÁp8šŒæÃáÓ&¶×íªªÛUQ·«Gu3Æ»Á‘mÿ^ÍM«,¯ÊÝ»jÜÜ(ýÚåóæÊQÍ&\ìow(sem,ÆÆJÓÂÌ!½¯ÿãÓ¿]¿ýðþßüþÍÕ­®ÀÕß‹ôÊÑýøj,£ÛÑDWÐüãóBRlóL£š êîb|b\”ÐôqÓ!ÝJÒå*Õ¤eš½)ÒpÎìVWäÍÏ‹ÉÄT¥2óâLsa]ÏÑôÊ<ÿ¦ñ þo +<@ñë«×” è¿ØMñ¯ÓÉÀ,ï7{H¢ýÁ]‡Pñz ´…Ãh|€¯bœf曾Àº™€<¿]îì3æš–YÊÁ|ú îßRúz óÁkó^‡*WɺÖCg‹Zˆåé™ÌäxôyêÌ39É;¤ªS›Bu·ýS¹íc@üÍ lûôwüå—†Ân-"ðÅSE˜Œ³ÙˆXäT*°ACÛŸù"ÒÞÌu ü‡'ß¾Á½gÜô¯+l”•~­N§n)Tßì*j||-’éb;ƒª™ëÚš(±|/´\^·D„OT„×êƃíÜ{‡{qÆCÄ\" ÈEBê‘O°ôJ•ú.7>‡É-ÆóMžÙbÁý‘\óÜ'·Üç4¹ÕÅ·0¹õB'·¢w‹O³wóÿù+õ͹ÿ3}ÿéüÛä–»Åä– “[0¹“[0¹“[0¹“[0¹“[0¹“[0¹“[0¹“[OLn¹Žÿm•“ ”ï{‚º(Ôì1 Ä}J qˆË8ôoÜýLÖï¯g²v§ÙWÓU9Üvˆïç›ÜÒ=!y,¿ühU;azïÛ¾ûø#úÏú´ª×ÔñüÓ©µnŸÐ$TæÊ2-)g#´Êík4œÈ¼)°žL³HÿO¿Ô9K‹«ëŽ/RõØõ•¦é1ÑD:>¢Œ›ól‰‡B¦í¥§G]X+#ÑÓ7{Òþí±PÂ#xº—JJ‘¦NáP2=ºóWžU›ªaª3 \ó’Ùb)Ñ$³èÖxêžûCßúΜ$mÓZ×ÿû-úy:VèÎ^¸S“xjeS¿ûéÍ8NgSM ¾ÚlJ'æÃM£ÏV9Ú:/šfªº2¿5«쿌¥ÛSqõ·Fc±?Ï•M–Ei’.ò[óg8Ùéê„ø6Ãx7ŽBiãl^7Ÿ©EóÌçû\Þ©byŠv4JFi)…%ïî‹wÜçößãñ½ý9“ó²›Ó”ãéžÚfÿ%œLG“»¸zn8Í‹w3á̦‹“Ùº%ôHH¦ªÒ²¯Ïï´ÍñÄ(ºµtÓüîKa¦²Õ™óåûse‹ë6šŽn&ú^óO7žL¿Ì2•¨ydÝ’5Å¥Õ'Q÷öáh<½³W?f(%q’¢;“ì×TÖ”§Çjrr£Ð8ÒÐSÔ$,ŒØ /Æ£¢Ç¥ýï,JÇ‹4þ›ù; 3ûæñ<Ëj_WU¾—f1Y:Ü.¿Èç•kbÝÒQ‘@­=<)ž¾¿QóðÎ~€Xñ.´$ùMnVW/w¬×Ry› ÓqÑT]—¨þ‚¥M3Ý–üϴw£l^_2žª}-Û‡-8*¿ÇßUVº§hNñL‘›b2.ÖæÌŠ Ã²y(Ïêú­(—Å"/³¨˜ÉâÙÈ}O5äÕ-ÿÝÛ!€î ‰nË蜞KÆÖ³ÉÈ–p+QñW”~)+“«"gq&'…]÷Å”ŸT¶v³Äô>ݸÒÂ'EƒÇyÙ´5EOˆnQ$gÅ!×£âÙI¦QÕ¥²XGÓò!ëo•ÍæEgŠdÙ§êF8.}«¿Ôï4– 2À”cBªY.SLÿÅ Gf8$¤š ‡ðEž|‘vøê:þë>®øz6ðµé*L¨#OÕ¿ÞeȪ‚nk\…†*W¸U… 2þVa¡ŽŸe$ZƳe¿/#[xÖÀEºª ¹eXza–a BÕ•+ô]ÆÐ)‚t‰eøª {„ Ô(£wùê8[ IýWxCZkÈz·+´¢‰þ ¬- hyËPÚ€§‡ä¦Bˆf,m0I„Jhk@OÅV‘«x5ËYÍ’Q-Aç×Ⱥ¸W£üd…ý”1 I%£*ñeiK–ó“5ùÕ Ò´Ûß5ý e¦†åÇNô°<jX[Ì4ÇÒ£æInOŒ&šäQÁ„'¹9í Ά½ýº¡½góle®–õ²{°IÛ±ú[ˆî{°QgBlËVÅåa鯒¦mä¸ÜVÞm?„Œ …FÝ® zŒó56ñîôͶ’5sóh’dRÛ:ÄaÏ™ÑRü$ý|LxÇ£Éh¼7‰,qpË}òþñ}l#nqÝœR ž¸±O¨t#žÄfƒ[,N¨Ò¼’Ó7^3ì&¾¢T qàùDy¾R\¸ÒOÎ)wî&­¬²yƒa–'¬OwÐ'« ‘M†‰np¹f|-á•0‚ïlá•n±œüÜáõfªaöj1‰L"£8xIûÏóÚƒ¬K=²k‚,Û.Ȳ €(Û·(û¸·´ÆÚÅ¢w‹Ð“4‰åÒ¬W ‰PQÄIò0”n"Ýæž¥æ‹K¦¬cÝ×auýÓƒë*Iô爾MÎ~””ŸæU¡Àû*M>—I„ÛL%Í;;ÝÕ–¬˜ÊUš»”v/{§‚CÝÇ2û\ÞP«?—øßzXcÕ?cüm1,Y”#’X¥jå·Sƒ&ã¸7P’Ï3íÀ›‘6X–%mÂÆ `Éa°„ XÒ7,ié.Á$މ(NPȸ‡‹8âõ",cϨ\=§|i|׸v(˜hØÓµªÄŠÝK_ ƒ9ÃmñÛ>´Äíq†E²Ü´]}ñO&W=–•©ÚRÓPñ«3Ín®âL&s„ÙUñÛ?>>Ê <ëi¦2»b®)B½ý»ºYf™´sÚº±W/=ñžjyÐòíd³ýë¼|ºÈ"Uln½e4™-æÃ¥ùʶghÅñÈT@¦›×ÌØí¢ì¿-F™]ŽóÛJ]Û ýý©®ycnæ¾OŒö§EûÇn—q°'™j¦ºçÙÜòMv]&Ô7öá»4’¾uà‘XŽ‘0‡«Øç<öXRœ&«<ÊF³’«×ÒãÆ·hÕ«È#Üõ\†Ef¶ KeLüº zäÑÔvÐß~ÿãXüeÿ\×jË»âÌK˜Œ"„}!b EdjDð¸’íÄ)(„Ç€8—8‘æ:W?ÿFÒÔ¥i4IÓ)ºðaéEÕɇÛòÄúÁ6Âx(R¸KW=03ܳ «ôp7&jàóƒÀ¥Ëã|B[ÞáÔ¬ƒû¤g¬Ã |“9—J6V›ópÛ@W>^²ðï¯ùáïõq@w–`” ós_.~{8Bx5™Î^­cüc•çæ”MÓyUšNÿ5ÍÒø•YXúÌ)F~Å|Â8q³¦MGèÄQ(ƒ©È÷’DãªÆÔvf!L¢ö“Yl&]ZD[µÁƒïûw7vËzÍÇë÷ï~|ÿ}ŸHÄñÈ¡™J· ‚²uÉ«¼äqô^a*r1ŸçÙèæÆž—^Ï=Q÷óa¶ÐŸad¿^ùhcÏYõ²¹ÌæîR“øÁ/výVãõOó#ŸS‘g΄ ýY-Õ½-Ù7Ö,¦…â ÌÍì?7#<D w«©¶ Ï’-üòéíÛëëw×ï€/_8!_xU™«hd"Òp4QÅŽ„#ш-øÃ†ÇOO+Ü×Cêö>É´mᣫÛ?ÓÂGÏÁÂïåºò¿Õ³7]©¦ù&uj¡NÞ–Â]Ô©Ï Ñ·íW®ÿïrÙãh_—‡„YA°Eu€å/qÆ´6 ´Jƒm¡¶q”¾$(]Yß `úÜÀÔ?/˜pM1u¨ð¹8ךâÀ ð…¯¨â8ßd8ðàÀ€?~°7?‚¾mÐÉÿÒøêÅN‚®Àê{ù&'°î¬ŒÁRªžëŽkÃbjœK ”"HFÂ¥ ÄãÄEQ"ãÐM*Y¡¿ü Û@r;ÞµïÖ#í¾üЧ£—¶_u5÷àx¸uÑ (<õ™Àáž×Wé!ð|“M(ûŠ'`ïËåkÁ° †eOnàÜ4l:lù§¯Â Ü?[¾U¸¸ßâU8póM–L`ÜâU ^âU ^µ4¹ƒ1ë¹xÕ,©M,ÙK@¼ Ä«@¼ Ä«@¼ªÏâUÜÑãû~‹W­úÒ®K¯.SAàJÄY †uÌྎ>J¹”JÒÀ ¶T¾!„úpõú¥^ÅOª^…#¦Š9ãˆq¡2ÉcIŒCâ¯S¯ætÑêU]šF“5¤¿dùª®äˆòU[Vaù*=Ê徇ų>IŠ;”ÒÊW­9¬¢6ç…ÉWumÕÇ‘¯ÊS¥ÖŸ'/²*5©r_Ý*~ Ý*—aå’8@Bƒ%b„cÄ…ˆP+¬bÅòÖÈU€"æEêVui•(ô(ànÀA·jûÈqxŠ®öð[–|‚Uºå ŸÁ3gDnæ]¶hKv³Éט Kðvb- €Q`=¬êÄûž%Mhœ 4hÂ%êTñýöŒñ³ìãŽð/•M/Èט lâ`læ(€MœšM\ºü%ð àýåÞÁu/F—žiÏ„0[Í{¯{Ù5#Z9SíàLûs&н¼ ÝËIÔN›&ÕïKtïd’¸º´8B‚HŽ¢X…Ì 0•^øxÓdWH½\u°®~;Ö¶É-Ëfº—Â!=EÀNŽ·°Çó5†Ãa2ë`O€îåË:¥­KgÚõ”6@¶ˆlÛksñg=7/—Ò¾ê^v„Jâyù&ÓA÷òPº—t/__ϧ{ غMÂYœ%á,†ýË›r7ßd8ŒM€ ÖØù¢°óØb]—‚»ÞG(%Øa_8”¶íÊ[PúJ (((((í ¥Äñ]vÑPJX+”Ö†”¶@)]+€R€Òs `º;˜r^0=¨î¥Kˆ`gZS¬M (»ð¡¶È7üøðàÀ€ìÍ8ú¯{¹_»vëþÀÊ`½ÝËA¶U÷2”ú , l A,&!.•È2TaäÇ\ªuº—]ƒ{'ÝËz“ð‘•/»|åË-‹>Ÿò¥¿‚‰¾*_FòM6¤ì)„À®O¾éK¾Ü,}i* ƒ{ÜoÝ„–ƒïÓSŸJ=•0ʸ{¦¬=u°+z®žÊÛ6:/-ªw€ì¨§‚z*¨§‚zêФ!ýWOeù&ÓKZ°„‚z*¨§‚z*¨§‚zê‹QOÕèöNÅlE=•â ßd×¥«§zÕÁ†H$#憒4”È÷ãˆE“\Ê-•9&^`Áz%žº™¿\ ,òM†?~üøðà{óî“þKâuV–orëþÀÊ|Ä»I¼A¶U/Q<ÆžH¥ßFÂÉ@†ˆËÿgïZŸÛ¶•ý¿âÉ—~¹tˆI 3½3Ž£¤žÆvjËiNïœáàéèD¯CJ²s:ýßï%Êz˜Jl7ÉQgRK"ˆÇîb÷· ,`p†¸T©å›®Äk«Ü[]‰·5CꑯÉkK„G¸&oǦÿÆkòè!çí³] Of†Q7…iÑDðˆc"¬‰Õ)Ñ"NðAë‚o蜬µ|ˆžÊ(H¥¿ur‰ÚY­Ç¤Ñ›ÁÑÂjœ9²Ý±†ø°Úcô­š@„y¶Õ$…Tʃz · ‰ˆ¼œÜ)_—ÛjTÿg+Ùî´fqÔÓ®¾¶,¯j©A¿¼Ž/°¿Z¥1Ê$¢„%±¶Œ$qÌ9Ø^IâögKQš(FtÆ’”b™¦LeFiSÊ„àOn¿p¾¯5¦õÃÊ É(¢³oÃÅà¦*8΋Y<1ý~¼x^¹1!ÑYó8#‰Žb–Úˆf‰Š&ð?KɱŒIâmá€"®¼ÏhŠ~ma§e3[¸iv§ãgmÒBcÿ_¸™ÀW¦E”þ0ÝfªªÎõèfX'¬zCx‡îx|=í›UÌŸ4‡®‘㌧¦ŒE” Ün¿ "Fäé{úvÞ£õ¼¹á„£82Y"#*0Ždœò(–‚¦B$ Oô# N”^5‡Ožúœ "K™¶™Šl¢A˜É"Àí6J³4I›P.i“ ®½‡’ò4$@÷€ae X#, ´q‘˜HY‹EÌ0'{,Ð/%Á#Ñä%l'$Ê3•ˆjw5f<’ˆƒ–!$NdšqBéAë‚/­Où\›‰èõMÖÞ è¨Äw£E¦Œ&;‚Ñ仃¢m~m[ÇŠn›ðѨ k&O­‹q喇•Tsç‘H²À(X8-p0C2EHÃ|j]ðo |)W 5UrÌi¹Xh7•üXÔÚ«ä%•LhµÏû»RÊmX~ŸRn[Ç^)·˜ùkus£X,¾8¼2w—¤–Ðgq$±‘4©Ž…ÑDfÞ×Y¼ž7×Cïw©î€ÿµB£ò:ÿ[çôêΣ ÖðwàþÇ&ïù-ýMsqóúÇáÆ{Í¢¶0&/Ä 4€Ò¬þº÷©ÑÈ­[ÃÈoFŧþHÔïÓá„*Ÿù[ãjXŸr1qr£Ëû08GŒ¸JÆÓ¼7´£ê¼¹Bù´Ó[–æ©§Ý`¤«e‚λG£‰fþÁÌ õ¨ðwLžúÅ—Éh<ðÙWä®uä7RŸÌ¤&ž¦~2ùtÖþ›£±5 OÕÓÿk‹g~Y&ŸêÛþ´üè>ÊA»¿¥Ê÷h @çÀà†þ±Q‘š> q[ŠYXõBG¶×ŸT$1»­ê¸-ý÷ÁàÖÿ\ˆIhùïÁL•^ìoäpÔÎtý^>W÷Šêè=9–þÑxêÉRª¨&ûgBûêËQh]Dêã'ŸÜ[Înªaßñµi 6Ô_ßüd´ß»BY÷•èáèf\k&Ê“¥üìšë×,1·þe5ÍüÓO½qÔGÚö#èÄpRø+#ÇeµV ˜žª'²ºdÔwx:èU3~ üß±ê¦}ýo¿ÉD¾æÁ¤(æ´®»<„aQˆ‘ ý¯i9©I£Aú½aØ1(<¬Þ¾½69CÕ^‹JgÒ°åu)EEWù¡§Z_|´yPÉ‚™÷EÍ9Æ4YJ«áT$õŠÉü©*Xß\»½5•|ø†UàÇLÈS‰“tíÙ]hθPË˜÷¯’"9Íû?£±NªWÇ=ßô-“_u7üU·>4SÁ‚,çnòøñ<9ÇÞoᣈªOª:SšJºÃj\·ÈZß»±u³„«./õ]è2Œ¦š êc¤ÄXÈ^¿ç¯Ótü)@ˆê)UhЦá%OoSŒ'ÕdR"Ì©¹ŽómSÿüËǺ*už‰,Æ,Ê¥†Â'†XäÂT\I5f-ÌúæÌZo¾ÚÆåÚÇûöæë›1_Ëš®¶ sÍSÏïUÅ»PYµÒ];—MC­ƒk»U«  kµ0ןA-ôÙbÞÍÏs1W]µÒ\2A-ÝÑ0 5P[Õ¹U®­ïB‡.‘JIÛÔ×¼±û×°A{ךo®gÃÍZû/ᆠZç&뎹]‚Mëß°µ• ZhÞ Jæé.¸©-DS—6ΰi„‚ik˜ž5,[®†Á›£œ%³ÕÂè¬Øã¹e]VÜËZ~¸„~‚Î_˜¤€¨‚}Y²´åÜÅdM|µdiV¬`~Áл:G:«4ðÐfÝÅ_5v ˜ma>—Ð[ 8çèÌ×“ÇÆÛmÇŒU26–'PDÕ G\"¥)Á:N±QD´.øð±1žS--ÜäùYÕãb4빸Íó6>ïóI!ª»$Ú°®¨Ú>ˆöXd}ª½¦s²»DþíÄÑú`Û#°Úþœõõµ¤/ôÅu-kChuÛ³r•ºÕñI1ê»ÃQ¤ê†6†åV)SÜÖ¿roL­|Y< „ŸeŠÇ&Üǘš,Á‰ä™$šÁÓŸ­)$±šqj1Õ+Sª‰J`ÎcŸ<öt³}mà¬zäÚ/¿çÇï®òOO?8µ~|~úîªÛÉߟ¿½:íäGÝîÑñ/ùï'Ý_òîÑ›5%:º³WÍ—çÇ¿vºù»ã“üìêô(?zýúäì¤û¥—OÎOO¯òÓóW·ðå¢{rÞ||rzô¦“wÿñzpzâž4zzyÙÁ«?5_¿è\_uò—¯ß7}sqôî—“ãËÐêËóã_.74zqôû–7ÏÎÏ–š»ìž_¸W_^]æ¯_oztyÔ=Ú4È_OšO΀|ïO^×ä9ý?»kNκ‹×GǵLZ®©ƒÂ.„y÷:ÇWÀšüªóú¤ú}=¯.‘ØÐ›f5Çxuùr•5­m³ûî4G9Þ(GWÝMBñÛñùïxsßÃ÷õ:н]#ɧWo»'¬›øtq²q(87Qe•fw$j;Q//O¶¼||rqqµ$Égð{óûÑñqçmçâê¼ÜLµ‹î[†ß\ଃuÓzqN.—FÐ…Nu;¯òãÎEwK«—ïŽÞ]äïß­¼‰$'Ë\7¶‘ûÍÒD|Õyó¦Î›p@Ë–éÓYéæe‡<ûgó‘ZUç×fh ¯þAÛâ§ÉY¶Û2.(‡J U`W4˜%Áb[¤ V`£™=h]ð®Nÿd>—°ÃmÖ’Ès@îùÄ9zÉúDã9•ÚƒÞÇ"ÓC‚Þ»fcŸnå7ÁU°°œÊdŠ&« º+—÷½p² m¿ NÊ$å™eXY¢7Ê0iBOÅ Â?3&bj­EIFˆÈ,I4¢HÄȰøéïìþâi±ºG>þ70 ‘tÇ¢,oF…öŠnZúË|þ|¦GÑ6¢¹ÚX1íOšWY½ ?ý5ߊie†Š‘Î4£qf¹ŠKṵ̈)o¾&d´U…De)HD‚"P½^Öf M¸Lªê9¨˜q&sã¤âyVs/Œ’ÿÚ¿þcú¯³ß>¤7ý—/ãÏì2³×~ÌKo/íñdA‘T{<ÿð‘DzœnÙºT6ôø+è™O“¦ØrÞOÂÀ9°e17(CZHöô¬Z)óyÇê«”À—4KËî&–J!Á¥‚Þ ØHŒ’Ã2©D’,ÝnVx¥ó¬±êaÊç2Æ ¡\€ãÆ@2•f6Mh7߬õ™Ì0˜Ôp›ÇPG½Îöç¼üu_ « aXq q"¬Œ ‚¤L¡Ä€Ú`8c¾=«oµ²B­l /̵K®«jª¾œWqÂiÑof¬U­FQ]Çábr–3õ‚cŽÕ.×éɳiJƒ kc`ÚnÁF‚dŠi›Pº2ˆJ7|ÍîÕ.òÏy·aÞgDqf5Ð}.”EˆaÐß)çiE‹zÅ©7×Kbhàé²×õ®íª5ªM’Pi´aH“æZþ"P,¯cu.z>óá°y‘ñÇÏeÏí¶«©»èP]¤4×ÎŒø(YÕå”ÄYE\£òe­‡unSÙçÜ%ÿæ*ª)¸òxþ¤7žÑÜmŸ1e™û;¯gé¦gÚ”ªèë ž_îÇn—Ìö¡ú¼ áD\Ï[ÈVÅ—"JøÉþpõ,ò·•*ÌÌ_¨§.âꯃùÆÂ;**]3iù!Cx·¬4ê&å2Â"¶5Dš¤‘M3ŠX^šyVm >Ä¢^^Tø‚ŒÁzÓµçšÏé³C"Ú#è›OD«³+}¸s·ødõb„œ²bqR%ôøxÑEunTkÍÊ#L"ª ˜I$c•1i8¨~Îm_ÌFExIZÇ–M5Š(¸‘MQK2qÏ<òºçÎ_mì‰;]ꯧ[‚¡ØoEy¨<ÙLÆ€K ‰ 1Æ…“Hh¬"À1Ê"e±Ží÷—ë×bVÝ›ëײŽ ×?Bö–ÌëÆRHé»sÜkóX9·ßøÎ¡r5*àîÁr_ÞÝÚvŽÚùeôêøõ —2šßöÜɳӣ³«£·Õ^ò€Û®•ï¸]õ’“¯ÈÑw¢ô "Çj|ûÃ.'çIw3àøôñNÀCr£¨À&ŠÝâ0M0‹„MÓ(‹™É²Ìr˜"­ ~G“´‘€ƒø0Íp¹†l7pòXDüѳäùŽ—ï0K¾ ËﳜmëØgÉ${Póú@}‘røòêäm•wVGHÚîgp[PòöÛIf"`Î 7à¿B6á‰{î94hÑÖ{X…`í}gÊç­úîÄ܉ñý¯3]b^!îf!y0ülÆÍÀ¢ò Ë1GEïº7tÑ•z«:¾øD,s;)Dî¿JßÒÇ›¼^¿ýþèÆg=>sa‹g.•µ>>~ýæþGãÈ´mEBüÄo3ñL`Êòä݌֌›ÿ’Ö¿ìÑß½èo\Œ®aÓ¡tçC7:úãÅJ¬«&ªòµäºèÍæ¿}2ó«ÂvPÑåÅûèêòÍ‹¾˜Ýy”K·4žOL¸RLVK¸®\v/_LDù)Ÿ§*‡Ã-ÃK£Øl°($§½¾^-2ù,楼˜—‘ C5Ðq6êO¦|þBw&ÎLëù‰Ø.ïU76>5Âw‹Ž»P]uFÔÓ¢bt˜º*R“Ôjéĺ@‹#žQYaGÖ‘U[­ ~W¨“¤Ü@Ãd7TüXDüÁQ1Fÿ¨¸ ËïCÅmëØ£â=*Þ£âÿTŒÑïQñߊÉ!e|·ã!b†±[¬Ciæ.sÈxä.<ŠŒåi"¬NQœ´.ø]¡âŒ®»qeAÃx$"þè¨iuÃw…ŠÛ°ü>TܶŽ=*Þ£âÇAÅÌMÊdL‰X¹¼b”ÂB&ˆ&(@ ͤH•Lâ,¶©fÄ’d¦¿=4÷hú›AÓuÞÛߨÇâf¸ÇÓ«X¯âéo´Q”~ö¥þÌá!4 ]JûyÃQ9øùçÿÿ\Sû@X¨ã€”ÆÝâtàê\Óä0&»m>Í2ް&™’uǪ2‚³H*CüUšóƒÖ¿+\ŸTn£a{\ÿXDüÑqý®7)~7%´aù}¸¾m{\¿Çõ{\¿Çõ{\¿Çõëq}û}Í{`' =ÌÙ y3ÎŒ¦:’$EðIn"$´µYÁ;h]ðGØ}íhHwDÞDÄy§ÿ È»ËïEÞ-ëØ#ï=òÞ#ï=òÞ#ï=òÞ#ï'EÞì'»!o"bwhÊÜí´ýö®­©q]K¿Ÿ_áá¥ÏypÐͶDÕ®šttØ$Ð$áV5•’%¹ 'ºaæü÷Y²@.N7P@û¡÷Ʊ¬ËZÒÒ÷--IÜwY P T@´OœÌ ß—Ï/:ã9–á†Èû¥„øÑ‘wð ï,*_‡¼³æ‘#ïyçÈ;GÞ9òΑw޼_y‹‚ïy!oQâcO¹FRé2F}—ºJ2ŸzQÈINòÊ”ð]!oÊú¼§2ÌŽ¼_Jˆy‹?ygQù:ä5yçÈ;GÞ9òΑw޼säýšÈ›â‚Ï6CÞ`Kí¹ðÊUæs¦<ê ßg®kJ™¢Ø¥“9á»BÞ‚/ŠóŽe¸áeÞ/%Ä޼)Úyû¾÷þ¢M2¨|m´IÆ‘x« Äæç¼‚çdñx®²-…æ21·m)WÎU³ýn=ÓI+¹°)²k»äªýþ¨¥Ím{FÜÛð¼}«å¢ôñL—Î]kj}uÒh¥Üz˜Ï›Ç[ïI♽?ä4h¥Ùµn:c˜Ê ¶3€‚†…Pö· cÉܶʱ¥Éžv>ýÝü\.Õö*ûm_õ»fû~<îlÀ®mƒ¥¿j÷ šöáû84‰eqúÊq{ÎÔ:ƒá•¦ àÉ•]øÿ åú#4ÒE¼vL¢êªïlUî>7ÏN?CyµŽ<ûyž¢Ëóƒè‚~ÆðÛ­>óà¹ò÷9½ ÷Åèòü¤£:âZ}9 *½ƒŽ"«n­S¹Fí©ü¸<;¸®ÞWG—Z粄ÐQ£‚Ïö¾W»ÕQõºrA.~¿»ËÝÏÝJûG;¤7—X y†;Šž\…çÅöq½ò³vÁà[ïh·|wÔ(£J}«^ýQÝ-¦ÿÊãj©8MWk$éJݧí0ww—çЖóƒëËzET®u»ºÚ¾¸¯Þž5ï/ϾŽj»ßïju|u¹{p}بÜUI­[=ƒݯ?.Û•a¥+î䙎ô~dPCgø‡msµ¡È|{Ôøö³zýýg­t *»_ÙC=‹?¯‹ßÒ5Qœ®xs}yÖ†wôþéÝ9©ýÐçöêžÞ‡ôôî‚4­èÅõçÎE$z‡;Urúý°ñÕ«^7Gg_ï.îÐ]õºv}y½ÿ¾W÷/Ú‡¥ƒ[ÕíôÎéÉ Èà^ïïTɶ¹Lk×ßàÛï¬ òª6¾¶£z‘V¯‹2­³•Ýi:\»Ó½ Ý5.–ëþºø†t_¾›Ñýc™’ê’)Ô-ï§ä õÓŸðÛ ýKú÷VŒ)ooHÿ×e²\ÿ ¿!ýßÕfÇÔcýßKôÿí¯¿¶œÿsìüê3ÇÕðw½~Ø*•O­ÝÊÉ_Ûf¤¶¦F`ÀGC;ׇ0³jWI7÷tÇÄè¨ßï8Àa¯œdN­æÔ‡, |dx«vh[Þ´·oñöàfë“Óï9â8Ÿ(ÊG œ0Ÿ‹"[ª«×Ã”Åøb{‚/¶mû-X¡ˆ¯+ËÜÞCh°E'%Ëœ-8±?S©n-öBb}柅 6ñTì.$çã¿Ú¢]µèӑÑÛíëvÔ6zq.þއwðtÛÌ¢ÍéˆÆol¦®}?èwì‹^ßU“‚–®!=•Ìduhñ'ëƒÇ2ô€_[¼‘(àÈDåñB„T #…ÿWb_ÉFš ¦'>ÓTy¡Ï‰^}ñæõFûÂåœä•u§l}9k•Ž›­sî·ªÕsë)U›rëôè°Y-·ŠF±ô¥uVi|i5Šû R”ÏåÚîì‹úQéïr£u\ª´jÍj±UÜÛ«Ô*‹¹+GÕj³UÔz'ÊÑìëJµ¸_n5.Ž¡ÕŠ}3SÓz½Lžþ4ûùI¹^j–[Ÿ÷NgÝ?)©”êi©ŸJ_êK =)ž­ø²vT›+®Þ8:±Ÿ~nÖ[{»¥e¯êÅFqY#ÿ®Ì¾©øN+{ñTÏáú8AªšJ­Q>Ù+–Ê •4ŸS§ŽåiõÊ¥æ ¨¦Õ,ïU’'¨ëÑQcEmž(k¶Íú秪axa™ãj ·ÈÒnQl6–uН¥£3²¼ŽÇ%x^š¯•Øá‚ž\mGLźLO'•¥M!-´L*Oeö¨G­j½T¯¬ø¸T99iÎõäü>û\dwX>)BžõåR;irLÅòµ2ùÛë%©ÔçZЀJ5Ê»1I[Qjý¸x|Ò:=,Öt²L$•ù.«Ä½?7w˧?0tö+µuçü¤šõ2ݲþí'¦ºõÍôÌ@¦®lòº®kVÀ>ß$+&9“^˜.¡q¥™kXÀ˜ Å9™>HÆÎñQý%ybÞ3YÖ(é¶ ·=²@΂^Jkú ¥ì ÷¥Äôœ ÷ñ´?…±/…XŸâOPœÀÂá8¼È䎞‚ê\9‡¼×ÂÉ,²ý58z¾"NTDFR*<̈‡É_œK¤}MEa/ Tõ4fX"l8ÒÏ 'ñ:8ùËÃb1:´¯â`KÇû:НOlèì"cœB÷»²Ý›‰i™¬8ÏÄþìN¡mLæœÍ"‡Æ} ;¶»¸¯uM7„JÚµý´æ`bnÚƒxY2]WŒ(ƺm#‰’V*Úl¶®Êå“Ëýò鞣c|yQŒÛ<÷õܲ=O I²ö•´‡Ãñò%þù´iCžY" ~QžI)ÃÖ´b“UZà’&6H*aP¨–"TPŒLH°çCÆqHÍl%±ÑI¢BÒ¯=ƹ!"eBqãÐå‘ï1Í~ª6j€Á aJM*bzú¦ßîEA|ëØØ„­©¸8ÕXÐÐ#ÊH&©ÏöL„'à)N £mKKÂà¡';[ñÿm&î ~8êÅ™ÙP–¤T7U ;Éã±™òí|ž±x–5Bi °ÒÈH ÃFŠ80–4P\GcO‘؆ßiÂZë²´!ÿ3­6Œû€*Á#´5B6jcN˜Ò¾~"‹I\T/7£øT±\–èz𓔯´ñ<mx½I  º©äXE÷ŸGÓqÐÒýò `q¼T&%Ï×^ž I"ß„,„yÎ OyX.üè9T¼AÄWízX‡ÚgÆ—Ø€ùÀœFaÓ§"œ)FýYí¦q?³ú›¿R»f<@ù &ÄGš{ˆ"ÊhI”‚ž„"ŸßÓÏ¤à¤Ø¥cØ~6õ>©>ÕËHÉ0™ G>»ÄL»(Ä}Ÿ£@,=5«í¹?•Â*u‡r}›±¡!s T (ŸÏ¤Ðaä3!€ºaaÏ!ªI©¿!©Y…?mD„¥äÄI…±fBE<3‹ñ#æótÙi3–Mdg™åCbÇWÈš(Ư, çð4OèÛDÕ@MÝ®ìÌ*{*UºV6bwpKgt vÞ~³&²‹G‚‹Ø²J¢ø9t”š‰JgRöÓV$n3"„‚¢"0ó(Ç,2Ú#òy”¶c¹qò´àMù'ã}­GÄ ¿æHtöúãžv&ýï§Ä‹d¡#•Z¹0ø¨Ë`zs9ãüy‘Š!ÉIV‘6ý/n ±YL÷+Ù|ÖM­ö©»í^gÝßÀWvküÞá3Fæ|DÉΨØo4¡\û£¸þ4¼’ƒxy/¡íŸRgÃUùwغéÃX¸K>²Ž+›Q0jM7@ûÂN\PZQÝ›ø l96ŸA6رÁâ¶?Î×)ö–ï¤kM|uÖ{~»Ã¦In®î†`8:“n1S¡I’¡ùf§‘ÉþHáSÄú1.;Sú“­+kŠ&|òzú¦}sËZéî!èmý¸Îieà¿ìÝL|ûD6‰¯a´÷Ô݃ mÌû¤°4p¨%G‰OpΣDvhpióI·;­I50·m»fßê­#Åv¨ÿ8i;;Ɖú'é° mPðÙhQÁëFõ= Ù£â‘+/t#`±Ì9Ls‰·z|RrûY}ù#lv€9S3Å#È‹d{½ôC ÙSÌC!“³·3%|W¸æÂán¸³ï¥„øÁq=Ûôò#ö½ÝYT¾×gÍ#Çõ9®Ïq}Žës\Ÿãú—º2(g -øÁf׎*°×vûªkopbÆã¹˜%B¾1k'sÂw†¼½á*ngòBBüèÈ›þÈ;‹Êׯ™dÌ#GÞ9òΑw޼sä#ïy¿*òö >ÙÌçíË€‘ç¹þr&Èå*ò]ìQfBACE='sÂ÷ËBfËpCŸ÷K ñ£#oö ï,*_‡¼³æ‘#ïyçÈ;GÞ9òΑw޼_yn¶·ÒNÛ„íRFˆË¢ r¹ñaRW‘0†3I)áûÚ[Éí­|aväýRBüèÈÛÿw•¯CÞYóÈ‘w޼sä#ïyçÈ;GÞ¯Š¼yA`¼Yœ·ÔQJ&È.dGCƒ9>Š"„¹ÇE€wm¦„ï ySŸWÉpƒ8ïâGGÞüOˆóΠòµqÞóÈ‘w޼sä#ïyçÈ;GÞ¯‰¼=T¼Í¢Ms/„ïÁ"—…”ºÜ ‰K‚ÐG‘Ç•§И)áûòyÓE;,d˜y¿”?:òÞôäß÷ßò΢òuÈ;k9òþÈ;¹!‡Þ9ô~èÍøSè½õ‹÷€$ÚIM*<°4ãøÆ*TÀà¿x‚UŽÊ¥÷èÄw¡Ì¿s«ÅÒNWªÖ$—Hî`‡š[y´ƒ&ZɉÂ" qßÜŒ,,ê—é²[¯D"žž&3K$tÿ[³’<àF|ÿ·Ž‰™ž“L[ÛvòŸœƒ×ãáöÅFFc-ÁØ…Y(pY¤¤Ë¹ .–!Lj\kÊ©“9á»"0 -º­åA†Ù ÌK ñƒý&‹Êט¬yä&'09É LN`r“˜œÀlF`pÁ_@`VáÞH)c\°öÌe(®Ô>q ë†qÃÌ ßyàþp‰ 7\ýx)!~tò°áù’ òîÈC•¯#YóÈÉCNrò“‡œ<ää!'OÈäWlü?{gÞÜ6Ž%ðÿçSh½[•™Ú%€wªR³nÛv&–“ØŽcOu©@´iSÇ”|Ìæ»ïH¦dʱ[Awu[âà=<à÷.~y+{5ùиØdyÒOhW˜âšvú‰žÞFÅ›±¬—.ã<º`%G¤ê­s0÷tg½´-³½»zöPQBbÙ©§†Ÿ[vNã êùBãí"›ëÙ žÑÅ<¬¤±•¾9-ú€aLéRXÍ'{)Ò®HÊBVŠB;Ò$—=Ñëåm.†ñ”º›ð½9ä´êy…º^÷üJ³GRËí Ð>m¼†PÒ›šC¹¢9”¶ËäÚýd,3¥1@efHÁù—Sc< ¯jÈÜh—7Þüãè·­ýÖï»ïß5Ï{Ѽ ’¦ ýZzúó¸ Å”_.¡(z–F5ŒncÜ6Òì¼]ø'çbð7…Ž2{! Ô€Ûвó^cc÷淣㯿A~­„_Ãã¯èôÛ‡èÄú õ!?vàûî?NÈ×~ø>ÈO¿}IX\°?¾z»Ý #fV²{â=²‹÷®O·?çû‡›öIŒÐþáùxxFZGyëýçÛ½ã¯ÉÉá&:!G·»ñUZú§8@ô'Ìúr~ÛŒ?ì^·nOìýÃ]g{ïºuÁœÝ.:Û»ø|µ·½Yþ·3ØÛÚ?×:,žÛêÜ•CÜ|¸9ý²|ûpqz°ì^´âÖa’ìF/¯ößïæ­íKÜŠ‘ݺ8Á¿\îÝþžœï\µ@/{7»Ùn'¸¡Ç<âïÐA ã+%ó!#ûÛ—7û‡g·{‡'ÖþÁ‡`wû³=)çæõNjͳÉsGD=÷¹qzœd!Á ÿõæi]ñoYÌ:_oCëë èGêáöäâÈ9=üý²µ…œ½íóøãágõ$ßß>!­„NA?§Ç_Ï÷¶¿\œîÅ·> Y'é~³¾ôA·üýï9Û’2ïX­‹3gïâÒÞ»Ý!­ÛË8:Ø´ö.6':=°¯v·ÇÏáýCõÜ‹¨ûýÓÅu±û‚ê~çfªîçuJZ/H§{‡ŸÑb;=±_B™Ï×ÿíÎKªgI›²ZÛ/¨þ/vÈâúgÖ ªÿ›Öt›š«ÿýíÍ¢þÏÞ½Ûhü_CòÕµ‡ÏÛ[;_ÛÛ»_Þ5EΚ4B„áažIÖ‡@Vn0j„ƒ.O„hÞë% bÏC³ñHëS'Iš“x$²· P“öãæ7¯Ào½nCº87–11}ËÄ$xÓ^d›uøýnJµÑùM)¿tV,ä/sV{g °ôN¶dè,ya2ÕÈ{seKÈ›Ío¤¯ò¦qçà€Ð,ƒ —ÞU¥ðÐä¼>7¾ì™j™P¿—æE ŠLoüµ ›ÄϼOVC´3ø[u¾}_rôÒ*Gþ-ÂJˆÍþÖÈ*H×ñ?¤îÔQã]íI5ýòJnå˜EE¦Ä´<\ßÑ,ÌÔœ˜çx$Êõidá”óvGÐl¾n£7È!ÐzÛøDAß²î!dãê1îÂõ¿4G[[;oÇmB6¨!+^.ÊÐͿ̦ûÃF]d×¼#‹4tl[•ʲÝÕ6–SB)a(4|CÃ96Û ÌmÌÄ\›ŠFíîO1—5‰üªsR•zVüÍß§ÒϺÏÝÕæn<Œ^ÝÔM¿oê¦nzꦲ©WÎÊ”÷Š¿r.ÄòfGܰæÊ3±˜ACÊQ*âZ$"6ò§çe:ØìÄ,í=Ý(qYÈf­’=ò(ñjyÿY9ô¤ŠT(7Œ8B¼g»`¾¶ïEFˆ=øY÷ ÷¢9厦5žV·µ öDº­—÷Ýþù¼cyÐY¤¶×`<>äKG¨Nýâf1æÜ–#âõ˜xÙ™¬ú¨7žŒÌ•ä‘ÇÝ(¥ kwØ´_2±ç8÷Òô.¿;q7î :Ó\Æfç;ôúîsöR By@$ üÈâ.&Ôb~Ä©Nm˜ôÉ;'â6²"W¡çsÏq±p\!üÀ¢vD>¸¡T‚rú¢Q*c7rNHê®Ä¨ì¦ƒ²·'à>ØAhIJ¡cã®øÐô,‚‘o Gî»UÓ­çíÑ[–Ø>¶< ¼jGnh„úDÁ\'Š@ñ ôbUC ¦{v3~‘ó3‚ ÷´}ǰmæ¾þq¢Ü±¡|æÅeFRòæYÒ iÒI7i<¥£¼íí9&Í3àÁêoÖÕÚ4™^„É BE¨rµÀ¢‰Yäþ7Bo* \Äឈ ›bËG—¦¾Á¸mËC„:á]²l$,Ì=#p¤Ë‚}døAÀ $¸Ï MgM¨®ÖžÊ„VÌ%ÂxE 98X``Å!“öìA@Àž…C8‰ìHðè® Q'`<ô=#Œ,mÁ ðˆáYQ».æb­{¡šZ{²^hµüW3!{dB?Á{^îiò8É”FÚêc1ÐK¡PmšŠ6|hO«©ߤS‘Rðrót qWy»¾…½rhÖ`òÝAm«g"¤*RsR:5ºˆýJI]Ï5qÂY‚\ƒ.Kh–ÅQ ú”ƒv¶L2-üx´`{ž^[°p·µT† # Êõ¾”€F| $uÛBA {¡†ÔŠèÌBçé„7бÐ×M8y4wìÈ%¯qTVÍx—Í#Á±º®,HÅe<‹ÃrƬ‡î[«JΓ³\7ÆE"f®=74='x5()ݺ9tŠ%([&šfɳÄlÍ’×Æ’Šæ²&u£«ª j$›S÷ SòÔ-ê#²âá¹ÏC2§½*¿ÕK‹ ®Ö—yê´Ú(ò_ˆÕ¡#QARÙŒâªÙKÏš<¥Qn »Y\ûOµq©ÜñÑ /ÀRË}‘æq¹ÿ¤\h^ìE)¦iJoÔ"ècgoÝ“N»|nò(YžËó])/ë R&Šµç•¨…!í‰øµòþ^ì}QÑäÓô=»}/òþ× N‹…á3e­ÊôÏû\"¼ùý¹iï?7íqãÓþÁCg˜Ô ‘,f-OM2¡¨÷]´¾¨Ÿì—Ì Ý0ƒ3dAwÁˆAmng>ópèW½ÎÎeÎì1fµj`Ø~à:®7êgVé—Fm+ αžj¡ÿüóûS90?>g3kz͈º.v¨ëClÃvA3;žz a6³é‚5H{NÏà9áDz›­þ¥^SÓ˜öšž¥ ?®ƒñ4ãð6´þ€¶úØ£ë?V„YqÒ?.^£Ï²ËžŒ2ÜQ¨yxn¿#p­WæwîΖ‰³®îƬ9·WíéÊ×K?|¿µsðÇþaá:çrcl21Ì9ß}^üs>Fñ@|+6îD^ˆDÈ,Ë–kèˆcPý+!‹0‹GÑÆ¢ha|jÀd­á÷ïà—¿lÏ$kz$´|fÛ‹lèסc7BF¥œ\µÅAµC¸Ú!yÉr?¤ŽETÞUP rü`icÏ—Úimï¶Þ¿&×ã¥v;íÕë'žÂZ9çYè.)f¼":È{í<ÏÎÔ±?£ù]q·ÓT^<}¸ÅÔá £ÄršæsO‰.Ÿ»õ ¶§’¿ß ,Ëöüí‹Y&òñëYd\ß–¤¿†+Š‹¬g‚a 2B–ö^Ý伯édì·Þïk'C;¯ÁÉØ‰Á‹e/e@ïw…6žÎ÷XÁéXòúsû"®»®¾òül™ÈÚ©ðE¬•}½Jû"Ïí‹ÌlÐÞˆöF´7ò¸Þˆõs½‘l [ÏcšTìqϱÈOÚ)b™ží¼ÊåŸì{W×ãò­l™´Çõã—ã¹ÚázÍÐWmW·aÛs l3¹oó ¬Ðp¸Ùƒ<ËÁw·ŠÖEêÏÙ*úegkoo§õ”›Eëêí©6‹®˜ÿ’Í¢?ãLËô z•¬¥x5а{¥à{?Ž=×Ò[)_5öj5¦JÖi²i²U‘íû‚bë…¯ ˆûÜ ü´y¸õÇó¡®gËD_OTB›•Ý´úaŽ¢}ËŸÅè#} ?¦. i2˜YÎõýÏgä«£ÃJÍ×_‰¯S‹&5[Ÿ—­/fÀÙ6qÖ;6 *'ÁÇ‚ëØôØéaÍNÍÎ_ˆSk5;—°s<ó«šüU|\K”:&^÷aÞ r˜W ®×“-B©£QªQªQªQªQZ¥®I^s”VþTÅXpÒ ”º¥¥¥¥¥µQê™òÖ¥Õç¸×(­@©§QªQªQªQªQZ¥¾iMý¢öz®ã­<¼D ®çJ¡Ô×(Õ(Õ(Õ(Õ(­ÒÀ´ýuŸ+­ŒJ¥àD£tJRRRRÒz(µ!?ÓyîƒÍŸ=* ²e‚k”ΣTjG£T£T£T£T£´6J±éÚë~Pƒ“-\/;Z„R¬QªQªQªQªQZ¥ÄôlòËí+\£´¥D£T£T£T£T£´6J-ÓÇk>ÀëV¢t,¸FiJõ ¥¥¥¥õQj›¾¿æ§y([ ¸«Qº¥¶F©F©F©F©Fim”:fà®;J½l™à¥(Õ§i”j”j”j”ÖG©g"gÍ—Uü,Ú´à¥(Õ§i”j”j”j”ÖG©?:ŠvçJ+7Ãøú Þ%(ÕG4h”j”j”j”ÖGið œÁ[¹ì(Ðgð.A©>¢A£T£T£T£´6J12-o½ÄΖ ®Qz¥XÑ QªQªQªQZ¥ÐÏxîz£U­à®QZR}DƒF©F©F©Fi}”ÓñÈ/wï´à¥(ÕG4h”j”j”j”ÖG©ez–¿ÞQ©[9À;\£´¥úˆRRRÒú(µMݯԭÚW:\£´¥úˆRRRÒú(uÌ`ÍĨr€w,¸FiJõ ¥¥¥¥õQêšA°æs¥^Õf%¸Fé"”®|Dƒ¥QªQú ¡ôàhkkgg{g[ÃôÅÁTö_? ¦Ë™2Èã$Sún« ,[ Õ§iÓ¤‘Š|v³FžD#†^Ù2‘ëÄjdš>Ï oºðz[=ôqTæÍI9¤Lû2yPü ‡8\;‚§í hA;ÚAXÁAðLl¿¶9àìïSµ®ÚлúMV¥½´ê‘À ¡Áú:ÁúÀ†U Ù2Å1#Îù Ï÷¨áQç,bøPB2®ç"Î#¦°:WŒU\Í»2EYáò´çøVÈå€ÇÀãr1kÖ•øÑ‘¸rÖS4„ŸB¶[ÈÊd[¸Ë<ƒ…‚6Ø Øñ êË!\D„óFíŸjÝÞÖ1bâf/3dÏ3‘¢,leËTTQO©£GfÞ7c‚ˆ–TÛúˆé¸/™wZÙRþ@ýôÁ^#A®'a(;™{~ôÜR‚þÏRµÍåR¶b#æ2½ºU^¤R–þÒxl9söBl[¾ƒxä[BA  mÁ‚è]dc×a¾Å=ßqmº®Ï<Á8G¶íC´õì°}`{¯$çèfA¡0†NFs*9à6`eÄ'C–É‘$hr¿ˆY t:±à …a@Bd9Š…· ù| ‚¦]šŒp:eÙ€Þ.LŸaì ¿Q#´!&Rÿ¨Ð(ÎT2€ •?‰¢^Êà2ï]É‹M2¡@8§€ "$â®Æw¦Eç8BÈ \°Vß7l ;cƒüœ:6¥°§×"úòºÇÕuXF†ðœÐ°)!FˆÜÀ@!µ]J'pøS*ÀyT¨¾hZüQ÷„L–'Ò_¦¸¦~"$'j žëóÈcFþ¢aûÂ?È p„lj;íi5ÈüKÖó¨ß£ŸpσŽÕ Ô@nF@a°("ù$°<ÿ©T`?TÏÈ]É¥ÂÄzÔˆvDá“…#ƒ1˵\FA(µü¹žháðdM.r'rÑŸ³eZªïŒ>•š´3:ëŒ:¯Î­Sá÷¹¢uÓЮ貿Ðåɳ÷ŽR_l‡ Ï%†£üÜÀ³ŒƒUJ}ÎPD}Rt2µüé£ç`¥ d½é.ù([¦¬ú]òSiKwÉ3]²e«º_U§\§Êïë”릡;å-¿²ožz¬,(cxCÂ]Ëpô}dPfEF(\ލàVè©Xgòz{zòóþjÎù¯ ¦ ºÞÙ;š»Uš5ÜÅÈÿÊÀ¦÷å+8¸òWˆ<­OåV ÀݯÛÕ«CˆÇ6†¬¯DõásGtzéM»ÂwÏõ9}uŸ´ÏÔ•`ôx{ YP2ýÎè¢o‘©÷¦R!Ú)í¸¾í.Bñ.ËLä5°[9‡Ñ¾ê¥—IÊ÷¥ÓA· FÕvdq!Öe›Áœ¤tí„“ ñdnPÐvÜzJ¯4eçRS×¾Ûv•î:=^Lì|:Ù2¾ô:ªCÑå½TÞÙÜS3-y¯ß'áF%$&F¹g=v)ò‘òX/£;ù9虫oRÇ‘{*îþsÊXTåg™°Ôd|%ƒì\~ ;1‘#ìªùŒa‡…áºê¾`ËS5 qÑa9ëŠ6¢8É‹$:¼.Ò¸ÎÔ÷NçZ]N! -²(–{t¸-5Tfv{qwÈGïµ{ý¼H[eO…êV Ô’1#ƒJV÷(WÉgCP#å<5Øù¥¼ÐˆW…˜B§&¦„-Óτʾ6šÄg]xV~µx·wÕOE$r¦Ô’ÝÈì’Q•ˆkõ2ëô†êîeÜ7̣ĀBtóôFå—±sÚ=F‡zŠ’„JÀ®*ð -¾CÕß>K:ƒ„ÿK­( S•r'OÓ±®GEvJ±lZ*£MùÅ ËGªá`IÜERj¸[¼}}&òpˆ‹……1Cõ!Êβ ‰›Jk =ÚI§°1. ×`)SlÉ-Ä)T:ŒÓ||—¥~"ÎäBšÂ>TƬ¬[‘–ê)̉÷>SÕr§_tËò¥ÿgïJ›וö_Iñå|r°/¢jÞªLLæ„! [Õ)—$ËÈv“°Í}ç¿¿-oqHÎ ðÇ·êÜ!¶¬¥[êçévKžNÒþE³H âæÃFc9œEŽ{aÓ÷ ?ênü¯¼C3°˜Ëž^<áø¡8ÇÃ^ØÂ%7¢¿dÿ.îÌTEæxâOø0×= ÍUØ»q WL®~$“hÂüi<`4ÑJ—†äc.zýÞ¬=;œÀ$J–ÔÄk?Ê[MƳh1I¯©t޽¹lASÿü c]qwLìšÌX.Uþr‘kè0ãDP»9à ½;øB«á+o\.¼ïuà ­‚/›š+à -Á—c¶¾ÜÏ_‹–.Á„Ôò$ë{ÙðÎMVbtW.ÁEhHlp‚[‰ ŠíobRû[¢¹=›¯ûزņg \¤¦+1𠛥GfnTMQ9Aß¹ ]‘ÈHÇØ›¯´±%üË Fl½Ë—ÚÙMRë¿ÀbÓšBÖ#¸] YôÏ`mAsË›Ò <=&7 Bdmi†é ³ C[zÖ°ˆ\ÀKYÎlÆŒj:Kxœ"ë¢á^´òÃöÛü9$ÅŒ*Æ—¤YÎcN–åW H³„‚1ñ‹6ÆÕ”éÄ\%ÇRšõ˜%Ü%ælsø\`o áLÙÀ×›ÇÆÇÙ,cÆæ&FÄT¥Ä ¦-À)ÔSî"lY.r˜]Ê]ðåccdRiÓ’ÃM†Án&RyãÉè¶§ã6Ûy|ÞíÙ„÷fÓ0Ôž>%Õ ’l^I¬o•XšŠ½„Ê˜½Ÿ8Z°ÝÔî=寮ÅÞ±PæË.+^†P3Üã!u¥úíøl2êëÑ!“†Ö†å–%“ÜV?ò|ÎMŽð{ñ0˜ü®#™©̘‰©r,l æâ3Å™ý%`"¹ ï2`ê­´©O¤kF©àÍãao·ÚW΢[!AûvâU»Þ)PÅFãT›õj«qØíÔ¼ãÖA·Qó*N¥úÍ;©w¾yÊþеÓN­¹›½ÑnUÿ®u¼ÃjÝkv¯²·WoÖ;g ×[F×k´vkðã¨Soeoוýš×9;„4êúN¦§ív /_Ê>~TkW»5ïëÞqöêþQåð[½ÚŽ[ýÚª~k¯iô¨ròÄ“ÍVs¡¹v§u¤ýÚm{{»Õu·Ú•NeÝ ÿ®gï4A|Çõ½DQz']TSô£Å o&ý쎵¨U#V ‘ÔQž/Îé­Üa˜áyµ‹u†âY7éƒ ˜¾©8‚eÃY>0âÄ‘®X”. "² 2„g­ËÚü“vÖ½C$sItŸq äb*}›1;’EòÆ©7à Ó&–A(—5ºN²¶£Ö¨¯,‹ å+×Ùä3 ž1LSî"®ý2š³[Öè×uÀ×y-¹”¼Ø{æXRà@˜¶TØj¦%-ı«·ß:æK¨xƒÌœÚµ/|›*›#æ¹$àSb—J½óI´›Iå_þ“ÚU7³Éh˜Q0ƶ黖ILBIp”„™d6Qv´µã5»v ÛÌΧޥî_!H.A¥0]Ó¦`—¨¥ˆâ ¹/¢á¸ó/±z×éK†¨ DZ.\Q—(ìÛ$«ß¡šéWš úÇÿ”Чw½`¶•±ÔD $ÖˆH ņ)¶½„„Â&óík®t;ß¼ôîÁ‡ŽyDxîÐïK{£›¡_J*úï_QISGÂ}iÀâ#x3Üðü1X LŒ]¡#/Z‘º|>Ï™JÁþẌÛÓUÌ +CeÐõ<­úîzC/ÌÔónÆðTg¢ƒr f7ðQŠbD•j§~\ ãF7ÚÕõy.M/ù$|¼¹íÅÁ† ºòŸÑÔ`- ÷‡ŒGrvFvgônÔÛúõ¦É —1ÙŒwø6Ñ[mMÃT\°Z,yˆ bSDz¹£ô¡§¹ ¾“IòÌ€’Y¦tÕ!zsæç&¯%ÄO¾I£ Ï-!Žùá3ÊŸCμu›äÿ€’½(¼þ9OŸo8üÚ­D»Î’øHÞl€âåO&¨‡%ËõxÅ{ ëáÓ©ãE^ça™i¼Ø‡™nçêx©ö?Ùߨ·åMø@ÿ…Ýxë`|Y/Õ@Mx?Þg8½ããøÏѤwÑêØJ’hÊ —p–ºŸM¸§·}MÖ.ï¼Éðb‡÷û£»pÏã–Zlé¬ÉIñ+S_0:ϘöT‘8z&™„JãÓiýð–&ŠK¯ØÉ•‚ü=KþƓхl¬t(];í•ó¥HW"TÖâù“ÞmzíZ¥_aˆ¯ƒŠÚGÇF·½¿Óç7C}åÂ2÷gj´’Ï–Kè®´;íŸ^{éFåøhËøõJ¦Øí`^HÜôúþr‘1ÌÏIZ*œæSC!‡¾òÛQÿf ¦;ñ¿Ð™Fi?=[ïzõ3iO™àݼã:Põ¶¤˜”ilÊMŠ€U¬ñÌêYä®K‰ÁaÙˆâ¸Ñ¡È¹ ~(RŒéªü_-CfnFŠ_KˆŸ“ I1Åî‡#ÅyTþ)Î[GAŠ Rü*¤ØbÂÊáÜaÄbŽËl×â‘t„Ï âŠ³€ý¶šùf’ò@J‚ 2ýþÈ4)Èô»!ÓIzïÿ?¡ó»aA§—¨ e.Ÿ¸³À;mL¢ïƒ¶õðK°†‡Ð0t=6ÚÛ?¥ôåËÿ¤—i—xu”PüåÐ’®sE?ì²…6۸DŽGaC'¼Õ¾Á-Á ¶L¸ÍÛ*å.øh½þ¾Àªoš…2Üðƒ1¯%ÄÏNë馴þƺó¨ü9ZŸ·Ž‚Ö´¾ õ­/h}AëWÒúüé…°‘ÀÊ!oIB QƒÛ¦0(qlÃU<0(ëãâZ$: "WÁF¼Ùt 7üÃk ñ³oç_@¼ó¨ü9â·Ž‚xÄ» Þñ.ˆwA¼ âý†Ä› 2LžÍYp@|PC ‚ j èîCH—cKš ³8#OÁD¼Q™«²»ç2Ü ‘å•„øÉ‰71ÿÄ;ÊŸMdÉYGA¼ â]ï‚xÄ» Þñ~KâMʳ6"Þ6ò™I©M7(R–á:2,*$ö}G‘8ù9WÁE¼ÉªÏÁÏe˜Ÿx¿–?;ñÆÿâGåÏï¼uÄ» Þñ.ˆwA¼ â]ï·$ÞVÙF›E¼2mÓ!Žá*jTÂÿ ÏmáX¦M|dŠRî‚j릻òÓ-snãýJBüìÄ{ÓoÛ¦/Ç;‡ÊŸÍñÎYGA¼?#ñŽŽa-˜wÁ¼_„y“Ì{ë7O!Ž´[TøAãŠÃ¥b–‘i–Í2˰ú!¹øïð æÅ{F£RÝpé%•|Ù;Dí˜|G¨dÅJ)Ü„wä&„Ss3WaÕ´Œ¿^µõF.ÄònÖ¬óÀaöGF_ë: Ïæ:`ôGÛTÓý¨á&Õµ¶5ô§;TÉÓ[T‰]¶ÍÍÞ¨ÀaˆÛʰˆU˜\Ù¶aû’×6™-Q)wÁå¾0wÕQÑ¡ í Š~%!~v÷Åú¸/yTþìAÆ9ë(Ü—Â})Ü—Â})Ü—Â})Ü—Â}ÙÄ}±ËlÃ\d;D¸DØPîÂÌ®/-¤a2 Úç*ø¡\BÑt 7L9z-!~v×ÁÞÌuÀÈeÎuÈ£òç\‡¼u®Cá:®Cá:®Cá:®Ã#×ê«t:G;Ú¨…ߎá•å¬?îó¡*«{>÷•æy[+žìi½ ¥JprÁˆzn’UO]ÂtŸÜö¦£‰§›N?]»qó (¨(ùôføMYãÞ²~’þÄ\U>’¸§?U{¿¨àY<†*=ÙbfÎ#pÛãü)¨z\뵚 U?îãÊ‘ðž‘O•fž¯n{ioÃïí[Ÿ¯*] ]ÏÐúæ.£²7‡óîáÖGð#íÌ Ÿw|šxquÞ¸HVÖs4- Ì_¿‹ LUI·Æ‡~鯿»_kÕVs¯¾ÿeûr4PÛ?onúÛe0kÛ`è/{Cè¦þq}#TdXJ#Y2†¥Ô–&ÓËX*`'—êfjÀ¿°“ú{ö0HÃ,ÁmC†ÊËQi«þðµ{rüÚköùÉý­896ÏO¿gä+‚k·þ‰¿ëŸáã±Øg³óÓ£¾ì³+ùíØ©¿÷%fHšýú•Ùkœ|¿nžüÀÍÎY š¦Ù¼ª¡ƒ“::ëtgçkzö³yÝ:©“ÆnÿºÞ»ë ò}|Ž˜ÉOP_’£KqZé¶ë÷ÍŸg´Õ©[­]‰[³‡úмh\ý¸kìVâÿj7j%-×ìD媃åq¨‡ïç§0–ÓïWçí:«_íõÎw¯›W]ó ã_Ÿ_ÉYs÷ì¾ÙF½æ‰îo×jí7~žïö{ÍŸë¼ZŸÖìŸø¿ß4ͳtŽY·»{ýÐê\æÕ5nô¾³úî:ïgåþàªr1/wv–»_Ÿô§£¾¿üpŠ›wþé´'Ç?9~8ÃÝPgƒè|÷ 5«&9ß?#¸²<»:¾„þö[Ë«þa]É»ÖÉÞAõû­ô‡§äh 2øéïïÍdU¹ý»°W×df5¯ê½ ]!«Ê\¦mzWßMËáFTî]è^Ëm­î¯ÎÞ‘îkÝ/ÉúùndÚèü0×ÏSùðŽæé=\[¯ÿŸÝ÷¤ë‰5EZ»ïHÿW5¼^ÿ÷ïHÿÍìšz¤ÿÖîHÿ_¾l•þ·¤ñÕ¦%Ç¿Ûí¯Z;êx»õ£/Ûj&·çÐ8‡³©ÆzÈê’âfè÷ÿ½kj[×Ö¿ï¿Â‡_Ø{æ:èiKÌtæ¤!¥é& %á9s'#Ër ̓›”Þ{þ÷»d;/HˆÓ8Þ3MlYo-IßZZ’L<ŽúýŽ&쥓̡é›õÞœ:˲03G†7zW"‰vÔu{çïÜÿ6[ÛN¿çXŠãlS)ZÀDn;–D¶t7\OS–ó‹ ¿Ø±í·d…"ñYYåôBƒ-;)YÃÙ’û`æ‹rFý{uß%dÛQCgÛr•mç¶=¢†C0yÃÄç¹´bV‹k·ý½_ˆ#„®ûƒQRƒ¤P:¦F³=ìñ¿œÔ™ûŸ[² ÿZR„_@ZW„uÝB^©ÛÏù3±*Á4ûËŽc¨ã?V䎳Àø= Ó?œ+«s礋¥…rÏÏN45-ÌÔsꆇzN4\…a«kÔp \×éG`gí:‡ 𶲋-T Çvžÿá8ãR©ÜhìNû„í !h×Àtû#ãÄŠ^øc1ßßVꤸm±ŠŽ] –‡üÍ6”R A±ËˆºLûÚ"Œ\¡˜–4 ¯“c÷3%|úÕ°{µéZWïzç4®?€=ˆÝ´íÃŽ¯|D’n@+f˜u‰cáFQRÑ€…Dì@÷h†* ºìPÕªl1&XŸx½gér†M<…ÝÁ"_tÉçÑsU;j8r»ý°µM¸<o—ã]<=$jÙ¾tDã76S×¾ô;öE¯ïêIA+W"3YZþÉúç4à×–nò…¯%2>‘f|Nx ý€†Ò(é}ˆìiÐ(’E„…H…TóÀÆD/¾tór½}ébNòʺS¶>Ÿ¶J‡Ç­3ᵪÕ3ë)Õ«‡ÇÍrë¤~p\-·ŠÍf±ô¹uZi~n5‹ûKR”ÏšåÚÞü‹F½ôw¹Ù:,UZµãj±Uüô©R«4Ï>®Ô«ÕãVµ¾W>€GÍJ}þu¥ZÜ/·šç‡Pƒjž™«i£Q&Í~Tn”ŽË­ŸNæŸî?WJ´ÔõÒçÆŠBЧ|Y«×Šk4ëGöÓÇÖ§½ÒªWb³¸ª‘WæßÔ¾“ʧ <Õ3x@ï'HES©5ËGŸŠ¥òR!-æTÆ©_yZ½réøDÓ:.ª$¿ ®õzó‘Ú<Ö|Іá¥e6«-Ü"+Õ¢xÜ\¥_KõS²ºŽ‡%ø½2_‹ØÁM®4+)¬«ätTYÙÒB«PyˆÙ=zÔF©QyäãRåèèxA“kð|þw˜ÝAù¨y6V£vÔ<˜ÊÕ jeò·íÖ+À©4ZЄJ5Ë{±‘öH©ÃâáQëä X[¢8d$•Å.ëÁ½¿Ð÷Ê'è?Ðuö+µuݧü š2ݲþíCuë›é™J]Ùüe]×¢€üÍB |/ô™Œ×Ç2pŽˆ«TÈ]M†RvÒû\0=%é½?íOiìs1Ö‡ü“šnŽƒ+ Lîè!©žã• Ì{-Ì‚í¯ÑÉ€{ÒÑÕXmD`8¥TrÌÇäƒ …^HeaîSªüˆò3¬6…OM'ñ::ùËÝb9;´¯âXkŽ÷Ä(N¼>ñ@gãa¿«Ú½¹–É‚ó\äÏÞd ÚFÀdŽÀÙ,nÈgÂs‡cë°‹u­kºTÒ.í§5‡!æº=ˆ—%ÓuÅ8~b¶m QÒJ\êÑ£Ãñõ× R'çÝÛð4¨_~Û¼ðõª½˜xâÿ☒öp8~d…!mZãßÀ3KÔ/â™”2lM+6Y¥[Ò¤ÁI% ´ÆJjƒ‘ æœ@2^€jæ+1ˆ$($ýš3!¤ á”I†Ø…¾¯=?ò8óÐüשhã˜è ¦Ô¤"¦^÷۽ѽ ˆoš°5…KÐKp¢bŠzBcn"¬ñE¿â”ÐÛXiItüè©ÎV<Ç› ;ˆÔ{qæãAg>’%)ÕMèNò¸ïF&’̲]Ì3†gU#t&l„Bd†n£d60VÔ×`TsÆ4"~§ kG—• ùïiµ¡ßûTKŸÁlT:ÂX¦COJ/Áb•„ËÍ >Å Æe…¬'‘9IiöDÎáƒ6…’>5Uë(ÞÓH:ŽYZ!_áû,—Ê$äÅÚKŸë€DòLÀO ƒ¸æX¡Àø÷ÑSˆxƒ€¯ Òå8 BOaÃ4 ˜>5L3êÍK7 û™—oÜüG¥kÆ£”?0! GQF£HP4 E5ŸHÀI±+û°'½lâ}P}¬"­?`:@y Æ%Æ 5Jbñ$N+ÿ½× ‘¡–˜Œj.X  4‘!¡Gçå; Œœ—oÚþÇD<¼mG£­¹ñ‚…0£EšèM¥Ä‘oÐ0C#˜Ûž¡¸È,[Y¦Ûµºp¯R0Â"è$D Æ P¾:Ë•ô´ïá'R䤥«†*P¿ßoãLYd d„…GaÐb E$`µ=U"ìá…Á ŸvÕuaDHPzL_¦®Ô–8ä>Ó>CB0èa¬„ 0H œR™§ÁræÃ]=ôgS…%Mðü0Ò0¤ lç/ÅÌ•ˆ·RŒ.¢§Pû œÐ¤`f¤ô=¦]`ƒ¾'/ V\ÏK{¡ÁQxLÜ`¾Í¡…áL1æ¦dD“L7Ìlò) š”úHÍ üa#"¬B`@L˜„Qèk&Є#˜YŒ˜O£²Óf¬šÈ(Î2ËÄö¯€5ÑL˜00ž¶»D|Z$æÛDÔ`šº]Õ"7˜öÇd­mÀîà†ÎÉÆËfMd9ޤñÈ,‰â§uRj&S:“°¶Â æXF„P§¨ô}Ì8˜Ù]#D=°Óv¬œ¼%-xUþÉx[D+åq`ï9Oýq/t&ýïvâE²Ô‘ªP»Ðù¨Ë`zsþŠx¤#Dˆˆ÷’YAÚô¿¸3Äf1Ý®dóY7µÚTØm÷’8ëÖø¾²; àyw4†˜1²à#J6FÅ~£qåÚ‡6âz{x©ñò§ÄlßN TåúÃÖuúÂ]ò‘u\ÙŒúƒQkº÷Útâ‚ÒŠ†½‰ÏÀ–cóô°Á® ·ú¸X§Ø[¾›"Öšøê¬÷ü&v‡M“\_Þ aàèLÔb®B“$CóÍN#“í£È÷!‰õc$¶ì\é6x´.íP4AðÁëé›öõ k¥›‡@ÛúqÓÊÀ;oÕ»¹øö 6‰¯ ·÷ôÝ Có>), j©Qâ\ð(‘]ê_Ø|ÒÝNkR ÌMÛ®Ù·zcëH± õ/'mgÇ8Qà$ »¤ÓÊt‹8YŒû+}¹LÙ%Ã}W‘j öó•“9áS,*ÅE…_Øód¯iàKïG³øÈÍ–ž  W¿gzaWé/íeŒ#³g›+’ÝdY7V&;Ó‚(DÈ'˼» ŒN7€qÐeõC_bxóîtäIÉÊxœªf»eï_¿±#6[€a$Dyª½ÃÈÞbìqí’ÈØc›|ðT¢Dl[Küæ6¥géSë6¥gÍãlJ'ϰ)=Û~ó,Ú÷ü{]3Õâ™öºf+;Ã^×ì;Fcz¨†Év½ƒF1ºñ«úÎëo½ð6(‰Ð iÛEÖD3޹b’„"Pž8òQä…‚F”ç\úÕqi†r.ýj¸ôK_ªš_•º)›¦ü·î;š™)ÉG÷¯AJ/=züÎ#F áÍî<23\S{fZ¬™+9‰\Í”æ(€éÜ$ÛÑ2%|C¬LJ+0$ÞyôL ¾wV7eõoÐÓEäkï<ʘGÎêsVŸ³úœÕç¬>gõÏsQPÎÿ—òVð݈wÔcXérσ!(BÄ•¨ W\s?0É]7™¾)oºï£á 7Œ0y.ß;ï¦ÿ¼;‹È×ñî¬yä¼;çÝ9ïÎywλsÞóîäÝ^Á—Þ†u juI`¯‡©† ¹†HÃÒMî˜Ìðmù»å²3ìfnrQçó€øÞy7ÿàÝYD¾þ¢Îlyä¼;çÝ9ïÎywλsÞóîäÝ¢à3¹ïfRÂÈ‹B—*°·8`W¡@»"”>å!…)—9™¾)·dKãL¦fçÝÏâ{çÝž==¾9ÞEäëxwÖÔ‹ŒãÖl6?>ÜzíV$‡QÍY@·j ´ÒìZ×1Ld«  a!PÀûíŠX2sÀHåØÒT/t¶ÿ>þX.ÕkŸ*ûv.û]³ós<îì`TÛqþ²ÝƒjÚßÇIƧ¯·çL‡Ag0¼t` ²·µ›ñÐ…ÿ`˜´wiB#]äÀkWê/ûÎVåîãñéÉG(¯ÖQ§?n‚Ótqö%:§1<» O9ü®ü}NN®ƒ}9º8;ê莼ҟOüJïKG‰u·Ö©\¡vu¯ÈÎ~#µÓê¨Ú½èœ·ºhjrpZ¹=o–Gµýó»óæå÷jóÿüþ£Ò¾môËõ–H⎦G—ÁY±}بü¨ý|Ørþϱó«Ç7„¿ƒV©|ÔlíUŽ>옑ޙM`€m8Ú¹>€™5tµrƒq/ì˜xõû,ØK'™C‡S'ë½9u–åýt‘D;êºmïѾúm¶¶~ϱÇÙ¦ >R´€‰Üv,‡lén¸ž¦,ç;~±cÛoÉ Eâ1²²Êå=„[vR²v³%'öÁÌåŒú÷ê¾Kȶ£†Î¶å*ÛÎm{D ‡`ñ†‰Çsi-ðìâÈk·ý½_ˆ£ƒì]¢I ’BMèü™ÚÌ)/O]ɱ—±ñ¹% ò¯åE¾®븅¼R§ŸógbT‚eö—3Ç&2PÇ,Ï]¢,0>DÏÂôÏçÊêÜ9©Ãbi¡^Rh6¢™¨ia¦žS'<Ôëp¢á* []£†càºN<3k×9T€·•=l¡9¶{ðüÇi—JåFcwÚ'l A»¦Û'Vô‹ùþ¶R'ÅíÒI߃N 'ék/Sbxn¼òòðÝ,“n€C×áé —ÏøpǪ?˜öõß.ðK¦®æÁ$Mg´.»|9(†EEAŒXè¯ÓlR’Fƒô{C“ë“‚ÂÃüíës3‘—ŽÚäÂx)Ý$;Ïì7Ô²òMGµ¾¸Hâþ —3닚q°Ód)ȇ““ô²—NfOUõ͹P7…|¸†UÁï&-È“‹“tîØjÎ8PËö¥,õ/—"9(šwFc5œä¯Ž{®ék &?ïnñW]»e9˜ Èrl'ÿÀ‘s<ì¹.„—ÿRý«¢3™ÉÕqªS1ÌÇuÜ …q½'vöpõsšä?ÐY!0š|&¨ O‰q9ÛËߦ Då”J5hÓâ%Go“Ž'ùdR¢˜S3!Ç·´Nýç·ÆU„ÿ‹ÐºqÜ“à¼yÔPø¡È³K”\I5Žj˜/ôË™/´Ü|Õ]“­¿ÖûŒæ Lo=óÅú7š¯yMWÚ„™æ)ç÷¢â½UY¥Ò]:çMC©ƒK»Uª Bÿ–ja¦? Mt«Ïnç}¡Ù ųÂ\ÌTW©4ç d¡–îh˜[5PZÕ™U.­ï­3"¹’.lg¡¾f-Ø¿ŠÕ(´w©ùfz6·&3í?‡ Õ:3YwÌí¬¨ZÿŠ­ÍMЭæ-TiÅ<Ý7¥…¨êÒ ÒVPaÚ*¦§D ó–«bðf(gÎlˆêÖè,Øã™eWÜóZ~8‡~ k’ DUØ—9K[ œ»˜¬Š¯æ,Í‚,€_ah »:C:V©à¡̺‹¿JìR`¶[ó9‡ÞJÀ9C?`¾ž}m ß¶˜(’\ByÜ)xãqB…‰ÏI ‰Ïòsrk|üµ10dÊXÕRÃM†Á¦©2ñ8]öìºÍVŸwk’ŠÞÄÙøg÷QuÌJODÖG^D[ºFd ÏÈÞ‚Áó_g­¶Ý«ÝKzF/¯%€*¶Ñìɲ3|—ŽIÙJí'áI:êÛѧʆV.Ë-R¦\p[þÊÉ–jHÀ­‡ðG¡â¾ 1ç>¦&d˜IJ¢¹<ø=‘ "…$‰Ž8M0Õ+ª‰b0gŒIž}=ìùfûÒ…³ü‘hNãÝÓø3@޽ÏV­ïìžtÛñ§ƒ'{íx§ÛÝÙýŸvºâîÎû%%ÚŸ»íý·ÕÇ»¶»ñán'Þ?ÙÛ‰wÞ½ëìwºgs/wööN⽃·ípqÔíTwövÞ·ãîÙ!ô`¯cŸTzz|ÜÆ‹·ª¯µwOÚñ›wŸªwßí~èì­¾9Øýp¼¢Ñ£Ó{ÞÜ?ØŸkî¸{pd_}sr¿{»»êÑñNwgÕ ÿìTŸìù>uÞ•äÙû 7ÈÝk:ûÝöÑ»ÝöR&Í×ÔFE¬{íÝ“#`M|Ò~×ɯ ¯Ý{z³À¬êOŽß,²†¢¥mv÷bã•b±sÒ]%íœâÕ}<Ü…ë•õZŠ}\"É{'»‚¬«øtÔY9û«¨²H³;u?Qw;÷¼¼Û9::™“ä}¸_½ÞÙÝmlí@Ç«©vÔý!ÂWØoã?í´^AœÎñܺЩnû­ÛÖpO«Ç‡;‡Gñ§;ûK¯"Ig~€ËæÃ}ä~?7ß¶?u`þÀÔyßÙhú´ºyÜ&vG肪ŽÏÍФ¢Øü=7H#´Hf`EB‚BÏWyT2æI°“^ NB(jt«vÁÇɨuxp|‹’¿™›lv¸Î·$²%ÈmM,³ —DQv•êƒÞ§"Óc‚Þ»fcŸïË/Ãå°0›Ê¯™¼É"¨®àÊ9äý œ¬CÛƒ“’)§èì¶|WB¢7¬¬æ–*™rÞ–Ifá˜uRÖ¬—g'¤QîCv‹›“µÈ|!¥ì9¨˜q/uù+KÂbª{6óN1Êwæäãèß½ ¿½=ûØ~ó÷§î•óÜÛs1žÑ,*Ðþç’°ô²lº:t¾lÑ㟠gŒA?Hϼ•,žu¬Ìk¾¤™ûìn|©\*è òĈ1 sÈIbªHÒÙ¨|õ0ŒFçÒÇŒP.Àq‹@B„IÀhàWß.Xë’€Àd`R󎘡zÃɬ!ç}›Ë£N4âD2¬Œ ‚‘BÌ$HE8Œ¸r%mp"ÔB8pjÎ+y:ÜÅA¾N8MûÕÔ/y«^Á@¯¬ãîÆKÌñmµóu:ò¬„ÒàÂ&¾ö@0mOÀF‚„*Ò £ta¹nø™!<¨]Vä?³nü‰âQúºÏ…JŠ0U:à<ÈiQ~qÊóKU_ÐÀÑe¯Ëˆý¼5ª cTm¢¤Is ž1ˆ©ˆJ’(xN»è–üBpÅm\K-&Ï÷ž‡LIœH?0’Ê@DÆgŠ!#ù<ôƒÅkDæÔà.CZꀚ@ êE$‘̧ÂU4ÿæSr·²cnø÷r×L'éhXa0Ư#æŸP’$¥@’ü$ &È·õ<ƒófWÎá€õØ»Ð}¢ ‰2”TI?ò@2 Ã 1‚£èQ8\tþ1fo "µâˆJJ‹¨†FÄfÃ: Uþ–™Äªü-Æ‹³«^2Ù¨è ªÁ¢% +M"œ£$4`˜! ضǠk²Î$@[;'Ýqsû ,Ü'(¦ Lù” PP¡š1Áè‘9é*Uâ÷óc¼.#ž (  ´h€u”D`píLå> М2å‚ÍS0§r*Ý'/³¥Ô[Z"ÍBªBêG…Æ8(!‰Ápœ¼OúiZÞ®á®VýõDaÉ‚P' TZ„¬ýL€­ô)`+A fQòb¿Æ"t nKD ¡ƒan€AÄ@é‘rŒSUnÏ x‘ ÷±[ŠT‚ûVÑ¡’€ºW,ûB×2 (çàº!FÁaãAª²ÕŸ T•ዃHЀ€0˜˜˜kF*Ì|°,&H€˜#²³a¬2dÕ±òÛù%)@E#£¥ ”M·iÀÓQ¬×Ôˆ!¹´Êìîãµ²îÒKRá5è ‰xVÓ·qP%<âN³J"è1x·ZË•®ÅìÅQ_€»žÆôáaˆ(#¢‰Ñ ‹Çav1ŽÕÊ)X2‚ç^ŸÄ÷­Oº<¢q#\*[Hl½M‡ºUVô¿å«H:¡•“xÌ›шÁ¯„%*ñ1ŽÜQï–‘¶ü¦RµUÌòûÚz2­ö¡½až™0žŽá-›Šî&S¸@”â¹5¢<“°[7šJh×Þ´9 Ë.Dê> ¿ËÝöߊņ5ºò÷(‹Ç#˜ 7ùKváÊV4J'ñ,Yg:xÛQ=,× l;¶žtK·mzE+ó}r«åÛÅâr­Î®ž_ºå°Y‘ñÅMÖ³Ñv%uo;TÉ̹5#e>M(߆Úýf×1r_¶ÒúBFÔøÂª¢’‚ gOzãKÙvAÚF®ÏEgàY°êY%#dI›>¶Qr0Û‡êæ–†6KdÙX‘j'“|MpnE o“ð‹­çvò}¥RsÙ³ßìãáÔ.¤Xú§5 ,l%£´• ì’IK6APÖú¨à‡~¦Ì÷寳âæEЇž]©ˆ™Pæ)ôk|Œ xþ£Âìl¡M@´Ù}ô©ÿ9á©ôËoD›ËÂþCyÕA˜J¢Ñ,ùQž€¹n.ò< xñ’L´$–@[< n§'Az4!¡9‚gyº§€+ÓiáªÖ°'6Ëõ?Ï÷ †bŠòXûdC®O”ñÀ a\òRÜCRKÂ8åD¾¸½~ufÕC{ýêÖñ öúá'Ø€]:Ò÷ôéákõâ‰ÒÃ×k»FzøúIÖ=.“üÆÅ¨;§ñ³Þ.ÛxæÔÕd“áõŽNžL B øy“2 B‡¾ô ø® ‰‡«U»à¯‘š¤Ž´üM²l ×L\òTD|í»äÉš‰KÈ Ü%_‡åYκu4»ä’=ªy} ~»åЬýß=©9ÉèyO2bäÁ“ŒŠ"s'ý‡½ ô·Þá@ËZóP Åç+ÿYu¶ËF‘Õ¯øÀ²âŒ9íõõb‘ùS^ü×t,(c›”Gk¡âI£˜Ý_m8ò(Ž´'iy>pbC-„jÕ.ø¢P1H¶‚†|=TüTD|í¨˜®‰Ši¾óìE¡â:,×­£AÅ *~T̸dÒ„B„œ0F<ˆ˜‰JT(µ HÁAìk®C̉R7hú×CÓ´AÓ¿ š^uÔæó#걸6xz ²% ° x% 4s‘(Çvø-wDOÏ—“+í­Š£Òúý÷ÿ™Ý.©Ý ÔÑÂ­ÌžŠ¨[¶Î%ý7ò×[íæF0Éì×'©<)íñ.‘¢ÈG2’IžaºVÁ—…ë#?[AÃ5wö=_;®þ¸¾Ë\í®YGƒë\ßàú×7¸¾Áõ ®ÿY\϶}“±õð4õU¤™&Kˆ5Õˆ{" ô 1$‘ј´j|Axoú˜g+h¸&ž~*"¾v<­‹§_`ôH–?„§ëÖÑàéO7xºÁÓ žnðôr<]?"ºAÞk!o¼É^ïps2!ÄK4b •ô¤‘“’„ ¾=ЮU»à BÞh“D8[AC²æéçODÄW¼Ôè_€¼ë°üÁÓÏkÖÑ ïy7È»AÞ ònwƒ¼ŸyÓÍ k®¿æÍB™AžòÄ´'#4b\øQR$6®UðEÅ„8Ê–Ò0ôý5×¼Ÿˆˆ¯y“Úw –?¸æ]³Žy7È»AÞ ònwƒ¼äý¬È;ä½Þš7ñI‚5 =_0{š…¤žL"ìÅÕØ7!@©µ ¾°èí¥kÞ–†k®y?_;òfk"ï `/y×aùCÈ»n ò~•È;O²Ú@ïz?ô¶kK‹Ð{ãs çÜ)T*\Тb— ßßD¾¿éo’ ë’+Rt»4Ëóϼ½ÝíPqYI"¶Q°MÌ6N¶¹Ø%S?áòœh®ç+,Ëâlªgò!Ú«ÞƒéÏ=_é; Wæ;„>ú©¨³­¦nÿinµ¶¬í/7Ÿ"rßîSèC¸é“õ’<#å'XÑÄ Žö·6A¯m¦¿è ¡›öâÛTš\³´Fªå [3EØJ³‹¨*€'fšyð7Ei¬‡Az~ { Œ¨ºµ6:7oNN?½ööûâôúRž~ò¿|þ#9#oܻԧ ®;žáOcùžO¾|>ê«>ÿª>| ;Ã?ú s¤ûýÎW¿·ÿ½ÿõì{p†O&_NÛWû7¾Ð=»þxÚ¾>ûþm²wúÇ·³¯{h¿{r½÷u¿×é]õ$ùcüq_œ¢¾"GòóNïð¸s½ÿýŒt;ì »Cö¿ž³ÎÐ?ßûú×ÕÞÛâ_{º·»3+·ÿ5/·;X‡¹ùãæËgËç?¾~9îü?{×ÚÔ¸Ž´¿ï¯ðò…sª^ë⋨šªÍ$ñ’0¹BÕ–K¶däÂæÂíÝýïÛ²äâ̳þ0ç[–ZÝ-õÓ­–ÄÜëÀlã²yeOZgWåb0®op¹Ž®Ê­²yÒ8ê\»O@'*7ܧvǹ=öÈ["Ç]àAÅh·Ð½ês¹àjñæ±Ú¸¹h©gnñÓ™8¹Î_Î˵Ÿ¢r?n¯/ZÝ‘QWŸ=žãʽ8u‚ÞÙ“OÎ‡Š¤Úª\W[@7ê¶'Ð×Ò¸Ý8º®Ö‡v¯Ö)?5§¥Ç2v;'…ïwA¯Û?'µ[àÁ“8>ÕçRÄŸòõ ýU´tÂzž”¯ósžÖé½[œ•Õë¨Ü‡=ÔµAö7Hö ‡âZž¿?OËÆz= ÐÒÓx¶^þO—Iþæ†1E“o>È|ZÂëåi| ù?VÇÔ3ùW‹A,ÿË/_ö´kʾZTÓü]¯Ÿx…R­áÝÚ—9æ¦<ðÇ#eë}°¬B¸îOú¢+#: ºø°WZlCG³@ë3›:¯27÷GFwÁ!€>ã€ßvîÐÁ=p¹·¯ úš‚8Ú>qÀåÃ9‡äîk EzAOl‡)«ñÅÁ_¨þ+°B g5Xa˜A‡:)(ÏYõ`ÒÆƒg´b¼¯ñ‘¶¯°Ê¾vßá£ø¼"Žz®¢Â6æ—¤ÞrÀ¸›A.Jº Ç1q£Rh$^³:óñÿ´$œEëß<–c®nÂÞÚ„ ÞB]IàOû#v+Á7ûSM"' ãß·Ö¾/¹§Øô%.´Õ}Ô’ÅŠF¦Nz «in®ž³@<Ðu:Õp.„ד|4¬« &cp´µSüV²—Mpc§Ïÿ¦iõf¡Pª×gcB ôk({ƒ±Ô"EÏým¹Þ_V긹ƒ}QŠŽ(Yͬx_Fúóœ¸ÏÍ 4tjrS§uG"¦Û&3üY!cñ¡ú© ¾þú8¾ì©`ïöètn0‚?»ëˆ(Âm;Ó} ¼¢’Â_rô0ÄœqâSñH3r]¹â3ãê'<½[_yÅg傆*³}"˜äÌúúÈ ¸OBá0b* [TÀô-GÊðÝoÞo´¯\Ή_©pÊÞ·–W8mzçŽå•Ëç*S¨–O›’wV=i–K^¾ÑȾy-·ñÍkäW”(7J•ââ‹zµðW©á\¯Ò,ç½üÑ‘[qí¥Ýj¹ÜôÊÕbé~Ônuñµ[Η¼Fû((»êÍ¥õz ¿|´øy­T/4KÞ×£³Å§Çµüé7·POZýZ-|«¯i´–omø²R­,5WoTkêӯͺwT,¬{UÏ7òë:ù—»ø¦ì;s¦ì)ŸÃò¼@"€wí(_(­ÒrM%”–gä• ÍˆÆk–ŽÜøÐZ­66PóBX‹}lÖ¿¾ E+Ûlœ–=äáµj‘o6Ö)ÅBµ…×ÓxZ€ßkëU;Y¡ÉåæIÃMغNN5wmW°g¬ãÊKž=Ó¨ÍL­êî† n­Ö\Òä <_üdwRªå¡Îúz®Õ'"l}J ÿ¥†õæ¸õ¥4€¨F©9iZ­ŸæOkÞÙI¾²Bqð:–¸Ë\56±ûxi Kg.Œ:ÇneÛð)½ ³^"{*¾ýbªö.e_yʶÞ7tíä,DwÉ¡­Œ&Øiú¶NCÂu.˜©û ›”K‰¥4´Ô_$#í´ZŸ£dpÞÀ1ïË4k”ä€;+ §@/AÖh—ÒƒÞ·bÓk‚Þçfcß ±¾ÄŸ&&Én€ÑÄ¿Ȥ_‚ê\¹„¼·ÂÉ4¼ý98雳C! “t|iB˜‰(6þâ8Ü– , ‘iÂí˜QÄ $C¼6œDÛàäO‹ÕèP½Š’!”;>1PœF}¢‰N-2F%Ä Ç;ý…œ–éŠóBîOqº­R`R§àì–9dSÇwÇD*`éZOö| R­í'”ÃsÛF˒ɺb”@1•I÷R¿Â5ï®Þ¨ÛvÑȘYš—QŸ—¾^Z¶w’‰$^ûŽ’J:£ÑdÃÿRÙ„â_àgš ¨ŸägÜÊÈ›6]¥_R&Ù1Òðƒqæ@ 2¤‘ibCÒò‘Oä"ÃhÒ‰³B’¯Mê8Œù6 e0’¥Ú`–Z&µŒÅ¯ÑFI 08˜Ô˜Ù·ƒNü, ⲫröfìrˆ@Œø&$§œXN€L¢ÀÁ¶¯¨$Œ¶a^ZœÞ?ú¼»ÙøË…¼ƒèGµU>vSYâVõD€ú´ŽçadÌð¼Úå:#ö¬ëD À… aHŽ`Øp‚Œ8±G„&¥/:Ï ¿Ò…­³ËÚŽüsF6Œ{›Ì p[Cƒñ DÈÁ4cVÌ‹i^Tœ/· ø„_ÖÈzšš·F…4MêK!´I0êÛÔ”;(CÇzIGIKkäëØ6ò¥R y™zf›Cß°¤O}‹;Ò0qìppþmã5D¼CÆW éšHøÂ¢ÒâHÂôú>˜Ï;4 ÄZ”n’÷³(ߨû¥+'ã!´?0Æ–!Ó ¡$ 90*M2B‹H˯$à¸ÙµcØbV:ñ¾ Ÿ‰xpßöiàŽaQ˜—¨)‰ä 9¯"á„ø×½¶cÁ)†¨OI`:Ôç’:Äg¡ÄÂ"‹òfF.Ê7éÿ&î;áxoa¾ ,Zà@PÆPhK0L’lÛkp(j2Í @ùfã›—ÆÜnÕ…gýdÅ4„A‚ƒR”pašœYm¡WR丧ë¦*P¿_ïã\Y˜ï°9I‹ZX8¡WTf -MƒØAP«®K3BÌ¥Mú2 ¥Îy‰„iÓÀ¦†ãPa&ƒIÈÇ`NÆåëðrÃ]?õ§S…]°l0¥9HÙ/nr°•lÅ)Á¦¾†Úï„N!mQ YÀm˳køÈ„Ißr ›aÄÍ`QÚK~É…MâöùÐ÷maõ L—àŠÙ`_(gÂ-ʸnȤêŽç×`Õ´Õ_àÔ¢À_v"D\²À`bJ`¬I?À¦–EZ!0óuTvÖu†Œ 4VÞÇj|ù I@)|ijû€#O;±û65¸¦z÷È …=ãÀ&Y*cwxGd ó†XVÓP‹…ÌaÑÌ(‰ ×uÜj*W:•°_öBÜ ðŒ0&0OfÛˆšÄATmÁüu„ôcýäd­èÁ‡ŠOFû"¼GD‰ ?HÔŽ“¾Ð¦ýÿ~ERБpè0øˆNÁ¼éuLø+4à 40v¢“ô” UùŸÜ¢ª˜íWRõl3­ê.z~œgíMná+µµž÷Æø(ÅK1¢xgT7šøÐ®z¨2®÷GW|- Ånû~lØ” FÞíÆÂcü‘ \©Šñ7Û|ýó»QC ¡¢?¨vT=Ã0lx¨’Å•>.ÓEËŽyÓXŠžßEá°Y‘Û«ÇLÝ©Z,4-2’—ÊŒL÷@ ‹¶ ET#öeZ±ÃûRSÑ”ƒ/^ÏÞtn益ìmD4'ÄÀ;kÝ»…üö)oº _Ãhïsªœ÷icIâÇÇqLp)¢„‰}¡êI¶;m)5”wµfïõ'*¢ê?ZÒÏ®ÔÂÁP‹öå EFÎf»í¬ã þ˜”º- ¡«ÈÎItP8ËŒî[| Xª‚¯±¨€—~bÓ“;h´‰?é—ÞŠA~×ôÒ¾ÒŸÚ)ê â˜çl{e-ÞO–vke¼§1ùÈ…aØØ×©%NÁëÔ}˜Õâ‚-l†à]¼“©'A+“I⩦0'jÓÞÞo†âh äµ¶Sƒ3IÓÞcr)t?”ºÂ4 ›#†Ÿn_zšAµm_zÚ:~ƒ}éø ö¥§ÛržFûÞ~·k**Þh·kº¶SìvM¿g4¡§<Ú»W9–ͳÃàÞ>vÞ5™ì*cÖn¿¶Zб‰n1[ ÄD÷¥Éu„>2y`8´Ô?Ɖ.i4@3rˆ£5<Ü›¼ó]æi¹)Oƒ$¶ñùnpM!ò­7¸¦¬#;Ñå Ù«š×_Çéê©ì\–÷<—EÍŒ[ÏeIŠ|Àë ~ ð·ÛQ'ïyÔú žTe“nvÅÓ3@‡sÔÜíŠ'ËJ-¬K¤îmD¶ÐáÎB“ ÆÕIÌTK]ðSbJÉhÓƒâ·bâïŠñ®—«bçÓâ4"ߊÓÖ‘â ¿ (v$!Д ZâÜTz‘A€¹Ši‚cFŽÏ­À6¡%3ÓL£ L0ýÞw«f7¦î §-òK·Íý”øÞ£ç—!%Wm¾ùÑœí8»^.Á:„X!úLM[ç<@:·CÄ% ……¤–ºà'‚õ(GðJX?ãá§—¿wXOv…õŸ0ÖFä[O/OYGë3XŸÁú Ög°>ƒõot]Pæ¬t¬œmî–d" Ì5†mé‚DÎÀ¦ÛTg–e#µ×ÉÂqîfª‚Ÿ*žÎmâazàýVLüÝ·ù?¼Óˆ|ðN[G¼3àï xgÀ;Þð~Oàíä°±ÛQu²°ƒ°2â&ØtÝgA¨[Ô‘ m˜nC-uÁÏ•ÈBÌÑ&îÈòFLüÝ·ý?¼Óˆ|k"KÊ:2àï xgÀ;Þð΀÷{o–³èno˜<æ¡Ð9åêî?Й,Ý'–Á0·Çñ© ~2à½2ÕdÆÃôÀû­˜ø»o¶#ð¶,óÓï4"ß¼ÓÖ‘ïßxǧAeÈ;CÞ¯ƒ¼—È{ï'C‹¥“̨ðƒ&GÇv9d9ø/^@`î) ¹ä0Áè@¸åwz9_8ìñÀ›ÖòCdyhŠCÄ ‘Jæ'| ?!ÒÍÝ|…Uz™œ¢¿÷N>Ļߗþá}ó×ÒågyñQ²|l¶”íŸfÊ;[2åYŽí˜)Â8tÆ_§¦¡rÀH`šePÙñÞÍT?•ûBV¯Ìx¸Ã8oÄÄÌ}ùüîK‘os_ÒÖ‘¹/™û’¹/™û’¹/™û’¹/™û²‹û‚›»ùÂbØR7XûÈŠNø•:Ã’é&ç¦é!ࢥ.ø¹|sÕå™s¦÷ÞŠ‰¿¹ï€w£b²7·çÍÓ½ÏàHZ ù_÷| zIuÞmw¦,§t4Êù ¿Z‹mLUšj÷…¶ÿWók©P­¹Ç_®=yð4™tr0­ÀDÕé™êÇÍÄ—ñÄ¢ Mïk³yPŽ®4˜©ÔÕír2ÒáÿC˜'ÕÅšÐIÝÐീ ®ÚžûøµÙ:û íUº¼õpç·ÎŒ‹óïa›|EðìN´LøíþÕÆg·þ1_œ×ºA—]ßÎl·ÿ½`†‚^¥ë^JñëUµÕ|*7nÆÇÍûrÇ0Ú­³›“Ö÷ÞE«~¼8‡¾œ¿¾¨»Ì…zÚn·üT2OZµn¹èŽ+ÇGÝ‹ê\ôήOZå{ •‹âªÜ¨ô.:îÈí±GÞ¡8î*Ð/t¯ú\n¸Z¼y¬6nËÅ2®t¾3·øƒÎéÌ?œ\ç/çåÚ(*wy{}ÑêŽ|ŒºâøìñWîÅù¨ôΞ|röØÆMÅ£|\2/å‡jÝ\4ò'ÚÕEëǸݻè¶Ñu¹ØžæI»Qzºèµ;'…ïwA¯Û?'µ[àÁ“8>Õç©\_šåëø—ª\·;a=Oàï9OëôÞ-ÎʽQ¹!{àÛzÙ?•>ìK ²ÎSRù@<-7~ëõ4 HOàÙZùWÕ³#sØ¢å§$ÿë^/ÿKüäÿXYS/äËÿòË—=íßš²¯Õt×ë'^¡TkxE·öå@Žƒƒ¹i¼ÃñHÙz,«Ð®û“¾èÊÈ€Žƒ®>ì•ÛÐÑ,Îú̦Ϋ|~®ÁŒ~ÛQ—jßþ–{ûÚ ¯)ˆ£í\>œsø|l_S Ò zb;LY/¦øâ@õ_b8›Àʺ¨÷:¬ÐIAyÎ œ¨ó`”6<£ýã}´}…UöµûÎÀçqÐs%šQqËãvn¹(EH],S7*…öGâ5k8À<‰&GÆú7åØŸ+›  ;Ö4¡b·PW÷Óþˆ½JpÍþÔF“ÈGèø÷5µÛiØø’{ŠMÿXâàB[ÝG- Y¬hÓGÓÍXMssõœÅá®Ó©†s!¼žä£ `]m0ù/{çúÜÆ$ðïûW°t÷힀W¾”ËV²®ÚØ®µ½µµ[.…ŠôrH'¹+ÿï _z )ŒLR"Õɇ(Ò fºô¯»ÑÀLcœÕë¼7Qß©ïcÄæLìÇÁ(þþO·O¯^]|øÐ[͉4AbE¹&þj<õz wÿt³ÝïÔóÇß‘% tÂY£²bÔ•½¼ƒv¿³)'UBÎçÁc?…¶Uú€WãN“µLyË-ho«#Éÿtñ`&&Ê:\uH—t…„´\!aŒß» qw åj0\Í®®/ÄyÙpùýîu|ë’Lƒò°Ja´ Ì„fUpFaí ÇzN¤¢/DHÇ …ÂSªu)•“¢ ^Þ+Í s_¥xðDi\†¸~Á<ÑåCˆ*KŸ¯¹¤»ñ¤Zf–ßn-)÷–ëiÊ8âÊH«8õ%Xq/”(ëĬ™¹Á´¿¼‹„+Â$2e¼•‡¢D¥‘y[ˆ¢â£ÒçË“8t/ÿXÝè\tó(¨¬?Ë­BJâQa±q‚YjÜ—Yef)ýñr8.Ͱ¿”n)Ò*9S›ê‹×¯o¥wo§S¬þó\­]O(×IÞ‡¿Â÷<•S®3ëOe7dXYÿqãù g !Oô!¶Â aˆg‘&F!ë|É™ÄÔˆòîb{FœD:NËx—ÂHim‘t{§llSœòÊÕÚ¾†PËç·B„´B¥+£m&*ŽâÒ¦ñ,Òw_âxö‚:xð.ÜBFhëJ%QX´B1TCÚKŠ$óØHRÄù“¶B™ZÛ›j÷üvCˆ·B–r®­-á6g,ñqX§×K&ÈÝ!$iÉ”åÙÀËt2¹F¥/2F§ÁŽ!ú”‡P®Öö5„Z>¿Åâ=²ÙçÃ.‹¤`Eo VfÓÁ°ª5Ò¯œGý&¾TßL|?þﮦ~ˆ®wmNüt6‰Òt2ó14­&N•Xìª:6Ý;‹ý°__ó!ëW:_¿]jÕ()-ôÑ„š—cåšìÐTÕ ¢>“þpµM28¿?àäRB¼ylñæÝÙÒu.(t) ®¡)ïph¯C(vd^Ǽ(JVÄá§ìlÜÎý¶†nqû ÷öâßß}œ;ÎÓ´Ej¸˜·<÷upñÏÛÂÙÕà2“³M^ÿüï×ï.¶ -¢ˆÑØÝØÚE6nírõX˜7vû® ÂîÆ+g¤t‚#é‚D¼ E[,×Ê2™‰97<ß-©Ý#J*µµ:X¼ÁQÒ4& ±E ”LA(+Ójàw÷ªsnˆ”kd ˆ[ ç¸AŠËXa0aÃÉi àæ¥›·Ý»ËM)1ÔÄjA”l«\!¼¿xûúÍÛŸŽÉ£kþœ¬ù®]ø<ó»Ͻõ“o:ìwÝš.¼™MÇýédpyYV²ÜQ<ò¿Oû“YìöÁõ=ù×ö|/›šÉôÖU~äný&Œc^kþþÀAEWE§O5p( q<[*òÇRÊd*Rm¹€EËÝ,ZÆxeG·ã¢…3þ$]·woz®¸nàº=W×íl)†óvl?ŠLŒb_žíÏ£káÊm¹ý°íÒŸƒ;2Oªj›Èàá5xx´µ‡5ÎàáÚû±C|<ðñÀÇ|¼{|¼ìË‹³q:0Æ xEA™Ä´v™àGyÖËë¸/2ýX‚eµMàÇ~¿+$,õÑ0mçÕ ÄEe1†„—Et(Ge‰)b–ËèFçÇ1Ü:J&©³ÿ¯¯ÞýüóÅÛ}îÁÏÕÛ¾öà·|þ–=øõÂÜçCCýà; vDÀ,Å×[ pµMpÀÞ÷c¯`½9jìeM¦FÖÙ€lMd»[³Ë øð5,´+ÄÁÏjyÿòã«?•„°j›è§‰Ê8g“™®?~1ŸßéÓ_êOø¨?[ÿâ«Înt~û|@¾ +¯Ï‰¯×ʦ­‡ekÃíô‘Îǧ›ª ±iÁ Ħ;b§$ÀN`ç3b絺U`çv®V~ëéÿ[óñ$Qʺ² 'RBQšg€Ò (e€R@) P (ÍF)ïªBž6Jqc8 ‘Ú„R(”J¥€Òl”Š®.Š/>ÕÁ% tJ P (”J³Q*»XŠJQºPÚ€ÒP (”J¥Ù(U]RœzÙQc‚w%8 ´¥ P (”J¥Ù(Õ]ÎÔI£”ÊÆCV‚JPª¥€R@) Pš‹R†»‚ÒJiµMp@é]”2 (”J¥€Òl”’nq¤§þåo†ÑÕÁa­tJ  P (”J³QJ»’ë¯àmZ+] (m@)Ñ(”J¥ù(eݨ±ÓŽJyc‚7 ÐoB)Ñ(”J¥ù(]LN»‚—¦Í0kÁ¥ (…#¥€R@) 4¥ED͉o†Ñk¥Ip8ƒwJa_) P (”æ£Tv)9ñ/&ÕÁ!Á» ¥P (”J¥Ù(U]ª‹gøe˜µà€Ò” €R@) PšRÝeŠŸ8J›ŽhX (m@)Ñ(”J¥Ù(å¸Ëå©È« ‚ÃZé”r8¢P (”JóQJºB?Çï•Ö‚Ã÷J7¡Žh”J¥€Ò|”Òn!Õ3<8p-8 ´¥pD P (”棔u¥ÖÏ1*e]…a_é&” €R@) PšRÞÕüļ¼¥IpHðnB)Ñ(”J¥ù(-ºøÄËŽm:ƒ·ÊŽ6¡TJ¥€R@) 4¥²K vâ§5ÑP ›a6¡Žh”J¥€Ò|”ª.Ó§½¯”RUmPÚ€R8¢P (”JóQª»"† §½VÚtDC-8TðnB)Ñ(”J¥Ù(¸[prâ Þ¦²£µà€Ò»(pD P (”棔tå©G¥¸é#kµà•nB)Ñ(”J¥ù(¥]u꼤¨¶ (m@ië# PúŒPúáÓ«W¯/^LŸ LÅãÁt{¦s6 «ZßýúÇ,¯L|©/f2˜ag⧳ɨêL'3ߌ: w!é+f•SßU/ïÏFñö~}ÑCÄ©~¾~$!ªQ&­Nüà "›­ÁApÀAaëâ£;[¸úáZ¯×sèEv»q=x¥kX[žè¤”°'X8±!»hqŽ˜%çlМ*ç³L#.F sŒ¨ ³$x*mÕ[¯ÑÉͼ[´˜:<ýíjp™Hšþܨ•°[0Vç¹"­} ‡õ ,Ï\©ŽêÆ”9Ä) Á#O½£Ò3*Œ<±NËyÖòÑ×;íó¡]Š÷q–r2ÅÛ¼;ì4üþaí­¿ÈqÕëHœVÛD‡áû¡Áa8êH¼í¼Úâ/Ìœ[rÓ!L¿¦g‡Ñ§!ÛËqÈwiÈ#uþrññâ€ùh¥«m"ÛRðIÃŒ?¹”ò —ò Mbnužéhc)«m‚‰s´&&&<¾qEq,Æ¥ŸÞoçH4ÜTi«©BÂx=sÏ‘ÒA²”V—¶d˜›úãH¬ÌBj°2`eŽÚÊ´œon$Ë÷eâ;!+„ðL{ļ‰šc•2`Ä ®dÁ—îd_¸Kû559=E»ä|>“"â˜ôŒhä|ô2¹ñ•Á[dq|{, a¡ÎBÊ Ë–’µÈBîS};¶ƒGk{ò6éõ–9¤Ñ`?¸Ñ$Å^øÇSgùº¿¯ª‡Ë­ë—×m5ªÿ¹U9·ž²˜ÆhàR{¹;oeñößÑÆ-ûël‰, gJ`kmoÉ} ®^N asR‰‚Ó²(”•Þ:‡9WÆèƒÛß}MéÇ6»¼Kiev”’+IÃ¥0¡+ ±k(¥’:B:Ùîl)h6—5ž »V]¾Íݗͽ»ŒD»'Êçtù}Ö8·¬a=5‹ŸÅþ¿³ygq,Ÿ-–2ZJ Ëe¡…õ@[ š?);È¢XÖKÌÒÂÐÙËWßüí"ý.*ÅŒ¦ýù«È@yQР-¦\(©Ë £©=‘Ä™R¥f±åÅå¡”ÔLœtŠctib µá’ZSètù•Ÿš8gMøÛ¢`òM}·òŒÅGÉ8L”5Ø–:xæ­¥¦„ " ×Ô©Ò¶ŒzÀ¡pŠ&R«ƒ«ˆ²k:,°sZp £tò-bØŒ@%¶R•^˜©[+c·×‰Ò»ÝZ©ÊõËTçYïPWÉœ…¡ù:ž¯öKÝ%$-]™«ôU©tPýºøµÿò‹¿ò“Þ§nüÍ|Yü8ž .#3\­^‘nìÏq’Æÿ>˜~õÅÛª~Ò/¿õ'£ËžÇ¿ùZk'3öíÛºJµqqŒàœ­—К×ÏX}‰q.r¬òóçåSÆ8çZ F~úÛxòë¼w5þ_4œLêbÌnúœIzÞ»èâïÑ›÷zËjŸ0øÝ»›C?¿|Õ»2¶¿l%˜)zÌ÷„ëÓÃvÑ+&’®ªÞ¼ÿÊÓUg×S,swÕ <­Ê|Quw£·Ý³?ÏUûúÕ½4B£—é©?¿|ûéå_ê*«Éø2 ƒÅ]tÄËôÌW3šr0Lÿèÿo´ßé¾ô–utÝRßM_ýjlÆßÿêW â‹’èØà‡¿þ }úðSohf£ˆöëºDuqýÏÙÍû¦~r§Ííbë*A&½Üåd]Çy7/g–óÁ̆ӕ ’P>Æ‘gª_û«uøº†;ªõìæE_¯Ö—¤µ£¯þÖ_✜¬®I³~\¡8ƒýÈÅŽø:ή|Õ[ü7¾ô4¹4nUÉ6¶¿Öÿ̰òu)ye'ƒ/ÓùZˆ75—óZˆo‡]ä]΋VC´ýÚFPÞ#®±F¥%!èÈå¨fì "pÀMßgZ«.?pØ—îN=phù±' |tCN—ß8ä¶Ã)óôõkˆ rØMäÀïFà‹ïÌ?ç»iPܼ³ÑÕ^¿P““½ØK¹ÕËÆ§æeGæ¶—½ð3ñ“ù1 ’ø8ÃGñÁñÕ—Ù óUìÒyñâ¿W¦þ<ó¬cBl C§7tRƒ /Qt ÂZ¹úNÇ×.¤A‚ ‰xõq¨…œõªŒÿ¶pW³.|°«Ï1?”«OD㙈+Õå»úûÒÝ©»úEKWŸßANßçéç¶qŸ§ÿ_û‹™D_ÿŧ?"õäþ¤Öx££mÁÛñôÇñläjÌŽ]âW|ÏÚM®ª¹K{ö&½ÇÈúN–%²ãÙÐuFãi§ôYEWaÜ ŒJb¸àQÇ^ mJ‰•F™(_p¡“}ácWòHmãð¶yƒã K…V†XHéJ»ŠPVÖ;)6Cá–«ÊûRß³&ÆQ!§cïCnϱ’'gJ?v%ì*Ò®’G0F™‘iJ5â´P¨d´DVR)Š@¤Çój”¬ 5!ŸesI @w¯%ÕÑv6w_º/ýø+yrºü>kœÛ$äwj±ò9-=8!O¡ë‚+(å„üCò|Y§³5!_¸”‡í¢’‡†ž6=£žL%O–)ØÓêAÞ³«’‡¨äyü5ÕÕ-+y´seÉM‰ &qÍ©–Ø -07´4`ÕɾðQÓû¹Éšæï4$ÕÉvþtwêƒ:ýô~Nß7ä¶éýý†íÓûY–è ¤÷u4†íVƒ ï¢>Š‚ƒMG©Ø8:G\ë‰ĉy®$ëÂÇNïc¬¬Š#ÑàKÄÓé0%6ñ@rDp«I"FÑHŒ¤=ÞŽûRß³&ÆQ!§cïCnÏ1½Ÿ3¥;½¯»Š¶[UUÖ—(‡xIâ¼QªÒ£`hì*G 'æü³.|Ôô~¦Í•Í&]©.ßæîKw§nsuÛô~¡Îçtù}Ö8· HïïÔb7¤÷sZzpzŸsW’ûÜXrŸéû“ûúÀÉýb'É}Õ+lO‡'“ÜÏ2{Jîç=û˜’û¼Ç Hî?rr¿èÅùª©j6DXG¦ÞDKÒÁT”r4BÀw²/|Ôä~fØ€õÝ/;\W]‹°aOº;é°!©úô“û9=~oÔÙ$÷÷D´OîgY¢ÇNîljH¢1l·̘Ò1Â!ÑÝ–1œå£²` ±¢tž•–ÄÚɾð±“û¤t‚#é‚D¼ 1‚1ŒðZYætÃ1W'÷eµM{-j÷÷¤¾gMŒãªÝÏèØ{k÷3ÛxŽÉýœ)ý¨ÉýÚpHÑîðcâ ê™eÈé{<”i%ò¼$¶Ä¸”Áv²/|Ôä~¦Í- \mP]K/}_º;u›KZ×îáa:]~ïa:™m@r§»!¹ŸÓÒƒ“ûšJ3®d÷!»ÿ°ì>%÷d÷“Õ=pv_ï"»M¯ô="žLv?Ëì)»Ÿ÷ìãÊî3ÙýÇÏîÓ®Rí²ûG«=Dçˆ ©£ÅB˜ç†ó‚¹Nö…šÝÏÍÕVmS]‹=¿{ÒÝ©Ç ôô³û9=~ï–ßÌ6 »¿ß(¢}v?Ë=ì~b6=È'ýnf…vò9qIK¦lœ6ð2UVÅéáË€âxÚ:î ѵ¹o\Ì]‰ßõû~ -´|òü{@rå©}ïíëÆmçU£¼ÞàÜ¡_~Ⱦ?¹¤ëñ¤ZúÑéQÉfZúÿì]Yo#Çvþ+IJlñ-QHÁZq,ò]zÒ‰]LpÉÆîË-•>ã „KDºkØåCÅÚ}—Aƒã’iŽ"èCÄYÄÈ2Ð-Ò)#¬SÔ7(Øipæ’!P­ÚEºrÌ=í®s7Ó³Cã’-߇ƥÏè „ß±7—<éðæÞ”k­(cêô*„…qÂEe­2L¥ÔÂ*æ“W.XFl´&Y–b&(jÀõHÞ3ÚW¿g…0»aj…0{ç aBÞ¢D8OßàÓéî]„G*.{÷9•3°dûáîK„ÅP ÞÊsð2© FØYŒ¸’ YÀVd 1ë ¦›(‹vZ"\­ÙœÊʤí<‡cÑîÒ=qù%Â%;¾Ïq(}F_"|\?¢}‰p@‰°â¶Ý½“Vš¦ˆ°¥q‹-ÒL{Ä8aG™m4(ØùáGçC‘ê熂pê¥àŸhÀÍqÏÓ’™zm»{‰|W­1Ϋ»wÁÆîíî]øŒ«<¼³@¤»ŽïË¡2íº{+b8õš#$EðT‹#¹ð-XÁz£.Øíáe˜«”¨¶®åÉǢݥc®¼‚ø~É–ïCãÒgôñý7EìM‡w<éðø~ŽÎk,ï;€œM|ßÐWÅ÷ïÇ~ú¦~böøÅ;øù›Ä÷íç7BÎé%Xp¬Ó;‹Þ}^-@Hzç Ä÷ÕP7•Ðå§w ©!EâJ[d‚d Âbå ª©(,ØíéežÖ¼ÚEº§w‰v—î9¨+8½³`Ç÷žÞYøŒ>¾\?â€Ó;Kèâûjh¤<× 6uå´B.1‡¸£™¨(R,b«ˆ”$Ä ÷JV»–Þ3ôz„î[€\P ¹z» .8 "ÑÈhç×A cà•, hâ)†´Þ¤dޗܤ”jÇjÒòý-Z€°Â;j¢Á5 çÖ¤d'êFXž¼ä¾ÈAZ°ÿrö$[€”ÈC×ù]Œ9Ÿ ¥†¶Þ1³Åö³bt1gÔä@ÓøÁ… u†-@bð)HÏQÌŸ"sa"ÒTF¤ 5c¬S5Êèjת{”éQæRZ€”ˆD÷pÃÞÉ–9B‘q ‘Ïæ!#mŒG*DƒöAEQbª-Kï››„9}ñ¢Cˆ%rõv!ÄHáy ¤“[’»> ±ùg S+Üz±dŽ—B,¥Ú±Bˆ-ßß.„H: !rcÎ-„X²Y 2\íZr¯{Ëû"Bˆ%òнÙ-Œ<Ÿb¡¡¨v-¶‡˜bÎ<„x iüÎà"Å9vÆ;ÏcDAs¸¦9ÊðÖ[Œ‘e$©v­ºG™e.%„X"ÝÃâgBä’pM˜BÖ‡x’9«Š^Š”€»€³ê´…ªv-½Çœ>„؇[ÊÕV!R=‡Êx®‘ÈhTF Ö< -]!–Ìñ¢« ©v´*ÄvïoBIJ³¢!úìª v"‡å–DÚlɽì-ï˨B,‡®Ín3ÄœžO±ÐÐ&tcß÷¼XÖCL1B<Ð4~gp!ìCˆš‹Ä­÷KëwX ©By…Ê+#t´ÛyÕ}.tʘeÎ1„X"Ýà åíúZ+1 ï òiŽ–##CŽ$l”˜©8(ØIǼIU÷žûXÕEмÚE™ò¶Ç"Í¥·µ0-ÛZÐ&^yV}-J¶|__‹Ògô ñ¶ÊûÖ~wùbæsãàƒyß' ÒCxö³Ðaî ·¼ïîðò:ª;85qJL>3; ¬eî@"<Ò”Áÿ˜ucÌ6F£%)%h0± qCÒu¦È$‘|”êºelN åñ¶ÌX4%ÍÏÙ×”4ß`ø^Mû¼Ñó#Ü•ÛÂï÷OÏðᜮèÀ¦ýi­Ÿ¼7ÿ˜óT«/(ýkÓHïããtò7P§-¦ò÷I5zœ€êüÖÜ”s~Ðdú4Z4œñÞr¢á¡V¹·ãZççL'@°éMî˜luN_Ç`ÿÝÌ(6šÛ"·ñ!~­ÕýbÈã—o˜'w£9u—š©âí=°Qm4S– +CÆ0§¦ëá‹·¯uq}”]PpíòâÊøñ+Í:„Ž*?©ç<› \“Û®½èe8§Í…Á³>>øoKæþ†ó—Íú™‚76ÏŠÓ|fY~ÎRÐwšÆ¯ãlˆŽžï]mB³†s–âaœ³¬HðH‰D<‚E⢎(ŠH"·1 ç_#Íû’Ž9Ÿ´“ãñãhiÇ󅬇ÏÑ‚¿Òäc^æªPDX¥L87@×q*A(d`ˆyd²0ƒWžW7nó\-³‡Yï¢LT!%bÛDKdáÈsj=2(ig6†š1 øSRçdÑÖ0çL¸ª‡š òBÿÜ̈Ûqw`¯r~65%lÊñ6¥°é ŽRMGãjrW¿4Óè7yžæxÓ!†ÔŠ”M)¡Øº) ¡°nËã 61 )M<âÒd¨OˆhJ•á"‚ŠÇòž€>ŸÁæüéÎVóXÞÏ¿¾ˆåÅç§éä¡Ì½ÇŸ1­>•À¥÷“¯±ÁRؤì{%PÒ9`M7¥&–T-‹¬o,ïýãÃ;²·QbF|øóð€ Á%Á]Ñ­õ !Ãf®d?ÖƒgLûèI0^iã…¡œQÌgIǤ™‰?(‹I”Ì`àÀ­¼æ!8Àné‚Tìýƒgï/`›Ä6“‚Çt DíÏÌ* 1"òšŽÃÎr¥‘Iù•‘¸¤yr°õ  [»Õfhí›·–Ž—7ÕqDzÛÞ×9'd(x»ó”tÔÔᶪ>`‚!›»ýpÅö )Ô«AñÀWh”õcìŽÇó<ÔlÓ§15[žªt, v¦<^—"d—.Ø ç%:8çÂyÇùi P½íÒô;EÒ4RS#NÊŸ>J ‰hÎ.Ø!ÍÂ~ŸJ Õ¸ÚB@Öò,Í#Q𠨄BWˆ@mX»k¢C®ÛÙ@AÙÄ)è[‡V¨uÈ ÿ‹‚«è¹ã¬9‹¶h`‡43†«O%v0@›N ¨)ØÒ: Ï‚èáTB¡+„ V¼} ôvIR•‚$"0”´ŽˆP7À¤ ­(“"´›kÉŒ&L“­IRà?i¼3ÒÇXkA’d­Òà²SþŽIÒ’©\@’”bAÌE'I¹( ð‹IR6IŒ1 ‘°GÜ;ŒŒTH˜›ð $ǯ-IÒ–\Í•ÊqŸ$í(IÊ˲O¦8Iº—G6$IIØP«¡ÊþÇ8!Qä¹ ¥f¯aç-IÒ×€ý%I‰’'Ÿ$´„M/N’îgÓî’¤l(I»¢‚ å)!n%G V´¤`þ‚JHfP<°ë$i ìH’ƪ-Tí\¼c‘õT’¤%fÄ«’¤¬£$iÉ~\q’ô5¶#IZòص$é> þ.I*™40 ºSåÒ}ð‡5¥ ø‚4*yCdÓÙy5IZb†®%I‹¤c=IZtÛ;'Iù’ve7ÒF <¯‘U”#ðis“gPâŠK" _ÅO IZœ9>ˆ7µX°EŠâH<×ø EŠ¢€BWœ$-rŸ:ò!§ílZ ÃLSêtx¤9k`Óq ‘Ú¨8÷ƒâ'$-Q 9Iºñ[ß%[”i‰‚Wˆ@%ºâ$iQ<²s2-“¤BCYˆ åsÃx‰´`5¦`‰óÔÃBÅO!IZb Áª-l™$= ¯‚J(tÍIÒ¢TCÇ$rеaOˆ“ þ‘cÅVæro–?Ò•}‰Ó,Tù¦ûùkC„ñ´áµºÖm.±ª“ÖÓÉÓÄOî–­¬ê4öÔ>ÜÆÑýøaóïöåï9ÿGãÇÑã4¦ñú•yu㋥̀s¥hIéEŠV0盹Šž^jf¿OÍ(µ)¹½$l9ˆ‹²ç ¢¬«ÔL }ûÔÌ¡2Ó65vBS‹"ˆâ$÷ÔÌϘ0(E'g‡¥fJ‹/5£±µÉs„Ê “IÈr'‘2Âm‚–Ô uc”ª”Š×ë$o‘šaª$À3U‚Ú»É/bV›¤l H‰üÑ’"ŠÂ'Å ¶é[{j\tޱÎÒÕob4qþŒæ“Y)Rk`ñ8·UN%%¤³QÛèD÷ŒÆ¯žÑع3Z”Á)Ç4"ŒdDGWcP“šRB½bÎ }ŠŒvQz‘Ÿ'ýö®3$‡Ìð}S3l²ÓÊ¿÷A„CÁHp~r2Þ‚1f©ÕÒ:‘”k¼Ð¢'”š)‘ô¥ºÚEÈrþX”¼H~·G^B¡>5SÄâ]BáIM—òòbðr;‹ l'âƒA@À P2×ã§ì9§AñÀHÍìÓ¹à›lA!Ó¶{Á±¨w‘(tXj¦„rWœšÙZ·ˆÄ‡ «v_ð9-}TùL¡|à1¸$ÀB£¥ŒÒúÀ|“î,¸‘~´ÕØÿò4v¾ýv¬óëã‰Èàçÿúå¯âÖþô”Y»¤a“X¥ÅÇyG¢Ê["Í÷¬¶€™cç)–9A k0¥zvYBÐÓ:èþù^mKó''ŽWämñê…XlLQÔ—>äæ÷hÖ¦îDò÷É4|ÈîfþJ°Ñ´¯ÿ9/I]$%æyŠY*!‡>惒`Ð'|à†c£™CvL+eåÊ(uCÝ:Ø0›À(þñ8™l¼Øì­çÛç0^öÔûñÐ_ãüxÿß¿þû×ß?‹ø³ûûÿy[O}åîXÏð 9d¼v…ÇUõ¼ý@òÕ±35ð ²`ž8—IR‹#O„:žb’RZë %É­“¥¾wÞœýEJf:ù.±óžXã<è(‚££Dü?{WÚÜÈ‘\¿ûW è°±VQuú☕V![^Y×heÙZF]=ƒ‡¤rf$Åüwgu7€qUãæLI htweeåñª2Ÿ  àQ:âXìÞú®¶3H•àZã0ŒLÔ–'xUIÁ%îþúU¬AƒÎ¯µÇÆkEÀn]åˆô&(ÈV”5F‡ê! {oÁ76£ˆ×áö&un>Ž/qe¯}ì°Ó³FÇ êcª[•Ú+â5Uº‚Oõ•ãΔ hÚ´LnpM—ùFéÃ_×7¸K×Ùx¹5OE휢ñ=.¦ËnôÚb¨¡ÓÛÎÞ³–βAø@%¯pÀ䥨5•V0wLy ‡ó¹A4«~›!¬µKòó䵩%Šy£+ÏA{±±¾‚àžr¤1²‘ÅW¾‚@¦;ï­ j¹,™ëë›×v*$¢ÜŵU †;ÅAÇ­&¾ª´ÜÍL§g.›_0Uþ‘¶«áõ/õ‡³Q¼ªºy£!<~ýwµMžÞý:¾½ïQîâY3âmÐÊøzxó0C¨ïþïúüÐÆŸ®´oóm‹>M5—©mÑu|3h¿4_§nE#¢ød¦§Qú^ch¯.ÓŠƒi=oðÉóŸ/âýåôûÑFCyÇz°D.¬¢ý6Þ*Ê8g‰4 qgÒ^0¤„ –h yCÓ|1ëÂCo¼ 4j÷&F«$’ïÞö%’£¹·?f· f­U+´l¾a©u$dF(ý²¶wõR¿\jóo ép~—c¹¹ßÍ™ë² ¸j.ôµ]Ål‘ÅB„ÑqA 7Z:Æ8dhÚˆÊ ÍÌ†Š¶Bm·_s¾ýÖÞÅIc‡Î£m¡ ˜Ô±­ûg–»'¯ „U*"ARL9GƤ^.ÎFX‡Û¤YÚeÕ4\é”!£UâèÁn¹'yÑ_M¶ýû¯tÔ*;j÷‡;úéFÿÏ?ÝþÏ«Ÿ~ùûü9.µ ‡tLŒÒ-ˆ73&µ8¦¥+q¡Wš¨_ë’ˆ¤„Q–È<¸«‰­ˆD;(´Ù…؉¢.óP ü˲#*ûs" àZYŃ˜žÄsÕÈKІ#«¬A†:g¸Uôw}áá½úÈMð˜%Äô¥fß“8ž*ž'ú™oŠÞÂ~gÈ´zKÂBû=w*F§œ‚áÙ¦—ZGWAHܘŽfÆ‚§Iú¹È 5® ;ŠíÉâÖÃøxí»¿ë²O©Fj Š¢·ÆE-¸’³è¾KãßÁ ÅWß6'ñNeÈkGѲp^8IÅ•æ.pmvŒ°È <ØîÁÄ««x÷l|Öó$†»vÝáj®¶A`–öÆ}¢«ˆŽz/%§Z{27Ã_7aƉMñÚa¼Ûê`çfÃ<¾zõpŸb­6ÔÚÃ¸× ¥;n0̰êæîxL{ט0·V0ù§ÎQxê§Ý°&Ç.=iÓ˜l”­ý{ŠÒ7ŸM¿IRÿycì1ÝhÜzÙ+<ú~Á«LûH§/Ö)s÷ý~=éžžû¸ö›=- z©pº_.™¤ñ{®QØÚÖÔ9ùycÁ!Bûª)ƒh>4øîÁ]Çûñ§ooà½ïZk¿Hs…êw"$#2á0R4ZÄu¬ V!m)ö^ÕWMÏç¬ \Š­–l²µBÉö%•S/ŧTŠ#Û²×õ–b?ÿUÿòý†?|þãß>öæõ_мRlÑ£[| ¥ØSoWÇ]J±K)v)Å.¥Ø¥»”b—RìRŠ]J±K)v)Å.¥Ø¥û=*ÅÖRê^p$QiEsÙ„g/âu| ÎnzÁíËß@¨öêr2[íkŒ/Å)¨¬5¥~M!@ó?ªÑ[?Õ¾¶Ã+ë†WéÍ­¼|Ù%IVs_¶Þ¾æfâz¯xü ð\üÍÌ¡«$‡+ þ¼ýµÿm,«¦Ê/=¢Kè»_–?Áºt¾Ë®™#ó%ïJÌËð…Ò=}¹Âq\!޹EÜP…lå( DW)«µkúg]xp_Þ®¶½€j´D"¦§+ß“HŽèÊ1u¼zëŒóLnбkÒï3‚/ÆðïÇT÷+²šXãöezÇ“ª«ËðÒßN+¯†·—àéGMˆÍ·‰Þ}ô ¥Éˆ24éŒÚÕ½0x«t;Ø4õ‰Ë™R‚¸¨r‚)É+ÁJ»TйQì0ÖÖ¾¡CwåF6]MæãPâöææªãþg–@ãÈj?xg/_݄ž±ûÅ à ÅmÇx9Cbß®ñÇKüÌ^gò2½Jr™¤¸çî¾{1=K¯fîÉS–{öòìk‡´Þ6Å(iš56þãcÝÖüÔÉ8šj"Ž0²]¸Îpáz¡ Ç}ö»|v‹¾—Ë×°BdÅ5rš`Ĺ·È·u.‰aR²/<¸ËoBÚäòùƒƵDzÒYïK$Gtù˜6MÞÛ_oä£Û\ãrbi®«›¡Gä‘É ;$‚‹M%kðLˆ—’•5D™T™°;g{pçJ®wç9Zòºóvå.©¨ëxoÞE,C• ñ`r˜Têu»îtÝù‚#_¬9ëÕuè‹®¢?5ðû#—> Ósbù äA½zjÐïŒpƒ+fV•<‚h°9^!/™ƒ)…ˆl}áF ºÅJ›™†sVýÇ ¸M@yw9ÙÅ mèh•({ÔíI–GGÆF"'YÚÆñŠÝ;^†3òèœùxŽïÇñn¾ººì~~º·«­qîö<)6g< ôUƒ¬fÙç)±F7çW7¶ú/îš“ÎY?ûùÄ|È’.«1 †£›«úZ‰‚±Ý<ÜùXw[-S¥bjóŠ©?Λ›ä,Ït£ü‘>ÞïÛH¾³>üêû:Â?uÿê]¿®±nÂýzÀ-XÙD°çÍÖ|ú¼)Ø@³f¶ÿÎÇÕeç 7§/:ÝLÏI÷y´ 8ûNóÛ€égÍ>ày÷’ÇZ²W4{ƒóéf`çéK²ƒ±çÓŠñ7ó[‚Ó—™ßœ~×É]Ʋén Ne˜R‘ñæ©HãœçwþêÕ1IEV]õ(I õnZ=8^9ÎdÕÑ(éF cê\û¬Þ)¤ ¿â“eÒ‚ÚÓ©éÀÚÓièÛKfxö«)¸]j‚D×ñÔ0ÜÍü5áÛõŠp§‰ÿã¼F¸g®¯;BÆë0{k~ž’åóÊ=VœG8÷äÏóJ8ƒuO È힎¯^ê,½ÔKô÷·X秊¯cMÎ 7Ô䯍íÔÄ/²ê Aœó4ÂÙõâÌÜoâ´ê6Ž'kâ´‹«]õÐgAœF/; N;Ðw‹up¹µ]c¦g•¾‡†2œ£¡Œ.ÑPº†.Œ’…ýúócë ¤(@XI¦à`™£A•×Ìò*ˆŠ“Aö…Ç­ÆæŠV ¥G‹þ=IåÄ«±Yßjlpéû«ÆÎ‘m©Æ>Íj샵4îSÁ}ù\ØçæsûíåonFÏÙ—¿üø,§‚›õ¨àf;®àÞaÁ 3n—JíR©]*µK¥v©Ô.•Ú‡¬ÔÎñ´O½R{ã1–JíR©]*µK¥v©Ô~ڕڇݴ_‡¼mÊš°•ÅĨ5~@NT¤d¦æ ÔVHyEWðZxŠ ·Ö‹eÅÙ“U.9¤ÖJ$pÝ—Hž('*¡ð``:vGŠ:½çVEé}1bˆÖ6‡€sf»@À;`E5*0íe”ÂsÈ ¬ÓŒ§¶”T4lªi;¤E]°&ž /êZñœÕŽÉ Ìúm&b¨è½C•#q­#Ò²"p[ ‹QZ£XCã–uáÑxQÍ"ï©8ò}Ö¾äñ¤xQ;«r¼93×]7ÝèköÏÿöVVÿú ýÓ×ÿÂ^ì…µ¯kÚŠ5gR‹kÚŠUl¨rÔØy¥‰“ +¼V®Ò²Kv¢¨O€u­,ŽâA”ìçA œ “ÿáŽ)š\!¦9,"f¹1b}áÑxQñh•4z8=‰ã‰21yH^Ô™^Ô‹ZxQ /jáE-¼¨…µð¢^ÔçE…(œˆ~›1”r«H•Ê~ü‡+œ“)QaÃRa4Sƒì Å‹º`ÌÌ"3eÊ‚4]œ‰ûeAûš€÷2 Ú,×É‘ÜÌ‹zØÅsd^TX¢TÓ~=Ö$fÒ¤ æˆG‘“Á#)÷b4L÷ ûÂ#Á6„’Ñi°žýÕö$ŽÛd˜²™ئÀ6¶)°Mm lS`›ÛØæôaÆûå$é uðV!!,FÜ;†¬·YRç´ÍV|·7ã²cûè͸N—7êÍ8À\g©œçõmÎ8û¸ug\§±+»36ÆÆéšOã®^µ¹Ÿ×]s› ŒìHrl¥i°(8¥| H+ePªûb•žë¦WPÖ…Ç#¤Š,<DBúû’ÉS#”FÇ`Š–HfTl”˜#HæLk!\M ic*t7 ªD©Á¡%.p"¥îAµ@gX ÖWí•@2ãñO“@R2ŽÍ{D É2ا˜>IŽ/À&ôë†h9Ç•ÈqãPêtƒŒÁì–g*ª†—²/<$¹dÑng-‘žlRûÉ)Hæ™Ü]HN­ñÉœ‚Ì=HòcHæhR!\E YUŒYîl‹߬¦6 Ï ”7 9Øb‡…’¾{†@23²)’{"d&Ã…›,ÉŒôå ._\hÜ3Z‡ˆiÐ ¸î9ÕÈ1P¨Uië‰WÕ û£HŠ Âu?®%Ò³ǾDòÄ$§Vo Ç^–>I.ŽE ™¡%…@r ¤çS"±hpt¥"”Ká©Â ‹ Ð-”ûC d§O ÉI$gÙ’'æÕ¾0¸ßñ$©HeŠ!žøj°aD„àW9Ù@2cÕ/&Lti‹ø¤kQö<ï¼/Yž dV²´…ãøH’9óñ!HnººVHfúéÞ®¶C i U„(ÊZa¯¼B†°€°PTbNbäaž@2Ûê¿4æ $³~öóá}{ÿ$Ë!…§~HaJ”·~ö¢›ÛñÛHÀ¢Ìy•÷€B²Ù |Ÿ)$YUÓ=($sÜɆ+c …dŽ6ÎRæå®ÞB!y$ If²ôÒdSH®Õ‘E’áᆚ¼„Brÿ>QH²Ó§ä$GC9˦\¯¡ âdrÁHÏòpÆœWB"00ÕØhä<…„“Úšé(Ár}áq)$™YT1JM”=IåÄ)$óÀŽ.…¤fû£Ì‘miÒzš’ëþÚ‡BòG޾ú¯›¿ºïþò »ž_£ðË÷_¿È¡’M!9{íö’ûêî~ ÉþõÌ…€²PÊB@Y( å" ÌñÓO€rã1ÊB@Y( e! <6å!·íÉ…ìÙ­R]pEÍâä!féŠê´t‘µµÇ9Ž”f´J(=*²÷$•S‡#IO8ò÷ýÁ‘9²-päi‘¡ÂXœ€|Á$(™ùJ3)¿RVª…Mõú@‹L~ñå/îíëoÜoäíoñsñò³¯¿9uhCnÁe%©Å‘W Åàj*)¥µž@<ïbs‡ 7Áý¶‚ hX@Ãа€†4<$h˜ãŸ:h¸ñ hX@Ãа€†Ç ›q,7NrÕ:³ é· Ä$×ÄI”F“CÑšø7öÞ¿Œw—íí.o¯^ ¯/ÚóË£‹Wñþnè/ ÍN°D|M0¹T^ts] _<ÜÁìý?{WúÜ6Žåÿn¾x¦ª!“ xy+[«(J¢íøhKNSS,mM(QMJ²=»ý¿ïJ”u‘iËm;øÐ‹q<ïýÞ<íJLÓ4é¯ã4Ó&i4Œ‡,Ò´ˆM’ôž3£–æûÃñpêûû‡¸¹oÇeߎ‹¾¯õÞt¶ŒÝ~¤±dS¾jµå[M~ÈÇ­‰0ñ–vÍ Úå÷üÍA‡m¸ÞŸw@s&ÆXØŠù(ù ãwçýxõ®Û9?ûÐûøöø:püïÙ,9nÁ>>Ñðf8†ò_g ¥ˆå¡¥¡†ÆÚb»pšpåJßr2iÁ*I"”³@Kš½-Ìp­É täíål<æ]@‰,£Å+Î C?‡é1ÿþme þOƒk(::>ÒP¬áÿçÜ´t¬ñx~~6´eè¸åš-{Gƒúáèf…M,<ÝÝ5Ûœy~³<±Ç‡Ë,­”Ú4}Ð÷Œ4škG|ŽŠ»ŽKcÝ–«a¡ޱn’ßßÿë_#ïê¶–_ 7ðkaå×R~-å×R~-å×R~-å×R~-å×R~-å×R~-å×R~-å×Úã×Â-›Ì‘¦e ©‰,;6´5ð¼™ Ò&O³ü8bS:L8Å$ßE›úôPÄQtõú}â/‚Ö™ò}´n ‚ÖØùÁh¥XÕiLS6 *ÓŽ=~ªŽhhÆ(`v¤S™#ÄéòsŸ‹«…yd¯Ô~ _6Ê Jå¥åé§îéÕƒWËô“ þŸ”"ËÞjz£PWœôuáC}X²Y r¯ý<œˆ¡º?—yšÝû£~;¶ãÁ#>÷‰-žxeq–ó<Ãü^àå7åCËÀ•ïªEãŒ1?£#Ù€a;åCèÞ×J#°n3~Û1wî$)-¿ÏŠ87>Êåñ¼’6a~ƒã±E%“Ù2ÍÍÂN©;×ömA;~W´0fu/~í ËtÄÐ\¼˜³q”Š §íÓ÷ÂΘNRÀ÷¢"Ž}y럸4ü*ò; â…iÆÊ7Ó» ~qÇ ÖSñö•Å"&?Ï™0‘…IœÌòþg0 'ulØÂ®8žÂà„57Ÿ°…ÓL`滜ÎY”„Fñ0‘é¬èü®¨ã.¿G£;ñ¤ºlBX2é(B°S±ìoƒq:Ï£ò;?L‹º F0Fâx2dÉCP‚hŠdX¢ú|dä·£ðF¸åÒ|~[ “‰îL o»¬¬?g¢ù¬Ñdx=†²ü§ÓÛIÆb6 Yò{Þ\RN »‡£t.Þ~NPbDq‚æÜÄ(–·j_34 Aô= Š@ÑáÙhXìøÿNÂd4K¢ßùßI‰šGÓ,[кìò|$‡E¨$¿:~–OKÒD°’aa6]Px\|}wͦÁ\L@ÄŠÅ8Äq~ópà²ò– ZBob?k-ú.fPŽikÉ.†St>̦‹·aæ&욆÷r}ˆ†C9ÿf™$O±œ¢ 3® \Ù Ø2ÿ(Ïý+VQ0’ÍÙZ&aáwÉ¢ÉP4}‡AäÝ•ÿ†wýÃVˆa-û¡tÊÅ#AÎÉx(Z¸¡¨ø+LnegrV°ã,Êè¸×]áè£LônóÝ‹+)hR,øQ”Ë£)vBxƒB:)î²ߎ3XDå–Ê"à¦ò#Ao–M¦Åf ©ÜS‹E8ñ—´…™ú畸#‡::vuP.aþr qMÈ£fÀÝ 5Ä—ñìÄ—±Y|ÕUý꫔ߗørð3_«œ®” ÎSîïuÆ»dY%ÓݸWECɃK¹U² ÉK¶°àŸ’-ùÙrßKÎ&Ïq±`]%Ó\’-=à0K6PJÕ…T.¥ï’‡®‘‚IKÙ)Ù×¢±5ùW‘’{—œoÁg i²àþ+¸A²Ö…Èz nW`EUúWdm!‚–œW²ÒŠxznJ Q奤3® !)Ú*¢§D «’«"ð(gElJDµ:kòx!YW÷*—¯ Éó—"I"*)_V$­D91Y_­Hš5)(Ÿ´R®.ŽÄ*<´€YñW‰]$f[ŠÏôVÎúñõä¦0×2™ÂtSª6r˜Î °‰¨R•8²\D—]~¨Uð/ôÁꎛï¢H}Ø¡H¢ `/ß[gÊ÷ÀêÖ¡ `Ê«|°Ê«|°Êûü}° Pv¬Ùt˜ä‚¡ûâÏâ¨; oͧóådøcÐÈsÄÚl æq.nІcyØ0<‹h9¿Ù Ê5ÜýÙªóE™ožèÌñ²_â¼µán£gZÀu2[¦Ž¬v1ô€çŽÑp,žÀŽZ!Õj¬®Å8XñÆø+Ÿ†EFXàO¸=Ón¸E&¸_>à®3åûwÝ:àV€[n¸àV€û¹n˜*So–c7°í’Y¡I‰HÁ€õØ,,×µ‹¸¾Zÿr0*S€/# u×ÊwªAÞÝQJáÑU²m£™ˆ^]3ZØ{>¦´Ä;ÉŒK›ká TN ½¬eƒK„èD¼á•r7ù4Kþbœ¢°lh«en2¥Ímó'{ÍjuVÀ·™Ä`ñ»NèéÌÁž§c [çfä1êÙoŵò40ãÈõHŒIÈÒ&‘Z°g‹ŸÜ$öt»}sñJ`´O?û‹+ÿ@‹§§¿pÎÞ9?½¸tý/矯N»~{0hw>ù?÷ŸüAûã†Ý_ݳ÷ÕýóÎÝÑéùgW§m¿ýáCï¬7øuåãÞùéé•zþ¾û~\zçÕ×½ÓöÇ®?øõzpÚão*=í÷»xýQõóËn¿sÕõß}øR}úñ²}ñ©×éËVßw>õ·4zÙþyÇ—gçg+Íõç—üÓwW}ÿÃûζWýö ½m?öªo΀|_zJòœþ̇äÔôÎÝËíNwã$­ÖÔ5d8¢{ÝÎÕ%LÕýÐ+~A_ÏÏ;z³6YÕ1^õß­O 16¶9¸8õ o]í«Á¶EñSçüg¼½ø½µ^N±ÏVòéÕçAO’uÛ<]ö¶ûú6ª¬ÓìÁŠÚMÔ~§ßÛñq§wyyµ²’Ïàyõw»Óé~î^¶¡Îþvª]>»†ém/pÖÅ?òm½…8½þÊЩA÷½ßé^v´Ú¿h_\ú_>·Ï6,¼$½ÕnÚ»Èýqe#¾ï~éÁþ­ó±w¶oût׺Ùïš"Ì«ö¯Ù˜e‚ýs Ùxj lÛnÃóÀqƒ@G.£:"£ÈÅNŒL×  ÃSZO×(øH@ù1ó|Ùz¾‹PMÂÌC©çžç«¡ØÂØ8\ž¯:´Uy¾žgž/ð±ab“D!¶k:µ˜áN„1Ã…±ªüZnH´‹ Ïtt“ÓF2Ó’©¦æ³ì`þiü?Ùo§¿ŒngÙô¾^n0³An0óqsƒŽ1X{ÄÂñ€”¦IbÏu=+-·çÍIùœˆ©`*˜Ê¦r€©`*ØSæ«#i_z°o£Ê¦r€©`*˜Êö²s€=µ‰rgº…xxŠ´Dâšo¶%jÒÙ8Òʺþ÷¨0$ÙQˆA‰Pè(ðCsŒÈŽm@7¾ðYåå÷kжa8ÜJ„dSüë)Ó174ÏìË?Ù®}®çÏ&ðÕ ã&¹£Ñt?à[¼b!jw½/]a5šÐ.øòŸ74.ä…ú~$í ºò{šû“öÄ}ñ7[ñŠÒlêçܦ5œÞû2~pÙÑh\Úx;¼ž,Ze'ì®X—«}öòI1¿´Ôqûù\ÃE&7÷@mš”‹¢Ò¡²Hή¹86²¢Ë–åÚáöŒB§­´.ÃêxdÙ½ÏÏû7œ%•\{½x3œÌ‰ÏchXžûy˜Š>ËÎÀ;{Û»ˆåa6œ”&<áðÇÀ)ìǯ+®:«O„ÇåÖÌŠ¸÷œ%bßÞdÅ>?ô(´Ùxs9¢…5ì;Ьm®­÷Ñû·~hx~<ä^’7§í³«öç"š\‚¶k€d“ºWér zAsqD$wß±$:ïßA;OË`· ·Ù™xjšºzyº…1c¾)™‰(ö@8&1p!Qk|6W”ÔYšÞ"ÎÆHNƆY„EÇ×~TÞjx‰i¿¼+LêLù>áY·uTþO ²G•° ¥/O¾»ê}.Ž•¶‘ºÁ <ôįF2bS »•ò¡þ!öÄ× µ¡B…ºªÃ:ÎxQ/:“×êè Fô¿<àÈÏåetÄÿ®<;(³É ±Œ&òXa~K'òÏ4^ÇÜ®R[-˜q‹ÝÁ”úüÜW.Zº¹õ³ñõ M’ôVz|à oøIÖ7ÒN±9òÅú­roÚ®"Òr"MĤQàþyÞ»˜“râOìò‰‚~{¡ß$K¯9aå¤Céî/ÔþídÍÊU5µøQ6œ/ž}e÷å2‘·ØAEýË/èªÿñ$¡³1¿”rhµú~Ê2•Ë‹ó–%xWúƒþÉ”æ_ýÅIeyÃ¥t±TŠÍGËBÁl˜DëE&°>³E)±ÌsÄ c`2hž&³ËOä¿Ð)ÐÑ›ÂäÆö~¿ÊЧŠánÙqn¤+n‰zZHì´lÜ G„ÆSÐS=•yÖ°•0À¡L%ŒYåj|qxsVãëCâCÑñµCb§!$&Ø|q¸Î”ïƒÄuëPXAâdžđZØÆ.11@ÐØq"bXÔ‰B#c* °mÆ&³©E™Ù¶ÁŒÐ¦ J??(í((ýl tàû×Ãé ½+0½Ž7äc‘ð–BY‘e¦Ï‡¯ÁCÃÐuÉ´+ZŠööí-—ÔÖh uh†Ì7£ñ:7ôÃké7õŠ"QŒ‚ˆû*ù {ŠYÌÝP‘Å¢ÀaØÓj|q ^ßx%삌õAý¡èøÚA½ÛÔ¿@;w)ßêëÖ¡@½õ Ô+P¯@½õA}ýÀ ÿëÃçD7Zºá5 /±c#ÒMä7ÏG(F. ‰ÇrYØÅEbïZ_ìö¬õü8U26/9_5ìRëßì®3å{ÃKjÖ¡`·‚Ý v+Ø­`·‚Ý v?ì&-›4L<2¬zˆÛ0q†\-:ž‡=Y¦£kµ ¾,Ø[¶aä[ÈØ0ªûPt|í°°»Î”ïMLY³»ìV°[Án»ìV°û‰`·Ýr-ÒvÛç”Aºë8ˆGT§6Š_;ìnz`Ó¶È‹ƒÝu¦|ì®[‡‚ݯ v×®*Ü­p÷#ànnRZÇÝoš_8\LŒä£ðƒÈ:ÅZÓ[†®·ô–[A^½ @pòÞnqãòê;tÚhè—•ÄôİOLvâ’Ý:Ñ©œ¥<#ý@¬Êf:¦)sU½y"ÝaýøjUkàX´H„¾Ug0^›Î`éê\êâª8•Z¬c.ðGRñ®3©Ð¯å»Yp1áP•J`ãƒñÁµ;ß}³$ÙØ`ùß@@8$Õ™™•ù˪¬*ÇHðëù t¼‰Œé}†÷¢ãŸî3¸Ûù L×—óÒ°ü5Ÿ!m™Ïù ™Ïù ™Ïù ™Ïa~(¯ÐhÔvµ>‹.ˆMŒ,ÎÉIOcN•S÷~ÿ¦§4ºÛY‘³£ù2j>vg/̸åÈY•ë Ä}tÛGm]õü~Ú­«FAA³{5£‹cÍþí¿ÿrº*}Lñ¶¾ö~™ÁK´xn ´°%¸<‚åãMêy×j4P½¤y+;á÷µ0nJ1NÚºí,:ÏùÛÀ_•>2o‰ÁzåøÕw5}ÛOF¼y²ó|G{á¡;µ“âÀ9›‚ýÊiYs "*Z‹ h)C׿ãÛÏæ^©X­x‡ßóWþÊ?N§½|4ZtüUgÍÔ×S¡bb ¥aŒ¹ 4Fã+”`’+5›ðw*RßW4‘ŸM –S^ ïa¯yvºõUzþÙý­8;EçGa‹îaxwœYðìýl‘ÓqèN.Îk=Ùs»òǩ㠎z’¸Xö+=¯‹:峋~¹p]Ù/Oªû¥ûj¡jã×ãqãú¡Üÿ5©4®:Z¿zxÐ/6-¯s×ôèæ»È?Ã=IkWâ¼Ð9©{÷•Ç«6Êwåýò]¥Û²¼º,wÁs!ù)MËÅB’γ*qºbÿe?ÔÃÑÃÅ9ôåü¨{Q÷\¯{пè]]ìë¶]Þ—דÊþ5*? «Ü=º>n4Y«ßDÝ««‹î^¯Z÷Æ^ß}ðÏ‚08ì *¨u†ï¢>7$©î_?B›à§Eªõ#×ÛÿÅžÚY¸?î.“tUø¥ûuÓ½8ëÁ½àðôáœTî‚sPýÓGAOZ¤Ñá¢ßzhýÒmcåFÉ:nü²"ú6¼‡‹"ÂÕã^å°ÅZg­»‹Æuç¸xt+û½Á9­Ý ƒÃƒ‰,ê>—h¥{i•¡MRé^wÂz–»…'šÖÙ·Ÿ¤ë^Ój#J÷)x_m´Öò¾ºï}"Þ—xÿœ¦¬ò‰hZn€\­•ÓKö‰äôÞ­ç£ô™øomS@“OÄÿn‰¬çÿ5ýDü¨,Ž©%þ—£wÿ/¿ß1þÏÐöÕf†Àÿõúq»Xª5Úû^í{^MdþÉ4‚o.ád¬m½Ë˜Ò7ÅtôTd@'ÃaÏÇõʈmèx>¯ú̦>™{òDÆ·r×E.Êû7ü-ÎßôV;ߌáÀÐÇøF98{$Çi÷›¡ñc[öƒ×aÊj|‘Ÿá‹¼î¿+ñÕ`ÅÙx„Í:¬ÑIQ»ËœèO“OÆdø¬í»„|3ü±ñMc•oÆ]gÄÁÛ âIΕ­àO—²ßø€q;×Ã\t3MâÄ•ªÀø{â/ë+ÌÿÛHf£‰Åú¶›sÿ±² DZ_«BÏÕBYÉ<Ÿñ÷Ø¡¯ìÆx¹ÇÿkMé< _RO“é–(¸PWïÁHæ)VTŠs”Yéf,¦¹'ñœÏ»C»NfîA»¯üñ°®1œNÀÅÚ5N| ·æ=8k|ì àýß £Þ,Kõúî|Lè‚~T8QF$蹿-—ûÛBW—Ñ-è˜ÑÕÄâ|«Ê‘Ï,3Ëd1“ K™.ÆÂV€-ÉÔ ßeE^KÕ×Ó»¯O}@ÿ†Ó¸„@´ÛŽ^VÈ;¾ƒG®)‹)ÿqÌM=9âúT°€ð<4®3H_I0^CØ-M}/ʾñÏÊ% xNv½¹ÞýÈeŒ7-óôüñÄìƒNØQÁêRì] ƒºš•²jï9І¤.ÔÔßGÞþ0šrVÑÚU£—”™­­Îòê’O økË5>r¸#]¤⺈0åXÄ®#hà*ßµ¿‡ÛÒ4 ¸ËBÂĉÍ*-as¥Â_®ù¸Ñ¾r'þ¤gTv~œµ‹'Íö9·Ûåò¹ž’)VË'ÍF©}Z=n–KíB£Q(þhŸyíFápEŠÒy£TÙ_üP¯–í“¢×®4Ë…váàÀ«xÖRf¯Z.7ÛeÀÇðPkxÕÅÏ^¹pXj7Z'Ђ²§¿,´´^/‘—¯³×Jõb³ÔÞ;8]|{X+œüðŠõ¤Ö½jñG}M¥µÂÙ†œ•je©ºz£ZÓY÷šõöÁ~qݧz¡QX×ÉŸÞâ— ïÔ;˜‘§|/èó k¼J£T;(K+™´\R '³Êóæ•ŠÍ°¦Ý,xñ´µZmlhÍ f-ö±Yß{ɆWÖÙ8)·q›¬‹B³±N(~«gd}OŠð¼¶\M±ã’\n7¼„¬ëøTóÖv…´Ñ:ª¼¤Ù3‰ÚLÔz±îmÈ\ôjµæ’$WàýâsÀÝq©V€2ëë©Vks/”®NP)‘ŸzX¯!ŽW_êAÕ(íG~Ú†Zë'…“Zûô¸PY!8dI¼å®›È}¸4÷K§Œ:‡^åµáSzÑÌz‰îè)}©jä'³Ùìô5Î9x; ì‚]!&Bú°DÉ™é*›!6 qrgª„o”±qR­?!eðáÀ?¨4‹”4ï˜ËO4˜ÓÀ—®¸yw‘Péï{Qê-ïsÓ?‡²ï…Z_bP‹CÃñTt6™“—Àz[.¡ïW!eÚþ5H),ÛuBNdH%v•T\(‹RêZX¯ù“ïœû(°ê†!¶J}'¤€aöVo )ñkò/‹ÕQŠ!´W> b°8›ü‰”^kŒRþß,ij̖œ"~ög«Ð:ü%uøMêx!—:ˆ2Fm=e‰Y_õ´O¯ë'-sÓE “ÉÊb<1 ::€(îàÍŽn¥}Ò(’ëêÑÏýnÖìBÔÝ¥ÜKKö<Ñ!ñºwKÒ§ë—÷—Ó&-þR¦|Úž”qãö¼M³%Zð"Udׯû®à[a¤Á–E`ä([`AÕbý£HÕÄÁ In‹AS]ˆE™ëƒËÆ}æ8ÒvBÛb6ZÌp5Še€!àƒ-¢ÁͰ3˜< ~¸ìé„9¥8 °K…E¤ò™Om.±¥B,9qxOQJc£ü³8ª~o'²î— áÑCu>õ#XâZÍ„w欌çsÈÄ%OÅ.—‘g]'dÎkˆ¤|ÌðøBð~±OɃÐbìE'bð;]xU§¬íÈ?çÍ&>È©ty(Áa ‘ëËcN˜ l×µcZÌ¡â¹Æ'4ˆè²†×³ˆœ¸6(ËbBŠ; MË„Ã@L}Žerûm8Å*­á/w…I¥bòrë]Ç’‚„ÙJ0aû\!KZØ'Ü·ßAoÁâ-½Rp×Âl¦l+†(æ4Œ¦$œI­M¸›„û,ò7êþFîªédõ?1˜ÜBÔ C%A’PhSe[Á18®ví¶];{_4T6öCé G0)G6½Ä,E•ïbþ&Nÿ£×á6¨È@º˜ FÁ¬0á+Æ©pCE›.òw¹Èߤÿ›X<¾ë„“}Á‹;¡$2`JR×Å¡£|_І/Þ‚BQ•iΚí4–öUYxÖO—3ÂB¦ï€BŒù  é–å»¶tƾ Ç=]§ª@ü~¿OÂâ Û”³IÀCWTa/)ƒaìè%×%Si“¼Ì'QŸh‰ËaÒaˆs€0å‚,€€ ðÕÛÐòiöv½êç©DaEl'%¨4޵ýò-l%b€­|F‰Å÷û-¦ŸSp[`¦\èØ6˜]$°JßæÈq ö-¹Èí¥¿¤Â&v $Ài[С‚‚ºÌûÂ|7¡Í\6l1pÓÜ· Õ¬Öß Ô"Ã_v"Ä~ȃI¡«„$Ë¢ìˆù6";ïÆ:CFq+/ˆ_‚4‘Œ«@([ê <<Ímw‘Õàš}@n´Èì96ñZê@ÝÑ-]à5è ¡/®Véå ƒNr#Í(‰â·àu\k*:³_öB!Ü ðŒ8¾Ò¡®ã`fQŽY¨‹øoÃì¤ë•“½©ÿüè)Ê×F#Ú ¢ˆâþò\¢q0œcVÖÿ~‹'’ì@p@SÀ@4È.S¦PìÐvtèÉÍU~û!:÷|§R´2ûЉÕü ßÄÁÖíé äÒ; à}2…ÈK–fˆâ=QѬÑT@½ú¥»þ6¾òGÑòAì¾Kæ¶hÊ¿†ãöÍÆÄCœIO[邆£I{¾÷ú'zQEICƒÁlî@×£Ë V£]1®år¹MÑ|ùnB±öl¦NÏŸßF“aó$7W@m½k(¡îSƒfIÆêR›“ÙöHaYܶ ‰žÏˆ}Ú…Ú_lðh_i•4£à‹Ïó/›[ÖNö µÇrµ9i |³×}[rŸÑ¦G qFý@><ÑP¾Ï*K¢‡Úþ$ž|¶Ñ‰Øºœd£Ó+©Fê¶£WíÛƒ©žPÑõo#égOápdÄ»bÈÒœc[Ûm¨v(vBÎÍоÉ|®Çš-M¦á(ìpÁã ‘T ßhU,¯*ü…mO:f­:`)"Ñ–,½>ýfé¥í¤[o¥ !‡2{¾­²o&K»¥2Þ˘da¥a2;À&ßÓØÿBꎋá[¿Å“`–é4î)ìˆÞ±÷ï[}a$Zþx³ ÂûmSÓ’ZôôqM\¡)éRDø×»ì"Íxzu'zÊ2þ€èäv¢§ÜdžBú>`«kšV¼×V×Tu§Øêš~Ãh„BOühWìN­X(?ÜòæUX*ï|ðV<–Ch»£­@¸ ê¹É]¨%lnú!C&G ^¸B+g#uÂÏsŒK !0PŽP{¼‰Œé‘É{Ññ?ÆÓ-~¤_ð¦¨4,Íx¦-#;Æå7PÙ›ZØßBéŸê¦¨ì4–õ¨Ï@ýÛß”Áÿ•ðŸç8Þ.¼„Û`>qà›®Ð3s ÄMßg€N&–eaâ„ñ˜©~=ØÍÇkȸå-AïEÇ?vóÿ؆å¯Áî´ed°;ƒÝìÎ`w»3ØÁîÝåÀo» Uh:Êá&ýi %¸IDÛ‘¶°„‘:áWƒÝáñ2nÕý^tüÓa·û»Ó°ü5ضŒ vg°;ƒÝìÎ`w»3ØýA°ç8Ýn¶Ûv¥˜J8Êd,°LŽm F D ú0ž88"UÂ/9îºãMdL»ß‹Ž8ì&[|}9؆å¯Áî´ed°ûƒÝñùOîÎp÷›àn‚^âîíO>‹“èQx`I™‘¬¡F(‡rlùÞûÝÙ‚ÑÑoËßÌr¡¸Û÷e{VHèïb{—ª]îb±ëã„™ð‰üƒH*·óVIdrhþÎù~Aú§÷û­ùy$|¬¼6ø³ØxgslО;Ò2™â–éS£;$ä!upÃíT ¿ÜjƒÆ›È¸ÅjÁ;Ñ1s[¾¾Û’†å¯®¤,#s[2·%s[2·%s[2·%s[2·åu·…äÀ¨oå3 D¥-„2}.A}b™\YȤ˜*.(G;Fê„_Íg`Øo"czŸá½èø§û d;Ÿ€éúr>C–¿æ3¤-#ó2Ÿ!ó2Ÿ!ó2Ÿ!ó"ÌåÚ®Ög rš(''=9UNÝûý›žÒèngEÎŽæË@ªùؽ0ã–#¾*׈ûè¶3ŽÚºêù=Y[WŒ‚‚f÷ûDX™!šv{*V¥)ÞÖ÷bÝ/3x‰Ï ”¶—G°|¼É@=/ðZª—4oe'ü¾ÆM)†ÃI;P·Bçá9ø«ÒGæ-1X¯õán¢¦oûɈ7Ov¾‚ïhÑ'§çΟ@‡Fí¤8pΦ`¿rZ€A㈈ŠVÀbƒZÊеùƒÀøö³¹W*V+Þá÷üÕ°¯òÓi/Ÿ–Õ@3õÃõT¨X§Ci˜c®ÑøÊ%¥ïcWÓ± G "õ½™ÐIðÙ”`9åÕÐØñöšg§{P_¥çŸÝߊ³Stq~¶è†w·Á™ÏÞÏ9½‡îäâ¼Ö“=·+œ:Þà¨'‰‹e¿Òóº¨S>óP«Ñ¼¯tË“ÊY¥Óª#TÝ?í7®:‡­I‹ü²ÊÝÂCµQ¾+w/±×¹ëzts]äŸáž¤µ+q^èœÔ½ûÊc‹Eéö=TºÍGo€.ËÝ_ð\H~JÓr±¤ó¬Êcœ®ØÙõpôpq}9?ê^Ô=×ët*‡%\n´§ÝV¿4©ì_â‹:b­~­|V¹†2¡×å}ïÿÙ;×ç´•,Ÿ¿B목Ü[{…ÕR땪Ô]_›8ΜØÎÞIQz´°l X$ Îlþ÷9Ýj °aúCb­~œ~œß9:ÝÂÍó“ä$¶ï¯~àG ƒ¦rù Y›/<õôˆ¦;P7—¨qÿÞ>9ú„Çõ<}¸9hótÐvOc醽›«¯Qâª(ò¿ÜS›Cÿ,ñ—®öåþRýÌäpysvݼ¨«{]ªï¯?\|ÂͯŸÓÓã÷·W!º¹‚<¡ŽzãÈõèsøáðýGoÚYdðÃ?~›z‡´Íu­yÓ¦é†Í£µyуó¨ËÁX¦çxxrÄÓÝÜBXºÑ÷§—3ûþô¨ñ‚ú¾~_êû2mÞ¼™6.>)³Ç)­ï‹§ ƒöìþ¿8yIý¯Ï™Szóâõÿ ô×Ìþ‡ùÿrúÿ¾YžSýOÛTÏú¿ýæÍžôÿÕ¯–d>ŸŸhÖÏ.ZG'goöIêíU#Ø`¦ Õõ.hV_öÙtüˆ0šv»‘†ëµ”éФð«NéÔq–ÓoËUleßé…ôÙC@o²÷Jêv$Š8Ò+ÍcO­YZ ©ö+‰òcË‹ýÇ1¥š/ös¾Ø§í§°¢)Ö‚þ1Ð̆im<< ¿;Ôëc>ÂßoÅÄIÀºRw‚‰õZú耼i߃±æ;Ða®ÿM’Î?ÖÏÏ_s‚Nè!hWŸÄÝ”Hl ×þ6™ï/ꬸým¡a­BX¸¦ ÅŸèÈkyÃ[µˆ£íSƒ¬w}ý9þÈÞpû&÷Í+0mÔd^c{î"¯í1IåSš8ì}$†±„jx£J–|Å–¥è>Øxø(%;a<ˆËHPM©H猦›ÿh¦BvOxZáØV ùRͳß±Ûw°¨#ÓRßè-0ˆªÚ¶kZ¾©ˆè!–­9š¿ñ§+ž=•)Xù£”;ÃàžJšéqb·ŒÝüíÖÅ/~˜° -XÓ“²¯¢¸•3èwİŠöïá¢i˜öäÅVì¶2ó…èH-CËã˜Ã¨=‘å¿åÞx«|¡œR™*¶O{†æPS&oá×ñø:+7¿®ÔŠúä/¿5SQaàÉ® K&>YÈ’ƒ@ulGs±¯Z™ xf_(¢/VÓŽbÚ®aY²f¶Œ=K‘O d—¾â_sMLŸlÒ—¦Ù5Ã0wOkãªkÖXKhíj­­-}„Š-Ô¶PÛBm?—ÚféLmåÆyÑÀ'¥ç6<ÁÒHÕ5CQÍR!¡ø/E_dQüj)Ø€_)‡%·NFrðË`vÞÀ´X"‚„ßøàÁ¿ž Q úX“-„@ÛðÉVU_Ö-—àÀr…Ø‚‡^­sO„1íÒ _,öbÓ išËm}j[0Hd¤z°:º.»®kÈŠlË#¦¡8HZ8á³üvyg‘ìû0(ÂH¢Hf2O^‹Gö®K`;Ù»,øjØD[Ù»H—?Ù»h"²w™_‰Ù¥dj/§)ŸÇ5• SÊ<üTo|žúih‰E¡ÿò£°Çt“ 1¬RU{™kµÐ+GÞ:¦aùéÉî[ Àˆ)ƒ¡ȆièºèØv³ö.'WÍ^T— ¨@«1rѾ€žr¢bÉ[ƒ¤À¨1Žñ‹VJ÷•“}Bˆb^€¢ÙùEŽhô*­ŒÛ> ¼_ºNÎaýA‡nÔoÝÅ9`°ûx dDZ4Ž ÄÔh&@e`w™\¾wM%5²Œ–ÁdÇ ?z©þñòP>ëÆD¾c?Ü‘ŽÏâˆ÷Ù‘Ý^8ážeä‘(*ð†rHš ÏëöIþKz röÙ7šL`4§— X–éMI¿¨_6ŠÜ˜Ïþt{^'Íní…¬è‘ *?«.ÿë˜S!€±Ü¢“‡µ?fâìuBVµ#gŸ¼hÈ+“l9îû}§“µk”íŠp«]/ ³W”É$ð±Ÿð­Éf‚w-{N/‹ ³{;}Dù”êû°šò›˜¼I¿—f“Ésøœ*a¯5–-ôÔ÷ŸÌˆ^ΛñˆúB/N}¡jõe©¾iÐȪ£Ó3–‰/Ûam°bfZUê í®úB;£¾&Wº\'+O>¿.¼ã%+_t+§à¤jÈ×à\oåK_óe¡X?ùJ4^ÏÆóž¯l|ᙡ.Š¥+_4'$_–¦V˜ñ2kÕB+çÚw¼†N(‘l‘溓/_Eaô_IkðÕ;_ùŠu6Ó&Åê?Á |i-TÖ”ºÀвö/éÚLW^¾”–ÔÓ4Ü䢼––H§SVB\µ•TON “š«¤ð Ê™P›œ¨ÆJç>.4ëäÂ=¹Êw&臯ùc•ĉŠë— MË)gšÉÊ|5¡ihA~\Ñr½Zg•˜5Í_9»pf«Ï z˳ P_Ïà³·fO¬ð‘$ßJò¯Åh¦Nætò'Óßo2—ë³GlŽ»â9#6i-lk­›P„ehëŠØd¹ã Glb¥fa´í[ƒô»«ã/,œþ›ÖŒ.U{põ®øÇ¶rùu؆ïÈíœE^ºB=‹XˆøûÇÕ׿Ÿýø¦ÝùÇorÿ¾çvhø¼ÎCñëz#Ä4´и8¹ÿpS6ŽºúéQûž†²_uÞÞº!¤‹!Ÿo!ÿøsÚ8ÔoüãÑÐ=~;¸:×#BÃÆGÑš†…ê#¨+ Iß»‚ë‹…Ä_O> ³-©mEÙo‡ñ<ŒÌ“8°¼óÐý‹[Úõô7'оƒáéÍ->=:¡¡ï±÷õl@ÓA>©÷î‹ru® ¡ Šûî¯äíù‚é6÷øó€¦aíøjß2¹ÅÑ-\_,„þæ7²úÉ­ÚéûíÝòý¶ žúåÆUõ[äåÒö¼KBç«Nóä¡þ hÏ%†öÝÓþk§mÜ©ü¯FWǘÊòACÿÛYôáâ`p©%ÐO ŸÏƒ«o×Ð%ÐF¡íH鸡òp¾žÁõ…¶\¨£¶Ò8¤[.ÚÔÖ•{öÛÁöÇæÑíÔV§Ï»2Õé­Q§G»2½S[iF»2aüMm½ú´+ãQoÞOmÕú±+ã±><-ϵlÕ®´í¾1Ý6Þob+Ø#†ÅNŸÓ° µxœúɰ€"lÕX—a1•û† TÃ:[ÁÚ Æ„¥ +laʸx„2Î×B£æÑçûVûm”1z„2F롌ºÒ¼8™a…±ßV ‰ëhâúz4ñÅ'ÔgXaô·VØ®ŒÇ +lWÆc…¶#ã±Â Û•ñXa…íÊx¬²Âv¦mVXÖ6a…=f…pú¬VÔbÝVªéÚÚïLå¾1+̶a…-f…©4Ji›¶ö¶»N”ðD[0d’núÙ¸Tj¨rK/k¤&¶ôVïlÀKžYnÛªØÑ»m;zgÏšÊ-ù&1ÕÐÍóÙP¤è»²«›L-ÝAÄ#DuüòáàUðÐD˜ûÅ©º{ç,U]“éH@7y÷ìðè0à]6y(.„lÑm‚°¾uY,Úäá£{×VÛÔ‰¤Î v¡¬n ñ@O)ßzÃr¨±`»NX>“äÓx{ÿúç?÷è‚?¯%ø/„îh“>|úƒ~僚ýªüä[By5û„F*¿µx}Ç5¨!Õ.‘ò ×UáâTà8l³ ™Ekû¥!ïáµ¥ÑZÝ~¼Úê~Ÿ< {úôé'̈Exùàm&µ§—ý¤‚‹C·™ 8ûTAm¼Ö•רúoEyí›á‡§Oœ9íÃHš¸¶Ñ(6ªí­:M„ŸfVCèh(&Næ5M€Æ¯ƒÒ,HcÛHcz²Ìå Í#Šéøšl¹¦'ccÙòlGöt]U ,ˆe¾`9V[@4zYzÀ«R¥Æ-Zõjާ—>©>¨j-‹xì¦Ç8ù}›0#8¶›ŒQ€¶s~-H2ëcš]žŒF69'‘È¥ïO(1غ@s®”ï/ ¯Ã¾ºq‚ç€!R¯Kw4è¥N+ à']dÖøaD!,{À©¦´Eú òæï`øÅƒó=AY­2.ÊÞÐ@ù$‹Q»~Uƒ†1‘(âôï &a‡¿19aUl“4径4„þö$§Ýî“v!Ûy…›0‹iù ZÐç}¡ÄÜJ¸$Ò‘ÒaW*¼P!X°óR©·’BO‡ÔãHwfÔ«Œ–Õ¥T}z¸Åuµ\Þ:™Ë‡î!¢R/Ê—bÈ.ìA_–jH”êX“Þ‚èø>¨?X7Æa§,9)+Z†€4ã¼iJè„AÖ4? Bw#‹‚‚xnl²´L û¡$µ4kŸnæ™O×¥§wðW””§ANÛÙ kxjÃôÛÒÜ‹éÖöªœ’!±Äm‹%ÏÞÆ3¾0QÃ,³‡U(®çß!—Ÿ?7M“R6N“HúxzþDœt~˜2^D×!ê¶Bj2¯i»I“cÓS±éQRª/›¾­ÊØÖÙñ-U&.!¾ï޽ +´ü¦yRª²¥«†f+¦™ë®et]®K–A”Äë²éõï?×…È¿ÌfS#oßÖ‘Ž-¹¡CÆ–…eGWm;fà{@žFàV³¹©XÍ׿h¥h>ÕýsÉ|‘¡Q&óMLáõ0k>Ù[Ë%Ŭ“U™O™¯+¶9~± “†ÇxœëÄʵŸj©X)ù²ø­ªü[§ÃÞ&_V)+JŠn%óš%üX¿îÇR¡*·Í‹Už&•z²œ £¾M¯;æ|Ó`†QšÔb³Xj¾öœ>s…ôI:èSgJ@Ýl5°‘† ·Ý8ßtàîKó”Ö°²÷ÇÕ`‘Ȫl6Íí3ä˜ý¦ɼíªý6 ­eÙ‘ßÎݧÍúù»Ó v€ ÷‘ÕüرÈ|“~.ÀSøÞ¨3L™í€Zدñóç ·ä’}˵ –5ÛPd¬€ª†§ËŠ¥™¶ƒuϰ½Q†-´ÒVpóí¶EFă'*r}cÍÐñBºTɰ„†"+{ëc%àcÎí›e\3Lew™)•Oú‹V &©`¼,“ áqL²Q&aþêGõ#A%‚J•ì,•¬ðqÝ+¢Ò³¾žçq®™šºÃÎ%3Z-v Р%@K€–-Z/ ´ÌíÚ\Žû3[¾è’ñfaLÁ30%{¯ƒÀ”` B"Öe«#0—X Elþk|ÚHØñ©¬‹ªn¯¾ª5åÙNÉ뀦갹AÊ5 z6‡.Ŷƒ@uu ,Ñ1&H¶-ŸÈq\ºjš¥@ÂeÁt Œ×Žº.Ðe>°&GSѧY_f/½(Ê3zJ1O?ÕŸ~xúã}ÏK¼½¿ï•D®+\æaŸÕOz“3öÊÀ°4ýöíØUâá/”? ‰£v¾o’,KßVHZHö³£wж 2ZY³Õd´ÐlªÄ!?~üøY~P¯Òµùh\³MíXêãÁÅá»@S¼õ»IS0m©"§ãr?›âô5À½l=ùñW*óÕ ØÅòóû&ÌÎ)`Á‚ ›ÞK(ðk³øUq;~–Ç€:=`w×=\H©|YAÑvááZ^©Hœ!,ðJà•À+WÓ»'^ÍÁ«"d‹­Æð—!ÔNÒ–YCÛ{ˆÝÂ0»rç]ÑvA[´e Ú´%hKЖ -A[‚¶VB[vMÅÚÎÓ–YI[EÛmUЖ-hKЖ -A[‚¶m ÚZm騦æÎ?IT«h‹µ]ì"œA[:´%hKЖ -A[‚¶m­„¶´ÖñîïLÔ“m;gÑ–&hKЖ -A[‚¶m ÚZ mé5ý?À·¥ØÉ¼¶ Úª -]Ж -A[‚¶m Ú´µÚ2k†©î>miÉŒ¶‹¸­Y´%¢äm Ú´%hKЖ ­ÕЖ]3-m÷iËLæµ]ÐVm‰(yA[‚¶m Ú´%hk´e½VPͲwÿI"zøJÀrÛmMÓ•Ž -A[‚¶m Ú´%hk%´…kжûO55™ÑváÛšE["J^Ж -A[‚¶m ÚZ m5d»O[J2¯í‚¶*hË´%hKЖ -A[‚¶m­„¶¬šªïþYò–Ìk» ­ Ú²m Ú´%hKЖ -A[« -¤Ô´ÿ€ó¶ìª¸­qÛm=¤-¤,M[† -A[‚¶m Ú¢?Ÿ><¬×êG‚·^oQoÂóòÖLæ¤a”0y·ØG‡TªçôÓÆhŸ¤ƒ>]ú"… µõšf)†Š¤„€fðɃä-X`¨Å=¥9¬ðýq=h›²*Û„5s÷=vj2¯í‚!C † )R0¤`HÁkeH£íã­äÏR–lž¿ù…3ŸTÁ^«a/k½¶½ž8±*1Œç˜i™\϶\Ëódß2A‰û†)[6ÒäÀÓmÅ0‰m¸„©þ©j,ƒ Õ*çH;œ1àµÓiSþºsZtX‡DÙÌc*«ú÷•kËdQ!¬\Q.]tIG² ]¡ªã`[Ö5 ÉØÑ°ìbM“QàS a¼‘nÌxtºÓfëèÚE³†®]²èr×~ß4uhÅQð­þ w§3è%«têü96BÞ,b°÷MÏ` ÞjÁ+ðï ¬ÈØfÿβkcdf«¸pþçpþçÏRΟ…3%ÓÖ× J€äCý¢¾Á ‚¦•Ìh­¤'Ò‹Æ Ž8øÅ=ÂÚðcY/}¡(ì/j~Yf2¯bu«ËÖ®.‹Ï„ç_WlCÝ‚u¥E«Aɾ­#[¶**1dlYXvtÕ–±c¾cÅXüŽi$3,N“ Ìö/0KN‰ç^iP é‹?Ć:ɶïúž«¦a«u ¨²¥°~*Xwmd*ˆ˜Ò W´tÑGQ‹t’ZCûÙ$Jö‘‹Ú¿Ù»²ÞFŽ$ýW=¬_6ÙyZ4†=^Øñk{00`yª9M‘Z’RwÑÿ}#«Š—Ä#‹EQ¢ÚTUVVVdÄ—qe$Þ‚©EDÚ…„|0@'Ã0 ®õ*Q&\‹¨÷!)÷ÄøO´€’Ÿ2]ï!!í ùrào#Íü=³á~^0ªØå^ûY»­xúŸ[‰sï-£~Èý•NlÝK3úGôqzƒ—˜(G8Ó‡¤™À`aì:½Iï'Rx͂ҠQ'¥ö*ú0çÚZóìÐ{(‘>>âjnÚ!.ñ„°„ MqŒ%\s˜,•£Öé:Å Ÿ""x@¸•†¯‡[`Û–p{ ²½v¸m[)^J|z@\0å;¸°="™/ ¬ñ ë?/ê.€—/ê8UIO9~1 <5è6áªß€ƒYUŒËYJÍmý\|ûݯ?þã¯ùÐç½fŠ…˜E%ÜhéãÉhmDòB3S…œ çYs")a”ñà8—Ð[‰v*P)©Þy§ÄÕæoýÚ$ÚþX=¤TRÍ ð¥'ªàIò s#¸£’%¥6‚©vñÒæ^û×°€-‘Oâ}pƒ¤Õ`Æ‘NV ‡ÁHqÑHÌô½Ø×ýHPÛ½XT!KTƒ™¼+C•Hu‘önTOÿ¿©¦„äà”½Î¿¨ÎÄþäcs9Þ|ˆ×qlóxqžÆOö¦ù9÷¯úC;˜‡-¯I泊AÆÏÀ ½ÉMô“êM>õÆÃ«K;Œ>ÅŠj¿ŽoãÅׯ‹ì浩̈́ý~±’­R5±!À6‰õûv²¨‘„(NAÃ8ý4¬'¦ÁQøƒ7}V¼–“wqw«$¦¿ÿ‚þúÏ_Ñ?ÿr9KKýÏ0º•{èoß~wym}oÖI²—D^²xIÒ%q—–4óaay›L~üùŽçVËWäìÊCÖ©‚˜û³Mk$©¦OÇ·íÞýGMÚï¿ûá2ó&h ©•ßú·oúíÛÿ©RðÆ£«Ì s6ñíï—öÎöÖõýé—Þ¿´ósy”Uf}ÕS/ŒûwqΕpýcœG㛜èð—ÿýúí—ÿ¾ØÛ!¬çóñ)°JõßÅêsÓ8¾¹Ÿž?É+KÜÕxúâj?ÄdoÓ9 òGýò+pž|ìÍcìUÖ?õbµÑÝõ¢IÝÅ{ n@Çó6YÞG²‡Åèn4¸½Ž“Ëæÿ0èiÖcÂ<7uä?V%;˜Ä™ÍçMíUÍúõyØ´ ¨×ÊPè×Þ{Œ´ñqá=2Ñ À¬FvŠÓ‰Ÿµ3¤ÁGÜÀ/Ci@Œž´M8X,(]ëUš®|±8åÞôbqRkBÉÄîZJûx“Nü‘>¶Ÿu%¦­E0˜ìÈiF`ÆGV[‡dä8i¤rºSÜðhNü2¸åDL¶Q­nE¶×·ì 8ñK¦|—öqvâ?)X¯sâô´—ŸPÁwÔÙ‰vâïãÄ——Bìvâ³çsâë§pâk~‰Å%¶/lj_"ÿ‡râ½û´œøXžøÇwâó®ÂíœøÖXFhˆsï§š"D2II…aµHâ†Gsâ— ë`YP­ÜP8Ù^»¡À_¿¿dÆwÙ ¥}œø‡5öpâ— Ñ pâ‹.úvÉ&Lï¨=øËâgUKèýLèqWˆµÉòóo;oïyÃð\¾åÔʷ쟵xW½ÿó´QÇá™Þr±ÍÙzEº~:ÈÛ¦c7~¶×7ƒ˜åªò–äG^¦ÆüØ1ÕÀ8;YÖ—çÏUï¹½™?q¯Gã\ÈV=³z±wí ŸŠ‰36 B—^“MÛÅùBïj¥9™Ý›ùôò…å–øÞkëÂ!Uµ”ÕGšë|q½zïì:îÎÇ3«x¢¬Â9 Æ#‡_šh”×д²¾kIí5ЋŸýà¶Z‡fFHÓàqΪº5ÆSsg>µÃ¤¹ºä7i®,{Xæ®:¥šË`¿þ Ä¢…3¬yðÖ\Ÿ¶ÜºßÈäøÌäOÃä+ã¤ÖˆÉsá5FÖ³„\”Û˜#“ü L¾’Výš˜¼,ô¹õJÖr‡'Q$Êh(Š1ÄCäHÓ`P‚c‚ µ²Þ§XÔðX¡Ê“ßl>v,Ó¥e0òP„yí>ÑRÁ'çb(™ð].†Ò>ΡÈm¿%ØØ8€Ÿ}éƒOݪm²áÛÈÙª_z Ÿ­ú³U¶êÏVýÙª?[õg«þlÕ?¥^ÉeWã“Q2Ùðmæ¬W®×+¹l§Wjz®õV+Ïjå±ÔÊ'Ò~f´ß2³£÷zÚž•¡µÊÐs¯ÙªKh»\@Ü•#ˆœ!άFÖ ‰¬òJÂ'†äëVE ŸÛ?š æt° Ì#x²(ånøCQå•»áÛj„zrŽø’)ßåˆ/íãìˆß(ï½ðùf­Ÿ¸þÐV P•D†[?/š-2‹;q0À‹ûõ‰²5Ì‹`Àäa-âJx¤)ƒt<´ƒÕ­@Kzν•rÇÙ&œ.¥ØoÔŽÒhìár}ÎŒÌJ)¸G€INj¿ć˜ßYþô@˜ÛF"Êa™ãŒä8|°‚[‹ ~:•Oß>÷dýÜc 3£¨„CÜRŠ–ag¹yF„C@<)*,ZþüÝb£é(©CR%€tTÌ„¤’Bˆ$¸q|™ ³='ëUË–4`[i°V!}$¶)¹ÕÞ”—´Ê₩©.%ŒÓzM{ö%Mn„/C{Ý÷=?ŽaRÅ ¾ƒÕe óßi¶_gªåHO‘9NÆÈ‘‹Š™¤QÑfÞ˽ܾýVïüô¼ô@eoïYål¸îk^ïöžÊ[…áúõôþ€g銀ÔE*¡¹uðÞ|1ošýfòÁà¯ê˜×7‹èYéPþo4éÝŒ@®¾Ôe©ÍÆÓÞ|3qÃu‹†á˜äÚö+)ÍýŒG@«ñeÞï›ÕóÕ1å“=Ç— Åz3 ºŠÃxWaÁ¼É͇/@í\ ¡îb@³&“xu TAD=d!´Фcªw8/½ýÁŽíÞ0!æ|p{~§sÇ{M!€ÞĪ17ƒ{rÓ½¥}Ë3Ú (4þ—õqè¿,h˜÷2Ï^Ö”-á­ñ^å*Ïý,D|[«q¼ëçUªWžš Tóšs’acÐÔ†¥q‘r‚å3âÁJ;AŒÙS2êWí%3i'½ý›Þb}çs1¹+L]³q/|ðK2WÍå¸Îl˜áÕ[Wð½Ÿ,ˆËMõU³rÕ†Zßã•«ø­v‡æbõ²ÖËê&þÏ,âãéJûÊU‡aµkX£2—äå¦W Úœq² æ)jR#ç—2a³¢UÒ·Z˜V¨Ô†/u_ê |‰Û#prƒ4sN6ÊE,CÉx0 9LJ:ÁÞÅ=9¹~Õ“Bü:TŸfoÎZÃ4ú&áªJ·ŸCï ‚O …Þ ø´aí#ƒÀ]¢x;Í'*1õ &F°XN&6Z ,OLYŠe]Þ¼¨áqÀ§Ñ~'ïJߌ>kOx]¯…ês ê(úüÕ§€Bo}Zñö‹Ÿ'‰€ÚÈ1XÆ rn¥S¸Á¡%.p"kŽ(öŽKª4Ù5*GÉ( Ýhë4£Æ)‚-%‰†gŒ€– åD@%ãØ¼ê(+Š41Ý"šc–;‹¬· Šp Zµy†%1 À-Ø=%cC´„W#>¥Ò{Ž€)ÊL_šâèNYõÜòS"+ÕÜ#°A"”Ká©Â°zïÉÉ" ø×e/?ÊI ‡rVÝÍ¡G‹€ ÞU¬å^Ì&\…fâI8d¨7Ù* XÛ(0eâ†ÇŒ€€ÀÆ(ßPò¹"(kyÖ×(úR" %zÃc" ‚)Z2o9úÛ-èöAtß‹€ZABŠ´Úiaf½B†°€°PTbNbäáa´Dù|-’އТǞ7*TW Öîäv™¢ÓÒ j@œ¨|¼D>C‹`"iÄZÚ)nxäh_vX“u™3 Úµ8¿ý@Ä;U7 Úß XB¡·-±—ŽìÔ]ÍÚU™49OyôÌi.T¤‰HóHb2\ÉTTÔð¸Ð’å Qr²våàs(â*øèýÁ§„Bo8Zäv<&ø˜KŒ»’·+6/"öLD˜ê@h®cßg„F¾T á¾SÜðÈÐÅÐG㇪Ï2ñÊÑçPÔ;IôÉ$Ü}J(ô–# E…£Ã&íà'i})®ENù y¯´Fa+cHA»:뾨áÁÏÇøe2…)/™#ö.G=y·ë$êÎÎçÉ¢µ<ãPT{•°3+°2šÝ–Xå‘Ò¨¤©OÌ}„V‚1fÉûÒè{­->&%’Ï™°*1'¦¡žŽÁëLJ!£u+r‚Sê­G ç=$ÌÂ⣓‡H)¯)“ÜÕ.Œ¢†G„!°¡ÊQcc®Nœ”XÀª§•KZê”aH‰É6¢•ÃС¨v†¡9 •Pî­ÂÐ.^ñ0ô0ìûæ÷N¹íØaèÌr™:ÕÑð4Ïn_vví¨Z3,Ò•-½ã@T‘t(&®—4"í…EDm“âÖÐ:˼¨á¾¡Ö•2¨-Mø†‚¨¢àä/óÌû]ôûœzñ¾ÉÍÊ%Ó%Ÿl£i Óñ@D=Uð$O<¥Ê¨ó€¾o0zúD2³¡HS“Y÷]$mvo²$Häç³Þ²ÙàÅ’[g˜Ð’Š*âÙTòn^3¯«—§UÆRûͧK‰?ù‘ï¹_Eàê]Uúêʡ˟ÔßâÊwQ9öð5+†¸³9œÒJØ ±ÚѽöËÞ{q;*Æé‡8ÎBUÙþó¯‹Lk^«êV]åü©*,=MG~4XªÕc;¼Š½ëþpýuûyq=ÇØ§±×¿éÝŒcê?¼3ËZ\ú”y‰ûñµôÿC/'*>xòáùøù`Ç9qj:®ïpó`Š›Æ9-ë¢N˺X¤e­©ÇUëÙYµkÞê^ZVSt½åQ)U}Φä}0†(.‘pÔ!À“|àOHPKe¢Œh‰ÏEòUs‘ §ÎEZ-tÀ(8f¨Î ›4â*zfSHIŠ—ÈE°6ý:FçÎhÁo¼ tÏóþ–PÊ&i´Ò8Á^â¢÷ÆëÓd´?žu„dŸ~}VéÒ.÷„ Á•ća)ÀÕ†g®N:)¯(±ÉtŠ)÷dÕRyW" ¹À´“ 4l>_¥)¿Ý/¡Ð[ÌAÙƒÅíþ„qËv[:¸‘PŒ Æk'ó/…°!LIÏ’ÍÁB% …iˆÉ»]kCÄ2ÙF·'2ˆp¯€ö Ä”PîíbŠÙý%€;p,f×ÞŽ5Ãb]Ûa¤4‘-hå8DÉ)û #KHó$¬u1 #a91ûÅbJ¶Á.CbÔ))…’Vñ¼“ÜbžÑØÑ"è$ÛkçÞz·T!_©ÿ³ðë׸¥$}·+rú°r·ÔN>Xò2Gµ1o€Ñ¸tÈJs‚;j•×ü0ÚëúIrê\¤¼ôG ¼S…Ž CΚˆKá—ÈEo ®ð©3šg*FNc®¿kst9"›L ]ŒàB†—¸.¾*¸b§ÉE<ëÉ>#|ÞX k½ÆPˆ!H…\ì!W|°^0DTÈj„+§ÞÊZÔð…Äb „<×$Åj²†-Žñ8_¥)¿ã` c1E,~l÷'ô$D»òZI…¤C@ù(QÄa&‘I`º$ITåJÉÚ8²cDzv¥$NT¬>w!óAîj¥Úÿ=¯ç@ô€¸¸;r•,pzŽ~ýîî÷~`îû (.©Æ §0DÀ2Að+½†XØçý%/¤«Ëì‹.WF/ï//?L•°Îw73MDFßüõÕë õÖ~q—Y{’]¾ôØÉ”(åšfWTÙ¦¦yÈjS5³ë݉Ù΃ †Õ:erﲄ »E¥·±.*¡íf`ßG§¯ÈvõUG,–nLT—*ïË ¨é7w"ùþú6œä 3×V#ê†ÞÕ6'Og[íîD³í $„±:8á7Í<ø¨Ì[­”•ª{wÕ·J14p¾ƒLÖ±kŽÑóƒí}Ïšã}þ¯þ`î_ý^~ÿþÍ=¾ûðæúïoªOŸ»{.òÕ>ÀÕ?U<žLîWEÉÇ6fà dÁQNpt”AÁ£tıØ}ôm¥æÎ­{l¼V„K¸uÉéMPj(kŒK?lújÁµ6Æa*76˜¨-WÊK•¤àuÙD{óe¬ò URØÜ‚m¬g¯ÂÍuîî[ÿlÇ¿¹°W>Îàâ5  tœ >Zn™Ôžˆ˜ˆ‡8A'øUl[LÖ©ÒºíqíxS÷‡¯‰üõªzøýmNl´âV¿5kŠÚgœÍÄnòÎa¨¡³ÇÎ?³"ϪIø@%O8àÔVÔš¤¬S^ƒàp¾0‰ZêŸ2…µzcåD~˜~6µD1otò¸ î Ñ”û ‘5-Úlâø™îÂ74¨è²b­¯®ßÙ‘xˆBpCÔ ¸)î¨~Рħ¤åvV:¿sÕú‚ªâ90%E‹<ÿõF ïhrXFÇ3ÚQÄ`±ˆ¥ÚjlÞÆWß^Z“‚Õ$¸ y”||̈fÉ90Œžjî9“ÝÕ¿é»îúVÓtuë\@g)•8hÁ=ã,% „òÀI8I¥[Zà&±J†¥‘eË»ðù,Db“·N9îÖXrÐK\D­!z++\š?)X_¥%¨Èà áŽ3/4w6rÍœI‘†f[¾Yߦ5ÒÜú6ól‰'ïÇé/xZ%Oó&›gƤ¢+²¬Û…ªW–yñåw¯¿>/±ÀkyáÁ<æëy®Då”ò6aôJ’-1r=ÓUª Øïésœ1‹qÚ$¢%¥nxÐIƒÁÍ’ ‘¯$sÊàºvýÁ?½Ó5•ã—› H†š˜Ñ’¡¸W¹! ”£`À ÆÆíÐrúâGT¿.b…%S*$*M“l¿¬°`+1ÇÌrF…NÛ`ûÙ¶¡áÑ(ø@%%˜]숥/5V†+|wµç&¼H…Ç–ÛÙ[YG‡:ê‚,ö…[\’ÜʈàŠ™mª}ë(Õ]ðÅI$bx@ &åÌ%§ƒe‰³b·–Nc•!c¤ÄÊ;šåËñÜ”ë\”¼pñÁŸÖÒt—‚Nti¯À‘»í.ö”­µ_AˆñŽuÖô†#&ÕÄ<€D’ѦÒ,à%1²µ®ßZ$-öâ,"¶n@XE)=ÅŒR„ ¦ èØ ¨ÝÎb7óX­œäc3è¬6„ß‚“M'QMö›ŽÌõ`}Ò‘ àîãV ΕAƧ€\ 8q ÖˆÖ¸‡EœŽ$jòQÊÓ‘»¢Ê±§#ù1¥#Kh;¤#?Ót¤yo~|Äëcúó_¾ùúõ«—/?|9¤#‡täŽÒ‘C:rHGéÈ!9¤#‡täŽÒ‘C:rHGéȤ#UÏ^,Ž#,Ás2¶¶!AÐQôðg/³1¨Ï Ü 9ߢ_Ú¥Ò'ÿZÕ©¿œöÙÆšM#NyZrWÔy®ç±{¦+™à›g#KHú‰d#ñv³‘ËÄbiZ²ØÍj=’U[l«ðúmµ-Uš„YN^YwQõTh»7tJû®«›óÏ_s¦íb|õêÇÉ$^¤®FÞhÊ/ÚÏÿXéäÙÓ¯âÏwÒÉm¼k޼u¶2¾_ßOÚêÇÿ»:Ý·ò¼àm±OÑW¹Ò2÷)ºŠïGÍåQ}9·'šx ÅsMŒòEøŒ±½8ÏËzZ§O½‰wç³ë“¦:÷Õd‰\>YÓ¯B2h”paˆ÷Ú!±8JHë,Ô‹î{ã­-ÐÈæm9Ï”"åæmW$9˜yûu~Ë`^[5A«Ö ¦ UÜ7”o­^%ëç+ucg‚NÚŸå…p~sË[²ÚÃ>àcRºÔÚvY³Ù[Q6ɨ¹ žq¬•Á‘À°ðŽiÙ¦œöãnA&ìû½Ó–w-ÛFÛƒ/0­e[KÞ{·Ñ"‹ö2[QK gˆ“Q¤G:ˆ×"Z1rT€1Ý5†Eׇ¥ºú¸Q®K»‰íHãVÓx±öÛ?vNÂÁ•‹§µ„ Å Ñ[ã¢ÎPó'á^åíñWðAñòÛú<Þ±Lyí,ºSÎ ' ¡8i$® ÃŽ#Û2èƒxqo¿lO|Åt×Π;]Í•À6Ìò¹gN§è¨÷Rrªµ' +üMífÙ¯ÆÇ'Ýlš'ãËËû»ìk5®Öæ½n*Ýyƒb©˜ xîF$Á„§Å­ /v/‡ãúx–yí ºÓÝàñÑ®óÚ¹||Úùåãøº¹ìr+ª6üG°÷$Îîwð3%OIÌ=í(Ô!ŒE‚QPEêúæ»§îÆ¬M1F‘…¼”£ #'+èßsógW ðIFAöš+ ÜgÜkn¿ÂsèÎuSí"ÔlÈgâ21Fëh1OFM÷äÑûñÝÛzn¿¢VwÛ~;ßú¥ÿé~ ¿æO|ñOðÖ¯º?@&[“ž¹©fkþž}€|ååìJ¦BûçÍ“ùIm èUßðàú’o™5‘ÎÖqs÷Ž foŸöN/}_sƯ˴^IžîÅëÔÜ´Žg+uS…å§µ'í?ëzˆú÷oG¯îÝU¼k}{ ~Û(üeÌ«•ê×"ÒKKˆ HÆ#Gc@Zaf)ãI35*xØšl±ütÈ”(=ZDîˆ*Ç^“-ŽªEdm‡ý®Ï´&;üþÇ?Ü—¯¿~õö»ÿyûãùäü›ÿ.k)zÔd‹gS“ý´ªê't5ÙCMöP“=Ôd5ÙCMöP“=Ôd5ÙCMöP“=Ôd5ÙŸyM¶:Ó¢'b‘Ê/àÑ!ðr dÁ{ Ž`pëfˆEŸžŽì‰qÖøM“93ji%v& ÜMxì¿õ/{ü§b#˜Ò¨ãŸÎª”½˜í»².GyÜ}(a¥ÏÐ}hÄ{©÷Ðòtã<¸@‰vR##¥E<ãjæ$¢N2Ê,WòÍœ‡–]ûú]I+õmº¬Ì[_âæúú¢cÿçd 6e•%¼µç—×a¹uì^x3|oÁ£€Ûg ±}#å…üÄ^´Kyž?%Í_³ãs{×LOò§…¹gòèž¼½ [9"½ÍNJ^ˆZÈÚ?>´ÙMåOå™´îTíjtˆQlÄu×K8îë·í×èrÆM¿E<)žp’ˆqøk mHð(J Sb˜kGÅ÷nôkŸ6}µÚzF‘r£¿+’Ðè×dÚ8~onßÈJ7ÑÆùTÕ\¥ë%ÞGä‘É„!÷P£R! ¶ 1°S2YC”É O0è„ì «õ½„M>CƒÞˆîŠ2Ñ)¿6ûLŽ{n-G^G`í=VSÈJËP36õAŸÀÝs­Ú¦FÓ\À–%¡û¼4þìØø¦Ié׎Bó0ë]”‰*¤DŒ¹A’DàCÁ—ôTÈÎÈIí77þAEmCψÔg„ÂÿU§¨_crU¾jK”t驈²$z¯Ûè¬ úëË­_Pÿêößéôeç¾Luà«kÒ—Œ"õ±°£>¢³Ãbå‰É½Úu1m¿F )))øÀ‘y“{R‚“©MDy8â°åuäZ4p£F Ý¢¥Ít˱Œ[»”·çÓ­œ=c†OV²g†]ÑòàY€†Û‹â¥§X^¶}Ë˰YoyKÖãX^¼Ë»¹t-µÙý uoS[¥ºëáŒk©»Ès†ÄKЬcñÜš E«‰©Îdn–ßê/Ý›êãÎE·ý°ÂúUJ}ÕÔg'×Õ4e7¹¾¿õ±ê½:TN •SOªœúõ´~H‰„æOuqÛo# Ï{ùp×ëÊË?½¼»‡Õæ_Wa×.5ã&gY{±§õ üúC]°sÍíž¶ef§K÷g:Û ÌïÉÏy°8ÿM‹»ù¶z;ð´;äá~`çƒVìˆjKpt:Ûì¼|E€Ðp1²h¯,î ξeqopv­¾´¤éîÎH˜£‘öe³h¤¶Ï‹€•tL£‘ÇF=ˆF2?}œU¶’QbO6•ŒšI7Œ™í#¾³Äv憩˜4©íÙÚt’Û³u覷W,ñü¥YŠ;ã,]ùTãp;÷לå®$þAš;¯ü¯§Už{n<=­¾3Ì?šŸæ€ù´“ën9çA¶{úçE.œËxOÈ4ç=›_ÆÔEŒ©W0&>ÎJ`[V.q7eåZ«mUÇ/SëK39§yŠóQ’É™{Þ4“Óð[ëTVaQA&§‘®F*jÏgrjÆìdrš‰~\΄«õíE=Ïõ}XÔ”°(Á+X”nÀ¢K\e~FE¿mIŒvÔá,53¹È5üÔÉx›„ŠõžAÑÀceKÚŸ±î4Öö¤«µm½*u¿È»êÌ~Ç¢ç)9%Ö!.@:%Ð×è€á3V£â‡ƒ’¤g†.-çÉ$1=÷tvD“ç%I4çBÅÌJ(ɂҀ'x%‡‚’,Y×Jòq(I*r£j‘äŒ ™CNh¬V3›‚•ºÔ2^œƒƒZ_´S(É‚×?O(I ü AI’(IrP’ÄœŒû¡JA;9”Ó¬†¡ÜTÔöR{&¼£â„’4zi™Ó”"=P¥vD’c„’,S¹Û€’ìhãP’%%™;†’$‡‚’,a¥Jò1(É@c.z´Õˆ{LLAÌF(vÎk²™ó°J²ÀxÏAIú6”䎠$I”$)ƒ’,`öiô)Šègô±v’:‹Qd,"ž,Y±EÊ¥RšX¥ën¿E%IÁ–qª(BzöãØIž”dGí­Û+²ÒG%Ié $KØd€’|JÒ£Ár3$¸BXY-2$:Ë´¢–M}Ð'p÷g%)ŽJ’AIRR %ylvŸ*ú`2äFЈAw, m"AÔ¥ÐBP¦ê¦RE%Y"ö« $µZV«>#eíþÑòX $‹â¥§X^~((É‚õøŒ¡$7–®G $K uoSÛ’Äš XR”`Ô‚uÈD«Pà‚8,ÓbJ²4¿Õ_4¡$‹nûáÈlÈ3…’N*<ó“ -ÈX‰€ö[ÜõÛˆÂ{B’,ù”OI²Úü”‘$I’$éƒ$YbN6•ŒH’%Ü8œW*¾’ä$I’$)G’\Ë#K$KüÃMYy’äStü'…$)ŽI’!IRRŒ$¹žE—xÊâŒqÒIÒX"8h<‚9è>«8Ò.¤Ïõ<ŒD¢GÅ‹$Éɲ2‰Qz Iîˆ*GŽ$Iy_$I½K$ÉÚ½ZIòÿÙ»Òç6n,ÿ¯ôúÃj¦v@á>²åšqœ£fc{“ÌÔTªR,t-sB‘\6iÇÉú߇n¢xM‰¤(á‹&º<¼÷~ïp´C`Û\$éíoÿ|‡9þÀÍNG“â+ðǘ‹$A‡D_$¹ÚöþIê÷è‹$ÛoL¾ßv×t eº…2ÝB™n¡L·P¦[(ÏèÊœ>÷[(÷žcº…2ÝB™n¡L·P¦[(O} å1÷¢£t»Kiétn©@…Wq dK®¸=%®jNiŒjxâp$çÕ.¢Ä‡#E•ÇŽ-Ñà¿.CÛŽ|œáHW a¬v¹Ápl4+J͸üJY©6ž­×&´øÍO?‘’¹þçÕÀÿSñÝ7¢’>´ˆÁ·à²”ÔbÏKBs€šRJimA()󑽸 áýâ~÷ 9¦ a ¦ a ¦ a >ò a Ÿ{Ðpï9¦ a ¦ a ¦ á©ƒ†Í<¶+'¹k7VÜoAˆ Ðĉ—F“#‡#ÍBÀvR¼÷ãîìsÝQzÕtfÌUçÚOƽ¢nvKøiµˆÉ… FÃAÙ»šŽaõ²wÐb2ö_5?—Ãq6º^Ùó.Ëœõ‡Ÿ‚2êdÝnoЛt»wOqóØ.çc»lÆv¹6¶0y¦<÷¯ý$pm¶ü5›½æÕuâìÊÃg—ï‡_:m¢ÍýçÛÊ×slbÅa–úûû__¿zûæ«o¿~yùpùÛtÚ¿ì€_^Ûâ}o ÿùe ^JÍÙ°ÈÐ [ˆK I Q•¡áË@¦ !à’¾C•ïƒÑ2¿lÂpÑ{ÈË遼Aêg 2:áÃc°…aœ½áexÿå%ø¿ œ!wqy‘¡2£ÿYït¿È†ƒ,ô‡Ý¡‚iG³¡æ"ó0Ãnqý«ˆV3Ö»V`[ ªÞ/÷ì…é†Ë(e6Þû”^d¶Ê.Â\4Gσu[Nˆ…Qh²<«~dÇöº÷˰3ÛA6!Í…:t bû‡ÙFŒvðŸ²ï¿…uüá‡oº¦cþ¸± 0Fïê"DœÃÃ&¦šý¡Á€¶?fÕ´jV ÿíίï ã:õ™þk…‚7úꚟ½¡SÙ¡œ>Öx·®-Êátà:ÙœÍa´AK,_GÍk[8áã+#6’E¨vxç•ᮨ`ˆ[)PNs‡¼’˜1pƒ0oŽÖj“× ¦E×7¿t]ø©k‹fcPß:×بv*>×u(J=ö\—|L¹®Ú¦\×3Íuýí_+òÿøýw_¿ùç×Ö¿ÿÛ_ñUT®K¶ÈuÉ”ëJ¹®”ëJ¹®”ëJ¹®”ëJ¹®”ëJ¹®”ëJ¹®”ëJ¹®”ëº#×%;Ðctˆ=PDg_¿^g×8ájîõeýÙ wÀ¹©¶ÌªE<ìÄÒ:PÏþòî[ôÅ©P½A9¶(ÜF|‘?æe¦mCˆ¼9Õj!Ü<%h° ÚQ]÷½ëé5Zž„uA:xC;ûëz;¾ÞîÃNÚµ0b ^2s’PË 0ºƒÏç,Ç%õœ(M_ŠÒUJÎAÈ•vJHâ…ô^f™;ú¨ûŠÉÆøât:‹sÞî)Õ^".¸BšQ‹ŒÈ­Ôà.q³b1Ö_¬/ÜîU Οº‹HZ-‘¡Ûúèî²òŸºÕȽr¶óîç÷]½û•+®÷˜dìƾVàõ¥Ú5„ìß÷^çÀ{×\¶Ï»ü–_ Úú?0þãµS¿—›÷ýʳãµ*;àK6n%¢ZñJ›# ½†\Á²Ú5µ§‰7ÌdV`Í5FÓ‚¬PN˜EŠ0BJF½¯ ã[àÏÏŽ ´E«TEŒ)þˆ®³Z´P1ÕŒ–L>»æ”ÆçCÁݽí-¾º¤k›—0=˜â®ð(BQ™—ŠJZ*lÉ–«6„L8{xœ%г·–'ÖÆ°ÆŠwí¶5ê—Ö¬¹ìÎ?7àùãÙ ³Ç…ÿûÈÞ[÷ªM°Ôwwß8¥ žXÚ k6Á&ÛáèvÂy¹—7>llHµkZÉ¿¼¿Iq‚½ss/oŠÉF̻٠±àN£w¶ ètÒëWõ”ºõ?›ÂN ƒÙq¸Ú!ûÉt Z ”Çf½A£ 4YÊv]•к;ÀÛݺÍ>³©û¾\£.&$z㔹ÏÏåj´(«¶Ìˆ=eOkÕ8è¶µg¯ÏBýoß¼þá›·?.¢×jïjóu±ŸÔ÷‹60ÿ¸¦êRS‰¥•º{Óûå¹ô¨0Þ1A½“…ÚŒ§xäyúI»Ý£Žhë¡Mv³‘š¶SÂêsòów¯ß|ù훯Oê.­÷ïŸÚŠ“ÅCøM­{^u—ÖÕàŠe§“!sïꪮ“—eü¯“îx:è‚¸Þ rØû²Jöú6Œ[­üÀÝzRÇuqþù»Ý6£˜ÂøQ»mj~§ðÙ¸mñì졪]³N^Ý«@µóêtSùŸPú¬Üº¶ÙÙAùÛ7_¿MPþ¼ üÅ|ÎõU:Toà~q8„oí^Ÿt‹ø¦C¸~ˆo6ž±¹˜uBü ˆoÚ"¾IˆŸÿ!þõêõë/_™0?a~ÂüMèg8IB;D„ÛÉO”$1JžràBÒjˬi2c’“̘dÆ$3&™1ÏÌŒ¡JžkÙŸñø2ÚØ˘‘!÷7„bÉ8碴¶rUÄöûr_Soà­‡ãj®èç˜ìJÅ•ç9b n¸DV– ЙZÌdá(—¸ßÖð¸Ù/Êë’òÁûÐIQäH6GƧ࿪°úÅT_šWýaæÁ|jóù,Ìï_¿zûÝw¯ßÌ CýĽŒ%ÚCbÿ=ú_µÖ“õ?™¤çŠ€Q´°§Eµeî,ÁÞÃÀžd<ÁÞ9Ã^”0mĺ„l ÙÖm½(î.òqoG2.Ä €òÝ_~|õÍ¡ró®¥ÅìŸ&T‚Ø5øò²q`¸á¨9y¥>þ(<ø`ûÓ•ÊÞÏ?_Er+¾>|½Q<Ÿ°õ¸Øºáus¢è¬hü³§ì›¬ª-sçÉ7} ìLÇP%ì|>Øy£Z=açì\¤IkYƒ¿k||ŠPÊHG¶¸Næ\¡”àj×Ü”®C)# J”&(MPš 4JYGþô¡tÓ±+õÜE‚Ò-PÊ”&(MPš 4Ai”Þyáì“(>Ú˜Q­çž6ÞlƒRÑJU:2Aé³Ò•]= L˜2~20¥¼%Wv8óÓlÉ SÒOß>PºÚ5÷d$û ÙÉ>HöA²îcÈ–êüÀ´úóO6›ò¢wýlŒa/è€u°¶¼€0“õL‘uOÉÚ±Ýu3s ó¢È™(8â–ÃÊ{” ¬ó$Úo¯qõÖ0Ú`òfÌ›}qqáùpô¢9†ÂÏ®²ýùÁ±ºŒîƒcbë®oÀa=€Å‚qa©qð…‚+ÄÓ(—Ä"F µ”r©‰?Ñ‚Å1ÓA–5’(‡XÖv]o[Vb„ÊTßr,G9.4R†æR9í…VGYÖªïýúÂÆLò K–,lË®o.ìÏǶ {àÃ]ë³kо·ƒé¨:õ( W»flÄûۈ¤áé@”t JŠÌ´;eWääè(HåÁQÚü÷ë_±Êêj×lúµE¿G rÀø£ËYÇ0®¹Žiwâ°Ú¢]fóLÚ%i—³Õ.÷:4øÈz…³sÐ+-oB¯<²Ú5á¤`’‚9kÓR$ƒ¦Ùí7¸Oà1÷Šn1önV~Zd sÎ~òq8þ%°pϲ)iIéCº Î8ü妀þ(³ÍX×2<øà¡ý¬;´MkÁ@µÀF0¥Ñ¬³ð:,—LºMŸZY`Í­+§ÎZérâ¹#m}“uÀöÝÚ£ïNGðÖã jד)ü‡pNWã/¯~üö¯kf™æÐoxbÕ{ T€ÿ}Õœ°}1ÿ<Öb(ÿ;¬º£!0Ó§æ¥À­áCÃñ¤[VîM>ua~y¿îh6P7¨ºnxm{5w†ïŒ‡@¬ñþWøs`û«cúÐÕòÅŒbÝy€ìÊü‡ZMFï?U ûÝ9u—š7©üÕ5°P-͹ Zô`H¾´ÓþäFçöƒíõmÞë‡iüŸê¾ï –\ûyñKoôw­sÀµU·>R}9øMnûÍùª÷FsÁ­ï¬¦Ðø_¶ðƒâÓ’„{µèlY,Òè[1 , ßYF6vµûõyíÝÁô:¯•3ùü§¬aœ¥däŽK º@‚7# 4Ë%¢¹d”Y®åûJFÓ×^‚1g‘vâÛu—jŸ/Äd4öW˜ºaã®{_ܹz1Ƕ{=tÛ–xõ§+˜ðG â2ªA(¿vD§¹°ºçÆ+Oñ%­wèÙþ\wðê•ÿý¢>F¥=½¨ÇéV?Í/Bhë"ukA[pNİF /¯sahÑ+|-}KÒÓ •Ú0¦ŽbL½…1q{¬<Ó4 V&9/¸µÚÄu4q ¼s˦³ÜíËÊM_ªã7©õ¹Öì.xkP/ÂWÂsÏd‰s$œ†©R©–Ž!V€SZCTSJ³ø^ÙûÖ¥7šó[-³Ù"÷²¤ )á=â…–È:däÔTHâ7“®™ ÔÔ6´C¤î Õ0æL°ªAÍa¢Ÿ73áv}{‡¢^åú6,jbX”à-,J÷`ѬökÆÝ^5ìךý†Óq᫽l§£'XOB± Ö“î`D Xtc­½À ŠâB8d¸ *ˆà”X-¹Î¢ÆüÙñ—ÃW}[ÍS·ïþ¾LÝüt2bL\ 굑Ðê2F € z=üà ë®N)—Á;ÒT»ç’¢ìXÆ;‹¿¿X¨:Ûa9¼ø|ïRǤ†w%Y×ÓÇ ×—jýºä&4sgP#Ô±ë±îC2]ø‚8S(m a(g3ÂY©}©™ñ/•ÅÄK–s¡±ãV€ªæÎå ¶eî¤bGÏáž@À6fsg…EŸ ¹¾þÖÙÙ;tp]<˜¦9ãZ*n§NRds.°‡¥)½ÕÄÔ¥mK° oÅXŸu&·µtÜ|©)`ŠzíÈ KÝÑ´˜8ð¿5%ˆ%\ŠLø—ËDh`Í‚“,ºá~`²E< »g¸£‰®vÑ.7E¼“áÆ=ƒŒ;a`·&¡Ðhr~BM~ê8 é`)Z)ŸÂ * ®aÑ%G¶wF+â}‘cÐE7<ò™…÷.cà”e›î¤YÒ.^ùŠxçª|ÌþÊ'†BÏPù´aíÓ+Îe+åC|¡À-PÁ /BcÎP¡ *\é´t<‹nxå3³~«ËôӸÚB<ÕNûŠzÏPûÄPèjŸV¼ýÔz°(TQB-’œc8ìZ#+¤ÕÌ–Î6gF‡Ç‰æ\£˜ÙšUeɉ4„XÁ8X”¦´Xoœ×š»’13”'¥ ­O:J¢r ¤MÔÅXî ä´K­ ¤$ˆYVÎóB“}%cK4†WS>±â›r 'Ê’¨(‰ÏÞÉ#r – Ë`XÕð.²Ì[dˆÏ-ÓŠZ²7+oÉÞGÇ?©¨xô9P•¥$:z7‹ž,ÊI· [KL6³À„‡Gå cÖ-ê4Ö²T>‹nxÂhŒØ•Õ´ÚLP†[ƲDÑÇ’±î“åäD9ИõxÆ9ÐûØŽhÌg×r wéà[9P¬Áÿ7°²¥—€t.lIõV!Çɱp`SŠõhŒõ¹–’ŽõhÔkÇÍ‚î·KCìEÁb<çˆk0T,QYJRkLhÝð´9оÌpGH\m¡i™†8ñÎ4¸îHCDPèç@£¦ÓÆA€´ä­”¤®ÀEIQ‰]Èì:‹ræ4ò˜ëÂIâx³è†§ÍÆÀAÈ*Vm¡]Ë衈÷ •O …žq4*ðxbåC;Ô°VʇqSzÌDO$ØŠŠ¡–žÃªQˆ£›‚¨†'ÎÆ¾ }8Ýtóò’xñÚçPÔ;WíC÷×>1zÎ9Ш”ÂÉÕǺ•úœXŽtd…*‡™ SøÔ+“VäÜã²è†¤~~ñŸª ,yÌ1 f0M Š’yé4ÓÀ¼:—E©J›ç¹uN“|ëÕzK¢Å«CQíIªùÖö•ÑÜ©Žb(·®Žr!*5-JVã ¯s/cFN¡/µ¶Øò1eIØV•L8š utut^?½œ·¬7R‚}‡4 «jK ¢Ö ê•È•ÕYtê!霅-‰r˜sìµó90°.…—EŽCñ;a¼ÚE´6ÅZRC7Šâï¦ÜsUCwñú£WCëa_†K%BAØ,s›ÙËæÅLÙÕx8eåp<ÿù‹ì®|ÂÆa)Ñr»)ÎaNon1âJ•ø# snDiYSéÕpßTëÍ“‚Ûºð3 ¢š‚ÕŸ)™—wÑïßCíÅËYuV\‘-ÊsFÓ;NDÔ'©<÷KžReTÄÒú>ÃìéÉÌÆê¢<³ùvsn“†4’Yø2œÕhÀî.^ºYå ®\A­3žóx›n'уJ‡Ç“ºb©}êõFáOxå˙ܯjຯº~Ú”M¹æ­)uÇÓ¾_™ÓÖÒ’:d(ô‡,“9w2%Æ”í•-¾Õq;*úÉ{?žÒÿí»õ.W×7¼Vß qê§ê´ôx8Ãþòº£:Q=¶ƒ+ß½î 6?·¿.Ÿ‡ûÄw{£îhìËÞú/ó²ÅS™5 Ç×¶ßûÍ»n¨T\{sý à†³ãP857¿hµ¶Ä³Æ¡,k~dów@ñÓ‹»,žµºU–õ¢®|±,ËŠZäú榭Ԗ[«©qëšKëŠKä8Õ¼TL`j#V976Šžý&F“çÎhÎ Kè'¦8øÚk¤¥­ÿà¤Ì¹–ŒœžÑä³g4}îŒæá¡µ¼6qRúÊd¤%¸ [êÉ>#ø²!K¶å½¢DÚ^k—‹¨“ @JVð¿oV3=˜«z`@¶ô ¦¦»*++/+3S~ˆNà/‘æÚ $ÁØ+Å[£dàQÅb6Ñï~,†H5YGÓ܈úIÊÏCÆbJè;Äb¶=3}c1ÑÒhõH™˜›Ü0ƒ(%ø¨‘˜Ìv±˜’R ŒÅ’¨¶ Kþ²Èa–aŒÚ uöÙªzéRÌ©”ŠŸæ¤ö‹Á²ÑiF•`N7¹ƒ\Šèœ¦ ¡T 9ëÖjä,±(q¡¤{ˆEûø\ôiGô”xê\$C>ŒV¸(×;àÎBu<žŽQ=Å@Kéê—1š|êŒf9V–Œt¤9»‹QdBbȽ’ ôÈQŠ«ÏÑøÓd´×:C²Í :#4éåÚ;˜7vZ¡N âÀ)ÈzNÒ{ìˆ#¾¾X4ð8b1%'¡ª‰L&ëhXîÊŠˆŸa,¦„BC,¦ˆÅþT¤Ÿ0ÂJasÏl!âàÐ «]ï†jOMÌeŸGÅ7³I7T±=YG·÷ºD¸!3»±]@¹Ï8³¹×Ùã #žû7÷ìw†™ÑN¢('žh—ˆ I]J’*GÅ— £o®&·¶¹ðø?>NÅ0Ñ_®g2‰Œ^|÷òÕ–É“?»ÍL>É¥ØÕÒøï”<}º—†>û”9÷™n*p§˜Å 1¬–.“;—Ï º]ÛK¥Ú–ÆOŽ\r‘ýJ®Î±X¢¨¾:ÉõßEEMå¹k8’®nÂIv7sF`5¢®í]ýo{“y”hãM(!£#í $„±:8á7ÍÞm™¼Ÿ^ܼÿÝ/Z¾¼ûÃ÷_¿úÇõåuüýß>TSŸûõœ¬[yPýS¹ÂãÉänµ¿Dƒ#<TR‚ÚÅŽúRce(±Âww{nÁ‹TX·ÝÎÞ8pÌ:2Ô1—àd)Ð/Üšà’䯀SFWÌìƒTí[w Twш `IP˜”3—Ltž š%ÊÄÜËN—±J‘1R¢åÍçËq0M<×1¸(=X'à €=­¥én58è½CÙS ¬Ûk?¾/á=ëì5È GL­‰y;ˆ$£M%YÀJª³_wÝëú­ENrÑf/®"b îxF¹UšWÌ(E¸`š€Œ ¢Nß}³›u¬NrÝ :» î· ÄdÕÄI”F“‡&9ëW¾0ÎÀâj7ž!0GëP™UAŒŠ 0ÉÕdyÊÉCÑçØI~LÀd m`ò3&ÿúãŸÅùµ»{ùý·ï¾¿ü‰|÷¾û×÷09“09“09“09“09“09“09“0ùÀ¤éW&ÂËÄt´ÞÌu”°B:1†"øµ4˜|ÍŠîLÎW‹èÀÔîúä?«,ö¯§•°XPšžå¡èôTok÷.™àÛã’%$ýDpI¼_\rÙ±X P6»øÖ|m±è«·qÔ\i ³ ^ZwQU\hk;tÿ®ªç¿fÌíb|ùÏêÃÉ$^¤®lÞjÉÏÚ鬤óìé—ñçÛNªø>Þ5GÞ·ŒïÇWw“Lýø¿—§­ÖË·Å*F_å<Ì\Åè2~5_ê¯sñ¢‰R<Ÿ+q”¿„iŒíÅy>q°­§5Øxúzô&ޞϾŸlµÔ¹9V‹%rébEÝ ´XçYo‰•, r¯p|V‚ î° L[ÎC-Ë‹>^0®MäÈŠNòÉ:Ú”+ºCçÑݯóa„y¹ÕPmÞ9D'ÚPIÊ©„`uþÏWÊË­žëáô2˜©Ûëåâ…ëNîR]Üe×¶L@ N;ۉÕÖ¦d¥Ç4IcS¬á‚Ýxn 3ïõÄ,X×ö&N«HtÞº,÷ÖÃ47n#É?>¸Vg˜ôëÙkhLšG‡4ÇqœY, ;G0Ž®.WW4ðñ]ÕÆ+÷ãår²Ž0åZîP”yD-7½@°“$@Í @MܸsK ?ó÷â?ìÿ½ÿÛßþùö‡ñÝWß­”©Ã@/l¯ÃJöwÐa+åR6åÄF{£• ‰ò9øìš[)˜tZ&yCî›gW)³%úgÕ˜Ã)™º+áF²<І‘=KÑ$o\PÑÈ34“ûLé•8r§TжöŠ>|X]îÉnÔò ™.´gy™æ©â…¢ŸL§Xáí…z MÀpåAX*Ôî¿ÑèT¦%³‘sF­£Ž« Ñ”éX_ò˜F¦aÓÇõ…¬®dnÄìÒ*f’½Õ2žmœûÇÎm;ø&Âæ)B-áBqCCôÖ¸¨Wrþ¶ÝË‚ Šï~¨¯íË’7®¢»dá¼p’ŠÁ8rkðc„EÆHàÁv— ò ^\Ä›/Û[¥G±Ü+è.Ws%° ³…÷Ìéõ^JNµöda‡_ÔÇ‘mñÆeÌ­¹÷õÕí–y2~÷îî6[]Ñu€uoZJwÝ ˜áÔ ÌÜåO$÷цÀ­ /\¨€Áqu<Û¼qw»h|´û¼q-w»#}¼ ß´–C¹jÅQ-qFX¿Ë 6:Ámb/« 9eÒ>b†­ÔÖÖ(OÑÀ¼>zñ—]ã<AÉBϲ«²?¤ødÅNô¼?q¨­ø$ý¡-Ã1”ûŒ«Ý=ìáyìÚyÓ#Ú£QôÏÄebŒ6Ñb4žŒšúÍ£ãÛ·õ-¹KµºWö3×/ýOwcø4Sáù¿u.%À[¿ê~€3Ù*÷ÌMm«`¶æïÙÈß|=û&S¡ýó> Éü̶õªÙÜû~ɬf­ó›øºû‹Ö’4-ú^úææ;¿8ïÄJ’u¿\±‹í”7pt%Œ*÷ý´ñ`ÌýW›QþbôòÎ]ÆÛöÓW°„›F,cmAú•°Ô‰™b@d-✧D"¦¾ÇÖað¨xàñ”°\¬ Ò³סèsì™ââ˜2ÅKh;DÍ>ÓLñoøÓÏzûý·ßžÿÖüøßxñ _–).zdŠ‹'“)¾[²÷nyæC¦ø)>dŠ™âC¦ø)>dŠ™âC¦ø)>dŠ™âC¦øç)®Î41½€Iʃ¤Dk¤87ˆ3m‘µ6!°R¼QÜS]7Ì+¸O`²g_¶Æ‚šŒèÃx²Ž8å°ä¡¨óˆ ­¥¹eN“àbN꘬sMc rlvLU `º˜\U• ›±Ñ’ ~ÝÉž»!¶§n)ê9eµ·:a ›hBœäP6Á¾S”¤`8$º(N¾h¸rG¦ìòdA¦]±gRÅó»ë“çU"Áɻۻ“ç„súÅIMExØ—_½úã_?™T!#øÓÿ¼†oíMÎ@¨á¹î´%¯ÿéjr~}ÿ¥úIuŧnc<í¯Ø ë4º?ªïRýìõÃkÞ/]ë«&Il<¹º¨þ§¡(»ÉÕÝU‘Ù!}kHß:`úÖ¯§õCJÎo~Ћ^/nEôy·~õªr NßÝÞÁ‡*ÈØ•ëµP-½ABk³÷´Ž4§ß×™ [pÞ\´ñ´Mz;]oœMtqÌïÉϹsœŸÓbÔ1ÿ¬;žv‡Ü;v&´"ò#rèqt:‹=v޽¡hé·è‰´ß,F gSYŒAξë¸;-eºqȳ÷Ò¾læ½ÔZ|1ÐX’©÷²nÔ=ï%³ÓÇYJc{BJ´ÎÎ'¤fÖ­ÈL÷9Ï3´$š‰æC¢ùh>$š{¢y‰Ò}ê‰æ[¯qH4͇Dó!Ñ|H4*‰æûߌ¼mÛY6c+ËÛÊVÈøv”…Eòž9sü79CÁj…¸ÌI~'ÙM€d¡gY(6³?d–úCÓ(÷‡µŸ¤?´×SB¹Ï¸“ìÞGî$ G”~m·ÒI g2Ä .™B–rŠpHŠJ87qT<ðñ¡Ã&+èÒ³ ö¡óTE—~H(§„¦”3@9”3@9”3@9”3@9”süPã=û[PéIðÙ”B.úFÞ a#ÎY¥25×Q‹~†P¥r²b'DÏnÚŠOÒÚÎë)¡Üå|6PNsDË+7~Ýäkdâ21F›h1OFM‘чñíÛ:ÁcÔ¼Jñ¨¨^c]ôèôõ~¦ú¥ÿén ŸæsLŽ¥¨äŠ+f‡()¹‰©w,)9]ÉB«’o_Qrî½{*(¹‰™×”¬+¡µÅóêOmÙ±J,²µ9㪟¹"¤KàŽK=ˆmî1EV)‚0õFa°üœ#£âÇÐv“œº´¬Ó”8åÄ¡¨ótÛn¦˜†’•m7 ’v°aÌ!Ún²Í†NÉm7×·Ý4`Ô W27“9fbLFì@È­Úc-aʹþX›’Úv³àõO³íf®L)>¡Æ›ÂlîËUyÔÆ› ?ÇøÌˆ~ ¶EˆÆš‘Ò\µ€#ÒÁ98‚‚QÅ­ä¤îQ4ðoþ?{WÞÜ6Žå¿ ·ÿñLUCæMÂ[©ZE‘mâ£-9ÎT $A[JT“’lÏn¾û>€ (Yi[ŠœFÕôÄ"AïðÓ@šl5mlµ¦¢ßqx³š~YàÍRB¯Þ¬rft—À›œo~ðfž’À››€7©AŒÈ§¹VÁ: Uä ÎW`†ìÎ,úLËb%ðf;¼YÑ’À›;Þ|†‚Wëu{6ô†áÖÛtêj˜¡úZHw `FKñùá#B)Õ ÛùÅ• ð&ºž­¡MMÏWÄyµÀ›¥$\ƒHXIƒð&牼Y…_$ðæfàÍH‚ÈÖ0Ò¬È5ª«†'RíÀ¥ëú³ Õg°ùßxS7ÜÃÞdk\Û ¼Y–ª¼yh:ßG·žÎ×CÕ² ì¢ À™Ô‰Àdt„5ßµ©8¶©*• þxàÍ*’`ð¦åØÙ¢Ö4vEÕCÞ¬ä^=G[?x³Ê|ü7Ÿ¼º6oVÕݵ•îð¦It=Ôi*øÚìÞ䆡­Yzh‘PI° ¼Y5.Vi,oVúìÏýk“ŸxSî‘øéöHðkUÖîá×–’‹O¢ùž@7«tå'ÝÌ?3즅+Åá°›Utγ×ÈØÍ*|¹.XuEKØÍ»ùLUëË®°›U¬ÉgóôØÍçˆýŸvS7ÜÆÝÌc<Ûxµ,Uvs;¯®0°í†áZµÂ5ÄdÈH¾Ž¨iFLªÛ:ùÇ7Õ6ò •  즩­Ü¶ÁÈc× ¼ìŠ>‡ »ÉIUvÓÈãõ»Ý¬B[y/íaÂnîÿÂÛ: ›ï?ÖÛ¿:«¿ú·clOð·ÓñÙvÐÍ\˜TÝ\*û|ÐÍ_À˜›Ï9ë-;%`§씀°Svî°³ŠÂ~í€O£씀°SvJÀÎ=vî1óo7M­˜4,[‹l~½E‘‰i„ÀR3á/_µ4‡q¾R¹à¡& ÝÈ6‘§F`rGôùÙ“à·ï00Y¶20y˜É0²,LÜзÀOÀ¦Š]#ˆ\ÃWßqˆí¬¼*°Nlñî:»´Bã··ýû›w½¯N˽vï=¶¨‚OaÚ‘­•š‘¦û b"Û¶ 4]‹üQµý Ÿî{^¤Q e°P e°P e°pŸÁÂ*øµ ŸÆnÀ:>à¶?„²ß&à¥pöP’@ACe¶\M‰2%o™„€Kâe4£%Ißäa¸Æè:òæj2². X‘Ñ`§` C?ûÉ1ûþÍÜüŸVPxt|¤ HÑÿ“Ÿ?R’¡Âvû³ƒ¦ MÕ®ÑÐt|¤P¡ ^`VÑ8ã©î¦X—ȲÛòø.{PF)•qò¨ï'º~¤L9bp”ßÛ\ëVÝe+za”ÇG$%ƒþ·¤1NÉ0cg•ŠEÍ…eûq DÑꯊàý ˜Çn÷ƒ‡øŸ+›pU}[,âÌN+æ1Uå¹nÕöO%›@Í d଩ݨBÆeê12ý×çÚŠŠ °W4ê44¿Ô¸\–Q2† ¥`sè-“åç(¯ÛòÀ‰HÝ¿PÁÖJ²Xj½ —åàHGàñ„ì 1E.( Ì(¢ƒ±šJå‚“áÒp¶‰<5nLÜ}=ÃåR†« me†ëošá:‹Í«Fýv¥ŸÞ}ºìô‰ý±Y)ÃåÔÈp92Ã%3\2Ã%3\2Ã%3\2Ã%3\2Ã%3\2Ã%3\2Ã%3\2õ%Ãå4l§Þ ¡©û–åä‡&F¦©ÚÈÕh„"GÂ0'#Ê1É*|æ®ïÛsW¸V·µ“ Ñ\EmhŽ•­¡MÍ AvEœ¿‰•g&xT­yÙAŸg×Xé ËÞ4좚šŽ9"I›$£>*ïá:ÞR d>ŒÉùäQù¢\-É3G™_7’mk°´Ê”絈Þ?£ŽúW5 lUsÀÎ0Àß #×°Tcc€£7‘©ÙVà¡ãZ6töÝÀ¡A‚Aí‚÷©ìÓÖûj<ñ2×~|P¸Ì@¤a8a¹V&ÎYf´|CãX-ß#µÔBVˆUǰB¤ºv„LÇ «ðêûX÷UÃâj…Ý2õX •÷´ kâ!/9U¹U\aQŽðÞÏx5 SH6é%iÃän¸äÊõ2Xˆá$¦Ë˜½™z¨5í`é¦ë"ÓÐ,ä›0þXàz©à[øµ }óÜk«ç^ÅXSu,±Û€ØO©>1Áų,œ‡NvEëE 0‹#Ã/Ä“ÚÆ1øCÚ ÷d0Š)Ó‹%ÀWqÃÈ Pd…À.u︭jYVdÃeΓ¡Ͻ Œý@ÛBWY”]E:±€ÐÂÄ¢(ˆ"pý]¹» ˜O%Ážï}vnÍܸ ¾e˜°´T¨cajÈP-0HFz¤T.øãLÐ[ÐΠw²$ÍŽC:&ý˜£«1„•´zÆè®È$ÑÅ›þMG{uÆh•)ßfŒV­C£VþJ³t®Ø|"™€uåÛ`[vÄÀ ]‘ÀˆOíæ$4|‡+Öòs)®YÈd«þ~¤iVj£¹Ê‹hÔoí³ëG¯JlL TûOhQü·ˆé£åºJØâs‰ûª†Dueµ>d™üi0âCuå™ð$}ð>üvlÃ#6÷±wßࢸ7É02»S¸ü¦xhiúÜwóE£”R/%Ñ€f;ÅCèÞ·¹F€oSvS2KøÄ )¾Oó]pÞt‰'ü;q‰mL½Ç⬒ѤÄv"ipË(uïÚžÍiÇî™æ®öå-t• (šòS: ÄÚ<{ÇcÉ(ëàWĬ`ÖºÆ&. ¾q@jN¼ Iiñf|Ëö3ð_ŒÆ~ÊßþkŽYøägÍÑ_ã(žd·ìOÐç‰ëH³y¬q:|Ààx„7Ñã”[Ï÷™Ò|£ EýX`h‘é}^Ç}Æ÷ü1huÑn’Aˆ`¥úœíïüaÒNÃâ;/óºó‡?âãh4ádÉp‡HLs.^}62²{‹QpËSuI6½Ë‡IywFy^ VÔŸQÞüx4îß ¡,ûi„Ãän”ÒˆŽN–ì5SBïùÇÁ ™ò·ßú#ka£) ûƒ=ËÚ‡ o( zòžøùÖÞáÉ Ÿ¯øáÿŽ‚x0‰Ã¿Øß±Ÿòšã4Ѻèòt †eA vý$¤ â~JQx˜}CÇþ”O@Hsfœúü(»ÉØfá¢ò§ZLn#/ä¼@g} f3(Æ4^²óáä$öÓñìmº1½!ÁƒàÞp æãß4äÉÙ)Qí&OË…0œQÎ –ÙGY:ë_ÎEþ@4ŸÃŒ‚<“†£>oú^•ŸwWüÜs?–B¼ì"Q 89GÃ>oá– ü¯ ¾Éh.ŽÓ0%Ã|\÷yòPÞ»QÄV0WœÓ$gøA˜ €Ñä+!¸Eå·_÷óo‡)0Q±¤Ò¤©øˆÓ›¦£q¾˜"ÖÔŒ G^I[˜©?¿ÏmFrˆ£ê®Š‘¯ƒ•kRþr51ŸÃg©‡ êK;8õ¥­V_UÀêÎ¥T_£¾%]¡f’§XßË‚·Y…Ð]¹UC!ƒ ½Uˆ ! ±0“ŸB•ò¬\÷B² Á³F]ÌDW!4¤K$L) ­:ÓÊ…ö-eè‚É…´ÐB|Í[ÒsZCHïBòÍäl®MfÒÁn¢u¦²©Û³b^ûÏéÚ\•’WˆÒ9õôظ)4ļ,³t†óJH¨¶9ÕSX ‹škNáͬœµ),ªRé,éã™f]Ü‹R~¸`ý™_ª$aQ ý² i…•óØ&›·¯4Í’†ŸP´B¯Î,a«ÌÙC33ë±ýUØ.Âf+Õç‚õVœ3ëÔ×þƒb®Y//ëF¼?ŒÀU2– E9ÔÑu—P†´¡T.xyYÕq³M´©‘—Ýqd(ì'ÈËV˜ò­yÙŠuÈP˜ÌËʼ¬ÌËʼ¬Ì˾‚¼¬ël4³&ã~œqîñ?ó#ñ`ƒ+I©'&Âožy Ö&#°±Àufü¦¥?#OW];JÆn@3…™ðÞdÕy¼ÌS†Ç;s\ö‹ŸËÖÜ•c¬‹`O"k6 ^™úÃvs` Ý0p"[s”Êë™Ù|D4/ÃCbÞ ,õ–÷š‘‚\5n"Þ½¤åýú-ï*S¾Íò®Z‡´¼¥å--oiyKË[ZÞ‡ny» Õ®w(‡eNu tŸcS‚L RÆ5UGª¯‘€R[©\ðp¬R-^m¢XuÃtW$“†é¢aj½:³´Ê„o3K«Ö!ÍÒM ~­eJó ‘{—ËZÍÃ’ªI5jÙ`óš>³{àß5À 2´«0sQ*<¨hÁêÍ몖m"\uñ¼+ÊýìâÙýl^¯2åÛtÕ:¤€–›×åæu¹ûOn^—›×åæu¹y]n^—›×åæu¹y]n^—›×åæõuq2CŵâdŽ¡«– jÔvŒ™¡ëƒ7îkà—›Väû‘†I T.¸Û8Y‹¹’IPA1í³Îqÿ÷úÖó«Ét+ÛDáêµ]‘ø…j+ãE¬ðŒìŠÖÐñáÄÔbÐóh ЛV×bŸXÚ‰¦µ¬H’˜jŽ“À*eôqšÄìÅ0AAÑÐÚÝ2eŠàÛêO¶Æ×ªpÀÓbcÀü®`•::ƪnRÇÒ-;¾bJ°ý†_kO|# ]lFº‚‰i›¡X°f(öÛßj_Á_qcíÃï^ëòÚûfãÙÙ&â[g—×½¶÷ùâÓõYÛközÍÖï÷Nïƒ×k¾_Q¢ý¥×>7ÿ¢{ÑúØîy—­Žw~}Öôš§§óNï…;gg×ÞÙÅ»ö'øqÕë\Ì¿îœ5ß·½Þ—Ѓ³{3×Ón·­/?šÿüªÝm]·½·§ŸçŸ¾¿j^~è´º¢Õ·­Ý5^5ßðåùÅùBsÝÞÅûôíu×;}×Z÷ªÛì5× òcgþÍ9ïsç´ ÏÙx`<. ¦¦sÞk_6[í•“´XS[;fÝk·®¯`j¼ëöi'ÿ}½¸èmèÍÒdÍñºûvyjLme›½Ë3OóôµlѼî­cŠßZ¿ëëûxÙ‚ßkëeû´‚“Ï®?õ:‚¬ëæéª³v(º§®£Ê2ÍqÔf¢v[ÝΆ[««ëN>‡çó¿›­VûSûª uv×Síª÷ÉÕ ¼¾Ày[ÿÈ–õâtº #èA§zíw^«}ÕÛÐj÷²yyå}þÔ<_Á8ú:’t¸j=l"÷û……ø®ý¹ë–ÎûÎù¶åÓ^êf·mpš%QíÝÐ!M¹øg®²½o‹Ù¶ÜZ³Žù¥ý!óldZ¶‰pÈvø®¦ÿS•Ê_Úb~IÈ0s,(VÝÞÉ2¬fJØÒÍB†U¡­„ ;LÈ0бë8!3Ë©I5Í5‰m¶ï‚mKÍü~øâk± Ñvq‚4| ¬Ûš~T5ÇnþûÂ@Ö»VWÓÿÇ»~ˆÎz_n«„8æÖ@s_q ²î»¾cø@âEÄT=²1‰híð,ªî ¡L‚ŒI1 2&AÆ$Ș;t±*J÷µƒŒ=yŒdL‚ŒI1 2&AÆ^ ÈØ¾c•³ûQÿ¼ga;ð;AžTTN“É0TŠJÿ÷((à~°kæ‘©±Óÿ†…x¥:‡ÓÐAÕQŸòógl"Yùþ³aƒ»¡šºD£¬^ˆXeÛô+û€#q{|OŸ7ÁW½”EéŽã üÐLS_5[½Îç6$M|h—=üןìç-Iyzù4÷ÝDÜ¡FWþJ2o”À‚xÈ?b‘,VQ’޽Œ…¹úãOl2,;‹Àk‡Õ“&@µô„ÞçL¹Ø'K?óŠà‹­Oy|lVdtûõÙ¾¼‚ºe‡Š"½aº„‡Íò.Ä@ÊÈÝÙ¹¶ÅÎ;¶ùìÁc‡‡½[& ú-½ž½é¦¦Ç¶ÙÐ,ó² á=]wöºw!Í‚´?*bz|+€ÎvÓÁ‚%ÇäfÖXRqB9·–t|bZ_Y=å9æM¥R:í³|¾7œ°X c§ïÊl¢%©’³ëòÖÔÆN­|ƒkjªº`²å!ßÖ1ƒ#t¶úJå‚/oÐó O8q¨è Ãp²M´ªžiرþðZq:“Ç@Ÿ´Ì¿F`èXµL×âz”Å®hÄj5 ±ebÄŒd††‰ÜˆXÈWÇõ)¶UƒìQL¦I*>ò£PUÝG¦jÈWœ„¿"à ¬Á;n Q$L˜É$WÐUt ˜Vß¿ï/Ecê£1_··i¾Îw½r§@4îÃ\H{bêµÍœ·‹.z×:=ag @üG}–4ùå¬y~Ýü”oBfÜ i£G®X‘Œâq»ô’düdÉ×o=|ý:ÑäûË÷½î|д†¡Ö;SOŒÄ®m#ßá°S¾ òØ4jÂjÔ L-3OãW*xxwTá¶/B]µ/¢¤g+úvDПü¨½¦Õ¼ Åpì×wE_…)ßzE_Å:äQûg˜g/ªj_Êr//¾½î|ÊO°”ª[Øž¯úþ“X¸„ú»8—Øá_Ï\‰9‚Tu'–mPÿ¼3Ùq¥>€1ójxÿ‹³’ìˆ_Jì/ÝÇÅc:º¥š’XœPÌîÈHü™¤ý›þE_ŠýZæ…é¢÷0§;B–ñ–nï¼txsBâ8¹ãç'a_Ø¡Ø_D-ß #‚«‹h_óCs<ÂÂ÷¢ðI# ²¬s95‹‰›=±‹'ÒÜjŽÒä†VL:”n顿ד¥hXAÔ€×â…i:{ö>l"®ÈƒŠºWŸÑu÷ýIL&Cvãe¹-kñý˜¦`h–·ò•%XWº½îɘdß¼Ù¡gq}¦ÈÂÌ›ÊBþ¤‡ËEFÀŸé¬gó ±0å0¤!š&ñd@³ñ/tgÌtuøKšc§„¿ñ_Å_ÙqÌËožÚ¯™ ºÞ¬·A˜Z¶åê†SvÁ\éˆIMj…Ø7£ðÿÙ»¶¦Æa%ý~~…——9ûà`]lKTÍÖfB†É L®U[)Y’™@.l.0°{þû¶l'$äæ „%ŒæâXnIÝR÷×R·d¥.¸µ0Ò_ÀÏ5è6ÅГñš0™ºu09ÈWÁä´42˜œÁä Âd/djR¾=%㈠J…š®Æ!UØ'¾ÌQ®Ð>R4ð㸱 ^¿/x3xýnàõ(.øÿbߊûN°g¡;»#ž`Á{uôâûmj¦ûÌáT MO”öî„çb}þüãŸGܶD4,”ÜtcšsÚaÎ(Çë}/À&*Ò–®KÌx&¶à¡´Ã"ÀùÚ ­Ô·èSŠû ø¹æ•5›bèGúd] ¿…ëáiD¾觤‘ý èg@?úÐÏ€þ Ÿ>è#s Ör ÜEh-(îU¶¸²Ak›!Žmŧ}Œ<Œ‰•ºàö†¦p¯¿€Ÿx=(¾)†~t(îþP<ÈWAñ´42(žAñ ŠgP<ƒâÏ øÛCq/Çܬű˜p›ûBÛÔG¡Í'6 BÌ„T^&È1MÁ­…â®3Šù¹ßC?:÷þ(žBä+¡xJÏ xÅ3(žAñ ŠgPüí¡8Ëqg½£#Àö‚ªQÈfHGYÔÊæ’ Û“”…ðäK„­Ô·Šsn€Ê˜Ÿkܼ!†~t(¾îÕõÞBñ4"_y7rJÿ¸P<>‰*Ãâ,îÏbñ—œÆ‹èéŠSšPuÌuÜ9ø›L³Ò1¼äHÃ舺éwv9_Øk ÙQ ÅòöˆÞáuöpˆ&sÞ‘û Ðõ\ˆyƒ39Ñç\‹ÙýI§B€ÉŠï’\èR æR ú¢Øûq}yÛ®]Fa÷þа{žó9Yïà µmNH‡‰ ;@ Û<ä iIâ(ñT·Ö«a>ë/ãçÇÐlˆ¡Ý«aW“Fä+¡II#ój2¯&ój2¯&ój2¯&ój2¯æ½ •9ëeò’0D";”BÙÔ„ %´‰VÚÅ”JO'‰§i noú€?ïhÍLÞ 1ô£»|=—cÇß¾LÞ"_™É›’FæRd.EæRd.EæRd.EæR,q)€^¾^¯îÕ6qÁ¨íää uÛÓ¿Eû¶¥ æÛ™óeÓÈ&Äx~°ã–;|ÞW¿`¸÷îšýn/¾ã{¿Ö®„FWE÷{Ùž¾ÍÇ6žW>æxÃÜóõ{ZÀS¼xn¶Ì`KÀºy=ÕûKÍÖsÚ7º×Ñ­¤¥sû#Úf\.+ÑíJß5'x¾ Ï»wJÌ+½ÄŒ­8ªêÍÊÈïy2í'Ç;Ûàeò‰¤ê{1€õ ¹ÆmkV-g¨Ÿ øf+-6# °,S›è(ëÓ“/ÅÂQåkéàóî¯n[ï>‡­Ý(·]P÷¿šh¦y¸:V/VWZvÇkC«×ÿe¾2Ðëa߆{ -Í• ÐIÛ±àµ-ÁžÊ_]k§ôðåäìô ÔWi‰³ßwÁÙ©syþ=¼ _üv§Î\x.ý¸À§·Á\žW[²Å¯å·S¿ÔùÞ’˜#Ù®´J×N³|pÚ.?–îö‹ƒòcÞ¹¨9ÎÅcÖo.¯Gû•›Ëƒ2¹lÿü]9«\—š÷Í€|¿½DÜg¨%IõWpžo×J¿+ô¨^¾/_—îËð}©ã\•¯Þ—÷óÉŸâ°\È'åJ.ü‰ÊÚ³ýÐß.Ï¡/ç߯/k%^ºþÒº¼.?”÷¯~B•ƒâ rÿ6·Ü.ÓÃúÕãåAõº‚/oÊõÓ닇R¿ÔæâL…ê <¨8gè>ês]â£ý›Çò~ èÝró;/íÿ¤OíÌÿ>¼Î_%åŽê7(*wu{}yÖêµÔÁéÃ9®Ü«ó~S¶OrúpO î/Ï.Ë×yZ®9PGõ×a½z]Þ¿Õ¿_ZÆÕ›‹GÕ¾Ü/¢ \n¾ßÉv«sNª·ÀƒGuðu ¦ÏER¹¾rA.@ï7ð«ÖòþÿÄÓ½/í'å®oÜ£ý¨Ü»ýQýbìËæùɾø0!ûiž>æï+åúOgÁ8…>ÁØx?ãô7ü¶Xþõü{’¿»pN=æ›?ïFþ×E¼XþæÝ»‘ÿCerNÍÈÿ&–ÿÕçÏ;ÖÿZƾzÔ²ü¿V;lŠÕzc¿Tý¼«r÷É4‚›Žâ ol}–UÙRØÁ°£Z:2 ƒn·e;ûËŠmh¼ðú̦>‘|~°Ã]qÛ4×ß ×;Ÿ¬nÇ2ÇúD8~8ÇHaþÉ2P²!Ûj5L™/vGøb×ô߀â°e`eÑ’x:lÐIÁ8Ñœ˜žV§¬A÷YÛ÷0þd‰¾õÉ`•OÖ}sDôûàùªxt^+Ìa0£VÜ À¸Í›n. +2·¡Æ-ˆ+ÕÊúgâ;[8ð‡Èó‰hJ•z±ú5_(ÎÒ4¥"JVšÇÍ+Nª šÆIñk)~‚¶Õ—´fFX“}<©}™ Es묗¨‹üI}Ñ øY8:ËÛx\€ç…t ÇçŒäòÉa½”°u‘œª¥…]Á gWfyölD-gj­P+-ù¸PªVO¦Fr~Ÿ|ÎÊ;,Vó@³¶˜kÕú!C„/.P)âfZ/`N©6Õƒ:4ª^ܶ%µÖŽóÇÕÆéa¾2gààE,)MwpÞ|XÆîƒ©‰¸_<-Áü©sPª¬š>Å™fÖŠdǬuÏ¨êÆ•îèžH–µ~Ûul0ÜÞz ¾OµKHh»I›*6šÉÖØ9ñ(Ç®´R|mÄŒ¬ã£Úd¯<öŽN³ƒIv ºÝAu:ï¦ß'Ž¥GÀ›bÙk"àç`Œi7_gÁ¨‹ir\Q\~²³{dNÁð•Ø2 oÿ [®Çýa‰¸–š¦&Â]D±‹ðgÆ„£F%T×ÌØ‰¸—Ñ~ôDÐþh‹Ú„ɤÓùƒ#äSÄ8ö1ëyшkëvM5ûÿIûAßÜ6{Ñ®e²íY UÓÄÅ}½nŸÊ¢“¯•‡ç7ßô¯ïøÏ¨çS_Omí³DÄûãQøI³ß.˜.›´ø%\M+õ"®Æuõãæ¶rÁÉÔI\BÒ'ÇOð@‚Œ‘£Œ\Ã|Ò^€¢'›Ò‹P?’|íRÆ8ìÊxtLPß—žz.õœÉ¯Gá01˜Ú¸!º£n»Ð›gñW-Ó¹1ÓQˆ“ÀÅR *ˆÇ$ruˆ$Ã> á)* <é…à¾ÅðÐ­Èø_MD(DGˆø°×š z‰kµ1Ú#Ïך1ÇOd§iFìYÔ ©À· åh¨aÎ1Ä—L….¥3ˆõÄKº°RÓ,ìÈ›ò‰ä,”àφ2]€©Tç^Ì‹QU_7!ø„_ÈzÄ׺Æui •f>Œ&ÅiàS¦‚!†Ì{IGáM ä :F‘U©„<Ýzî»2Àaàx: '˜v\é"™`÷×ñ±a)¤ë"(jO MbÒPOZb0Ó”x“ÒM"„&åu©tõpЃúŸŒ±ç(æ:Ä!”€òFIINèí¹ê•W»p{ÜK'ޙ楑¥ü€ÊÀaŽGA/QW-8b¯"á¤ñ¯1{}æŠT’#P"]F¡)#5VqTìH¾£ ÊIù&ý_&âþ}3ìLè ª\æ‡KEµ$œ£Ð× ™&¡Ákp(ª2Í$@»ù“ú·F£»r,<ë'gÓ& f¥”/…r]Á=é{è•rÜÓEª †ßËûø4XxÀxˆ˜G@iQ+20¸f¦ryhJtcgÁlÍNi„˜KËÆËxõ‰—H¹>•>u£0Ã\J(À`ÌÕa\è×áåÓâîbÕÏR …9]ð)KPi û%\¶Ò¡€­%Øeák û5V§SH;@Tsè{˜]'@.(}9>ÇHÄf$í©Ïra™¸Ñ À•›Ð¡8ùÜ2ì \!8‚Ü8^"Åü5X5ªõœšøl'B$  &xиDÄ®–E{!0óu†ì¸‹ Ai¬|€Íü (@I™Vö¤I7` ð4󸤍ÁMµÛ¢@®7)ì1–ÉZšØÞÞ™5èñ¬¦cv? 9ã‘f”;‘/•u\k*·:•°g{¡îxFÐS„û>¢.aˆ†Z¹X¼Ž°“~,VN^ÒƒwµVeM4ìE<¼|QÑúÚv”5"ú?Ÿâ%î‡ qhŽésmJ\nƒWŠmp8 S§íšU#HSþ%©$†Î8ÉÉ[e_ÍBµ›8"»1¼…¯L&üÞ áQЧâtªh!i@½æG›ý©ÿKô¢í寱ïþ)YwX£)ÿÝí7n»0!âÌJ–!Ôí ã\è_Њ*Jª:£…S¡Óë×z{&¬Ü Êé6Eké{ Ç£Å;³¶~­‹ÜþzèƒöhÆÉDƒFEúúÊØ’Q:”@³”»³uϤƒ4~m4âßÌëñ›æím$ G¾ìF-Nšï¼Eï&âàGœia(| ¾#ž8hbãG•%F 1ˆ—'—–0ߣ“dH­(ÕÓwM³Ÿßè ÍZŠNÿ²’~¶´v{V<\çÌa“bºÞ1¶žt‡3i›;›zijñˆäøÊñ˜q2qª‚¯½ß€§÷þ [ÊB&¬¬¿€WlÍÛ"6ĬwŸy=•›ú‚lSº.ŒÐd}Ĭ!Uãt´´ù™qbdòQ*Çñq VȦàŠÚ 'á!ñ•ÏÕ8Bã‰*J Ìpè46Æäüýë[4h½-Š£¸•×JD…BŒ|àãÛT+asßÕ¶T!Ç.`Dæðí»•#ÅÔZy+GJ Ão Ã=]òzšÑ·ùdÙT­ØP²lººS$˦O9p鱈òjw~4¯ªÕ¶ fíöm#HŽ2¶ÞÑ“˜1¬Y`+_Jw%swïÇüLô7ÅÐôÝuþ®‡§ù* Ÿ–Fô3 Ÿý èg@?ú½º(s æº,ÇÖ„âž§ ãÚ³ Ì3›:ȱ…[JÌB ŠYºÜJ]pK¡8ʹõ—ñs@Ú 1ô£Cqÿ/€âiD¾2À3% ŠgP<ƒâÏ xÅ3(þæPœ89¾fø W8Èá6FÛÔÓ¾-4§¶ç+©\_øZ1+uÁ­…âˆÒþ~®y›è¦úÑ¡8ÿVÅSˆ|åªxJÏ xÅ3(žAñ ŠgPüí¡8Î:\ Š£0Tr‘íT#¸ÈÀ³ÁÎ °Å#¡¬Ô·7a“:ýeüLÅ7ÅÐÅ þ  x‘¯‚âiidP<ƒâÏ xÅ3(žAñ·‡ânÎqÖ;;aÚK›1s³›§ÔkhæW+õ‘ªàÖ®Š;Þ¼XñˆŸ|M(¾!†~t(NÖ„âÞ6Bñ"_ ÅSÒÈ øÇ…âñ¡°ϰø«`q2‹ï¼ä`äXD‰r…šPÎñwrÈqræï `V:€—œ.=ýÎ.ç {m!#*¡ØCÞÑ{Rïhk,šÌ}xGîC4@×s!æ Îär­7r-f³e' &ëN/u)ÐGs)ÐËÒ`Çù®Qll»v gÀâå)°ÐFÿ½kmj\ײßï¯ðð¥ï­;v$Y–e¦ºÎp€æ¤oú4ô¦N¥d[CLœðºÓÿ}¶lç‰l4êªîFÖcKÚk­­›U“5ž1 l“H™”ÃNð}ÌÌÀµpæÌŒÒ×ö„–̱§[QÖ<“AuYã¼YSbÊ”5%ëвFË-k´¬Ñ²FË-k´¬y¬¬a–çáJ’"pP™QÚ&õId )„i‹Èž뇔ùFé‚ëûý»0iIÙ“T“ÏeP-)¦$!È];IQfÊ’eëÐ’BK -)´¤Ð’BK -)H ¨oëèè˦rméKpsèÅVÐo]¶DGZòF´/[Rq¾‚;c5/°!FÛxxÁÌzŽDÑ]g°Ü{WqÒí¥ÜwôÞÊÍÃDAEÃׇ¦ïÚ5ϯ/{ä¶uZT>³xS½s÷fz‚§l1 [j±åd]ýz‚ª' ak¶î ÙëÈVÞÓÂñˆ¶Z—‹Jt»ýf(¯â ›×àçÚUXhêôr{à±±+”©îCû×ϯ^eº°#'¾Êq-ú0 ^3¯®yÙªYj1À%–/@ ¨³´ FÀaª5Ñ wÿúúûîöAãC}ï}í¬Û–µ»Á U³À¹ÕÀÝŸÅè¦úábàË̽ÝÀ0;ÆÈ½äÌLåLþï·LúÝ ÒDüÚ Oƒ³®±Q¿ýýë÷o¿C{–ø~såÿ†N~|ŒŽíß1\» ¿;ðsý_ÇäÛ¥¿çõO~|i-ï<øã›[ï|lÄÃA»ÑªŸ£ø¤ýñbÿûñíþQÐßß;¾iÜ"tòýËÙ§£ »ñýkÿ˜|iÕqcçcû`gË©Ç×±o¼<Áßq+°¿œù?¶âχõ›ÆÝ1=8Ú¿Þ?ß·÷w¶nëtºþç5|Îÿîö··òruʦå¶Û÷Ç!o?Þžü€±üøx~rX÷êí“ødçC{ÿ|×þtô{[õ·±÷íâø9»o­Oß'ç·£?oOÎO¯ëI½íÝŠïaîµÀ tü_«1ýä`çân§~׸ƒ~ŽúΟtÜÏ­›Oç[§y¹Ûƒ£ ’–;½bqÛÂÄ{g(*Ù ÚáÃ4¥˜_Ô†ü¢¦Æ¯ÈŠø"²2/$žÀ€;ÙV"Z‘ua2úÝ™¾ƒ¤~gˆÄx§¸Ê;ã:îIÊ7Ì¢ …½°Çö¹Àqã‹®•æ]v{ý¬Y£24þžkgƒX@Ïóðry<ü£éYÞ? ›À˜<Ô„ æB]y Ðø{¦-A ýÃH©Rêøsjw˘ñ¾õ”™þ{Ê‚mµn´qùØûÜõŽôz_ÎzÈõ|ƹi³È3iÀ‘)õöÉB$dhû.]ÑzG”xÈ¡ÜùÕÖ;’‘MǦ¨#fz$à&·Ã0p£;A ÆVæEl-yèiÌ\ƒõ—ôÕdªŠá¯’ê´ÒMæ ÖÕôsýäÕè'õ°fŸëÆ>çnšBÒ9ô\0æ€F!즀¢.6E`Ó \ŒC’rw2w¦ þ,Ͱztº¼±3ö§‹É(‚9 nÓtŠ8Êçk”Ò9Θ=„%ÊŽl2õ ¥$oûQ ÒÒÃð<SpÏ6žþŸmfgðy&ÉÔ©;9umÕã ´–“Ç0øÙªtG’EÃÕ ótÐq¹­AgÝ@gÁ¶Y;Rp[ºÈB"øF`rác“!× B…/é$ìÌV^„9ÊoŽÃzŽ%bËĀˎa‰óøÖ§QFU³*Hoz€¤§R}i;…ø4T×¥ìõã<Ÿqb›J¨¦§Ój6ŽÎ¤¡Z2º‘чÏÃè³*o\ŸÅÁ™Ñ‘24fVÄ0q̤ú£”Ÿv\>¥¡ë3«&-2‰ ª˜UÔòÏÔòÿ;ˆ{Y‚ÑýQ¯:Wˆ[ y/ÍØø|pøHlƒ0î§4-h.Y$Y•çi­ó'=âJ‰üÐô<™©P–Ø =ǧàa$ÓæÌjŸÌ 4§­j2Œˆã,¿[mõ*®a˜xXŵ'A7Ý3ÿó×Ïç"O†·™•WsÄ¡íIÓ®c¡éÛ¶kFÂp]ìc<‡Ý`®ÙÍó³¼Tv33ý‹…t‰¥1ÉhV±…Ÿâ‡{½Y•Ën\Dê–ÅÓ³s—L֞؅iÆ6ö– ƒ#]Ê]Æœq¬à^\ (~°rBâ­g¬@¤>¨©§Aˆ||:8ðôàA=×-60¹M ¡s²@F_ÆÍÝ ƒ~ÜJÒ!5ÓYr €NÎíÇ¢eôdÐ/Ðï ¤w”7àˆ1š?q,1(ÝtàîfZæ1£IÛ®»‘¦ža^8$Žñ‹¼TÛ”,Ú¯ªí¦éB³*¯ÌoÏãÝÃ?ŽÒïøÂ€{W©žË¤™y( ãç+—lIx!¸Rl›.w Ðké˜ÀIÕsŒýÀw}‚]C‡ˆÆšµTj‹Z™±(älñl×q0óî¿Q‚ËçÝÆN½±·Æâl ŽcÙ¯ÜNeW¹åiAwß-OI<1èw1ħ§é£.†yGyÓoö&8ƒ‰oÉN$Ð +ëC™)%;áÌ•¨Û &S¼–.ã@o^µ°ô,d“õ–å×%RL”FÃ׺óéºÓ£:jý„g øªÃAcï@3Íž—1l ‡Ê V~Æ÷w`F6žHT` n_)± ØÂØyÄ¢8 =¾&÷‰ÅU‰…ÎvÓÄ⥈EúeêÝÝM-4µÐÔbòvïe©ÅÏ¢ˆe#Ûãìe΢Ô8{l ÍaK\!M³%Í–4[ÒlI³%Í––É–ckŸ:ø[æyÔvÿÔÈ ašk,‰k8œj®±Î¹†U÷U©ÜÄ¿»wBeën/zü!bÛŒHÚ„B“†.3E€¥yQäû ¹/Æ”£*¿y^‚pÚêú@R†£mD‚¾ìnìïï6r´4&0açZYû-“<¡ýiVp?ëá¯U£¢íâµGÅR“~ÐNACáÓ¡QGCá:Ca©ÍTˆí4Ú-B»û‡ËTš+OÜ Ì^cðÖ;žÛŒû–ÒâgÛ¤¡H—¿¶= ¤ë ¤ÜX De$C\ãžÀ6òl õ|N±é‡~db.‘K õêfïO›îF.úB^ß0ðœ‰Î© _‰fþðóüÙœYôLš,ûAm¹=jeM°t$¬Üô¦NŽ # äÄç¶I]LM?‚O¡ l䲈¹¡\Á$¶ãÓÞý)+·ÄžcbËšå&¶bÓ“»rÝîxîKRÏ[GÛ¬P¹Ûs”»ó+¿@¶”»ô y#¿Ú½Lß(Á~™.¹­ÁÔÿù× å>Ó‘o-÷ߢܟ@T-õW+õïßNñ *sÎßLøœxs²Ö8÷´ê_žºZõk<}‹x:ñÅE§ ðt”ñ•n;ø?ÅÌ_^©…z;§Ó¤0Qkd ¯ðjkxÕðªáUë†×ÊðÊ,‚½·¯OAÃk¼2 ¯^5¼jxÕðZ^¹e£·Fœ%‹Œ áµ^¹†W ¯^5¼jx­ ¯²î¼³W—&sŒÀ4¼ëƒ4¼jxÕðªáUÃkex%˾Ëó6Ô«ë$sŒ _:^‰†W ¯^5¼jx­ ¯Ôrß¼zEÁá±4¼À+ÕðªáUë†W ¯•á•YÜußNjÆÉ"#hx-€WÚ¤áUë†W ¯Õá•[žó†R›Ü¢ÌáÔ:sx¼êÔ& ¯^5¼jx­¯x{KOe.P¯“FÐð: ¯`Ú¤áUë†W ¯ÕáÕ¶0Ãoú‹9“FÐðZ¯U+Á±†W ¯o^§Þs¨öU¬Q/ °Ë|31¶f¿Ä«‰Ó1›½¡7MæAŸ(kÒ Iƒ& š4hÒ°\Ò`¯õßð6%N’EÑ`ût°õ¨­ÁV¿Méåߦ4…}ú}Jëú>¥EӨߨ´noTJÑ–¢g{œH³7èÀ½Rt—É2õ|Õ÷–§lcŽ´ÏÇ¯ÙÆ¤=Ò/A^ki_u_- Y…™;׺_ëþùº¿´._94:”®)@ЧݣÝU¾]'‹Æ­!±*$¾jä{å¨F_]ÀzÅÞ†Q´6ÞF¡pR+K½='™3bŠ£ýÌzû™ò;áå=ŒK¼µò0MÕÉ4Ô$qh{Òt„ëa¡éÛ¶kF‡w±qªòÝdÑе«Ñ®f­]MÅ-ñÒ>‡Z¶W^CAŸLÞ®°}ðŸÄæ&ÔÊMNÜ)e®$ËÐ1J\ºS‡e¦‹X¸–m§¤ù!ŽLÁ?T†Âô\GšAyÄ¡$‚u ¾‹±ÂåÈ„å|×sÚpÉÎð‡9v* eןH,‡½G8×/Á,\¢2†Ý½/ 3].3å‡åzÖÿ\hœ™Vò½lÆ¡ª¯ìÄfµä½B3N8 ®©ÍFÜvò•½(fNÀíÐå£ÄgŒ® ÂQÊ…ðVkK¿´ïu,ÂX%ßËCÇÁQ˜.áÔ¤0_¦42·‰Œ\õÒ—{VôŒŽ—»…ßÄTöóª9Þç2à¯îx+>ó3NÖÎ%—™ò‡\rÙ:qÈõÚÜ6zEnûßY°–7²¤25©á¹Qî=̇=¡™µebFÇa®‹†un´±µ}Tÿ¶«®¥7ö›Ã­øÜwm»TÀŒD‘`"óD$@Ý0€ª‡Å=»nJ*1æT0Çf>g‘'©Uñ¶ì عB ûgž YOïöˆçXÌqPä éÛ÷lj ˜p8#(ŠqY “ú„ G°4%nªMX’¡0ôê™LpϤ¡MM ÇôQàr_z Ù|æàlöIõmæ «äêH;“ÔJõ!ͻوZ⪛­„«à2¬N¶D[}"\%ŸÆÉE~Y^žÉ¶ì Õ_¤¦ñZ\滽ø4îˆÖèh±-˜Ï®¼ÅÐL.e¤-]7{ÓMÑju¯ejµ£Þ@nüü9Ί-L‰%ädc|ÂV|¼FÓ"" Í™µWaµÚÌ¥.¢Ä6;²Ýí]dS”;Wøæµ«Ö1²0B–úW5zphîþ82ëŸ7‡IDQ|#Ãéß™û[Û›m4‡µDb³M[nrÓÇ0ˆ|j€^’Ô?_QUjcò ^¹¿ŠÒÃÐǯ Êþ%;x]Þ®Öö_™iw¶?lªe \"ŠOU«û[¯[ŸÒä­^÷T­…|æ±u²)®DÜ~ÜŠû·Í;påê>ÕË49;­©öâ+9Z pýBŽÏóàÂ¥ >MHPÅ.W#$æd´ìW^H<—u!Qñé¦ãµÓefü!Q¶Ž‡tÄÁ™è’xÿõèƒÉ_½¬ ¯* |A£ÛÿÐt”xÝPáô3åßI’qåºêx9£”' ºƒVhtº}Ç;TåÖÆÊ1ÃAÕ‚ObÃaØ”Ž #ómdÂB‘0P*]ÂÐÌå•*ø*ÿHF6A›6¢Â¤b¦GnÂr7 ±*‹ÒdŽ Ýj°ñ\6|Ó°±VèPfbB‡²u¼ÅÀ™-ýÒfy®øw¨æ@ 8ðìKUd›¶xÉ0 }a”.øòÿ’Ž—ò9Ž7·_…Àÿ3Póõ_ ð_bÊ ü—¬Cþ—ê¶ ÿejzbàQâ!‡rGþuàÿqŒü³ üÛËü‹h“¢M⿚À)¯ðLÿrm¯Wà»:ðÿò›¶š¾P”„™Ž!𧊧8Œ€ˆd®Œ¢@úÈ6J|ùÀI!¼ÂoÒìW!ðÿLüÕ…ÿ3þ`à¿d:ðÿ¼²¢zà¿”'zn1¯ÅE”Âi¶Áî­ßÆÓ§Ù¼nd9|ŽggÑ_(Z’3v°«Ÿ²nÏ yxûz¾´ý›~NÑážæäs‡È…ÿŸ½+ëmäHÒ…è‡õSJy ‹]»ûfÃ3žY0ˆ¥qýª¿òޝò~y·X'µFLæns^cd=KÈE°9Å_IÞ—Ó¸ïHÞ+N¯íwBÑ)Wa0Ç"Å,%" e2:hÄÁX»œlBíªç/zƒÁ}^O"éd…:®'9‰®Ùˆð›KFÔ0|W2¢ö×¢æ6…ßR¶l“Ư‰Ã”߀É{?ñ¿”x²m–×øþ(»Æÿ×øÿÿ_ãÿküÿ¯ñÿ5þ?½ßÉsØËޑ߉×ùe–×Þ¼üNfºùš^?Žsu;¯nç¹ÜÎ#¹DSÚoaÆô{rMç~øÛ.ô»:I›¤×7àTvkÉ!Nä]: Ä•NH+OIqá• .õªž/?š ö³W“²–ÐL¶‘§>{*ú¼óì=ÇÓWì æïkX¾+_{kþ~£¾oLÞ瓳âC[LQYqòGÀŸýÓhü©Ý˜3?ïïñü|óÍÔðE0X1Ö2÷{ó ?³>ùf» \ùÃ&á×~„«òfe8þðô ¿Îé’ª4Šú<;xn>˜·í~5ùÅ9à·ÿj*d_Íkmµ¯òѤÿ8 û³¹(ëo¾ÑhüÔŸmgnåoþ¢a8qÉ~b~N¾ÏxTÎ;޳׾üN_`%>·ëO!ë.ã—‚ ³!¿ü9»ïO©;¡éI¼{Y*`Ѽ20 àšÖ Ï^Ù1Þÿx:£ßÊéÙ™ÁãÞo{ô'~TÞ¸}8'7[Ø7=¥Ì=…Á¿Z‡þÏ9ó^êéÃÚ  Ä 0.*15Ÿ¹ø)ßg®êÛFã—A¶Výáóƒ+f–€³ÞÈÍ\C<óŠ“ QäÁƒ†X…r $$Ú§HIŠkHóнd**ÝôyðØŸ[|>S—ÇÑè~I¸qî‡_ü‚›BÎ^/ŸºƒùþnAmKömÖY¢XµA/Å·´ìNÍ4C×ϯUDàŸYÕÇOKãK{¡8 Ë·«•å¥|ü·(ÜL„²Bffµ .g‡WűµqE ç@Ò(Õ•ºH¨®’P½ABqwä™ng&ÓÁYMˆ(èÀÌj\P šXrRiGÂÁ2Ý<ô¨ ¿ç§0ÚŸ Ù0¾Ês]ÖŒÈ#“ ;žAœJ…´ 1Ï‚LÖeðÒýJ{Ù©àiof½‹2Q…”ˆ1—c$¨áÈsj=2(i[5k5¢H§÷KêBá_xZ‘ÐVÃ&Ã" y¢ÿZ/›xt/‹Y¸FVÝ «tYí•HxÜLF÷å¡™æ@¿Ñó8×Zöñª–Ü¡ìW ÅÖøUô†jÖ­ý)#\æo,)G1âÑ€ðܘȨ`¨‹D´ŸŽ©Ø-iðDúœÐoîídmÒ >?Gúß6º:¹­pSF_bƒªÀ©œ|L`³{äFãuŸ“¶C[ÔÑö蹄9‚)€”€¨Â«8(‡@krÛ"âÕ<梛i?Vn¦}ô$¯´ñÂPÎ(†±¤#ß&~­,&Q2Ç…Æ[ ÍCpàÒ©Øëܯ¯`ëÛR4%“ŠÛîÕ†®7mó7„V¥"ÃâDÖ(‹I‡ΔÕ3³›¯ªqHK°ÞY;/*…·ºË^9ÍÀUÌŠŠAR ¯­ 3ˆ ›¯ 1b’’Þƒ™^õÀCÍÊjWíÓ ~þ°›d“mT¬· §"ãÙ,ÈK$¶îðÙŽé5z˜Îψégn0 Ä´éC ˜æB0(H!8ÍH{Ó"òd0¥ºñÀªž†Úlàm‰¢œ¬‡!f:~æTdü€0TC¡C]Dûü0¤íC!‰•±(2+aVšƒ×™8R:°,‹ÒÈ^õÀsÃPëOnkÜâÜî~iÖ1 >? ÕPèâP'Ù¾ bG«¢‹ƒ  ¨-@o’9fbLFìªéѹG>Ý0ň ÙXE5âo"“aÔréŒW1ØBT‰÷R¾bµæUÞA5×8Ä»®£ S•ù7ꨖ Eƒ4¸jˆû€‘³ùkØ4jσ”ǃudCµF.—«Eµ}­£ž©Žz „âîØµ¦ŽšpòIƒˆÈÛ)aÈ`æR K¯£5”,ÓꨇÀþ;ª£R¦/»ŽÊðgLvÊê|TMu·¬ž¯ŽÊo”ê–ðL(-s¤šƒ{à¼DŽªˆ´6hÃͦ·ªQG­†uT|cØÚ …™´ºcØw"Ú^JµÆ«8¨ŽÊÏTG­áÇ®£¢`[ê¨5·]©£îBãuÔ¼Ÿ+EÁà_rÀ€†@ái‚`. Ö¯ÖQkÒ•:j•v¬ÖQ«.{å:ª†€]w2+ÂJlgÈK3/ÒÆ¸üÄhu Ô÷ª^JµFBsc±vWÏŒŠõäTd|«‰C½â°†B¸ŽZM7o(ðæ¸Ûr†K™ß¥¯J°eK À=¥"j't¯zà¥ÔQkLD/o¤^W¿(Tìø•­S‘ñÂÀ,稠Ю£V%*Ï CôFòn‹•ÜS•Ñ1wþàn2Ø¥%À¡^õÀ‹©£Ö¸ÅeaòZš‘±ƒ;t":¾U¢¸CúÈuÔªÄÙHÉnÙ>™”¶4h䣮Kþ/Ŀȡ#†¯zÕD¿Å?'OÀün±Ûü•n°;>л,P6ÙF¾z:ýÞ%M[,½ÍN`ª¡Ü*09!JšúÄ<1уcÌ© ôk­A¡†L‚ÈO1fUb"N2`V½:0BÖÏHÚtóŒ°Å`*„ZÌF‹‘IZçî—9í*$uMdQ5ð"‰&oÀ[+•ŠÖ{NŒ3,D ÃÄdùêéTô»Ò j(÷Qi—¬_< ­.4û¶ý°}¯­úöì0ô¦k£zwãÑóc/ÆÓÓŸ{»*k^‹Ý;–i%Ž1q$mþ”ÇÔ±H&I;O´Ôšõª^¦]êÝÚ1Ôoi‰ -'ÿ>+ç|½‹’ÿ–—r|Ý®úÊMß…œl .éZ©= yß*Œ²ã^©Æ¤¦òº›¾°òz$ÙÐLª]÷ÙÜ»é¢Úö;4*Š.§(¥ÈIͱ,¥€#¼4ö"o3ëÿà‡ŸÊº§îeÛ…åCù’o[½_Æâò¬²0vé‹SêŸïãÒ¼¸á–EˆŽ€I‡jŒ91‰ÚK…Uà{Uš_<¸ãÓ/qœ•ª|Èþû/¼i†5nd­””ïò*¬RÒžF~t?oŽUŠÜc;¼‹ý‡ÁpýqûÇüx®Ï?Åþà±ÿ8Ži°zfº ra*³&ýã{?ø¿úyáãÊ•«W€4 ƒçåWOãæ !d…Çí輺ëS³ºëÓ|u×jã°¼ÆPÿ´«½Ø|Ô‹Õ]mÓøåï¾ìäri):elò„i‡xpˆ›$‘KÞåųVµ³_—µÂÇH³sQ“jGÕd­v ÂB~T˜„]2‘äró$iÏžg8Ùà¬Ñì%í]¥Ù1yëbdᔆ@‘àx³}\Kf°¸R.y)L8¿½ïò²1o]Š’–`Aó:ïÐÈ`äBÌ5¿  κt‰RôÁÌžÑoSÐ~~Õ7$û¼áëÖjÄ V¼S˜OL€qŠx`ùs°ØgÇÔ#!áhBPC{Õ/­VS£¹VCùd5ëÃúS‘ó­†õbÿZM …®µš*?wRTÜÑ –"N&J«PäyVBHdç(Æ,¥Þ{£zÕ/¥V³Ë^ae&((ºAÑ©Hø.¡h¿ZM å>p­f÷×ÚÎ K‚tÛ{,I†‰ˆv…áYÌ0†I& ¶5{g«®‡¥¿<Æ0­o,Ìpþ?íý:,ýø8‡&Òûþ»¿üuO`² ë·OYÖ'=LâÉ6*uèqp"2z^ÊÞ wN1« A k@fòì²Ê §UÜœjh»ß×Í/ÀÈqlA-ÖÖ/Ê©òáò‡ˆÔ6½{•ü}4Ÿr$š·–MÏñòßöKkóŠÅ´ˆÑÖrâd:( a¬y]47Í<¸¯Ì[­”•jñêÒ£·d*ÚèÇ? “M€›ù|cûó}? þñ#ÿoæ~øÛÃ÷¿ªñoI‡ÿýý®¼úÒÕKᱞFEåO‰’“ÉóæO¢/míÂdÁaq†ÇÆkEH°„[—‘Þ1Œ²Æè°fZ%ÛaŸ,ËfqG¹Ùpóëtø]1ŸfÔ,è8A}´Ü2©=1¯©Ò ~+#§}.›LXÓ…¹I‰Ü5-ì"ä_¾–›?s~ìÓTÝš§¢–§hz›¹ÚM¾øÏ¸ùm—ïY¨³i>PÉ8½µ&i¼cÊkPœ¦¶4‰Fë™ÂNÜØ8‘Ÿg¯M-QÌ<éÅÆúDˆ¦ÜiŒlh1ÍJÀXä{KƒB— ¼޾Ø9‘xˆBpCÔ D1î·šø”´<§ó37ñ Šç˜•T1yùíÞÑä°ŒŽ;iuÄ b©¶…ÁâòîUQ7©à® ÁÉ! ‘cF4Kœßè©æž3¹È]ð›ÁÓ[äo™þVî6i‚S*qÐl:ã \k ”IÂI²(E8ƒÛìÄ&–FÖ±wåõYˆÄ&orÜ;¬±ä¹5šˆ,ZCôQ8\›Z©à¯Ò 2xC¸ãÌ Í\3gR¤A²Eþ¶˜–øÛ΋'¿ÒÓ§¼àùƒ©ÉSp¢gƤ¢+²¬;…Ê#k”€ÜþÇýŸ~Þ) /æi4§p[ϩƜ[(åmÂé•$Gäf¦›  Äïð9Î…Å8mÑ’hqIƒN nÖTƒ‰$K`0j\ðOÇKˆÐPi›¼<ÞAò70æ´$A(îÇZsÐ0a„ þD06‡–³o~]% k¦ UH M“l¿¬°`+1ÇÌrF…NÇûùŽ Žðh”Ë™X f;"ô¥ÆÊPb›‚å”ÛK^¥Â6v;;v˜-`¨c—d)°/Üš÷ÆAB1s RMŸz¥¾:‰DlH‚Á¤œ¹d¢óT`°,Q& æqDv6M†Œ‘+ïhÖ/ÇÁ5ñ\Çà¢ôà€“þ´–f‘Õt¢;Gn¼Èì¶ñÚ†b|a ¼ÜpÄ$°š˜ðƒ º×¦ xIŒƒ×ÍS«‚ä*f¯Î"b á„U”2À)f”"\0Mcƒ ö8Ìn籜ä¶,pÂoAˆÉ¦‰“(&¯›ŸÔ²[‹¾1¥Â l"E`Kr‰"ˆ'‰˜e›VZU/-?Éôd•:¶Ê9™®ùÉùÉÚ^ó“4?9’ƒ‰yüû?Œ¾ûénÄÿ€ˆ'þvÍO^ó“×üä5?yÍO^ó“×üä5?yÍO^ó“×üä5?yÍO^ó“×üäÿ³w­]ŽÛÈõ{~Ó_´{b¨ñ~LâdgÇݬwmÏx'^§µÓ-µ[­{ùï)ð!Q-JõînŸc[MŠ…ªÂªî)ðIƒE+|’ú‘+'Éi@ÖÌ'EÎjÆ0³”.€· †ûÀ' K´ÃaŠUûä?ò„÷ÏfE"0g“uÒ Ç)%®'y„»'YðíáÉ‘>xïžlš8eÙ°s­Ù–ë3|w墪6K‰ y|pdãë¼8CU¢–!8Îoö?õÐÛõpô.ÿq1q×YÝDo5ä˪ûs#=úÈý|_KõÝÇ»Ä[À—îýp r³ºvºÀ?ú ò»ï?›Êé›ä‡1ýÛýJcrLÿÆ8ÞÞ¿…|æÎ¿­œ›Îm¦%Ì›Âô¥&Í`d\úºEiBSf…e© *Þ—gkPÝUŽ®Á)­:As8ÏS$n”ÎIÜŽn‰>b‘á”bDXj§\!kG05¥r©,Á O>æG„òå^áutËåסäóXáFÙÎÂS¬v0ñ!2íðÆ•¡ÑÄ/¢£.V±‚áY¢µ1¹J…!š2튣"³ýmøèÃâXWÝ@—Ö¶±ZÚLp>ŒË}ÿX;²W|§Z'dé SÄgö‰7ããNQ·æÅðæfz2ö:À¸7 ¥>n0Ì0ëæ§<æÎïµcÂlšrð /Ë@À1>ŸÏ¼qõánqÖùl¿óƱ|Üí˜öù|ÓX¹GV8þ3Ø“}Þ’%=6Ч` Ó’#¸›C‹~+ãÄZKpÜp‹}ó×]·‰6â–ëÌ@åòË"É&ë>H‹l±}‘'¹,Ú2,@rϸÞq'Ï©Ëòm´™ JåÑ/¼È #Ú$‹h8‰ÊrÑчáýUqÖ`á¨A.­úƒýôõeòÓt¿Ï;¼ø§ÚÑxë«ú˜“•÷ÚTq«€²•÷A¿òÙüŠ—Bõç=â•þÑUìUzp½¡só2Úù­Ô»~Ç>†äŸ7«8Úò†}½ßž•¬_\ñiË›6©yn¡ò¥}¯°ûèý¥Èþ(~½™Æ#w_ýz=†‘Ü•>¢IßUËãI¬`É.c”$#½BFgeY*K3•Ò¢ mPÃsKI§+‚ Õ¶pø¡Ätî)éòœRÒCdÛm³=Ó”ôW?M¿úåËlðZüÄÞ~pò?ÿj¿ JI—-RÒå£IIß"-|'ŒgÇ|ö.%½KIïRÒ»”ô.%½KIïRÒ»”ô.%½KIïRÒ»”ô.%ý©¤¤Ó÷ Õír` :aQ,b†ÀdÀŒ"F²Tê˜àØ&QpÃà“-ùáÊ@jñ>ØÔÉ ™–ùÒ óª€s·”Š1¦ØŠQ-‚] ³ ÈØÙ?õ3?]‡S.c¬@d$|èGÀÎHöÌÎX;Ft¦rŒu‘Ä:IdL€5 â©!\”g“Kˆ ‡!’/µsOÊY×Í€l¾¸x‘¹ÁôöâEž‰pqs?½xA8§Ÿ\Ò„‡½|õÝ¿ÿn™äJð§ÿù~\Ù;ŸÂP ˆ ü¹!¯ÿi<ÜŽAò¿ä·ä‡ƒ ¢åô,K¢èZ:šc—ð„»bCËý\:ÅZOÞa–½(E3(b‹·näÞƒ‡œ7¸½úe³æz0û~e7ª÷ÖG¢¹îäÝþIŽ¢–€lõVûÞ¯m<¼ö=ÿèéઈd¼¬–.–Þ¾ç3’è|Ÿºê\‘ÍWN€y9\ShøwFÉ/•¬ŠÄEÿŠ:sr(­€'Ôy“WµYbM&È€ öö!äh·AÉbá¸áÈI¬‡àÅ`K\FX‘”½A O”Ó/"}ÕXQ‹ÝÉÉè„þ¿ÓE-¨xÔƒ¬²ÔsBö ‚ûb*øç’êݲÄj»ì^ë`b–66H¯’ÛyêØðváÁ¤ÝùN!ÝÈ!µ Ø Ð­gr”ó½1⨔¼ 8D¦e‚•AFPmÅbsœ a¬!Ö0ÉRµ§€£Òß¶ñF}.†HuÝæUüq;_×b†…IQx¿ÜyÞÙÁÍ8mv¨õ oa„,D!pû|Êx{aš {]}ÛïŠ÷³¿ú`éî¾Þ˜^ø®¥ Ïä~=}q5œ/¥‹öÿ2Ŭ«þøÐÍ—YKy4S…`ExRF˜ß‡©N6ùýªÍ’ßÇmc½#Ç ¼ÏZd8µ8% JbıãȪ4CÎaœªL°BQpÃÓÇ E`ìã©ødˆZÿHF'Œ 1í&(Ÿ·•c/×0ƒ™1eã†ÆqÇdæ«á¤š N¥BÜbð™©WƧ_ìðĆèÍ3Œʹ¼" v¦ÀU€'Çàû3ðý<‹²Ü$(Éd¢Xf!éÞâØÔý!ôP…²âÍ ‡=Oúó²áÏàú†·åfC[”³IìdFRÂ9Ä-‘õº™pj*dªdÎßV!E¾^0´O¤î ÿUªÏËðd2Ê…UY*åBiÀŠÊC+¡…ârJ¿ê%‹ê1@Ôàài~­4µb?» α…¢G TŸ°vµüˆ¦)U£Ì˜A†§HSX‰ðL%N0jlÉÔp?…$ê9ZÛYËÃp š\„¥wƒÙ®SDûJ’É Ùªv1Ä¡„{r¬¡Tÿ EØ.¾Yíß73l6ûæïñ|3>ŒoÞ~v5zõv®¼µïÍ!ö¢¹OÉÏ„ñ‹ðÞ¡F ©1J3åÏÄ ¥D~Àd;­ýÔ¨ßTœÌºíÇã;Õ.1ìU™Ž6œŒ¯óÿ)% Æn2žÞ%./ŠÛ%Šu‰bÇNûµW<$dRûm?öå-Ë­¾ÁâÒîú._:ônî§ð#߸¬ýb‘‹ S‹Ð¸Wì^¯/Š$ˆ-ôqa³W¥Ùõ÷0çïbú÷øç<ØÇ\ìÓòN¦¿­ØÊìÕ›<ÜˬuhÅn&´(¶3£Þ|?³ööËŽJ‚Ëë•êÊò®æ¼3ËûšókµEQ%›úÞæ\†~S½l¾Æ)œüòæe>_fkœu­¬q¼B}œ§QVs%Ä)ím®j»ÕT™»í63|¹Ã]|6qJÐ}þ±j°ûüÃÔ÷ß|ñÒ|÷}œ#åy¤6Lïþêñ÷Ü<à½*üÚËø…öùž‘¥‹æ=¿.ïÕPøJ•àð³?/«å?3)34~>¾`MÍáöš:kµ¬©¸½ û8O žûÍaçÞt»0|{uM–¿Aêù1/Îiáy3©TÀ*vÍW_R9ÝÊ™‘ké"‚Thj A*ú±Y+W[ä ¦|q´ÑY¤³l…ÎÒ-t¶1"Œ´,ÅÈKcƒh ˜gi†lB$âÜmg˜rj¢à†ç–º®Õd…”hÛú8‡ÓY§®‡â,µÔu*ÔÙÔdÛ¥®Ÿgêú KO·I€§'_¿ùƒf¯¿ºyiñ»ï¾Ÿ~¿z¹9>·* ðÛîž4ÆŠ3¦rïRß»Ô÷.õ½K}ïRß»Ô÷c¦¾‡øÞÇžú¾õ»Ô÷.õ½K}ïRß»Ô÷óM}?î‰MÈÛ¶ü¹[i&ÏÍò£ñæƒl™ž§ 8Öb„-5ˆ+g͘AÔÆ:Ã[˜,ªo5<+Þ܆ åu…#°‡’ÑSáÍ¥„Q…µÔ¤Í½c·|~Õ–5wÊ©mè0ã=°æÂzŒ cÓÌpX¡ÅRË”ÂâV.Nk¶/Í;$iîòz4œ¹ÅdòÂÜÈfZùAX¡aJI‚2Ì2Ä%ÏÜ"eƒ‰šA\ŸFÁ χ3—™É:ù„;ÁC èqsæÎ§mµù³TüØ?øó7ùò_&úý7“/§úýsÛû6Æôö¾-ä#w¾m'Æ\)¥Ñ.Ž“,Õ°:Ë,Å3¥ŒákA÷äÕ–÷ðån”Íñ]ŽîcÜ.ã9޵W‰u&EàEc'6ö…ñSE3KL’EÁ φ/W6f;ÏÄÓâàËäó(‰¡ÚÛ÷ÝørCdÚñåv|¹_nÇ—Ûñåv|¹_nÇ—Ûñåž5_n…Ëv¸˜€pÍ©4F†8K2äÍDk&cX'ZAxPóáËÝ„Y®3­çÚe‘l Äê‹<Öe‘Þ?_nˆäž1_îq'ÏIùró)Ú¶~MbY&˜1(Iy†8xd´HèŽt–£uPÃóvädxZ”»=|ž¤Û7°"Ө逨逨逨逨9`‡hÝØ!VfR¡ ÔqÇ 2ÄÅÈ!UŒÄ" nøŒAV,‹tk`ç0_¤vjÀÎfÉuÀÎóv´iWCò³2Ä /òˆ6É"N¢²~OôaxU$D¥Èó´‘\Z°x,ê)õ~ÜOW_&?M‡ðk1oåÌÊ[®8…vˆâ–›t{?Å-gZ*¨òþk[.¼~O¥-7iøÚÒ–E¶ªx_ñ«*w–»‡e]7}ÍÛ…26“NÅþj¦âR¦(ÖŠ#"3'•‚îË‚#¨áqŒ’¾c^F-£‹C éÑsŒPe)„–f%Çh@†ÃqŽ9Çhȇî8F×sŒRXvsžid-ˆc)‘N$G0tAœJ¨Mä.”_MʹÀùµ9÷é £¯œ£Œr#ž Ǩ·2\cæ8F écÙ.H9O°È2˜{B{jŒeTƉãV!ņbPÃsâ…É5Y!¢–þÿP2:GŽÑ0«|ŽÑšÁ^Á1’­z`ŽQBNÄ1¢[Çè:ŽQe9QÌ%HjA›‹Ò¡(I$‰qB4ÞÔ¼AÛÆ £RÇ1z ŽQ‚7ûý¢ÍFŽÑ€UÐQãÒn—qg8-O=g’5 G&щ”Qet;V jx>£ðÿ¬©ØI."Ñ.N8”Œ;ÇhÍ0® ] rìgÃ1J؉8FCô¦ã]Ï1JN‰–©?ÄÇ@´Ck+@†toqìêþ 8F©ÀgÏ1JHÇ(¡Á£ç ˆ>myüÃC SÆ q)YBa9â§ÂÓb³=¨áÙpŒ††U£DÓÉ:نLJî¹pŒ-ÂvñÍâD£!ßãsŒn=»ÖpŒ†ºòÖ¾·Î1j›T"iÁorÍ2ÖäŽK¥­Ê$¼f™c4Ek?5–9FƒnûñÌœÊáía<ñC¯\È„ÞWny»r«Op$~Ñ®<~Ñb+óéò‹æ—! x¦¿hˆCÚÛ\YÁ/¢Ÿ‹ì‰¡3¼ã=¿(Á!šZ¶ áݨ# ü¢!!çÞt{¿è.nà ñ‹RÏž_”qâÌ/ºYg£q)Ûñ‹¦Œ“La0J€1Là_>J´È°6L¨LEÁ Ï_TêÉ )µä=”˜Îœ_4 c©ñ‹2"Ç/"Û®žîyò‹ž¬PovÑ×/ÿüêïê¿¿xóÝO:ýöû÷ßÿð_wìC»(Ø”`vÑŶ»³‹«²0¹hûÌðÝò;fÒŽ™´c&í˜I;fÒŽ™ô1“†øíÇÎLºõ;fÒŽ™´c&í˜I;fÒC3“÷´€iYZ9¥ ½žbƒ@‹xâŠMšø¢³i"T±ZqJ*¨á¹á“XMÖI©>y 1=5|ìÄ'dÛá“ç‰O¦™Æê4°@0Í’L3k|¥¬TÕ Û`‹öËøþ÷?›¯^¿™’Ÿ§oÌPŠ›wßž;¶ˆa1Áe&©ÅŽg„Æà[2)¥µ ¡$‹¡¼%ìPÂ%ìPÂ%ìPÂ%Ü% ñÀ%ÜzŒJØ¡„JØ¡„Jxh”0l«“\7‚Ú×†å· Äx×ĉ“F“#㓪v2ðƒ½O®ÜÝ |Üàözúv8ê—gž'ýw7Lú°Ìö°„›Nf˜œOs²áÛé|½èhq?_¿*.gã»èvœ³¡K£(u·×ã_¼1êGƒÁp4¼ 6±¹o—Uß.‹¾].õÍž©ýKwïµ6š_Êý¸£ühy?zëà±óûý•ƒ›h³û¸c;qù ðØÒk˜¯QÜûÓ_ÿù«¯ÿòÅ¿üôò :pùéôú²óøòÆ&WÃtÐÿx7…UJ®Ñ8‰Ð(šM//¢I„ÆŸz1E–\§hâ®!hß}ZÀpýÛ+èȧ¯§£‘ﺎÀdôýƒï †~Ç—þþOkŸàÿ"èp„ÒÞe/BYDÿ5OÀïEãQäs|ŽjŸ`Ú׬O¨éEF8HnöðU¼ÐrÅÃzÅ`ëv&“«yæ ®ÿÃ¥ŒîÇúþ‚Ò^d'QÏ€^QSºëV”Ôõ½ÐjÖ‹[{go†ïÆýû;;šøL¦jRû—´ýM™âëÊ|•ºÿ5|Ç7oþ00}óÛ†WÈ>tÓ+<âì L5úMáÀµý6šLælà?o|ú1.KÏ‹éw ¬½ëú—ª8wãKÓ{²ß,[‹l<¥ý¨Rsè­·óÛQñÀ<–MDøøFňbYÞèÊ+¢û‘þ[â·“¢Þtä÷àJâ'È›wÃ[¿-Õû÷èÎ'>EvïSõçûTýè£÷ãw^b÷ÎÞ}6þ0*þÞÜSŽ×n65dð^ÃSýÓG³'“X'‰Œ °nF<5Aؤã 2ÓÌíšF1ÆCñÊìÉ”KÇyì4¡¢s¥…LRå×Z$,=bödHWž@ö¤àØð'œ=I^½9¿gÖª9{rò {RdZ&°bEF˜+ŠÅ(æ8AÂXC¬a’¥joseEödˆ~.憅Îð.{òDÙ“8(­l’=¹QG@·ïdO&qœPƒFg Ñ<‹²Ü$(É$¬A3ëÙŸX‘=¹‹xBÙ“D©³ÏžÄ4HgYpöäf †ƒ(fPU!ñþn0¯@² İ(ùØP(Öqé>×íAqg~oY*R˜M8C–Å1JbæéÓ¤,Òp«CP qäþJq…؉Ë;w3~ï«qñÆO°Á-«qHÄçR+$ØØ©—>U5®€ïñŒ«qí2ÁÖä yìRA®MFùaA®Xg™0>ÒLáZ`Ê£4SŽ¥™PJd˹BâÓ¥‚\A³c¹ WÐmG.ÈeúZâVÞ%K4ך¥'N!¿§‚lÆc¤8–ifdÌp7Ü“wá`»¿úü»Ïá`"Òg OV“´s$‡’æ#%¨$k‰›Ö›ö =ÓÎOhÚOLIa¥¬Û$¡1Ž…õ§¦SÿѥϞ¦`úÓŒ§*Ó1Á2 nx&Ö¨ /CF„WÚÌ…n%ÍGjà/[[£ =CkÔFµOox[Ò,b³,s™XÁ¨¸r(ŽIŒˆäÄ(g¬Ä4 nx&Ö¨"ï» ‰•}š’æ“uÒl‘¦t q>Cs"¡ghŽZéöÙØ£½ì½v•k»Êµ]åÚ°½×®rm·÷úT*×Þu•k»ÊµªríÉö^)ùö®ô·#Ëß¿‚°£/Sr݇Á H²É ;“8v‚½ ¡N›»’¨’íLàÿ}_õA6Å«š"%ÊbjvuwÕ¯^½»^ ÕÏ$1qš˜A–â|§ÈP«Q”6Òd­c$ ŠRìµè –U±W¬x©“jŠp¹U¸/ˆŸËIH”Ž'!mµÀއ!=½Ã*ßOºDcMÞÃŽ0e b(@\æ‘u<%­²7<°Øk ¡ð™Tf²ÌrA²/4Ÿª{‘nï^,AèÇ^‹l¬Gö.Ò3Îi/ndæ‘p€éäƒ-…4ðs`çÑ[†½ÒŠXìµD`7"šMÖYÎö…æ3äF%=ãØk‘7ó‘¹;#FõâFΪãHYÅAEƒœ4a@—TRå“'‹ZìµDWv¤„˜¬@³§r´/8Ÿ*;bÛ³£„žsìµ(NñèüˆjÞ‹Iï T!bYW£r èh9ž>ª¨á¾øQ¿Â›¹jæäE Ó4'2Ë¥–O³Â² ¨rƒœy&'ëP,çCû‚ñ‹äCÛ¢-Aî ™å»-2[FëÏ—8ý2f-IÌN¤¤ †œ"iM£ŒDK›jÁ^ÔðøÒ¦Cò¹&ÌdŠ=Re÷ã‘/ÍRh {®|iãáåÀ—ä:¾´˜ªöM¼ˆm¨ä"ImVÕàÝxt{]—ªo¿l R,í–ý¶;·§„q‰R0¸iªQ‘ø\Ð8¦:ÚXÔpgÝï¾Ý: ÛBŠ*H'~þ² Ð?U%¢š´±¼ñ³É {n<ØÊ_$7Ý.DKu]†=Ï-Á÷Æhw´f–†i§‰£õ»»Eï-ÃJ«AøYxà*»41ÊØ2am)uKWvŠôW‰RÀãáç›*Qª€·“oÔ)÷‡%Wߪ2k;Õûç‡t>¾½SÌ,Š\P8¢$½ÎZ…´P±ä@Žf]"[Ťï|¸йX׸-ú·Ÿ>TuêÃp\ÓZ]ìò]ÎÛjK¸ùÑEs‚CÛ«wñü²:Ë`ÉïöÓì÷Ê¿‰çÃëóëqLÃÅ;mþdg,Mƒ«ÑøÒ^ ÿÃyN™\xr›ÑÁ\;Î)]7ãúYÂä4Êc'uÆØÉ,clé!XW§KÌ2ÆÖµº“1vRe9žÌ2ÆŠ¡svƒ 0V¤…‰Û–y‹ÕùÓÞƒc`ž"¥Å'GhÍ¥d¤ž:9Ý '‹€l$â†qä4OÈ%ïq ‰Ó-“hvJFò '#óäÉ(o0P7:Ï.üc(…¿¨÷F&›«ª"=;¹§Ÿ&¥½}Ð’mzø°)vü “~)vB’|ê’A”: ƒò(b„ò(R "IâÅ %©eÞ|yQ²6òN^¹4Š3µÜ¾ßªOÕ¾çÛG“KzŽÉ-[øc;Iù‘¬_ñ%LÁ‘¢dEªˆj·¥¹l‚ŠNé:eµ¨áao2y±Izäø ç“@öŒ+ï É/’#m¿)AîùÅoŠÉý¸ßsgS¿¥Ýb¼_f ¶QÆŠ4€<ÐD#-BŽc(nxØ!œM€Þ á¬È_Î ÷Tñö…òÉP÷Â)Á÷ÂÙvÍô á(˜2!Ï­…Ù Ù<*g$Êh½]§¤>êþB8Œ%g£ ˆ–òÖy† —Ì¡¤æÑ¤%®¬’./ue•¢øe†pJG¿Ì•Eù½]Yä¥P›EÓV%®¬„Ð á(«© eãqë52Ò{”(ÕpÃa2+óV+e¥ê>]Uù­\MÎã§ë!¬ÉÚ´Í&|~±½ ÃYq?)Äwãï¿ÿøêÛßÞüùí߸D?~Uu}îé9ÃX·ü ú¯²‡“Éíê<Èù¶ ¸,˜'Îe’ÔâÈ¡Ž§˜¤”ÖzBIr‹°T϶µä;±šñèNp&bç=±ÆùD9ÁÑÑlrGéˆc±ûêqÅæüW¯!Án]rDzÊ£ÃÒŽM?-8Ø2Æa*76˜¨-WÊK•¤àw¾Œ•¢òy™[Œõ(âU¸årÅõeÛþ]¥ÆžLÔ,Óq‚úh¹ÍYqDÄD¼¦J'¸ªZ¶%2k—|]ǹv†¼«‹â× ä‹¯ª—ߎ³ãë¤]nõWQ3§¨}ÇÙlÙM>ø—†:{íü;+xV š5¬€cNã£Ö$­`îXÞl—ç ƒ¨Wý}†°‘o¬ÈÛi·©%Šy£“ç@½ØXŸÑ”û ‘5­·qx ZLwâ *\VÌõÕèƒÄC­µj †;ÅÆ­&>%-w3Óù›«æ7šÍTR4Éó½7JxG“Ã2:î¤Õ /ˆ¥ÚjlÞÅW}/2´IÁì \®ç(-‰3¢Yr£§š{ÎdwvAoº­®;¿Õð×ÎníèL0Û"hfœ¥d(”„È})ÂŽ&¸qH¬ZÃÒȲé]è> ‘Øä­SŽ{‡5–ø‘EkˆÞÉ —zS æWi ,2xC¸ãÌ Í«…9“" ’uç·©Ó47¿Íø×Mñäã0ÝœtøB«ä)(Ñ3cHRÑ‚‚Y Öí¡ê“%‹€¼øê—7ߟ—Hà´pgœFsš÷¶rª1ç”ò6aôJ’r=ÒU¬ Èïþcœ‹qÚ$ 80-.iÐIƒÀÍ+Õ`"É3Õª?è§ã9ŽP£´Ž^®/|šÆ K„â^q¬5‡& 0!GA€6Œ»Árúá5¬_‘Â’!H’ÏÛºH–_VX•˜ƒbf9£B§]ýl»` ŽðhtPI b;"€éK•¡Ä ßí¹/¢°nº;0Ì:<Ô1`—`d)/Üšà’䯀QFSÌìªö«÷@ª;ዃHÄЀ$LÊ™K&:OÉe0wC²Óa¬dŒ”HyGóúrTÏu .JÚ ¨ø OkiºS F'º´W È»“=E`Ý\ûá˜Xg®o8bHMÌèA$m*ÎZ#»˜ëú«EFrÑd/Ž"b æ˜U”2àSÌ(E¸`š ‚ÚÝLv3ŽÕÌI®Ag¶Áü„˜,š8‰Òhò°¾HNûåm'®ArŒ(1qé82Î’¼w_ªÆ´Ž85|L_$•“ˆôôEî ’C÷EŠCòE–`{ôE>S_ä¯ôïN]êñ«ëÛOCüJ^þñïß}‘G_äÑyôE}‘G_äÑyôE}‘G_äÑyôE}‘G_äÑù(¾Èž§K5`2*`\É!­(C6’Èç<àºÜQþ¾Èùbý|.µ…>ùkµ‰ý›iá,Õd2å>É}AóTÓ°{ú*™àÛ»"K ýB\‘x·®ÈeËb©O²iØui­q©-Ö\xó>Úz+·,û¯¬»¨ .´¥:{þFÕÃùòìf»^ý_uq2‰©ËŽ·ò‹¶ûŸ+†<{ûUütÓÙT¹‹oÍÁ[»*ã‡áèvÒúO?ÿÏÕé£pþ•üm±ªÑ×y f®jt?šÛƒúv.f4ñÅ˹’Gù&tch/ÎóŠƒi=­ý‹§oïâÍùìþd«¡Îõ±,‘K ‹¸ßæ$*bbŽ «áN(Ïecr: &@ÿ&Š>hÈ­Ý”‘e›Z‘ûßÀÑc‹Ñžðx4ÙöÇ|°`žU5ˆ ¥“…ˆ& Ž¥Aù¹ŠÕU«ü|%W,}!°¢‡¸Ó{lˆ*˜çcìoÝú\*d»DÙ”oæQg׎w‰s,°–4&ÇÁN#2xŸ¶"³5${ߥ° Яí8Ϊ;Ì>´,höºgm#°ŸA(ÞïpM,åIb$©Ê§ä\2l_ióibëò‹>¨œªÎïÊI!ŠOÖaQ.¤öÆ# ©i”¿ïG £&žÛ‰Þç×|Ïÿò§Ÿ¿þkÿë¿âñ~»’!<¤ß+ýs»až //oo²¢ÕèY{÷¦¡tÇ ŒV½À\àÀA¿Ê1jL˜ [+^Hg€Ê1:œiÞ8‚îp·È>ØyÞ8–Ï÷ËP>ÜoË>ãMµà?€“<ÃJö2H¨RŠ%i³7Y‚ ¯À„L"ÃE xbƒâ†} >øé—û†\6ú íÇBBÊ&¦“à÷Ì^ØúOÕ’»/"W‚Ü3."÷°‹ç±KÒM—hS…š{oÁlÂb0œ šÂɃÛ÷uŒ~.D_¡Õ Ì羚_ùßn‡p5Ÿ'ðò_:)ðÕ¯»°&[yž©©=gˆ­ù=+ùÎ7³;…öç-}Žù5méçU¸sIGfÅ£+ε”»Oôí~~vZ1½ôcÍÛ|+C¼˜îÍÓÓ<´‰T+.S™â§5ïÅìõ.‡úúσ׷î*Þ´W? ×ã†Ï/£YNH/ýƒ¥Eò¹8âQzd¬2È&Ÿ°—&EU;‹>æ6kÆ'+¡ý”‚}ArèÛ¬å!m³.ÁöÚz¦Û¬_ÿþËëÛï^ýò†üF£{õƒ½yõãõ«¢mÖ²Ç6kùd¶Yßo£ô½öh·Y·Y·Y·Y·Y·Y·Y·Y·Y·Y·Y·Y·Y?ómÖê c¿ãgÝÏP$NŒI€2ÂØéììÕɦAqÃ{ú"{_Ö(M“9Ãdix2ã!z>³'@1·¿U.ËÓûA ‘’FPG1;=µ`SË=Ü¢ªÄ-ºÎý¸è: §àЛ‚9}ç’ŸØ.´¥¾Í)uÕÞ©-YkSÄ#Ž=C ½ÀIÂ$Üb:ì’aÁžµÚõvžÑ‰ç·×'/«œþ“˛ۓ—„súç“8xÙW_¿ùÛ¯ßÂ#“*ü?ý÷[¸xoÇy3@íœ;»µäó¿&ç×#ù÷ê‘*õ¦>Ãwz¶ðt¿Aݵp5ó>žÀÆuø)~jÄZ§'†° ^6М×ZÄÉ»x?d„§ ®ßÿ>rq>ª¦mƒI|—uÉŠLªnR͸üsåm\ªíWí;¼°nx‘{þO Éó÷µ.’±Z¸Ùü>¼þÀ§çW‘á¶ pG.¿3—_•q¸ ÐðAÈ_ùß[¬êm|ùÝS{—¸•óq¼sgö®j³pb/ùü°§ïê3Fúm!×3) C‰cŠ8Åo-¢LꙤœŠ>¬o–ÚŸi³4–pÀE¿={Âã%x ÓIG˜7b¸ŒÙf½º:×û„à3‚ñüÿ‚êò}T3>Üô¤·:0ÝWuÞûëÙÞªáõ9øI­Só{) z÷Jƒ”²`[I=C¥¡YÚKu†–ž•ÁzÁ vƒŠƒG.Àe&b.ÁLBöWZRí«1tWX©6Ó%cÞj×£ÑEGêÏÑ-¿*ñ7¶ç—£°\$vo¼ƒ!~´ GÀã³… f|³ºï.î{ÑNãyîJ–”dug|ÓmLOr×ÂÜ;y¶iOÞ€³VêG#d³j’'¡^`íwu³«§ÒGZ%ªV0:`<€äÆ}µµ–ôæLõL\Î@çƒB9ˆx´Yà ²II*ˆtQÈAqÇ•ôµ›mu.Ädå’~_x<¢¤¯aÚÊToÝJ47ÆÅù”Ç\¥Ñu#òÈd‰ I>Z!  1N2YC”É»î#Åͤ¸b›¥x ‰iVLjy;…®õ]d2GJðz:.3ðõt fì%Ã;i b›6Nç<†ê$£¹_ ŽO÷@¶õäHö\ùü˜aÕOæ«&fu|0ƒfWZóÏžüüXç0í‰õ˜ ÚÓþmO)a}sõŸi2k¥Æ6áSÔ¸0g/jÜÙó…ÍéÞüd°læê›@6¥®Ud1õ×C6åÌ*'A®óM¡”3MÙÑÿ,VÀåvvž×ø:êɬԓ/QOüõ\3Rs“$‰!áÌÃ@/?­ÑaÀ@@BH¬£?ô¬ î2»š²l•Djì“lH${ž]mlÌdWcn.»ÚF¶.»z?³«·t"q|ì·÷”Oïš—­_ûï?GÍìÓèÝw›|lmA¬ó±çË>?{#$[bÆvY×.ëÚe]»¬k—uí²®÷=ëÚÆÏ¾ö¬ë'÷Ñe]»¬k—uí²®]ÖõëϺÞî=#›¡25ØÊbÓ ß"…©î¤žbõŽÓ–¦”ùæ´áD… †I ÂT> QÉ=ë‚;£0e~¶J5¸Þ<^%…)â:@à˜—¢0Tø¬ óºÐð³(LmÆÙ!¿/@aª§ª !—…>QÄg2è?H¯ðYœÖ«CNtìm ›èácÓú¤žræx´E²êOÇV·ýcû„ýlîíƒWûöAEf3/íIÀmè=I´[¢x´iÊO@ñXlöýÌ>µ¡++KÙQ<Ú¸§L‹%6ª8Ïjg;oÅãŽ(ýÀJ)kŠÇµ:²€âÑ&|Š/¡x|Žqÿ™(!Þ{ŠGߊ” kŠÇõê¹0*¦5Ó)t…¹BLë1M‰Xˆ§1–P¦*ð¬ î’âÑ'Ù*‰Ôx!bC"ÙsŠG;\c–â1Ü Å£lÝɪûIñ¸#[k1<¶GŸ?¶8½¸ÿëoŸ?HqzÙ½:²axÔÄšáq¾ìó7rû–ë§";zHGéè!=¤£‡tô¯ˆÒÆI¿vzÈ'÷ÑÑC:zHGéè!=ä~ÐCnw‡^/ája‘¾ïc˜H ÂÀœ|a2I‹1 ‰õzR/âÔ³.¸K,r!·ÔT"öXä¦Dò³a‘z ¿9,ÒF¶‹ÜO,2I)å‚%1ÕKN g¾L™ïëUŠ \x$^h±ÛD J®áåÇÞ··íóOÉ·6êí=´õò‚i€T$E8ÖÞ& ‚@‰0Jã…ðœnø<äïY £Ã nèpC‡:ÜÐá†ûŽÚxà׎>¹7t¸¡Ã nèpÃýÀ —§`UfF[/¿)Bܸ&‚TÀÚ.Éá 5Õwq+oÔ(*«‹†Ýñu§ß(_[Î=u;êȆ^fXB³ &gÒˆý´s=éÑóÎu‰ÛÁ Û,.§ƒ‘7$´£ÏKÔ°;øaŒQË¢N¿sE뻸¸m‡UÛ‹¶>j›é¼.é;}¡¾P·Fk½éU¯¼ÑôÛËßox×JW;½ß\Ùh·ãÏïw,2•÷±ŠM/†™Ão~»zÛjž¾?þðæðF7àð_ãq÷°¡çñaOÈ›N_7Ð|ù6Ö«”\=¼ô@ß›L##¢Ìƒ7FLZKº ÈTW-ƒÑ›†k otCÞ\Œû}ÓÐõ´Éh˜ŠG:Öíì Íýof†àÿ<Ý`$‡H=üßy2û7è{æ5~“Ú@7˜ß@˜xJ÷0’½#´\ñ [5Ëv²ìfš™gºk~˜¢”ÞíàAÛÿ‚ñ'2ïÀ ÀAqXqÖ-9äÕ´£I+†b$zoƒÆíHô3“wTMjóP=mÿX¦wx¸ÿ앺¦ÇñòòcÄüO‹ÁغGÄÙ$˜ª÷ÇÂ7h×ö'/K-ÍLÛÀÿZR;·ãcé1ýuN‚3Ïêþ¨N}^ðPÖðÑKYóÇÖ"ŒûIëÔ\·ÖX‰éí ¨0åµ&¸}£ÂéB±´Þ‰Á”ª&¡©^ã/2k/˜Bë 3À´|›ÜªàN_°§Ù‰Ô<‡hS"Ù÷M-¶O›Z6²u›Z¿è¦Ö]pïŸ~ååïͯ-§ÿ‹?ýønµ©Åjlj1·©å6µÜ¦–ÛÔr›ZnSËmj¹M-·©å6µÜ¦–ÛÔr›ZnSËmj­ÙÔb Vó Õ6)Šú€¤‚žøÄ!„=ÏTèY¬†ê‡Ö̪öáõá 7zÖŒî:Ù`”&êVtºl …$(SÁØC’›’Ì‹ŠšïDäÞ©àÑù1ø29ê7h°MþÓº¦OÂŒ›“bØÓµÊ¥WudÃÌ5æAùª\…NÅ3#™?¯ÛZ¤ÔfÈ‹ZÊÖ?£Žúh+LdQ¨ƒ _/ö’”ùBΉþI¯ xú&%( ’ùIȨ9%6˜ •LM3!øöÏw}îÌ_ˆºÎ›²â€1à)7§OA ¤Ÿí™íl?s@hz{döL'.ªQØ·]‡õUC݋ް«Œ)ùCy2z^t<üÃÜAéOÙ|å•÷ÿÜ:¹zpiJìƒ „毹nÎa3&󇘣âLØr'k(ÕA&KÒаë$ è$Ô:ÆR„¥4¥:R.ú«ëµë`ÒÉòŽh¯&² _ºANïä0ï*ûsŽ<F?¢^¬¿‡AÈ uùÀ­xÿ«âÑ83Ümæ<¶é=ÕÔ¬8¹o¶h:R*‰^ù„Õºyßf¢õvdN™3 ìî@T÷ŠÆè®—•¿ä÷•§uUÔÕ3 }SÉp<=Ì^Œä‘Ô= ¢ —9£/(Zço‚‹AO»üÂ×9qÔÑÉ»<Ö : ø‘W$U×ÊxÈ Ü@~Ë9óráI½¶«®ÜÞ8ÿfdœ*­OÅÕÿ™Q–|ð³LåaŠì¦Ýqvc>ƽN¦(Èc»»žŒÔË#êl¨$·£<\ºÏÄ*6´ AÚé–¤âã>Ë¿÷z÷ùÏÚ¯—È£IÑKôª´çjÿ=îë0õ.©î‹ÃÛ¢îbMó@=Žs±ddzUA9WŸÝõ T2ò&‡FÙÝ÷¢›*oΰ@<ËΖõg*|Oëh·sÝ×eÍW?é¾G*U·2KöÃ<®[ ‰ºÏo–½Á]~õ[gº(I»àÎ,³F?òçeòFô¯èIízŠ–”gîä ÷:ÅŒï‰üÿ¡ìöÆÝäŸæs7å5÷nG£‰¬«&ßõÊnQ Ü×9În+ÑèÅBÒí¡ëDÂýâîûkußå¨BïâüCš]gæ}ŒªòF.µ®¸I£n¯Ð5i‹œŒ`Ù§¡Ö¥ èN!Ò»ÎèvrUŽXW] ù£ÔüÁ²©Q)žB’¡B× ’èî ÐfÙÜ”&í+´(î•/ŽÅÊbí;J†üÑ÷X»ü¢¹åÿò>ôTHµ.G²FÒ^.Îa¿“?áF€â“ì~/“©Â’‘èýº/À¡òÖ S3û´ru ™ ßK²RtoŠ™ o€ÃâÁNqo¤•¨šR£D[Óò¦\Þj4¼-&“圚(á0šÊVÔ?þ3³ùŠb9ˆ±Žr‰"úC ¤)\ø±YêY¸/´wî -v_ 'fk ,¨v_R%€ ª€4† s¿@Žº/äÜ×þ»¯yKWù„‰å©æ÷cÃ;5Y•Ñ]8ç]Ceƒ+¿U™ ÒþVfab?KK4µgÓy_Z¶Òð,qÓUÍ9Yš¥fj*¯:ñÊ•÷ÚÐ9'RéÒw–ækò°GþoÆk”Ö»²|;[x“‰õŸ‹JÓ:qYÜí\X1ëýg|mႦ–·4¥3îéapSyˆY[:éôgPéÚf\O5Ì{®‡7‰ræÜfQMÎ#<ñ¬ó†{ÞÊ÷ç¢ŸÒæO]RQ•þeÎÓ–QÎØl6¾šó4¼`ø•޶ô«“H§ŒUfâ¡I˜õ0þªb—2f›ºÏ¹è­ 8'Ñv_[¦‚` î£Z8Œ‰ÙA’À4ÄçÈ, 1(Ä>’œrVáYÜ*V½»hÐ/ijUâ°G¿6%‡~Í¡_óðÕ¡_6C¾ý²­Ã¡_Kçûb^àòbxžփêm-¤~26™³ñrqEGrpzÀé M8 }šÈ‚PþþGÂ8æ8†>Í;99ýáþ˵ÃõÅ:F;\¾¸¥¯/ÍÆbÀצÙXÖáâÐU~i(ªŠÜš­b?¬Gj.ý4•Hj „¢ „vi…bÆ9bð¬ îXœøa¶JR56¨6$*g_â£Í¯Ý ²¬ÃYd—øè]æˆK|t‰.ñÑ%>ºÄG—øè]â£K|t‰.ñq0Fk¾(ƒüÑ0†@*½ F€‡B•ʱjN×,^G¶*øÂÀXS|ã‘T†â®c@›C›ï¡~zç6·&\²£Aë¾[³)™¾0‚¶ 2…'b÷PóýѺڱƒ^ɦ´¸–à/ýÁª–Û ’üŠ©ÔlŠßŽ]s¡?²zÐRLî±d*´mñ-k5 x¦•Ÿ…’CbÎ!&*¤˜Æ<Œý„+Áƒ7ù‰õ"öÓ„q’b’è˜2 ‰/©ž3J¥[ö7Û“4ä—òèìãרy~ý®ãÄ““ßMožœ_µ[Ñ—³OW'­è¨Ý>j~Œ¾·?Fí£ J´~o·NßÍ^¸ûý¨Ùl}j]é:/—Kí¢ý‰!Ÿ//pÚ¿™i½D8Ç—s=hëFµ[ï¢f뢽⩗çGçÑ—OG§ /Éñ|͇Uâþ07ßµ¾ëù£§Î‡ãÓuÓ§õ¨™—-?§‡ydª£kÕW£Üükk‹Ñ¶CdÆëñu)Ý=š* ”ä íN@ÌÒ0Jy‚ô¿ˆ`Ϻà³Cä—$ðÂ<["¢š^›’ѾxÕÜô¥…›#𲑭#ðÚO/?õURIµL KpÌʸŒ‰âŒr9GàUNH°Ð~Ć”˜×xK-P’@Õ¤üº}{ýùÃõå’}Àí:âØQ~ñ”_üe)¿QÌpgÈ8%RȬҘ ž¢ ‘2}Š íYÁ±—#örÄ^ŽØË{9b¯Ÿ›ØËÆÏ¾vb¯'÷Ñ{9b/Gì刽±×ë'öÚ68é¯'Óν^J—QE~|ÜPDïý`ÜO¼ª– ôh°@ÿÿÙ»’æÆu$}ï_ÁñÅÝÊÄBtDMŒJ–]ªgI.-Þ&: Ú²µµ(y›yÿ}$µYõÊ®±«upX$±$2ä—‰à"aRK“²1•°­Ð–ˆ8Vì‡Ñ2Õé×[Ï ñ!‚Ì´u¨º¼«= ±ÛiƒvÕ⛳ý82Ïõ!Wc =qûá¥xÎ1”/4JçÅØY4  ^ýò¿ÿ©où ^3>N,÷ýÔѰ)ÿêE~¿Ãá9ɤ½Uº Þ`èGÚ•Õ>ûi¨à”PÙ» t=ºœA58TOI—œ§)v¦óÇ:í0ˆy?IÒ¿}™òö¸/Ì4N©­Ib×XB2f„:D»2sv¦ö4‚N‘=ûz›¯«g£1>O¾´úÔ×á2*ŠüHôbšSbà›³ê›T‘´úcÏ]¼ÂuT ø®xžòpÈo&•‰J÷'ŽÀWÞ$ì^ër¦;Ž×¥¨‡–^¦÷»#íKÑêOcHh„½‘tØÅ‘jëÀM{«e€/–´96å!“ªÀ1Èô] ¡@aÅÈœð§—ðü2Â_ØhàFËvM™“}ὸóáw÷QÆ~ÎlŽÉ$ƒ‰óИNâÁÑ~¢š càlIéÙÔ35 1©ö°Ûf` —Ês,ƒò°Ízƒ4SJËrq`RGcÁÜ4䯸Òõ|Kœ§É„“”Ñ(u'fP Pÿüó×-¶P‡œ¼ÙNX°d0¤‰lM0üÓ#Ì5mO½À±… ?݆¾,£iÓ†¾¬eüúð;l±^³·zví#Cï‹£ˆ[ÝñÐ$¡í‘jÇ_nÉ8ï1ÿ´òdÙá‰ì/°]ݲWëæQáøPï €?lé…‘½r¾ÒÌŸ&ã)X»(Öenטâ‚bôyÆ£x»¬¼\±ŠóxÜ/îýùKƒ@¡L¶BØ#\"êš„SàØX&·œÀ”ˆ‡­wËÈœð#œ<’Aü†ˆ„D똑¼ó}ð6Þò\âO§6³ˆ|“ÚÌZÆnüOà±7Õ­?Χ› ¿6K§É޲±/$kÔ‚Ž0ñ³G‹tÔÃX庡¦ûKq0ì&Ã"¾xd¢lˆ‰åÓ?Þ»¨·Ü xGÿÂ,ݘ¾Vý[ÕQÞNw F¼Ÿþì Z7­®ö£Œã*Päo±RO U_oéŠâšnýA÷æ·Û½Çx?ãžvPìéMª{©_biˆ‹®gŽA[ž_'›ØbOIS ÃÜE¥³:Üä3~³ƒ|!_льM…©‹— 3}¸àÕ3UÄ¥ørÐz˜¼»WÏãn’JÕkçf³~rØæ£®>crQ5ÿ}¨&§çàMShRêúáG÷þdrz`eºš2“ì¡3MŒZm¹˜¤ýs0IwóÈÔÇ®TÒ|èµGÀlé g¨Õ³ÜK\lz×î}ü4ŽršqÔM ×N¹äè§_ …IŽ1k»Cøll3ìZ¦Ç¡õ”biB2ÓÆt×sˆ™~(lS7ZÇÀ-Žè{'þîP˜l …ég<¤/ƒÈ7Ò—±ŒÞAá·…ÂLZRqe#—ð€…P§ê@.꺪\7ôB϶CoBÄ@ˆ„þxšì ô‡ÐãÞÿo½øyŸ—lKß#‡:ɵ„uÝ|Fo*ÒÓéú`Æ.1¾|ùÏñk­÷ B~¥—º¼%4Ø9ìnwJ…§C¾­Ð6¢èÊòlÀ ( ÅÉ™¤™~OØRoö„Ù!ü{qðw‡ðt[ÿ ½ÙYD¾ Âg-cáw~áw~áw~>Eö°ŒÕ>ó>ìî<æ‹h‘‘Ÿü ¶Ÿû>§€ŸlüNޱíÂW\Ð D×d.Ò7s9Òä Lå:ŽëJ—‡2ñ8gJø‰|öÞ²9bÒíÿ{qðwüοàÏ"òM€?k;À¿ü;À¿ü;À¿ü;ÀÿK¿—³Èv×£y²@e+Ó±÷ΦPl éÚˆrStrbq¦„Ÿn£¢ËÎ|Žȶô¯¿w¸íþ;ø×3ˆ|£=c;¸½ƒÛ;¸½ƒÛ;¸½ƒÛ;¸ýþp›Z1ŒÜn‡È’&ó01©B c¦ABŸ%‰‘9áçÛ–·Î2ËÀ-àö;qð·†ÛÀjkK¸íPïóÁí "ß·3–±ƒÛ¿ÜNÎÚáíÞ~¼ÍñöޖǦ%R™Þ(JÓã3>-}ûuÎÊ93p«t°-=x0>.nþ›YÎ;\øãBB~ˆœC¢…}ˆØ¡g§ÂØÈ(ˆ»äv†Á²î˜µ¿÷‹ †õÑ÷ôRrsãJCýn†Â’Û·‰½ŸÄÝÄÁ8‰¶š ½÷ÖEâ úd¶í"q”ä®ÂÀ{@‚ÅMO‘À ¥m#ik0CÌ ?O$ŽGh·¸ç8ø»Û*èßÀVÉ"òM¶JÖ2v¶ÊÎVÙÙ*;[eg«ìl•­²³UÖÚ*8ç8Û]“ééK· M›¹XŸl› 5˜éQ臄)íä¼ÄL ?QȾ¢u ÜbQã8ø» [ž8‰‘ã~¾E "߸¨‘±Œ¡°3v†ÂÎPØ ;Cag(@yùF£v¨'³™+;M+'†í~›wUN=ñN¿­4°Û[’³¥åÒj2pÇ/Ì„òäf³…ú »ZQoàëª'7im]= __qeZ-òxÛ—ÃeéŽûú欧yÏñâµnÒ-ÅãÑÝôº¸{5èªvJÜÒ&ðŽîŠëRôzC_ª‡Ö ›àùàAòeéc͖ꪟ:Cê,CÍ]ª¿›g{ŸÁ\tg}äChÐÀO‹óûí¨®œî  (öšŠWº]s”¡kã]iìÿÑüZ,T+Ç¥“/·½Ž:xÚ9˜Ï`†¿muLýp? T2£=a˜]c2ƒèÖ€)JßÕ®F‘ ÿ0Aê{5¡‘¦eÀgS€Ò·=c¯ôüµyqþê«´ùÅÓCpqn]_~¯ÈWïä… Ï¥?®ðy?8ñ†×—µ¶h{wâÛ¹[ê~o ì!Ñ©´KwVëúHêÑ÷Û«Îa¹q~WnYVWZ§û—ê‘V÷¸zÑ´¯î®Ð®uJ­ÇV@¾÷¯‘gñ Ô¤v\æ[gõÒSååŠVåÇòËÍsåîÊ.u­›òÝÇòQ>ý+ŽÊ…ü4ÝQ’®ÐYl‡zþþ|} m¹ü~w]/y¥ÎRr¯.¾ßŸ6Šèê¥4¬Aî–eC}ä´Ñ´+wívõ¢„+•ûëV)*u¼g~!CyÒT¬« ô¨Û\n\=º)•iùî Wëß½ÒÑ:¥3ÿtz—¿™¦+>Åé~ôï®/ÚQ€Q[žœ?_âÊ£¼;¾sþóç+Ü>|¿¯¼Zî·® ÖSå¢ü|Úøñr…KCh3­<[¨Ú¸²¯íVåîüîúäªuZøþ :íî%©õ/òäx( Ðæ»"©ÜÝ@ûò h×Ý}+¬çIù.?åi>–Ž&éž*Iº!{hçjÙ7Ä’}ñyFö¯y ß>OËÖê~Zzù@ýô Þ­–ÿÝÕG’¿½fL=WHþwE¼Zþåç$ÿçÊì˜z-ÿ—f"ÿ›/_öŒÿ5´~u¨aJø]¯Ÿú…b­á•j_ÔPLU#X` #­ëЬÒÜ F]ÙV±özmlÖ[#Ñ¡ÑÄ¡úJ§N‹|}›®åY¼ßÒwj?ðV{ûF¯khˆcì¦Î1’CØÛ74zôEGn†)ËñÅÁ_èök°B,¶¬¬òmGÐ`N ÚRÖàD¿˜zŒaïí‡ï<2ö5VÙ7[C <ŠÀÖ•‰ws)3‡âô9`ÜÖ}/GýèKE ’J•4þžZËÎ"OÝÆ±G±þÍ÷rÞ?–VáRoSÚI e¥>ãï‰9 6Ù?ŒhÇÿccékظÈ=ͦÿšãàL]íg#uQ,©”äð¬[}ÐLºinÚ='w ëlÜù”~GñhX×è†``gø­e¦šä ÇVÞÿÍ0êÍB¡X¯NÆ„ !h×@uzCeÄ=÷·ùrºS'Õ,´EwtDÉRfw»»Xh1Á=Û”Tq“Jéš Qd: [žr8U¶02'|ãEœ-îj×VKo4cp|ntàr×ÂÌòÌ£¨¢ð‹!f†!æ'¾Kûjo #Cû ÜhK³/ë¼OßxYg骅N.UJ«¹Ì¥j¹ÜôËÕ£â)<Ô¥êìçR9RôWg@A¹¤¿ÌPZ¯ñâ«Ùìµb½Ð,ú_ÏgßžÔògßJ…zZë×já[}E¥µüÅšœ•je®ºz£ZÓY¿6ëþñQaÕ§z¾‘_ÕÈ?J³_*À¾óÒñ˜=åKxA^'HESª4еã|¡¸THó%QêMžW,4k ¿Y<.%O@kµÚXCÍ‚°fÛØ¬] EKëlœ•}äã•Ý"ßl¬ê? Õ ¼šÆ³<¯,WsìtIO.7O¥”­«äT+­l ö­U\YäÙ«µž©õB½´&s¡T«5çzrÞÏ>çÖky(³¾škµÆ)CÄ[ RÄèa½‚9¥ú\ @T£x[hkj­ŸåÏjþùi¾²¤ãàU,)Í7pÙxXÇxTÅ2ëE²§Û Sµ£ºjÀS?6¢¿ÖqMrŽG·»NLJâb„Má†È¤~œbñ¸ã9"œ%7ÕgJøÓgÕú#ƒÝ6yWeY–$`ÜÁPÃ8 y bÑ:mqaØ;ñè-!ïk¥?±ï…Wѧ‘›€ÂhÜ`2‡‹zUÎáîÍ7seàí_“íxnȰ‰@žŠÊ&„x6¢ØFø cÜ’Ž$^"Û%„»!±% Yn!Å,ùÖ`m“yX,džúS÷ -ñžL`âØáOsz}1N!{ÞêÎÆþ¤‹Ì3á=Gãugí’9Ú&[pb[6µO;éâNÖQ¨Óëø)É0Áô[ƒx)2]KŒƒ%F²¥£…’æåó?|îÑ'¨çQˆZ­å“|ÜØ¹ÜsKô,A’uî8p¤E£UËù¯Ó¦ÿ#³D9mËȤøÈŸP4^’ÛQ¥!IíÊ „@Ü XTÈRF¶aÔ('@Q³µâi& ýHsƒè™ç¶ õ8jŒS׎:6u¬ÙÜ©LãÈèþ4hBˆêÊ~¯Õ¾ u¸i넽 Ÿ‘È#W”‡ d« †]ÂSœÆ× «,‰a€‡.oïÅ:ýf&¸ ~¨vãÂGƒöl¼JR«™JΗñÚgŒ=<-v¾Ì˜=«!$˜¬¡%-ÅuÁÎ ÁæEœè¸ÇЦt¡Élð3MØ8Ÿ¬lÈ?'dcŽ\"< 0SCËã"Dˆa*¤ãyN‹qðS 7#ø”1_VÈz“ÔF¥²m(©˜ ½Iz4p)tSÎC漤ãȤòe®Kã ¨LBž§ÞƒI1Àa`9* Ã™²ôÍ33ƾk½…ˆ·ëÊ ]É@:T9)jÆ"a€Â˜QA‰3+Ý4¸gV¾qó×JW†¨*`ŒK2Û"¡$ 90J@O²B‡(Ç–o$à¤Ú•c F6ñ.O¤B<Àz| ‰ LÉ@9Bï `ð4s¼YQƒ1jvx€Ü`Vج“µÐa¹ƒ2#k˜7˜ƒ@kZzQƒ£Ðc^<³J"è-dÔšÉxÎ$ìÅV(‹ƒ¹–Ææ)â¹.¢6aˆ†JÚ˜¿°Óv¬žœœu-ˆ¥ý¡œ“ñV?EqLÃ_ð"ǽQWãRþg?q!1¤Áe “Z‚˜ ©„m…¶Dıb?Œ–©N¿åu²)v;mЮ:—V7‰«öG}È¥·ÀûÎp´¯}ÇÏ9†’O±³h@½ú¥Ž°Þnù ^3>N,÷ýÔѰ)ÿêE~¿Ãá9ɤ½Uº Þ`èO6@û‚v\QJ¨ìŽÝº]ΠŒêàpÝ%çiŠä‡)Çü±ƒN;ÌbÞO’ôoŸA¦zoPÊÝ)AÿÇÞµuµ­,é÷ó+4¼dï5[F÷KÖÊ:C€³± àöœ³¼tiÙ2’ì±ä3û¿OõE²l –L°·,©Õ—ªêª¯Z]]i‘u°%Iã „dÈŠEðRugs­?‰ähw±6J)øäqöÄŒ•6‹jÇNŸô™užiÏ=ËígOiHP¸>rfsâ=îicl£PÛJèBàRpˆ¤·p=,œiM©!ûø3};áµ,Pqlœâ¼þ£»b¦êA47úŒ K2L'Ùä¤)0½…íñ¶ Æ Ì›àˆ+\ð§?#H‹Ÿ~ ²‰“+ÐÕø%âÿ€°-ê¼ûPè…`ÑÍÂ?%C—ô,hòšF‹ ˜¤‘Šì%ÛsA—l^Ñ\ ME~y²îê¦Ïèâ)U8 ¦ŒFl9±€ñÀ!y½ÝÇE"[N^+X2°†Ç[¶TÑ ›·mOç5[¸­¸¦à(;e^d6­‹2/ZÇD™K[ˆ2/@^Dú¶ËZ¨[Še-ÖvXÖâ¡}~³HØëÁX“¾Þ[µ“áÅÕäà£íôŠ$o¶¯WQu×@«ž &À³€Z¢–Û– –'Úô ÂBßÁá,EØÏ I0â—X‘l‹‚û~8˦ žäLðT„åëÌfÑ:ÊÃY~½ªmý tþ®<•g¬¼å+ µ5g¬`­ù^5íäÛìø’·LÒô|ê%\Ù((“/-!9£bè›-¼éŠìH–k€ØèàŸjžÆ–×'T×SfH¦Ä.¸;PX“VBa  ±!Þ÷ ›æ:•ăÂEX¾ ­£„Â%~](,A­Ž)x¶'êžå醂D]ñI•4ü_S,Kv@-Õ6ñJÉR ¡ß„6Jýn ô[ç:-3˜n ¢Mý§ͽššh9_ÍN$¾œH*ê†çU8’§ëޤò’áâO•¦ÂÛŠ¥óH1tQ”]O¶éÙ … î˜×…ø%óۢྃysS0¿ƒëÚEX¾Ì­£ó%˜/Á| æK0_‚ù×ÎíSÂþU°_”*`7;Î2uE´4ÞrTW-ð†ŠT^Pä*‚çÀ®pÁÝÛŠ¦Ä/pƒÃà¶DÁ=‡Û¢ø7€ÛEX¾n­£„Û%Ü.áv ·K¸]Âín¿ Ü–+º¶ÙVG6 )/#YåñéY¼!‰/ Ñ­¤!E±¸Âwn뢿DÀ V··DÁ}‡Ûòßau»Ë×®n¬£„Û%Ü.áv ·K¸]Âín¿ ÜV+¢©m·ql²+:.o»¨ Û3xÓ³/ †­Ê¢&§ûš Ü¡Õí•ç>ê›ÁímQpßá¶²!ÜÖsçàv–¯ƒÛEë(áö^Áí÷Á¾ÄÛ{ƒ·Eå2Ø›¯’ÁÞû(ÚuýÝd°/‚×Ì`ÅqËìyBó÷î(H‚ñS»ß³mîdï;µV‡ØÖ§ß5ß5€Úòfºh’# âñ¡Ÿp%˼mZ /»ª…$Ëv Uæ Ü_Å4V17'àºl‰‚û_¥Ë×èR°ŽÒW)}•ÒW)}•ÒW)}•ÒW)}•}­bJ›EÈš’m"]”x H¡-ð6^SUCóTÍ0…¹… îÒ"#~‰€Å…mQpßm3GA5}ç…",_ç(­£tJG¡tJG¡tJG¡t ¾£Fãú#Vf¹Ô™¼Xq’`Xª ©„ÝÁŠ7}Ì—ÈAÙÄMoð´ç‚³ê­.ˆûpìÇýa7e´Ú¸y`T”¦ã!©¦øÉXèN½Ž·ª<¥xg°š.2x˶ ÃãñÛ´\ÝF(`[9+Ä¢øR‰~?i»hìçÈ|ׇc×ZUžX6f«Öœåôæž!¦n{n¿¿;Ø wј{;+ Û¬ºö éª`aÅð×ùÒEmè(·fE.÷áÏïŸO/ë_ªgŸ»ý>ŽFÁaôÙ!hø®A7ñÅÃÈFT£p}‡ã#.S€Ü0îr ¢pÎt4Šyø;‰ó[ yƒÇ¼FÓéö¹ƒêìó÷»ÛÏÐ^=°î¦cûîVhÝŸ{Mù³÷Æî ×Õ?›ÒíÀ>3“ÖýuàfÏùz«W£óÀ‘LÑ ëAµ'øµÞä^÷.ÏšIó®:«ÝB½×õ/îÎýVÏIêaUh‡õ³+µvVªþÄ·åóAK4ëN ùºkßùßnªÓúcS¹lÔ&µÇé²QUª‘Щõ®&µ“#öïtT;>š—;¡åŽÃ§ã@³óYëÆrÞkÝTÍj¯ªÖNZÍÇnxq÷ú}šÔOšJÓýfØ”/-¿~v }¾~¸l|îÕ«q54gÖë¹gР.4ïÄ sÑ.Ok'5µÞ{˜]Ÿ›Õ“+eÞÏ£éEï¨3/w:#厽Ö]ƒ) ܳÛÙ½TŸ¸÷àLJ·¶|;kJß1f—#©uVSZ¾ØmöªÓ‹Æ•tyVMš!Ðq&HMè#ôYhk—£64ÎT—lê¼Ê嬶‚)Zç¶žðF¸~ÄaˆÃ} põ¤Š!WDÉüÀaôØvBw=LY/S|qˆÇÁŠ,/•çÖ¶c0F'ÇØSÆàߘ¯:qI©ï%égÅÜŒU>p?bÅ1øº.]Ý\Ù UÍz1°ãúý Ùõƒ“{ÒÐF‘ËýƼeNª"gËÆdEñækÛ¬˜¿¯hB¯òÚ&ð"-ÔÅø¸ß¨; >Ùï\<"Î1@ÇÿX[û d|J=L¦ÿZ `®­`Ʊ%Š•ªùSä×M*¦•¹xf îЯo©„[®Û‘ërýQÖGî›ôƼW͵€~÷ÿÁq7ßOon>fsOàŒkˆÂ~‚8"è•,ÖûÓBM›;|2,èà_­ –Q‘„âç.ñ¯üÍ…§È‰xˆ]±vØwQðÏùO’ˆöSº3 HñKÃ,ö©…ßÚ—‘• ÿ¸°yC (ø!'V”7ý:²a^,CP×~Ëxúõ$ô#?…ù¯"bEXQΚ>-÷rúÊ´û–ix²«‰^fö\ËL×ROBЍÒ'ÕsAö4$I¦i놫«šˆT !Ô-Ù}ó¯<{V~— íO¶ïl¸ÒD^™/T°$ÔÙ×É6hó8¿J‘½GÚ ²7BПÃÜÔ5Ý\¼Ùí6]É"« ª(åšÁ ÊóÈRQg¡¸˜>K—àü|Ia©Ù!æ ®¡",¾Âî+óû¤Ýô¾PÉú“æªÕ-]@ðx[¦ ~¢Á{žd™–l+®d°ôõÏñB(yñ:¼°Ý´5Ãàe x9†À[Žìñ6Ò\ÁB®lëx)üMWÑd¹b(æ>ÙkeÕááóa–öú©½–åÒ^—öº´×¥½.yñÎíµbVTCÛ#{­¯ô¯É0õÒ^¯¶×ÊÆÉöL±4Ø¥Á. ö/2Ødž©ítÁM`ä¢ÜÞ Vàg¶_ÒVlaO2NÐ-€ìnn' »“ß3˜½º¸Í’Ý û=˜lïd/>ÙZÂî§d-¾e­ÄAïmMÄ ÃÔTÙд}qWeÙ./ªŽÄ+²có¦lè¼jj&‚«Žëýx©êF18‚¬ƒýÅÛ’U &:¼©º0ÎÓlAÐ UE\á‚¿0§óóýñ¡ âà0S_¢Tñ`›m‘jσm” ÓÑÉŠ¾{¹¥‹°|]°MÑ:Ê`›3%¸Î£{3 ¹fõóˆe t¬Ä.¹ÊÓ°…«ÓÚ÷¥GóQü/ÝýëH(„ ÑŒŠ(I8&"µg¾“‡±tÍp=Ýá=Õ5xÅ@:î•Çkº¦ªª§*¦MÇ»´ýù®Æ\Ø ç‘O©æP ó>Ô”")R¼=Š3ø4‡a즦¹÷òE½!B„BÖ€ ›éMÍð]ÜÛ!^Ç•}+Å_ÃQ„ÊiÃZ÷X€B€Ú DÇ £1ðƒû„®ÖÐébJM ­­Úwß:ýÖ<æ¯û!âÇäÁE. î98ªÑsšûƒ> „©ÈAAŒ@’”xNˆÒ'Ièì’+/„@žèÓÿÎ a~#™DR^0Š»ø§ú$J 0 #‡€]\DÞ ‡w’a€/¦±EñÙÀBóž$ˆÔk§´ŽiL®ÃpJnƒ)gMˆä:ty˜©6û‰õýhì¦ïµûƒ„ÖMš€R6y4²Ä“ "ÕÇc #Øá.‰néÇã &"ÝtPn°¬þ‘æCÑÀïDP_ÊnÔŸ †ÈC€wI±n.HY‚p\UØ“§þ€D× xèD”JÅíÅN׊:ˆž†UűM]ÒáQèÓZäïÀ ÂQàþÙžoIÍa2f´N»<Ù°‹£m¹½Qœ¤¤qA?¢à9¥pDßžvPb \D…ql“^܉ñN·´ò ¡Z`u½vRY@Y_œŒƒlL%ŠãCJÒ±?L²§ÎÐPÇrfL>HÃãÇ#2òPqrHìv]΀ ¨eüR<ÌúG¥ÈYóäOàD }uà“¦§˜|Ú]ö×™·¦‚²ÜÆ“‡Œ?$äD>i¡kñô—LXgbDÕñÐZ×T$ƒ¶éÝÀó„+ 4¡º1 N—w¬lòé»Ñ„(RC´){‰Ð  LŽÅæT&„ƒöœ¶À©ÿEœçÍÖ0~8<èW™/qµù2$ð½Ð𒥂ùrË›–ŠxX0$SÖUæKÜ_ó%nd¾äwl¾5]j2Í“Îï§Šw®²R¥»r .š†T§v+UALÿ¦j!ÓŸLÍõÙ|Þ3ÍÆÏ3æ"S]©Ò\0L--i˜¹H­jf•Së;ס F„*if;™úÊ{bÿrVƒiïTóez–Z“Lû/à¦Z3“µdn`EÞúçl-5AsÍËTiÎ<-ƒ›ÔBäuiéDy#ÄL[Îô¤¨aÑrå ^†rÌ&CTs£óÄg–uQq/jùhý0?7I Q1û²`iÊYÆdy|µ`ižXAü˜¡ev5C: «äðP³–ñWŠ]f››Ïô–Î ý€ùú cæÎD‚†8þã.z"±†0§ãûý‰.¶þòXŠ9+~e,ôBÏmtßF,nB3¶KAj7ß8–B*¢)îzЮ:nÝ’@·{¹4%sÔúZ÷Ü3ShÞM:p-ÚÑuàt€Òu@‚·nÍÇÖ]}l‡×÷òõØ=û£ÙùÀŽp`›Ê‚äNÕš¯à »Q­Q]ôN'µ“¾zyÒ™á ³VôåÁö¡\õÜݳïIíXí¹gÓ‰}öeÔºQ„ºÎ¦Á.sƒƒèDè+;´à~‘`µú î|˜Ò`ÅÚRÐ'}v¾Dƒ©^ ƒ©; ªk<àñH—ÇÊ´Ö«ÂøŽ&—½åò¤ŠƒÒBçîz„ËA=‰óõVh݃`ý}`<· ´Ï¾p2Ž;óÐ- à~‘à6Ø^6NipÛràm<ûÓ¡Þ[è9ÒmÏ–Ôèeãñ|}ëNÅuX¼ƒÇÓT`|3Ì¿ÚÉ‘vÙè(5Ó¿5m)˜þP8q﯃‹ÆÑ¨)_ÇÀ' Ï÷Që¾ <øÿ Œ€Ç‘`¹Áô°î®á~‘`È+ä¬Önp0dM^ ~VÉ¿«Ý—ÇúÉÃRju_äQZZ®7öEÇ¥ ge_äñòäûRPìé¾È£ZŸ-Q×OöEO'—KâõǽÛlIàÃÈØÊ í5ŽÅœþJÇz! âV Ü„¦l˱XªýÍ ½ Ò.¤MˆUzaÅQFc ʸÙʨ?vžõÂð³W@Ó5(cº%”!_ž<ë…ág¯`‰O×XâÓ-YbGyÞ ƒgW»/«¼°=‘ÇU^ØžÈã*/l?äq•¶'ò¸Ê Ûy\é…íËØVyadl¥¶Þ càô{az.kÝ–¼0CÓ·è…šñÖ^˜X‘5£ôŠyabEQÅÝåíô­ fgz·AXâ~à»T"…Š`¬ ᯠá}Ó”Ù(¦Á¤¹¿ËÞ]Šà}~Ö¬ .Èb5Õ“Gà5IÀÛ]›·U]†©¥Z"r’,7Ÿ©cUlSâ °²sînH9l´Ë!Ï693’ËÁ÷Ë©g[ Û804[Dw¡-~Ðè"г‰pÑ(´¡­¾Ç±-ž\tCj¨mv‘Ÿ?%èâໃÿý׿° ÁŸüç;:h¿þÀ—L¨ÉSá/ʺ9Dx"rÛÅû;ïéB±½°q4­p[ÎÎéý ÁŒŠöö¶ÆÍßa½Åû´úÃðu»ûïÅüËù ~`Fð|* Bµoû‡ÎÒ`0Ô³")„hë£bü§ |¤3,—ÉB$iáÞ›î_k¬Š;r.ç<•Ã!©C íˆÁUBŒŸ‡¢*(%ÆØ5Œ±8R«·ÚÎûœS§«Ä5Vˆ³Ô)š“6Ó$rB&0¤Âó\Ýo ­×*X9)ãÅú<^µÚ¨Ü¼©ÛÀIÃÀúýËþàøÙT¶Ñó.X+“ˆa\½›È¸²E Å,58NJHVMå k€òýC9éÊ7š¿žÉtU&?ÄÞ­Î{¿­;²¸pË/éÊÑxÊxíØÛxæ+¬»KY¸ZDQŒÒ/ãW[±ªª˜ÖÁ¹C©ãˆ_Ù`jú~¡ÏX˜¼®@»z~ìŠbÉc‹\­“J…\=¡à½—±8;èl:æ¡Hýðc‘â]Ö{; áI:M|e2ó¡ˆÉÆþëåy( ߟÜÕýpÎSJž}±|q@te‘4¡Ç伟ñ|GYØ)ûlë@ÐoË‹ååeâÃÍõ§Ÿ?|K””±¥´/È!±Õba‰E¤­øuG°©q ãáá•ûnùa$”$ˆe}õZ‚9Š´fÎg„¤xG®†T FGé²Õ{jMzÄÖì ªâmW3FšÚQºX2ëãõÍ»÷7?kvx£² UL}„Xy§nc3S±o±õ“×Äm!Xsíl:vP2¸½M'+«XÒoÓþd6êûüòÒ•áæ7›:Ú8+%G²ñ$^]#üqgÕÙÆÅ+wVµ9’MZZt¤ºTϲ¼àËv‡±~8:o¶5¾>ÈøpóÓ€ €ŒãŒóy1’4xC…œŒR„Ï÷Ç- £æòòïiN‘E¨ªÚéuY^`‘ a­Y¦ŸEÊ"á¾ëw×ï€F€F€FNŽFîxRö˜3/Š½Ð¤ïQ.N2Ø£x^W^¬ ÀâXXXXXX/XŒ²ãË“ü¡0[ÞT¼iŒ'*ßQðMpWxBˆ<9æÌʶ«Q&æßË5C£Ä×õbCÔÃ-¾t¿Ò~±5@æï@6ÞápËz¬¾WØ9lE‰Æ‚±é”qÄ#£ Œ³”òŒ*ºš&ØH÷Àv·Ãqä¨rÞ±Ö{Ó¢M‹¶,6«ß®Ê_ýq_‹óó7Ú3|$Ëo˜[÷¼óÿ:_©rË:_õ¯×W~ùåú¦dëÎpeø]4mØ.ÁðÏ_ÇÃí¼œ/Ç#s„Ÿ‘4ªõÀD4¯+50QL¤ák“£f¢F£©„{{{{ZbÏvrt—±§Ãç7óžÀ‡ÍoþøöóÕχã(‚u¾£Ü'ÌQnÀz ÷=ò¢Ü~ëÞû¹ú+·A.íÀâË”‡/‡„/)€/€/€/€¯Íï¼ ^—óšôZžrTkiˆjuV”Àê¿VVVV›ßDXÕ€Õ"5+Xc÷ÿЩN’³dOÊ“æ,™×•8«‚³$pppppppV'œ¥{ÊèÓå,B+W^”8«‚³4pppppppÖó9‹_bÒcÚœ.g ½ÏZ-5pÖ&g¹ÚÁÀYÀYÀYÀYÀYÀYÀYpëquœ…µÊëJ œUÁY 8 8 8 8 8 8 8«Î=¡ø s–áy]©³*8KggggggguÂYêÄóàµÉëJ œUÁY 8 8 8 8 8 8 8«Î2=Åé÷µZéj©³*8ËggggggguÁY„ô´À'ü½!y]©³¶9‹à,à,à,à,à,à,à¬N8ËÝI‰S^ס*žJ ë”îâ,ȃÎÎÎÎÎÎꆳ¤ßù”ó૾7 ¥†õ³vqVû^Þ¨H&^»Qéû÷ºGä,Š•ID„Œ0 qç"D Å,58NJŠy#±Ãº”¥ëÖ娭KË!ñòfFiÒØÌ¸wB&Ë\)dŒR#2o<‘I.Á,¡Ú•JqÖøÄ.ì–Ÿ{jÒB´G.Š”_Pƒeâú ²%ˆK¡(Ê’O¢Œ'®¸÷³¸Èëj­™¹Úgµulÿþ…–väÆ×놤=!_íÛiŠæ1žùë~[v ºËÆùóójé×VÎÆSÊዉ¿_Ó†-îR¾ý3î±aw“Xb¢"™8É4ãlnÄÓØdo2N¤ˆü(-$§‘”:V©3Q˜sm­9¸ÝÝ×~is«zœªVæ–H– i8¢ÊFˆÓ„ k’¤ÌɈ*Mx|ÖøÄgOîÑÖJ^‰†‹*knk÷Ugßµ­­˜>”BnÒäYá¦÷xÂÔåk³ÔøYê¿Ï‹œ»¾|^LL5¹“Ÿ°˜Ï4•ÖU?TܹÊçTkEÕ<}fægzÎß^}~ÿÏkÌÕ†MûeOµŽS»r,°–4Í"NLFÜ»ÅaÂdæn]žÎ2–fJÄ‚ÁuB#mb×¾F ‡gÞ¥Së«õ%}(Óiß—ÎHlpeDe6Sš§Dñ SA¥åZJn½oe#+"“¤ZéØÕ¡þ®ƒ;§]+•'q’¸w0HZmOG:³E8V:JÄLoLumNüøwÛ˜zjØ!ÂËäÞ!$MgCûu\4þ×ø>4 ñsQöÎÿDµŸ0ä–‡Óû?Ò»tbýûbߌÙûòÇñdp;Ùáb–òŽô\{†)Çô›ëýü>óð¤?þêOF·—v8ÿ•†Zû<™¥çËæÊf,ÿ}¾œ«ž+N±Iâ,O‹çÕwPÉ„”„0‚Féô¯ñäÏ¢UJê~áå Ãl¯_)÷pÏøÇ|ø„®ÿõ½ÿøéržó• ¾¹W[ûúåíÕåûó›dÖ½ç%K/ãì’D—J•a²åùû_¹?ë|õˆœÙî7aÂòé}¦µ)&G»ë´ížý¥¨ÚwW?^úŽé€!Üú§þòöæ··ÿ¹v“ñ­oý²g– ñöß—ö« m4¦ÿéÿŸ³×þ:ÿ–!y>Ü©ŸL_ÓE—tÇÿL3ïeþ€»á§_ÿ‰~ûôÓåÐÎFNÊw¦ÜÞÃá¿óõë¦éäÎ–Í ü܋йÛÉØ¡âú„~’fv6œ.ªÀêÓg×ólþg1Ÿû]µž¯ŸôõnyŠŸ úšnœpï†âdqŽìã¹›Ž’4A_ÇÃÙ#Ùòÿa’Eê8þ3ü–Ùažne”Å›ÚÛ"mõá°“Õº'4kå `‰M…2êa$vÿD‚bY#%MR¬ ?k|bkc~(pï¨2ÞÎAØWºƒ Ûæ’£óš´øcþAÓ{<æüÏYü‡8áÍoŸDúÕ» üUvæ:[p3žþ8ž’@Wñ8ñ’áÞ3@vž@|þ¾Lè;kd‰âñl˜œÆSŸ½—ù›÷Î.J´ Û§”¥2N4JµäÎgeÔ• K”i)a3꜇³Æ'¾TØ>QJ»1• "bŠ8‹#d˜VHiR¹¾žéQ2¯«µæJ±¯jû®•⨡IÃ>&Mïñ=†í› é—Û›!²•¹ÍàÄ„3¥'B ­E"qÕÈHš&IrÖøÄ Û7´µ¬:uQeÍmí¾ê ¨üøÃöMšü1+Üô¶ïÔRW„í›Ü©}Ø^k#ÓRBØÂöO ÛÓKAÛë…íe'a{á^øÒˆW¶o4ô÷¶oöìc Û»«!lÿâa{Š{”µs„eÆRÿ%KŒµë‹L#Y‚b%©â6ËDtÖøÄ Û7 Æàªå½—UÖÜAØW¸ƒàŽœ|ؾI‹?æ4½„í÷ë.´Û7²D/¶w6OcúZlñžKÿÎUõð‡åa 7óÝHy]Áàûì/7–e9¶eY>•Æ.<ÿÛ´qwMuí̹X‘^<ú/¢Ó^úÍÞÝS?®BˆÄ_² v”‹\,þâ<˜pÀ8›¯’òâºðœÙý⊻ôn<ñ t(©ÌúÁþ]äî:±7̂ЕÇx§vy?п];Ìÿ6èÕ«gâÇ ‚„UPÖ/)óåñðÜùqÜ[¼Ï|%e¦®ã¡ˆ:ÆSî~ÒD£,£ÖXñ„†àI1Rûeè§ßâá,ˆÐÜý(OxNbiq‡ §©üË¢%Š(Iyt%XRY «,.]D•‡ßú¿nP´ˆ€•ny_åñyµ6OÆÛÙÅ1tñnº¸ÅÊ!ÖˆÉÌ kŒlÌ2¥2Á6MX¤øþºøzö„ºxÃàÑ¡ÒÚ*î@SÍ¥L2”P›¸ÞA”_Ñ‘¡X;]6Æ©­)¾itâËLLº– CdÁäu•Ò<²°¯ZÈÂ:ÙßÄc“,°Ðô0ñX7àk¦˘ï!M/“=¡äQûò’Uf—_~Ûâ±–û.j +¬‚+®üK¹òùœóº¯iŒù>'ý­sÁ­tA.Ø óv9ó:uxFäK»bHëð‰‰™J£Üè"!±Ñ‰õ•Æ…G>ˆÓÜ;Jt‡Ò+,ZæÃï©JNÜQbm—V`„_¦|ƒ&4S¾á=ÀUÚ9ÞwúIþœDƒ‘ êr“ß•tOÇ“ó2iqù—t8ÄË¿{w•;Ð$+&„µÌW"Fš2÷OŒ£ÈÐ3"}ó,¨+èdd‡ëÉ™+³!“,'ÍèJÞÓN4ÊÆ“ØNÆ摽@ûL£Ù0Ý®€Å_V‹ž ;…“ˆríˆ@wåO¬àÖbB]:–¢×·=©n{lRà Á(U"BÜRŠ", ‘åÒZ!ŒHöY¢Ó ¶hµøãá|÷©“LÅ(‰ë:UÈù:’J !2ÁMÄW«ažXÍ•-ë€ÕÖA%>¿FÈ#5¢i¢”³³ˆZáÍwš cEŠbåXSÔ®¯‘§w þÔNqp5´Ý'þ)Y1W—QF§Ã(ÒÎëF"3Z%iL±ÎΟø$ýøÛ³9ô¢Épq°J Ë몭¬î©Þ^=¬þ]1 G¯Táãƒ×]àQxmx€×ç‰: ƒ¯IâŸ.h²§ –…`¶´Ãê™êaJöµëm2»»ûOg»ÞÞŽ]ý\„{†-æ*£"‹òÀüÇó¥€K óÇ6ÿ±2L*Mí<Ìëzobbž!ªS‰¸à iF-2"²RKq“®~ÆîXZ3gs—Û„½ #Ò?6|Ì7ß}ÎÏ7ÈʦèzÙ¢M‹ÐáŽ[OzðúV[»wO——;;½Ü=}MdJÍØÚQýà‚¡ÍqF¾xÊR5ä.Õ0°?Î.ÕPíTCëcj“jlŽ•ZéÈ2ç Q£¿O!í×I3Ö$Êýªb«[HÇ|¼w¹3ãJyš¾m‡*ñô§¯K…W›~[ÁmUý½¸CS7*‚2Oë~âÊ0™Êïàý)$ü´±wg¹ çâg¥·–e(?l/Î)6þ,>D¾ÿ#Çç÷¦H‹@Ÿ/Žäìã‡OŸ;Ù*lÇò…â§+ŽË/èe,Á™V Qˆ[®‘¶©E4MUÂe¤0×;ÛÎSë}Ý¢õZEJcB“x>0Û ä…]laróx†Åï_ö¥øoµDi°Ê2d©¶Å´±SL× ­À˜Ä©®Ý… Pcÿ¨Aö¹ÓV-i4髤qˆ!Ü‘ oíÓÝxˆoîÓ½¸egÛZ?a€v½³õó^a£–F±Öý^È䊉¥¾åqWyæ‡ gŽÃ _Ý8Lê¼®@à?߇´õãsÀW‡I¥$®žð_Ì<>@gÓÁ0Eê‡Ã(½²î¥œÿ6ØáÙ$Î&Î L'³ôl0 ÖÀp×»óÔg*åg±;»?¹«ûᜧ”&<ûbù¾H„èÊ"9É>&o­ÈÞᤕe9U'múm±¼¼Œ|¸¹þôó‡Ïa¦Øg·} ŽY)íËHÉ\Ú_·'•_hÅ2¢­B Ž4â—H§Ê l˘L ^_ûhå '±Úãt êý¦&=b+B‹ª`X`÷ú¼v-2#>^ß¼{óÓëw”Ö†xX€ Sשو܇ÇÔúÉëŽÒ¶1\sìl:vÂ<¸½ Ï×Z¥ß¦!íÐ Ú•u0W¾Ùšßlê@`ã¬t”l I1+·ÜaDQÍ^¹Ã&=‡­yG y8<ßQ^ðç:òç´€0çñ9t-ØìõIù‡›Ÿ>€”ƒ”oIùüÛ”¤ñÀÛäÌÔ`”_íIá[H{Íå‡U|3ÿ>÷ä_‘¼®¼ øŠoÚ*¾ÅÅ?¤âúíêêúúÝõ;Ð|Ð|Ðüçi~‡“$´G„2Ò¼Ð$‰+’f§‰1*¯+/` ` ` ` ` `Ìw‡1ZšãË.û¡°~€¾i<{!ª!@+ø¬# f/Ž:­í¸j”¾ö÷òKáÁ(ñu=.W‚öf±ÔX®%áÉæ™B\*¿©WÌP&µÀ"!Vku-_° xìAÒo‡ãÈÑühóò,èä×ë«¿ür}SòIgz¿R¹M+­KÕÆó×µ{šþË¡µÏ°#̬nTëáhš×•ïù‚'$Õµà5L•*šš¶¥iÛ‰p]zÏeãAE*‘ß~¾úùp"Y½âö²Ü§)’¿û¦øyQ n¿Ë÷½ÿ}’ºú‹Ã¯v8[Kö}ør@e…D8PÖïGYWòéAU«ªÛ—sü±X':DˆöG ÍëJ þè¶jò–÷IXÆTóûQÍ•ÔuPÍÕ\L‡†±6ß$ã$E”ö˜>á .%Uß`-K "Z!¢DDDDD´™ˆrŸ‡wº"JHeÐ×—Dt—ˆrQQQQÑf"*{’ŠSQ“וD´BD[îÊ#,ï"ú݈èÚ= £¯MFÅËÊh‡ÚÊžÔHþ2Úú"s½Šåu¥222222x(­ŽIFóVš¼øÈ®©¤Vnj@ƒ¤v#©„ÐÔ#ÕÔ'ެšÏWK™K\j㔩PD°»[%Z#™$ZʼnæÂ©€WÔ×h£ÆÕjWÞq±ùÞø¾\PÂU_Þõf»eÙ/š·s5lýè! /°h0"¨æQ†²ØoϰD†Š q¡­I‰Že_¨Ášu¦½4kÃJÙG³¶{ô®f¥BÄ2Š’™$î6#›¥)'œ ÌD¢Ò¬ùÿ³w­ÍmÛÌú¯xò¥_âBÈLÏŒê(‰¦ñ¥¶œ¦=Óáàj«Ñ­¤$;}'ÿý]€¤DYÓ‰ì:=ÊLk‘¸ï.v,`ߘUÆ6äc0¶)Y±lºÎØ?ž/²d—Q þ Õ7b8çÿøí&|.å÷ñÛb´ÿÚõþv“ýí&{‡Ìï6Ùæ0yb˜ÒÆ$¬š@ ¦æ}»Û~ºí†(Z{®Ì 5Þ›¾¯1}ÏÚÂ=sëEŸÝŽÁ+˜(¤ÏYÁìàâ`?È}ŒÓ&Õ’ìUËw¡Z¾éîß§V*;Ýèy¥òÀ/˜û5;Ê·v¯]öÚå»Ö.œÿ¼šIPsì} @?&Œ†I #9//…u¶¢A¢‘TV«´>hœñaÔnÏ?wƒöP •Ù¶W=ÍD¾áCôr”njõ”)¾AåÛHÕLG=&­v¬ô> åqâÈvG÷áÃ(~> oÍ.6æÉVÍüƒüT¹]HDàåäNþ*ßVÝú?[Év§•r6=íêkÊò¢–²÷ßPÇWxHµŠC”HD ,´´etç ¦%5ŠÛ-Eq¤D1Å2Ž™J ´RÊ„àOî!ýÊù¾ÖßY%þ=Ù‚ûšÐ†‹žªÉ({QF!-RL¿.Ò‹0¤Â;¨LH¤ƒÅ6 I¤† üO…Rr,CùûçþЏüþ#Cѯö榹ßà Ù7ziÃnêwäîs¾áÃÐÿóÑN½ÜW&FóïÜþ¯S=ºVßðÞÅ;Èa"êi߬`žRºF6 ˜2·A’*)Œ_‹ˆ "l §â÷0ôí¼Gëyrà Ga`’HT`È0†å†4"Šx¤“ÑN àuQ}ø•z Õ¤ï¼6æÐÜ AÆÙÅD3mØÈmÊ+ˆgƒ8‰£(²å’ÖÉàÚÛ ÈÓÝC†u’€b °ˆ€ÐZÀEde-!Ü$ì±H@¿–Oî®g "¥"!qX™8Á gó0@’‰(!¡´ 4Îø<i|ò—ÚLD¯ï@i¼Áã_R«9(},ríAé2(¾;HÚ„á÷AÒ¦uì!é¶ ¿•šrŸý©u2‡©þ9\k5¨µQÀ˜;†E"UH ,”L£ŒÏÆKp Ò Kƒ|TWÍ!ãù¢á‡©æÇ¢Ú^5/©fBôÝ)ç&,¿O97­c¯œÌüµ:º–­p”kXË–¿$¶@xÅÂ@(bibˆLüÚgQ<­Ÿoº‰ug1°vÁP«¼Šèý¥}|y'©kHE°Zpÿ• ´ç/ËG(³C„áo±œ(Ý%î3\ë5_C®_²¸¯JÎÔØ•ÁÏé@Âs'Üjïûé•ëìé47®£a½Lõ2B¸V®žÕfƤ™”  8©^B÷>Õ¹uÒéÍ(ûÔ‰ª|6A¨ÒÙ /ßørbâäF—öapŽ q•Œ§iohGž®"SþÛ·,NcO»ÁHaXí³ßŽ‚óÑÀ3Ÿ03C=rߎ|Ñ:ö±j“Ñx`ᳯÈ9*\ëÈ1n¤>™IE<5ÊL•2¹:kÿähl ÈS‘ú5añÌÏsCüy»¾íOók÷SzØýµ(V¾G%¿ùèKŒ Ô$óŽÛ\ÌLS„l¯?)Kbv[Ôq›ûçÁàÖ¿S^6üó@0S¥û9õ†3]•KGãIQ·orùØA;žz²ä*ÈÉ>Mh_}>2 ­³@]ò_ˆÈg7Å0ïÎøÊÔ[ÖŸañÑ~ïjyÝ#ÑÃÑÍ83ÖL”'KþÙ5ׯXbn}a5Í|ê§Þ8è#mûtb8ÉŠ¯¨æêZ ¯L0P`zŠžH?À¡ïðtÐ+fü@¡ùª?˜öõ_>FQf¾æÁ$Ëæ´®º<”â¢$F*ôŸÓ|R‘Fƒô{CSè“’Ââôí•™È*ÎNÂ8“þ‡Í¯r) ¸Ê=ÕúâÚ¦ýA! fÞ5ç`9¦1ÈR\ § 鬗Mæ©*c}såB3 ùð «’›¬$O!NzlÐUñV ÃjÙʳyÿ )’ƒ²yÿg4VÃIQtÜóMßb0ùEwË¿êÖ»j`*XåÔM?þ'çxØó-\‹ ø¥ú7egrS¨ãLgbXŒëùA ã{7¶nöpõ š?Ðy)0šb&¨ë@‰±½~oÒ+Ê3¢jJe´iYÈÓÛdãI1™”(çÔ\Çé‚¶À©?¾xßW¡Î‘„˜…<P.5~1Äç¶â‚Hª1k`¾Ð³3_h½ùjê§kîÿ{ó…Ö™¯˜†kÌZ5_!ákÌÛ…ùBÏØ|-kºÊ&Ì5O5¿WïBeUJwí\6 •®ìV¥‚Jý[©…¹þ,5ÑBŸ-æ}©ÙJųÁ\ÌUW¥4— d©–îh˜…¨¬êÜ*WÖw¡C—ŒH¡¤KÛYª¯yc+ö¯f5Jí]i¾¹ž-¬É\û/á†RµÎMÖs»+êÖ¿fk ´Ð¼¥*­™§»à¦²u]ZC:ú*M[ÍôT¨aÙrÕ Þå,™ÍQ-ŒÎŠ=ž[Öeެå‡Kè§Ôù “T"ªÒ¾,YÚåÜÅdu|µdiV¬` üJC[ÚÕ9Ò)±J ÍaÖ]üUa—³-Ìçz«çý€ùzb; “‡EÒ Ä(Ç‘â°(ÄŠ\YxL8ÑškõƒÆÏGæ?ŽæTLƒå2 r4Í ¾q6šõœÿæe“µïKh½7É7ßú0§nsgÚc‘÷©"çd?@‡˜?©?mó§õÁÆ`½{¶gôúZâWz…æßñY³9BËØ;W©Û5Ÿd£¾KŽU5´Ñ=·J™Êñ¶¾È½¾µ&ðu~1~–(šsbj’G’'’hn´T¥ÄjÆ©ÅT¼Œ©&*‚9cŒ}r¿ØÓÍöµ´"ɵw¿¦Gg—éG€ŒÇÇz?:=>»ì¶Ó§ï/Ûi«Ûm½KítߥÝÖÛ59Ú»í“×õ„‹Ó£ŸÛÝô쨓ž\·ÒÖ›7“N÷·¥ÂÓããËôøôuû=<œw;§õäÎqëm;íþv=8ZO/.ÚxõU½øyûâè²þôæCýíÛóÖÙ»ÎÑEÙêO§Gï.64zÞúuKɓӓ¥æ.º§ç®èO—é›×G›’.ZÝÖ¦AþÜ©§œù>tÞTä9þ/ÈÝ %k:'Ýöù›ÖQ{-“–kj£2:aÞ½öÑå9°&½l¿éOÐ×ÓÓî–Þ¬0«>ÆË‹ŸVYCÑÚ6»gÇ)JñF±h]v7 Å/G§¿âÍ}<;‚çõ:н_#ÉÇ—ï»’¬›øtÞÙ8œ†›¨²J³;µ¨G-…:çç—K’|ïëÏ­££öûöy ê¼ØLµóî{†ßœá¤vÓzq:K#èB§ºí×éQû¼»¥Õ‹³ÖÙyúá}ëdààM$é,pÝ|ØFî·KñuûCæL·åeë[¦O{¥›mâoßXQÕ镚̫ж8~j´LØÃвã‘XkdP-q 5'”SªãƒÆw‰–ÑÁÙéÅ.2Ÿó ä&›Kä¥D÷râC¿$ŒómÔjŽ~‹\»D¿wíÿÏ>t]s¿FIó©ü°S0YE×5€¹ÁïÅ•Mhûu¸RF1O,ÃÊ…¸Q†IBx„(Žþ‘1êXn-ŠBDbI¤E"D†…;?JƒîÕ_=-ÖÃD—䂚Iˆq,òüf”i¯ñ¦ >‡¹©[sïjcŴu‹úuùêËÈ<Ÿn‰]Ê[öø)¨aL¡¤¥4ŒBcc%EÜ¢X+e¿†Eõy:ï‘UufnÔ7K;ï&”J!Á%¬ç( Ä(Š0ÌK$‰©·žy5ó¢¶ña€õŒsâˆP.`ÍÆu[‰#‡õÒ%Oý] þŒiyWÊPG½ò¾¬ÿÌó_õ)©8‘ZQAb¦Pd,R 'Ì“ÏéBíP+qâPh4L‹šŠ‡ÓÂU8Íúõ›AŠVƒ’sAUÇáb:æ3õŠcŽÕ.×éɳiJÃêÕ†:4Ñ naù‹IÓ6¢te…6ø–!Ü«O6äy·±@ QœYE tŸ eb˜*s´¨6zqµ$6% <]6ðº ä.oÆÑ&Ѝ4Ú°¤Is ‹bSÁ²–Å»á´pÙÀ_–À*Ü…¶4bòrï9(E‰­ c#©Œ3!hIä9²'á.Xü€àœÜ–:¦&ÈÐ F¬”`0fTÑbÛ§ân-ºiø[¹k¦“l4¬1ã8Ô, ˜xb­B)¤ÐÆÄÄÅi0¸hvãŽyÜŒ½+Ý'Ú a•‰¤J†,Œ)è%bGl'.;¿‹Ù›°T¤VQI‰Š•ÂPF$·ë˜Ôù;4·«¹ÄßrüÛXœßôìäEM_P@‰UXijáÙÄ^†X-ä.(ä›lvò¸uÙ}—6±³÷ÊÂqrF1µ0I0 )  %t «$F;äb¤›Tˆß·q!,\2ÈÍbJ‹ÆX3ë*t3•‡(FKÊ`T, ·fK¡ Ò6y™{Q´D:J¨JhÈ…qPBƒàL@¡ôÍ´\¸o7«~ÖHÖ !N´U ÒröKDleH[ JpÄì.ÄþþçÜ–ðzLâÌn(ým¥1 ŽÝåAun/ x• ÛØ-E&aÁVÓ¡’€º„ÅWö… ®¥)ç°XC…%ß©ªV¿Ru†¯Â"¡Å`01%Òr#ŽB°,&¶@Ì݈ì|› AM¬¼Än~I ÐDQf´4±t™<Íb^g5,FƒËêÌžS`¯Uo«„©ñô†V3t¡PYθ×,€’Ú¯‹V-ž1{u&°Ü€•ÆôáI‚hD¢Öè‹Ý0»ÇfåoçöSû)·^h{·°”.Q…¿™æÛŠoFÓ¡>¨*üÏ…7‰ÅÀ›€$HÔ]ÆäFE¡4"qè]2޽.ÿö…4¿8Fˆ  lÇõ]qÎïºÇкBzÃÔ‡î¥Ó1”êfÎ)÷Ã`2…D)^òµŽºmï7šJh×½tlþ_‹Ìï$¿)ñ?”>‡tå¯QžŽG03>…œãÊU4Ê&iî¼Z½Éç´Œ%\tT+‚kÇÕ“€PÙ+s[HçrŸ¼ÛüUI±´òÕ97úÌÓ~že|ý9ï¹ð»Šº‹UYrs匊÷’]ƌв8¯F±²­µ^†Ø¹(³Ï©;œ^;ÅTQp%yžÒÏhêâiLž§¹ù>—´xSš6¹Êzãʉç÷ý± ›ƒ¹?TŸ4œˆ«yc‹/®>Á%Ç~…“ß]=‹ƒÊÛrefÖs›÷épêÜ*N ¾Ì# ì(;(vͤå‡Iø°#Ä V´ ¸ q@ 1#F`<!Z$ʘƒÆw¹¹€—7¾âHá:$xíMÙs:5ßVx,B=ûjÕñKïýlæ®, 1DŽŠ¦Ö9΋ËzãPkQ8”PMhÀ¬ˆª„IÃãx¤nûb6ÊÊBÒê0L° h¬Q@a H”À/Kpi…GµP=w>éÑÄŒ¸ z¿<Ý Å>$eWçg#€øV'UF½¤Ba«“Ä"Å Áwwö¯Édºïì_Ó:þgÿð#ÌÞr"»¶!ÒDúîÜ^¿ËÛÅß¹Éû±æ@±¸{‘÷×wàam;z¼>zóÊ!…o{n·äÅqëä²õ¾ˆ-/aÛ€²ñ5Xµñä+ò8ôLäþÀÈñÙ_ñ­úífxöž¼øò¤A QxÈCü Ü!$È’è€ Ô²&%baÆ6RÂÝ[ÙAãŒÏëê’&’Øñ0ß@Kò0lòXÄü·Ÿžçýf\Œ¿; Ú„å÷YЦuìOÏ4Û©™ýzœ¾8øÓeç}q ­ò4 jp(ió`’™˜ªÂóKy¸°ãKÏ54]<¬"{ß™üe£>ø™•kßÿêÀ£;§—‰û…Yy–°|mÆ×f`2Ñ/æ7b\þe½«ÞÐùVª° t|ñç²Ì-05uçÀrßÒõMš ¯^‰~tãA¾pN‹îdkõuØõ0ü÷ÚjÛ²”Þrâ™&@õçyçlF+ÆÍßÄÕ›=ø»ü³Ñ•#lÉtÈÝþØ Z¿¿ZñtUDU¾–Tg½ÙüÝ'3ÿÊOy¿Ttqþ!¸¼xûª/¦Cw]åÒGk铬“Õ®+Ý‹W‘Jç'—Ë»/ËÍ–Z¶Ù`‘IN{}½še ò™Ísy1Ïç„j£ƒÙ¨?z+ÿBw&Î:ëù‡0Ý1X] ‚ª9ïwŽºâꨧÅ`Ý‹oÒ4wÆ1iY„hwo6MHÀ4‹‚‹„PÍö qÆï‡‡ñÚ8`OËä»G"æ¿Gè ˜âï7aù½n¥†uìAñï3j#L„ 3 m&ÖE|Ñ$ ±”Æj’ÄrË£Èxc‘ˆ¥R{0ýìÀt„ö`úÙ€é*Ø÷ÔåÖP¯‚@²úe¨ÿÝh#Ë} Ê…þÌâ!4 ]/ÕöËÚJåàÇÿ·z]£÷°PË>È»ÑþÀÕº¦'ôã‡ù»cžÄQ« ™æ<ÚêÀ‚!ç)‰BrÐ8ãwéï&k¿Zíiù@÷cóßíÉC¡ýwèïnÂò{¯ònXÇÚï¡ýÚï¡ýZh÷Ðþÿ-´o±٫>þ/{WÖÔ¸®­ßϯðå¥ÏypÐdY¦ª«n::½IBg`ªº•’lBgàd`º÷ü÷»d;! Îî@í‡ÝDz†µ$­ï“–´ä]/£/Á"¥¿Cf±þ ˜J;!l àZ7‹ A@ø>ö°Í€LlsžÔæ„H“!N¼*á‡\Û÷ĵý©,Ӏ׿g'Î@Ò¨|H›GF2€Œd #x °ùõyŠS¸$°CšÅ<—Ø ëÐ¦Š¹Hƒýu ÃÔ ?$ðf®’ezàýZÂüìÀÛý€w•¯ÞióÈ€w¼3àï xgÀ;Þ¯¼=„rˆ£€·à”†XI…ÐϘùK! y:37T®•:áÇôfç/cºÌÊ2=ð~-a~và½éOÎćÞiT¾x§Í#ÞŸ xÇ7SeÈ;CÞÛAÞ Î†îlx![¬•§`¦,É0ºH™ÀÛ9”sg€Wé\r»at'Ýü;»œ/ìu¥ßšdÊ=Ì÷¨Þã|£½%ÊÈèÁ;¢Q—ÜŒ",êŽÉ}þ;oD^:öÏ’ f)¹”2àOGÄoùëO½r"WØZíS?ñÓÁh•£NT‡Ä»<5mq•븄*¬ !ÇQ¶RŠÛ e(™‡­Ô ?$m ö Yn¸_ðZÂüԴňú -iT¾Ž¶¤Í#£-mÉhKF[2Ú’Ñ–Œ¶d´emÁ9ƒ57¡ žÄ&ø3‚? 3¦¹ DJ›!­¨ö Q|ÿbª„’28‹)ƒ‘%ÙŒ2¼–03Ê0G ×GÒ¨|eH›GF2ÊQ†Œ2d”!£ ®—î+ç¬Ú(ßUùûÊþ/§ÔC—åëŸwåý|ò_q\.ä§éÊ×qºB÷e;ôÇ‹3hËÙë‹zÉ+]7ïί ¾Mttzq]9,*‡¿.ê¸}þX¼;j4ÙÅuÐ-Ÿ–Êã%¹h—†¥®÷ Oƒ08ì€ *Ð.|gÚ\nø¤ºÿ뱼߼+7~:Õú¯´ÿ“=Õ3t¿|JWzŒÒý¼¹¾8í ÁàðäáŒTaÛïž<*zòpNšF¸|Xº?¿nâJwÏk×GÚÕÅastÞ-ß— WÏéÅõÁuµá³J÷¼}Tøqëw;½3Z»<‡#¿`Ú\¤•ëK§ü˜Ç ;Tmüj‡õ<¹=É´ÎîJûÓt•ë(Ý»Ð}µq¾B÷¿Þ‘î‹3º.ÓÇò;’)Ô-ï§eüŽúé=ü¶\ÿ—ïIÿΊ1…Êw¤ÿë"Y®èïGÿ•Ù1õLÿ•}?Öÿåׯ;ÖÿYƾrfÙü]¯µ ÅZ£µ_ª}ÝÕ#÷É4128[¯À²¶/m5îÐQ¿ß±€²^Y± N—SŸÙÔ§,Ÿ‡ñEÚ•7mÌûp·Þùbõ{–8Ö*€é‘œ 9L¼/–-¿¬‡)‹ñÅî_ìšö°B‘XV´Ò 6è¤`ˆ²'懧5'kÔV÷=B¾Xrh}1Xå‹uבÃ!PÝ ^Û\X útæŒÛþÕÏEž@&„i\ƒ¸PXÿLȲErÈ“Eãh=±þ½åå¼-,‚ãµE˜%ZÈ+YÞ³þ³I dÿ²†ãˆtü¯%¹Ó4b|)=#¦ÿž“àLY+Y¡XP(0iAÓ͸›æžºçt¹êu<éá2Z]-‡cÀºV<~µgK·Ñ=0µ@‚Û=øý–Uo Åz}o:&Ì A»ºÛi+êè¹ÌçûÛ:.n÷E[LGÇŒ.¡›íæ`é îSa+J͸ïÙJ mkG_ÊÀ ü8Ògª„¯·›³A¼xC`úãä7‰Ã;Üu¥‹ˆ@PgbÖÁ5ƒ¿véIªL<ï](½=Z(‡®’núý×ï–÷wn_˜ÄS±[83ö[nñU[<9ÙÝ~ÐÛQ¨ç¹ð=ïáéFÑ¢sç(>^m2µÍûAßÄ‚þÒëÛþ¤ ¥;F/%3Ù ZüÉÚíž4=àïmÕHä ×÷v‰ç!´ëGy®¢§¥Ç¿† s_*Âc!a„³€úŽâBëðÍ·jÞn´/ܼ‰_™e•ï§­Âq³u&x«\>3ë2…jù¸Ù(¶NªGÍr±•o4ò…ï­ÓRã{«‘?\¢xÖ(Vög_Ô«…¿ŠÖq¡Ôª4ËùVþà T)5Îç>.UËåf«\Ý/ÁC­QªÎ¾.•ó‡ÅVãüjP.™735­×‹äåO³Ÿ×ŠõB³Øúvp2ûëa-ü½T¨'¥~«¾×—ZËŸ®ø²R­ÌWoTkæÓoÍzë`¿°ìU=ßÈ/kä_¥Ù7ßIé`"žòü@Ÿ'HTSª4еƒ|¡¸PIó9q²®<­^±Ð¬jZÍâA)~‚ºV«µy¡¬Ù66ëß^ª†á…e6ŽË-Ü"K»E¾ÙXÖ)~ª§dy ð¼4_#±£=¹Üó‰Q|#Pª„ÛDËØ:®ÖŸà2°9`ê=f¯’îJ@t»#ƒè ú¥Ü.‘–³a¨ÞW×6Ñïsû?ų¯]_Q‡àäÈòp¬®;Ù£—èz`ÎAðõ1qSÈöïáJåpÏ ñCêcOûZ(íPJ=3â`òU‰P/ ±ãR*Ý:fX"¬ ¶+ñ:\ù·‡Åb˜h^EΆŸ÷ƒ1N–¢Ïì:F)‚¾º3>-“ç—ŸýÉf´qIí‚“Îa LÃ÷ÌÒ]Ôɺº« vfs?©2Ì57íA´A™ì0Fã m\ˆâæåëäºáìßÔäiW«a±{X¨/£ÆÎ}=·o/’$Þü޼IÚÃáxÙÿó´ICi\Ÿ6dœý°5­Ñd£h¤Nü âÒ5R¾¥§| WiE°ã5š+¬¨ž-}M3±?Hò5¨^xžBÄ¡Ì"¨…d®ës7äãhöëD§‘;t Æ4®ˆî7}°Ïü.;Æ”ìLå$h€=ª²b’rácG‡ØÄ!tfXâRíDsö$ç+ÉÄ#OÙÎç‰gY#üØkˆ¤%f.P¾è/–ÔõE:Œ½hD<üNÖÎ'Kò?Ój‰]ê{"ô±†È“~ˆ± ̸çñX¨ØCnFñ‰ "¹,ÑõÄ)'.Úq˜Ò.ô¦ÀcÊeÐM¥À~ ¾MGîJKô+\—EžR©”<_{sAµ"¡B\+¦¸Á,‰%x¿‹¶¡â |½Rh×Á 8Ó\bÍÅ‚†JÁô‰`>£|V»‰ÇϬ~£æ¯Ô®Pþ“‚ á(¢ˆ2†åCOB!§š;Á–»t s§Sï‹êÓ@cúR¹Šù ÄÌKÌÑTK‹­h8©ü6F¯+8L‘ïa¦õÁ”ÔL—WMNgõ;ñ‰œÕoÒþU*ÞµÃÑÎÌ|Á ¸!@¸€iŸz]-xiRmCBQ‘iÞÍ7ß[iììÚ¾ð¬ž`„…0Hˆ@ŒI˜ \_Ž#=î»o©#Ç-]6UA÷ûý6>uO H-8…I‹qˆÐdhFª‡0Çs“A?¦fãunFˆ¥´ª¿LWQŸd‰Çe¾Ë F˜ãÁ$¤X/ õvdù´|»|ꩺ‚&p7}˜Ò6öK:l%b€­$£Äá6ºýëÏ)´­0àu*èrf)ìÀ¤Ïr=‚¥ãÏj{®Á/¥°JÝJ¶™9TQ˜.|¹`_˜ôræy@ְÀ¢yÛÕ¤ÔßÔ¬Â_6"Ä2ÄÁ`FUèiåeÑ<an§ËN›±ÌQœÆÊ+bÆ—bM|&t 4÷͞ܛU5Q»+{ä³ÊžJ`•®}ã«;¸¥3º†yCÁV™ý ‰COxÑÌ(‰âmè:.5yN¥ì—­ÐHÝfD…yŠz®‹™Cf¡"·£ì¤Ë''¾ª‘¶ßzÒYµNh%¨"òtø½Eë ?îÖ$Ãÿý¯& Š\ÛÔžÍOm ÇÖ¾ƒB'À”£hIƨפßðˆˆùtz^)ZZchÍ2è¶{±ãuk|_™#ð{w4†Ì™[#ŠOFEëFcåš ö—á•D;É1‰ÿ’¬9lP•÷‡­›>ŒŒ‡ø#³pe2êF­é!hŸêD% z“SŽÉgÐA öŒ÷¸éóuŠ–Í÷‰µ&kufý6’ý4ÉÍÕæ‘Τ[ÌTh’d¨/Q™œ€DPÆ!‰YÕˆ™íLé/Nz´®ÌÄ4‘à‹×Ó7í›[ÖJNµ†~?ªsRxÇ—½›qxŸÈ¦C ñ5Œýžÿð$Cã?),ñ$jÉQ¼&8·°Döˆ{aòIŽ;­I5зm³yßêͲŠéPÿ±’vv´öVÜa ZžÃŒo´¹@±öÀ}[¸Ž¶ 1[!DZ9ašŠRa€K”Íx€mÔVØ…¿Bꮇá]¼¢O= v“5ÆfÄÞûÏÛíÀ0¹¤lëÔpèHî„TØÄw@¨: ¶çq׎tˆç„> ðÑŽ£§L뎣§ÍãG'¯p=ÝIó4½ïõO½¦ªÅ+zMWvŠS¯éÏŽF8ôXFdw‚ßÁ·Cç99iì¼ñÁ<žó6t”R®‚A‰…s¸ [qmßuB5 ýä’T ß×….iz‚…r®ÀÃ%²ÜðB—׿g¿Ð…ox$ý€1£Ò¨|M›Gv¡Ëo@³­šÙ¿ÓßŲì^–·¼—Å̈kîe™&y‡±Ÿ>øÛìÊ“·Œû´<š“ÉlÜÉâ9=r"GœÍãQ0‹Pbƒ½S¶™]mE\×=*¹¤ž¦Y©~HPL‘®’ezPüZÂüì xã@ªñ2Ö‡ÅiT¾§Í#Å(Þ*(&ž¹D …*Än(CW0]"ânöû9“’úB*é(ÏxZ ñ“ L¿?0íf`ú݀鷤š…GÝNsö[±ŽžxJíèy¤8àYïÈ˹h3XÌ9A}€ ¾°™ï¶'ôlʹ/ÀJ(æ[©~HXVq¸J–éaýk ó³ÃúMô²¸ÖFåë`}Ú<2XŸÁú Ög°>ƒõ¬ßr´ Œ,"ç¼ [b m‡ÐÇÌ-ž Ó'³ ÌÞÜGA'´R'ü€ÀçY´žÉrCØ×æ'ÞýÀ;Ê×ï´ydÀ;Þð΀w¼3àï·Þ4ç´Ù©²Ðê ©í†šØæf ¦PiƒÆÞÀTß@œ*áÇôîæd¸J–œ<{%a~vàMþàFåkÏG¥Ì#Þð΀w¼3àï x¿ðvr8Žw˜xû˜±Pi{:Ã,4¡·=Û ˆf¢æZM+uÂéjÂÅQy’ezàýZÂüìÀ›m¼9ó>ðN£òuÀ;mðþLÀ;¾ *CÞòÞ òÆô%òÞÙð´X+É ,É0º¼å0B9óï ò*‚K®Œ.‚›g—ó…½®ô[“\B¹‡ùÕ{þ•{¾Ÿh#ãïˆD}r3ް¨?&—èï¼wxóÀéï3î雸ÉOýá#'ùØ\í[?ñ÷V{ÈcžÃt³7!¢„j&l¬˜ÍÌ=MÊuB[Sl‚Ñ¡i§Jø!i‹GÀy’ezÚòZÂüì´ÅùhK•¯£-ióÈhKF[2Ú’Ñ–Œ¶d´%£-mYI[xÎsÈf—å8ÜeX„¶vÆffPÁ±•†*¥êæ¦Jø!9ƒ@Þp•,7¸,ç•„ùÙ9Æ7HÌùÇ»,'…Ê×^–“2Œ3dœ!ã gÈ8CÆ2ÎùåÚž™ÍfBtÚ8ç:7ÙÓ9}/»7m€Ý΂/ÛF/ NÊ™ü`Ç5GzÑWWÐÝ·ía!Ýi䬋EAF“X?QH+û¾ëµ/^Xp,ñ–‰”u?¯à9Y<·M¦³%Ð|¸Ú6=Ïí—ôt'©ÛÂȮ鉫Rôû£V oÛ3RÞ…çÝÛ@.JY¶ÄV­¹ êÍ9bÄkžìwóxç#GŽŸÈÎAƒ­ÿgïj›וô÷û+¼|™{뮂$K¶ÌÖÔYpæ0wf† 3°u*%Û2òÂÆ owç¿oËq^q‚ IHMCPdÉê–úyºÕ¶Òæj×@WIÏPP\ò%P|½ýÕÇ 0Q–îM¶BëÝ¿¾ý~°wTùãðÃûí‹vSm?ôz혳m0ðõܦþãªç«¾A±Ú…ZÖÐþYøÂ ¥fW½ÁïØG}Œ& a ¾F€fpѶ¶ïÿöýäwè¯Òßïnüï'øìÇÇèÔþ@ÙMøÃ߇ÿ:¥'×þ¯{öãk#hx—ÁŸ'îaëc#  š•Æá%®Ÿ]ž\T.Ošå‡ón¹Y&GÇŸ}ÿòð©zÅ+—A÷h¾¯òÊ÷³ËJóäê°~[÷í×gÄÃò;iö× ÿÇnýóñá]åá”UË·•ê=ªžÞ¶ðyùòËmy7ý9è•÷v‡õÊ—ýz{ÍÇãP÷ïÏ~ÀX~|¼<;>ô›§ä´zJÎ.ËìSõãe¥zÕ­|8¹*ßcmØŸªçðý·û£êIóôá¬q¶w6½{ù=ŒÂ AŸ~'·zÌåj@ö¯Êûßî*—W´|üÑ;ÜÿÂF÷¹{÷ér÷|Tï'õ¾\_ž}oÄ>%ðÃÉýZ¹ Äõ yòàÛ'÷§ôÈác³òý€V¾Ÿ>íáûÓ‡oüSõkãl¿Ü=ª^ÑÊ=fð=)_^‘³f™‚¬ëŸö>ÞÍFë‡ýõdð~ø£ìÁ˜/ìÊå9/?ì’rõôqPŽwíòåîH¦ÇìöpXïd«ë­…îá÷lÝ?쮑îîÇt?-Ó‡òÉ´\ý‚gÏÓ2]£y ò=Ÿ£ÿ«uÒ?Ÿ³¦pùrô6s¶þ¿5Òÿ}e|MM鿲Þ×ÿùû÷[ÖÿY_f¡>ªí|­Öö¿¾ßVÝ`{à€7Ø5Öû€¬! $ò{­°¡í¶Û |Ö «¡ñ0ž:…©£&§ÏÅÞ–×u}„ö-ðnµõÎj·,Mq¬w¶'–„]"Ô{giòX šáÓ4%›_løÅ¶¿&+6óÈʬ(w ÖìdO{Êšœè‚QÐÉê¶§î}‡Òw–Œ­w𫼳në] 2ŽÁ× ûÁÍÌ»pG)B×8nýª]JRôÁ¡ý;èwªBëï©·lÑò4jœÿ¬y%ï]¸%l{Ou¡c´ÐVß³þÞ÷&Á%û‡÷ߨãd·îÙyÄøXzZLÿ=!Á±¾÷V¢Èì”»ˆfš–FÓso‡ûú<˜á2 kM%ãp]«Ý낵c}– o­{ðÔB z¬· üo–uümoïàøxg¸&ô Á¸:ªÙî*+™è¥¿M¶ûâIÝïnûÑXôD'ÌÎØÉ¿ƒ–·û’-O¨„lk¯¬Öl‡ªñÛècrÞíûA`—¸—õ*ÓdĵÐÒöH2·tåz+êH@·Þ´H‰­tŸ¤à¡¢¦ÀÜ]Çû(Íz«Þì5Ç÷GH)ãp‚¦¼{\ÍÝ—ÉÝ3¶*¤'";tÕç(”{¡d8¢ŠWÐ÷< ¶#GQêy¾+B—;DqG)áÙÒW¾U±àÕ“¹C‘ô×MÃapMÁ˜SrÉ(f‘žu=ü&¬ÇIA {<°^—ôÓ»^ÑSÚ¹‡B×q½ÉÂZÓ¯õcZI@„:ÖŽ-.H¢FçÕÉà»A4^ŒŒ×ÄSÝv´ft %ƃO‚ETzÒöYHE?ȱwý’Žn뀖ýf’*ãÈ «•²zþ™Hþ{õNÿažÇ£^ñs9€UÂv^–‰õùèø™¸,{a½›$B6 ÁX;ÔŽçï×ÄâÑ“‰¶d0Ò0@”ˈÀJe#A#—3Î ·ý­GO…M<›‡&¥Š AÎcÎ`™1 U1ëqÐNÖËÿüõsYãÅÐ65ó¶y@Ê]‘"ÆAR Šˆôl_PáÏ`6Df³|fCÊl¦Ô?ßÎ15ÆÙÌ*–ðRà}°ÖkEyÜðÂy„nQí9+wÁDí…·0ÉÖFÖrnp`ˆƒ˜×ÅŲâ«&#Þ¼´LìOMo?i"‚]Ï›‰B/((`²7/&0¾L2as¼BŸ®ÜøÌ_ ½n½'Cª%ûàI¸)ðo»uÙ°:ªÛë€èvzʪ·k@¼‰;¶¨]ëµàêZRç9£IúÞÝFòxÉxŽ‘C÷o¨s—øt$+¾š ‹üÊ>Ý$M¨å“éåiìá¨rpüçQ5yQ ¸s“øq)à3³‚0OåXü\sW-ÞÆ>·)“ ¹2Ù}÷%ò©²§ÃHG‘l˜ñ058³‘Ú|Ç,ÏŒ˜fFYüÚs±Cì¹ëo˜Ìòù ²Xù°ÁN٠Ǣ]»|+}]áž'¹Çfyµ“½nØBýüK{8ž1d³«>‹`}[46‡š³tÍYºÆÍöIºóÜð•£!eËEC¨óé z°Ê‡½xÆP > ×ìÖÈØÚ…¤Wl`ÒGü×ÕÀh¬·ól1ƒ`›÷Ó²é¦%ÿJX£"ìu7*5}_ è"Þæu(wDNˆÀF+A‘ž-Bâ *|m]¸=úôSu1Öe£­KÁ%ñúf†ÛùS€àžPè» %Æ‘ðB0žDpäÙ ’sOùJ;TV°[z!†h‰l÷WP¼qéðȈÜCL…6ò<ÇE‚KN=Ž µŸÅg¡TjùÌÕ2Ŷ`û÷ìHEËuÊ ÂÈõ±}3Mháæ‘5¸Ý»ÑÄ@Ét™ª?¨7טþç\áLõ’._Tu{yÛo%½û´1ewÃÀÁÄõ ³Ç@plޱçÍõ™ ¼è}ĈÃa‡®à£¾ãˆÀUAbÆ„”ÞÊíî²–ôk›[»D\ZÈÜRR€ŠEÊc‘‡üÐ Œ l¶¥•»â‹·z–hk;ë-?#‘巵˒ٛ¶µ·‰Àfð³ÂyTþ”ÎÛÆ3ö¨ÖÍRã5²ÔÿÞê7°sy+Í“ÈÑ’Þ°lû¤Öe?ÔoQÂõ‡²$zz£gkw¯zxr Ë’=£n-͸aJˆ@ÉÀà ‡ªÈgÄ‹ˆA¤/èAËiu;²Uäò€Ûg"¤0¸ðP¯IrHSu%¬U©ú3M \¡/m­&˜'ŠÁ„ا!Fࣈ¹ÄG^Ä;¢( sCV¶çØ'>ç î&Ù¹ ò‚‘«=#W8‘F áÆó¤V)–$¶7›9û$ älã-†íó,é×Ûsàž¸¹µ}ÁC‡9Èc.P‰ò¤ÃW(žó払»â«„ísÚZ‡f{“ˆŒ³µË’™aåÓa{¶qV8ÊŸ²ÂyÛ0aû…Zꌰ}ž– ‡íÚÂÔ6a{¶NØží0ïé°=[QØÞ]PÔžàˆ­MÔ>×Ê_RÔ>_ß›µg;Ü3Qû×Ú;%J‹¥õˆ+×£>’Š´!BÂõ Â×ìÁŽü~\!WÅW‰Úçôpv,f(²üþÁ²dö«ûίµÏ£ñ§Üƒ¼m˜¨ýr½…âQû\–h ¢öNIàµ}/‡ö\jMuã·ÑÇä=0ï+—¸`ñŒ™çŽe™0‡ZlÜë7ž^>™Æ.éÿ®›q¸¦6þ¶ÄX‘RÐmè¢UIÝÉæuCéu•DHô%£`‡jI¿‘¦<êoÀƒI ÀÀÉxœ)¯Kúé]¯hªf»£ß}á:®7YXkúÐN2‰µa愎u£ÚѺ v>Q ¾„ÄxÁxM<ÕmGkF·P“—¤ålTžô;(Ç¥áý ÞâJS˜xȧ`ØbðI¢ˆJOÚ> i<é¯ÔZ:jê.hô¸i…ä•öÈð™Òo†ŠèIÒÒ±XIZ2U^:ˆJ‹Ám½„5Q –^øÈùJˇo+ËŠ7s†c3Ã3Ã%v=ßÙNºF2°#ä+'ÄTã»li3|2û Í𜡣UÓIBQJ"îÑ€"ð'8bÆý…êXÂW¾xŽ•»â«ìJ† ùz#yç %\aYR1q…I^»y åQøSa…¼m˜]Çy ~ξbñ]¥éµaò ¼Ñž¼Ã²ž¶ Ìxò-žMŒ'oÑC€ ¸*¯Jñh&ª±äÉ$¯¶X8m½è )ùÈVþ÷×I‰².jÆöŽnUv,8ºÝ¿n6 œ\…“$ÞNÂjlÐdƒ&4ù_B“O„{JÚoaFyLZ^¡þ+òí$´ ½¼Íp¼WôÝ'ˆÈ8À‰¥ïáǘÀ‹âX®”æ†Ô~ðE£ïãö¥Î\èfÛ(R?ôþ\$yã¡wB÷ D¯0ø^‡å»‚ïuÛh‚ï×ûÆÈ»½™ãÑqg}\®»g²žÉé8=,6Á,îèÁÀ_ÜÏOÿ,ü2Åü8•Îv…Ò¼ ÿ'}!~:³Ìª·'·¤#>XÞìSÁ9ÌäŽÓI®äÑoDGfœJ¸¬Æw£ÒÃt à2›¹>èUÌïT§®ñÁÂE&`ã¬UO˜¿â!áÜGäéµL};ïÑzÞûL³€®ãP€Oޱ'üˆy¾à$â< Y¨ž“á“Àé¢êôw#ÄæÄU&–ž ÈÕ±îŽe…ahB©’¡ÜX²ZîIƒ`+ 6Òo' ÚAŠèêÈ÷0(ЛÇx¨=i¡¹O1 bº(_/äkåâÅ¡h½ (â,&A@=-)GU°ö ¥D… j?øUPôâꛡè»:+ð*öI¶lõñêsÑí»Ç«ÿY³ þ~9‹cÿÕá×:"° ¿Öm£Á¯ß¦$¶\·å{²ò_oÐèÁápoƒöÒö,ÊO‹¯_%=Œ1³›µ"„X'°b$`/ tD¹ï Âò‚~µÜiϬ¬%:¿œ¸PŒh<º% ÁÙxÐWN|“ù¹“wýéMÂgÓñbP¶~{”L&6˜å@ Ðîõ•L¯Áò%Ók¶Ñ²&Óbš@Ì+Ä| D{4a—§€©1Ý/ì"ˆ¯¥s-=bhTE ¼;©Œ¢$öƒ|§I­¿c˜ºº['³m$¬TŸ‹† R}í»uê0|N­ÛFƒS_ÏnÐ2,دZ¶EÅÄx˜ÙcÇíÇcA9õ¤ à`Ì))”L¿ïx ˆ08ÙxI_?Û@I¶§¾~&R6úzI_$~}e›ê°|§Æ®ÙF£±k¬üµŠ»òXfØoÂâõ=ó&¹ k]‹JãeÌ_Ú§Wn-Jm"ð+ì…K”ô'®è&ŠDôal«o–Û Êàÿ~^a}os½scwAT³-çiœ‹ôNËûAr-ÊìM÷x2Ëæ‰˜‹ÔÏâbžöY¾W}Ô¤Ì  (./é e' ·)^b+˜Ƽ|?l6@r;,ëaº÷ŠR˜ `r– q`™Ì’þÈŒ]y*o,¥îi”DŽv.;Ú^j_üvâ]Ž‡Ú»u7nõH¹2²‡­Ó÷®˜ïx2ñWÓƒÁ|_‰Ý2-‰'Ç©.ïLo€ÎÊýr•i5ÈS~÷+Â☟eÚí|‘3˜e7öO1ì»í^EÒh(…ç¾i»7&å4u¡ûŒçÛc&í™þ`š‡ øí}ÞÆ}æ~‡÷î2õ¢ ä~•+U8±¿£qt«Ê÷’ñdš·íº€§„»5™9²dÒË€É:/RëšÏnŒ¶4¬'o\Õqv{—OS»áL®ue²Eû™vÝAFýë®AN“\à‡*+f“¯yãI>ÉkèöówG)Q¹¤RÚ´xÉÑ[§“i¾˜$/ÖÔ\'É‚¶À©ÿí¢dûm Ýa¾Ðwg¾ÐzóU7¢W?Rø3_è;6_Ëš®´ sÍS®ïUÅ»PY¥Ò]»—MC©ƒK»Uª Bÿ–ja®? M´Ðg‹u_h¶Bñl0sÕU*Í%Y¨¥Gf¡J«:·Ê¥õ]èÐ%#’+éÂvêkÞÙŠý«XB{—šo®gsk2×þK¸¡P­s“õÈÜ.ÁŠªõ¯ØÚÜ-4o¡J+æé1¸)-DU—VΨj„ ÓV1=%jX¶\ƒ7G9Kf³@T £³bç–uYq/kùÑú)tþÂ$ˆª°/K–¶@91Y_-Yš+X¿ÂÐvuŽt ¬RÁCs˜õ•Ø¥Àl ó¹„ÞJÀ9G?`¾^8pf‹Ëï8#œH®8ñb bN|xŒøÄ† _LHCj?øÂ3°rR[½SÇž÷3IÇ·}ÔyWÇ!~ãèOm«‹îH¾g„í¹hþR[°çd?@G˜}?A¶~LzßôµZßJt¢cä—­¬+TT×¶ÚîÓt<°7FcOî<o•2e4ný+;nu$àë‚e ü4–Ì×1fÌÇDÇ!‹E ˜æ,úÑП\FQF & 0gDT CX3Z›–½Üj_UËo9ôöó¯ÉÉÅUòpäéé«óOÎO/®zíäóù§«ÓvÒêõZ'?'¿vz?'½ÖÇ5O´¿ôÚgï«7ºç'ÿj÷’‹“NrvuÚJZ>tÎ:½ß–^ž^%§çïÛŸàÇe¯s^½Ý9m}l'½ß.`§{§2Òn·W/U_¿lwO®ÚÉO>W¯~¼l]üÜ9é½þt~òswC§—­_·¼yv~¶Ô]·w~i_ý骛|x²éV·Õkmšä¿:Õ;g@¾Ï%yN¿À…àñk:g½öå‡ÖI{-“–[j£"¹a>¼öÉÕ%°&¹jèä¿`¬çç½-£YaVuŽWÝŸVYCÐÚ>{§ JðF±h]õ6 Å/'ç¿âÍc¼8ßÛµû´F’O¯>õ:Y7ñé²³q*8ñ7Qe•f$j;Q»'ÝΖ—O:——WK’|׫¿[''íOíË´ÙÝLµËÞ'жù³6þ—]ÖˆÓé.Í ƒêµß''íËÞ–^»­‹Ëäó§ÖÙÁÁ›HÒYžàºõ°Ü—âûöç¬X:;g»–O{e˜ÝvphO ZQÕɵiW]À†(ôÒ: Á~¹ì’Qeõ%6 QD`ží†e†®ÍAíŸB£ƒ‹óîCÿ¡²)Xé:Ÿ¡‚wÐÊÍ»©…y˜fÛH¸G:û3Ñð)!ñcP0¹ß€gÙ~CŒâ4f3aëmyÓUÈ]AK¸|wÞx Ú~ØaÄbC±4DLKM…ƒ `!"8DøGJ¹¯"0cPM*D÷‘¦þ“× B»ÀæW/‹õØÑÞr¡Ã¡u¥r9áYv7N•SƒöìJ÷„Û=»•@pyÌ[å|Í÷åÉoóüÏ:ç]Ö+(‡(Â~HlqQÔÍê¡Èƒ/åAMú©;÷­Fæ3Õ·%àòé} Ç_4ûõ¯_´ž´îº×à ÿj¹É.½½”QJçNµýŸ;º±Ÿe³-Ù§KÏ#þBÖ)]·/!óæ³d>¢²Öø–zé½ö…”ˆ[¿äkQbX5:HºÚ{êÔÌaå‰ÖSƄÀ0ŽåÄ~DˆM’ȯ¾]ðÔâÏÁÂæÑ#5÷GÓG‡ ^ìÑM•„ã@!ˆ­"*Q¨ ’ÇÔÀ/÷¤M77\®äž§@!°PyKùó<¨8KÕ#ó^½‚s^ÙÆÑb9f·ò˜a†Í.·™Ú0 ©À¥5¾ò5G$Æœð‰b Š0$de¹6ø–)ìÔ''òïù°1GqÊÚH¢aøŒKƒÅDªˆ±(§Eùy*?Ž¶Âø‚Ž.x]&‡ç½¥ÃmϹiRŒ€§ bÊ)’ÆÐèi8íRa6ð—ÆàšÛ$˜ZL^=¥(°~¤§Ú-‰8¦¶p]ì?‹÷Hã©ÁÝ)¡"¢#Ž4ñD#L‰)‘$ÿ@Tr·²c`iú[¹«gÓt<ª0ãÈW4ô€›1%A’|cw{å;Hž€Áy·×pÄ¢zì]~ 4âFr "…Oýˆ€^"¡4gˆ> ‡‹Á?Åêi*RI†ˆ )\f4VQPåoyq•¿Åü·±8»ë›éaE_@±‘X*»'1dbÍxéÀ(.ž‚B®Ëz%[W½Ÿ“:vv§,<š'£‹SŸ *–\…!g‘Œ#ôD‚œÏt“ªñûö9.„… @ÞˆF(-aEmЮTæ£-)ƒqînM—4BN¥mò2­.h‰TŸR+,d „ À˜€"—é›i¹ˆénVý´–(¬™B+#A¥Qdí9ØJŸ¶â$À!5O!ö{¥kp[ Àë1 0Ž"0»¾@!(ýˆú1¸`<”Un/Mx• ÛØ-x*Àa«èP€ºç+ûB8SÂD„1pÖPHÀEcOAª²×o T•á«“0ˆ+@@L Þ«aZHú`Ytd€˜O#²óil2dªcå¶ëK€&’P­„Ž$ ðÀOÓˆUY Ψ7ä#ri•Ùs lãµìÀK¸ *¼½!@ÕômÒG†Qæ4  ¤=¯ó^k9ϵ˜½: ísp7À3Â8°%Y#£UˆùÓ0»˜Çfåm›ãöK/·îp4ý{p¥ Táêw?C”ñÀ|PöòŸò€[4Ò^#éßÖÆäãiú&T(ˆ|§±<·Ïo÷®Á"FBòŠ~ì«S=â#pa©Ö×¾ÀÕ°?Ê+ô&³ ¼ÕKm¤î‡át?!x)pÔ:éu>·]0i& _{ÑwÿCvÃS÷ÍùCîÙÿ°¨‡_w(޳dt•ùK6še§Ó$³¡®þô!)RU£2¬`û±í¤c Tz¬ïs‘]“ °KÊž ¸ß:ÚÏ™Ü@,ˆWÿÄsQï5ŠsätqÒ½Ž_ ‡ Ô™3µ6Ìt©ÃݾR,$̳xÆ#* 5<ô„/c*4‹üÀaz3à·ã´xIåû1‰òx«ž@1üe‚XÅ Á½<öšë£å”ÇëØ[qüï—ûVC°Ëhy²ºÈHân HHxLÃ_‘Ø€[ftøúJîÕYL»öÖmã ì'Äϰ|ËÖïê§“Òç’˜û£ri¦yf}¦nÝÞ¤ù:î5û Eçx9äyüì+°_ßñŸw½÷'Ží¶Pø¦o¿«ž¶Î®ZŸò|õË]R›<òÖÊOT®!N/xæ6¡Ð³þÅ/ÑdšÒ?_¶¾_ùt¿œåǬCäIF4˜e<®¬L¦C©uìó¢<]­_Cá”âa+Ûë’ˆ÷,ÏDá7¾M?ÄûžÄá×gVk°|§Y­ÙF³MÿðÚ“ÚޯŽ?]u>åûÝÊHJÝœ›¿’ÔÏEy|Œ ÝÅØqoϽ‰ êz«ðã €Lö®ÖÀŘ;6nüÕS>œ¹X9kQOnôP§|PìgÌîø¤øsœö¯û#…)³6ÐðÅmÓ÷ÀÔÄn8Ë\O7wI:º>æƒÁøÎí¶<´áC»…ö°ˆj¬M  ñï•"oÛ)â,.cÅ1ƒêϲÎÅ-)7¿•WD¸NÒñµ%lÁtxºý¥çµ~?^‰‰•D•®•D¥öXÏâÚú¡“¢ä4Ô½üì]u?øld+h.òµ–ïOu XsQåoñ„J·×=žòìÅQfE9Îâ[Må±Ûáâ!1ëÔê#ÏÅá¤NÌ3φ+GJ+ïv<˜ ÒÿÂp¦Ö:«Ã<@w¸r^h%Ì·¸ éå…«^)“£ Ü/lMØ0ÆÃöœ#3æ Æ %5S<Ô!?¨ýà[BÊ,Û@àpÏ3Ëž‰Âo)“=‘rðz]g–Õ`ùÎ3Ëj¶Ñ å)?)R¦ÊWšëÅÔ@Ÿ±±Yd$Ž},„6Ñq ’ÉÂÐpÅ  )„ýý!ì AØß Â.ˆÿû({ÂïF Æ^…€±¿‚± ôwÇ¡4s©-];ýXÃ#è†^(íwçåàÇÿg~¹¤ö7ÐÆ:È´­º`Û\3Žð(Žñ^X#Ä¡ØS>ãa(ô¸ZN‡Š€ÂcÁAíßÖ'þºâµŽÀ{î#|. ¿u¬î‹õ_aT¼Ëwaýºm4X¿Áú Öo°~ƒõ¬¿ôDýìÆ+ØË+ GŒíw¥¦~$ìáYŒ„¾G¨d£È‹)g’R"h˜gPÔzð­ q|„ýµIµ–Àñ~hü¹(üÖÑxô@ãuX¾ ×m£Aã oÐxƒÆ4Þ ñ?;}|äãý2Æ™ÒÌg‚y8PÚ#Ò§‘ò ˜Y°ã>ó¡µÚ¾4î£U4^xÏŒñç¢ð›Fã@jÿ€Æë°|¯ÛFƒÆ4Þ ñ7h¼Aã  4Åh¿ca-b_€Ä阞­ ¶Ü=IYˆ@Ë’Päõ˜k=øv2U"fÛ\?…ß:öD㡯×aù.4^·¿%4ž¨jàxÇŸŽÛØÇ*?ܳ.[Εő¨¤hÐõíñÝGþQ\Ac @uEåCW¯nùžwÚ:9r™”~Œ¢ã@#v²ã@Ìh|†ïÈgp"¹Ÿß°N‹Zÿ‡/äO¬&èW= f)?zr£Þš£oʼŸ§Ø»¼ûÜZ½³¦~žtïo˺‡1#Fý½|÷PøFxÈÖ¯øö®´·mK…&_ú0²¹ia€ã:Nê6vÒØÎ ’¢»^òzÉ6óþ÷9”dÇN¼È·Iæê·­,ŠË9ä9ÏC’àþˆíkîÙ‘Øqå+sÂÂep8t´NÀÙ¹ÌkI8ç2>—É¢òM\&k9—ɹLÎer.“s™œËä\&ç2브[@|»Ý»®¢L˜Ë·=®…ʹƶ`Ò±}Á]†4ö1 ­Ì ?ÀˆŒÖ 8;x- t±åî]öãYT¾‰GdÍ#ç9ÈyDÎ#r‘óˆ¿=€üJÍæÉ®1fsWŽÚ¨ ÆÝë®è낾½ë®6¸ngÉ—m£—>àÖi9Óì¤æ(ZöÕt÷áM{4¦èÙM`[Š‚Œ¦×ÅWtÙ¿ú´§îîGËÒ'ÌÍ_w‹ ^ÅS×d:[ ×Gë]ÓÓÜ~éa_wÓº-m虞¸.Å`0B}Óž“rž‹7¡X–>vl©«Úp Õ›óF#ÜàÑ}·Žwþ2‰ÑÜIE·b ivÁuwž«`ú(hT¾Y'K\˜(Ë”&ú¡õé{ëK¥|T߯|.^ zºø0™t‹0gE0ðWí>TÓ<üšHk ,»oÍìŸ5]Y`¡ÌUóz2²áï!ØGs-(4ÒF¼¶øLu5°vª÷_Zg§_ ¼zWœÝÝȳStyþ-º _0üvž9ð\ý~AN¯å_žŸtU—wÔ×S¯ÚÿÖU„cÕ«w«Ô¾ÜÛï]‹‡‹Îq­Ó¢õBõÎ~û°ÙíÖZãZ³‚êä‚ÕNz—ÍÖmµ}Û–ôÛõ%æHœá®¢'Wò¼Ô>nTïêì¨Y»­wª¤Ö,=Tûèg­óã¶¶WJÿ¯LjåÒ,]í!IWî=o‡¾ÿvym9ÿÖ¹lTyµ÷ãî²WïÕH6«ØÔ­¾wqwÑFÎeSáÃf宾öŽöºìµp­\U{ü^œ…QxÐÔÑž5m®59ÚûõPÛ»¸¯w*·µûo¼º÷ƒ=Ö³twØ)ý|LWÃqºÛëÎåYw$ ÷ç¤~žÚªwú ééýi¾ýª]v.;õv½ŒîëqÝ~ÚYu|tË÷®ÖüA/;?iýà²[o–Ú‡åo7ª×íŸÓ“kÁCx°?Vehs§BëŸNí¡Dj‹;¨G;j”h­Sz”iƒÝV÷féŽöâtïB÷GÍ‹•º¯ïUÞ‘î+÷sº*STG2…¾ƒV÷ÓôõÓ;ømµþ›¥÷¤g͘µ‡w¤ÿŒ›•úo‘w¤ÿûúü˜z¦ÿ_‰þ~þ¼cýŸeü«Ë,;„7‡A¹rÒ öª'Ÿ‹z¬Š®ˆÁñÈøz ž5´•°å¤vuì@ǃA×Êze%>t4›N}âS³|z0â¨(®ÛæJð[ÀÝzç“5è[âXŸ¨oæN >-`Â?Y<ªn†)ËñEqŠ/Цý¬Pä¯+«f¾GÐ`ƒNʆ(pb~xœs²Æƒ'uß%ä“%FÖ'ƒU>YfÚº£PÝ0™Û\Z‹¹X¢k·ýkPˆc†Ì§I ’Buhý3%ËfGìYé¤q<ŸØøðÿÏåEpSfŠòJ§÷¬&l(ÙZ£IÌ:þÇÆÜ׈ñ¹ôŒ˜þ{A‚seuï­t†bi¡®K²ͤ›»çlºêu<íá" ƒž£ `]k0¿ÚµŽÈÛè˜Z(@í>üþËj´ÊåJ£±;f€€† ]CÝŒµwôÂ?óýíNW|ÖÓÑ1£Ë…Å·Ûö‚}ЩŠísÅl&\dsN‰Íµ™3§ŒùNr|h¦„o¼Ä³ÅUôÅY9ÓÛ|GEOxˆøˆÛ’€ ™fð/ûvÁ•æªð"Ô£=Y¨€¨3Z'òì‹>¯%ó^ôYº¦aÏÄnBêø›®û¬='ª+Fc»7ÛQ;¾0zI.wñlû²½ì(9@Édj›÷ùQúS`«iA+—‘žKfº@´ü“k@YzÀ_[¿Èó=Å‘öçˆ0í9đܓ4äZp÷s$±«„¤Qès"Ÿ¸,¤Ê‘®¯uôæë7o7Ú—®è$¯Ì\ËÎ׳ |Ü Î}7¨ÕÎÍdMù¨vÜjV‚Ó£ÃV­”šÍRùkpVm~ š¥ƒ%)*çÍJ}oþEã¨ü½Ò ŽËÕ Þª•‚Òþ~µ^m^,|\=ªÕZAíh¯r'ÍêÑüëj­tP šÇPƒZÕ¼™«i£Q!Ïšÿü¤Ò(·*Á—ýÓù_NJÇ_«åFZê—£òׯŠBOJgk¾¬ÕŠk4Ņ_Z`¯¼êU£Ô,­jä÷êü›:ˆï´º?Oí~ O¤ª©Ö›•“ýR¹²TI‹9Up:Ù<«^¥Ü:Õ­Ê~5y‚º5×Ôæ™²æÛØj|y®†—–Ù<®8 +»E©Õ\Õ)~”ÎÈê:—áye¾Fb‡Kzr­¤2ë*=TW6…h•TžËìIZ/ÔF¹Q]óq¹zrÒZèÉuø}þ¹°ï°rR‚<«¥vÒ<ô1å«Ô+ä»Ö+„Sm,´  •jVöb·¦ÔÆqéø$8=,Õ—t²J$ÕÅ.ëÄ}°0÷*§U?0tªõMçò¬š Ý1“ßÏLuðS÷õP¤óÜØÛ‰m¯€0ß BG&>™íòбEÊ–÷l£(r¸#µLbx2%|u­ã£Æ#†Þœ¾¯³¬jÒ"ärU˜g 1Åîh³Câ×’áKBâ§ `r_ Ï>G§Á^GÙ@eŸCî9Ô¹€Ë7‚Í,²ýk`S:.÷"Ÿ¨ˆ*̵ҾÔ¥”;˜(õ³ï º!åQ„RáEÔ 1Ãaí£ð¥Á&Þ6ÿò°XŽÍ«8lÂ0ùA˜ÀÈé„QlÍúdœ"ôD»?9”®QÏíM—­M°Læ`l¡E@9rr¹™ä‹;YO÷$Ô΄¤UtÝÆK™éZdk1 Û&Ø(i}¨Ô¿©ÉA#hËýzwèvÚ7?âÆ.|½°ÂïO-Hü_wÒ&k¢Ò¦5þ Af ’ÚVIö£`V£é’.pKF$$¥k$•‚KŒ #- v£F»KªçKÆf&‰I¿ÕûœKD€rDÎÌó”ëE®ÃÜ…ø²T§qàt6©ˆî‡×ƒvü$Râg×Ä/ìÌääÓs*²b‚º¾ÂŽŽ°ò‰çGð§„ñ5Œ€µ%!ðÐÝØçÿœ‹MˆŽúqæ“aw>Ü%)ÕN5gOóx:çL8yÌv1ÏX<«¡B ´ ‘˜yÀ#àÄXPOùaä0ö¬‰5ø&l´'+ò?³j=ª¸) ±âBEû„©ÐåÜMd1JbéæŸÊ –Ë ]OÃw’ÒX¨‡Ij߃Þr&=ÝTøXE‘フ¦ãÀ¦úõ=Å1U™”¼X{FQ’H"WK&]ákV â q½„Š·ˆ Ë ]‡2t™vÖ QìÓHJp˜ŠøL1êÎk7 š×oÜüµÚÕ“ñÊT0!. }QD"‚RГPäRí:á )8)våv¹›M½ÏªOCE¤„ô$SùÈe`—˜£©û/¢á´ò/1z=ß*Ž™dT9>“B3ßÇjºt^¿ÓèÉyý¦í_§âÑm;ïÌÙ hÀ‹Q!ÓŠrŽ#O ^šF¡/!¡¸È,ƒK­æ× ‹ŸÝØž´“ûŒ° ñc ”§Dè8‚»Êsñ u䤥«Lt¿ßoãcgáÒ‡Ô¾KÁh1—„~d24#•#ìâc0H(Y¢]°‰”Öõ—ÙÔê£,qèxLy ù>ƒæp0B’€à!¸¡_F–sº«M¿Ÿ©+,i‚ë…‘“æcã¿„#ÀW"ØJ0J?z‰n¿Å¤tmK x݃ z® nIì€Ñw}äq‚…£æµ½ÐàçRX§n)†Ûœ •Ôœ—Eø&x(#—qd ; ( QMKý IÍ+üy#",B@@.8L¨Œ¸–Š8<‹v#æËtÙY3V92гxyIÌø’  ‰b¾¥v•ÙZà‡€§}—Ï«ȨÝ}rÃyeÏ$°N×ÊDõo蜮ÁnH°Aà5‘Yô0Wyí7–PÅ/¡ë¤ÔLä9“²Ÿ·B#t˜!ì垇™C}Ì":D¼Œ²Óv¬6NîºÄÚ~W“—ñNŠ EqLÄ+Ì2ZûƒI?´¦¥üï§dŠÉwA[¾«mêae3¤¨íò±µrP䄘º(ž§1:7é·Üab>mwЧ¥6x_ó{í~·L®á+³C~ï'ð€# GÉÆªx2i"¡\ó£‰àþ4ºÃxÍy?aöŸÒ‰ˆ-ªò¯Á(¸¹ªûä#3›e2 ÇÁl´Ovã‚ÒŠ†ýé´‚)Çä3€ †»&øÜtÙÅ:Å컩Ăéž™p¿‰e?Kr}u?ÛÒö•¹ M“ŒôOãi¦Û ñ)s!‰™êHèî\éÏ6ŠWÆZM%øìõìMûú†鿣`¤qÓÊÀ;wÕ»¹xù©lºwÀ ôÕý£ M ý´°4)ãd¢pa¶‰ìïÒä“î–Új¨oÚf™?èOÌ\‹éPÿ¶Òvvµ †VÒa—Œd^ d»Hiè-!0ž$–6ÃDÚÜì÷ñ”r<þ‘keNøêËdqâ/l¬Š/n[ºa„·åÄkIïÝoÄ^تºÕæSÆ—™6Û³y’lV˺_3Ù(™~$£!ÄÉÜÛ èª-±ÿЍzûdò51H)Ì™LÒéÈ ÎÅìü÷o,ÖxÛ-Ö0‡´¼ÔVda$9õm"$²Ý†6'ȳC£PŽ|ùÇíqÏ2š6íqÏšÇØãN^a{¶íëYzßëo¥ÍT‹WÚJ›­ì [i³oHÑ鱈wÝîŒÖš%¯GO¿–~í¼ñn?^`Þ (Î× Û’›«qBÉmN‘°£0Rn¤„^ãš)áptL–îa¡¡þh€³#–×’ðG?:†oy%uéçV³¨|“[ÍšG~tÌoàµõ½¿ÞßÕíVù0oyŒ1‰›€áïõ–ª ·;]å-o¨Z}ï”ÉlÒÍožZDr€|n•µ a¡Ù“âøð‡Á÷<Û ¹|Gr•N=eJøq 2óñh€³Cå×’ð‡Êxë{` þã r•o‚ÊYóÈ¡r•_*ÈUqÉ{‘ˆ<Ÿi챇¸&ŒÀPå )Cã|ÏWÈ 1É!ö»ƒØåûÝ@ì·¾6¿ÞukíÿÖµLì%¹˜éémMéÝLë¯fÂPg+°Ï‰ï¹ú³ÐfR¹ÜÜ mͤ‹tti+sÂö¥×Ì> 8;Ø- t°O¶ûà¼x•oûYóÈÁ~ös°Ÿƒýìç`ÿ¥o6ÊiÁRZ9ñíà¸C…”¾#íH#a3Ž˜-”@¶"‘ï*ßk‹¬Ì ?ÐÜ;]:÷nìnÇ_KÂŽÓ¿Ï¢òMpnTïêì¨Yûöν©m][àÿŸOá›™;=gÎVdÉ–¹ÃìËÚÍžm¡Ï»;Ù–!4&Nxtß~÷+ÉÎ'8„«3mƒ%yIZë·–¹:e_ëûé~3¸‘Ÿã$~ÓÐ28ÔïE®Ì;œDôh÷Çσݯ?N>^íüìï¾gÃvn_¿=ß>æ; 6ßöÅù·Ï4¤¤¿ùtó…^Å_ÒzÔüô3t?Ý|¥\ýžW_Ïü<ÚÁ7_?ï_½=ùpöõóûîÑÉþÕá ù¡e©eúQ·÷uóèÍ~ýíΟ—Q³Ñúâ~¸Ð2ø¿yÝvÌ;﹇秺o¶éÁÏä`÷´žo»ú}‡2=fWû»ƒ|ú}l¾µèû£“¯Sûþpwú~ïf¤ï'eªË]™œ¼ÇÓÇé{¶FãôZ§Mïÿ“½uê>cN‘ÃÝ5êÿó=:½ÿ?ºkÔÿ7‡£sj²ÿÏ·³þ?ÝÚª8ÿçûê1ÅúóññÛÚÎÞ‡“Úîþ‡­ Õ6†¦Q{Úì¦ÆÖ‡Ú²Æ(’(ìµâ†²´Ûn7í³ž9™ MÕ ›:,rò[q€7äEÝ|7ø•oUyå´[ŽAç•+´«G«Â­¼r =Ö¢f|7¦óÅFŸ/6ÌûXq±˜+Óbß©~aC';ÆS6pb†Q'§Ûžhû&¥¯™:¯ «¼rL$Ú¹iª}Ý8‹n¶‚ÒA+.¤fÜúvÕî2_~šµ «TÅÎ?soÙ¡UMäyØØFÿ¨Õà_ÅUŒìšR… Òê²òŸóÏÌÔ>Ù¿œ´gcŽÿ1¥tQFŒ·¥gÄôßc©«qãä!ŠÛ•R\Õ~DyÐ̆iu8<wÝ®wý.ã¸ÖT2íiÖuÚ½®v°6wRËÛô½vÕb©û±ÞÒéÿpœã;;{ÇÇ›ƒ9a&ˆî!ý^Õlw•czõãå>xPgÕmÜz3Ð s …åsZz‘­xM&ß2²a\µZSWÙø}øÑ~‘ïV?\«.ºLu(†rK1hi+'… &s½•t¤–@·ÞtH•­rõ„Îùe‚ºw®uÜ^]iÖ[õf¯9ºjBª¸ Ÿ¼¾Í\­)Ý=0d 7ö5aè$–±d8¡Š_Ð-žÄ »‰§( ‚бÏ=¢¸§”\éÆ+_ÀXðì)\·°õ_wó ™™ïóE¢ì#Ã@Fþ%ÞƒßÄõÔ&h-"ÓÑ(Æà9[OïbðDSë×ÎNô=?O¬5ÃZé²QNèH5&à<|À†’NDz“þïú!z1š0šOTÛ1=cJ¨âñGòt6L·õöÓquОþwùúÒÇT<Rj¾SƒéO‚”$TÒ YLEžÚ¸l_ôe?£3*}ƒd¾e½«ÿæÇF_hïHì¡'r=³z Œdä&(T^Œ¥ŠÝÐgf•a•q7׫º{IžYx+¾ØÂ»,kéms''â à¤e qFåMÏm„Ç$‰­å>GÌ#¡9æË!ÌO„ÏÅñ#ЧËÝçAŸ§m-÷|+ìxeŽ]TLg½>PguÎùÍyA@:ŸtNŸ5…°ÙWfÔã‰Ey m"â…ÜwõÔâ’¨H)*ãÑ.ET²“Úb¶‡WŽm>³-b<ŸJÝMÑ=QOò.ßÝs€U;©®ª×êVní£­œœ)§Ûîʆ6òÍP×ÕNœœ¾—jK¨Úƒ­úèær-צ1•¿ÿú«bÆþoÓÑÿÔuwœªŽþô›ù1Ôö·øWÎ-y3;ª¡1CÓFùö[:ÖB³#!4ßù™¸¬¶·7ë§–Ze[ûéÀ>“·öBu’v§¹Øæ~?Ö1yŒâ3¢ì=Ab¥vÿºïUñàôˆ•A¾¯¦à,…·É±f€c¼™¥ÈžÐþ¦K[5Œ0ß02EA¢¨v+]$e£€Xûsa’ˆ`RfÔSÄ*‡:»À6û8²8}RY a‘HÙ7[ uºíã&ÊX¹Ú¼iº‹%íþWe.é³”hÏ­jo^G·žcµ'¯¢³v=ÊÐË•¼1¤¢E¦‡»ÓÕ)Y}C’qb+’ì³3UÇbD$(`Rÿýˆ'*ôyL‰d ¬Ë“tÜfûkeFDÉH5*¢n_ˆû3çÚ`Õ»½ÃÝýÃ7ÏÄm+£0íÝ•›áËpêæ®yÜ—»­oǼ;#-ÍõÓS{ÙiŸ[K]wk^«¦•ÀÈ}j#[4û…u5‹LäR­x"%iw¢ÑM„wû”c—kîS³¯$yB>eùf Søé,y€Ë¹€w.è|z>ç,øTÐáèðÍ  ÃÑ¡„Å*ªý‚´Ú«·•åÅ(1ãñÕ†¹&™¼HÂH:K@„Áæ% „„ñø„aïæÛÛÝÛÆÆÆxÆ  ^‡¢U"°ïãGZ‡Ò¯ä¿LlòD:K€MØÄ››››››æÀ&ƒ緡ð÷L¾õ°Õ €:„0Ôñ”· Î;±JmYü{x‡B½Y·;éª/P°gäô´ŠíN„~ÈDVwÍÁh ŒîÓ’àQâ{˜#ŸúØì—K4‹E É8Ñ,SEbÈ{óræÊàì´Ñ5,ö‡ÛøôtÖÃÙ-T·üÁ¤ÙöóOôr\¿¬Ç:5¼±g ç•ÿ¬ŒtÇyO €ùÃÞÎÑÁÁÞaŽÌ É‘I¹Q¶»‰“¨*oï§ù¾j¨¢Ì{~PUªW,Iñt–T€¤@R.ŽxÚ$Uj6âÀÀÀÀÒB`éöVèEƹV¿›™W]¯{½Û>Ùùcuô5åÖ.#—g¼x¦'´1üö«×³Éo¾øü"ÓTZ~‘Õƒƒ$¿¾¯Ù(¿ÙÙÙÙf ÛÈ!?ÀµÕâZÁãü‘–%9ñ_nmÊ•ð©@m8æz€c€c€c€c€cÓqläà$àØ l9³:Zÿo‘ëYÒ™_õ0~Éë›8% ³:ó΀΀΀΀΀΀ΖHgAÕîK¦³Â;R:+ ³è è è è è è èlYt&61© —ÀÊfT(ÐYé-‘ÎtIăØÙ4©Й ttttttt¶D:óžÑ…¨÷‰qšÎ’ ÐYÁ© 3 3 3 3 3 ³eÒ™¨R"^òÊ&KgI謀ÎÐÐÐÐÐÐÐÙòèŒàªKè ^Ù ŠbgV*p*`  ttttttt¶D:£Uæ¾à3›„xé,©Ð:::::::["±*§/úF ?"t6…ÎÐÐÐÐÐÐÐÙéÌ«z/ù»p€ÓYR:+ 3è è è è è è èl‰t&ª>ɧÜÂØ™‘Jt6…ÎàTÐÐÐÐÐÐÙéŒâª`â%¯lí;Jèì6Q8tttttt¶L:£Õ€¿äoAÇE7jX©M£38tttttt¶L:ãU¼ä3›nÑC©ÐÜF tttttt¶L:ó«ˆM“ ÐYùsÓ™:::::›NgÇwvööv÷vÏÖŽÏ´Õó—Ϧ’H¯[o¤VÞ5ûÑâÈŽÔºn]ÑŽêö:FKtzÊ©·×|8¦”9©Ò3)NHg¯iµSoÔl¦û¼Ž­|cØóN„ˆâw ‚—|ÕOgI˜˜˜˜˜˜˜˜ó˜Óü9ñYúûȰza«ôɞΒ°ÚXÁêíSeµ{άBnËKÌ PßxGn@ 8òx$6ä ì#Ñ8R4J<Ê-+L4cÎ(¶†y‰¦ÃmCÎdëÔ¨¯KY3㺮µWö Î«=m-TÛôï 7¤éFY!,܆Î]õˆù´ èwEÆÌ µõ)ÓÅ(ª¹MÑ B’Ež§%ݘìd§•fËèÚ²‚YB×ÎYõ´® ¼($!õQ C‚˜p ’‰¶–Ry\ø$!×j†–ŒËèì²¢ZBgÏYõhg_5}²…Òg­ÓkéìJ¶zé"ã}¿ýÓ­2Ω ýé¬Wœ\NN>åÐß¼kMff*â‚„¸ Ä,·[9;yœ.•˜f”·{'{+Ü¢çyé”W…÷b¦µ&£5§¶v ž+V0>óÖYÁ4H7J»c$õ’ Z@µ¸p&bŠ˜‹ ÒýDvwQSu¥ž¬Ò¼é¯|Ëõ¾}šêR£'aB´‘ø‚)â³SN=É„çihßJ†’‡A¬„/"ìÅ„šRëMm»F„çá8Öm'E€˜–‰ä(Ä‘/BxØK]“ ?¦mKO%„mŒö‘Ê´Án®ª$ yÙÎ:ÿ2º°]BÌZ”lšOT˜Ãzú#OVgª©:Ò´›n¼’ùÇv§~ZoÉÆ`í²Iªº?í’£ºÖá–^¨(µ5]Õ:­ÓMÙh´¯”•ÚI§§*¿~ ÷¹nrÇÁ·ÊpM¬xAÌ·Ydk–ª¬¾ÙT»“žGôðD-Õ½jw~d½’«PýË 4s“ƒ¶žU;ŒŽÑÞ—´ÿîx³¿7,©_«xüwè`{g³)£Z¿DnoÓU›ÝTr“%ygHmÙÒtÿÝ%3¹*£)^?åö¸± –÷3s+‘lqtqƒv¾º¿g¢ÝÝy½i¦†¤~jj=Ø>ü¸ýÖîÀë´OMïç#3ïˆío›òRÖ2¬7êÝ›ÚO­¯³5öKiXØ’jq§~©CR§ÿPƒõø|W.ðøÃ'ôñøÍfCöZÚ”O=–AxÛ?•ñ纪ÓÔ³eò”FjŒŠiÜi§­Qq|A?V‰ì5º˜—:>Ñ#O¦?jƒõt{øC‹µ2žé²9ÌbÖ‚.ÕD† =;ƒM§HÎg)–%¶m)ž”A(Ó±w„²e¼Ä°}™)ýØa{Ýހͥn‰¯UP!ò£0A +$õ)r…R¨ˆKæ”Îø(aû’ºV°¢ýbC‘•׵˒PùdØž=9-\¦ËïÒÂeË€°ýB5uAؾLIs‡íe” sˆÚCÔþ>Q{o“Ó;£ö.YQÔÞ_DÔž›<Øt㵉ڗšùKŠÚ—«ûiEíÍP¨ýcGíÝ*õƒùüƒ@ynzHøFŒÅ1’Xs—âÄ—‚ÄÙvÀR%j_Ò?À~ÑQ5#2çô–$³çî¸Ï?j_¦ÇïtJ–Qûåz óGíKi¢5ˆÚ»U±Ð;žz‹‹ñ\jM-êÆïÃö¡­þŒÇUøé¬ƒã; п,ÀpWËS»«åîéS¨ìlý×ÝÄͣ׫ö©F݆9­ªêZ6/ÊÌ+!1 ƒùƒßhÆ&h'ÓQR^•Å?LŒ·¦üj‰ÇävODqkÉ·–|kÉÿE–|kr~;&çÏ®¡Û.fÓL±Ñ ™(1Ô8,)®â–q9Ч{>«q4.,ð¾¶¹·Œh’?F‘-2)ìˆ$¯Ü2Ú'€)Ë_^&…,ߘI¡a­m´v¿¯5Œüͤý‘ Ú'Ä"!_ÞöVOÇÙ~¤8¿cƒh~¿(çVÈøØÈˆÓØ H$1k$…ÿÓQšJ’F4®½*ê©ÍFj°ŒYÓ¤Ôä†ìÑŒÔâœÖê_7Î4\6ãûQåÊ àrYt;°Ë˜Ý©OÝ`†Ka ãÅ1JÌßødé*ÂÄÉÔ_ÂÔç=^ÍûHZI%ŽåqŠ˜"¥Q"Q”*–(Ç26»$@ü¤²¨>ýÍx°„9<Æq\l`ËAX ‡¶tìb&SV'Cø÷$ ÏC¼‚ÎA°"¢b ¼ I[¤=쎑”‹]‘€ýYठÃ7AÕ¦}´Põ圀”!l»B ‘‰,¶‰E{"Äpœ 4lè”Òql¬¬8.רá7ïU¸U ¦D>^ÙQ¾†˜[æß5[‘½ ²)ã/ïôa–oÚMûh…vƒ¿RvךΆíâåçoLòÀxXi`Ô:¯ò<ü«srõàÖZtnÜÙ‘ ÙPöNBáéx2ñ¥8èjƒÙ9 aZO3[Ý™ÞMø¬XXOÅÝÿ­-–Àü<·4¤ž¸Ám~ãÿL‡ýVÆáD‡ uŠBJx´1ÒÓ,8D>çª8®1Q@häúƒiáˆRwŸ‹>>çá÷pø9\½^¾‡ßCƒ`§¦aÙß§£qtgªçzãÉ´è;¼Z…DýnrÈ’k”“m‘k%tŸß }ÝO“!}ÒŒó»ûbš6 grmk“-ûÏmxýÖè =‚¶þ'5£ñý$³ÎNu KþÅ¿nP±Äòù®†ã»p÷·þ °qƒM³/á}¹¾Q£k‹†yhò<-¢Ä€o‡ýbÇUøw¢ÃÛù=dYI³Ðópše3ZWC¾–Óbª$FO™ÿÜæÓŠ4À ?*ÎÒTO¾¶Óôõ³‹Åx—†?\~§ª €ïü Pm n\o0,Ö‚EÏ8XÎik))¦Sô®ŸMgwu&öÚWö.ÖGx±.ùñ_›•ä)–“™X|ؘΤX –ýCy6_±ŠÒaùúðÏx¢‹êë™™ôë?PùÅpËõçàÚñåÖa-÷üæ órNFýð†…Š¿ôà¾Ln qœ™LŠy}ÆaÒʆÑMœß}°¸MŠ?4y¹`6ÅNÐ7H«I‘ ¦_<;Ê`U[*3 Mˇ½m6™›I«rOÍá¤7§-pêß_Ùv'7¨/üÍ©/¼Z}5õë5÷îF}áUê+aÑ õ…—ÕWDå õ%žB}‘oX}-JºJ'Ì$Oµ¿—ï\dUBwå\T • ®ôV%‚Jù[‰…™ü,%Ñ\žÍ÷})ÙJÁ³F]ÌDW%4d)–H˜¹¨´êL+WÚw.C”H!¤KÝYНÙË–ô_Mk”Ò»’|39[h“™ô_À ¥h©¬êvVÔµM×*h.yKQZSOÁM¥!ê²´†tFu%Tª¶šê©Pâæª)¼ÊYP›%¢š+%}<Ó¬‹‚{QÊÐO)óç*©DT¥~Yд%ÊyˆÉêøjAÓ,iÁø•Š¶Ô«3¤Sb•šÁ¬‡ø«Â.%f›«ÏôVÎúõõì¾3oWT;e¹Kc0¿¡'¦4GÒ%iÉ¥ÑÔX¡Š¸çF ŸßwŠN[/z˜Ñ³WM²ñ]ßûuÞ4±‰ßÀPúÓÄÅùcTß"Ã׎Èþ\GÓfdßÃD~;~¶è~Z½ïúÖ¬î%9Œñ!žõ²*-M™'Êw꿾O³ñÀߑޘÙ}™2•Cnõ#›3~5XÎ_‹_p-#ˉ”a–Ç$N%O©‘VÉä{—‚U)uFHæ3;f¨ŽaÏXëžÝ_ö|»}¥c­¸Ü?õŽÏ®z?”<9ùÙ‹ýãÓ“³«ËNïÓ釫“NïèòòèøÇÞOÝË{—GïW´èü|Ùùø¶~ãâôøŸËÞÙq·÷ñêä¨wôî]÷c÷ò—…‡»§''W½“Ó·ðãü²{Z¿Ý=9zßé]þr#8éú;µ‘^\tÈò¥úãç‹ã«Nï‡wŸêWߟýØ=¾(ßúÃéñk^z~ôÓ#O~<ý¸ðº‹ËÓsÿèW½wo×ݺ8ºù>ußUä9ù.Ї JÖt?^vÎßwV2i±§.£fÃë_kzWwÝâŒõôôò‘Ñ,1«>Ç«‹–YÃðÊw^žôp¬]GW—ëÅ¿ŽO"ëÇxv ¿×öë)öaÅJ>¹úpÙ-ɺŽOçݵS!½hU–iö`E=NÔ‹ã‹î#wÏϯVòG¸^ÿ}t|ÜùÐ9?‚>/ÖSíüòƒÀT®oð±Cþé·õât/fp ƒºì¼íwÎ/yëÅÙÑÙyïÓ‡£+YG’îâWí‡ÇÈý~a#¾í|êÂþ­ó¾ûqÓöé, ó¢C÷}ÎÛ%QÝ»¶#Îaz/MžE'|»/Ð>ùŽæL ˆH˜ãI&à¯45“F©¤€s>ŠÆ{g§sý›ý’OAQ7ùEß(@zo¦éyTLñšh¡’ŠÍQñ®Èø”¨ø!.˜áÜçût“*4&¿M}(4]FÝ5à¹Í7âÍ&´ýsx3É ÚQ¥ÕV¤6¦”Ê3cò½*2‰¡Ò9sJw46˜a@¾VDOžNo›z[¬†þVp -H,S ɉÊóûqf‚$ô…B 3ªþ¨^I¢ÌY^+ñ¶Jc>‹mR¼¡Yš3,0‰bæCŠËTchh‡iá‚©† 2hÒÏBóš3YÝš¾OLVLoô)7]þ™œùiœk`èééäæ>Lváé…èRQŽ ÿ uúy~»>u±m9⯠d“„jÛ²è>ïÍFTe`óÒ.|©·Qª5V2Õ`táȦÇ1]c“§ÔÖßž1³_ûPbõBÊ4"1eR-'óŸ¸Kb–,Ô)yáÃòW d‹Ø‘™Œû£éƒÌùן‡¸|L –4 Њ)šcë°„ ¿BKzî”^ŠCÏ€B ¤ŠžŠ§…kñ6ÔËoE%çPÕÇÁ|;æwúPIæÝ.öYäÇX3 mÀªu>.EaƉ’Ìb¬(׸¸Hb¹0‰B|Í6Ê“µù÷lØDaNµN3 ×J;ŒaÚ$R&-ªTEm•ãKº¬áu(^¼Ç,µ¾h ¬&#™Ï饵X;'’§átˆYÃ_ÁÁ:÷¡0˜¼8z B1%.›²4QÂF %±"ÂçôáÑS°x‹`žܱIMÂl¢°eÅ‚º4…©‰`šŸ‰*îÖN,LÿQîÚÛi6ÕLHG4¢Œ:§€PV¨}j“â4É0¸xíÚ=œÈ¤{—†OÅÊi•ò”é4QÂ@.±ØR«$OÂárðO±{¹H@D-1KÕ±`©²LÐT:KLBëü­ªéÔù[Îÿ1ç÷}7Ý¯É h€;M´aVS)1€;ÀËRgTú ¯l–}êèêòÇ^=»q-<˜§ d6 c ×Êı’‰æ ~¢…\Ìt¨‚å÷õsœ/™ h- B‹%Äç;ô;UF8Á Â`\˜€[³‰PPé±õ2ó®Îi‰MÌX‘ vX,A¥4€4 ʈ¦¯¦åÜ­»^ô‹FKaÅnœ‘&°×_*V +#ØJ1JbážbÙoá—nÀí^ç0@ž$ v£Ç ôqI°ŠuÛ ^¦ÂcìNU–‚ÁV“¡)q Æý”4©K˜”`¬á˜‰&Ÿ‚TÕ[¿‚Ru†/OÂae% 0 £©“6Õ$Ž@³ØÄ1ŸfÉΦ±N‘QÜD˧Äﯔ4ÑLX“ÚDûRsÂX_.OÖY Æ(ª¹¬ÎìãµîÀJ¸£5^ƒÜHAÖŒ|è”ÂN $  $ŠŸ‚×Å[Ϙ½< )07À2"„‚œ¢’sŸy^`欉‰zf—óX/œ’Çf¸ýMù/Ce½^‰*BjÓÝ8÷Bi›½êEÿ÷]áe 0L$Q޽_IS$ü «ãÈÅÓ$ ®Ïvß~Ë¢ƒþÑYÌà™Ú €ýÊ û£"£aïvOù¢up}8½…˜1²à;*jmÒm ïõ}ù¶ïò•…/Ïï ãþ»y¢ö¦Cù}œ÷&@Zý¥xÈ;´|GãlÚ›•µ+cç5£Ê³àßãûÉÆ@¨ìÐWžó«vqLÁÍ~XR¬Wùð¼Ûý.Ð~Ödró%ïû0¾ŠºóUMr{í•M±‰ ,&ÞÛQX¼µ·/ÕìÝxUQpéöìNrÇze=Ê^®ÇaÌå`à^²î^­‚^E›ñáw FúËœ†¾ª^õ²²zfOM _á‚Éþ«ïg~@ú±V™½ëûý½Ñ­w·øõÇÞ,bqϳ½bÁ®ØÌô€ãíŽ.GŒ8bc„9l*†­Cò ’šÚOc™ÆE‚˜F ŸãcYüñ'Ž2îуˆ­<7£ß'àvDÀoþÜBã­Êa`A0‘ «Uò=/J˜6­â[”Ï-J‰"NRă£¥˜Ã_ŽrÃ%†{… ¶I%Ø©²´6Ñ/>KëÏ÷Ɇ‘ÛòTw-ÌÁ %b\ $x! æQ‘¡@Ú—w¸°ÁnÚx¸°a¯àp!ÙÁ‰ðfEÍ›¬¾ÝXn4ŠXnöî–›—)õL…ZÌûÿ¹øÇÅÍï×ÇÉ?nÕ3×v…*ù–é¦ç°eÑpâ—à)"8â*IS‰îŠª3¾Œ\*MVÈ^t@b–?Fã-XïˆÈ¯ýØþ¶¥}hB_^ë,ߘÀºaí±ý¯€lOª~¿ÀÏÏ>þpÕýP€«<*MÃ#|(K¯yXÊÃ:wþXc7<=³(j4hjU,C'@a0ù›Fc3cfÜ„ñ×Küej8« X+h'7vh35(8æ÷jRþ9Îú×ý‘÷ÆTøøN„ÙÏÀÕ Æòð¦›û^6º>TƒÁø>¿Ü÷nŽ}¦v¿ôn¬Ž¥¡¿Ör¿=Ö¤ô·„à•À4²?Ï»gw¬bÜìJR]iQáFT8ÉÆ×ž°%Ó¡uççKtôëá’o¬"ª½ôLæëN–×~³_ªeRf⃎.Î?¡«‹÷‡u;ò‰5ç¡[‹÷§6¼9Oþ7oá‡rqyq8Uùoó0e–Îò³M­ÙÝpÞ(½íÌr“ ¬Ïyõ̰ÌsäÝ–#c ºn‡ëÊa8S¯žÍ~á¨Û_*hYs÷Íî]{E2«çEËñáÛÈ£Æ&BR0aöŠ–¥HRXOÜÅ*JR;a÷7|]hY®DË37GË»"òkGËñ¶ÞÉËKrÕ„å›ÐrÓ>Z´Ü¢å§EËÂDÆ*cNU*¼“;TÆ8HšZG™å¬5ǎ‡Á‚ÓºEÙßÊf-ÊþfPvOü×#퉺µ8{Ê嘗þÝ+xG–‡H— ?ý=ØÃ#x1 ½ÚojÌÞ÷ßÿÏìrEí=å =²—[ŸÏ÷¹bâ@Êí΂F‰”I"`=c‡‘0)G\jœÆ\)Ð{¾"¼O)ò54Þ2©í®ˆüÚñ~²-ÞÞñ&,ß„÷›öÑâýï·x¿Åû-Þoñþb‹æ‘ ­eÐÜ2‡9ˆÈvø$I –!kìk‹(_«9FR$F°Ø`Í£½Æ _"ÈrmÆÍù®ˆüª9:ú ò&,߄țöÑ"ò‘·ˆ¼Eä-"oy‹ÈŸ‘ûèf¹Ý‘6J¨ V#¨±DY$pD× gµùªŠ2’¾ª˜Iy¾šÆ"ÚòØÛŽˆüÚ9ý ò&,ßx6«a-"oy‹È[DÞ"ò‘·ˆüY9?ˆÝ.ãµåBQ‘Á\ ¦écJ3 CSgÛkÜð•ùÈ“ü1o‘{GD~íˆ<þ ò&,߄țöÑ"ò‘·ˆ¼Eä-"oy‹ÈŸ‘ËB·‹Za —„ÅÎ(sF4q„@ôHn|e [ilÔð!r|@"𝡱Ü2Ž|GD~íˆ\l‰È&_^y–oŒ#oØG‹È_"/Òɶ¼…äOÉAÜ&Ë|Ë,ÊWJ ?XÙa¨ àK!Gѯ!²î »2UyH0½x•îU8uˆ“CjvÈ“C"Kf´vÃ7d7„%¹í°j9–ŹöŸÉ¦X>B[·&襢büZ[¿6[bEUømÎÆÎÁ†“±…¶zãu}u,'‹•‡^b$x+{FBœK"šFˆ1ÇQª ˆðÈ1 "¼oÔðuÅüD$ŒÆÍí™]ùµÛ3òo`Ï4aù&{¦i­=ÓÚ3­=ÓÚ3­=ÓÚ3­=ÓÚ3Ù3D”leKÈ8þŸ½+ím\W²ß߯ÐäK¿Œln’¨ Œã8i¥c;í%‰ Š’b;^2^²Í¼ÿ>EIÞ;–o'A:WèÛ-‹âRU,žCIÏS¸C ¢3Äî ÃÓýÜ> ¶ý8&UÂ/Å%¸¹nmd!ãô\⽄üŹÞqG/Á¦õÇq‰4*߯%Òæ‘q‰ŒKd\"ã—ȸDÆ% ¿B£QÛWÎ,ºC7_QNNz·=1rÁƒèßöìöÖ|ÙQzv•3ûAk_tü¢<0÷Ñ]g<¹ªèù¾;Š‚Œf—‹Fwëêí€ÓÆ×¥%îª+{V¼"‹çc“2¶²·ŒMϳ» Fƒ —TnmD_™âk)†Ã‰ëw%1çá9ç‹u飑-«¶ûáäQI×]Œßͳ½?Q²¥ÝÒ÷b ¹Ivîmo CWN(hœó`|µ`à£4UšøÚ·ŸÍƒR±Z9rŽ¿çÛÃ~šN{ùø³ÐæPÛ¸(€#í`:Öáï8Èñd8‚FêHƒ×º„AS¶‡Úžóxм8?€ò*=qñpç]œ£«Ë“°E0üvç_ðìül‘ó[ïØž\]Öz²gwåsËœô$±±ìWzNu®eVm”X¥Ûš”»í~«ŽP…”Ùiãš– “)áÖE­]>þõTyjwœÎ}Ç£'·WØFâ÷$­µ½ËBç¬î˜Èübhflp2Vc½#«T@÷¦¿Dèd8ìiÀYÛZ<†ŽçªÏÆÔE–¹ßÉ}Ù(/n;ù;œ¿àì}Ó†MAíå@õHŽÓ€ÃošB®ìûÛaÊz|‘Ÿá‹¼j¿+ñ×Àʦéï14X¡“¢bÊ œ¨³NÚdø¬îû„|ÓÄXû¦°Ê7MMFk·b<®ëdz›kka,ñ¹€q;7Ã\®·¯]Ö‰_©é–½nñ¬é^rÓ-—/Õ|M±Z>k6Jîyõ´Y.¹…F£Püá^8n£p¼&Eé²Qª.¿¨W‹?K ÷¬è¸•f¹àŽŽœŠÓh­|ìTËå¦[®–Ná¡ÖpªË¯rá¸ä6ZgPƒ²£Þ,Õ´^/‘—?-^+Õ‹Í’{pt¾üëq­pöÃ)Ö“RªÅõ …Ö ¯|Y©VVŠ«7ª5õéA³î7½ª…Müé,¿©€øÎ£™xÊ—ð}ž Q`»vT(–Ö*i5§N&œçÕ+›5PÛ,9ñÔµZm¼R›ÊZnc³~ðR5 ¯-³qVv±K6šE¡ÙØd¿ŠÕ ²¹ŽgExÞ˜¯’ØéK.7W&bݤ§š³±)ÄE›¤òRfÏ,êu¡Ö‹uç•‹N­Ö\±ä ü¾ü\äwZª Ïúf©Õ§S{s‚J‰üTÝzƒpœúJ P©Fé0"q¯”Z?+œÕÜóÓBeáM"qV¸®?¼&î㕎xX:w ÿ@×9v*ÛºOéE5ë%º§æ¿_¸j÷:#‘Luô±sÛ@¸ŒÝP4±ð±ê©3ê:W¡çY¦ð- ùñ&çT ?Ecí¬Z_Àh`ÀìAšÅMš€ôò…ô*¦lm<”’⎨ø½Äø–¨ø9.˜ãÜ÷‚´/ªAprtèxêuSé“—¨{ x®@óíÇ$¥í_ÛžaÚVȉ ©Äv î¥Ô60#&ß¹Ú®múÔClX” +¤†ùo7ñ6¼ù—»Åzø¨^EÑŠÏýIΦ"O¨V)£þ°/:ƒ¥ ˜ÙRõRÐálõZÅ̤ŽÙIb„9&È`È´ÕT_ddý ïAíT4@ReðA·Q´ ™¬HF!S¿£bŽâæ]WuÆúZ)xrà|½Áï£Æ®|½²ÐÏg$ú/ ?éŒÇÓÍA«i“ÿ† ÓÄJí*È8û±;¯Ñlaèe&$ÑbÈ“ Û“@º0 <‚ ƒ@¯ L{4X.}¹™8€$ùTÏmÛCÄ ÌÀå¸ )M+4 f¢å¯Fñ`þÙ¸"ÁÀ¿v“g×=ư7—§à*ÀEÔäAˆ%'á)J ýkq‹#!àa z{Ѱ½¢=TQæÓQo9ê%.UO4§Ïòx>óLl²Èv5ÏH<›!}`µ!òQ 0³€ †@‹± –ä~h0ö¢±7ø&lõ'òßój-*mJ`²!²… 1æ„Iß´m3–Å,„*©[R|"ƒH.t=‹â‰Kc~`Ì ü€[`M¾Í<‹™ Žeróm4Å7mÐ/·,…V¥RòjímpŠ =dóLÁ^ ÂG¶…ÞBÅ;‡¥Ð.8JÏ7Y` 0D1§0À) g’QsY»IˆÐ²~£æ¿ªÝ`:Aù b"Ÿˆ"@ta(@P, …& LÃ#ÇÅnìæm¦Sï‹êS?À"”³<&=Ä‘ÉÀ/1# °1 '•‹Þkq\¤/mÌFM¤Ö=mnGžPÅo¡ë¸ÔTä9•²_¶"@è0#B(ø)j[f嘅oñ6ÊNÚ±Ù9™¯µ ÒöGÏ_¾zrL´¡ÂMPEñ>ÚÑp:ðµYAÿû-žeâ&(Œ›N-,u†$Õ9€= SES5Jí*ýŽ{MÔ§óOÑÌÔ–X} ü~gp»Ó[øJíU€ßû“)<`ÆÈÊÜQ¼Å*šOšzP®úQ…r·Å(Zy>ŠÉý·d.b‡ªüÏpìÞ‚håcü‘šÐR Gw¾›Úçõ¢‚’ŠúƒÙÌ‚*Gå3‚ Fû* ]Yíj¢iöýDbîlOM»ßE²Ÿ'¹m?ŽÁ½ôfæ²T¡Y’qp­›Ù†HA8e&$Q³1ã]*ýÅ–·­ÖL‚/^ÏßtnlCrÇrÕ9© ¼37½[ œŸÉ¦G q|Â@>.d¨‚ég…%I®˜Äs…+NdŸXW*ŸdßÔ–T£à®£ûÝÁTM·(ƒú·–´³háp¤Å»¦3ÓG»]4á1ß’Hp]¨½€€mÛ„è&£TpJ$÷m-uÂXŒ «‹a—•†s[w­[$?¶Û2Ä{ ðÓoË^Ù¸ºÛVT h‰eÆžoà¬Å;×ÒnÞŒwM&y¡E<™>ÖVÝÃü+¤–oÙÞÅS°±OJÀÎtšLJ¦_ÔöÀÿÆ’ ÙmɆ‘(¶å­6&3RAl¤¬‘*ŇÚê¤(ƒY<èÏÛñž¦7mÛñž6/°ã¼ÃŽ÷t›ÙÓXßûï«MU‹wÚW›®ìûjÓïNꙈ¶àî]øOưü8¦Àû>6:ÂÈ!¼ãY2ØP`Y:7¤iqSç¦@ÐYWK”Àб–:áŸq–L ‰ÎÙ_wóU$ão¾z/!õ³dv½‹–þ7_¥QùÖ³dRæ‘%óíM‡ßßðŸêæ«ìH˜<F¹Ä­GÂ$I>á V_îvÚÊGÞ^µùN*•Ù´—ÝJõ ÉY»Ÿ¼È-_P#Ð-Ó†ÖCDçØÃzhßÈ4˜j©~)´Œ¿&ãÐò; ù«£es×{b þóÐr •oEË)óÈÐr†–ß-ÈUÚ(ôBl…"´8  ¶!"1UHÉ„ ’ u¨­‚99˜£Ó•¡ìÏ…²Í e”ýÑ÷Äf·¿îŒ³íߺ±iA`â;›ž_ä_ÛD¶ÜÚdçÀ4wÂû¾RÚþ!ÔZgˆÁ”‘Ôýƒë—!¦–ÐR'üZ³ãÌoñŽ; ßKÈ_ïïz -ûgÇÓ¨|ÞO›G†÷3¼Ÿáý ïgx?Ãûo}çQÆ Ö1‚·Eÿ‹’–0(€ás1Ö9¶¸ Ã"˜rÉC¢¥Nø…9ÊYkùBÆéù{ ù‹#r‚þˆ<Ê·!ò´ydˆ÷B ØG Q(ûž8E SÏ2 -uÂ/Åg¨×ó_ª» Ÿy!u>Ãþ|f»Ê·ó™tyd|&ã3ŸÉøLÆg2>“ñ™ŒÏlã3œðÈ„ [¶Ð©¡p¦Hç¾/u°ÀÐBŒ,ÜÔR'üZdÂ2ǯÉ8=™x/!gdb…Llò?ŽL¤Qù62‘6ŒLdd"#™ÈÈDF&22¡ò+4µ}åÍ–î&ÕqNNz·=1rÁƒèßö…ìöÖ|ÙQzx•3ûAkû¹å¹î:ãáÈUEϯ Û¹xPd4»Ì(ºËKŸÜØ_‡Öºô±Ä]uEØÃª‚Wdñ|pRÆ–`öñ–Áéyv7Áhô’Ê­m‚è+S|-Åp8qýள$æ<<çï|±.}4´%ƒÕ–ª>œ=*麋¼y¶÷'PJºDwîÅ4r“ìÜÛÞÆ®œ2PÐ8ç ùjÅ,,ÀGiª41ðµo?›¥bµräÏ·‡ý ÿ4öò9ðgyððíΪ©n¦^{m(5} Í 6·5pQêRú`:Öáï8Hu(4RG¼Ö%Œš²=ÔöœÇƒæÅù”W鉋‡;ïâ]]ž„-z€á·;ÿ€gçg‹œßzÇöäê²Ö“=»+œ[Îà¤'‰e¿Òsº¨S9¬ôˤôXm&Wý£në¡«Fíæ´ÑîTrÒê—qåPâÊqUêtî;=¹½Â6¸'i­í]:guç¡òÔbÕFùþFÕÃ2sèºÜýu_>,$JÓr±°Hw§+ö_¶#xé|üýøËÓ¦×ï'¯ýãkÒúød ÿÿyöŽ@Zoöÿ}uÚÝ?¼÷ ƒïñë_Ѿ¹çïøË¹ô}~Cû¾Ÿ·’Ó=ïèËÞD¦§ìÛá«q>r”çÛŠ¾?9û¸¸ïÏ>lQß\Oõý-™ž¼Ú™½Ã‹ÇéÇ«-§W¶¸ÿ¿¼Û¦þ÷—Ì)zü}‹úÿË]ÜÿÑ·-êÿëãé95ßÿßòþ?ù²áüŸcÖWÎÃçÓÓ7Íýƒ÷gÍW‡ï_îèA´3YÁ2spšµ>„•5F‘Bá°·u¶€z½¶Fëg'_CÓ±GunM9ÿÚ`,ñŽºh™—‡ðÖN¯ëÄq^x¬< èà*_8†›Q'¾SÊùbgÄ;æþ ¬xX,ƒ•EþïnØÐɾ1• œ˜„‰ÛÉôæÚ¾Ké G¥Î Ã*/ãv.Tš‚±çîÍÒVø“ƒô/0nëkÏÍ¢‡Ì«Qóä•êØùga.;Ô"/üÆ™Kñôצtå¿J«$¸« 㥅² ŸóÏÜœ›ì_N:ÌŒc@ÇÿXPz%1Þ–žÓÿÌHpª®öµSø(J*õý:hæÃÔ Ï±ÇÚõv4ÂU7;Z¥C`]§7€µë¼U oÓ÷`ªÅ ú±Õ…ô8Îé‡ýýƒÓÓÝñœ0z;½v²îþc¶ÜÔyu;·îÅ t¼aq³êïj@›ß—)n¹Š…ìk­ÙZÛ?O>foú}9rÙc—s?] ‰ïCkÛ=)Ý0™[ݤ¯@ƒVÇ!.ÛèŠ_oE`ÿÎýŽÛ;,V·Õv¦wNˆ[ÖÕQW·ó±¥;6%²»Ç&†’"ñbN¨qE'±XÆŠá„jFA_úḬ—pM©”a âÀçDû\k!=åÅßÄXñì)Ý»Èê¿~23åë9£²K&¾Œâ-ßãoâVš%€"Qé´#c|]VÏðb|ETlÿÈÙÄf'læÎ®ÌQâ:Uq:O.ȼIç3ÙÉ軑›^L'LçÄsÕöMϘ\<{I‘Î&éY½£tìŽÛ3zÓo Laà¡‚ cšÁ'AJª¤òBS‘{‡ö¶}±š¾P8!y<‘ˆE#y 5±Ò±Ìl+lÒÑÆˆPï™-éMH‚Ù%½|Ig¤î.’Ø5Ý®évM 5=Ûš43µ92õUÔÆzjǧÈð#Q!y %›WÅ7ãžÈ#ŠÔ©…"e:”a|élôG‘ æê˜5¢NŠ omxé#±VßH·¨´¨´¶!.(¡’³|ý) qí I爊D!D‰c)Úc/áhèám'Ð󈾙­Ï1!H ȳVl¯%Ïeä)%µàùØÀsñ¬)Α>£ÜO¼(ˆSlŽg‰CúSËWDGZSOǽ–UÐÈ&aÕ5N³|f³d6ŸNè¦èºPE—ÍÆ|,ižªv[Ñ5³ÏÚôª }'„ºz‰S@3²T³Ü,~²Ûš9¹vÌšÑøû¯¿f Á¯]~´ ;Îu>ýdþ,uö-¾)Ø¥hf_·5€8ª·wÒÒ™š}ŠP;£×ÕàqÐ[§už‘C·jk;r&×­½Ðý¤×זּ¹Ÿfƒ=çƒ+ï1#ªðé¸ÒLj÷¯û^cJ3»m%–|×Ç€ÿ…ñn`YDÏ„T‚Í©gÒ6Í#’<Ø$trgIÝÀ&X°t™4,›ü8›lÙäѱIµ´”S”ÏKŠd:”QßCJ…1’„Ä`Õ…I"ä4§,©§ WŽ!»ÀYöYjqFJ¥±ÂµiJ"Uïl… ÔýkŸ]¥ÌB׬K’ÙEwád£Í)>™Ïžh›˜cÐ*pÉB²£Ï½V”?ŠT0ßÔµ wg)y}˜qâL$ùg3f\Ç\x©ÚCíüõB ½¿^8­ ö|VÇ<'èïñ…‚ò¢Ó¬ìù¢~rLðô_/Šehª=SNÁúVUž¯ìÅa±£ç!Ì”€Æ5nn6VΨË$ß®µ8oONﹸ«aÜdñ=m(=5G«ŠRÃø¾Ÿæ*>±¬BI,9’ÒˆÁZƒdÄ$"±ÀA¬£°Ä`˜~æÍJìyù‘‘¨£0Æú·Æ2F½læüï§›u±É¯ŠsCo‡H!Bƒà•RæÝ…ÄãK¡”¯° :)‡¢À³;…€"²R(šëþ¥ôSehLÓÏFæðzVþ±š¯K~ã +"àªPî>ÓxÅ<÷ƒM˜…º‰ê\ê‡Û¶ÒÃþ”;â–ë¡ÌE±idñ9{2î•)©¦Ù#5¸‚y.»gët(YØk¾N‰b»¼>6ŸÃô4)][§3䤸q¥ä/ ÃA«f·ÔÌ>æOŸ(hXǃ–j;}=öEÙkµ•¹ ¹ð+N®Mr7‡]¸º™å¹ÏÝduïLš‘=Û@Dé-Äb¦¡Q±ÄÇé²Û}ªá,V4ëÂhqyáÂ89>8ýõä,;>n¸™ LÜ=%®FÑ¡››u©üÕÀ|º¢‰L8ò!æ‹…$’ߘ‡QHB/Á üÚ2°kÌ£4á–[nUFDE¿5ºßÔåÌ8[:ÝÆqWoŽ_¿~"ö[E±jK¯Ú$_‡W»æY»î¶Ö±ôŒ7 ¡u~ž‹6 ëê«A³?ì6AL¼2º9*lP2—Kwã¹”¤×¦ƒ ï²/a€ƒBðü-·/%~Böeõ±fØHˆtH|k~®Æü”·lðèìÏDøXâäøõ‰ «ˆÆè6b¸Q14_««n¬+jÅ’Ë7˾‹®œá•rÆX$–3J8ƒÕå a9ÃrÆÃsFvœÏÁ«ƒW–4,iXÒxÒV¼9E]Ï#Äô9廄’g O8`é‘P O àÉ·ðdáÉ“…' OžêÁ‘üI†þœk3ã_þ0zÈÀ¢ÇjЃfãÿu€b݉U) ñïÉa ­nldÝë§›>i!{’þ¤.~°ÃFm smØÜyÓ-0‹ðˆ™ÂD3_rxÄ(bD*â0BœDqĈ>2¡¾º´¹1D;o÷B@ÆÑp›cãžÎ{8?²ê¶€ß›t#ÛQþ¹^Ž[—­RÃëìIÉÚã±ñŸ©ŽðqÑcl~°rttp\€óÊXrjRîTíîUåÔ?Ë•·ƒl>mš«h@Ÿ$WUê˜ ¦üt™`,L­¦¨=aâqÃT¥ÙTJP–—,/Y^²¼´^º"½Jo׿£œ}×ó·îÑ·{gû¿nÀÄ+Dó4 æ´Yû³÷·æóß¼=õ"WV ¿HO«Šñc&7Ÿ6ImÔºÀ,µYj³Ôf©m µM=h‰m³ÄVr¹ÿ@û“ì /Œã ‚É™=D~uDfŸZ³Df‰Ì™%²eD6õL¥%²%D6?Ët4üΆړ´Àõˆž7 yéÁ h -°€fÍš4 hÐ, ­Ф˹÷¬ >¤Ëc­Ф4 hÐ, Y@³€fm}€æ7`Ï܃VúÜe&ëA[h>±€fÍš4 hÐ, ­Р¤m{U̦=hI— ÆZ  yÐ, Y@³€fÍš´5w1•ÏÐH) `ú`±Ób§ÅN‹;-vZì|(ìò©!ZúóÔ¨ÈTÃËÊoKÒeB²¸öã¸Æ|liíqÒÚ='V)¹%æKÐhù2"XaŽ‚Ģȃ…œGK?1ÑXÉlùžoFÒ(_‹M‡›ïröÑæ0®A„YC?­|áLwªÞòÊ×ÌÚUO-—ðoë”ä«<…´Ùv!»VÝáEºJ¿ÀÏŽ}Yb³5G¤ËnÙ®9+pNí¢ó˜]u'Ö’5'/0WáÖ`ýÖ`ý+ðT¶ï7ÌNÒÅ2X+;1`”7g› |øÛÇAöX«LH­†ºZ§ØV¬ÿþ@=rlä:§©ëóíÑ} UÑÈÇ3jîÕd` l¸Ìåå[ªLZ*œ¹ZŠé‹Z±)¯jÇæ¥­ÿ2æônqL‚0Oø8N„çc,%èÜéH&/F¸ /„Ï 9Q £8ÆŒ®’×»ëšÒ¬n vi _”éqîùAœ°,^å#X+ ÚˆKDÔCb§rÆÞ\£®•´L×NDV]×®KfÏZ×–l*ò¼}J Wéò»´pÕ2¹mšo‘¦þ»‘Ѐ±ÜÈ·«ª”d6,F;M…ö@¥ÊåÅ#0N.ˆ? —šžÆÞþÙáo& ¤¡ºƒf±eÆ´‘VQ˜0†},8p}ȈL£(Év˜ è";´X'ùžô™ˆi(b_ÈúW _FYs;z `²*s§7Ehæav5…R#‰“0!A¢’@0 ÍM0õ)WLpΔ±­T¨üPÆZ"Â<&Ô”ÚêÀÚ5%<ŽãÚ WB"{ ‰tˆ£ ɱ'涺æ7~LÛæ¶ž*ˆ¬1éN¥6Ü|2BHÚê²—wþet‘u 1{Qªc>Qa6 [é×"Y_|ÖÝW¦½Øtã7uQ|ìõ[ç­®j÷.;Ä…þ̶õ ‡,3Íjúü­Ùïžïªv»÷MgR;ëuãæf[ K¼?“=±ò 1™eQq Xªóú–PP<œâÔÕƒo½þ×¼W  °¢@S!1}c×ü4õœœ¢ƒ?ÎÐáÛÓÝQWÒº‚¶Í|‡Žööw;*jŽJIÔ.Ở޽]ìbZôÌ7hõáÛKfr5¦Sø(åöÀÉv,ï?hjk‘|wtu£¶^ÝŸrѾÚÿe׌L †¤unj=Ú;þ°÷& ®ë÷ÎM÷C³èˆ½?wÕ¥jµUØj·×Íï °óMöK•Ebg%5ã~ëRÇ$¤Õã ù"¬ <}ÿúpúz·­†]XËÆoSÏÅÙÙëºßé2ΚUÅ4î¼ßVœÝÑu¢†íÁXæ¦NÏ`ä©ôks¼¡žE‰ƒX³™.;“,f3èRÏe¸€¹Øç1³½—"˜¹ºë]öÚàlñ=0 {Ñ×ì¯DµS}+Ì ¸½:ÏCo6º[Mˆ +G- A‡„Hês2Œ hOâS„ÎC¡`)JˆS9cm ™sF7c!€æKËEFq= a]2{â!uÃÉ£3ªôø]BÕ2î2þÛ‰>«>˜/?œý‚ÄÖÛ l«<;À¹  Ž{ƒ_zÃnœáUÔ‹Í’íÌ(;Ms"nq~N%Mõ†íØéö&¨/1…»/œùµ–‰È ˆ¹DŒ>“<@Š K%uN¹v*g|(¿½ö„$`æ fbA$`ŽEÊ‹ ÇX °RPê§ ¤Æë­ëÛ³^)Õ‚P¥cïZª–ñýöU¦ôCûí©KQKÝúq¤•”XÄâ#K†XJxˆß¾¢®åMˆLÖӵ뒙¥òy¿½ÿè´p•.¿K W-ÃúíWª©KüöUJªï·”PÉYîí¶~{뷯뷻þÝ~{B6ä·Vá¶çl7à»TnÛ¾ÒÔ_“Û¾ZÝËm¹uÛ?¼ÛÞs=Iê¹í'±`a¥b@â#…F‘&@Ô‘G™—8•3>ˆÛ¾¢ ”.­é¶_“Ìžºà=·}…¿Óm_± ë¶_¯¹Pßm_ImÛJ’l[Ïq1–K³¢nÿ<ù˜ôr4ã± ã6]pc¾}€gEú—IbOkyl§µÜ=}J•]VÿÕ qsŠÆôAŒ£ÅŠ¸Ñ m‰Ö®¾R‹¶6ó*s‘˜K&Ύ┋ñ7`Ád  àT:MÊãë²z†ã+:ºÓë›:ÈÙÄf'4g|˜Al³OèT5ƨ\`šç3ÙÉ軑@L'LçÄsÕæ'‚d‡£Ì^R¤³IzVï(»ãöŒOFQ¦0ðPHA‡1Íà“ % URy!‹iæ<Égj³M}µ‡Ù"42?Š ?Yš—Pb4ߌ{"÷’©SÎ’"eÚ­2¾tÖU$ƒÝú&E Xqá-ë«H‰µz0ÞÂ!Ží_ÍW8!y<‘ˆE#y 5±Ò±l}C|Ö û„†xEçÑf’¹Ägµü ޏôH€-CÄ<!0/J(¾&‰ UäTÎø “1ô|«mý²£'B©îYX—Tžºg¡î;æ߯c•¿Ë±Pµ »ñ¸lÂ/ÙZ,|¾›T½Tºô·-OÊN›Ü˜µåok<*­-omykË[[ÞÚòÖ–·¶¼µåW”,p=&1P‚5æñtÁÙ£ü%«iB ì[ž´ÌÄ"A\ºî¯FwìÏØ—…ýšŽùpõzOE“>R“;2’P\ñœßª“I*à±œÜ {Ò@€GÈ´¯ú|¨Ö P¾©]¢Ä (G òœ˜Âø¥NÀÃ]„a>½–¡?Í{´™÷.SŒ0ä:*ðb‡rŒØõ™ãÆœúœ{óäsÀ;(Œ,ª7ÌaNà‡2 „“xæA¨Œ›Äñßó¼Ä£,¦U2WIAò2$@;Hb XÌ= ´’ÛSŽÐ°Û 1#Aø\$ð¿•/Êu¾ ›Ö­£Á¦¯ÇG¤LHð~V”>SØ 0 `àÐ Y8ă)É… ±P«à·opÓŒ…l²*£½ì)êíq¸õLäkdôŠŒ&4x}!*ê°|çáVÍ:)]cåoÖ•bv;a?GÌåç{ú‡<26š•Ê‹``ÿèœßäUUÄþ2ßåa¿†*Âà4A¢+™Î£Á8™ºòTÜiJ=„~äÚ/0ý¨sõÇ™s=)ga^,ÔXšyGíów&pád:ÔðÕFCQÃaé?«]gñÄ$UÅ›ÙÐYš_& Ÿ‚ùdßþoe²æg™"&>Ù0γ;ýg<§ßùÂôh$bÇ8–˜/¦J8b–š-‡Œ[7à)B;É`8³[M|ñ`ëxÈÌïÑèÁ<Už7Ìï‘t`¥ÆfÚßÇãÉ`¼ÅwÑd:³u›& ”‰ ™Lç†,™p2`²²ùLõÙȨÃà9âÎÄŒ›d‹{;Leº3½U•ÁæõgÊ4?‚9:ÜŽ¡¬þIäxr?MU¢fÂ%ûª›,ѾyºªÑdaÞ~L!’ÉÐNŒgéWÓ^&îøøV9#áØ`…Y[Ç/Óáùh`Wüˆ›§b8šåL(¾855fiZÒºèòb”‹òœ—ÿžg³‚4&Àp0¶>Ú…Çöë‡[5‹†RÙɸˆÍIv›ÅÜ@W~l¨6äwI4Ù¹ Ê¾ˆ’ƒù˜¦0—|;KÒÅ •oEÕ-_óùa9?þTiN;äT¡[ÃîTÂp¦v€XÖeiÙ?;‹âQÞ¼ùg2ã™ýt:0M?`Pù¶»ù¿âÁlÞÀRH`.Gzñ˜ñ 9§ãiáŽ;ö/1¼Ï;“)+ŽS™ò±×2ƒæÊônšèÕ“khib'üHfù€ÑØ• îÁ§6^àÀ~;NaK*• Mó ½U:ÙÅ$x¾¦ÊI8–´Nýë/³¶ßU™ê ýpê mV_uwîêï6êë‡Q_«’®Ð ¥ä)Ö÷ºà]ЬBèn\‚«ª¡Á…Þ*DP. ±PÊÏ\-åÙrÝç’-<[ÔE)º ¡¹¢ s±ôHÂ,Å@¡UK­\hߥ ]Q"VHçº3_eckú¯¢5ré]H¾RÎZmRJÿÜ‹ÖRe=R·+°¢ªý+ºÖª ¥äÍEiE==7…†¨ÊÒ ÒW•P®Ú*ª§@ «š«¢ðJ”³¢6sDµT:kú¸Ô¬«‚{UÊWÐO.ó—*)GT¹~YÑ´9ÊyŒÉªøjEÓ¬iÁøåŠ6׫%ÒɱJ•0ë1þ*°KŽÙ–ês½€³D? ¾^~³,t÷Ú,‹%ûX ‡PŒŠ=îp0 ÁHJ|'1 “°U»à l–fJËšv3Œv2O…Ò·ð½‘sRÇ>Ö3í—ãnsÏÉ\Wí¹èüR×ËJ²·Ð1f?ÎÆÚ”½j| ”Ü\‹ê¡Säµl pGÕ•êõY:êã‰#v&üY§L±·ù“›lufÀ·mÁäÁ\`Æ\LUàa/fAL$Sœùo’d&I"CFL%àLŸJ"ûýÖíŒúíJt~ïw.ÞU_ô.Ï~íô£«³ntqsÞŽÚïßw/ºý?V>î^žŸßDç—ï:ŸàÇu¿{Y}Ý=oèDý?® ç]ý¦ÒÓ^¯ƒ×U?¿îôÎn:ÑÛ÷Ÿ«O?\·¯>vÏzy«o/Ï>ö¶4zÝþí‰//./Všëõ/¯õ§oozÑûwgÛ^õÚýö¶AþÚ­¾¹ò}î¾/Èsþ;< ä¬é^ô;×ïÛgLZ­©ƒrÇ…²{³›k`MtÓyßµ¿ ¯——ý'z³Æ¬êozo×YCÑÆ6ûWçŠðÖiѾéo›ÿ8»ü oïãÕüÞZ¯¦Ø§ 3ùüæS¿›“uŸ®»[‡‚#wUÖiöhF=MÔÞY¯ûÄÇgÝë뛕™|Ï«¿ÛggOë6ÔÙÛNµëþ§¶½ÀEÿª—õât{+#èC§úwÑYçºÿD«½«öÕuôùSûbÃÄÁÛHÒ]à¦õð¹?¬,ÄwÏ]X?°t>t/v-ŸÎZ7{r¤3!¬‰êèV•¹K©·%{YØc¼ß¥Hä1,’@:ÊåžC½„8±ˆCHŠ%æŠ"Úª]ðY`3j]]ö–¸ù‹úšÍ@3×9n"' ÝÉLC; ƒ Ù”þÀmÏ …ÏE·CÂàÇ@ ¶/w8ìaX ˜Íc?Ä™­Ãì Ò\Áâ;fÚ~ÀŒ=ŸIµ˜*Œ•G`úxp,Âo»җ„% òBxO"Џ‹Tè<Ú0¿yYlÆ‹ú•Ù")QÒBÇ)Ï2X±Òˆ>Ë”“Œ+¾EêšJÒ°wE6›ÒŸ³N¯zrPˆ°ëQ휩qFjÛM–¢Ë t¦ƒÔ䲩ló¹è6vx™óùáösÇí/¯:O^__}ýÔ6ƒ]ùzÅC4Ì%ˆõ5é¨Y6›t¥lÞãï dP<ûÒVŸEeŠØ=`Oª•³xåÆB ÎbVrUŒ‘çaX5ÊQLTµõÔˆ™£ÊQˆÖ‡ŒÅ.öeŒ·S}X¢G}·úuÎS“ ¦?­j;¢Ær:Œg(Ýu:ŠŠ1‘ˆ‘ØÃ@+ʉ 䩉a¿LIí>žp±æKž…@/ÙšìK»y8O‡Õ,X¶U'çœSÔq¼\ŽÙBœ2Ìð²ÚÕ:mP‹-ƒÌØÄ•®âˆ˜³ì`ÄI B™x”® ÂJƒïÂNy²u ÿ*»9 ˆ`a"¨‚î3.„BL…ôó--Šc(›b¯Âøœ†.[x]8{çAÓ¤ò<+»f“d¬c˜¦U>GŠº…$‰cP˜‡TP{Tp·r`eøOrWÍgéd\a0ƾ+CÏ%.¡$I8JÀLrŸ(ßÞ9ƒm³[×°Ïüzì]ë>‘ ñDð8ˆ©ˆÝÐõ)È%ê)¢8CáA8œwþ«7}‘R0DcJ„R ­B³Daé“*‹¤ŠUþæãŠÅÙý ™Uä4$ I• Œ¡$P€—"‰äñ!(dš¬2ª}ÓÿÕѳ;ç£q²bšÀ"Á¡K).=3_>:ÐD¶#Ý&ª`ú}ÿ—“…Å!”}B‹úX†‰®P¯Tæ"­ƒ‰5 ·¦+ÁRé©ùRn§.i‰¤PP7 )¬0Š1h&Aä>KßMËå>îvÑÖš †à2 ÒB¤õ÷8èJ—¶â”`/L1í÷؈®Áí^ ƒïƒÚucäÐ÷C7`qOT¹½2àu*<Å1l—`| _(g2N|ÊkÈ£³Cªhõ;(Ueøú Ä% &¦$N˜Šö\Ð,ÊO€˜‡™²å0¶)2‚êhùëõS€&‚†JÆÊ:ãp(•Κ̪¬cÔñ1¹´Êì’OñZ Æ`%,H…× 7bA 5]íÅQÂBf$  $‚ÁkÛj-ã¹³×G¡\æXFS„¢ M”ô0? ³óqlNþS#0Ü~é Ë's¦˜ËQŽ*L<Òí,¶LJÃVQó±ÛJ¡ }å ‡º‚8! G ÏM<‰ˆïš½Íg]~ÏdÓúÓ2ó¹ÙŠÚ¡qõ\Žcw0šOá+¬žfsø(Å+›E6ǺÙ@šÇЮ~¨Óöþ’ÝñÔœ-¿·Öü/˘¾u»òŸIMšâ«ýHï`éŠ&é,*Óçn†ËŽÊq±• ÛÑõ¤ Tzª3ëiºÚ'³‘~šS,*6íôÆúÂо,2½ûš ´g^AÝe‡Š"™ºÕÚÅ2ßt‡„úPDooX·ÒúZÎèèNK¨‚‚k¯Ë7ƒé‚Fyò(Óç¼3ðÎßö®’9¹ Ík:cñuICM¹h,Ïšñ™Ý\ICOqðO]ÏòVóS¥Rµèãüh<×û+zBýÕ*[É$mÙ »¾z=½¡îîyÜàñ{úÎ ¢°¼w˜§”Ã&` I «¯U»à³7àÕã†o¸ØÒΰ›n±‚¡}ž‡b?ü-¶â®¦ÙÝ/V:f¾²ÀZ¦f?éÚæª÷])™G™£‹C%¡N˜pω]„±b¾K xO†|1IóâDºn€c‡ú9ÌR'Fü•@ Á;»Éj…PgŠà©uŠžú×wÊ„ûÊPlÜUuÛÖõBá"†€*0L°¨æ+vB_¸.ñ<æøÕ]¬³šv]¬[ÇOpA?Ã5î'îoWÎHêÌ>ã•<K3µ®ò™šu{—ÚuþÜkÀyã1ðrÄíFÙ7v`¿¶5´¿ì9ïÎÞŸê{ ñ“>@9:o_Ü´?YôÀÝ<›>2ËŠ³(S‘A¤W<3·Jz’믽ù5¥Ÿ/œÄª ½™+T ¯Û0X”°3é $ .÷P,‰ y\«àñ¤Î”0îa¶…¨{Þµ.ªþäwí=wÏx(Ä'¯N•Öaù.UZ·Žæ®ýw`´ƒêÛï@ìË ‹ooºŸì­µbϤ®ÇƒöN‰ê{šÍÿœ¤ƒÛÁXï·>èøb®q©àj¤¯e¦¥»û(ßžòáproîLéŒ#}ö(ß¿ØèãY¿˜|óâ©"ùŽŠñG1Lã û³¬{µ ãÊ'~ñ¤;aà4ÜjÂæL‡ÒßûNûŸ§k»_Q…©%’©NB–?û¢¾Ó$õ®?;7½§C>ëx—Ko¬Õ÷3•À\Æä[–Ð]éõ{§3ž}Y¦bɃgæ'1•b€¸ÊBñ|0”ëE¦0?—©ÔÌ4Ͻ19–J:‹Ép>—ÿ Ý™iõ,ìVÜÑZv³Ê†Þ²ãzóΆœzYxŒ]ìsŠ%1£:)²À¡Åv³#Œù8 ¼U»à+‡ÇþÆM(|‡zÄÓ. \éaL¡V킯Ü!†lôz×D%{:Ä<Uv¾gŒmƒîësˆ©Áò15ëh øOÁm|«ƒ7ü0Ü_ÇàG{†u³\YfK¥y…&.©«3{ÃÿIƒu¯ËåÑMŒ»ÕwÎyûìtÄETÔ’ðSäŸuǧXz$çFc)ü@–‚™“ûY ›æcžàè…¬ˆõUûƒb²i)·Zèg³6øÐìãØ_:íO«®N´²/ÜxÂnÕÒ¬’‘ÔAÇb6œùX«>š•FvG¾h¾Œ…*WnñÀ±=_™éËö`º§‹A6I#Ýt™(lïæQPQ‘ÑÈdðrˆø·rÿÐMå-Å#ìa•Á+´x¬œôdËAz¶C9=®î‹JÇj˜wnãøHOŧJL&³HªÅ Bæø}²|Sy£Úreµ#¤Õ‹›‹šºÑRß\½²ãôžÏ`@i”WM‡sÐ]Çz2ƒ²ã˜È×gbVY€ŒjéÖøX¶~ùõæmçìòâ}÷Û“»ÉHü9ŸOŽAž€„¿Œ¡›úÇ—y¬¬DiMDëÿØ»¶æÄ}dÿ¾ŸÂ'/³û`¢›m9USu gbHÀ„ªS”-Ë „K–KØÝï~Z6—˜ÿ$©d–‡© ¶¬Kw«û×­–¤wµ¹Ôúƒ[ T”ºŠ^Ž:ü탂T׆ u¤Ák]€Õ·=íÀÿ¨Ö.@{Ŷ_{zj—èúê4ªÓž=„5°ŠWί:¹¼NìáõU¹-ÚvKü¼´œîi[€(:ŶÓBM7_eõIö©ä†õV\Wº>©¢3ïŽÔ'ΰ”¿n¹ùì¤èUbKŒæc3 §÷רF~ ·-ßWÙæyÅy*Nê¬ä¹%¨³”¿`Nݸ­‹Gø~ú¯0rsÙy9¨3.—묎CŽOÇ×W0–«ÓÖuűV—NÜG×»{:«A[ê°xRnsÈ(vÜñ™wý…6&U\òêÔm:§cýZ…'m AÕkø1³'H)7qó7¸”¿A¥Ü©í@?žû™}:keožË©~B¹ì}ëºÖ·Ã“Ëñ)>†Wƒ¦è\Nz9®“ª¢ŒëhV0Ü †¶®Ûg^ùîÚ»–< e1è/´áâ"и8qšg¹ÓÑiw¯hùh0 Oއ"§Æ\ ÅÖáN²¬èݰbþ¦U²ÔmeŸiZaN~^ޏI¹OÁ{àÃfÞ·.>ï ãޯд8ù<4u½ ´YNÅã'’Ó'x¶™ÿ÷3ñߨ2§ÔßÏès ÿOÄÿqqqN½à)ï$ü¿ùþý@û·¦ì«É4=„ÿW*g\¡ì5òNùû¡ŠÃgÓž¸ƒÃ²õXÖP¾Œºa[ÆtØëµ5pZoµÄ†æÕ6õ¹Ê——#ú÷Mueø#oyðMëu5q´o”ƒ¯G2œf~ÓzlˆNø:LY/gøâP_Šø6°²)à=€+t’S®²'êÁsØIö^ôýˆoš?о)¬òM{l€øƒ8»aÞ\Û Ó˜÷âތۼëeâü u?jÒƒ¤QjŸºËÉ"ŸÆãbågÃÎØÿXÛ„ÍÈkM¨(-Ô5ðiOÜIðÉþ¡ F±s Ðñ6ÔNÓq•zŠLÿ»DÁ…¶Úcm£XÓ¨¡ÜN41Í<‹ç<âý:ŸI¸†Žô#ÀºZo4ëH;÷ÞŠ÷અ>ð±Ù…çÓ´J5—+T*Gó9¡&pÆÕ—ÞPj± gþ¶\ïo uÒÜáÊX” cF׋™l§•"‰ºvÚÖÇ¡:žêœò@gAš¶@ÂÄ¡–ºà¬ììp=½òdz£>8ˆ³Û~‡–o!‘­ˆÇ$ƒÿq¬®"¾íÓ@]~­7‡ eEÛÈœ~­ç½èüÆk=k—2Tá9Ù5œ!ö‡.÷ØÛ–{Úþ`¨wza3jÆJ¯©Å<2ðž_¤¶n‹úô\TU©®Þ÷{êÆéoÝž.f m\=Z¥Ìl]hý'¯.ý¤‘€¿¶lã#‹[ÂFÒ"¶“–AŒÀ¶ÚÒ·ÍïQ€Má4 ¹Í"ÂBĉÉB*ŒÀäRF¾lóq³}íBNòJÅW~Ö¹ój㊛ ×½Rš\É=¯z…Æeé¬êYÏËæ~6jŽ÷³áeOÖ”(\y…b~ñE¥”ûUðç9§Q¬ºÙFöøØ):^}éc§äºÕ†[ÊÎàGÙsJ‹¯7{Rhxõsèë¨7 =­T dõÑâçåB%W-4~_.>=)gÏ:¹Ê´Õ¥ÜÏʆFËÙÚ–/‹¥âRs¯TVŸþ¨VÇùܦW•¬—Ý4È_Îâ›"ïÒ9ž‘ǽ‚ôe)kœ¢W(gs…µLZ®©€§æy÷ ¹jXÓ¨ŽäôµTò¶ôf…Y‹c¬V~¬²†áµmzçn7ÈF±ÈV½MBq‘+ÕÈæ>žçà÷ÆzÅÎÖH²[=óœ)Y7ñ©ìl i MTY¥Ù ‰ÚNÔJ®âlù8ç”ËÕ%I.ÂóÅßY€zg…rê¬l¦ZÙ;ã˜Ú›  ä—šÖˆãT–FàA§¼B>öÚ¶´Z9Ïž——gÙâÁ!›Hâ,pÝ|ØFî“¥‰˜/\:0`êœ8ÅצOa¥›•=PïUݸ‘]Ù÷§±mB?6˜mg8ÚíH¦ ”‚Û‘Ô©P6šÛ¶î›~¤SfqÁ}0#¹Î6UÁwÍX;/Užq3øwà»wešåKzè´;*h7Ø| °"ÛŽ)OïE··„Á/Àؾ†]E¤ÁV£  J®Â줹„Å_?`4mÿÀ Ó¶"NDUÛRHHƒRj˜“ïœû(4CjG6,J}+¢Fˆö–…o 0ñkó/O‹õxQ½Š$”ÇÞ è8 ŪO­CÆ%Â^Çovò\f‹Ñ y@ùÙú´J‹I–“.‹sLÁi«`^,dÙ  wj½ÚeP:÷Í~¼d9]sŒ“*FaS¥%ÃûgµS/Zm÷âlt2¾m\„Nî6ÿvé륥|>Õ É‚xœaÒ F[–ý—ÊN{ü„L“µ+!“êyfK·àOÊiêAÒºDØ·^F2 Ø0Ìi8 r±õ~¬f’‘é×Àz˜µ"e¶Î÷™eÅ‹ÌD‹_Oyg8€øû`U“ŽÈnxßkv‡/R"nÚ*Qá`N'NClÓÀ @+æS“ lÈ N,Á¯¸$̯~žZ’ë?º~û ¶ó7 IñR7®|Ôo/æµ$­êSÎé³:^Æ–‰Mž«]®3&ϦAˆÜØ…Hú˜YàûEàcŸZ‚‡‘ÁØÊ mð;CxUŸlÈÿÍ»M|lQaóH€ë!ÛÆœ0š¶m&´˜%I%Ys ŒŸÒ ¦Ë^Ïòt’ÖX( ƒR¥ã4…6 ,bês,¢ˆ›oÃé8ƒi¹e±8y*“—{oƒR H S,0}.hIì0hȶÐ[°x‡ô¯Ü5p„&“¦%CsLA8Œš‹Ü&-ò7þVîÊѰí?3˜…Ü@QF£ÈB $™TšFøF NšÝ8‡MÛLÇÞ•îÓPb?~`Lˆ#“^b†¤Ò·1O;ÿ³×â&¨ÈPؘŒ ƒ³À—ŒÓ  “Ĩgy’‹üŽ‹Íhx° / +D„L jÛ8²¤ÀKÒ(ôƒ· PÜdšI€³Uïg#}U^ŒÓ挰&‰ºÑŠù  ,ᇆáÛ¦°LüF‚œŒt“ªñûý1> ‹"Çܤ ´˜IB© ÕLµ6ñ’2è%.ZŠ]Ò •¶ÉË<œúLKCœ3˜a† J( `ìL€/߆–ÏqÜͪŸ§…5C0­0 Ò8VöË7|°•ˆ¶ò%ÞBìwD§àv€¯[ÐAË4Á좠ôMŽ,›`ß‹Ü^ð*¶±;ðû8l :4  .Áù²À¾0߃Èd¶ Î6¸hö[jÖêoPj‘᫃ˆ°2Á`FƒÈ– Ë"͈ù6";Æ&CFq+5¿ÐD0.Ã@šBm"à¡T!ìEVƒ3ªwü.¹þ"³çØÆk¡Òwût× 7ÐA`5‘Zèðqds;Ö,€’(~ ^'­¦ržS1{uR­…aðŒ¡ §¨mY˜”cÉÐ þÛ0{:ŽÍÊÉÜ6‚˜Û°Üºƒ3Þ2ј¢Š8÷á"‹ÚqoÔ µYÍÿú–„•¸ â¦Ô©……Π:´£Ka È15Q›Q|VåwÜ?¢>ofŠCQ¯X\õvšÝ$'»1º‡¯ÔöxÞŽàfŒ,‹’mSqi@»ê¡ÊÎþ6¸õûñÚòqâÍ›vèÊ?{ƒÆ=PSŒ“TKUÔëó 0¾ 74íhØ…T;ªž~Õ?R‰åJL—ûÒ¦kÌ‚v*°þÓ~^äþv<}ÒžÉÇB‡fEòFY—Ù(A8e&QáÄÅ]h}eHãVi¨W^Ïß4ïXcºµ¨1½¸ÏÓÎÀ;sÓ»…\ømÚ ·@ tÅø™†*?~ÖØ4ɨá“ààb„‰’#b]«z¦{¡^)Õ—MµœßèŽT|E Ô´é8ÛR‹z}-Ø—³!šA˜î´ÜÀ S‹˜^Œé, Rç³t0*c ‚‘–ºà»,7å冿°SJ£‚Vóm¦Û1ßæ½(öé÷V/í>Ýi?©md`ðVç›0ËÉæ³´0“Ó‚(DÈ"ÎÌë ¼R=Àü/¢VhÙÞ%1ÖDMÑÌh4:¦°'j‡ß>nM†‘8[å­6cÙ6£T 0v66BYÂO›ùõμJ3™^Ûµž¶Ž?`×:y‡]ëé6¤§‘¾÷ß›ªï´56]Û)¶Æ¦ß`Òs?ÞE{PëÈHÒQͺ€×˜ïÛS˜;!5¤¯ƒ&¶@›ƒf攺Í$ }$¹‰“Ë’Rü¤À¤ • aòÁ6¢¦)ïEÕ?úEê¤&ùr¦4 Ë_3¥iëØóíMíí_ìŸêªý1.yŒ hDòÊ1.Ji~Ö›¤þ¸Û)y‹Ô满Te£öþv¨@ÎÈ ÃÚ-<‡#éQ@¸ÎL%ŽM¡)¹mJ#2D²¹+UÁ¯ŽMÃl *ß1„÷NTýÓÑ1Ûõ‚VòM)Xþj )e{t¼GÇoŠŽyˆBéK[ÔxmZ‘Ê c–…HȈ2iY‘Ù†Qxaß „Ø£êχªÙUTýÑ÷³îo]ÝW¯9œb—{“ž–俤—×)%—'‘m—'A?Ì µw;$ÃD,3Ò9hmPphn=B"”†À¢BK]ð‹G¿‰=Ø@Ô£ßïEÕ?ß›»âû/ýNÃò×ð}Ú:öø~ï÷ø~ï÷ø~ïßøâ¡½'°Öà²cþ ¢˜‰™º&‰3‘n‹ˆë–ÄØ$aD|k© ~mÎ9l#jzþ^TýÓ¸õ_€ÀÓ°ü5ž¶Ž=ß#ð=ß#ð=ß#ð=ÿ®îÜ2wCàRÀ¥¡[¾ÍuD†ÎMËÒ£4z$BµÔ¿87×ÅÀŸ‰š¿Uÿtnÿ ð4, §­cÀ÷|À÷|À÷|À?ãŒa›;^Õ‚öU£À‰ãHÍÃt1N¹:ÅK-uÁ¯ÀfƒmDÝåb–÷¡êŽÀ1Þ›Œ9ž†å¯!ð´uìøŸ„À“äö|Áß‚c´ ÁvRÊláæOeİ}ßö»2#ŸüÎ}[*\w°æË¦âKWÈùÄ=Гž' {¥=÷þCsÐë7TÓó ¹vnÍnŠoÊÒéÍxÒòͧuåŠ7Ô\OË ^¢ÅKÓ¤„m ÑÛMÓËÚîd¿+ÛÓ¾­ßQ’¸­D¯7l„ò¡¹@åCø}øúëÊdžmjª^9<êÃ}EEÜÆ³ù®ž|ðó¯óèa@ýÆ´ºÆ}{–+£d4È> |µ–˜ PQšjÍï†Ú·_Õ…\©xìœ|?¼íuäád4jf@‚‚¿mv¡›êÇÝ(‰BÑzBÓ»Ú\ÿiýÁ­JÝø.GþöA?ªÛ9a:Òàµ.ÀfŠÛžvàŒTk—? ½bÛ¯==µKt}uÕé Ïš¿_uryœØÃë«r[´í–øyi9ÝÓ¶ 6bÛi¡¦[»ì”¼;äNÜa½S5Ü&Bõ‰ûtæÝ=kC7¶JÞs½òÛª?:ÍÇf@Oﯱün Z¾ ®²ÍóŠóTœÔYÉsKy1.zYætÑÛºxtóÙé¿ÂÈÍeçåŠ^R.×Y‡ŸŽ¯¯`,W§­ëŠc;­ãöuëÎ(æÝÉYí´]òœañz]A†ë]ÞyYZŸÜ¡R¾€®óqsÎÀéØc¿FáIhPDõ~ŒÇì RÊßMÜü u[ÕÇRîÔvò0Æy?³Og­ìÍs¹úc\.{ߺ®µÁíðär|EŠáÕ ):—“€^Žë¤ÓáºV7€fwŒ›×ÞÝøÌ+·ÜIaXò ø:‡‹Ä…qÜ<O.ÆÅV¶y–;}v÷Š–ï“ðäx(rjÌZlÝî$ËŠC›Q% }Î>Ó´Âü¼q“rŸ‚÷%¯¾™÷­ú'â}a¼ÀûšB{Ÿ†¦®w6Ë©"9}‚g›ù?©~&þ[æ-å?ÿ[²™ÿ7OŸˆÿãââœzÁÿRþ"áÿÍ÷ïÚ¿µÿgï\ŸÛÆ‘þ}ÿ «®²[·”$ÁT¥æ²¶'ÉÞØÎØÎc²›R (3ÖkEÉLå¿R”LÉ”#É–‰% Ä£tÿ@“Ò¾z¤aEðùôô·ÖÞÁÉYkÿÝÉ«]1â»ÓŽ8ƒ£TÚú,kdqf…ã^ÔÊ€ŽúýN\ÖóFfCÓb9uƦN²œ}'/ Ð.$òÍÜWÀÝbçE£ßkHÄi¼p(xzv“:Ml/[¼Ý)Õ|±›óÅ®l¿„ÑE°2oµ;…K:Ù“Ž²„ya²æÔõgêþÒ¶_4XÚx!YåEã*€°4W7ÊÖ6+kaÛE- 7¹è7ÕÑ ùÒ¬Y¡"jüU;Ë » @®ÕzâéÛVÐ þV]Dé©>sŠK´—^Þkü5ó&Á%û[#+ßÐñ¿æäî×ãméI1ýï”Keunz…¢¢P§‰¼ >hfô9žÅr;Ôë}>ÂYµº‚¥c`ÝF<ÿêeã=y˾O-bÐI®ÿ¥Ñ8ý°·wpzú²˜r‚@A»†¢Û‰†èÍ¿LçûÓƒ:+n÷V[ä@ÇÄ©–çÖßÖ±6° £ÛXgÍïJ÷¬ÕíG¢óËä£zî«|Á¬z÷פéõ6_¬µí•TnÈÄI/2À(é6p“lt¿dÉ×uQäÞ¹»q{?¥›ô’î¸[Þ'ÁÍŠtÙõítdáþL…ìî±eÁ;‘‡mæpGŒ¢ bŶ اö+7ŽrbOØv„>|×ÃÂõäÛæDß²Xñì©Ü©På_ôºÜS¹ø„ç.>©[&‹úÚÅ/Q’ª -Ððiy墸O•3wtA§oà¢ïùÁôÅV7le‹[jeÄÅv©¹Æ<¹A-µ§’ãü·|Už–/”S¢™b‡²gdM4}‹¾N&×U¹ùuÔ,ê“¿V×g>²aàY¡ *ŒŸ(¦VÛ,`NH"›f«Ásû™¾XM_0ä¡G©åxq†1îÄV(¼19¡Oä6Â&WÖì iûô‰ÛpUÙpÕtcÃçØp›nl¸±áƆ›¾xä6œÈWí¡'nÃ}ÇN5ÝØðÛ6œ,ýbÀ#nŒ¸1âdÄÕù!9S[ùb­¸æq$Jç2t‚¥nb;ð<øžS*¢âˆ‰þ¥è‰ìô ¾Z:D¨¯”·NŸÐÔ—Ãþ7˜Kœ Õ7Þ:–¢¯çbE.åØ ±', b·-êq„× <ß6lôˆØh]C|úlòá5ÏTnš8q°ÜÓ„) (cĵBðŸíp‹2˜²Ìg^ìSOD$hÔNøÈzú©59M™îF0D’LLHºHzK¼{Mâ{â‘;Ä]Ž€âãí{5v.¿óÕØ5ó0‘;5f~%o—’e̽œÑ¼÷ií©Ä™RæyÄï‡f~š„S`y¨þ凉“²THÄ£MlÛ2Â"·q /×0ߣQìs+v#"&| <®Øò|ÏuÝØ%A˜µ·öiøj “¦¹ CeMèKö}@*‡+•¼5N ¢š™¾èTº¯œ4 lÔÕ 'È/jZ“We=`ÜaàI#ÙpÜ“çS•ㆺO‡;tD«“ñ%J@׸¯äʆü\Jêšz-OÉNy€òÒÁû?ö¬“~WX—ê‡KÑ‹T¨ÐÎëÃìqÑýA¨áFeÄE§SÀޤ’Q.<ÞŠü—Ñ9È9RßTô‘€ñ”ýú¯Ò`QŸ¦B9¼wÆé¹üv[þR±W—]Z×Sw ·øhØ‘_®S–1Û€ ­8錄ʗ]^gy\§ê{·«Â ˜r]Vß»‘35TÃþ*ìõ“Þe”ß×êFYÞªHªŸc%–”[)t²È‘Töé%ˆQ†ÿXü\ÅÊôÓË«¬™BUgÐ¥ÆêüS¡ŠïÂí$í¤•_¨×¿ E,U²Y\'ïé—ˬºýKõëE2°:8Š;T¢7r•å¥üœõÚÂêr+ ÒJÓ0óNT…ÇÝ$›ñ]¦þx§;îDÿQ§ýáʹ; YçU¾ìêf¦…ÑbÑ·q:ÊEÁè$½ ¨s ÷²»¯Ûb^ªˆD6/Cõ!NÛ©<8—gÞTRë°ó¸ÕéfcAuáEê6 `,yYs2‘^&ÃQñ+ÒŽh3~£Ç‡*˜ëþø.†Z<ÙpŠ·Uw#hÎ  –åMé°¨_6ŠÂ®.^ýéxo”Ý:HTÑ×6˜ü¬ºú/¿Vž¥†hS}“’·FÙdâLÏ©bZÙBO}ý¡üéå–5î0_øÑ™/\m¾¨ù¾|­™Í\0_\DVÀ\aqÙ`DíÀñi•ùÂÆ|=~ó5­ér›Phž|~ßV¼••+ÝÊ)8mrœÛ­\iý›«…BjM4Ñg“y¯5›V§è-΂~À|=ÀbY°íÁ‹îå—7UÀÏgç¨ó‡Œ¿¼=Š£7úãÓU¾ã°wÒámð›í“Ž bù|ÿòéè2ìž|ÿìœ\Fo~MÅÍ?aOø¸:XèÀ=Lˆ >ž½»ùíÛÁÕá~ß=ÞoßÈ`›/½_/ÂÒu!ŸÏÿÀÑ›£Ã=÷[ôæú*|óëøË©Û2°åÍuç7™æTa¨« šùçà \¯´söž]¸YÐÖáLð[öÛ^w‘ ®ýwÝÎXåÉ oöñ¹>üöÚ÷úêøÛ9Þ'ƒsºüÓÉX¦ƒ|FüíGôå]APøö)ÈÚó‘È@¨ð͇±L£Úñ)¸Prëv.àz ÷pÿÃõñÙEäs+Qýöaòý¨‚¤bnüÚîy…²=oÓ„}reÞã<éøL¶çí»‘ýw¸ÿÚ;>k“ÃDÊÿËõ—7DÊòÁWÑç“Îog¯Ç8')ôÈçÃøËçs胤ÐÉvŒä¸‘ò`ŸNàz °‹«£³÷øT…:3A ¶úí÷íGû3ãñ⩌G{6xïðÛSüûL°'~*ãñxÿÃLphû©ŒG÷èfj<’ó§2®Ž§ç9Ú2m»9œm›¶k&XõŽ`Õ œ>d°*ÔÂÆîZƒUe¥pÒ«ªÜ醃U¡Pß7Áªõ‚U—Ö³÷ÂÎî ŒÓõPÆÑw>× “¿­€2®ï Œë5Q†sô}®&[%>¸Ã¬Ésg¾¿ý¾ýã±Ê {"ã±Ê {"ã±Ê {ã±Ê {"ã±Ê {"ã±Ò {*m«òÂTÛŒv·æSô¼0?Àëö¨ë­Ñ +ç¾!/̃ôÆ «é…yÍÀµ·7T±ÝgT?îxºyÚãtN“¢8瀶·Üí °M„â¶E(Ο5•'¥óÈÛsc‡sdy6’g­¢Ð ]ß©å2,¸6‹Êï0¨*@Ÿ°tXñðS•N²ét"Ž¡›øzÌ}ë.›~‚·>ÏÕ’O íúãìHÍôÃ’wÎÎèÞë4zãneõã†>¯ÖÈ#TMuf¨—” ríÊè¢?ÿýï9†àÏËü—@w´Å>ý]~ÕƒZýŠ~è 7]Í¡®„Tƒuë;©éT ¥ E#Ïp].aÞMÚ*ĬW·¶“{tmå¡“þ°»Úê~~tÿì£òï1#êðò[”Ôî_ö½ .Þ d I¨âyùÞK½$ôz™ÿׯy˜z@~#iêÚfãøMänñóŽ&O¾ß[˜DTù´„¢ñE~E("E¶ EêÌŸ…Pây(tDäX.´Ö""fcܱµA"¶G©—¡dn)Ud¶ì“N<' ­qnvVh„J²¨ÛªZ¢û—>mޤEk-‹Œê¦»¸Q­NùjuE„ê9¸ºê@·ú*†I?R«0銆¤Šá% `ÒÓoXO'¶´3?J@$¼ÁÚí¡hÅç¡ êd”½>æeÃñ’Ç×{À„2ù™…•ÅèJˆ^ctÕoî?T4`^ª\.€¤ ŒD.9Ä ¦WšwVêòãǦÍ8¦ýÈ#Üx|zO;ÎÆQ2Rë*È0•&ÛF领>M“=ñpèFBÈ]àZ„Ü¢1+¶@8>9AÎ@ùí@Ö´T-L<‡R⣠ŸóË舼¯—Ñú)ï«yò¯¯?~DüE òÓ&pfèí ìrãØâ" Hd±ˆy–C(4fAÄ£jòíÀÐú ¯”€fº!ìÔeØÙÈ^±Ïg{kYÐ+n¬E|«b·ûLâÜOVašâ&Šsá Ca]Œ\o²ÐpkQ¡jñaÓ„bw{˜ÒI-²*éy$ÓHÏ,(ÜÇŽW¼6Ú<|qëÖÊÓ¤Ò”–d`¸q-´x‚ŽGI'UMj©Ù&?ƒJÿ;JÀqŠÑx(×Ö‡céÎ*màÒ€î¬ Õl{pwK¥¹OkTÙ»“j¨-dL+›äøÎ¶»~™Ç祋Ú÷T=¾iph- ›úv½ q|tpúöøLÐë•– LVp¦WkÔŠÅãvÐÒ݈ù¡ƒ¨o¹ˆÛ±¹k±0`VäÙŒ $„GÑœMrd6É·Ó/[ìŽÕµÖž­*¦vÞÂV<ŒåýÁÑþ»£7OÂ%[ $n­°:Ù²ëJ½¸z3}ÎÛÒ%Oûl·õí”ÇÆ£>ð@Òn‹aéñ¦=q=j ǽ–\mžÜZz*PžÙøc&•èE3Wâþ—Ÿ{·ïè¸ÈwýGî;×Ùbß±þà’0éÓt‘ Œkùó®e@°!‚­ó-—àÀíÀ†ã£7Ç 6¬vòfD‚'RÏX þ’ž°ÐÎúhb ŒXpûfé"hºŽûlè‚Vn«20tQAÁ²táº0tñÐt¡¢ öö _¾0|ñð|±Â='ùhf,CfÏ)hz?dÂÈMçÈÀ6ÈdÉ “A&ƒL™ 2­™|DžÆaÁ_2­#gú«ºk4žÎŠY£Yp`ì˜Ãú[}¼pÙ‰Uë8⟓§$½Hʺx?Ýæy–g,‹²›èÁžb×ÏÔas&(×@ZÝâ°,väK-Šå `}‚¬ EމïqdB{Ë2æ†Ð¬Ý释ù`›aE?gý›½bø¶xOäu)Ù<ýLGÉeÁÕð¦1ºÏhÜùïR7¸H÷CË'{LJ‡G—W†Ž¥)¹[·³W ?Qþ4FÞ>5óuÓE1~U«'Ôb—Α„Y¬Y;i³nØi[Ù©Ölª&ƒG â¼Êµ¬ÍŸRšã=8m½}¶÷vƒ¼eÏY«Ò²xš¼“Xšz9Jw³ /ßÌ8È´ÈO¿åRë†"<äÇ×MB6 \Ò ¤H36ÒJ{Ð6 h·±Ù(…c?¯U2T=¾d" ³J¶ sÌQ €3fl.€•B €-°âè˜ÒÐðW ´'Écv»ÏŒÇ0®ÚµœHÂðØmÉ36M‘¦þs'Ë`ÆòŽÞ«‘“ܰÈwš´ö°*•Ÿ•eo\ Æ4?Q3–=;¯÷ÎÞ}<×@¬7jeU`DPÊãaLrõl‡1ö"ÎÕ^ÙrÖÉØ±ïr× `ôDvH#—º7 nÀ}™¼+Fà(Œ˜lè}êö]v†ro"cìÇ,ö)Ø'1²]Ûc„z ¸V ˜ "A}Ê‘a[æštÁt•dç¡(‚:–Ç(°Dä œƒûäé!‡ÎìtÍîûȺÍì<Õª2én­:¨sT;q‡]ö³¾¿äÕ%XnE±®üdS¹_˜¤ú²œ‹®2Y_$»ñŠ ôÇþ0i'=Ö)6.»ÿÏÞ•>·#ûÅ•/ó‰â$áWS¯4Ž’¨&>Ö–3Ç«)‚¶vt ))Îlå ðe]T";vVSµ‹ÄÙÝèþu£¢cà§Ûq4÷ Q66:s=Ý}ŒÒáí‰ì÷G£Z7šWŸ?ÏSWæ9ûøWó-±ÕûayÇ`¿2“÷·Y>9aœ#B>4»×šs¥Ð ðƒ º¥Þ‹ïûÇÂvsqíµëzËë“2 ,éÝÃÐÞyg­Ó“ÔQÙH"O?!æ$O ?á¨`†Öe˵¥^ÕŸðòɲܸýÊ/—™uH¾7º?¡Ý­ï?sÒ¾>}sbðBÒ»µ½žµÎoZï]ú]:ºµÜ/$³`Dë9“½¾T½~oò)úÔµ­gGérì]KQœöf¦Ixþ—©6ã‹”hðúêƒwsýö¤/§C°äk3óA\|÷ß«Åz“`µ}ÿÀ~ÊŠd›HÖÜ?x,š}ïþÝ5å½8÷  Ç·¹MÛØæüÏ‘¾“)8?Ýtßxá³÷賊ëÌ]p>š¼M‡±CWz[“ãt ;Ër@üªSäø5ÒDz4íÇGÃÑÄ&ô%¶ñãWOn&¶[‰ª$ YK .+Eð—Q±'|NÌC qԸ්Úû üðÌ<…¸wÁPOp½kß'Œ `k)ÍÖP-ØÍR<Ùþ«-Å‹2M»Í 4mã¿1jßdIë¨=;Òï¤nµR̈ ô|j˜Vžˆ9÷ ±DªÉ£Æ¿IÔ¾¡®eb%*·$C»éÚÇ¢Ù•?ŒÚó§…›°|›nÚÆ!j¿WM½"jߤ¥£ö «89„íaû/ Ûû'Ìß¶§O¶Gdq{¥N°9aäÙÄí­ýGŠÛ7ëû%ÅíAdù!nÿíãöü˜Š`'!f˜‰XÏeêQEA…ú‚y!‹Ž¥/ ¼Æ¿Iܾi4fu¥%Y¸›‡ðX4ûÞ=þýÇí›p|›ƒÐ´CÜþqý…Ýãö4Ñ3ˆÛLj’çz‰‹u]¢ºÿ¿ó?Ý¥A?•+Þ?ætehÝNìpܾô/‡«Z^ÜU-Û—ÏJeçú¿Ÿ@êDõ;6Kc…Žõ¤oOD›cs/ã¾±ëÊÅHl•y´£¸ä¢zŒ{ Nfu¤\ÕsýLÇUŒR{AGÀ±ø0(hÇ ±UÌ áZ7Ö«W°¢Û…â¨|WÆÂúƒzIÿA·ù… îf”Å*Ås:îú-ŸûÇÕxÊÛMøÏSt5þ Qè% –BEcì¢'ùJ ˆÌ½îO*Ý¢Àׄ¨òV8MÅ›Šy˜¤xZ‹–Oêq•ªêb(ªx ~ë¿aQì+*.y_Åó’¬Í½úµ"îD|?".ý@(†á‰ð¨}Oj’xÊðØ—&&* &⋹Óß‘„7Ìù|jº³Fã|på®üÁ•?¸òWþàÊ\ùƒ+¿'5óÀLnù: ŵ4úµÐ(¥Ç£ÃÒ½tˆà2›¸>í›eToêSQ⃅ã¦`ã(±Çƒ)Ì?–ŒJé# òôR¦¾™÷h5ï}aÈ÷LÀ¬RŒ=åsáùJR.%c‚ÅI¶W8]TŸþvxXÀœ€‡qh/a1ÈAh|ÄãgŒ%Œ Eëd(Ï•¬Æ•;Ò€l¤ÁJ4úõA[(â8@ÏzX2 ôæ «Ãµå~ˆ ÂÍùr¡ _*OŒCűÏwË1 À‘VC„z”Jª± F¬i;j\ð‹pèåÍWãЛ,û©$¶êëÕs²5«E·gVÿ³bA}~:ôŠÿÅ×&"° ¼6mã^¿NIlB¸îüÉs2ñ_nÐÂãвílОڞa´Ûe+"ôW:ö‚X' yÊfZ%µû ÔåQã‚[확µÈäç_¼fØc¿ÿ8ÉÊcî7삃lÁv»<ž÷°‹Ø1ì‚EðòÂ. X¾5ìÒ°ƒå:„]a—CØå…‡]¾“= q–}àRÐ;áÒ$dZÄ{”Ãÿ…1Á7ÆpNd¨TxÔ¸àsÂ¥ËGqü5A–‚fÍ¡écíM_úQœ& ßL›¶q¦/ç(hJvÓÌZ?fÂ÷|LA BÚ§4" Â&,8j\ð™E î@fÁMÈF‹ šgkH·cÊÆcÑî  4¡ÁË»…© Ë·^ÓÚ°ƒŠn°òWjêZ±<°Ûaƒyõ“ 8+‡Zãå}—ÿjŸÝäw´s©ÎöQûò÷Sïj40Þ̽˜™aì®…}Õ:{í.çG>å~™~¿:$bOsLJâéQjÊ7“; sì~¹›f ÈSþöÿjÂ☟eÆÔÒý¤?ÍîìŸjÐs÷ë&ˆk7¢VžÛ¦v5ÆF{z’º`Ç}&ó³.c „ö’^’™äì>oã>s¿ƒ{÷LyÑ…Ûm‘ƒØƒ•ªœØTÃQo8‹ËzÑh<ÉÛv]@)å^§Ž,™ö2`²É/uÍg3 £½éÕÓwîZÔQ6û˜OÓ¸áŒoMm²Eû™qÝ@Fû½Û!”µ?I<}§&1íÈ’}²ÝõK–ØtÛÔ`4soÿê½>Š“¾ƒNÒO®¿LßÉá­ñÚË/äÍ2•',»O½|Ťûw¬ûƒi?þÛÝ6«R×ò`’¦­Ë!ÏÅ´¨,ˆÉøßÓlR’&è÷†ùA¤’Âüöý­™¨Y¾Ýeraœ)÷G’ÝfJæ°;ªõå]õ¹,˜j,ºâ`1§1Èϧ““tÖK'Õ[†}s+õ§B>\ǺàÇ?&-È“‹S<6èÖ±;a:ã\@-ÛJYZ/—"5(ºwÿŒÆz8É«Ž{®ë{ &?nñ¯¾waX Èrd›ÿÀ‘s<ì¹ÿ¥û‹Ád&WÇiœÊa>¯{ä&-Ý8±«„«ŸÓ$øAœ³ÉW‚¾‹>ίÄíåu‡)Q¹¤Ò´iQÉÑÛ¤ãI¾˜´,ÖT%„ãhN[àÔŸŸ]l·ã [Ìzvæ ­6_McvÍcóõlÌ×¢¦+mB¥yÊõ½¬xç*«Tº+—à¢i(upi·JTèßR-Tú³ÐDs}6_÷…f+ÏsQ©®Ri.ÈB-=Ð0s5PZÕÊ*—Öw®CŒH®¤ ÛY¨¯ª³%ûW³…ö.5_¥gskRiÿÜP¨ÖÊd=0· °¢nýk¶67AsÍ[¨ÒšyznJ Q×¥5¤3¬¡Â´ÕLO‰-WÍàU(gÁlˆjnt–ìqeY÷¢–. ŸBçÏMR¨ û²`i ”ó“ÕñÕ‚¥Y²‚ð+ maW+¤S`•ª`ÖCüUb—³ÍÍçz+g…~À|=y¤Œù»EÊ$OP"¤ð¬èQÂ…'ŒÁSJÇ( çÑžF;RfM«h8Í0ÕÑ4ÕÆž3ŸõlçÇ&ðÐ{obÓq|fkh¼cHí±ˆüT¨+²¡c,žOT­–ÞÞKz&^Ý ?aöÛÇe+«nð)nǶÚ}ôI:êÛѧ·~Ñn™2eømu•íß'm _á-|`!|LMÀ0S"P$F þS¢@aJE’84Á4ÉiL4ƒ5cLòäѱ§[í+Ãhù+×Þý^ÞD¿p<;ûÍ*ùÓ‹³Ë›n;úpñþ欵ºÝÖé»è×N÷]Ôm½]Q¢ý[·}þºþâúâô—v7º<íDç7g­¨õæMç¼Óý}¡rçâìì&:»xÝ~?®º‹úëÎYëm;êþ~ #8ëØ7µ‘^_·ñò£zõ«öõéM;úù͇úÓ·W­ËwÓë¢×Ÿ/Nß]¯éôªõ놚çç Ý]w/®lÕŸo®£7¯O×½ºnu[ë&ùK§þæÈ÷¡ó¦$ÏÙoð€<,P°¦sÞm_½i¶W2i±¥6*òªáµOo®€5ÑMûM'ÿc½¸ènͳês¼¹þy™5­ì³{y¡¯‹ÖMwPüëôâW¼~Œ—§ð{m»–bïWHòÙÍûn§ ë:>]uÖNGþ:ª,ÓìDm&êõéugCåÓÎÕÕÍ‚$ŸÃóúïÖéiû}ûªm^¯§ÚU÷}ˆˆX_༱Ëz q:× 3è ºí×Ñiûª»¡×ëËÖåUôá}ë|…ààu$é,NpÕzØDî· ñuûCÖ,·óm˧½4Ìë6ye¿ô³¤ª£[34îz÷±,úÔ˜9d'Ì`žøa =…åQC°§£<%%eÌ‹Àø¨qÁýcfttyq=Í™OÙÌr“&ò£\÷ãÄâ:‹I¸&ï§ Ys üXDÛ'~ˆ*TûtÛ £b5›*{=–7YÆØ5˜¹Ä·¢Ë&´ý2t©Ab„Ñ&T†BC3„ CéÇ<&"I ‘ABXŒ(’>2¡¿÷+~Ð6tùÅËb5X´¯\pp`@?Å9nË,ƒ;½g¿6éJÄ£ì k¡Þò»lµOb¾.?ÕVåp6ùBe³ûßPˆ°Ï¨M.î`óf òðJ9dÐ8ã^ê>ÔV Ëiܳ7¶åÓ;ó»¸ÿ7^µÉÇ·Ý’î[f„ ž[(©Ý&Î(÷ëµ žºýøK0©ù@Ì0zÃɃ¯Þöí·–jIÃ$F‚(†VTjÄL‚tˆƒ0_®¤MO¤^ÊOB`—ò–òyØpšöëŸxÌ{õ ÎyeÇóå˜Íô‰ÀÏ›]l3¿³iÍ$t >lâǾ‘ˆXŠœ`$I Á•f”.M"×_3…­údíDþ¬†% ˆa¢©á ©„BLuÌ…à9-Ê ¨ü²5Æ4ptYÃë2Á;ïÆ†1ªŒý2-HS,(¸Æ ¦2D:IB¾N»d—5ü ðÅmšK#&/Ž^€RT8Q>7Š*.CブD‡öž¹Àß‹wHÔiÀ]†bsj¸D†ú…$Q ¦Æ!Õ4ß*¹[Ëú_˜þFîšé$ k ƘûqÈ|âJ’D¡4H’Ÿpbx~ d λ]»†¹àÍØ»4|$-U ¨V~ès z‰2CŒ(Ü ‡‹Áïcõ!k¨¢D³*ihH”H Žó+…Kþ–Ÿ ®ó·˜ÿ&g{ÉäUM_P@A¢±Ž©ÑD”Fð2$‰¥Ú…\—ÍnDlÝtßEMììVYx0ORLX$8ô)•  -cƤà:àhO‚œÏtªñûú9Î…E¨J‡œ€Ò¢Çab´+Uøˆ£e0Ê]À­é‚FÈ©´I^ªX꜖(fÕõàc”Â`D & ÈVújZ΃¸ëUØHVLq¢A¥…ÈÚ/É$ØJŸ¶’”`&ûû¢Ð ¸­àõpf×WˆÒ硌$Óun/Lx™ ›Ø­dªÀa«éPE@]‚ó€}¡RÄ*áTp֣ࢉ}ªìõ+(Ugøò$$c@@ &¦D%Â(™–Åðˆ¹‘­¦±ÎÔÄÊ+l×—¢M4 M îµt"ÂðtÈEÕàŒz9 —Ö™]Q`¯uo^ÂŒÔx zC«éÛ´(‰ §Y%´^ç½6rž1{yÆ—àn€g„1=ED ÊHˆhbb†å~˜]Ìc½râ›fà¸ý¬¢•Iï\éU¸ë¶÷VEEvá| ñ°Œ#Ø~l;镞˜û\FÇäBè'Å¢2bgCê3GûªÈøîSÖ³ y%uç*‹dæÖš–œùnÈ8$”CÛÈýÛZïEÒÍ;ûÙ³ÃÑUO%—^Wozãl†É²(Ó#7æb0ðޝ{›L§½qÊs9Ø&ÒêOsNämÕ™NMq@9 ÖÃKŸààÛÎüó¦R©™õìF~4œÚàŠ¨ÏGUîáQ2Jr]^º  ±ã16p¿™¯a{yƒ¢.-Ÿ'RLãê¨qÁýo4àņ/8pxäÎoü?{WÖܶ®¤ßï¯àø%÷>P&‚„«25Š,;J,ÙÑâ­jŠ’€-G‹¯(y›9ÿ}$µY’E%²ÇÎáC* b麿ntÑ jmš¹öJäúç·ÅäŒ=¡›]sC\›r„YbCkOR]ªZ[aÈá©!‹ICBMW Ûô­Àq}É™EâoTGÜõéG¾ -ËÁ¾IYˆL ©é#þRÄ Žà]â^M$P dÆÇ€gÑ&úð¿Þn;†&÷1l+½)@ƒI iÒ€qSø™0j ²tVÒÇK ̰šÖ&f¬ãH į·ýBÂöÌîH–ÙG"·{ã¥9HÂã#Ù‰×íõ Y篽Ó mÜ^vEâ"ûÅlÖ¶õÇ s¿t°§s @â«¶Þ:Ù©k­âQtž¢·+Àf·Ï ²ñ.T\Q GODg’Üý<•uuS³Û‘ØyÛs÷l޳ü€…á„Dú¦d‚ê{”l“ ‹™°˜lJ—¹402|ç›d™†„[ SÔÝ ¢¼Iÿðäz{Ók9 #Nfaù:=šµŽ<¹þ7ÚV•íoÀõi†â—Vå(IS{K²:è /{€Éó«ütòa%þzb?ÌÐ « ±8¶ óãÎD»™úFÅÄ”‰û?{‹á@t'×ÎÜw(o¯eWD'MCŒîÅmúgоj÷´§eŠ À—8oK>W='Å-]ß{ƒÞÕžètú÷q’äŽvaìèÌ×Ôs±4*ÆF—3§¯-/‚/“̸ؗ‡¡ÄL û£¨rrGÇŒ›G÷ó%²ÇtävÀFv€S¹½þf® á¦-ìФœaÓuˆ2G1ݦ442üÀøÛYy2¡hvüýZ$ýÓñ7ûàï,,_‡¿³Ö‘ãïçø;Çß9þÎñwŽ¿ß»ÛÙð„;IfÛÄô¥Ô×è)f éRSbV[ÄŒÌ?²ÿ›,»’=¦(Ýðü»W"韎¿Ý¿þÎÂòuø;k9þÎñwŽ¿süãïçøûõñ7Ù³¬v7õså0¨¢L*}aúTßzTßf@l$ŒÌ?²ÿ{ɽó³ÝÄÿý:$ýÓñ÷¦÷Î3Ê? ÿ{=Ë×û¿³Õ‘ãï? 'ÇGå<àÛà|€ïlxjZ•é¤4­0^–>o©`ìüU9—D7ÿάK{]xãJ”ØClÈ=L÷l¹7aFn%¼#+!ž’›Y ˦czôþÎY‹ö³¶ƒ½”Üõ¸Òr@šå°ä´ÇM"è'¡òqü|¢­vµ®Ï»/ÏÇ]p-¼‘ñ¢Bγ” X”JÇäƒ ÇÒ" B7DFæ‚ùØË^¢hvãåµHúG/šÔã% Ë×/YëÈ—ÜxÉ—ÜxÉ—ÜxÉ—ÜxyÑxA§Ý2¢@Ï(a†Ò¡&uaºNÀL¥¸£—ʲ“™L?²å€–n{ ÍÓn_‹¤¹å0g9`Äœ·í‘åk·=2Ö‘[¹å[¹å[¹å[P_±Ù¬ïia6sɧ‰ Á°sÛ=Y¢{Û‘Øí,ù²­ùÒ äd᎘IÏ‘½ì«k˜îƒ»vÔxºéÉÝ[7Œ‚ŠÆ÷Å—b™ÎðÞUíeåŠ{ú®­‡yÏÑâ¹nÒ“-èÑÝô¼ºŸrГ´sK‡ ºz*¾T¢ßz¡¼kÏy~ïÞ…bYùX³¥ºj͉Qon*jêzSýÝ:Ùùö#±§Öν€^ZwÛê*èÉ Š ¾Œ¯÷Â]2ÊЭ‰^h|úÞúR.×*‡Ÿw¯û]¹û4uv ÏvAÂ_·{ÐMýãçÈ—‰D1úaöŒ‰4ѵ"Jßî.G‘ ÿ@@ê›8a¦eÀk3¥\÷Êã—ÖÙéh¯ÖgwþÙ©uyþM]/žÝ…g6ü®|¿À§·þ!^ž×;A‡ß_OJï['ÀÝZ§rcµ«gVµ ÿÎZËníú²aYOöÑÙAû²Y^<]áê~ðXmÑåM˪´ïÛ>ùv{‰¸%ÎP' õkÿ¼Ø>iTjOô¸Y½?n^=TŸª¨Ò³®ª7?î«ûÅô_yT-'åj7I¹RwqòñÛãå9ŒåüÛÍe£Â+7ÝÚþ7øwÐ9:ûvsý­Vñq]_t[GgUZ»)’êMù¾vvj¥JTéòGqªð°4¨Ygè>s3ÀÇû?Ÿªû?iµY}ª5¾ñÊþ:ígñáè¦x5-<Äå~ÜÞ\žu"£NxxúxŽk÷áyÔº§O>9}¼À­˜—7?áßÃeµ/0ô·Y¿©Ýü^œ}ëTèæxÿâ¾öTy¨îŸvkÍí£Ò·» Ûé“ú-Ðà)<<%=æ2ÙÕ§¢}¼_~ª>µÚª¡ÇXœÒ´Aï+û“r¤–”{¼?n^¬æýSðŽx_~œáýsšÂ¼x?4­6X«çéÕÓ;š§ðl%ÿ¡î÷Äû…5ý}Gü¿)ãÕüÿùøŽøÿX›]SÏùßl%ü¿úüyÇø_CëWF 3„¿#¯T®7½ýJýó®»SÕ–XƒÃHëz4khÂôG½°#c:ì÷;ج×F¢C£‰Cõ™NVùüþ]‹[»â¶­oá¾à-w>ýž¡!Žñ‰¸`êá‚K óO†F^Ð ×ÔåøbwŒ/võø5X!–ûXYåìŽ`À”´¥¬Á‰~0õ:Ãþ³¾ïaüÉ‘ñIc•OÆ}{DDغaâÝ\Ú Mzq+ã¶ö q\¾u4éAÒ¨ ¦Ö² €ÈS·qìQl|õxÿkitf +šÐNZ¨+uðÿLÌI°ÉþeD£Ø8èø+jgYȸH=M¦ÿš£àL[G#uQ,m”»Ídš¦Ósâp‡~Œg¸C¯+E4¬kôGC0°öŒôÖ¼S-ÀÇvžÿÃ0­R©ÜhìMÖ„^ À!×@vûCiĽðùz{R'Íí.ŒEOtDÉba ,ÝhW‡#7ô­Ð1¹­˜I‘ÓÐT\r‰”k«4ó9SÁ×ÞÕÙàºwmÆôG°ÇèF»Žp,ìZÜô±þ—þr‘k*…Ä××qïBëíadX0a£4¶7Ûçy-"oyŸgé6†.®W«-¯ ¸ð~Ô›•ãÙוjñ°ì5/N ÕŠ~3ÓÓF£ŒÍ~^/7J­²÷åàtöéa½xòµRj¤­~9.}m¬h´^<{áËÚqm®¹Fó¸®?ýÒjxû¥U¯ÅfqÕ ¿WfßÔ€|§•ƒ1yªçð€¨Ì - \ì¸ ~Å%a} ˜iI”üè‰ÎN¬ä¯fÂâǽ¸òÑ 3Ñ’´j¦œ3Çu<÷*cާÕÎדgÕ ‚lXe…–ˆ:`ø)0‚‘ Nà†Ê¦ta‰4ø!¬•'+òß“ncpW`·*‹‹@!äb„Œs–Ðb•„ËÍ0>¥AL—¼Gè$­ÑPÚ6õ¥ŽÃƒÙrê;¦©pQ ”˶Ãé8vi]Ç¡qØT&&Ï÷žƒPô±ò-&}ê3áJ ¤$Ø`ý;Ö6X¼AàWîÚ(ôCF%5L-‚\¢|f€]PÂf¹›†ÿÌò7þ‹Ü•£áÚŸ2cf…®m‹P¢”B0“,ňdv¸%'Í®\ÃŒ³lì]è> %*¾ãÓÀ·\‹QKÔ–D ŽÜ­p8íü6V¯ã2‘aÀõ) l—úBR—ø\I22Ëßq€ä,Óñ¿Äâè¾­†;3ò‚pT€ƒÊ€pŽ”#/IT(ümP(n2Ë"@»ÅVó«—EÏ® ÏÆÉ]Š©‚E‚]‹RÊ DhÛ‚³Àí–&r2ÒU¢ ¦ßïq:Y¸ïBi—Z”áÐUºB½R¹…šýÄ$Л°s!¡ÒKóeâKÒ…¶C‡Z®Ka…Ù„AðT€Û¡åÔ‰»Zô»™¦Â’!0'Tˆ4iý%lºÒ¢€­%ØvÕ6¦ý^è Üöàu:è0j×ò‘ BŸ¹–Ã1v0Ëí¹/Rá%vûbàƒÁ6#C}âŒ/ô <ô£œƒ±†l &ߩƭþ¥f¾8…DˆÂÄ”øŠK?À¶šE2ÄÜΔ c•"#(‹–÷±^_>hPW†¾dÎpC©3 ø,«Á5»¢@n0Ëì ^âu wwd†× 7|A 5-½Ë!â.%  $‚¶Áë¤ÕLÆs&f/ŽBZÌ °Œ0& §wDmâ"ªdhc±f§ãX-œØK#ˆ¹ýÖÞÊc0âd /EqÔÃ6ÜŠÆAÔ qµÿó)ñ)¹ Øã2i&µbºuLØ–²CDXrk»f².¿aÖˆþt’Âû¡Ö¨[ý»í^Šíná+uÏ»Ãü@”â9OQ’,{F>´«ê ìOѵĻʉ)ÿ)õj°§ãÉõïSìBßK)æ=vÚ¥~Ó~Räöú1aÒOŽ™‹DòJ«–qê”À.¡ ŠhßFbßδ¾üá]kñ4¦àÂëÉ›öíõÒ„"/ úqŸÓÎÀ;¶êÝLü˜6 …o@ô‚Ç) uXü¸±4¶ÈÃÄ38ë^"x;—ºž4jM©¼kë|¯7ÒÎ=¡þ2Òqv¤¡ú#™°K–.)€4Ùh£( XèšÒ “J;0Á¤•&F¶²± ÁåFæ‚ÛßhÀó ¿e EV´‚Zîf[ ¯E®wŸN=—pºQ ©c»rlg’vYOòͲ¦\&¹ŽéG¾ -ËÁ¾IYˆL æ¨é#þRèͼKœ«‰üIaÌh”º3èÔ÷×ÛmÆPǨl+ìV€Ÿ™¡ä@‹»¦P0툢.AœIÄð‡ËSϲ–Öå©g­ãÈSǯ§ž-=Ëì{ýlØL½x¥lØlmgȆ͞SƒÑ'Îî”|TGÝyã|=»€ÈfQ¾DÈ⛋Ф8à¦`>1dë|~ß)12|ç½d™:®Ó&Ñ ŠnñZ$ýÓÏ{!žIúpz4 Ë×éѬuäç½ü@Ûª²ýe°þ®.™ÊmyËC[´@\sh ¡ïõ²¨ÿcïÚšÛÖ‘ôûü ®_2óALUv×q<g"çb%Ž=uJ -›”4¢$ËÞÝÿ¾ ^t±e‹<‰KFʱDÑÝìþ¾ÁÞ Xï}(OY(êáòOº³Ql @ÝÁqnBW½çÁ‘RND\7@Ìq'$HHª¤~·•ô±U¹áÆ"c ÈØOhÍ7!®K¤ÛŽŒÝºXÉæ½C½ŠÊW`­Ø‡AÆÿJdÌ%–J(‡x¶xcz‘~ Œy¦A "›)Ï‹üÈwœÈ†#ƆQ??DíDýlõS—_5EUëbjʪ4ÒŒ¬äÅ‘îVLÊë#‘õ‘¼†ÏêÕG¢ŽÄ®Í\NÎA, ®ƒá8 ¥ËÀ±óW5Tj¸ÁØÞ!4}@¢v=l¿.‘n;¶÷êbû ÌzWQù*l_µƒí ¶7ØÞ`{ƒí ¶ÿµµ… XÆi×Bßà'ÝS‚\éëW6A<* ¡Oæ9ÄõÃçiàJ 7}ÓÅËj e%õÐ÷ºDºí蛿ô]Eå«ÐwÕ> ú6èÛ oƒ¾ ú6èÛ ï'@ß´áÙv½Ü·”]$êÇGE¾ëR¤Ý:Ó¯â,‡Š•nrîÛYöæçL¢¬fî{M"ÝrôMjnÔ".Û¼ ŸUT¾2÷]±ƒ¾·}?‡úž~o ü&ø‰ê{ò_Qß“y¯©„Ϧ¾§á¿²¾§6Ç5×÷üíåŸ=o`짞ݙ>¤“=¹“G«]éËÇv¼ÇÛ!68Œz›U£Èã¾OCä0bù¶¢ $Òu¨ç3Z•n0u±Ý¥ Z¢57«®K¤†ºl>u©¢òUÔ¥j†ºêb¨‹¡.†ºêb¨‹¡.P»áázå/!€¥I96xLæFòÏF>D _ù6µ*7Üä%î¦I´ÆGké¶ó†š/¹¡Äµ7ï£ *_ùÀQÅ> o0¼Áðà o0¼á¥óèo¯ÕúúZ;³¹¢B7ÂaÜEW5ÔD$ýXiX·³äÌŽÖK7TÓ·<€ò+Ïë”ÜÌ}0A[=}×íáAQÐQù^òì%ü(¼Š.ñȽYÖ>—x[¿Û²¨àYÜLÚØ xž>™îvv¥]—¶t"цøX‹^oØ–jÜ™ò.|ßK±¬}׊Hµb—ú“ÓD-Ûö,zû¼³ Ü‘Ìm­¸C˜Ð ]t×îÇ#\ m   ´À÷z,à¡,=šèJëÕ?¿½=Øÿtô÷Ã÷ov/z‰Ú½âÝx³]ðï.\¦þr5 TîO¬^h¡®5uÖ ½°ÀAéZ’j”"ø;÷¨ëþÀ$¶àgBÈ /zÖÎáÍÛo'ßßÂxG±8™Œƒ“ïøìLJèÔ~KàØXž8ðýðŸ§ô{?xïÏ~|ÃØ¿ ÿñÝ;ì~ˆCê“09Š/qçìòëe³õ¶ÓlÏÞsšÇ7ß]±'Ošï¿ ›ôzל|jÅÐææ°sÝ ìý3âcqBâÐþzüØë|>>œÝž²O­æõ§ÖÕíÑíÁä°‹Ï›—_®›ïöŠ£æþÞ´ÝÑeÞn?¹?uóáæìÌåLJ˳ãCÿ09ŧ·×§—ôãÉ×øSë`xônÏù´O.Î.߯[GÉÑ»óÛf늞µh³s˜&þ8‘‘|ƒ Žðé ¹Ösn¶BúéÝÕ-ÌÓiÞ†“æñÿðÝ6»Î½ÉÇ˽óY»ð&k÷¥yv§%±|ÿýæ=º–?ÒN˜|¿ ìï7§ôÈáCrô¾9i¾ytÈÕYëjò±õdr><=9½>;Æ·g—0Öís”|›]v>î‡IÜýaíƒ nåû¿Ã}˜óå}ty×ól5ífë ïÙÍ˽™LÙõá»i;û(o÷,tÿ©uú°îoÏŸ‘înætW¦¬ùŒdÚl}ÁÛé9~Fv çœ?¨ÿOïÂç¤ç‘{Êi¾{Fú<¬ø÷|ôs4OÝÕë4×ÿù›7;ÖÿZ:¾ºÌB>lï|mµß~}³«†áî,4/.8Lu¬ ²J Œº2VYöz±ŒõÂÊch:M¦Þ‰©³.ïVûÂ>ÞýŽ®ùw °[í¼²z]KCë•ÍèÑ·„ú¯,Ûa"WÔåøb·Ä»zþ¬Ø˜?V}¯M Öèd_ód NôYÆÉöî\ûkJ_Y"µ^i¬òʺî €¥ óÌæÒ« ³7gö`ÜÎU¯‘=¤kåWª¤õׂ+[´x¼HgÙÄã´ý†ÿ·åCødÕ:A }É=ë¯9™Fö7+eÔ ã<Ð{%1Þ—žÓ/Hpn¬øÆ*Ke êáê@37ÓÆÌ<§Év¸®Ï¥… )Û‰é°®Õ ^½¶> ·Ö=5)@.ÿ‹eÛß?8>~=½'ô ‚y TÒ*+3ôÆ_ûýi£Î‡Û½7mè„ÙK…e×ÜB.¥G iˆ1›éçàŽ¡Ðu…ô]s1_~¨Ôð9­è›ñé¨áPtb 70_öÖ™èª/ݬKvÛ¾tÃê-ÝØÌÛ¼½âUT¾jé¦jfé¦Â¿tf®Yž,ÖI°ç.çÈv#±c$B;Br%JÚDzÜìŸÍ×M“I£þâÂMQÝðNçeüËAóÛŸf u¢ÓŠð¯Ì'uúYj݉¸x)Õ9ö¼O_æ–W„çry!ŠÉãÊCÇ#äz®ã8‘Ãü Ÿoå|¨ì¤ÙDÚ×Ói¾J§ãËž-%½ÁM; à»çz~žõqû<;â—ÍÛ£4Ë„‘ùsʃ.ÃsçÍ7Jµ`Û/f¹Å|}`·0¼i@*R ƒQW?˜Ý'å NvÞ´~a;†Éix¶î¤?jwºQ/“«„ZRî¶ÝLvIOæÉýƒÏ§ûè+„t4Î~«®Ì‹vöšùKzý^Ü;¿É: U—£§:#8,…öªüexr–Ù·lý ÀÔ(ÿõ_sÆ’)?MUVŸ5Œ£`Œþ$lá1"n¶ú6NÂ…0¹¬”°^aBápÕ‰¤"Ï}öEx˜—àãIÞÇ$;'É$; ¡¼"+£+ ¢dft{îX–çµ{ýaÞw^L;ègŠ£þ(K 씬ò¥¨¬ût bÔ @(¼ÈVKzéø:Ÿ¦Ê.§®æ&[ôŸªløl4îœw¡­þjËnïº?P0¦L,é..U¢&ÙÉaÒg¿^uú(&2ŠÑXd‰õ~^ˆ.ð£$Dù2]šÙ»Ù’N~Ç'"ûÛãdËg ß`õœ ƒ©¬ËK'Å´˜(„¡ëxŽÒa) wòš½S wó³'çjŒ3H•ã8È>Déyª¹SÙy#¯i&.¢vœä¶ ¦×N5XÌ©¶äæÓÉE:î †Ó_ÃÕ¹o ûÈ }ܪA!žÜœd_‘óLÝ ÓéçnYŸ”¦×—[QÃgzý0/ú=ýN6ô„BÈÏ/·øN²µE¸"°åvXT„’Lœýn'áB üS_“ªÜ$¨|^“|õF¨ìêú‘¾ûÀ¸â\&¹Á'2- f“ß áí~¾RÖÉÏíÀˆÊ[j Á›'eòVƒþ0¿™BQÜSS#ì·g²MýñÙúaîÎ=áaʱJõ;f|â„£(¢Âv k\W_äÙ…/²<|q*= ¢Âð*‰|á(ê cN}ÛãËÂ1áëù‡¯EOWÆ„©ç)ïïûŽwæ²J§»ô\ ¥.ãVé‚ ÿ[º…©ÿ,<ÑÌŸÍîû³Žçp1u]¥Ó\…[ºãafn ŒªÓ¨\Fß™]"¹“.bgᾦƒÝ‹sQ£ðÞ¥ç›úÙ<šL½ÿn(\ë4dÝ · °b>úÏÅÚ<Í’ DUÄ—…H[ œ»˜l_-Dš{Q°~E -âêéXeMaÖ]üUb—³ÍÂçz+çý@øúãiׯÅõª‹¦‘'(RŠ…ˆ‰H¢À (°q'âŽÏìäÕ(+5|ŽÕÅwIÄ(0…‚P(¤®D  ¹‹=J°¦‚»"OêâgË }Î$[#‘¶&Ñn@%ò^Š’Î¹VãÇü©ÿ©Á²ýŒH;??GQ;b4ìíüLÑïºÙ9¼y©¹ F´25W±S‚û§=Í’ÄÝ“F ·a;õv×K!Ç‚1ˆ1ÏF ªIι]®TWp¨Ôð9î’©¢>‹4[ºKFK´æîúu‰tÛ—Zœº»ëÍ+xWEå+ýyÅ>ÌRËŸwÕvÉTé©ö.²g>¡._ÌW5ßÝk½ÿ½[e(ôú8 "âEºô8SÄc¦u….·È„°C.á¾TÜã!v%¡f«ÌSn•¡¯²z«ŒóD[eœ_±U†²×Žz=UÆïß*Séî_ÓV™jcoÒV°Xÿ‰·ØïlôÑ× ¿¸ö~öëÖ‹¤+¨tò…âˆy’#Ά¨ïræ ܱ*7Ü`á»^ú˜Dk¼¡kM"Ývá½QEå+ßÐU±Ã! ‡0ÂpÃ! ‡0Âpˆj‚â…íCU/'”2GJø`‘H(×C¶ÃT@BJfVå†Ë!pÃæ,}L¢Õ9ĺDºåŽl?‡¨¢òU¢j†Ca8„á†Ca8„á9m0ÎkqO2 žž ±]p¡ÊC~€}D¨'± HäQnUn¸ÁÂc˶Ï$ZC¬K¤ÛÎ!È àUT¾ŠCTíÃpÃ! ‡0ÂpÃ! ‡0¢"‡€ž\¿‡`ŽK#éRd„ €q®Â`„Üw¢ˆ²üÁ›J 7˜C0×I“hu±.‘n;‡°_‡¨¢òU¢j†Ca8„á†Ca8„á9„× œÔâ”áCà@6Qb< ´1JäP޵•+&Ñû!Ö$Òmç/b?D•¯ÜQ±Ã! ‡0ÂpÃ! ‡0ÂpˆŠÂkP¿Þ~î¹Ü·¥¢È ó°‹ø? <À%.QÊ&yÒ¼Rà æŽ»ôY¦©DkÔ‡X“H·C¸u9ÛÀúT¾²>DÅ> ‡Ø*±·ß:ü~ð{ —X*¡âÙ"àŒéEvàGÌó0 ÙLy^äG¾ãD6‰ˆpƒ04âù×C ^.˜]¢aε±}9÷ZÀƒÔúúÃ:ÖÓ·À)ta`¸ô¹äÖYoÞüg²vuÀß±D}X”X »^WZºÓåâÙõ(ŒK¨ú¹‘5ŠP©9<i*N¢|ÿq¥†Ï‰Â€y"4 »~ú€ÈXM޲&™m;G©YÛãHQ*h|%E©Ø‡¡(ÜðK9Èìç<æeXšèX”öFƒPµ ¥è Vê‡4ÂaÜEW5ÔD$ýXi¿°“‡ á²3ðƒg£t{²Îw›ãÇ›kÂ1 ‰½X¶;Zl]X[JNeôœ»êú¡Ÿ¦‡G£zdmƸ£n·H0NÅÞ.ák ø`¦¬ _Žpô[PçNÌjKÙ\ÛßdwgV·KÈw¯äøï‰qÏ÷6V†'$ |àL…a@s°éÛðÕ&^äÙÒªÜp“Ÿô¶ȰrRó­•ë©A/ è…×Û8øREå«àKÕ> |1V“a5V“a5V“a…þöZ­¯¯ öVìÝ=sÊÙÊqÊ(¿râ,;ëÌ}0AFËs늂Žrˆœ{к‰ãá5:ËÚç*ÕdQÁ ²¸›´±=]›îvw¥]·t "ѦøX‹^oØ–jÜ™ó.|ßK±¬}ÙŠXu?gþ{SêZºíYüþöyçÙçÙ9Ð ¯2Dë¦{×bTñÍdW[A;éIÿ×ìc–yS2Üp1O˜wÉhm¤l)çÐ;Ýh @ÃN¢_môœ‰ay^ùQuŸ¹›ï$£dž‘‘^ÒNLî·c2Á%ÂûäHøšY¹„ê§#)8ö¥`8¢ §oœH2lG®¢Ô÷KÏq‰r\¥¸o [>99úÅ·ÏRN”?ÎYåNÀf§Ìœ$0› Îaaö „‹ìø?‘Î{ÈéyÙ8£þôŒD%½Á ô\Ï_<ØN‚vE3ì:7Œ³³²0u¾Ðœ”¿•ðŸÏ˜o‰ï ›¥u ¼xJqœÍŽgã–Çqcz=ešØ@´¸fü|S@]N8Š"*|aLÒœ6fwj»°pÁa<Ê’ÜeØ)ü 3Í{XA‹_¦šÈÙQqtŽ$GæéÔôÔEZ¼z 7E æ[œx/êÇkeß34ÿ ‰ccâ¿ÆÄöüÀåÙnœ<ä‰ÐŽP \‰…’và±µ™¸çpL<ÇÛ6XHp@\$•OÃ>G" Ùã6ñ]E\ºóÔ«¼á8lCÑæy½;$pç‡ðX4!NúØl Æ\‚1ë¾nìÕ`ÌMØÝ4K‘eéºum鸀q\ÛCŒ qÀ9Høž¯púv¸d¿ßýNž›…à‹ÁÌd/Àf&—™ìíín`P$åÖF–|’íîÙ`þûz¹ýzl·Ýa€LwKUŪ¯ŠErY13¬LŠrÎèDló´äÊι‰¸ùíï¿áR?n ø'†ÌX ¿}ÃÿTb-Þš_PÙèîþN.‹%Î:]Å+ ’BækøÍ¨u空ʛ¢¸¤"$ÕµHË›ŠÞìèùg+Æ» Ús•ñ>×ÕM5£:,‰ðÄþÆ ¸É†u¸^8m‡é‡Â7CÏO˜¿C'd7ê.èöô¶ŸÔpq4Øÿâßz& ”ÿ0ÍÛ-é/Šüà ³Þ³sC%ßq®*µaäWÛ[â¹£APí¶ÆL_™;°4fº6ÌtpöìO&‹Ÿù”ßpj›EŽÿ #“Qû[ÁS¯‰½êQÉcY›Îȇãˆ&çé­÷í7]Ó±XV|´Ð.p ïùÆVÅòý¢„•ËT­æÃë2U™@äùÊXU˜peð±V”lUñ¼ÁJÀz½—%þ,9@ «tõ hUh#œõ-JæQ UÅS?ºi¯ÐwõT¬ç×+¶;¾e–ÀËê®ÈèÖ½MÉÒ¸Ö2ãWöÙH+rü€+ºÄSx6@*õFXÄ<ø¢Æ»„ÜÒ¥îð%“‰¸BWª™Òˆ<òóeûàÇÖÒ§ÕŽŽ™kWkðJÔqÏÒÙÝr+!¢‚R¤|€§BpFVß[#íî6Ìj¼ä2$?6¸ ÄÐ Cˆ©ÁÅYðbªÞW+ð¶žÊUËqñÔÊó£­Y†F÷µ %¾ôú·oƒÂâá&àÍŒ-;`Å=áç†( &æ6/PWfÔ•m%÷A¡’«Ù‡&s]®}ò¥N ›’»"%l‡2º+(—^ðïÿZ²ìÄø$&4ùL2@A% â³"Ž·+†KrÇGßWã /dܧ€Äù–0.®¼FἊ &€´x¢§[UÌë2%ÔZÌn2ˆu’æÂ–mJïÙ(D§ÿ}b|×6/*ƒB«27À/QŸ‘”PY¬è x«)[Šßˆ¸½ºé4µPod’º¯²Qè¥A·mÂkõZ3¦XZÐ=z@,¨u [-fžÍJ6“8|ßVÞ8“%”à nª ¹&®Òù"^Â(LìË3x¬ ½Ì‡˜ñhõˆº„+±®"{# C¼ÍN&ÆÿHÏ»  Мø4ÃÐÕ8o––®¡ €vÕ85ÔS*±¡)DŠž\ª7˜ ùd`Ñ+Ízˆ/øØæãžø¦Ù¶%?ïÐp*'Ô6©øn• ðÛCýèh<ö¿q๒ÜŸ¥)Ó¸¥–Ǿ|1õDH6-çT[÷²Ž›ŒBÓ$½/Û¦ !U§Pcá|/Ú>‰¿…tÁ,š±¯`üÖÉ -å7{™¿ÿ³aÅoö±\Vö¸ ÍóúoYË è¶§ÓíP’\1[Þ3ô»/zôìr˜Š¢à¦’U5›RN}‰vLʳç>¶ýœ!ËøñÃÇ'ÆXDÀqÊ; $oNÌpG¦S`¿àˆJœµ/‰ÜÈF”ò%ýÐb(JbyvìYvd[ž·Dh»i¨OUdà¦9®:µ6Ƨ«y=Æ-¯H!¦Ìß~ùrª8ÑW(6Dï•PJ˜ 0‰Œ-tQè!òXÛcÌ‚hÇ~dÛÕñ©Óǧ¬£Æ§6Ø¿75D4ºÑ¨³ÌáSgê¹>‡k><;V˜í)ó÷ȱ¶¯ìB?àÖêÌûž¹94ƒÀóÚÅŸG =Û„ÎŽL¢kÍÊÆBMybœ@%»•D:ÿúHë<¶©­èµ­òt§ÉVÚ- áÙUÐþ ºZ¦Y%†4¿ŠYú†ûß ~4®Cdà«—</W}=Û Õ‘K2ƒ5Îáë©(ó”ш¶_µÝàC²¬pë"?¼j+Tkû¡KÍà^ª›×‡ Ó±S}®Þ¿ûø_>É ¶ A¶Æ¿]hÛXTÛ¾Tõx¥jÇ"½¹s`ñ`3^Ûñ™Û£|¦¹sAaP˜ÿq|È-íˆB}ùrámõ* uy®î€í!7Š-„Qߎ컉»#9Õö´#{Žì~ÿuˆHΦ@ÛÜ0ˆLy•ÅNÕÔlDøñÝû·ê¶Žkv`¯\±vP.RÇöýVaÕªã£EG±.xÔØÂ0UzŠÂè–û‘„ÇX [À«e1UÙ$79{XNËU>å+!í§=cueKÆ¥XN7ž$EIº»šG4"ÇsƒËŽhDýýkh —,ŽÏÍ­‰­ tÀã›ìÈÑxëêB#`ö€²ïÿøAƒ2 Ê4(»NPvSƒ2’r=ŽÀ¾¤9CæÍé°Ú¶çó³b7ךX‘ýûÀn[7r·ÐØí1vs­ÑØÍÓØMc·gÅn~óæÝ»·ïÞjô¦Ñ›Fo½½Eϋގ¸oOlÛ5­àyòaHväü.©EÕ>h@ª©¤j@ª©¤^ uBï$·ÿAju®K¿ ç¬jE4œ;œóõaäW?vb JŸÿ­=ê1Í)§uQVÏuΣح.`ù|ç ŽèÄÉeÜÕ‡óœaY·nCëÜö7>‰ÍØ B@Ä‘ ›ø(qˆÌ `¶cQ˜_^ ëÇzç@ᳬä?­E¾/çüªÐ!2þÏé*Ëa×i¹\Éç ~ÚQ¯‰¾ù®CéòZnÚÛêù ¢vfÿ«¡ì<&PýŠöûpu0†ûåÜ(Îõ€âqGì\²«dˆ4t;ts½“ñª¡Û Ù´¯it¦Ñ™Fg]:{¼ÇãPÈ.ºÎçYG{"’J2†óÕ¢ºÔ˜œ²v:&§ŽÉiÔ§QŸF}õ]tLÎwí“Â4àПÞ}zwƸ[dV;†ª3àžÏ.„]8Àr/.rvf8æ%+˜qɵ¡_í¤V-Zµ\­jùªôØs+•(ºt¥2ò¬Z®]ü Ú7Z­]´v¹jí2öøgW3Q4»@ŸcÅfì9àþ›üQPž¾KoºV[àÄ;¾1¸à1ôV^¬ñÙ땜A`\Ï·¾ïò³Õ†©«S’íÈúï/¨Õ#ï9]7Ô =ñüËÑ};U‘Ú$`ÔÝ}h qÙ(_—Û«L¿ÙKœVÔôE)åõ e¬¬Eõþ+êØÐ»”ø¦Ė넞I“ÐñL3Š@çÆ.#QòmâZ¾GB‡¡ç»vìû! ¡ÔtÝãèìz÷TSú¹Õ­= ­`”º%àýÚc(œŠ\bñ¶’ˆ¹8Àže .øÕk'Ôµ¡½Õñä$ ÇéÚSÑì¥ëZ{äú¥ï9W§…‡°üZÇÖN/MS›¤©»‘È­r%k@MÝ}ªõ•8[•’Õ£À ^PoE]ñuž›×o>}ÿçwâþ6–ã|9•=À. CÂ0‰×5=3ôm–Ä®%–O IÄâT¬Š;‰Ã’À#žynHí8¤^@±(ô""Úœ³%†©Šù8ë͌ߋ¯CjR†™gŽÃÚ 'Ž7L;ŽYâ¸,’(‰¯oÚ•=ñMJ¡òq;à$ØC±I‚0f‘o:áÆB׿²ïÛÆÂÓ@q©^ êÃqíq’áu!Y¿& Á~‘g‰Å•žv(¯æþU=f‹;6g¥ØÏÈ÷—V÷x¡~­—ž›µÉ¹5~âÚæq´ÜÓzw?-óÙ-β➠ª}*Wê2W•Ò´u­ËtþzÓ®ˆm-âZ¢¦ÌW¥®WÜ/ž¾ãù¾e9ÊÙ’¯¨J®( ¸ªBq?sÕœ€YåÍ|øˆÞýåúþÇ·õ~ë$}€®õÞ¡^¿¹c2­+Ið­åß:ìÖ nm ¿(f`°kUõýkWì¸í>ñë'åF,W>]fF«¹4z<¡×ö/’´oß|wËàB’ÎÄ5¿¯ßÿüúOêrÍç¾’Lň×½Åkœfb¡|ùyúOÐÖâºHè¥ÜÍkšÒ2]³F$áù¯¬YoWYPáÇŸþŒ~þøÇÛ ¯r0ä;WgA\LñßMÿ»%+ç0[6ò*nRxçÄõ³Ù)õý•5 ø >~ÉÃÕ¯Óf5]äù©-øBëy[„¯­ÙFLŲ)Ã'{Q!˜¸,§Œ¢u‘­æ€cÕOèô’Zodö«ø«ÞLÜÏ$PÃ[♺]æ¼KÕP“Žr˜Ã'ÙÔ&ÈÅ$@¡1"N JÑO³cpÁÑîkºçrÌpë¡/œdÑ8÷àT4{éî3Ò=°¬«ó†püw0´ŽCÞÁä—à|ûó§ïPxñ΂{Qa€¹  ÞËïŠU.O!ò„è§ÙU}FÉ÷õUíƒ4)V5òbÉS'^ùäæÌfÂå'`2¾ï'ħ>¡@Û÷Û‡ó“8²\Û ˆ1¸àsí­ÄµA¦Š ¿•øÂ1³ }rÓK Q„M滑%Al .ø,AûAºÖžØîV]Ûl¸®=Í^º®uGí½«ÓÂCX~H ­Cíª©·í‡Ô4:hoíÝȲýP‡íuØþ)a{ûÖ³‡íÝ3…í½c„ím÷Öc· 3ž?l?hêŸ(l?¬ík ÛƒÄF:lÿüaû`â™ãâ1<í5‰~|±G‘>Šb›"ì…^xžgaj .ø,aû¡Á˜íÌé œŠf/ÝA^~Ø~ÇùCëÐaûÓº ãÃöƒ4Ñ„íà 0öRÏ‹ážËt¤ÎþÐþ*çÿ¶žñæ$2ÝjÇÀ½{çHú× õ©0Ww*Ìáé³UÙ‰ö– ˆÃ7ÓîÙùµ±²&d™ñýÐlÂð|‘1>¯êK¦m°ƒå8Τ{(Þ€#€‚ÃU)7߉vV‹æ‹9›%?…#ðƒ¨ÿp:¡!Ä\1{–Ýi†;µíüÁtÖ+nÕïê0@Ø}Ð-in4+ÿ×Wô?QÏÝö¹h·~êª~^Ÿ_àÀ´AðPlƒs™ ¿…˜üÄÆvb—Ú2|$fêTIÀ”=lE»W¨_¡’5lqšÔ›†2J¢žv‚%êI7¬Ò|ÚD©Çà·þ&ň˜úð‘÷¥ž×dîÕïqS‹øqD›Aûaˆ?‰€¡‰0q3Ÿš˜Q'Ü“‰x/sú øÀŒÏsÃIÏvÆí%rm›û(`a‚€0O]¡ˆÎ§‘1¸à³,KRà|šñ¸Â.(êÙîÈÝB'¢ÊK+„#qíõ-;aøÁ½BëÐËŽû&üž…Eñ=ŸêuoMwbEáU{òþ–°lw`Ú“ßÔx@G{òړמ¼öäµ'¯=yíÉkOþ8pÒŠ&¡\9œt«Óprœ´" '5œÔpRÃI '5œÔpRÃÉãÀIÇ›€|^7œt‚jßÀ4œ| 'WÃI '5œÔpRÃI '5œÔpò8pÒ³&ÁUÃIkb…^µc`ú¶¬pÒ3ÇÁÉÐô4šÔhR£ÉgB“ö\ì9¿…#{T&°eº>öBÙ†aÄFaÄÈ!‘—ÄvÁÏš \H˜òKsùYoAµƒ"Þ¸4àS‘äE§sR½ô< ®.xË%­C'ïœï;³€ùK‰Fâ4ÇÂúˆs7€H9]‘eQÞ¨yÚ7,ËÌö='hHïÑÈ "påäA¡íÀ?ÄŒãÈŽMÇþe}ÂG -sœõêXÒ 3¹÷¢d—ßxÒžé±Óþ&EIà1-îóÚŸ`ƒ?Ec•±ÇhÞt‡N­Ä ç#Ûç:–‡bÆO±çblZ6ÈÓµ }?ï­í¼7#9‘e"x1r±m£Øô#dƦ/ö¼È£§$€wT]Ôþa<¨`Nà‡4 J< r²s“ ?ð=‡Ù¢Øí’¡>äæ$pÎCë B›(VdƒÖ¤Ç(аÇá°Û íÈ ÂS‘À}* Î žzÛòâZº8óD„Óðôúáé–<s`žjxªá©†§žjxzùðÔöÜQð4LBJ-ÇE$¢ yrvLÙø4¤ f$ÊTðáéãs|«ÚGºáõT´{éÕ~ñç( aø!|:´O¯çÐ2®=îf 0üü,m`>‰x ˜Å×BCpS€3ðÄ l30¼ÌøÁˆ.8 UÑÓÓîŽH‚k[ãôô©H¨õtOO;np}éaù!M=´­©Ìü­ »SL†Æ¥d¶ŸÌÙp¶ºÊë+ þûÝ?o¼j/?°Ààÿ+hš.D¦oñÉeÛü>„:…2%Ý«0†zýËíÎ Ïüìæœ4É,m’ ç}6Åu‹(>]UM:J›£Êä—ú»nѤdlZâ¹jÀòƒú¡JŠ©¹-Að¦üN‰¬Àõ÷å*ÏA¨¦ëy}CøN]N±iƒã ^Éb5Mó¤tÅ%¹ã”zý©/h'2Âø£w?þïôS1gh-^¬YNÅÅ7¯x+®W) ‡ÏòÌf–eM.-Oz]ÖÄ#EÉê7Ë; 3‰»BÈ“|û·Ž°æWsÄ- Y’­ª;þk.”jµæBO®ÀóùßùB¡xR¬å!Ïúz©Õ'Ùl}‚Jÿ¡‡õá”ê -h@¥ÅÃV¡Xkl(µ~š?­µÎNò•¯Ii±«ÆÃ&q/ ÄÃâY Æ ãReÛð).U³^´÷ô­K¦ºu­z*zÓ¥ûÖЙ‘Ý®K‘ÜóômÝ&q™4 u<“ú™!Bj{.·Ô _ :#ã´ZŸaç;õŽàë4ÓNö>x·?ÒðNCa›®™dND·ÃrõW’ÝKBáç`` nßn’ØÁ(™O Ǿ>SÄ-Cí9´¹€Ç·¯ O!Û?2}Çe^@±l˜Šúʱm›9ˆ`ᯔrKºÒfA€϶¹ØŽDq )j½ø¹hÈüÓÃb5fÔ¯¢PaW™’1|ð0|èedþÆÐ¢²ßåíÞ\àwrѶŽo$ÁëÃÉÝÛÓõv`«Às„2%TbŸJ‡2áŨÄ7ÿõæ3sEØrˆ^&œ\cvU׃-“*ƒá´‡ÑÍÛsac>–m}ÌMܼ"½p¾_×›üé¼Ü¶îOÍÑŸQc¾^X1J'^¢ÿ®¢èdŽ×¯.]L›Ôø7™æxž]g¶¦5šœçœR-ÌÉ+Ëqæ `ZÈR0üèQ®|[Í—>ŒÌÌÞÜ”ˆÕSÆ| ;6aåDOxëךÿ:Ñit{;tž5®ˆêÉA¿Ý=»îýº£/Ï[PlKÄlßÁ +Âm— ä¨ ŠÁ†À¯(¥^Np±´¶|¿çÿ¨ÆAÄñ0Š¿O†a\ª™hΜ䑛 Çð^0Ìð,ÛÅ<ãƒ.Ö4BH ²%-Åñ0gpaÄmOP8„,5"¶¿Ó„­ödmCþ9­6æÈ³[MTŸq D1ÒeÌe1™ŽjwùõB·IdÉe®'‹¿ãÒˆTŽC|%õ 7IF€!C7å‰  îËh:Zú²F¿ÔJ®½¤RòbíE¾å*Ÿø.§Ê+‰8¦úpÏz ï°l'…v$}éår¤ˆe#j¾S`J‰'„&ÚÛ°ÐüÚUãѰߛS0Æ®%©cÙ–Mì à (=É \[¹ñ‘Pp\ìÚ1ì27z—ªoK…x ¸ïùDøµ\v‰8ÊVœ!ú"N*ÿ£×£.˜H)">±…C‰Ï5¼òY °tíyýöÔHÏw.è7iÿ&‡í`´7g/ /XH½š1xŠðRv ¹ÿŠŠLwŒT¾ÙøÞJãg·ö…gíd”`À ÁÔ"„ƒò—ŽÃ™+<½PGŽ[ºÎTA÷ûý6Î: ó)¤¦® F‹¸XÒ@g¨G*³‹ŒA?¦€[‡ !–Ò¦þ2 ©Îd‰¤ãá‹R#Ìa`„| €IpÉڥߖå,–»ÞôÓT]aE\OLEÚq‡ƒ¯´`+NlìÐà%ºýÁèÚöàu*è¹.¸]ËG}—ZÈ;b^Û ^–Â&uû|èa›³¡¾ æÈ—þ…p&ýÀ%ŒYCŠÆ^BT“RCRó _nD€¸ä‚ÃÄÄö¦| <‹ræËtÙi3Ö92¥ñò>ÖãË'M¡JúÊ€N•€§©ËæU dÔìò¹á¼²§ؤkÑîK¸·çt vÃ^ÓÒ‹¤8 e‘e”d£—Ðu\j*òœJÙË­PºÌcì”Í<ǦˆJ:˜¿Œ²“v¬7Nî¦DÚ~ë åÆùþ ýT:AÑ¥/]4Žúãž4&¹ÿÏ—8´D]Ðu•i{H˜ÄÒGâ1•p¬À‘Èv­(>£u­ÓofÕà ]½_™I9úÓ‘êñžŽ¶Iä$íÚ½N¥•~ÍÉó+‘ôîÄRôõ”Ẻ -“X†/àù£Ê„û©êÔbJh¢úÏß5äÝéõQs÷F©Áêª!ï$ûÃ>HþÙ¶¯Û=u™¬Î@9ÐK´±K=‚R[z#Y•tóÐö®x§ÓˆvQîépÆžÞ»—D1V/”!Ws‡µmJ’ÄU¢•)‘Ò8˜þ0,Þ“‰â¦OÜÉ“ nE‚ƒaÿZ 6Q:¤.^4ÌüÕÁR l"TåÒ’C}EYòìN=MºIrtdT¯™ÍúñA‡{ú$ÌÙº¬Å÷#5Œ9;­o–BW¥Þ¨Œxx7»¨%9V3™“™Kvß%òÇíŽ\N2€þ9»h-êæ¡©Ã“=©¤yß咿¡:#íå^Û[ºûl.¬7«¸áÅQ½-BvsÚmu0t°®¾4Ž”I¸¢&§`[x`¹)Ëse¤Nøñ²Vn£Ó‚Ýñ Á×’ìgGÈî®Û!§Qù6„œ6 !gùE2•–T\9ȳ¹¯æ^ W‰ϳ°ï«À&Êó0Ç lx îúBdÈúý!k7CÖïYOÿ¿£k_ƒÜ–Tú¤ŸVÄ”áìe8ˆ—§Ã$øÀ¡Œa-c©ëæ0ž{P0T=1àûsÆøúõ?'WJÞàäg #Tú4}Cç¿¢N,‡wœ¢ÇŠXHx˜;_˜„QÏô™@&ÏD"#uÂŽýõ=Ê,\#X¶ö-É~vìïíŠý?`t<Ê·aÿ´ydØ?Ãþöϰ†ý3ì¿"ýêõ1øèeÌ`,ºôw˜Áj 0ǦrOxÙÄ œ åÀ+ìÆ EßöLDõ°1µA7™ÄÌá®`G®S%üø¼ÙËç‰Ì v^ðJ’ýÔ¼DmýxA •oå)óÈxAÆ 2^ñ‚Œd¼ ã¯Î Áàuw»cÞBQ©lS LBüÀã+L,<®ÀÄJåFê„eqœp“`Ó£ð×’ìgGáø/€ÂÓ¨| O›G†Â3ž¡ð …g(G¾”œÓxŸcª„…;…››…¿–d?; ·ÿ(<Ê·¡ð´yd(7gžBpðK÷j#@Ÿ@¸è·Á™îd¶·Æîj_ûúé™7xËæVš³m¼‰àqÅ]þ„‘À¹2)—Ø |×ó8“¶‘:á'XVï­$1Z°ön$æµ$›‘˜ObÒ¨|‰I›GFb2“‘˜ŒÄd$‰ÉHÌFCs”îv:Ž×áÒ2…gñ¤œš>±<÷˜™)Šm#uÂO0 b;á&Á¦'¯%ÙÏN èn#×ýp"Ê·ˆ´yd"#ÈDF 2‘È/ßhÔ´5‹lwâ_­œuÞS9õÈ»ƒŽÒÀnoÅ—m­—žPÓ‘;y`Æ5GÞª¯n »ïÛaØÒEO¾Ý½xPdC䨄MGò_|ŒÃUéc‰·ÚÀn¼ ‹ç¾Iw¶§‡›}ÓóÜîÔ°§:IÝV¶€wuOÜ”¢ßM Tl~ïßK¾*}äÙ_µå:ˆ7'ŒZ¸­™ÿnžî}Éæ}à#hа•d×tÆàºrº/€‚œÏâë™±ØW€‰2ti¼'/4¿ ÕÊQéøëþM¿«öÇý˜³}0ð7íTSÿ¸û*6(F_fϘÚ?cÞ`¡ŽÜ¨qhÂßC°á¨?„Fš–¯MNSÜô½ÒÓ·æùÙ7(¯Òáç÷þù™uuñ#¸´¿!xv/Ïø]ú㟠üc6ºº¨uD‡ÝŠïg^©÷£#0C¢[é”n­öå¯KT=.:ånqtuüóáªmYW·EtÒ¸~¸‚gÕó«»ÊùÙMå°H.o›v©ýÐöíƒ+Ä,~Ž:Â®Ýøùöi½ôXùuIªòc¹‘‡¿ó¨Ô³®Ë·?ʇùäÿâ¸\ÈOÒ=Tãt…îr;ÔÓ§« hËÅÛ«z‰•ºe\iÜÜT?nNÎkwåãËQåøò±R·Hùøêæ¤Ñé^žu.?«Ç%Ty*…¥.{âç2ÇAźl¾ ÝW—t÷Žt_|šÓýs™:åw$Órã§µ¾ŸÞ¡wÔOáÙzý7®ß“þõcªøPn¼#ýßñZý7òÖ;ÒÿSe~L-êÒ‰Xÿ×_¿îÿkhÿêÔðïzý¤U(Ö­ÃRí뾉ý™kblpj_ïƒg•¦à¦?îÉŽŠè¨ßïÀYoŒØ‡†Óxê3Ÿ:Ë27£!á½8`³öù ½öw«½/F¿ghˆc|±)<œ£vaöÅÐà±%ºr;LY/ö'øb_·_ƒÛ¢›Àʺw Ö褠™²'úÁ,èdŒúÏê~€ñƒ‡ÆU¾í†ÀueÜ\Y <«Å€ÆmßõsÑ*¡A8Škª¤ñ÷„-8€<‰GÅú÷˱¬.‚m-BÇh!¯$¾gü=f“@Éþa„ãˆtü5¹»iĸ,=-¦ÿZà\Y'# Q¬(”å\ËK4ãnš›uÏi¼êu:éá\ÊVWñp X×èGÀ¯ŒSòÖº¦&9è±Ýƒç3Œz³P(ÖëÓ1¡hÚ5TÝþHQGÏým1ßßîÔqqûKmÑ{µ°èn7¢GXÌCØŽç™ÄÇØô9sLáÿcïÊšÛÖ±ô{ÿ Ž_Òý@IÀU©EV%–äXòZ5Å Ж£Å­Å[Oÿ÷9 ©Í’,*±Ý¶/oU®Eë9Îw®æ¡®fV愯äÛ%8Ôcè]o ÷F}PŒ7-ã`Øö¤‡G†N¸6Ó ~qÌí("RH0Eø6ÔÞ,T@ž7xŠÔœÿôB´~foÏRg†IZE•Eš=QOµQjTžÈ\ªÍ伟}.ÜÛ/¡ÌÆjª6÷9¦bu‚Z™ü0Ózq*¹4¡QÍòn¬¹=Qkã xpèïkKYE’Ê|—͇§È½77wËǘ?0uö*µuÓ§¼ÐÌF™n£÷ÂRí_è®NÀ¬¶Ä{Uƒ66@ÏÝ:K{.È[À_›!©l8ØöˆrœHJ8 œË”ðÅ 3¶ê)v=tø®ÎâŤÛàÝöÐÀ;…)_ø4%]v(üR´{N(ü LÀíKáØETêì%`q0 ®HÙÃE¨=ƒ6çðøZ™…¶¿2Ç^ÄIÑ jh‡R*̈ƒÉgÎ%R®¢"аãQ*½ˆ: 3,Ö©ç™xÈüíi±3šOqœ„ÑÜ{*cQ¼üdœBõ:²Õ wû¤g¢vÇnj“9:'[,æ˜ ‡!W£^<È:º@ëŒÛ?m2,<×­~ìºL}qlÅHµLtQÒ½š×ÿ§°oîIJÛò=§øí6îì\î9>¯ ñq Ik0­öþϧM[ü„̵)!“âþ¤Ec.è”:@Hj×(C,E‚¦…‘v³F»¨ž­½/3I¤HšXÏ…q(8.™ç…®¹sÑlî”§q   ’5iˆîªë^«;|qÑ6ñ [:qª° C€VLR—‡ØÑ9ñxOqJ˜_ý´µ$亲½Ëú‹™X„ø¡Þ õÛ³á-I­vÊ9{\Æc3dZì|™1yVu"T ÊFH!-1ó@ÿ‹@Æ’z!W‘ÃØB'’ÕàOº°v=YÙ‘ÿ4›HìÑPð(õ5BB†Æœ°P¹B¸ -ƱRIðÜ ãSÄtYÁëq¸NRSÚqX •æŒ&%Xà1¦’ã0Џû<œŽ™Vð—{‹c¨21y¾õÅ€DruÀWr`•Ä’pÉ‘ðÐs°xƒ(° Üu° ”Ë´+±fˆbN£ ÎBFÝY@³ü»ÿ$wõh؇ú§ &ÄEŠ;ˆ"ÊhI T# E.Õ®£ž‰ÁIµ+ç°+Ülì]h>UË(”°0@¹ Ö%æhª¥ÀüY8œ6þ9f¯Ç]X"U(0  Ω7Ѱš(—Îòw.9Ëß´ÿO±xpÛŠ†[3ë4àE! Ó!Gž–¼4” žƒBq•Y&Þ.5¿ùYäìڱ𨟂3Â"˜$„#Æ$,P^(»Jᆞ‹Ÿi '=]µTÁðûó>N‹8¤æ.…E‹¹DñÈhfª@ØÅs‹A/Q ŒKvnEH¨ôÔx™˜T§´ÄÊñXè1Ä9ƒæX„@(R?-§¶ÜÕK?Ï4–tÁõT’Ʊ‘_Ò‘ +l%%žcØo`ŒÎÀí^÷ žë‚ØEv`Ñw9òÁÒ g¹=×áE*<Åî@öPØfÖЀÂr Ê—ò…I¡‚ÈeB€²†*šxRkýJÍ2|±–  “0DB!qHíF@Ì粓n¬dg‘ò1ó+`MBƵ ´š½\žæ®˜e5(£vGvÈõg™=¡ÀS¼Moÿ†ÎðÖÖ šÈ8;$ŽñÊ(‰âçàuRk&å9³{¡‘u4#B(¬STxfå˜EZ9D>³Ó~¬^œÜ§zsûµ–Oúûã~Š*âˆg´.Z_{£®²Æ¥ÿëSbZâ.p‰»Ú¦m†Bjs@<¶9 SÅöÃk“~í$&ëd_SlŽZ#uM©:­nŸí®!—Ù‰ï;Ã<`ÆÈœÁ(ÙA‘FÔk^šHíOƒKÙ}Ì_þSj€Ø )ÿì üëL“û$“±b™‚zý¡?Ù«ý ÚqEiCUwlN0õ˜rú= TÇ™›¡:ߦؠ¾“RÌîŒý&¦ý$ÉõåýÖ”öxŒÌ4hœd /Œ„o'€„SæBcâHÔÜ™Ú6„ø—f•SpáóäKëú†ùé.#öâ6§oîªo3qñcÚ´ $¾‚… ÞOihbåÇ•¥G¾&ÂY+%;Ä;7å¤Û¢Ö¤êë›–qëûÝ‘±±˜õo+íg[[Q¯o%vÉ 6;I7s;„ÌE ,›šÿ1r[j´#!$èt;leNøbn2ïvøS)0¾ìÖ‡˜hÆÞ¼ÕÞüNë¹½¨í.5&‚÷œÉ¦ÌÃd3ZÖ ™ÉNÈ4S)„<ØÌU؆b#;ÀüЍ§<á[blM¢ÖŒF©ù1ƒP1;þþýûΙixP6ç #qèÊsí5&£€  ·ˆŠTd˶#ƒˆ3@êÌãïo{†Ù´v{Æ2>À&vò›Ø³íOÏ2ú^~«l¦V¼ÐVÙlugØ*›}ÃiŒJd¼«v+ø.ÈÝî-h¯WÞÖëîæêqº ñ¨\fn|g‘ " rlI%±¥çÁ[„€*+sÂ7|&L–aa¡ÊÁ ²ÍÊKQöƒŸ ƒÉ†‡JR—¾;qš…åëÄiÖ2ò3aþ§=«ÌýÔþ¦.¨ÊÏvyͳ]Ì’¸öl—4ɼhêC@ÁÍNMyÍK¦V_e µóË£!9VÀb³cAiÅØE¡­ó`Y ›c3Š\¢ p€¸Væ„ï"SǬ ì†ÑÃ/EÙ‘é¦W¸üî r–¯ƒÈYËÈ!r‘Ÿ"(5( "ìE2ò8ÓØc"qM˜€Ë¤¤!—ta4yˆ\…I­ß´¦9´~3ÐúµïpÍofÝ\Äþèb¥©Ö’\­ôø¾¥äv¥5—+a·Àèfçgè;¡¡$“6s¥ksA‰­¹ã(†À “¼3%|ï ѧ›ä¿e?:Èw6ùïО…åë@~Ö2rŸƒüäç ?ù9Èru`©:À oŽ9)®¹í*"ÌyYÌBqJkθ–±•9áû·µ{î²C름ÍÃ_в†{ž…åë`xÖ2ržÃð†ç0<‡á9 Ïaø«ÀpQpÉf{ÓS‚c…`Û ÓÈ(ñl¬åyK‰+sÂ÷Ã"ƒ„Ýôìè¢ìG‡áâ/ó°| ÏZFÃsžÃð†ç0<‡á9  NpT܆Sæ(.Qh#†—°yày¶@¡« |êIèD¦„ÀNèà)Âf‡á/EÙÃɆG+`—‰wó°| ÏZFÃ? OΛÊqxŽÃŸ‡´ˆÃ·6•¢×úJß´fȼ ÏÛ7J.KK¶TV­9[êÕ5FC]*¿¶ÞƒIñTÛ¹•CèPßO‹ó¯Û#]3€AƒB ãÏX"+`²Lm²«¬O?޾”KõÚ×ÊÞçíË^Go?ŒFíí¬gÛ°Â_¶ºÐLóðkèdE±z¡ew­Éhõ—,QæŽx=Øð· ¤¹Ï:i# >Û!Íð²gmUî¿újmyrwœ£óÓïÑý‚áÝ:qà¹òãŒ_{bx~zØÛâ*üvìUºßÛ!8ìÔÚ•+Ôª^ý¢UREõÝŸÃz³Ý©7ªîvöO¾¶ª{•a þž_] ó«ÕvCViݶúýú $Op;¤‡—Ái±uШÜÕÎX½Y½«6+÷Õ‡ê]¥‹.ªW?o«»Åô_yT-Çénë»IºRg±úþûýù)ôåôûÕy£"*W§öP»ªí^ ýæ/çüê×°¶ûå×y _ž]}ií7/Ï:g¬¶wFk»?i½TT:â^ž¨Híµ5tv‚oã>7CRßýõPm–ï«WЂÆwQÙýɦí,Þí_/&év/pœîçõÕùI{ÜV{Ç÷§¤v«N­°süÐãû3rdèp_o†g?Y­„œúÉ™³ßüy{¾w6<;©Üžµ>;ùÞ©ïvj?Qíᢵ_ú~vÚÝSzx 4xP{_‡aÉô¹LkWNõ¡|W½ª<ÀßVÔ(ÒêUqJÓ»­ìŽÓÐÔ¤{¼¯7ÏVóÞÐþÍð~ﮤ©S{C4­6¢Õãê~;ãôÞ­âÿ¼{KüwVÏ©òmõá ñÿªLVò¿Y$oˆÿ÷µÙ9µÀÿ_ ÿ/>Þ²þÏ2òÕe–­àw£±ï—ʇM·røy[Ãí©hÍ´ÁáÀÈú$«²Ci£®jëX€{½¶:륕ÈÐÁÄ úH¦N‹||‹/h[^·Ì]Þ·¼õÖ'«×µ ı>Qª)pZÀD|² zôÃŽZS–ã‹í1¾Ø6ý7`…"¾¬§lÞè°A'%£)pb^L­NÖ°÷¨íPæ'K¬O«|²n[C r0]W%ÖÍ¥­`Óƒï¯%`ÜÖ¯^!Ž2—–&-H*ÕÊú{ª-[¤ˆ<5ÇÅÆ7_Ä?–VÁ_W…1ÒBY©Ïú{¢N‚Nök0Š•c€Žÿµ¢t‘…Œ‹Ô3dúŸ9 ÎÔÕ¾·RÅÒJ¹‡²Íd˜¦Ãsbp‡vŒG¸TÊïh9Öµz£!(X;ÖzÞƒª¦$ð±Õ…÷³¬ÆQ©Tn4v&sÂLàô«¯;½¡¶â^øÛ|¹<¨“ê¶úb:ft ±hÁ%ÙïV°_É“ö3‹áoÍïô”nÿ÷ôg|ñîç±™z©!N©‹÷\þÑFxè:\ "m¥Pd³;6G‘´E¤-æãýP'u7»´G9ÜC IÛ”Û,Í%f6ÆTKî`Eə֙¾ÁÐàÞÀž†e ¶ “V¦ &î`ùf1À/EÂL7<2ïý]Á™…åëb€³–‘Çg˜ùK1÷L²wo&8ׄ}­2°ÈRH3Sø8šòg¹zôèÓ4.›è4ø7Jj]ÿ?{gßÛ6Ž4ð¯b¸¿ž£CI”HåA±(Úìní ¶ÝÅÝî%Q‰¯òËIvšÞ"ßýHŠ’%Gv¤Ävlgnq-Q9$gæ7|±^¡éK‰xLj=[-Õ,ìÜ(¬®ÒåÒLG1 QìF²£1A‘¤®yÔs]7v‰äõ]YV·¾‚Í®˜2ÏU‡¨ô´–˜jûD:S…ƒ¥“YéU-½3sÑ#¸ò\5iœ !ý£±yvüâ¢ñØÔUUÙoSÙñ†j¹k2å…[–.&jÇÿðf\¸ú9³n2ÃDVN „*ßP9i§Z®< ¯•¤n™7ô´ì4ªKŸþùý: t£o܈I¤×÷_¿Ï¡œÎ¦Òsø®3 E’”òLæ…ðÂi*Š;ók)çHÓ˘…ìOùÝ?+E7~– G/ðLâd‘]«Áx¤oK_(Ô%‡ eå&ú‰™Q8Oõå6ã¹ß6ãRÐ(%s¡óå7·y·™þ>ßêËÒ”›WXúû8Br¤ºÛ &ÓÑä&*žNg󚌮&2­úêD“é·Y*b!Ý`ì»z]R4‰bs•Õxz£ï~ÍPbEq‚d!&s齪÷eá5Ÿ\ 4Q¾Ú;Ë‚œPtãQ>âÇ\ÿ…Éx‘DÿÑ«ƒTç<ž§i)ë¢È7cS-Â0†<ú÷"›¢‰dHF“Ü©.$<ÉŸ¾½óàF7@$òÎxèqv•© ø"ó–Z¯ãa2Îû‚(Ë–-hê4“}ÉË«“‹ôf”ÎË»aÊqÅÃï¦è‡¦=þ+R#ž¼;E3a]éæN#YYÞR½èuœ¥eùò^ŒÍëõŸé,œÌóGg#ýê[[šü¼¸æox«AD…Xöå¡<ºþc-ÎÙd¤ßpÍQþ)L¾™Âd"WÇi”òI^¯[KWš ]ºY¬FŸì\I.“¼Ã£ÌtY›|$„×(ä³|Áõ(v’ÊNT ©4’ÚÔ<¤å-ÒÙ<L!7cªì„³áR¶²¥.ï4Sw mkÞ[áp–Þ4_{˜ÆŽ{šöjÊ“ììš§Ñ7žÊðÑDo Õô¬eálSµazöé)‹ù¦gmzvý°i aÿ ²·©¢0´‰)CA3„€û1uœÛÆÂ‹nzq-¥ËYn¢ìÿlÒõÞ×Ó‰8–Í~×…G±i²úÈŠbÃrçb8]ä>E}×Yÿ˵nì8io÷ŠäY‡óW+yUv=“]4ОÓdTÝ)…ϧ'Ìyµ“"‘ˆÚµ}‡ñqÃÂr›ÿYý…šÖ,åô°¬°V°F€ŽÖŽš¨àpË l‚‘ƒQYȃ¸À%$Œ‰ UT¨gÝ È½ZŠm•J Û{‹–åño¯›e¡†]IM?ô®é˜B¯ALµg©¬RªÈ:ÆO' ÕÚ;sÂ’™ðàiÊu OvâqýÖ4P«ÓÌù<Õܲ4Ô9é/+®Ì³ÐEÝïÅétÜûv= ¯+î¹qatÄͼIÊX[¯ë‘T×­ò–ÎP‡œït³üg1JósQ–u¸ÌÏŠÒéóäSµ¦zu~ÔìKΦÓd;òS95Õñsþ¦žº_•_á >,½V9—Òk—¯*±¹|/ßßu=uûqn“q—ò6¶µ–Jµ&Õ—·êj˜%‰Z&?óF ¯¸ñÚ dªè襋‰ì©½"õ9ϧRã¨ç3Ú¨šUÅARç=¯V’™Zñºf°t)ŒÌ§VWÇBÙ÷ µ®v-”wzÿ£ •ަêx®¦²ü2’n I0ú¯ìR•èǤ„¯ê[×h³·­b¨vÔªf~ÌóUÍô„÷ëûb¢åø§žª/ùlð0“ò铳ŗ /]VJRÏ©1ñÝCÃMM æ×åIV£›Z±h´B!d=5k~îäIOSÙ¿k=Iéb6pÙw–ƒ~³VØ3áQ›áY½O??ñøBŠSŸHè¶RKÝlMeOxh(¾£–®–ˆ#bä‡#Ë—tâb?fAØ1ªž’‡êRE–dbÇas ²‹ËY´uJÈ©M^Þí WŸÌI+]ïŒÇžƒc&¤‚SÄCê Ë¡Žã˱hÔÌÉÔb€É»Çdk«˜¼Òüá¸MרÂñ^ÆðnرíîòÁõ‚mñÿcFî–ƒO,B=°Ô–£Î¥!´¤äñ2ø|/ÐÜÞ·kÂŽý` œE†jªE¹%Ø_³‹I{ñæíÄ›áà€£‹6W‡I£ ­&È=½k¢Ít1%™®ÒPÌÏÅã²P3.ñŽ'½TÌ© K¤ ¡"JPJóÛ™YO-1.&òé¡Nó˜ÚèwŸ-‹¡O]³Xc•|âŸ÷å¸gg›êxª¸Ww †]=Mó¸‰Y|üpñùç_tpGV8½Ñ„g\ål@cäÿÏZø¾Í6¹e@þ¡] w—wÎÙ™ÍbX af[ˆcùc¡ôzmOþì³° ÜwœÜ·÷Út‰õs¡¨Égg¾Gó =kGn¹AéÓŇ·ï>üt¼œ÷¬§ibÆ[3Gb¯™¦°×Ç›ËxôVa¶ÚÃv~s]ï››ÌòÅ|*]¢ÑÕ•þyªât’‰¸ÓÅd(Uå0*úŠÌæÒ[I%&ÑÊ•xš†Õ£_Fhß"Øc‡ŒÐD:™Þ‘¯ßêÐÁ”'ˆýl“€°·°ûÃî#dìžêû5?üôüðk^²_Ó/ª‰p¤t ’ºy4‘½¤¿;w§ƒŸ³áñýº?öÀrœ—äþ`Ú´ùUË€ûÓìþ»³ûãƒûîϳ¸?úg].Þ^¼ p€ŽÆ"Ö³9@dË—2OF<Ÿ<ÏÄ¥¬’éËòéìl“À§Ÿ|:ðéÀ§Ÿ|º—àÓÙÔ>e±?ä R)¥Wm="ÏÉ6 <¢§{D¶?¥yÜ i»¬V oÿZÏ6šDJÖå/<ÓÙlÒ-Dþ³AqÜÚºòìùµ¢xXö}(Úºòì‡$²Ç£ËÆîO#k)‹=0V-‰ò 8a$¢È綈À6 ¼ FqßÅ‘ÔÎx‰W]In—,t•L‰c…žlPŽåp+úZþSf÷ü«ºnÎ4mZ×…•a(%\»šd™¢*øþßúU5…q“¢ztkz©¹ˆÕ$mЏQa´-×½Z–±R²u‰:–Í ›¶E»7pšŠ¶.Ѧ¢]V£ ¿^¼ùøþýÅgØÌV„³¶ƒv›Hû„÷×ÁöþRÍË}ƒCœÓ»V­±iÍ‚‘ÐÜ6hÎó€æŽ™æZ¦F„````````;`»¿Óïù¾rÂî07ëÙBã¼›O¯¿¼ùyha+Û$Ó$@9|¨žz–zõûbúÇS!åg~«Í(‡rC÷Ýå>±‘Á$ `#`#`#`#`#`#`#`ãccåà@Æý"cÃãö3-umúgÙŽ4Ò€™Ä- !ÁpÀ* ! ! ! ! ! ! ! á#aåÌ4@ HXnAÔþ¢ü‹û§Jˆdàúì¢×xÌËÀ‰`,< bB°‹™g‹8 –[^†z5ÛBfm’;±#bꆮ㻄EvÀ"—ù¡l_Ÿ¹~¨çHÇbÎå`媦wfmø;SáØ }±EcSF„EIŒm×ö8ažG¸b+p7ð#Á( ±Y¶Êu4–¶«"<G‘,ƒ<Î|5cK‹¹‹RßÃ[™êZøQe[™zjÙ!ta²³Ve¸»TBˆ~3Íÿ&œé&±Ô\«O6SÓ„£ì«¹,f×b,R®Ê‹U3~ã3óqšŽ®Fž”3Ðck ÛSO4Š[Ù†ÙL„™~Óõ·a:¹:çI2ý&´Ô¾¤ Ñ¿»[.Èo\oÙô—sbÍbD'áQ$ X&ò÷mî žãzž%ÁMÄüÛ4ýš·ŠQ¡ò 1ªZ_ÔÔô@7âÇÏèâ_лOŸÏ‹õ¦ñèVDõ{èýë7çc‹Lb~nyçŽ8'þyäSjƒKË–eï>Ý•ª_½âWî÷=aùø>ÓY‰ä“£Ûë´ÝÞ}™‹öí›ÏUÇ”C<ºRo}ÿúÃo¯Ñë|Óé•j}Ó3MC¼þãœßðQƒQ2š×ûÔsª”z'ˆÎi¥£QvIyý«(WU˜µ!2ÃÏ¿þŽ~ûüÓyÂ5ý½nÿˆ-»Šþ_¿þÜ\¤c9ZV·“dʨ¨Â]¥Sé*Ö×hD"æ‹d^Š@UêóÙóxöuXΧë]*R¬ýz¢›ñ2‰š º+ fr(¦e5ا’WL"!3»nþ‹iÿr-õ4üª¿Å<ÉĽµ¦zs~•¯¾¾Ûïdµ7 ¸ _Ziæ{È‹=Šs<0)g„ø~àY½Ö ðÀ&8Û$²ö€°+™: x]ÁrŽÚ4ùC€Ð6„Spû;¸ýtÀ,»“ÛïDZïAAèðÜÅàÔ±e_£8–æ;œöZ'ììö,ÞÛ/©l“ÈÚ»ý»’Ù©»ý´£ÛoYGçõ·iñ‡¼þ¶y<äõÿ/¼æ©ôû_ýöåGÄÈAÍçJçUê‚ÓùÓÅ$Ò>S8”ÉåÔ®s–ånnÿÙ9Ók¥‰Âé"‰z“鼈^¬2ô÷n&|¯[tÈçBVŒÈ.C²*âŽ4—X81¥± vHz­>×jÐs÷mŽdŽeá,1s9â"Wpb±À¥jµŽëdk¤ÖqµÎ®Äö¢-Åq„ û Ah™ÇK\­ÓfH?÷j6pÝn^yìÛ>v-Šäÿ)"~€—¶9Øõyb†a¯uÂg Æ·Ôµ.#Ù&‘µ×µ»’xåÇ¿Z§M“?¤…ÛæÁø­jê†`|›œ:ãÇØQA,bñ‰Å“s—<‹§{ŠÅ[xÁøÈ:§Þ¹Ï&ßjèï(ßîÝnjǬÖyþ°½?ð˜ÓmµNìú6µBÙ= jûˆ3‹ ›Ú6v¨Ä^¾ ¨UÂg Û· ÆX[§J‘uX­³#™: ø§¶oÓâ.Öi™„íw‹ ÝÃö­4Ñó‡í¥oçìø¢'œ$«Ðe8–¢N~X~Ôg¿*F<xvÓ¡ ªbœ»-ýK|8¤üè΋}xø4*;ýþÛ¹qÄå3Ãêï?ÆÊ„óD„$â–g‰PãJ‡HÔ#Ëh‡˜ð ÉñPß‘£/Hdzª§\>§ß³˜•OŒÅxšª£©GýúÅá8ùèN¬³kÙ•×(ª]> . ¯jÉ­â^`Õ Õ”xåµùéúØú#æ:Y^×ï-®ãAYžâpJÊ)¶eÇC-uD~bCqlsŸ;‰ì<~¤GêÐô€¡¸ “…6B~˜OY.šçÐMæNÙy˜Ä\­DKÌ•j\¥|´Š2—%·þ[Š!0óà=ú2×ËÃB[/±[ÛÅ1tñítqŽ©xŒ!ÇSm2ŒxèÄ(^„¹ˆœ€’uñzö„zxËØÑ¾ýIBÜnó’vàÆ,äHø@ÄŠTЖQÙWq,—8@z­>˼¤:Yv”¨À‚C²MBé0ó¸#©œx`AºüÝÛ#œwlÑàÎ;¶Ìæ7 ø 3‹&ä»OÕk{ìÓãFùFõ¹¬ ü}g»€ò€ò€ò€ò€ò€ò€ò€ò[ò'‰5 ®wÜþ$i:ÑYW üÉ5þ$±ºù“ìì]yÇ•ÿ*\ý±¨™:^]Œ ¶“Ý8Fì Ö ê”˜ŒÈYrFŠlx?û¾êæ)^Õr8£! võQïø½«ê•wòâN^ÜÉ3¹“¿çéø=o¡2’í2ê@ÁpbçdÊek°$J+©\ä’FÑ«ø¨ÉöQëÊyse ì¢H}¦ýT$ùÂ3í]ý†Qܳ˵װ|_®½ö—\ûV}ßšh/[oĆ®±>ÍÚv$Ò0Þ‡»ÑøÕt×ËâJº¹¡‹ë¤Y¥Þb¼Œ–j!#ÁP£0-1¥½ Ô{Ë=²‰/g«è8ÑñÐݬîîY²¤Ÿ™É=§ ¾´n~«ýÍ£qÀŸãèãpO6.Àg˜”•ê÷7ió+ËS,S´pŠp@Wj@¥!\ ÑIpŽ2Žòô\¦¾›÷l3ï©MVXFIÒÒ('ºyª,¡Þr®œiOIyT4X´<ýýþàÔÍÑÊĬÉ2¢˜¤ 7¹+)siËd˜m$9 Äã€í!áQkVÂ]Ùo#ÖÉDBq»©áV´mùNA8”ïxšÝ[©ã' E¡Æ)NšÊ7èŽÝ{Ó-gÅÇh­$¢-Ù*Q–º ‚ïIAR”C&mLM nÊøŽ{ÛÊ­ó–eÝ“¸+7¸ø~0lãœþý-ÞU¶FáïïïîñÀWl_»¥³±‡÷ß[~,›„^OÞ9¤þõÇ6ó÷z‘C¬ý”ÿMú·#4™ŸÚ›ŠA.ïúóÍSS™[|hNPDÞ»Ac€ËsÆ#$ÔøMÙßTkõ›> Ðï{3¥X惼MÃô¡¡ý|Èí»OtKnú3ê.>h6d’Þ¾Gñi¬ûÉÜP8d€ßÔîèZzûÚµþ;D×9×.ϯ n?@ºí±? £æ›§ƒ×Ô¶kKû´f´¹á8ø.¤aø´ aÙ»5{Ùt“&ªnëë,«®ào¸þ{yÎBÁw§ƒâ€öÛóÕ‹@!ˆµ’³P $hHœHki){â#þY´Ê&ÝØ:À]Õ¢}ÏAZ1“nz;¸í/üv˜ëÈíht³"Ñ­ ÷ã»°¤p #ÇmŠj {W/½Åt¨+·MØ1ß¼Úø¦ƒ8^ù•^óf7LÙ—Ûº«ýòY ×-ú=¾[ßœ‘†qõÑðºìO|],M¿Ñ²¹Ô-,ü™® ™ÿ¼.Sw¶Q½z´š´B¥ÇJÚ®PŒ§03cMyJ /hê‰Ã؃$…58ë0â•bg»ð b§=S±³†/¸ØùÛQì¬yìZ±sVìôošÞm&SÄËĈÇ“)eÐvÝïj±³Æí\+vViÇz±³ê¶Ç-vJz%í¶Å 0^R¢oB€×8 ƒ®JâÈJ$õÒõªž±ØY#”h40Úœì"\‡p'¢Ü3ÍûIzxÞ¯†B/¸ØY&7í‡ dT·4¸¥Ù‰e£"j)þŸ3„EŠ¢ @GÚî$­xÆbg!è•Îñ|²‹põÈs*ʽ@ä©¡Ð .vVåÏŒ<ì D·¥ÂŠEéL”DSÑÜ#NI8JDΙ™.¨xÎbg¿[ŽøÔ¡gN¹zè9éž+ô°Ã¡§†B/¹ØYUB8;öHÓ-sGsH¼ DT‹ÿx‡^]ò\–0LîU<öü3}šÜ!¿k$®Ë‘š“ë}§i6G¸ÓÉ.ŠuØŠp"’}‘˜3ëï±ò5û7 TPn‹¼TVgÃCÙ’ñI 2Á€KÆ¿2ÆÑˆÈcsfR át22`£ž‹N!ëçÇ 1ȺìœOÄØrú+Ó‰à/™xžr-Ð*©^õÀsa1´ð‰£µƒà †Jæ½MÂ5d&[(Ö±Bp*’]0hA”{©´OÖŸíl­¶¾æëÛé)´½i¶ç†±7[³ÔkN·íåÑxvùMo_aãgYÞmïC¿ÚdHDz™K&RŠã3™TèS­[_£jàA…Õ•ŽoÃö)ùH{8ðïæ˜¯öïßË‹¯¦ ° rj5ÙEÐzä<E¿Hä<¬TÊ eûñµ†¾/°Vz$ÙÒtmÃaÝÓZ¼K.K-¦9±,áÎxf©‘ʳ¦¾ùÙÑÞ³.Iˆçøó]³8©{¡uõìíWßNõ~~›w5kTWZq/O©?¾¿I+óbT*Ž¢D\,R£öÒ‡>'pÆNq˪ öânTLwïÒ¸(UsêìŸ?@Û2jÜÊZ³¹¶=¾=þnF7‹RMYzì†oSÿý`¸ùw÷¯Å異~—úƒÛþí8åÁú•ÙêÄ¥©ÌûÅŽß»›Á/)ö˂ĵ;×ï('èF7.k¤îÆí¦ØÞóÕËqöó%XëíµÊ,øû¾&\‹QŸ-Ášv—]í¿—ËMk²é!w2瑱Vi…ÅV‰HLŽ\Jƒ`ö)ŠÂÊs“£êÙo”4úÜ% ŒIàs"!FN@DAl–”Dg£¤èi öK]$?wIóŒI ˆ6¢Y¹kÑ'CtCË„’cËŠ>EIû²L£xžbôó£~!;ä w©¿ºíqeB&“ #êŸðÄ0-‰´ÉHM-8M{Õϱàd5T¹®Qñ^9MUOv°ÃV×Qð¹Æòü[]+(ôž âçN~ò+0Ý–¾±$e“IJÁ $Ûá3k=6@¯zàã`¦¦ar½Ï*”L"5“-Dëˆ>§¢Ú‰>‡Õ`j(÷òj0ÕâþN\†Ù×´nãg)ÛÍUã }2I’¬riu'A+€‘“ Ö%*…§mÑ jàÓ)Ãì#ÞçeNídA;¬>E¿Hð†^õÀ'P†©Ñƒ² OljW³ `},* >×X^^†©¡Ð¥ S%âçN~Š+èX6"„è¤#ÌØ\¢›r–F¶DF´Î6°½êg,Ãì³ [[­/ˆÖá‡Qí‹DŸÃÊ05”{Áe˜ý—‰,ãÝ–¦X‰ÖF ¢(ótðÄ{Ÿ‰Š4ñì³É÷ªnF¢¿¾ÿi4þçÍÈů݆4}zƒbôãí•XïÏßýå‡1É¡˜_ß1Ÿ”¥'&[Ô±çÉ©(tLÔù\ìæs*tY¯AHfE‹/“{_´…Ü­àÁ¸TCÛÚúÉÇ.v\ìZR‹%ŠæÒ«Ò¸ñ}B0š¶˜»E•ü8ÇW%Ô,;›mëîæ§ÇÑ/г:Å´”PR#³AYJtÙ¢—!‚jÑÈ ³*‚3Z;¥—ïnšà6¹ˆéôÓ¿n¨“m["õò`w‹~xŸø/ñûýäûÜß„·ß«wÿý¿m>}åî•ø×Lñ =È» ƒ“ÉýöC¿WÇNMÂÈBmˆÊŠ;š 3î!§¬”r.0β_'Ksï¬úRIf<ú¬“¨9ëCæÀhòœIÉQÀ“òÌ‹´üèqƒË™,(ÚyÍXt œÏž©`£Æ˜C;kMÜøaóWK0ÆZO¹`]´É8(ç´ë¬$´ËŒg7¿OM¶¡Im ˜;´“í,Ò0ÞŽJ7ßöÏÙø·ñX:^D/9ZdpB™ÀdÊ,®MÆ¿š‘³®’m®«msÜæ<Þ¶à["”?¾6¿— Ø«™ºµo%Sž’Ù3®j7ùÞXnùⱫÏlȳm!r™"Ž!µ5w6¼:T€µI´Zÿ)ìÅ­ùyþÙÜ1-‚59J/µ.dÆ ‡•µª¥Å,ï8xNÍ2ã§4hè²…×ÃÑ· Ä$%ø“Ñ(Mт׀2î 9uN—wnã/B”•U1yõë­–Á£•¢*yðÊ™rÖˆdŽg¨Õô,n¾½*ÆfÜ•,ú¨ )ÇÐÒÝ<{†1p„Zæ.úM·èä-ó·™þNî¶I%s®h4’ *@äìP%‰Ë®d<ƒ§¹ˆm:¬¬ªcïÚ狘˜ËÁyí!xj¨Ä%I$g™9 ‡k)üÕF!DÆ`øÒæÒ”µ®`ÐxæÄ£Ëü¶EZáïtþ»X<ù8Èw¯–ð¢4:ŽN@ ÂZ–urè`%‘£óÇ PóÊ%`׿ÿñ‡ÿê×XིðÙ<­Ž À pP:¸(¥³*hÅŽ$ÈíL·AŠßÃç¸ë Æ·F -P<š\Bࢩ–2ÅVÀ`Ôºþ蟎W¡¥Ò.y¹½A‚”s%´dQj¨1€&-‚çhЉ֥ãÐrþâÐoªDaÔŽ9 ¤Vì—“m%tÌ.M>†Ø/&p hð ’ÕøZ)4»åPg}e¨¶œ9–¹½2áu*ìb·wcÙ†zp‰A–FûÎF êÀZ ʘ Åì1H5{ë(µÌðõIdæ"z@ &á³M>pIѲ$•‘˜ÇÙù4¶²éÎÑ}¬æE¿< kÀ¤è“ è ‹þ´Qv™Õt’÷nˆŽÜx™Ùs ìâu 1Äø –x¸á™Íh5KÇAãX¶Æ6È‚^’`ÇàuûÖª ¹ŠÙë³HÔa¸aç¢tɱZ3Â0ÄØ(¹;³§óØNj× –¸á·dÌÓ,)kØc¦&áJ딚Ì\Xt2‘9z1(š„f Ì*6´{¾ª>¡Ô$Û¸´ºˆwKMžŠB—Ôd‡Ôd m/©Éšš4øëýƒÿáãOÿùÓïÙ7úÓwÿ|¬JMB‡Ô$\R“—Ôä%5yIM^R“—Ôä%5yIM^R“—Ôä%5yIM^R“—Ôä%5¹75 ´[³nŒæ f›IHå\mª<±Í4£^Ó§û ª>05¹Ú1¢[ ¦ Ø'¿kv²;ïþ@Ÿl!TÇc›NE©çºfº¥.…„Ã3“5$ýB2“ô¸™ÉMj±1E9¸œáÚ‘a[o¼ðûԛ5]™&ÏJjpèüMÓuaÖßaiãߨ¹¹üùkÉºÝ †ÿlþx5I7yšòõìókðyñôaú×ÝÒÞc¼k…¼mæ2}Œî'³têoÿ3|ý؆`7¾­·1ú¦ìÃ,mŒ†écoz¹×^.Ý‹&Iñf¥ÇQ¹ˆŸ1p7ý¢qÈÖ×mºñõϽ·é®¿¸>9hª+ߨL–© “•Wl÷ÉkX®)0.…'1:C@ÈL,Ž®¤b”ZÐíéŸUÏY›mè@S‡1ÜduêMÝ©Ès6S÷ëj)a¹¦!5¼# ƒ.¶‘ò˜ èoÅÌŸ¸õxÖåís\ꆻ´w£E^Ùi+£¨—…·@FŒíP tÙ;|ŒâR·C ¬7k¾Á­§yC‰¥÷n*Ç=‚1ß+·—ì¿=º}—W ºõKÕÊ%[Jú4E@qG<¥œð¨’{ÍÛSg«žÓä5Çy•Õ'&[HÓq;î©hsF{7_Nð@< S- Ó:òÒªòÔ¿™ÿûúã¯Ç†þÛ÷úñVôx-“#M!`Ë*8|±e[Õr£!›ËâtEA9}8dʨ9³‘©ÿgïڟܶ‘ôï÷Wðæ~˜Ý*CÄËW®:oâu²Ù$¶ïU²•R$èQ¢WÄÑ<’óÿ~ >$j$@½Fc£R™²H tãk4>IÒXã„c˜f÷`ÅVhí:£¶Â ­Ûs8SS3nÌ£ØÕni3&˜Ô QmRIœ ©9EØîp‘ÉÑ–tD’ûŒÏÁ;îàyìSõ6N—+ȪVxF°IA/ª3ƒ›ÞÕe¹s`aã@!­ævýÔõeòû´¿w/<ÿÆFøêÍ0&kónµ©¦@e«®[ÀÞùr~ÇJ¡¾¼€Ò¾µ>¤z]}îÝ_Q¯ù1×å»kvó‰[c_5; ÞõÛÕ{ø´íµbkÞ\Ó—ÕC›ôº˜’Šeüy9уS÷]™·Qþ~ü0‡æªþõn˜TFaYÁy' Ûù.Ìî-…Ùi™aËõ)DÓØRŒ`¨o§r*x:yä”®ä7œ ÈÝ¡8”„N=œR¹‹l} í3Í#¿Vïüê×ìî‡×fhî¾úÇàîKúþ­S9o‘GΟLùn™à;%¡ûÜç‘û˜bPûš[gDx”LR‰n뫬CæÍ¶ ©íFÐô!prXŒ9d³;tñ L ÷L˜X»•ÈçLÙJìê,‘,RB‰bcéÝ —H'™¶aíˆ*09{VéåÎjÙÔJ‡,¼§ëZa™ît|ö¼H-8\MÏž‡QDž•r„—½üâǯÿõ É‹Ð\ú÷/ðãROlNB .ð׺|þ÷QÞ@æwÅ#Å–Ÿ’éxFÁæ!|½û÷‡þ™î×½ÚµU±fõOëM®š…mõÍ0]xgdWËg—#˜w _¥²ÈÖ±}RŽ·úâ}«^¥ÎKíq•ÞHCnf9Ùdæë2Kf·uíŽìÈNÈE+· Š!Å(,m„¦HaÊa$i²2Åѩࣺ¥ lQÁVº3鸻‡Ï#º¥˜öToÚÊŽWë”îlf£®Š‰ åŽKí9r„ $Áz! –ŒgZ…BÙĉ]L¾<„É—›M¾‹Æ|†&¿ÅkÒWgª[Űb),îj™P ¨GÆ‘”‚ Ãt’D<ÎÒ0܃úƒ¢ßjŸµÆ‚ °çAÑ|_Ö»K×W‘ƒÒ•¨^¦“ØðŒ$ÀƒBQ"9Òi¡$":!Œ§‚—Pû¸ö Á+“)L¨„tU%^y#ù°ØãUgQÝ;„¨Ê  <h-pPÞ®=‡òWóH¡¦ÉVØsZì+kýU¥¢ŸK¨ÿžÙÈ|Oš;ÐyLËÊŽ$í8®­#-@•ìf ;&D1Ͳ„ ³Fu<ªKÁÏ}hæUm7e\¸Ì Ä¥:é΢G¸©œ‘ü!¹¶ˆH°%Tªï´ÒÚÁ"‡°È+˜ß¡?ž€EƇ±ÈÛ¯•¶¼omw ð¼Ú>f ÐX"°f-•"I0üÉÁ"a"KÊ#Œ¶ÉÚæCåk§Ç~91ƒ²æß¨£³RË:ŠÛÏ^çÙ»µV»ø–{Ðêr²ÛëÔ¿j¶_ ÛÖ.Ž phá}3p¨R½Ú5-WàP5Ъ1Q~*u´U ý¸Z×ϦïÅÐF[©“¶Fk´•l¡­+nÕ e»-œ†ñÖ01&´MÛå0!f)"Êfø@eQ™;íTð„²ËË;s( tv¹+‚ÒÈ.'‘8\v¹‹l}vùif—?ÎÑÏ­hÎé·ßßüŠoßõÑïìîÕ7 }qó͇Íééń☞~¿ìîééÇ †81ºÏI÷9é>'Ýç¤ûœtŸ“~ê9é.f÷©ç¤oÝFŸ“îsÒ}NºÏI÷9éO!'ý˜{6#oÛ’ÓZle53m”¶h$¤þ _&8c(¡a„"¤%%ˆ‘©qžêò0l§‚'BJ‹Î×H‡¶_%žO€”0²3Ça8ig¯ß)Ý>Tm)iw`{rÑ'ÚÀZV©I .#&ŽÁIÕ Ì3ÞƒÒˆ‘vyÐ<BÚMB?2Q`1¡sÞÎÜ™Pp« ¡Š0ŒN‡‰%,H¹Ð°æLËùÜ©à)ÒR)ó‡DÓ"Ðx ÙÌÝ)Ãë!M¤°Q@…t–aÄLœ&ü=&̶ÜZËj¹H®µ1]é°Ü›?ÿD¹;Qâ“áî´óËfR/BN»“ÐŽŒX;ªF¨VA”€¿E:E±Š²Ë¢aé8< îNÜQ+ƒ¹tZnH<§ÈÝé6ï»s6K¯ãîtÈ*=0w'y,îN­òÜqwfBèGÅö<È($ ))ÄidY4[ïì_¬æîÜl߸;=!ÏÝy îNBÌyÚNGmeî´µu¥³­Z†mbÅS)Av ™`¤¡¿JŒÁLF&ãIà\ð„h;åFµÜJB'NÛ醞4h;)f‡£ít‘­?Éö4i;ãˆÜ6¤·„|óú½Œü‰tþõíà݇¿7ÒN˜NœI;Ëî´óðGçŸ0gç.™ážðÓ~zÂOOøé ?=áçq ?Lö“'üܶžðÓ~zÂOOøé ?GøyÌ}´CH;h’){<˜VH&Äbï,D24)")ŒÎT&©Ðå¡”NOšÄ«XX µ„&%¡O š„Uûá IÙzhò4¡É4cLi™Æ V *ÂJÒ$“”ÂB_ÍÅÊcÛ`‹×zük7~—¼ýéŽFï{éhJÞܾuÂi l‘î[İ¢ˆxƉÆ&ÊBƒÉ8çZ'! ³x¦v¨p °o7œÑC…*ôP¡‡ =Tè¡ÂcB….ø©C…[·ÑC…*ôP¡‡ =Tx<¨ð¡v¬ŸœøC-hô6,¿Y*kš¢Ðp%ÃcC“b޼Ýè«äÒLºÕëºãþôCoØ©ö8繚ô’,³-,a¦ù “³¹K£aÖû0@ïo ÄÕhÔÿ¢¼&Áx”ö²žIƒ 5ãþèÎNF Ûí {WÝîæ&®®ÛE]·‹²nKu³§bMÛåžÚþÚ\Y­ æwƒêAÛî ØJÞ >xíüy{ç Í¥Ú½Ý±ÎMÑÆ7¶­´fO >ÿæýß^}ñýwÿúõ‹‹K¨ÀÅÓiÿ¢ãøb “ËÞ*hü6…UJ¡Á( Ð0˜ ++¢<@£VLB %ýå¦NËhò¢„á:ãK¨È‹wÓáÐVõ˜2:öÅð…¡ž½Ñ…}þE£ þ/€ (=¿8Pÿ.êσÑ0°{þm’T'Ĥ#i'$ê<0ÐÂn2ØC¯X¡ЇåC=°. ç—ót@Û\{aŽRW£{uNÈy óàÜvÀyyÂs Ö­9ïÖÖ"š§'ŽõDz¿:W=ÌmÎR=¨íGaØþ¥Ê H? *Ýÿúñ‡¾êªŽúëÊOPÌ7}Â"Î6{±ÄTƒ¿”¶LÛ_ƒ|š€4s˜ÿsÍÛ…‹—¥gÅô? l|«W•½ò£ã=Ío–g‹l4¦ Vs¨­%æ£ò……/šˆðñ'ÅVŠEµŒqa‘&"SqeÖf)’©R(Ãa Ç’gsÁŠqœ?$ ÷ס$tê1.zJ1.Ùú×gãb¨Ûï¿aøíýåëÁ?_Ý^s3}éc\>Æåc\>Æåc\>Æåc\>Æåc\>Æåc\>Æåc\>Æåc\GqE,E+hR0•¤a¢,³GY„‰â„e(¢–§<‰aMÀç‚;ëúúUãXWwoûb”£Ñ p'äQ¾F:².y(ñìýtÖ":QàzßY±½|ó5ú×ì@«sÒaü˜D²mqͨâðò9:©Ç=4?‘ë¼ZÿuCš@f¡'÷Ê×åj t.ž†dž=(¶p©K——o©j¿Ã;ÚC®8M8xV|i&)ÃX©.ÁÒ@e/²(ä,‘4’ñˆÄœËD˜$MÁ¥–Z«ã4»Ýx_ÍöRÝ,md܂ԋfÒ0Úx«Ðmtt~Çôûx~á¹b©Â‚²aÉ¡K$þ$8މ1e…a±§MÝ7CóÓÛkZ¶êbQr:v8k|v°HÁßˋ׀UÑy“>M¸œŽnfÐea^ï ‡˜NûfY³;ͦ§!øÓBqD")­j2GÐþT3X|aX]&ê©4ýá¾W÷=VFQbd‹Q¤ ŒṞŽ`‘ǘ*Á“ €°½ `†$Õͯ§'ÜI®ú°²šŽ¹ÕƒqßX»8¬Vdš‰e,=F XÈ qÁcƒ%WÔC ÐíCèqDn$©ÅÙ1"šàkHifP’e°ø—DÑr{h[ù,è¨*ÕŽl+‘š”£DÄ)H53HÃÚ¥4¡XÔG$p.ø˜Nè%Øg°<ùh’_¤æJ÷úÖÅjµ;JšÛ+SPŸº;µsGi$Â'玺tù&wÔõÞuù+ÓF±f0Yƒsð®(Ï”=>ƒài†bÃS¬MJcQ˜Öùã]kºf°ÉF ~ÏÖ¬´G—׈ÔÛWß¾¿wk΂1²ÿWv´ \äú KkUyãཫ+á¶ˆ6šŒ‹¦ÊgE4|4¹ëbø-¸PpÉö}¿û¡¸¢êâÝinÉ“íùÂógê‹,$çšE³‰1݉T¹¨/Bõ~k|ôvbOM¾©lRõü¤Ü ×½äÕ•â¹ê8Û¾éö¡qV ‚Ú—Œ§sÎ'=I.­¤n%ïòBvöÌéäzõæ§/лÑÀ ëâÆµ¦£‚ªõå·_øãh<ÿà®x‘õƒí×CÛq£ä·‚´º^2š˜úÎÕ¥ÝÓPü²2Î èSy÷ß e):?ÏM%ý¬?Í/í?ãA¯^g!/ðÆëA£W ¼ùØ$(¹šþóm®¯M¹Y²^¿âÖÒ×·å;nóâ÷`p[\«^}¢@8õ E0RãBíoâá¨7¼Në纣ñUùî2Î ð8O ±ä ,ˆtß”Ì\Åëók£=Á%—E¸n”_ß”Í4EuÆe¾jlõþÜŸ€Žö{†PÖþ¤épt3ž˜Ì\%…Xò;û¹~Ý%æ¶x8ŒþŸ½+kj\YÒï÷Whxé{d´/Žè‰qêF6mËl7%©2ÞŽdÌþï“¥Í6Þä>ÀN=tc[¥Z2«2¿Ìʪœ&OïÃÛãý ÇN‰ë-iL64¸ÅlßÕ“öÄMÃG’Oúaºâû(ù;òzýIÏÿƒ|î¹QRsE­ó.OûÙ°$”ƒ\G?‰Ç9i|˜½0u§¤o?Þâ±;Màãt2NÝäC߯$d8¯¼’P­‡î§×Oç.úâÌÆ4‚¹¤¤ÃII: £qñÔ‹´¾EÞ,›IÃ^Æ'eäI§“?Âümº5çÃpFé±L^Š£¢é,rûYóiº˜‘—îÇDþ(Lš~@å§ÝÍþz‰%K!€¹ìxÙf]ÐOÈ9„I wˆM?y½‡¬31NÅqäGhŽë1ÝD8éÝ( «&W/¥I:áû~œMMº¼;ÖC£ôì0}wÁ$Ê—Täƒ4Í^Jè£Ñ8]LÊÖT1 GΜ¶À©ÿZHR‘Ê §³®(WÂ|Òx%V‘ŽD—l?”P_ü»S_üzõUÖ ,o^RõõnÔײ¤ËuB!yòõ½*xç"+ºk—à²jÈep®·r”Éß\,ò3“Dsy6_÷™dËÏuQˆ®\h.)ÈL,=“0s1kÕB+çÚw.C—”H*¤3Ý™‰¯¢±ý· 52éK¾BΦڤþK¸!­…Êz¦n—`Å¢ö_е© šKÞL”.¨§çà&׋²té •P¦ÚTOŽ–5ׂÂ+PÎ’ÚÌÕ\é¬èãB³. îe)?XB?™ÌŸ«¤ QeúeIÓf(ç9&[ÄWKšfE fÀ/S´™^-N†UðP³žã¯»d˜m®>—Ð[8 ôêëÍÝb'îåóeEWb± Qè"‰uOf}(¤Á0‘¢3¥ ¾—½Y‹·Q§¼3ìµÈCao¶ Ëw9ÃÊÖAato–îÍÒ½Yº7K÷fßÿÞ¬ÄoßsœŒÃ^œt'ù˜Î8(ÂNÆ gÖyì€Z›Œcñ<ˆ“˜p –U•‰ÉM~ÌïLP“”ùá%9œ÷+9ŸÍkkÇ(Kò~@[UV«ò¾2DáYt-‹5ÐÂX“¼@ALé‚ûídL8-åLû…Sh=ˆ‡½ÐO“>"/Íý/¿, Åx÷ä¯DF È? /Áò€¼dS@N9äS@þþ¹¦H{ÕÀ—TW÷u6À2F‚õ…tE®'{2RTÕטÒß=XÍÒ’Ï£)A¢ÆÛY¯¾%)^]Æ«ò‡C«e¾ ­–­ƒ¢Õm ~#`Åi囋k]áö× _dÖs•,³ºJ0ð0ò${ Ÿ ™R?‚oam <§mˆÏèY^j¿A©Ôþø1ðeX¾Kn—­ƒÊmOcài!§1ð4žÆÀÓxOcài <§1ð4~½ûL®pú~©TNU8WSY,#Œ$—l§ê|•x¤!Yp™Òÿ÷ÙWG*'‘‡Iš‹iH\;‡eÌâCèp8N¢y5ÞFø=®>{%Ê¿°Ÿm­‰.ÈÎðA?®¶¨¶ŸeˆZ_‹R•ù*Ï嵬ÙR‘8)yB*%ÛðãhØ#CÖËÚè¹[¥Lî“[ÿÊî›ÐJÌ€ßs™Áä×TOç°*è:'HX•ÙÕUWôuŒtåkrq>rÅÀ×t)$§"ù¢'»$F?xs—ÙÛ­öõ™&’G †;½têçç Фe]É_oZçÛp.šgËpj¶]«Ÿ:—¦}êØµ“5%Œ+Ûh->h7ë? Û9¯›N£cÕœÚñ±Ù0í륗ͦeu«ydœÁ—–m6›VíÄpìësèe’' =m· aõ§Å×[F»Þ1œoÇ‹¿ž´jç§f½µú­Y?moh´U»Üòf£ÙXj®m7[äÕo¶s|Tßô¨]³k›ùÃ\|Òò]˜Ç9y¬+øA|^ cÙ°Öq­n¬eÒrMŸ…;Ý3ê°ÆéÇfú úÚlÚ[z³Â¬Å1vÚßVY#ñkÛ´Ï-‡w„Ó¢Ö±7MŠŸõ楰¹çuø¾±^B±³53ÙêœÙfFÖM|j™‡"8Ü&ª¬ÒìÙŒÚNÔv½mny¹n¶Z¥™Ü€ß¿×êuãÌhÕ Îöfªµì3õ͆ðƒ,ë Ä1ÛK#°¡S¶qäÔ–½¥Õöyí¼å\œÕk&ް‰$æò×­‡mä>YZˆGÆ… ë–Î‰ÙØµ|Œ•n¶ 1Éq³"ª[<ÀQ"þAÚJú[i™Û/lH $ÁEU}Ýg%ŒAG+Ϻ‚*zHâ8°ÿ™ÒßH¿`®2‰ÛŒ3B–ƯEÉ÷ž«LÞ3W™ ©¯—«¬ mi®²÷™«LÓDA÷Žçd0;¯û¼¢ ¾‹8Oá$,¾-H¶Œ”ayà‘JØÄ³Yê06Kµg²³îéyëæÑü£}tâûÝP¬éƒ›~¹dgòÉÎä—Mv&j`mýDWç$IöõÀ‡Å­ ’(x®ï‹/@×·JF3œÑ g4ÃÍpF3œÑ gï=ÃYµûÑ3œýöi†3šáŒf8£Îh†³áì­]˜[¯éÂG°3Ü\Còj¾Fæx8øLÞÖ¾¤Ž&O oðë‚DaÇj,(ˆu]»ºÿqÉuø„·¤ü^F5¨Qd·¨±Y³¤¦1 ñC$G0v(]òB’ÜIBÉÞ²#â¾ûÒOà /IÂ’7©V·Í #ñ0M\h—üø¿ÿ&_ïP”lG§ý—̱GWþÆÎèëÍÒ—ˆ‹‹T4ŒÆNLü_áxæd±ŠóŽúƒÜ›@Ú!õDC [TÅéL]îSâ{¯fsr¯ñÅOÇYQdt7‹CÞ—SwÞ¡¼HŒo‰‚I§CÒeIQyŠGjå.´ž…ð‘(¶™CÎ,;wDHå\y\< GSÉ!ñ:8ŽØ&}Î:Ï”MÏ|{Q8ÊÝ}Ið€@Âò@ ¼Ùœ†ct[4æE8;z—|NJUÖnH=óãÓÛJEx’g0!.2¡~1E$# #&°k–·ZUe¿,0¢ïsÀVõ]™•ÈÉ$s*+xšÄ©‚€T3¥ ¾Ñ…°¼Cñ¾¢©kïÄ,H¸G‚˜W¢á»?— M|¦¿åäLßg¦ªº$§ñ·‰Ë©…ƒƒs¾¯Ë’ÎlÃJ¾(± dÖå‹„h,r¬ œ„ïãeâ)±¶vfâ)YÇ'8…(¼Âéñ-ÇÆvUÊ̾$ô9äK3JãñcÜKÖí]”®ó×^© ‘5î/û(õ¥ýfök›ØzÍ6{T?®’à ÿƒì±XµF§v–F¹gïàÛè™å–ï^%%ˆõÅÉÑ•Îô¢s|ùp*ÚÅÁ¯·¡P+Jš¸4BÑyMÉØÀ÷Té¢Çê°„X A Â*ñD‰)]ðÃ\½Rf’‹YÖ§¹+È\ż?ûuÏ‹YDõã]$X†å»”kÙ:èÿ?Ú^T¿¢ŸŸšüÖ1ÏÒ£s¹Ï¥l  qʇ²ôñÁÊEdØ¿²‘fòvab,P¤¬™±ŠI^$‰KõìŽÂÚIúŸÒ$g #Ô'Ÿ-;ÿ˜ýŒGw¸#ÔËŽFÆh”}Fám8 þš<¬ƒ¯_’³døXê³kqÒÒ݃ n«¨×>$7ˆ#䀜Æ=ÈüënÔ›…»ã¶É<2IHKÂ4š ŽÍó©”3®øEÉ¡0q'LEÃ[BØŒéPÚ¸²ÙÚMuÅ{–ÕKjqü(œ¿ÝãY>M²›ü ¢vë‚í´Oª=4‹9çñ]ËÏÇ8:¿Kâ¼Ù°ËwÞlX² Ÿ)|~Mø¬(ªŒD]–9MA´©€)¬¨ºë«>4×óäÀU}ד5Að±Ä#I”(ì~°[£°ûÝÀî<ìø¯‡Þ#ô0 À{Šœ¾¼30ø€ (ÍÚÓ&Ãg`  aèz&´,æë×ÿ.~Ω͠ê`„,Cê\í‡ÄUTIßo‡D1¯˜Åª'² Œ}Ö%'·äÀãAä“hçôêÖR?› ‰ëüç„ÌòžWä¾?¹ qûÐ^†å;7§KÖA jP€Ô À6 |ð5ö1$Ü~÷í‘c:® •H ÄYÉ“@iÂbQŸs9Î ˜Ò?DWE%Þ@æ=“׿?;Dçÿ½ ËwAô²uPˆN!:…è¢SˆN!:…èD‡šøý²Õ«ZœŠYÍ#‰y×cu“»ÏFñ0ãtYdJüt^tn]:û9™÷¸û•èüÙ!ºø7€èeX¾ ¢—­ƒBt Ñ)D§Bt Ñ)Dÿ º\q¸Dw%^G¢§°’Œ5A ª]iˆŠ«¸çbŸ)]ðÓAt}m  !³¾D-:vˆ¾g.h^QµÑ˰|D/[…蟢§wfQŒN1ú‹`tIZÅèîæ¸”Ió¬®RVrû)G2W¸Š¶€ØÌs@~Ù•ŒÉ5{ËÏX«V¯ö‘ç䕨Ê+UW%¯*UWÊxCíŠwdW$3t?ÛbÝìÌr¼‘ͱz`ÑÚ 5Íž¹ÑÖà?›­!j*¸¿ˆâOBûSåuH€@ׯíˆë—+ªÌïeîp€‰\$C%X@šÃÐdÄL’ä@0çî/]ðÓ݋Ëñ2ï™’óµèüÙÍùo`î”aù.s§lÔÜ¡æ5w¨¹CÍjîPs‡š;¿oî(QØï–p¢ÆkPG¢›±¬±HD*Ëë‚'»¼ÈIzz¹M©‚ŸÍÖmo#sy[ãµèLm%[CxîÃÙeX¾ËÖ([µ5¨­Am jkP[ƒÚÔÖØjk@}5ÛnU‰l[H©ÊroÜ#XWð#êz˜ ¾ƒ5o†„/°ŠuœÿÀ¦=çõuoÝÁt¦a<ŒÒt‘élïæQPQž)ÉhÆÞwõÇþ}¸¶|Jq‡d6{\fð-ž+.2Ù2 ?íçÞM%A¼Mq=¯üGÜ˺ºv@¨O&æ¶ÃáØññ4\ ú!|?œúh]ùDíeŠlÇõYonjZ;såÞ9?øö§¸p,äa@‘“UÜôZ…Ì`P\q˜d÷-U$ ±ÒøÌ—oF½Ù86O¾Þ ûøði2éV@º‚¼¿ ÐMòå~ââT¾0CaL!™(¾c@`V¹Ã“˜…¿ˆK’Ér NÝË îæê{p-~ãá·©)Ãwóǵp1rOôñÍU«çõô®wz¡šƒï=OÐy¯ßè™].´ºßï,»#4.;cKø~Óæ¸ÆÉñýÙ¥1»éÞ]ëá¦Û‘­n»¶oºføºâ÷Ñ ¯sè’ïybëνª…çmó±ñt-5mëÑê^ Ö“Å›îÖêþ|°ŽjÙ?cbÕky¹‡¦–«÷WÇgßg7W0–«ïÝ›¶©›]svm|£{Ñ;³áÍIgÜ8jÝÝÔù;«-ŸÙ×OÖÉ5ߴ͇Ɖ!\ÏÌØìë3téþIhÐà®/ù‡d̶'4îŸ,Û`|OöwÝ<ú)ÍûY{<ëÖn‹rG÷rRîç¨{sÙ‹]ïù'³+¡ñà_š׿xrŋٵÐ!t˜Y}ã±a_ó@˧ë~ úûÚþ9¾¶¿÷›mÆü­ß°ïgô¿Ñ·Â³ú÷©×ï ®ÄÖhð䟽:³!6º·²õdÌ]ßS' Ú5x1§i[z0ŠrVZî]ðø»‰÷ÖQçñÞ˜-ð~…¦Í£÷CS æÒÆyjü{?óúr»™ÿöÏ÷ÄyËš"}~?üïÂfþÃøßÿgÅ5õœÿ]+åÿíׯÌÿ1D¿*Ãúð¹Ý>sêFËvŽÌÖ×C<öçªì0Ç1Ñõ.hVŸõëN~' t<ö0hï˜T‡Æ…ïõ™NWù<÷1§s‡h’ èÃñÁf8`Ä!ÙPÁð*šXáý C°¤ãõýÝ0e=¾8ÌñÅ!?+"§m+›œå1 ˜ “:1£ 8!?ÌTÌxø¬ïUAøÂ ˜ùB°Êæ!Aq  ØO¡k{¡pE/F0nx?¬$‘H$×kÚƒ´Qì3ÿÌlgF¨>Ï<̉ó±}êèý_k›eWÄŸ ue¾@柩q Ú¿˜x’˜Êÿkgí[ȸJ=B¦ÿY¢àB[½“ù/Ö6ª©Ry ™NÓÊ|z¾yè×y>Ñï;}Œâ `]f8ƒ¹UeÎЛð 7Ãüþ†iwêu£Ý®k‚,àŒ+Âýá3ÉD¯üc¹Þ?=©ÓæWÆB&:/‰k‰¥ ûE ©É"¡*"ÒX i«K*bÌcÞå4EóU¦tÁ¿dW¨Hx_ÂMãN"0ó\Æñ¡ŠTNÐ8u §„%ø¤ñÒ‘è’üè‡Ðáp3\…“”xá÷8%ÿJ”á}¢µÛ ¤pAv†¯ú›n)Û¶Šz(³ý¡a’.{M-JUæ«|qiíº£õ\šÇŒTÊ’çÑäÓþ2²^ÞÐÆ§UÊä{Jë_Ù}h¾Ä ø½-Ä©šêéV]ç «² »ºêоޑ®| \^ñ+¾¦K ùœ&(’/z²«ho¾åóv«}í&Púˆx\N/úyǹÒDz®ˆË¦Þ´Î;¶á\4Ï:–áÔl»V?u.MûÔ±k'kJW¶Ñ8Z|ÐnÖ¶s^7FǪ9µãc³aÚ×K/›MËê8VóÈ8ƒ/-Ûl.>6­Ú‰áØ×çÐË$OzÚnÂêO‹¯·Œv½c8ߎ/=ùö®õ«mžÉÿ /_úîÝlIœÓ³K!mÓ…P {öäÈ’ ¡¹°¹péîû¿ïÈv’à”ËC©?ÐÆ¶¬ËÌHó›ÑŒu°¹ÿ¹¶u˜µúaoëóá‚F6—¼Yß«Ï4wØØ;p¯~8:l~ÜÞZôèp³±¹hÕòOê@¾oµcòì~‡ônŒ5µz£zðqs«:—I³5Uqæžt¯ºut¬iU?ÖÒ+èëÞ^cIoî1+?Æ£Ã÷YÃðÜ6û»MÜ$ Åbó¨±H(¾ní“Å}Üß‚ë…õ:ŠíÌ‘äÝ£F-#ë">Ô…4Ñ"ªÜ§Ù‰ZNÔíÃÚ’—·jG3’\‡ûùëM;ÕƒM¨óp1Õ;S¹¸@½JþrÓzqj‡3#h@§ÕíÄŽ[ÒêáþæþAóÛÎf}ŽàE$©ÍpÞ|XFîO3q»ú­ó¦Î§Zý¡éS½×ÍÃ*]s.ð{KuóÌvm_eÞn"_Ö½Í+„¢Õ2×e(Q(b¨ŸIúʸj… ƒ0$&ÈÎ+Tð…€4öö÷§Hl@°ï»¶È†']WöÖ‡ì ’CŒçP9B®ŒŸ‹’O ŒïBƒ Ô}.T{£„ñ:FÑÀ*xxç°ç :8 ¼m rFð&Ñ1ÕXZmEdJ© 0#&ï…PÈ„†Ê8ƧTñ˜3¬¶™§†œø!ÈùËÓb>‚t’ gÕ÷L &ÇΣd1t{•I Óë¨V7'3Þ¾ÎEmw´]XMá°ž_ŠIÂÀ#îØ„ÿ/‘¹ŽíDÐY0–¡ËV?Ùå̶)“¨Œ‘i¹(¥t´W­a|pzPÝCÛè[\ÿüáòú:ûÌÛ3±"[PÒõ$`¥5Œ–Ä Ì”Ízüº‰®z$]ÓÖÍIÇ›¿`Ú,”!íŒE‘ÖXÉHƒU†‘sʆލÍw¦Ÿ,BiÈIövÀ„2BDD*0ö„bœëÇaÀB”;cq1“CN;b»æ²×êï„Xœ%ƒ[›Š#5XÒ( Ú*¦h(4lŒµ \Äp•”„Ù×Á²Kc'ࢫÚk .8Ë5${ݤòQ¿“I[õ3Fúã:îz§‰$ÓjgëLȳh?#ƒ¬ÂŒƒ­ƒÝŒåZ˜8`ìÞ Òµâ1CxpµY8ÿžt›(Ì©–"Ö`êÆH*c,Ó&„%=¥Å8è*ÉË1>£AB—¼Çý¤­1cƒ€EÖXÁAšŒdg ¦J`Ç"|N'Q ø+8gI0V!&Ïö^ò@G$ŽPh#…JXè+"”@’£§`ñ ád¸`™ÙPaËÅ‚ÆQêTÁ4£až»YPQž¿Éð—r׎†}hÊ`BBdD€(¢ŒÆ±Bi$‡py"§Í.œÃ¡ ‹±÷^÷©±XÅZE7‹¨ÝeáÎ8¥`„ÅÌÅ+C (®• %CÍCüD‚œŽtÑRâ÷ø1N…EFBÆX„-]Ä®›©áÏ,½Ô`p›¹3+BJ¥eò2q¿Ni‰MÀ™æ Á`†¡ˆ€T€²OCË©ßwñÒ/ ‰Âœ!„ÜÄ–4þR]‰`+ Düb¿‚㺷#̬äÐA† vQäέ`¡@\¬çöÌ€ïSa»#ÕÀœË­¡…åL3ú…)i¢8ëL90@°ò)H5nõ”Ê3üþ b¬  &L±(–6Ò$@ Yl1ŸFd'ÃX¤È(.¢å#âæWÄšh&¬‰l¨]Š‚0€§E(ó¬SÕï¨.¹~žÙ ,ãµváÀý+šã5¬†µÈbä6FŽ¥ÉÊ(‰â§àuÚj!Óº³ïÂ"æXF„PX§¨ä³€ Ìbk¢ž†ÙÙ8/N!Œà¥]˜Kc’$‹f†’øˆgó5z{£®ñÆmýï»ÔѤE x ?‚Å+|0P”E°îÊþAÄ9go]ùÇe¤¸š&ÙR®º‡”®{A™N«›v7G—ð–Ëh€ûá.0cdÆ›”æe%¦Qíº›.ÄûÝà\õ“íè©Aÿ.sG¬Ð•ÿé š—@_}›¾ä\\®¢^Øœä<Àø¢vÒPÖQÓ{\;®ž~èÖßpÑéNRgû”øÞ72Š5Ç^=ç‹¿Jg“"—ç·XRÚcÊuh\d`Ïœ‚§%@ r,¡ˆóp¤Vn®õ{‰%Ís·H)xïñäIëòŠ5³Ü¥æ@÷’>ggá¢g¹€ú1mÚ _À:ÐÕ·Sº ûqcY¤RS SïáŒÏ)ÜÄ©«'K¶z Tß^µ\@³;r.'Pÿò²q¶­÷ú^*°s¦·¬hµp€h•ô9 ©Ï´R¾DùÂÂ"ÏL;ò |¡ 2»Cñ éX©P ¯x@ô3ÑðÕ'wϤ¿>&¡ DVH.'y iÆ[ÑÐ4ù2{)Š BœD> ö˜®~„9üŠ)7\bx–ú»ÓU*ƒ<£QæÕ+ €\Z῱­ÃWÛÖa$ yªlgÁ ¹>c:1b¾¢˜ûFF„pü†Gq˜\Å]°Ž7FOž!¾X†|é{þ|ÜB½x¦|ÜbmÈÇ-žÕš@Ö}•¤î®…ßÿªv¢£Ã¥`%{Ù YᘯQ(G"¦’À*¬`I:ða i_Æ`è’ÀD&"^á‚¿Í7jЉ‡*-€1‹Õ`ÌsÑù­£F®ø=Lú~³ËR®Eë(¿QóÔö¤øé ý«:¢«üÖÌË~k†É‡¿5#_ëQ[o'®öÝ–—kØ.{h5Ÿ MþµÎ"•{–‡¾"q€µ •W¸à[ÃÏGƒd^Ñ ø\t~ãø9@«žpK¿o<aùCø¹h%~.ñó³âgL]Ì}¬8bÆçQ§Æj‚­!œéÀ†V¤5RÊ–†!åVòw¿:Ü w¿ÜýÒGÜþÚ§îþHÌM{Ô1RSc&=H*½?GŠ,?G* •+á~Ab‘@øF+ê3Êݧ°ò-6°¨YÐ 4ö |k¸ŸÒyß옒¹8î.:¿uÜOVÅý¿¡ß¼ËÂýEë(q‰ûKÜ_âþB¸—¸ÿÅý?wimr.ji'̂ǀ?ÆNH ‚œ…0=6µèV« h~¥Ý8‰¿ý€1î³XJ_am|c,£ŠRnhæµ.Rð­Y ŒÌÝ2 ´âîÀ3Ñù­[ ô°аüÁÝ‚u”VBi%”VBi%”VBi%”VÂßa%ð T³Ò÷¸%•<"ħ!ŒžûQIŸj¬)Bã¯B)ø¶0ºKä›÷‘Á)™Wøúö3Ñù­côàÀèEXþF/ZG‰ÑKŒ^bô£—½Äè%Fÿ;0º¬0±Z”½Œp”œ¿!9Aâ(w«ñ©Òa¢(ãÆ+\ðmat\Ád.FŸ¹8F.:¿uŒ.VÄè!—¿F/Âò‡0zÑ:JŒþ–1zúÉ®¤— ýi@:¿Ò×÷ẔIÙ ,«?‘TÁUP…æ [m _öEÈä+³ÏüÝÍ­ŽÒÍq%±ÚÀáµZmX¹!uƛҰxE†E"¡«ó¤3;aí…ŒŽå ¤^Ù¥Æ~kƆ”J/˜D %¡C©òšÉ.ÀhYàØ@¸‚Èj›Æ2Ђ:ò)Ÿ<ðÑÀšÎˆŒ"ЍW¸à[3x‚9OFf¶šÁó\t~ëü ž",Èà)ZGið”Oið”Oið”Oið”ϯ< fÁŠ©ŠHÛ(~Ä„ñ¤PsŸHN¹&¡;¡Ã+\ðÍe)àÆFFæŽY}&:¿icÑz5cƒL~;c£Ë26ŠÖQ¥±Q¥±Q¥±QË ¨o³Ñ8Øpk[îPWWô°íÀ¨­ØÕ¹l[ûÖæ¼Ùr|ù0™Çã~Ús¬æ½uâÞ¿j zý¦kzrÖÚÊÍ£ ¢ñ‰PÉ™j>%;ãäǼò)Å›îlµ›YÏÐâ®ær–ø«ÎÂGéJ0Xª¹îÖþÃö»¶õuîˆTÇIæ²½Þ°iìU+Gõu¸^¿2s‰è½L“=êó]Ï`l:b7§Úýhí·°@sŸw½VCP¿™U&Ü[Å 0hP‰n.Õ$°dy®5Õ5Þ»¿Ž>T·öêkŸÞ¯Ÿ÷:výçhÔ^¯Àò¶ þy« Ýt?F‘M¯§=¿ëMÖC¯?8÷`ŰrnGþïÃzéb…AúȃǾ•ªÏ{ÞZíöÃÑñ·Ð^½­Žo®¢ãoèôû—ø„~ÀpïÊp]ûë„|»Œ>Éáé÷ƒ¶nË ýù¯u¿´5‘XwêíÚjímü¨“zº}6¬“ÓÎn ¡ú§Ú9®þÜmèáév»µ{¡oë?è.üÕZ×­ˆ~¹<Å©cÜÖôà<ú¾ÙÚ?¬ÝÔž°½ÆîÍîÅÙM}ÊvÑÙîÅ×ëÝíÍì¯:ÚÝÚ—»Þk¤å¶:÷Çao¿Üž~‡±|ÿrqzX“µ‹3tºm:uò•í4Lçô¢6¬o´ê[ø|÷g•î N.júŠë?wqý¶6¨uä­:6±ùÔÔÑÉ1¾vc†q‘½í0¾Ûm|…²_dmû+›ösófçbólZnó&)w}yqzÜD·Í§o·ßIýÚ|´tçÛψ~»=!Gެþé+=½0?ö¶=íœÜî4¾¢“‹¯Ã MýÿØ;®=k´ÞÐ?᯵³õåJwÚÝïôàhðÓ|ú8Ô[nÌUZ¿8 `|·{ÛUäÊÆ‡›0ÆÍ)MÙum{R–{¼ßkœ,âýÍî¶~E¼¯Þæx—¦Ð××CSè3Z,§®W#§7po1ÿ'¯‰ÿÁ’9u³×xEü¿¨’Åü¯Ý¾"þßÖósê.ÿ/ŽRþŸ½¿æýŸçôkÈ<ßÀïÃÃæVõ ÑÜ®¼_·C½>U`(€­88]f5¾V~4êš¶Mè°×k{`Ñž{©L¼¯wtê´Ê»Ç/#‰ÖÕeËÂ~ 8Ü®½óz]ÏAw +X~¤"hùÎs`²©;æa˜2_¬ñź¿+‰e`e‘»|vèdËÙÑœ¸S•7ìÝéû!ï<5ðÞ9¬òλn €¨ÁP±I]¡s{Á§NûK·õ£WI¢‘Üq³iÒF­ñþ™Ï©@Ï|̉ûñðsSVä¿Ïm" ÁCM8.Ô•y½¦Ö%˜hÿî F‰­ ÐñßÔ!ã}ê92ýç smµo½Ì1§QRaLš©˜V¦â9ñÎC¿öÇ®Œiv¬Œëz½Ñì­ o_½ïÁr3 øØêÂýxÞáÑÖVõðpc2'ÜÁ¸ú¶ÓZ/ôÊ?fë}´P§Í­ß‹tÌèbÑ Z!3Þÿ[¶q²Qñªàug°5;=cÛÿ1ý™ ü~ìáG•¡Á2bÛ½ñŸm³eî^‚+ÜêÆ}¶:¬/ºá²âÇc ܹ¿!Óiu[Q'¿Ñ‚+sŸè¨›ûåØÒ ž9´û…=%ELMèÒR´ˆHÅPL,Ã\÷Al¢qh ‘2âÂð Ä6­’*j^|Ïã‰gÏܭޤý›aæ9ƒwVtO%¯LÝÙáé“'¦5Hn4aÍä}“÷’vF—“7:°Êöoá&¹œ½ÙìDÍÔý•øJLrÍ8/ôô…Ä¡t6SŸÝø"#_Ýi¶ï8ãj¨ ÙW²ûlz?iw|U&ý—ÌGÏ,aÌ2ø%°ðã˜(©hÄ ©¿x!/PÉ‹§á…B\F¡> cé3-¯4ýȆ)khÄ™ÛhxI_•0” VŸ“áˆÁQ©Õçku,J­^jõR«—Z½äÅ+×ê”U(þmu‚ˈQjõûZÒR«—Z½Ôê¥V/yñʵ:“IÑh«“Á2b”Zý¾Vg«æW•j½Të¥Zÿ›Ôz[ìfjs¼qkot{dl.F3+ð„9i…s¢O³'ƤyÙÝ\úAv'Ÿ¨0yu6·#»}Ùï]ÀY!§${ñ^ÄjvLåâñ%xzàé…$> ‚K„ì­ N¨üZÝ=ºóhšš‰]‚ü‘Z—I’¦Š„¢‚ qÙšc­×Òù¼]ÅCab®ý8XÇ„å>Xh±ò0‚8`2JÇ{'³nñçã4§¬óhiæðÌñ¾ HkŒ¾’âÍÑ`¹¦Ð-»2”{/_4î[ à©“5€¨ßÌàœ»ëúrÛÁ›è¤ ³õG]÷5AÐVc’¼—¥N¶m³ ƒsá8:¦t/¡«êësG©6S@”XŒîVuÿdË?èu¬•<¸²]“d!¯mî¦Çaô.{€#n“Š´m·'ðÇá”á˜xº×·ã'Ãs ³I®’Äf ò”>ý¯œ°$Ì l‚}t;nçîgÔi÷ŒǸutäk\7yãÒj_ûmwq3P)Š»T@h?nµ‡6©W]ݤuÜ ’ëNç&¹ Ú?k'×ãÃL±¿Žº½V÷ÊŒßkö.‡iÝIP*J]޲ ´?&Û4Ç9©~pdt©Ä¾>OR${ƒ«ët˜6éÎå™Í 6«ðÿìysÛ8–À¿ŠÊUû×xx*Õ•N'³m»7vŽöNJ ÂX׊’í¤Ëß}ÀC‡i™²%ÙR0]5‘%ÇðÞï=T¦ø.ŒÑNÒîAZý§#{ý«ÁPÅ Ù$û¡‹ë]¢ýxU·i~½H¨CdÜAP‰ÞXV——FßD¯­P7BÙùï4 3÷ÅTxÜM²ßæßAÔéŽ;òÿÍIÁphrÃRÖE•/»y³˜È…Ñòû8¢‘0:I/CìB½ìéë¶…—¦¤Êãeh>Äi;Õ›î‹Ì›Fjñ-nuºÙXPe]¢²ó6 `,¹Ys2‘^&ÃQùk4ô;ª-¢ùø0GyüTÃ\<Ùp’EÚ¦»‡š3ȨeýP:,ë—¢°›oþé¢Þ({t˜¢¯)˜ü¬ºù¿Ñµñüa*Ä0–[zò˜öw8½Ä”ðM ìSÔ¹Ê+“ªLåPô²v]Óh¡Lí±ž}0¸:™L²ß•i> 5ÙLˆ¾¡H ²3×Iöloƒ¨˜RC Ú4ÈÈ[ £l2E"ŸSå ´&²…žúzcîå >¸üTæ‹T›/ŸJÏ ATp0_‘’(à®EºÁاãùUæ‹XóõüÍ׬¦+lB©yŠù}[ñNTV¡t+§à¬i(tpa· ”ëßB-”ú3×D}6™÷¹fËÏæ¢T]…Òœ1¹ZšÓ05PXÕÒ*Öw¢CgŒH¦¤sÛ™«¯²°[öoÊjäÚ»Ð|¥žÍ¬I©ýg¸!W­¥Éš3·3X1mý§lmf‚&š7W¥Sæin 1­K§H§7m„rÓ6ez j˜µ\S¯¤œ³™ÕÄèܲǥeUܳZ¾7C?¹ÎŸ˜¤œ¨rû2cisÊ™g²i¾š±4·¬`~¹¡ÍíjI:9«LñP‰YóüU°KÎló9Cop–ôæë ÂgîÖ\|¾Ó@ ô¸ƒœ#1„9þfì÷Ë,$ûäÇ:']ñ”Ç:u-\o­Ç:¡âuëœË}3Ç:¡Ðü¤ê6ßÂ/Ï?™3÷_œãÎ_4Ÿ¿;Žåa€ÿú|Õ†¿IØûЉÚÐôCÇœ#ÿü<ÿ||v?üüâ|¸”‡oSõã_ƒ°§ÏØóü¼þ?J˜>ÿ?ÖgÒÿø~puô¦ÏOÞ´èóîç½·aéºÏ—߉<ü8:zÍ¿ËÃë«ððíøü”w”>[~xÝùC§9Õçù ÔUŸ[ÿ×ྯunþçÑÕñÙÉîM8š»"ûíuw‘ ®½÷ÝÎØäŸï?:»Ðí¡'¯ÙõÑ÷÷оWW'ß/ØÉ›÷ú||7úüa¬ÓA>£èÝ'|~Н  8|÷{ òö|bú.‚ððãX§1íø\¹u;ð}sö?~¾"G??fçìçïùn~ûŸ° ù~2÷Äýô=¤ü"y…º=ïÒD|æ:ïq~ÀõÉ™nÏ_ Ú÷C÷ßÑ›WîÉY›%Zþç×ç‡LËò!WòˇÎg¯Æ9Rè'ÏÇñù—oп§ÐëvŒô¸ÑòŸ?À÷uîe€^{óñçñ©¾—áÈ™»‡…›ßþwûÇãñ›‹¹û0ÞïÊx¤ó÷gŸíÊxŒ~ÎÝ·Âve<ž¼ù8w?ÇÁ®ŒG~ücf<ê{Ivd<\œÎµíçδíǜ߲¶Ùûbîw,¦¯Qy:Ç‚3¾nÇÂ¥|ŽÅtîr,ô]?ÜÞSë¾#,×zaµ)ãìÊ8] e蛾è^˜ùm”q}e\¯‡2ômgÝá…™ßV`‰î±Äë±Äú&¹ä/Lÿ¶ã±Â Û•ñXá…íÊx¬ðÂvd¨Í¯ø&?^šWs¨ôNF¥5aÝúNj:SCmUBýbÇ,ÃuU¸|ÏP7i›Ã½ºµýtÔ˜<“×Vïæê»«­î×Ù÷kÍ¿Ïê3¢îŸ~•—‘ÚÃË~PÁåk¼Œ r6ªx©•»Ï1(õÿÆx?;W“¿šmæ-VFÒÌw›ÝåF›ŽOv Iò÷S% “;ËÓpBHºHN'>fN¶ NêÌŸ…˜âº8t”t‡Ö"¦b„ˆ¤| ¡®ï;ñ4¦ÜYJ«€u+TÍ,°4 •³·B³4%‹º­Z¡mzxé³JÛ¸Ö²iº$M¬×05ŒhÎs€; ¸aÎN˜?Õ0éKó± “®jhÎ^&½Fª— eÚ\i´Õh”;ü£D5D»=Tí²øâÔP?eo}Üo8.Æú¤U¡ß¹°¡])ÕkŒ®ú2D X”ªC „‘è°DÜyÄ¡yoe .77›6ìœ<¿ûÉHãÏ“ÓZv1–ÉÈDc:P‡ÔDüôަï°Ÿx aèÇuD°§2BB©º®ãzÄ´Âa˜~Í'š•*ò0üÇÅ…XFiï]Æ ¤QßLœÿûz³.2y´Mœy/ÜÐ =.¸>ØòC…˜È‹$ñ¼‡Ëj$ò¨o‘hýHDVŠDsÝ¿˜~j iúÙÄ^ñ/&{kYð+¬E€«b¹‡ÌáÝ#«0Ku½¹0QXDæ;<à“PÄ­°CUxbãÄìT(b*+M+Ø ÒEͶ!‡Ç‡ìÍ©Ûq˜ž&•¶u:AFŠO£—ãQÒIM“Zæc¶U@@¥ÀC%àÚÕh<ÔñøáX;¼Zø˜¬txõ¹éÖ¸O·Lš‡´Æ”ýbR ³MüÊ&ˆîžsh|BÇMµxW}ÂY¸h-Ë£ùãyãäøàôÝÉ™¹ß"ÎL0aõ™ðx ðÍ3÷âÒ$ IÈ8G*ˆb„û(E‰"åQ¢¼ PÔ»c±ÝƳ·Ôy[ì³Õµ"֍м]Nf çXy[ÒŸÇoÞî„ã¶PMÜŠÌ:Y¸v¥Þ^½¹¾'oé’g}»Û:wÆÛãQ(!i·ÕpêN➺µ†ã^KG©'N]ÜUd6*™K¥zr?Œ¦ï¾ßÇt}<{Ó_|“ÈÖù˜õ‡›YõöÒER±.è ¶ä1ÇRÂÖù K°áv ÄÉñá‰E ‹kB‰½¢RE‰Ö4`ÒSï­0–@‹o–8X3ðñ/LNå>»R*–8*ˆƒ-Kö5 –8žœ8Ì9¬ƒ7o,sXæ°Ìñ˜c…+V´I9ÅÌ{¢+ÞÄ<øu1 {•;A*®Å¨»0Š[Œ²e1Êb”Å(‹QÀ(Þ$>ÝÕ ‰¿ešHÏþ—uc9Õ:h19BV!„8¥mÞ¸ìεåñïÉm IOjY—/¤ÜÜU `‹Æº(ÚÄOv»BQ2W‡Í]˜0]m‡ ~r˜XR䉘#¦ß FB"Ž]K¼…\–;7„kíN?x,Ûì+û9ëßì¥ã·ÅûA¯%[¤Ÿëc™\&¾ 4F{ÿµ7Õ úµ,Ùˆ ?¼>9::8Îze095%_ÔíìU"å#ÊŸËÛ{p¾n¬À•ÙU°ªÕ7Ùðt‘l,M­€¦rCoij[iªÖlªD( L˜,0Y`Z0ÝÞB½Êx׿wAó¦ó,÷$ýùêìõ»Í!NºH:»I`0­µñ×ãöE¦ôëZ™¾ù対͵Ey$åæë&±Ø ˜Å6‹mÛ,¶Ý‰mS‡-²mÙ*çO´DÉ\ÇFÒîX—Ìec#i«@2Ç~·Hf‘Ì"™E²;‘lêÐ¥E²HVnA3þ5ص“„æ59g–Ð*/e*ec ­‚Ð(†v{·Ú´l,¡Íš–Ž%4Kh–Ð,¡YB³„f mm„æ4}ÿò14ŠÓE²±„VAhŽ%4Kh–Ð,¡YB³„f mm„Æ›·'üJB+ec ­‚ÐìIKh–Ð,¡YB³„f m}„æ7±çýò14¤‹dc ­‚ÐìIKh–Ð,¡YB³„f mm„FO<ÿ—¡U„fdXB«&4‚-¡YB³„f Íš%4Khk#4ÚtˆÝ‡F+ MËÆžå¼‹Ð¨%4Kh–Ð,¡YB³„f mm„ƚ̡v•ÓKÉÆZ¡1Kh–Ð,¡YB³„f ÍÚÚÍmr{–“8<]$Kh„æ.Mh®%4Kh–Ð,¡YB»‹ÐN?¾~}p`ßÍùMG%žŒÑ¯åGI'5òn™F^ ¨Ô@ G ŒÑ¡‡ZG Ǫ‘€%'M`;TÁL’i#‚ä-P:I§e=¤9¦ð“zè6âW¶ÉõíùÂÒE²±Üi¹Ór§åNË–;-wZîÜ8wútWoÓߦ²4ºáeí8¡“.’“åµÇóZÀ‹kÛ‰kœX•è–ç˜Y¡Â~‹ˆˆ|aäû®B,P^à"û" 0&檱 jT›Äbaè¡Óy‘$žàP`©oåriº¨ñVÙXe³ÕÊfÉ)ñôZ‡± ¶Ö:¡P†J¹ØE~àňE¡B>5¯IÎZVñFí„kPczi«N‡Ñ&y‘M¨ô…Ϥ{ÐK^SÄXÈpˆ‡dRzÜs¸A%NªµãKœ¶Y§W¬¿ ‰Z9ÖrÓŠ´ÉÝç£ ïÔLE|¨¨îõd` 3\æÒéêÖ,Î\)ùlF‰ÔùÕíØ,—¼öÈcN ËÈÅÄ s|HûÇ8@‡LEAü2fÄå‘ïHÏç.£¡ëú‘§")1c¾ÁÆÕðº¦ôSk_¿É)YJûÆq¤É•#éºHG(tY€0l)®µ®z…qmªÅ«z%ÒD‚õUïºDøK«ÞŠÕI×ç[§”ëtù}J¹nX}nŠ?#Åý÷^–ÁŒå½lÝ«NNzí£X´Êµª£ QV">¦Ä%{wÆz iïÕë³÷Ÿôw ѵò•?ßűÐ'\àIåQæÐ(”Ò1kWužÜ÷D1&˜;,¦$0­¨ÏFd£“wÕHÀܺá7ùŽß÷Ù‚¡ƒ‰òcáaˆ'½À‘*¢DI걈+WGBqL¸r\×ñT`d’tÁ²MÉÒÅRQÈ~€˜t‚œ9x4‘ç‡*p±ãÏ-¢Í/)éºÍ-jÕ¦2àPÕ©ƒÙ±µwÄe? —ÑÀt Ñ«\¢«?Q_/E&éEþµ|S]5º¾Xwã•äûäôD§\í’&ô§YÌT×0Zé@E©)éÛUkØkï‹N§¥ŒÔΆcµws3Ùf]±Ž¦µëùÞdµ­z©Í3IÀ“{–ª¬¼¥Æ+Œ6B¹ïø¨§FzU7ë¤\ÁÂ,Ïߌðu0nâ¦'§èàËzÿçé~±ÿ,N®¡¦3¿¡£W¯÷»"j™ÄbŸ¸ûŽÚľ öƒ(ïv/MßÿyÉtª½éoÜâ›ÛÃȬŒ>|-­b²UØÕáåÊþš‰öÍë·ûzœNÄI[—zôêøã«?̾¿a¿­C>PóŽxu¾/.EÒaÒIF?Z?A›ëçt-Ív“SK“KUŽPøþB•ËþùæÈðôÃ'ôñôp¿#Æ=0ôw,{ûÜkbó¿½ÙçFjØ…É3f Õ&GW®=ìHÎî*ãΨnÔéŒ<‘^´Ê…{sĺ7›è²;I¢W™.Õ\‚ÌÌa™FÏý~Š`«žT]ö;ã®J÷ó¡Ò# 8²ÜÛ.Ì_±è¤êÖv†¼y#ÑζÐÞltUœÂlåþRÞ„G°ï„B‚sA¡j×Ñ0FÇ>X+ ¾Ú ·Æ›ÀMŸVrŒƒå¼‰u‰p×½‰`Yo";\±UÞD.¿Ï›¨›‡õ&¬7a½ ëMXoÂz¿–7a}„%|ÒdÁrë½`bÏÕ[óÂFvBУPº2ÀŽb®ç7j'|¬À0Û”P}„ $˜´œ°.î¸@ɲç¡ÈÖ¹uzü>¡n÷¹ÿlDßÄœ„—ÏÞ"ÿÙ{ ìY-Ú‚.8îÞöÇ=iˆ*êKmA ž¬Ó4ƒà½÷ù¤F-MõÇÙèõGú´Q¬3oîmÜj¸[nÇç.FØ}ĸÞqÁèŒ}7 h›©¼Z ŸÉ.!Já.WÈ ¥‚î¯\ÐÇœ&ÜHŽÀIï"_r©zMRü¥ Çv-H×èØ{¤kæñ+îª3¥Ÿx—…qF¥´/VQD!?„̘/9ò#.4ð|æ ø£Q;ásˆë×T½~5³k ²åTïºDh™}~—Û:¥\§ËïSÊuó°qý•*~œ×çÔ÷Ò¶a}ÖXXßñî ëSò4a}a}íóx?dÏ&¬_K/¬)¬_¯ìí ë3f7 =ý€Óô°·\(‡†¸"±Š °@Ú.!ƑŜH7j'| uã8®ŸÞ!AÉ8ΚD¸ë΄³û uzüÞOÍ<ìÀz]‹åji¢g°ÀšÎf/@yÄÍ•ÚÍiuAòß&ÍÅ©/ €›.­º^É´“Û{V¤Ž9µ÷SnÝý”÷OŸJÝgÊ¿å˜Ï´¦ßIñzòÑAà׿ջ^Ï÷=”埣Iÿn2öµ~)Kpîh4¾ïÏN˜48hN€aní ’ØÜÏxt¿É‡@²Ù¾<¦|GíøMC±þ´>ÄaüTá¬ÉÝǯÀ±›þ”ºóM›Lâ‡[ঠ.ê!s©ˆ&S}ìeáë+ÇxúÁµ˜QpåñìÉàîï7'Åú?ªÆÜ žÉuϳLisC¡ñß­CÿuNÃ|Àeú±æ\r ŽK‚,ßýkîg.î›Zã§AÖXýúàÌP`²×œ3—#§*)$Mƒ¹A&A‡ Ç脈–i{)©?»“LÙ¥›Tîús½Ïg"s7Ý,1xÍÒýðÑ/È_µ®ã:™³fµ—}€ù~¶ :wUnzÞ¯:eáa¼ôW|M«#ùdc­îúyXüžÅ}|¿Ô¾šO†å®AweŽÉj¨_ ÝŒ‰²PæåjÒß³?¯2d£é*IœƒI-XKT*æQõÓí<:kµÊ£¸;zW7¨3ãjâ´òL§DYDœ&‰´VEa½çÒ¥PŸ€Ù“«ëÏúÛÐ~ ¦ý› Óèuží²lD™LØ!°0@–©THËÀó,Èd Q/õW;¦²^%"MgÖ»(UHD伌D6Ž<§ÖS!ƒ’¶´F&*šƒ]J¯(35626VÌ'ú­×£ðø^€.ÜÊŠ¸•¯áVº·ö*xÜLF7ÕG3Í~£‡qN¹ìb]-™EÙ¾еØWôJKÑ­>Š`.Xà(´MYŠ @.s’{¬ë7ì>¸2½sôÝ´†âÃýx4,sðu-­“ëpƒõvô)ÖÈ k•£)oßö6m%ÑçÄíP:åHÔ=xT¡C´` !Uœ¿À¶Ø+š@K¢ ›|ãՈ栮IÁz¬ºÞLûèI0^iã…É€øáIGpÃM|«,&Q²ìúãÀ­Øæ!8€pé¸Fïz?¾€µŸ¬ pt»S‰ÊÉ©›ƒeÄb@ÃÁÊ*¦þIŠbå…J¾ª›0W¼U  À(­ÜöÎÒ±øR•+{í‘ãÒìJÓnj¬0 Î!ƒ¸´i'0;Z­ó(Ù+n¸¿bY-{x<ÖÏ»`d«Étì¸9ýX„<™Ùs·ÄÆ£—›Q½„BOÕù QýÄ9¿bDv"ë(Ó:"B¤Ë‘v‚¬ÔW § —‚×å늞ˆšÈàu‰š âºu_w¦£êDG"äS"¾PèQÖ>=Þ ˆb0BxWÅ[À† }ÀšŒ(E æ+ÇÔ Ó+nxz j,äÉu‰q\šÐ“M„,G¢cQò"Q …^ uâí³¢ƒdU5ñ˜y‘¥Z!ž¨A6%ŒDtÁƒól…Š»GÖÔÒ`èsmV{%wÑÏ’ÚK[®=~̬jÁPžCVÕP£žqVU½¡E+J;dU“R6`@À)˜(„ dÀ{B’ñè#7Q[{)Y—U-àÌåÌQ©T_²ª'ʪҢû¬j!·Šò¬êVn=]VU^ñŽ·N؈cðBƒ¯4XŽG€Sëv¢¡•5<“¬j 8¬Íª’+®ZQ™¸/¤8uÏ%«Zb[ì•U•'ʪ–¬Ç Ϊî#`²ª%Ý®fU·àñwYU½Â‚S¤°­'ˆA:;ÌQ(!EÒÚ8¼šU-1JW²ªEÒ±šU-z푳ªª{2Ct†Å£‚‚E%" ˆXŽšSE{Å Ï'«Z£ùR#C'kèØ5™q$B>Õ¢Ú#™Q@¡œU-ò©NATWBuÕ6XQÃóɪ–¨ "*Ød;<<!_ •PègU‹B–'"£dÇëuIH'”4õùö8Œ¬ƒ>½6ÜKé`!c¯¸áeUKŒã¼¿óÉBª®W쇒/‰J(ô’³ªEÙˆC‘¾Â¦1Çòƒq™kÐ%%‘%Ê"åi2>ª|êºWÜðPôøurË_²^ì:ß«KµåJÅ\AŒ´n옰‚ŽEÁ§ AzMK,f+4•PnšœFe0K ¶Ìí¢`ŒA8„¾ÕÚâ@dR"B«ÄD œdÈ´zth:¯Ÿ’¨èX´ÐpCIÈ›èDBœ2€ÜÈXÈÉrl©ƒuê7<Hb:E—¨L†q´7„ǨptÒnYöÏH»6#`‡¢†G¢à’æuý (÷R!i¯Ÿ=$­n={ßÜEÚk2À=; ½é^©^uÇi/ÆÓÇozÛNxµKânai k°\Žbz‡œŠ£œcœBê8LQÃC¤l—Ê»vtùj¢úÆØ?ÌR;o·Ñò_óÖŽ·Í>°\aKðÉúv´íŽEàg ¤»%a©Æd;Ü–Ð÷fa$3k NµÜàÜœGÕ\q)#¢2:ĵÈ jIå¹ÃÄ3YeN¿»ïyZ# àþ|_í‚ê~0vùBæWï¹_Fãê[ÕV٥뒧Ô?ÜÄ¥y 6q1î4â‚+äˆHóD–L2‚w:Ëû݇»Q1ÞŒãé¥ìÕêUÁ¬qÍku9Òú–ðúÆðû‘ÝÌ+hUï±~ˆýÛÁ°ýïöËüï9Yûƒ»þÝ8¦Áê“é¶È…¹ÌêøoíÍàcèç+oî2û|Õj°ã¼_ë~\¿K´Þz/w¾}¶¬¥þ˜|#Ô¯[«”ÍZ}·¬)>ßñ"¯ª6iSú_âC.89Ìžc‰œÎµ¡y>dÅ¢gÞžžÓø…ÓäSç4›¯l^‚‚ó[#c9EÉÚ`­Å>ªtŽ˜Ÿ£5ZÙÈjÎF+Þ±ð" Û:„CÌ`¹%† ,üpÖ…{Å Ï/gS"ñùjŠ'›èYîÚ‹ OÔµd÷œM ….9›"?qhI(Ómß8æ*©$Q´* Ät`Éäƒ0’EoX¯¸áål¶èŒgl½ãbNÃ{ÃDÄg F»ålJ(÷’s6[래PI·£ ‰KFKN!îAÆ ƒ„5Ü[X¤¶Wܰ˜–a h:&`£_îæ¨DzùóO?ïˆIØüú>³ù$€Í-èÉzqîF¹qýsÚþCeÕ¾šQP³ ãõÑrˤöDÄD¼¦J'øUµœ–¾¬ãòuiæ:"ò¡®m_!ÿøó°êüaœ£_¯¦âV5kЦ}\ÍÅnòÉ¿1ÔÐy·Ë}VäY7 ¨ä ÚŠZ“´‚µcÊkÎW&QKý>SØŠk'òÛlØÔżÑÉsà^l¬O„hÊ}ÎAËšÓãàŒšÅ…ohPÑeÍZGŸìœH\ffWˆZ7Æ·šø”´<ÌJço®[_€*žVR´ÈË£7JxG“Ã2:î¤Õ /ˆ¥Újl>ÄWc/r¹IÁê \‰"X‹o«5ÞåSš¹æÑ0~î5{õã\êhâo– "å‡0Œ½ég‰ƒe}]‡_ÿÖûïûó瓦º4Æj²D¶N–«®gDrRy€ W†!M±D*Qp}<µ’¤^qÃS&ä¦:²ªÓ|²‰:] ‡<'Su¿/§–‘«¡*Y; «ÔTRCÊÝT@Xa@-fîØ?àÖãigp”÷9Ò° .yÃMÒÛª‘Y¶9×p``HñHÀ»Ñ&­ÁŒa-Uü\·¡,7+¶ÁÇY-‰…ï¶¥ãÁŽ˜Ÿ•ÛFöo'Ðïºc­UL\K˜û3’¤Ý@¡3‘kmRg¹”gNÌŒC s‚TZ—£jxÅòÀ7«(,VPFtD{Þi>"†UY™ q h]ˆ+ÂÒ}áL¶:Õ©ž²n3ÃJcMSÃ$˜+ç€ýü¤ªCZí½¹Þh—V=ÛÓî[ãlmß?¶Nà¹;ÖM^аB”¥Tbc3%µÛ»iÊçOà½ôaù—®CöâÇêà± yí(ÚCf:cš#„a.¨6TH5AÄ‚ 5ª=d·ØáÐN7'Mb¸kGЮ )ƒÊ0H|d>#Úã,ãœb!2´0ÃÏ+•ãȦxí0>nu(u³až ..®¯¼ÞU«]{÷º¡´Çí6f·ê¤ ª©õ‘sˆˆ2†*Å\8dãzàŽÑñLóÚ|œÃcë|rùhçyíX>nwnúx¾n,û {U‚ÿâ\¤a7û$‡aŠ ÌR@aŠ€€–C¡3s„4ª2‚niŸÐäùëWɞݓÖe _y‹ˆ/­H5‹p‹h_“ñIZD›Ù=!”ûœëàtñÜwU=¿DEG$¤ú €'^≑¬£E2(’ºâsònpu^˜;8PR«}\`7}}œýq=p¿æO/<úÖA÷Õ'ínM6âÝsS☭¾îõç«ÙO…æòn”þ­M ëUý¹uI¿fE°K7øÎn?±åhü«¦…àC¿]?°ƒOûùXI¶öÍsY?´Ž¯Ë-©4ãO«Þ)uϪ¼ê÷ÉËk}i¯š_?ŽÜ &µPXÆà¤ã±+9Á¹a@Bå$exêú ¯âTA (|yaÝ)Š}QèØóÈÉ1呇Ð6ÆÐ>Ó<òçƒ7oÍ·¾ºøð”AôõããWò]P9éGN>“<òMRÁ·ÊByä1<æ‘Ç<ò˜GóÈcyÌ#yä1<æ‘Ç<ò˜Gþ å‘ÓNY·Œ:+r™édP @=¶‰3U©“dBKå Ê$¸án]“qÜjÊ;&%\ZàÒ“§+üàžès)®¹q–’`âÖ-½uQv}êÍ^Sâ5½Ë;¹èYMH˜ ˜ã ˆv  Ø,¼¥®Ï)·U¾«šH¹„À"’êì7à,R „“êN ±x-¤fÌíù²Í–yx•·¬ï©eû×ã“GerÁÉÅÕõÉ#D)þâ¤"¤{Ùã'¯¾ûé©{¤(ƒGîÒ¿s?ÎÕÄg%TnÃ9|ÛÏÿ1*úã‘#ú‡ò‘òÐO…s<Å_ž&>T]3—3gå‰{ä ^Ù÷µlõäfàØ£š4ýJé8yc/퉳ãó…[0Ãþtêên4 ûÆ«ž%Û”Ýt å¥Û´öÀ6_U7j0Tz0ô=ÿÓ±hÿ¼R]<­nÖ×ã:Åh.ƒÐMܾüÎÜÉ.O‡!v w:Áeö¡¡U•|è?ÑF6^æ…þÕ½¡k¼ªÍª1úxX„â´©Ù.ñ5I©…`ÄÜ&¦X „„°0µR3‰TZ—lix¯¿^y éA¶4é©ÓloOä¹G_‘é¤%ûûÍiø½Økå%ú ‚=aÏýw†ÅÆé^­mºîYgíašÿÕ7çÙx–6÷>PT:ÝJÇHw¯cptŒ¶ú uŒz©/U1þ®5Œ4—Ò™ÛäÖ: º?4‚ä©F‚PaÐöFú]Œö U†ÚlM…c< [JÂÜz¨Ä])-'ª12Ë%hûÆ7ÂwÊ©îñÙB÷„ªVÿíÅ¢†Í´ö}W¼`ýËkG“«vc|â»fæÞI½Å|r>r;o©­Ô2Ùk2~Rª×\¼-×ëô£R}it®Ji#XÐÓAO— zØU¹; bÀà#GiÁº•”\",‘XAꘑr ³,CcµÌí_IpÃ{U *%Ø+ /Ô‘k¨Ãº)û"Ï=*™vâ¨_µ‘$¯M•þt ºÌGK´K-á9Ô€ÅÜIF'¿q²ŒçJ¢Túì‰M…~Éûúr½Ða™ÏPè×ËxEë”wë(L™Ú1Ê2@sB€fš9J”ã – “îBgÝ‚Óo;µµñ)$S§ÂŽWEû}ùནuƒq?¨”‰úe*Ó–ç8)³ÐÌWÑ0ˆ‚Œb•aÆMÊ+‡û¸Ñ!J³@â⢇0îaÂ*x­—åI¯&—êV)¢’(K¼U} •΃êv£;T¿Ú……ÚBÙ!³´<]ÖûËZÉ_+‡ÿ-ÁŸàÙÉ´poçAe?íQŠ:É~œq¡SD_<ˆd@[–ùÅ“#ÃM¦e–7ܺúC;»j³=ã,d;8sL\© “þ4†ä•ÁŠdÅÝ”†}ÑõÞ½ 5çÙZÛHä=¸ú È!óñ$2ÜDÞ|u-•åÝxg±[úÏ›ƒ³BÓÌ)Z‚Z÷ ÌR 2Æ€Õy®Q.2÷ÕRIØÈOÖ}i´ªÎY=öÛáå î–Òõ¤N$£aùGMQ·Ù£ëIfËâ´1Å+¦xí=Åë¯Óú%«Ø¿h£a/Æ7¢ü¼…àžzUZ§W×îGloð•¹P޾öVði†t¿¾®Ò6`À¹Päi“wº49ëè,é¿ãßs+ 9ߧŤ¬ŠIž¶›ÜJ¶:´",éZTqÉät˜l}}…uÑPpÑ,iî,†'gY PÎîµlŸ†6í 匆ޔi>63e*¾…,—ÊÔ”¹«Õ-SÆ3ÔÇYîc³LBÐ.–Iű­’™tî²®g^t÷®™Ú>›§–'}6'm_úŠéž¿5ó§û>ΜߥB60“¹«Þ¥^.ÿ[>uÏ–Nõ¹ö¥3È^šùWÓSoyŸ¶ë Ýr­O//räœ{}º›Lì³ñuaRĤt“ÂîÛ×ÇYoÃÖ!Úå.غÚîvºù/Ûï—º‡NýpçGˆ{hî}S÷PÍ{vZÚWî¡z¥Õ‹¢dÐy÷PŤ-÷P=ÐËrõ>¼fŸ_]Ø5 bW¹‚]ñìºTç)îVÁÓ¦Lƒ€‘Þ‰œeKÝTk‘N·×XÜA 'Ë|I½è†@¤c!Ï=Q蘳̃(­,sLÓýe™‡Ð6f™g–ùý”€î’¦n_@¾?~uñógÿüúç¯%B¿¾Y›¦^m(aiê m·OS?@Ä'¶ÇÜô˜›sÓcnzÌM¹é‡ÌM»=7}ã1ÆÜô˜›sÓcnzÌM¹é‡=°Îó¶)H­÷­,G¨-}㇧­)I·3t&—)q›:p‚žjS”cf R¬µ[QÜæUªxPÃc§eiqu¯û"Ï'N‹ˆ‚{ôšý€ÓÎÞòñãáüÈ[Ó†pAtïœ6–ê47Ròœš9“å‚#›c­6»àº=Ó.Y7œv-Ù è—7ë¹UЭ°µQk}<”1œoVÒB‰œyoë²Í! œ¢â.Òt(i½'Ú(ÏrYƒð5ms¯Pž¾içŒcMš2£Ìýd$}b &ÀíQTåX[¡LÜð( @½P@z@WE$Ï»<-Uq¦€À ’1P–j¡R4϶Ö/–yÈ÷9 Ï@M(yîȳ\äb> ò 0wªÈÁÝXa……HS T†ÝÆÃ8š9¶4û²4iŠ M‚'ê!Š»¨®ì‹<ȳ٠W ÉñãÁñ”ûùb½Èᘈãy7ާ‡@uâž{Äsh¦8ÂQÓÁŒ`£ߺ£0žH¦Ç ãéW¹X ã9kãyd’ÑBë±X£,c‘º‰wö‡SC±©RXåPZ¬aÜð`þýõ/?¾½ BðD<ÑŽ<QEÿ@žÝs¼#üg„ÿŒðŸþ3ÂFøÏÿ"³:üçÆcŒðŸþ3ÂFøÏÿy(øÏÃp[j·\3·,Ì.Ë‚(àõo  S 7F2èÔDCHÜðˆ\“d…k²&P‡t³=QèSsM:›}®ÉÚF×äqº&MΘTÂhælI¡$Ë!ÎÌOSÅӥݏ_ÿü-x-Äó~~örHŸLþõõäÃÑ»¡³'(Ï9VÐÒaíÄKÎ9W*Cåz©?.ÌQ¸«o+/ctFGatFGatFGá±; C$ðCwn<Æè(ŒŽÂè(ŒŽÂè(<”£ðîq¬Þœø]#hͶ3¿BÒ‹&Š,—Ø5ÉZž·wê*;·“~ýºþxxýfpÙ«Ï8½ {5d=gf{·„½.¦>9Ÿ¾4ºÌo®'nö’ç®ÅÕh4|RÝÎG“d<2ƒ|`M’;Ž>øÍ¨—ôûƒËÁU¿¿~ˆËûvÖôí¬êÛÙBßüàIºç±c¯<×&³»Iý wR%ï%o¬{íìyg¯ÃFBn?n­ [ޱòûQzóuƒOÿ÷õ?ž>ùáÙ×ß}óåÙ¹ëÀÙŸ××óž[Çg*;\ºúo¯•R²G2Êp™L—‹§‰'Q‘€Ñ—žL ŽK†vè”–ÑäËÊ ×Ÿ»Ž|ùãõå¥ï&nËèùOœ.ìú9ùç¿lMÁÿ%®Ã 0§g§ ÈüßeNýi2ºLü™Ÿ{ÚC÷é!,OëFØÏ.v0+žh%ãAq× ¬ Åù,#Ð×_˜y)“«Ñ­¾?Âø4QErê'à´ªóÜ8ëV”¼õ½à³êÓc5Qƒ·£ÞÕD]>g©YÔþ£nÙþ­ÎIp~‘Ô¼ÿƒ›Ç—/¿íËžüûÒOÔuäîú„÷8ûÆÊ§šü­’ N´ý=)®3GÍÂíÿ¹âí$„Œ‹ÔódúŸ9 ¶¾5üÐÌ^òQÖÃîh×x¾¸[ä£ëKÓK6w½õ»ÄìqP½°Ôå'xøME²¥dá¬[á$&<ôɳ'0 H! ™1À:Cå9E"ÇIpÃã‰q9¥¸¸‹@á1®}QèØc\ì˜b\!´1®Ï4Æ•ÿ|€ãÇ/_}À¯(~zIÿõ$}ãbb\,ƸbŒ+ƸbŒ+ƸbŒ+ƸbŒ+ƸbŒ+ƸbŒ+ƸbŒ+ƸÖĸXO¢nÐnZ*®9&:f§H¨=R§4Is›&Á ·®ìúÍÓVe×pmûlT€Æ£›Àž3öŠÔI»ù%÷Ežh-£¥_ï™'Ûãçߟ¦­NqñCÂÉvõk",˲"3ï¤À¬"×imÿ$Í@ÚŽÌ’OnµoÚ5ŽÐyZ”ùâN²­u—†Lyõ–º÷[¼£»ËšŒC”:Mƒ8‹Ïä‚0¥¤î’3 dþeNg™ &ŒS¬9Yj3cœJ-”’‡¯5»Ùz_øR߬d¤\:>hŒfG¤Ksíã­~C÷ÑÑÙ;ÂÙ}grˆ S €‚瀦,÷¿ j-±†„•‚ÅW›º-†fÜd¶úbÙòzPnáÚ1ZâŠò5Nª¨¢ Ÿ&™»lF瑩ËR¼Þ"@ᢹÚELï´‡nÓ§SɦBJšºñÅœñu™É‡2ô»ç-Ÿ{(­$A`SæV©Â8 J¨uFc²ržì‹l§˜z’šá7ÛìeWCgY\Úž}¯.ÆCëå⌠ÎZ&O33ãø@ØèT䀧œ1–3_¥©M†ÆA· í!ÀÆûÙ!ÀŠ9¸¯©˜Yž;ã_`I*3v$ ›’àÀå yò´“Š$DynÜês Pª PÈfÀæœÙL»?i…œÔð>•Ðs'Ÿä)F“âÌØ+5&¾øæRutJ§put_„Šêè<MуSGC¦|:úލެü¥Ši«Y;˜¬œ~¥¹Ó®Ï¥/Ÿ ÊH´å*kˆNKÑ:{¼ïE×Ôm²V‚ß’5KåQëåGêÅÓï_ߺ5ƒÏDNùµ-‘oÁýTÒªÖÆ[ÁûPU"\EY.}4ÿ&—C_”ÑðÑäCÿB»ß)O¥»äç~ØS^‘Móþuáñ“}}áÙ3ÍE†pë¹vÓ|bm¢.ê ž6]÷Þ¶>âøvâ«&¿«¥Rýü¤: ׿¹(ê+åsu9Û¡íÝà©Ivî)õ^ð>/içkN—N®§Ïy~]XpSÞ¸±—fT¢µ>þþ«Òÿ8œ~ð¡|‘׃ýבŸ¸Qö¶Ä­.‰—&¶¹suî%”¿?P$±¬åH:çwéDs #¿Á¹×±»nÍo“a²¸;“Ä Ÿ6­?bqóCX£ƒàjeùWÙo'!óÙÔÉÝóæÙ”°»øew8žÇO4<€æÜôˆ–·*]14tAô$=I¯…Œ;<ÉŽÒøÿÄ gï/þyà„qÍÃi.huy>L‡EhJ ~ý,šf¤ñ` ‚Äœº ð(yûîŠMy<Kã܉?øÑUÄC†³Ê+1ÕôÚ·Ãd-°E_ÜÅ ¦cšÀZR“á$$átñÔ õ»¢î}º>â†Ýt>X˜’'YNÞ„IW‰k΃áL’l™¿…‹þ%«È¦Í'c&nâ ½I7}‡Aä'ÝMÿ»w±&[Á‡µl»©³ÎÆäœŒ‚¸…kŠ’Oîà6íLÄvz!%ãºK€”Ž›ø|÷Áâ$4IüЋÒ£Iv‚{\:IîÁ’wG!,¢lK…pÓô¥˜Þ,œL“ÍäÒtO-áÄ^Òfê_?W’4ª‰X ä`@¹„ø¤K:âZ‘Ae‡»rˆ/é͉/i³øÊ«æW/ÿfâ ¿añµÎé2™°à<Ùþ~Êx—,+cº·àºhÈxp&·2”òߌ-,øgʉ–ül¹ïSΖ2ž-âbÁº2¦¹& S¶ôˆÃ,Ù@&UR9“¾Kº&D&ÊΔ}-{"ÿV¤Fʽ3η೉4Ypÿ5ܲօÈz$n×`Ūô_‘µ‰ZrÞ”•®ˆ§Çà&“«¼téŒV…P*ÚVDO†Ö%׊À[ œ5±™"ª¥Ðy"’uq¯sùÑúIyþR$¥ˆ*•/k’6E91Ù*¾Z“4O¤` üRA›ÊÕÒI±Ê ZÀ¬Çø+Ã.)f[ŠÏ5ô–Îúñõêf1,ê…Ìb(GžìR¤P&"BCŽlˆH—)Ãð@"ª.ä.øF|³’¬D»¨“ßöRäùèÆ0õoà›Í3åÏÃòÖQÃJßlé›-}³¥o¶ô;}ß,–vÍMƒA3t;þ˜.Ø4dv:ö´óȱ6›ÆåyÅ7Áˆà¢,jBÄoBð"ƒx{6‚êì¸Ì¯ /îÌÁ²_ñùlIß8FY.–ÞÞÁ’o(TF ôD<‡"]2¤«œ•ð”—zâVÍU°(ÐŽÇÄ’R ‹ ÏõDZ(þ³\2¢]d+ùBt+øˆŽÌ1åÏFG欣Dà%/x‰ÀK^"ð·À‰\,y¯.1˜‘êøÀ[ KÒĨ®Ç"Ðq’»qr|{è4M<¾Œ—-ñ’À\‹Ô—"] Pתòîàiž žæ­£„§»6üV„Ê’ÉWçϪ¤Ë`¤•Ô@:ÑØ—"„>bª¯H:Ñ •JBî‚oÒz°9¬]ÝâÉS“3¨2½K6ýþÃÚóLùsŒ:o%£.ÃÚ˰ö2¬½ k/ÃÚ˰ö2¬½ k/ÃÚ˰ö2¬½ k/ÃÚ˰ömö2M+vå˜A9 Š&@M•x²«ÀžaÌuÙëíöÍÙ"âG1hûrn×O{öÀÇfó‚³úz»yÚ³öYû¤×lØ5˪տØç¦õŶjÇJ4.¬FëpõA·]ÿÖ°ìÓºi·zÍš];:2[¦Õ_{Ùl7›=»Ù>lœÀ—Že¶W›ÍÚqöú§Ðƒ¦ÉŸ¬ô´Ûmà§?­¾Þit뽆ýùèlõ×ãNíô‹Y玲~n׿t·4Ú©ïx³Õn­5×µÚþêç^×>:¬o{Ô­Yµmƒüf®>iùÎÌ£Œ<Í øA~\ ³e5:Gµzcã$­×ÔÒ†E÷õ^¦Æî5ŽÌäôµÝ¶vôæÉd­Ž±×ýütjˆ´±Më´iK6Þº,j=kÛ¢ø^oŸãí}<­Ã÷­õrŠlXÉÍÞ‰e¦dÝ6OsëP°-n£ÊSš=ZQ»‰Ú­wÍ/×ÍN§·¶’[ðûê÷Z½Þ8itjPgw;Õ:Ö‰.ÉÆö­þÆ·õâ˜ÝµXÐ)«qh×kG«ÝÓÚiÇ>;©µ6,¼$æú7í‡]ä>^Ûˆ‡3ölc³õÜöi<éf·!Çyjž°jûŠX³n@ ¯‹œ5îA-æiVeC6t‚Eô@F{ž*!êûÔÕD¦cÉr|)äüŒÉ:޶P®¨‹ù…H÷ÖŒt+˜h/—`,mËco3Á!²¦•éŠO‰¤èTfŽä*’Ê$ªËx-“Vº!Q¶ÛZ¸ IAi¾/”æ¬*˜¡¬'^пzµûÎðx®kgî¬ÙÉ—¡L+¡Lû³ÊdOôdY!„I:jR_×eI”%C¡'îñߤkþœfeZ²2-Y™–¬LKV¦%+Ó’}ì´dyÄî{OKöËc,Ó’•iÉÊ´deZ²2-Ù{HKöÚ6ËÞ~?¸Ý9Å ñÝ!θ(g#OÈ*ÿßýIJD4Y$ª!"&É"½€IŒtØÀA˜('R>™¼|!-ZÒ Ë@h¥íòª¦lDGÜò«xFÌòâàvîgÏ&ð–rƒÝþp:ƒ/!xÍ~T«[æY#¶)Íh—ÿø?ÿâ_¯i{œ~?5@èÊ_ãÈžŒa_Ü'/q£¯hNíˆ[¼‚齯.;ê2ûo‡×Žpa•Ý%ks½O±y½šRÌÎìxÜÜ>Me‹"“ëû(à!{u—ÊŠD슋”x $]–aaP„Û4½v¥õ4,G¦ÝÛü¤±}ÍÙRFÁ'O‚ÉœØ<‡E‘¹ã¸Ïigà™ºí™Ç"7 &™/ŽÀ<ÔvþȽ_ÒpJ¯¹!K3'öÂU+1ªŠ|ÉëYzÞU*dó€;ùíÑŒUø‚ú),¢ ɂݰ¡Š*…œ¾ë¹XÔ¢º+#B†@Öäc_ó\Eô±# ¹ ¾”¯;!~áx¢€+ÀK¢Í4Ãb1÷ÃKíÍŸpËŽrÆfÑ_²c&ï#¬I² S[—b«R‡ù1Ì=ÏPˆ8|AÄ“ýûTAŽèjºÃ U”cïè|¦/9¾'ŠvQ= PNùÑ]øäËš§<‹ñyÊ•RP3›¥*‰`ëçÏßpÜhÅ7ÇQ-êh®ëÌ#A²î@QG‹°<*k†«ë®ßÝQÂ<{ë¹£„yëøG ñ œùÞqØ{Åq’gõÅñËÁ(ÛšaT±A¼o¯ÃdŸ¿ôHÔ„´qærHsÙ/v XÛ\kwÑaý¨ÊO$ÿ÷îFÙkÖZ½ÚIªž"º+Àk“GÊYæ Š+Š!ê)âó'i­æy“Û“³½Ÿ¯ÅЬIÅòÇ9¨½¾‹dÙ~,º"Ž®x—¨Ž5—ééMй ¾ÝRò¬ A¬hD¶ÐÌ7÷B„ýèó‚÷§€‚ùþòÍå˜ògóÍ嬣<˜ÿ0íŠÜ?á—g?÷Ì“äÀ[fUÉÁCZìüá)C6¥°s)öÏô£¿½Ð)V(’W¯x Bþˆ;äê( õ&îv´’Ÿ éÂzzj1ý™M®Ù…thŒné$ý8ƒ«`Ä-2Y¨†Ty‰O€±;˜R›Ÿ8‹â–®oíptU¥ƒÁø6>n¹ÇM{ü í^jáØDc\®Üé¶«Hjs‰ÃTâI£ ¢È<“l⿨Ù/%.|NÂñ'l:éPºqa¡Úeõ‰},#ª×b{a0_üöƒÝgË$½a*êvÎP¯{\ÐÙˆ_˜¹ŒÙZ>e! Îå¥~˼+]«[Ò臽8#Þ¾™:hVŠÍ‡ËBÎ,xO‹L`}†‹Rñ27]Ž<æ¡ùx0²¨šþ‡îL¹°ööc?Tü#þ–N­˜ü–çæ½äª×Å˸"«¤Ø‚ ôøí¹H!>C„© v Ýõ„U‰I²¡2CÈ]ðÝãeCÛtßà’®î|!Â~p¼Œ¥‚x™ÈïðÆÁSþìƒ9ë(ñr‰—_/S樿ð[ò<ÙĨü¢‡ÈØ)aªÃ!PÕ=IÂØ•a]©%Î~s8K%Î~38;‹þ÷cí ½•Hû)"ÔŸF¿¤`ð–Ba’/§Ë‡/ÀAÃÐõ”i¬¨0§Oÿµø9£¶@}¨CÀiæ×¹¡¤¢êZ±“ƒÔ‘|M‘£x"Þ¯#JüvB‡2_…aIDÈ]ð#~~c¦81] &¡|)Â~tÄ/EüïÐBžgÊŸ½º6g%â/‰øKÄ_"þñïBüùãAJÝ n V¥X ­ëºXfšŠ_NuŠøái¤PÙ7t…ª”yBî‚ïÞ  $ÚE×ü˜ü¥ûÑ1¹ò7Àäy¦ü9Lž·Ž“—˜¼Ää%&/1y‰ÉKLþoÀäzEÁÅ0¹cx6|žìQ¾â€9ª|ÆDd»¦cWÈ]ðýGÆ(j´‹®RÅ¿a?:&×þ˜<Ï”?›*>g%&/1y‰ÉKL^bò“—˜üõ1¹,VdC.„É™ï8ÀP]Ä&"¢úü˜¤3‰æ:¾ ÒYÈ]ðØÉ7¥]^Ò5?&)Â~tL^ôt§ªï“ç™òç0yÞ:JLþ1yr•U ÊKPþg@ù†c¡{¿y£[2KË ª$m ¾‡TäÙ¾+bE[Áhæ)`½ôrÄøÂ»õg¨Y«W‡Ôµ³J|Z•Ԫ̪¢T5X•’trJMâ iñ-¦MlZživ€½WÒ2žò¯ê¤V’©r«v!}0í‚HÒoEè/BñãøüDzp$çKâîè|Yª€\+æu$¤˜‡cØ .AT¤2bÄðe ¨EQ“Ûár|ÿ^²éÚ½˜®JA¯Ã öƒk8²ø7ÐpòLù³^‡œu”N©á”N©á”N©á”N©áü††Ão¥)˜5Ô°b¨€ODM…U¨ˆÈ ap„A5I£Iø\ß¿v±ñìï’®Îþ¾a?ºvQð¶Œ%éýýÍ1åÏžýÍYG©]”ÚE©]”ÚE©]”ÚE©]ìÖ. ¾šeuªœ¹­d0EbÅ&°ÖY…ÝÑádÀ8ìÛÛðfÀçeä²ÅFÎ~@IÏ%gÓ[×°ÜÃyC›7½H,V¸y˜(¨(K†' Bæ€è¦ò ÅmžHìn}‚×hñXrñÅ–¢ö ´;+ˆvI®Ç•ÿ`ሠҮnò…¹«Äx<µ=6Vˆ~ßæÞÆ!Çr/•dÏ\tõêÊ%§µ½”î½Ó½÷ qj+§=néÚiuöd0ÁVák&(ª8ôîbK$ ¬·FGž°ÿ­÷¹Qo·ŽÌãO×ã!;x˜ÍànÀ﯃t“ù1sXÂ_„±+ ‘°`‡B] À°xš{6‹ü]ò¤£0H$ ð¹ RÝë±°gÞîŸ}†öZz~7wÎÏÄË‹¯~_þ,Áosï\ïæ·>>›8ÇÆôò¢3pÆûåL3G_.6$wؘ7bÐöïûÃïbÿæû´ùp=lÕE±MrrÞ¸oö§ÍãÎuóÁUúW¤û÷fp8ò×É¥dˆô\¸rçÚ¹¨§]ó®õÐ'm«y×:lÞÃ;ĉWÍ›ï·ÍÃZúט5ëµE¹¦•”«ŸŽƒÝ½¿¼€±\|½¹ìš†9ü:l¿þh›â‰Õ$—ÐßÖq+h×¥ëæM ŸXŸô­¦Ü>o’öqkØ ÌÈ÷ôÜó½ãР%öÏ¥[>æ¦åâöᇦõý¡yïÔ¿æáw²ìgíîä¦vµ,×Àq¹Úäæò|9XxÇg÷¸uë]D;<{pä³û>î¾—7ðwØ €–íã>ô·sÓ¿¹šö-󶈷—LJÖÃà¦}x}syc'õ¯sw8]È ÐàÁ;>šºuóMCnÝ\)͇†Ø|0á«ÀïÖdï’¦]rk.Êݵ­¸Ü›˜û¶Õß>÷7æš{>Þ­4½o½!šB¿ÅíëÔ$ohÞÁoÛçèú†æ_Ù±§Z‡ohþo€mÿ¦ü†æÿ¾µº§Í?w»'v½Ñ±ìC³óé€M݃¥h=tÅiÄe½’ÕC.EÎlä X,@§ãñ@öZHdh´0¾>’©Ë*§ ñ€Nžpü`8ÛÛÆ#Ca_ÖAñÃ]®HØØ8–´Ý¡÷Ç*ûÂm0B£`±—XB7öÂX†M(`ÜàǸ‡ñD«I’F™'ü3Õ\|žš˜cëc÷‹mTŒÿÜØQåçšà]¨+5 ÿL”KÐÐþSˆf±ª Ðñ?¶ÔNòñ)õ8™þ{‚+m î…Ô€±±QC!ùf²L+Ëå¹0ÎC¿N³N=Ï2Íë ãÙÔ­ªpJÞ|îAqó(Ìc0‚ßÿ!Ý^½Þèv«‹=Á7ÌŒ+dÃñ” ñB¯üc½Þß^ÔIsOÆÂºDä Ä’+¢Š ù(“}ªúÉÕÁªŠ ƒÉH×eBˆŠeÏð…Ü_ÇT ¿=WfƳtÄ,spt Qn¨ ä`Ìø¤K:ò}L *;<ÿøô0˜F7Tm:í¾¤t~ÏÐK‘ú{†6:>xáÙã»r_Õ9„w9‡4š¢áØ ü NN½¡µªHUiÀ¶éˆ¼˜Ü˜Ê+Eüy8æÙ«÷Gcäf mõ5=¥LæEÚüÊ³Ž¢<+àל&ž¨c•x²«8ªÎ˜ÿêNž×ÛíÝ>É#nbÙûrn×O{ö…®ÚÍæ·ÑÔÛÍÓžÕ°ÏÚ'½fîYV­þÅ>7­/¶U;ÞP¢qa5Z‡«ºíú·†eŸÖM»ÕkÖìÚÑ‘Ù2­þÿ³wmMëZúýü /}æÁÁºØ–©ÚU“†4;½I I€¦§¦\²$Cè8ÉŽ“p™9ÿ}–d'$g}€í®jÀ¶,i]´Ö·–$káåúa£q6÷jpqÜ®Î?®7ªûµ°}~=hÔõ“¹ž¶Z5üøÖüëǵÖîI-üüåtþîþqõè÷ún+oõóáîï­WÏžx³yØ\h®Õ><Ö¯~>i…_övW=jUÛÕUDþQŸÒöÖ¿LÙÓø7ÈùhêÍvíøKu·¶TH‹5ÕPžržu¯¶{r ¢ Oj_êÙôõð°ýDo kžÆ“ÖçÇ¢¡hi›í£FˆB¼R-ª'íUJñm÷ð ¯îãÑ.\¯¬Wsì`‰&7NÚõœ­«ät\_I U\y̳õ4S[»­ú/ïÖO4¹ ÷篫€öjÇU¨³µškÇí†H°º@³†ÿÐÃzsê­ ÚЩvmÏnO´Ú:ª‡§ÕæÅÁ«XR_$pÙxxŠÝû q¯vZ‡ñCg¿Þ\7|jºÙª‘-ó~dªÃ ÕSCž§· úµùl².D|ç|äG‘í0ÂmóØ|—H:RyNàòÈ*\ðµ3²Ž[÷Т<ˆà{ªÈ”&Ùæ€î¶GÝi$LNŸâ\q$üZ¬{I$ü ̰í3`ì†ç¸˜æÛ©Óqt8Ê=FÚs`sŽ¯Å˜Exû×0fäz3,b"P „b‘r !‹(vþ1îHO’ Ž‘ëÂý˜¸QĤ˜#_c¢uó/‹åQ?2k(tÜÞ—zœ¦‡ŒõÓ³‘¦„ì'¼Ó›[ 3 ž[8´7³Ö+g ¯ÜùKËŽ°ãÜÇru†Ïè\¢’:«—ä€Ýt†f3Ÿˆ4ë.Ʋ£"åXù2à/áÏöíîUP=‰ÿü“^ÚÞ^˜ígÓÐÚü3kR:i:^½2`±lÞãgðµÈªgò5k- gœNïBÀ©òÅ Yg” x ã"Œ\ØR^„"¢æ;34F([T’¿íRÆôˆ±KhÀ!ºcœú¾ðüØs©çÌ¿‹Ø¬‰€ÁÁÁífQ=9èwz£‹(.4y¦ý¬-F$ Häb¡8åÄc¹*F‚aŸÅpeJÂèÆÊe«#à¢Ç»[\Ì-[0‡=SùxØ_ “µjç‚´§u<Ì?ãßW»X§aÏ*"„„87v¤£8¢>‡1ʈ_0ƒJ<""³Ï!a­µYIÈÿ̺9ò‰X, ¶€‹!†©^x/¦Ëª²ews‚Ïy`ø²BÖÓ•=¹á‘Êui¤¤b>h“ häSPSΈc潌¤Íš§òe`øÌr«BB^ì}à»"Âqäx*¢‘Ç™r\°š3ΜÀw^BÄ,+ ]ÉHzTy) vˆ‘8ŠÀ ̨ Ä›—n¾lh^¾†ü'¥«Æ£!´/`Œ=G2×!¡$Ž90J€&9±G”çÊpÖìÊ1ì^1ñ>ê>‘àcÁ#?¢"r˜ãQ°KÔUDñ±‘pÞù—½>óÀDJ Q"\F#®(#Q+,=2/ßéÂÊyùæô?%âôº¶æì•.óc…¤J @±¯8À2EbÉ£—ài²È @ÛÕ“öïa·»VÐ0Ši ƒ3‡RÊ\º.<á{è…9£t•©õ{>÷ÊD,ˆó-êaÉbWÔÀAZ0ý,`ÐÓµ !ãÒSú2Ë·ÞóIק§c€<¥€Š0x€@‚ àêexyŸè]múY!UXB‚çËX€IcHû/îrð•lÅ)Á.‹_Bí7ÈTv„¨ |è ïyàv¹`ôõÂú#îŠyi/ü˜ O‰;âù90—šùà_(d{4 ”C.….x VM[}§æþ˜ˆq ȇ‰)‰â@E»xåÅÀÌ—QÙ«AE¼|„õøŠ(@A™’‘ò„Þ…À$àiæó¢†PÕNx€Üp^Ø3<%k¡ü'dNÖ`7"Äà5=ÂQ°ÀX@I½„¬³V …Ö…„ý˜ åp7 2˜€"ï#ê†h¬¤‹ùË;§cµqò€‚_œ³dÎS9K³"ÌqƒYñrÉEëKܓִòÿý”e–¨Oꎭñm ÐË0‰m,ˆrH6Aª…©Ë?s—‰®j¶J×·ÎÍê¸L:½l±v8À[z—ÜOFc¸@”â…üQ¶ÙÊ䔯´«oêeÛŸÒK>43Î_²þSž€Ø +öÓpЇqq›½¤“Zº¢þpÎö1}Q×4”wTö¦ùÝŽ®gØÆ wôŠs­›‹}2éõœcá4§Óí“*›\Þ¦`DºS•™ëдHª.´K™n5€3€":§‘ŵs­?Ú,^j³4åà£Ç³'Á„†ù†¤0}Óç¼3ðÌ[õln‘ü”7] …¯`ä÷Äí=õÂùicùꣲ|á|–‰;.ù¡ëÉwP­)5T“Žžä{cTÑ õ/+§³«¬¸?´2…]2 Ý Ûmã¦Ä ð¶ÂÑ[B™Í]ß·ç18[… ¾Ö$^œ„ø {ª,\¡”¦+xæm6ýðZL{ó[´6±>g[*rµ'˜Î6sg»ÖŠnäÌvPæ/E±tG6õ$²)§v„|ø+&¾ôÏ >Ï­RjÆã<ä/àqôÖÀýº‰ŠÍª–—Ú²ì>^ÙÈ‘10É@œKlA]Âx׉düîöÂ[ëö­ãì…ǯ°¾Ø6÷"Ú÷ú{j õâ•öÔk»ÀžÚâ;S D=âfûí–wr}]{Qm8L¶~ñ>?¯x{³Å\ùâXb›*&ìÇM„ˆ\„}†ãÌ»*øv¿,SD+,§âR?}Н¬~%Æ~ô/Ëlz‚-y‡§eù:oZ´ŽòË2Ï€i/êr_ ¿©Ó²ÊÄüÚÄwíbò"oðÔ« 7ûÖʯ<ñjõ9Vº²q·<Éê®c€ë6Û84à® lI·)“n1×üØ!œaÇÙK… ¾{¼øK¿Ä8ãkq¼üZŒýèxyãÓe‰ûîðr‘¯ÃËEë(ñr‰—_/«ÀñuÍÊò½Ž ÌÂ¥p€”t¡6Á#®ežç(K1¦Jœýöp¶_âì7ƒ³õé²å™±›"m†ŸuªÓ}“ëôð°§ìh'üôÉNÔ©x˜m„øE \‚|1›úÛ`îcp1œ (òj+\ð#~TÁK'öïùZñ¿c?:âßôìZú3äED¾ñ­£Dü%â/‰øKÄ_"þ×=©Œ –ÅW<ÇÙ“Æ"Hׯ„x6EÛò©0èØ X"j.øþ³ðž“®à+Ú “¿c?8&§èo€É‹ˆ|&/ZG‰ÉKL^bò“—˜¼Ää%&ÿ7`rZqñf˜œQ)ÆàЄ(²™tcÛ眃WÜ*\ðýcrgÙJò{¾Çä¯ÅØŽÉÉß“ù:L^´Ž“—˜¼Ää%&/1y‰ÉKLþoÀäaw§+"‚²%÷©Mc—Û )a»ˆ{8˜ò¹g.øî19ø°t_7\»òZŒýè˜Üý`ò""_»»³`%&/1y‰ÉKL^bò“—˜ü߀ÉYÅ¥›­'÷|7v°dv$"ߦ ~0ìPàFÚ7cÊ*\ðݯ'GÞ²sj _7<§æµûÑ1ù¦;H=æ¼;L^Däë0yÑ:JLþ1yöyÙ”— üE@9õƒò­g~e9“Rn`á‚æ ˜³ôÉNEÿœiõ#{ùËÍW¨ŸÙêîNÂE8­%æ;ÈÛ!j‡Oí¸<—NJ¼¡PÂèèfáÄ2ýÌìÚúEaÆãݵó·5QO†装zÖ¶ÙÙþX³i6s_Û LwÌ¢u[fƒŠëoâ(î¹*¢±Í|FöÁ–SJm×w1xUŒ|éX… ¾ûÇAË¥7|Ý0Äy-Æ~ô‡ý Bœ""_â­£ qʧ qʧ qʧ qÊç!ŽëTh€6 /|…(óÇfÔDeäÙÜãÐ øæṟ° |ÿ«š’>Å×âáÅk1ö£‡~‘p4~wáE‘¯ /ŠÖQ†exQ†exQ†exQ†k ¨¯ÚnïhëfÜÍÝ/ªˆQwÊ®*ê†'ƒ®Ò¸okÉ›-—žP³‘<½ag=GbÙ[— îÃI'íCÝôì¼ß›AAEÓ3J͹¾6q…ÃÛeå3އú|ß›E/ðâ¡ëÒÊ–Ãö)j¦¶ }Êu=¬ü§öT7ïêR‚x¢ó©ýþ(”jÒ™cú6\oO$_VÞ8¾Ü•­ùþì/.5¯Ã{÷~r´õ.Bι™—k>‚†a^]8èŽÁ³U´.€€ÒJÄ! Гl™+}±tk¼'­Oœ|®í6¿Ô÷Û¾ì'jûn<înWÀºmƒ½¿ìô ›úâç8R™}±ú²{ÖÌZÃôÒƒhåRS~Á\¦£þˆ´ Û|ª¸ì[[õÛÏ'g§Ÿ¡½f—ŸÝL¢³SçÇ÷¯ñ9ùŒàÞDž¹p]ÿ㟢ý`ôãûqWtƒ+ñû©_ï}í À7"ivëWN§yõ“4Îø<©íÏ?t§yõãê }™4ÛÑùÝ7ÔÜûy×hC½oîaëkPßûFïûY½9¸ª^Ü—«QSîÛàêÇY70êÊýÓÛï¸y-¿§‘œÞEäôöŸh>àö¸9¿ûÑ9ï87ýãä ý 7“Æèpÿ5nÑðß}½j¶?w€ŽÎÁî׉Hº½ïäx<¸“û_FbWÓ\#Í« ·qWÚªÎaûg'nUIãªzÏÓ½®ïÍÊÝ6²roBö‡íóÕ²½x;²¾í­æióîíðúí¬ÖÓÆõÒÓ¸·Zþw·$÷‰1u×¼zCò¿ªá'äï¾!ùß6çÇÔù7÷ê™ü/~ûmËú?KûWZ¶„¿[­ƒp·vÜ÷êÇ¿m«‘ؾw'@°8Jµ¯À³J[p;÷dW:ê÷»„´—VæCÓYöõO½¯²r•¤±8³Íí Ú¾®¶>Yýž¥!Žõ‰0ˆùp…‘ ÂÁ'KcÉP$r=LYŽ/¶§øb[Ó¯Á qØS`eU~<‚5:ÙÕ´'úÆ}ŠÊõô}ãOO­O«|²®;# ‹mÏ÷\×]D½²¤« ”Ô‚wOgY+¤ŸÎ›03Ç”ô‡·aÁµïùA–ûâÝðÂÜ ¦ÅÃqjòahþéM:sï͇J…„òLoš cÖˆîèíoæ‡òÄèpÜÓ«¿ÃI2è1ïåið® »@œfˆOt%ƒqØéÅ}ÃW>—šS7Ì =û¤/³”íè|×>ÇnÕ‰êI3§´Umd,èúÝþÅ­©H¨nwÚzªó‚£)óD¨¦OF—Àgi®Ì4@ªqöô¿ç”Å?M1ùúnÜ0£ÿŒ’Ö¿cä™dõ$‘-€¸žyc „-FIy–p`´wº#eêå“›¬Ž›Ô\'ɹ î>o™ëDB щŒÚ_G½~§7‘Ó÷Âþ`”ÕÍF3Ɔ-)Ä d•ÍX™êÓ °QO ÙâÒÌ¡ôÓÉuF¦2Ý\¨9bóúSešO@G»‹”Õ—Döú׃¡Š!n2lIousÝ©HÔyY$ý‰yú³3°»HÆ]:ÑeéöA*.y¢¤DØÙl^šF†Àžéð8éd#>áæ÷@t“qWþiÒ¾ÑÐÔœŒ†Ã¯§]ž$9Y”ç̹¼§£)k$(@âºÌžäîeoß\¨Q41*SÆIdþˆÓ‹TGPÓÊ+†k]~‡Ý$Ó5님I0§iºäeäd,t†£ÙS1d]uÁÅm®¦a‘ËãN södê$ ]q%3È̲~)Îú—iQ”äÍ›_ýè²WÓô —Ÿu7ÿ-nÌ<2 …t9ÔƒÇПvzÿgïj{ܶµô_ ,v[zø&‰ [dÓÜn€6 š´{qoƒ©oý2°ì™d‹ùï{HI–l˶4±gÆÞ½™âË9ä9ÏsÈCÙ®%ÊÿJFwEg2›ã™*•ë ±ƒ–Úöî&5«&×(—I>áÇ*+&Œ&_ É5Pî›|ÿl˜¿;™Á$*—ÔL5-^²òÖ³›y¾˜Y¬©å$¼T²M}¾·»Š¹9eˆ©ÀŠ) \®9ü%ˆ@iJe$YÌ-Üyvî‹4»/AU ATúྭùZ-JÌ€±  E“û"Î}=÷µjéJŸ°´<åúÞ4¼•É*nã\u ¥ .ýVi‚ û[š…¥ý,,QeϪu_X¶ÂðlqKÓUÍY˜¥5 S™Ò«.½ré}+ºâDr#]øÎÂ|-Ûð5¯QXïÒò-ílîM–Ö7¦ué²ÖÜí ¬¨{ÿš¯Í]Pey SZsOëà¦ôu[ZC:“º*\[Íõ”¨aÕsÕÞ嬸ÍQUNgÃ/=ëªá^µò“ôSØüÊ%ˆªð/+ž¶@9ë˜¬Ž¯V<͆,€_áh ¿ºD:V©á¡%ÌZÇ_%v)0[å>WÐ[ 8—èÜ×çÇÝŦ}Nºåeª$I™1Š l¼ÿxü“Ó2ðâ¾ á´¥|Û‡ÓŽ%àgNû˯ŒªÎOýÕkÇæ¼È ?ÇR=¹˜O{÷÷£;½ŒÏ6“h_€®mg £Ou$»°4 á»Gõ¬OHÐÉ_ÐHjí † ‹5GQÊJiš†Ô—,’Âk]ðäm X¶K®íýı{îÛ.´ktzV½Ê÷Yõ¶u¸m—3N´ùåíO¿¾úôöÝO.ׯåÚ$ׯ§.ׯåÚ¸Tþ*Ÿ¢ ¬;oE~qý¼°n¹b™°DÃdŒR%Œ!ÄòU¬b®¤diìµ.xòDÃÇM†Y¹v<ßu,Áž;Ñà/€h´Qù>¢Ñ¶G4ÑpDà G4ÑpDÃà ÐÂîÔ¨M<œDZ #œJ¸/ ŠI@âAbæ§"ͿҪàÉ Q®` ;# ö܉†ÿˆF •ï%-ëpDà G4ÑpDà G4Ñ8 Ñû¾èvÔüWé Dš`À+Ú¤^!F*ñ“4ŽEBŠ>­ ž>ÑGl\;~åX‚=w¢¾¢ÑFåûˆFÛ:ÑpDà G4ÑpDà G4@4È%¬Xðn9}!MŽ e x…ªI"%"Ú÷uʰ¤Iàµ.xòßZ ’í’k‡\¾# ö܉†xD£Ê÷fÞµ¬Ã G4ÑpDà G4ÑpDã0Dƒöƒ¨ÛŽF¨‚X I26÷y*$"Ì¢4J( •d^ë‚'O4 ²-rí¸£q,Áž5ÑQ“@4Ú¨|ïW[Öሆ#Žh8¢áˆ†#Žh8¢q¢Áû>ó; 8§”"-ÌQo®9Še( 4yDCœä9Ë­ žþçÝ©Ÿm‘kÇ[§Ž%Øs'ì6*ßG4ÚÖሆ#Žh8¢ÑŠhû눆#Žh8¢±“h}ÎX'¢!ˆÃÍ â$IQ2ŒHÌ“4ˆXHßk]ðô‰FCŽF]®í‰Æ±{îDã%$ƒ·Qù>¢Ñ¶G4ÑpDà G4ÑpDÃð1Üí;å"H±Ä …©ù ²"Š£ F*JdÿI#šãáVÏ2¼.ן/?’`Ïh¼„dð6*ßûùò–u8¢áˆ†#Žh´%¾#Žh8¢áˆÆN¢õ}Úí;šë8ðAŒbq¢Ì×Ã:X³¦A~ k«‚§ÿf¢±”k{¢q,Áž;Ñx ÉàmT¾h´­Ã G4ÑpDà G4ÑpDã Dƒ> „NDç~(S°©‚ø g¼"목 WT&^ë‚g°£ÑtëT%×öDãX‚=s¢ApW¢!Nh´Qù>¢Ñ¶G4Θh¼zýéíïož–eHm®U™O”bŠrÿ¢"榿Vg¨ƒXkΡ>)!”& &VàXƳc;–áX†cKvPuÑÑ‹ÓÍðßIhc–yÿDŸ½fø… 4 ]¯…Ä.*âæ}ÿý–>ìÂàž'S¨Ã#ÂÝM'Ê3•6v„nß S™‚Y¢(eR ž‚dJÄ„0‰ÒÈk]ðùñ˜d…`r‘ÁËv ®Ã­VG’ܹ™Ž·ZÀ;½K­Zh|ï¥V-ëp»fÓ™åOå»Ý›EAE9×ÉMê 1Œ5½™}m*ŸKx˜Ò_V¼"‹u×e&[ÛKÔ—¶ ÛåºÖ+ÿSÏ&zTtµq@rl&æ®Óé| ôí°&ô ø÷Å­’Må­ã+\Ùf8ùi£ÍFփʽÿö¡÷ìCЬÏpûËÐã0Ä;9±ÎÚØkraæÂ`¿åÊåhÇ£#$ {©×&ÙÓ?/ÆuGú gPÆòËf9¾“<6ï|JF"e* T²D¤J )ÉqJ5p*A¿÷SÅ1KMiÅ¡P¡íZš’L=:Ÿ:ðòi¤Q¶ý/óÂ)Ã;žo{lÒ¾R™J ?ñ(‡ŠöpöXA™Õíäò=ÛÎâfùÆX§à$/½0£Õ‡ƒq<È=«µÃ>¡µf ­^°Îêj¥8)+9‚¨?¨—ÄkÍÚ褩¡W_)žóê¹m·|ŽûËþ”ÔPV†#S°a\¿‰(M©Œ$‹¹¢"‡¢[u.£ ‰Ã(„@,Ha&#™˜¯¡ë@a©‹sŠž[ÍA±Á &£…Å—@ (ð-€É¦µNñËR/9¹-žÖ8nñ¤Î†—¯®ŠÇÀ.þÌU‡ÀEñâ**ž—BŽS+sÄDÊAȱ@’bpßJ²0J„HRúØñy*ú'/,‘0Û2zêÀR3X¢Â%–Xr`ÉéÂ%–.9ïû` 7E–ªÑ;°´ –x×ÇDÄw`É%–Xr`éqÀÒê‘•3KíwõÝ„wìÀ±ƒc±ƒ'Í®¦ î‹eÝË0ÏIe»Æì8A'à.€zþœ`Û¢id¥Ó4`Ê“,D\È À¥HFa¤q’D,áõº›Õ÷ò£œà²—Ç×z¥ñðþ«^J§)((ùjOlÓBY«gÏ–‡ÄªŒ A2]Læ½Ó=½O×|ü8Ö3ošz¿ÿâÕ² çS/ÖÞž¥ÓÙX«¾=ß9ÖÀdÇÆQôþúãž™Eð—üg ¹Ò3øë;óÏbZÛ_ñ}_Öº»»“óé\Žj]• 3EyË·á/¯<v¬®š¦”œ){ ,?g3X¶7[z~+G mº Ös12}.«ñ–Õtêp.„ö7Ö MÝ®Ãå¹áãvøóêAÙõƒ©X¿mdýL®•ÛÃÛ~PÃËó¸VÛSÄ{:UüÆ— b…ø•¶ iÕ³ÇLÂ?íƒz…ñêšXiÀ '̳]ƒwÈéÛ‘¦ãÓ©!§½«g'„Â:fA’„(P:Eœb…"À’0ÖJÆA#„Zib'ŒÚ(y(ŸSyÛaÐñ<¼õUïcØ +¢µ/통7r¿››B,dµ9?73Ðl>,R€àçÙ°H?Zƒ#¿ä?y‹ `“Ì<3ÖÌ@“d´ÈÌÕ!¦ÁÌ‚‘2§GÎfÒ&#Àr9FÅO «F$1ª¯°²‰-2“/Vχ¾OmÎO™Õ±åM[fºÌ®§#Õ8 ‡ÉÜ»ÕjïOýÕfžôòñ{± èeŸÂ³+€¥ù£•Ncˆ)’gê‚lèR}ø9 Ë3Ö­­,‚g…E4Q ûæÁw­eUV[:Þt[kð“­ãN¯®ç‚  ~¨(Ïà+‰%‹‘¹Œ&÷»MÈÕ{ÒÌ¡üeϘ@ Ýðì4õÌt¶º¿g à\_ª¢–Ã(â¡•í×GUs6ÝÕ6”¸_éß® Ë@7Wzî]ƒ*î$L~㈆`ÁìÚ6Êʼ²²FqïTyŽË¾Å\–«žÜ—Y§ƒäz:Lôct=Uf昂ükæåeûÞ'» Í¸’¯ÉPÐ ñÕÎ"ƒº3-gɵ¼Ÿõ½×¦w7:ÌUU‚°þ>ã´:£†Iù¸‘ÜïŸ>} …xÞ|`¤Å¦ë#‹çqŸFMGú«±žg\¥ Ô¦À¶îGH©”!ŽŒ¢€i”3`ÿÄ×iC´¶ž0V¥Š‚ÀçaDiPµ.Ä® ¤wáæY2µë柟ï,úæ(ÅÚÌ»à\D$‰0¢~è#®8E" ¥Š‹“(Æá–(UH™ R?HE¤ZSÿÎT›©QI=Æ>F€¦\ꃮ±¸å‹ûƒr‡ µ=dù8Þö]X ºU&sß¹3¤!g¬ÚÚØòiÚzltB©8ém i ÒÀŸ³ë†~¶kœnǧÁ‰ûoÙÃΕžÚ~O}™4úÑz>!Úº@óá(³CØ?í*}m˜øF-Ë`°ö™ ÊO¬5gÅmå™ 7ƒOžÀÛ[æ!£±m_TÝ0C"D4‰Á0?cV ²]C’{ÊdöÄ k}CåYÚØ•ÀÿÆ®l± ¹± i÷ ghgJ^èÜòjTa ¬Ääb>§KjY9ýe>˜-&³3R½ZË/++›<^+¥'jíI:%õ ¨ýÑ Æ óÉ3npß?íèFûùeèŽÙ.1¸àÇ·?ÜNÂé…?:€í€fïßýôÞA3Í4;MhÖ+‡¡t24vN4½ã!¶PmÇë‹à¾ßáK’g€à‚¦/NUbp®Á…œ»þÉ!¸§Ep{ýúÍ›ßüè0œÃpÃ9 ÷0Ü·öiŸøŒpúD[ûaÜìK‚¥ÑXZˆÁÁRK,u°ÔÁRK,u°ô4`ixê®vd÷‡Ü¶‹ú}kPe[äâ.G:¨ "êNù°|×…Õêpý_ÕÅÉ2²žÎ²§ºÒfµ[pƒŸî6Â8ÚŽÛúð87^–­ShÝ €GœÉR‚H”ƈ§i‚â8HÇi’â$ÄXÖΚwåůFSÀÿƒrʯÎóÑð¶ÕÿÕünäš—ÁÞgóˆ| æŽê¥Ð׫‰»÷/½º®óľFþs0 Z[ýmÕyH¸ú í¯‚ÖÖHîócc9AÎ'±•޶ßni„á6‹àsÙŽ' àZ­¦FÔæ0šÃh£9ŒvZm3äLÃw>‡ð]öCMõy˜¡%üÂf[ãâw‡‚nKöDÁß×ÕŽðÝS\‹‹Yñ3 v+)i9YÜdO½Šl—œ9sێͺíGuÕuT×QÝg¼!ú8òµq@G?¿ùôæ÷Hã‰àåÈZk@kbZ{Ö˜ì™ã-þìvÙÞŸ½é˜{À³-cv¹ÎÒœ¶¥ù¦ìG¶14 NÌÆt¼÷{{L}9xglœ±9icÓõcOnuü‡ô¡OH‡*R,M‘/1C0°¥1¥(âœHÉBÎñZ<‚›Loe…Ñ>¹ÈTvD!I‚8F«ñ HH}†îû M|«Ô$'±-PÉï’¦yL)ØþUfå‘ëšU¤}?x>¦p«e*2¬¼²»_ª‰ìtY+_–Ûi[¿Û)œµVŠÕŒ†ÊÔ×V±y-Eï¿¡Ž53¬’“0&œ æ»`>ÆQ&8æ:‰ÒïSN?L…Â8ƒ@$¡N”Â`Ò¤ŒÝ kI?±õõqŸEa'ëK)âÆ#“ˆÇ‰B‚1bZ¤8Œ„àiàµ.xèíÌ£™^Ò‚e»$ØÞôK„/Úô6l…"89£ÜFåûŒrÛ:° ûÜ 7~F†û¯^^Ažfm÷¶ÚÔTÏù/¿=ÖÆ¢¼5D|ÌhÄ(/Óüf ©÷êõ§·¿¿±_ÏÔ9™ò1…c>çšЕ–)Ø5‚‰|)ih+Y@̓ò3, y …ŸJN|!™ŽIâËD Fcû-N=—°t¥w™(þÖ¾-u„8d>QŠ)Ê9ü‹Š˜›þÊ@ûb­9‡ú¤P„Pš0˜Xv»o8.¿s^ˆ+ùÜÛΧ#y;ͧÂmrcUb>£<“öƒÊT˜ýÆaögñXß\뱞Ù\q“»ŸÝÉ›âÏrW{¹í9&}ÐçÔŒF¹0Èntq_ÀõÝ`6¹º”£ÑôN[©}š-ŠOiGD¶Ñð%óÿÑ«6ÛšwÚ„-"•w–·í4] 0h ³)ÐDÏÍæm®¥ÂÀÂ?xÑ€é1É/¸oþkÚ}ÿ½ùû'ôöÃÇËòr‹tøúºòúåÕë˱Le-©¼$Á%Ó—Œ]úÒ—…v$8¾,{ûá–Ûë êO‚òÉæD²[£ŸDmL¾ {¸YÜ­íϹh|ý·K3SO¤Ã+ûÕõWï~{õsñ­ã+3Š©Z(âÕ?.å­Žì¦üüëàÿÀœÛ¯÷B/óÛ&LM5Þêå…çêåÞ~qB*üøëïè·?]Žäbž~ËN0¾äAÛÿõVß›ëÙ–Ïú‰çÿgïÊš¹‘ô_aôÃöظÞèØ°×»~رcm¿l„ƒSͱDjYR»{&æ¿o¢ªx‰Š%R*?´Å* Hd~yYUÖ9ypõ×Àì„™NxN‚<©_~γÕ£Eæ¾ÞHÝÖ;YiôåfÙ$§™¾Ä nA6g‹6Yú§IŽ“ú2½¾¿‰ÕÇöÿ0è»lá„yÕÐqÔ¿æ•Öw-´Ó»³Wí^ÆgM‹ :dšts'‘TɈˆeqf²Øxä…öÆ™¨êÅ /ÆÀC#·º™‚¬£;q"¾rwBŽîX/—çN,ùAw¢°ÞxÅîDâþ¾÷'zâIü A6ý‰Þ22ËüLñmL±þäVÃ{9 m&w{¼q¯Í_›Ím6? Ð‹Úq®XoXø%O>ÃÐç1¢ OfðéÓ¿- þCÖ›ïõæ÷Á¼ ï w¸el(¨édøKâ‰Ú!,¤D܉¬`GTP)†ÔÁ‹>Öðç˜?—áO¨ªöQ°Üð? _»áÏ:þ„\œÝ_²â‡ìþÒ>Ùýÿ:ðŸí ,ÿO¿ýúÒgïð³Jƒ½ Xð×éÝÓûISÂÕ7eYaœµµ\Í ÃþØü!‘ŸÞ_‡Ádz—k¥ÜùðÝ3«.6”vÖ¾hTÉËØO²„Ld %}t GËé ¸á™ìýq‰ºÀGL'ޏwYŠVÁ2e¼Ö>Ѭ8¸¬ö±CÄèDT|ÓŠã²âB {0.TØÇ[ÜûS"Ò/½÷‡pt Ö{o”–^ƒ6QqFaV'äœgÆQ℃â†ç¬/„^c¶ë,‡ÞS‘°·ÙîýÊ%K~”KûèƒõO Ü[‚õ%==6XOa¤„ö{úXýq±zbÇêÙ íýQO±õ“&~´ül¶þÉ eᆲ­?Ôô[^> !†€é¼ —U€ a)âüG˘E ï”sB$5(nx€Ò@ÙšXP°Ü›8 _»7!^ dÅ9¥}ô€ÓúÝ3EHtÙéüÙËV¿Ì~Îè(ý—åŸõ·?Í…ÁÕŽyê¾¼ÀÁ±é‹ö^^ËÃâ³ûê÷½kÍtxf´ú)Ĺî"CwË9Åaüjon¯c–«ù7,GËÐHœXwÝ8õðoê €w¶Zµ£ÏÕﹿ]t*"½öø<æ"*YðCá¡Ò>ú\ó>ß“M~öï‘Ð(õkŠÈ€?]í›g‘y€@ÒGdúˆL‘é#2ýZô™>"Ó3|‘yKú‘ê!'âõødH©öͳ÷6ýªz? ÷z? ÷úµèý€Þè¾÷Þ–ÀI„xUùÊ«óì?µÃàßjÜ»½л½Ð[Eϯ°)ï¶•ÊN0²2yĵ‚iªKŽ bLr ”‹¾äVªiU‰c«¼JÓj:Tí8…^õ>ªLêŽáCj.¯ÄvÉ’¬ÚQØG¿“j§¼ïÜF•o6ƉOl­Œêóè(×3½÷wÓÙ»¶pÅòN¼¾ÆËû¨>YÞ@¾&µk™WÂ#Müã±s†:ÌDí}ÎO¾a¢³‰½^/б¢XhͶÃö³î Qtå¬ûNuœ¦3—ÃôÏÉÜÛ¬-‚¨òéòûë¸I€ÅÕ©’0(<‰(•ÇÈq˜°‚[‹ ~º”©ï_{²}í±‰†‚QTù8¬¥9, ÂÎri­F„€‰'%@E«Ó?l¶V’:$åQø@GÀ)¥’J !’àÆñU2Ì‹?<°ç!9@MƒR¬ˆZ$€·!cED>[áXSÔ> ˜<–Ïo‡Šý‰Õð <“±ùY M‰êïÀ œºÚ*1ÙÆh´$W si@öSˆ Êè3Št"Ös j+*?­ÇÜîÉ]÷Vj­ÌisM¡ñ߬ÿmIÃ\eþ²¶îˆrcû¬Š27¹®Rîg)ðûZÍâ—q6HG“ûW›Ò@­áœ¥˜¨¶M¥˜àOä4OH³6 f\7ßã}¬˜4ï=JJæüÒM®Ç·£¥]Ï2s;^¯qxÃÓ£ðÙ¯`½°³&¢µc¹×o]Á„ÿ´ ;·µ[²ø]m»ŽÃlí*þ@ë’¹ôVcÎŽò°j.øG–÷ÙÝZûº(jœ„õ®ùû\sè}ÖD£Zê\”¥2¯W{&`qy“#[s·Å%š4’µF¥.LÊ‹˜”ï`Rܾ€­[ØY°µÄJhíÒă”CN8¬Â¬2X$ÔS°uóÞ'ÿmx?‡ÓÑ‚Ï&iú>Ow]8"L&ìZq*20Ä< 2YC`îkýÕ…Ñ€kç¼WËHÛ™õ.ÊN¥1æ`•D6Ž<§ÖS!ƒ’¶•´V(š=õA‰!¡tH™h˜´²jRsCžè?·3än>àëÐ…]U»šìJ`×A½šÆÕôº~i¦9Ðoz?Ëq¨c ¬5Ë(›XB±-&–èü¹=âq\9dIf‚lÀ«r4ÀÔ‘Ê™Aq; Ó÷`’~wm«y¨ïçßVB}ñþn6”yÿøC#­¹4ãat›õfú%6Ð k•]³º{@€µEµ¸åaÂSQ÷Éĥῼ[@H{(°.Þýóñ¢B0û‚_›1E†Íá^ÉzlÆÖ˜öÑ“`¼ÒÆ C9˜¬Œp–tLš™øIYL¢dŽ ·`›‡àÂ¥ R±ç­=¿€m/hÕ–u=ÜíQElk7§õÔ½vÜ“ˆ4ð*²^]JŽ$íá­u¶j¡xëÒ·Viíºw–ŽÕ‡ê°dÙcÏì»ë¡¬“bá’›¨GQp8Ž<&H¥DN‚0ËÅ ¯X6?Ìq:Ö°!Q¸ÚGÇrr*B¾˜yd IïS ûQ½„B€êüQýE¿Q«o†ÌtKf;BSHÝØ†88IÈCÄëaÕBMª¶¨áËQüP¢&x¨«öѱCmÙòRÈD%zƒ@Ô…µ_ˆžð,"!Ny– çt)¿G˜!‚°JÉæ#[E _ˆZ ¹úPbçÝUXVûYŽD§¢ä…" éÑHTB¡7ˆDxûl èI«ŽFEˆ‰ˆ&bÀd¶8Âc‹Í„PÌŠzDh]iM(è»]yU¥#w*cdâ†@8xå’ÄD™Œ.°è"ºÚAߎ¶Ý©ü*ô¸$,Õ˜†Ûú¾Á,ìÉÌŽ²síNЦï¦ú\{²”(ˆRH™rý8 51b-øODWŸy×lm_³¨ð—ïê]PÝÆ®l&Ê|ßÊý:×覆ʮ•*_Òhv׿•}xGÒI†rin(`ˆR”Τ·Gå}ðânTŒwŸã, U~èÇŸ¿4DÏ^kj´]åMYu~{6½›úéõ²ŠVñžÙÉUÝŒ'Û¯Û¯Ëë9YGãÛÑí,¦ñæù¶È•¹,*èÎnìõøï1ŒòNÈ'™=0Ì$ØYÞ¯u7kž¥u•Ýu6h_”·ƒ½k¶ƒ½[nÛ¬AÖ”$:T©lÙêÁv°¶"oÇ"úuý¶¶üœ ÎQíóç‡5âÆ1ä<ñˆ2a™S +ΑÓâÅ1Z{c+±Kg#Î>sA#mNc4q¹”Ào Ì›s`#ùÊÙH\:¥`––Óqa9,¬¹&;KVq)?G6zsz_&§ýþ¬#$ÇŒðy7щ¡ÄÝ*(ls¤àÀ6<— 2 ’$ Ir£hS•©¨áì]Y÷\>”ˆÅÎïÞÔôì¸!ûT½T×^Ÿ9.¡Ð[ÜÃr‹¿thT îXŒOê°èQT&ÏL-Ò sd9,,¬>,©7|ñlM«8ª‡t€Þ¾eAÃ;{ODÄW FÇ%lJ(÷ö6Åì~öÀô9›CçG¶Ëàn{ÿ¢ 69ï@ ¨ˆ8qYF2XIÁ4WÆ7u@ŠžmÎæ-7r6˜Uûè[Ž¥§"ð«ÄÒSælJèÛçlŽ•™®9ÏtÂÉ3”X¤YÿEd¸—HBóNckšÜF÷œMɱ»ÓålSÆ –P–y1lÄŠÖ&RêXuRpk쪔Šo,’Nmj™ütÌ¢UI`êà*¯„@…ÿœ³ˆxW˜!“"AäMt˜†Hü9²Ñ%†@Kg¿•Óø¥sšf‚4bZÄ¥ ÈqÂ*úÎà3à4Ùsš¼tN G’½]Iq.I™,2Šäœ‘3 &Y:GN{]ªQ]&ýþ¬#$ÇŒðys6rÈ´éäêK0F ÷ieÁ4ÕÚƒüi…À`·žhSó¥¨áùålJ$\{¾õ ÆKz–»ö§"襺öòøœM …úœM‹¿thTîö‹@<Ô:dUt`X³bàñ8)aV‚HÓY+jx>9›C:#²!¼ÚACÞ±‰ˆø*Á踜M åÞpÎæpýÁ—&ÍT'`²ÖH¢ô(xÄŠå¢Õ<¢$°š9Aƒ7ÜLÿ „þïñÕ¬^…( ýv»D$2øù§_~=,°ø‡»Ìâ c¤ÚGœrÄ9užq²ÜnN…,›Ù A k°¥ºwYRÐÝ&øI%´-ͬœ9n‘§Å­±Øš¼¨o½Ë•%o"Q[ïDòÏé,¼ËNh>_X·h ‘×¶±ŽeºbžÁh“ 9"²ˆ‘?‰ç„Üpl4ó`·2oµRV®Y©‹öÖ1ˆv£øõv 2Ùø¶Ù‡ÏÛû0^ìó£I5I?üøë_ú¯ÿøúÝþûytýïõÐמ^óŒu‹ÍÑky\U÷»¿ž¾Þ¶U æ‰s™$µ8òD¨ã)&)¥µžP’Ü&YêgçåàW’5³éƒìŒöØx­ –pë’#Ò› ÀPÖ¶v=8bç=±ÆùD9ÁÑQ"éˆÒÇâêóNÖžàÕã0ŒLÔ–çÞ«$—xõé›XÇ!ê °¹ÙÌ"NÂí4Wn~ÎÛ_e›¶~ÿ<¦t@ö}´Ü2©=1¯©Ò ~Õ-çe/›`jS–¹‰†\5uí›yä?MêÎïg9òõn.nÍ[Q»¦hÞÇp)vÕÿÑPC—Ý®÷Y“g×$| ’'p„µRÔš¤Ÿ)¯Ap8ߘD#õ™ÂAÜØ9‘ßæ–(æNž÷bc}"DSîƒè¡Å<Ü8¾ƒfuá[ÔtÙ±Ö“é»$QîbˆZ76µšøÆ×Ó¬t~ç®õ¨âÙY%E‹¼>z£Àk¥Éa0¹“VG,¼ –j«±Qø)–¸{‘»M VWà‚äQZ9fäÿÙ»Ö&7nìú=¿¢kòa6)ƒƒ÷C)WJ+Û+ínl¯%%Y'.ºÖpw†g${ý÷\t7Éæð…æcÈ‘P®r‰C°¸¸¸\ÍÊ<ÇXPÍ Îd{v!nº¯=¿Õð×În´&˜R‰†”3ÎÊÒ‚  Ð$\Jæ¥p{šà–Xµ†¥‘qÓ»Ð}æ<±eas•ó"ÇKv‰ ϼ5Dïe†c1•ˆùUZ‚‰tä.9gAñÜzq”)=u’µç·¹Šin~›ñ¯›âñ‡AywÖ²Ü ­Ê‚Bà f )•·`yV:›ïCBÕ+c¹xþöÍË~ŒÞ¨ Æi4§ðØ‚S!u¥ ë„€øµP’ìI‘ë‘®2U ~»q¦,&צ$Z20Z\R§K 7¬Tƒ‰$sÆ`T‡þŸÞÎY„ZJëôåæ h1f²$N(^(޵æ°Â„#”SðË8cý~d9}ñÓ¯£Taɤre&M“࿬°à+1‡ØÊrF….÷¡ö³ìÃ4ä„{£ ƒJJp»8'Œ¾ÔXJ¬(Ú³=7àE)¬›îÜÞæ˜µlhÎÀ\B’¥Â©5.5 ’2"8¤bf¢š¼uIµ'|q%±" “r–—Æç<‹—%s?*;Æ*GÆHŒ—ÏiX_9‡Ð¤àÚ»ÜË¢H žÖÒ´§’Ntm‡Èݶ'{*us] †%¼g­¹»‘S‚×ÄÜADJ£MeY Jbds]¿5*IŽšìÅQxl!݀̈RvŠ¥a‡§ gJì~&»Çjã$× 5Û~ BLpMœxi4yLXRõ(ëVãâŠ`(AR08ÆYé"9¥5`ŸJ™E7<XÒ,#ûž §ÃFȤ“`É.[%²M°äç Kþíçò¹y‹~°/ô»ÿþ.‡HðÏo>DÁ’ª,©,™`ÉK&X2Á’ –L°d‚%,™`ÉK&X2Á’ –L°äfXRênÜ-ÊäK„+âŒY”»‚£Â‚xu*åYtÃ`Éù;$ºÁ/u²>þ÷ª¶ý«é}˜Éñ:!uàg9”žê9mÕ ¶d‚ï@Ü!ÒO•ÄûE%—-‹¥ðdÓ°n­Aׯbxsé³É5, p`Á¡Í¯ª{&7>´JGÕÃÇßâv5þ½úp6öWeÛ2o5ä‹I÷?V¶yöô¡ÿå®Uk¹w͉·F-ýûÁè~L¼Á†Ç%ñ†a¯µ‡y/JÂ1ÝUãÖ(ò×ÊBpcoýô®ˆÖ;—m»=BÌ0­…Û(îGðå’w«Ë¥Òx ¡1r,\S¿Œ/)ÂN Q„+ýy}’"ªá±Ü[EN˜,¿«y*–xßv(¹Ñ·M ì`P£ý¨Ù'n O|Kû¯úßæ¯¾5·¯úoÿu¥ÅxLßÅÙÞwÅÌnò]+—äRÇ5ÕÃŽ7¹•„˜p÷/¸³ºÌ•öy^J¬unwôZK4v•[âyVx9œ{©ù 7 å(¾ÅtKrjBÙ¼CÌûqçÊ•3HAäWxQ:aëë ¢ ,¬ò„´IÐñ:©Ä»–C‰å3A)Vx{ƒ#Ó®\K úÂY7ês•+žõœ3jsšså„!š2íëÓ]h˜ôA}øªm—#»ô³YÞjûþ±u²¾ñ0yŠPK¸PÜPç kr¯WrþdÝë°Ýþ:䯨èÊ7Ž¢=d‘"×Dq©y´'g„yˆ³8ªöÁø«+û|r‚ô$†»qíáj®¶N`vÜ –ëÒç´(¤äTë‚,Ìð÷u¸qbS¼qscî|Tu»až ®¯ïïBÌÕ„\÷¦¡´Ç †V½À\`ÇsîÃŽ8&Ì:Ç­ /ž@À1:iÞ8‚»*>ÙyÞ8–»‡>ÝoË!·´jÇ{Xà§:å&Ø‚w³Œ!ÈësÄ‹\!+ Š|aŒÔ¤(8­ƒð¨†;ä&<ûþí®»:¡ÈȬ2R§B6$õxÅôw“O?Œ`·#XTjÝ#”väï²’qŽ( ˜U`n0¶ðH<÷9–Êû ½TDéKÉ·¦ÂéB¾uéœz-¸:¥ZðÙ¦}²Ï´|tõëŸ_âïn_¿úîõ{õõ‡Wßð¿ºwQµàºC-¸~2µà_ν ¸—jÁS-xªOµà©<Õ‚§ZðT žjÁS-xªOµà©üSª7=»Ղc¦)dŒA2$/´DÆ B «!—Í¢î–ìÈ¿ÖÄOãŒôðòò©h:ìjH6G,˜Ä™ÛU`MÀÇŠQ+^c(§Ù-51hé:TrQU‚Fì½FÌï =${&=œ,º¥çTÓjÌêÌl!ÁHæDúê–cDrì•ÔÎÑ6J¹›N¶U2¢ž®FÈúAR¾sö¬*8»¾»?{F8§_œÕB„‡=ñæÕ~ ?W›Eð§ÿù >\ÚÛPqPC…s|´1¯ÿy4îߌ@à¿V?©õÔ¼ÄS¾äiQCÝ57œ”gð„Ûz³ÊÿÒx¾VOÞ`q=kDÓ¯³w~è߃œ5¸¹üu ‹åª?¶¦“cÿ.„›•ð«nr%©þ¢‚JÔuòVûÞ®l>¸ =ÿÌZÿ²W‚¬¾lþ>¸yϧœÊÕFó¤ ð\þÍÜÉ­ ‡+ ÿqÀ°øu"«º˜0¼¢ÍD¼ yþžÐæ!^Õf…˜||DFaö “žäùñ@í˜Ö)SHSž#ª¼ÈMΉñeÝðh^¾Yuíq³xt©‘LG'(ÑÑÉ×b:kùûÆ;ÇÙà…W´åg÷Æ=øï‚êíJ¸fæ¹éUçˆaZÓÕw—Åͬ®kpÓ‡`\Gã|û¸"¨Íþã ©t'`„J}†qE³Ì—†Ýn¢ Ÿ{SPiQ9h´+K¤®¶¬½ðN+cÔnQÅDm»í•ü´UšO‚Œ›ÑèªÌ­…ÚÅUòÖö¯Gn¹×lñFøÁB¨?Ÿ-po¯WýÃEf¯&SÚ] Îô·ÝÞµ‡!û¡›{&™ñÙå,n¡4~8D/aBêÅ6ùãC_Þ”U!Ë$Ϊc–0¢»‰pîf©sÇ]ºGDOÓ)`J–Îx¨Õ”‘«#J¤ —a.·ŽàÚãE5}S—!l¡tsÛ‹ç“ú¶ó¥Œ³ŽÎ¶Ã{Âsl2Î÷iq›1ü¬Þg›£J>›6N¾bªç¿šaå¡3`» ¾îvî¯.¯–þ¼×¾’‚ºùGóóaŸ·@ó‰=€Í§^ÔÆ9è|jI¦àùl|]ÔD)¨Y¡ ¸»éú8+¨tL$¹«J×fn¯F™_ ‡¡Î/ŒhîyS¨Ñ»IZ­²¨YeÍ‚¨¤>Õ Ú‚€š~\®Œ«íïÃ=¯ýѪZA@Uµ‚€–«*ÝBUckXÑ w»Í†¸’BRê‘ÕÖ ^*ŒŒbYš[y¤TE‘E7< qÁ—!.•p:žÓ8”tNºB<(iUˆSfW!#ÛT!~šâEs—òò—ã—,¤o†×ÿñËÙMA‘ßDPWÆ$²¼üaÛÝËËMÖpÂÅ詞<Õ“§zòTOžêÉS=ùc֓Ǹܧ^O¾õS=yª'Oõ䩞<Õ“?¥zòGÜò¯7s¢Ø€­,g‰­pñG#ˆ­iH'ì•S,¨à%Ò…óˆ{xœÅÒ![(ÈÆI ¦­F£žA¬&+€WÓñjÎC‰æ‰Ä ) g\íŸvúè³]»Ü•–n ÇÌ}†÷@ >ËåÜ*ð(DZJSƒ Í,ƒ Å‘‚ï¨p`‡]\(O†v£°™À¯2àJtsmV(c°TÈQ"^Ž åÉR8¥Ä„ÔG•£Vèñ:±t(ü>\ž$9ìl‘N¶q. ÏûžöÿzûâÃÖâzð«<5lw¿Å¨ÙÞoÅÌmò[;QÃÒ0b¥JYÃsH§ ÖAÂÍy©uNwóX‹úúˆa7Šä~EÑ–ÙRa_"‚y8 àsd¸±¡°QckVNgÑ M +éxT:ÃH,O’ ©»5ß‘6B¦‰6Ã&bØD ›ˆa1l"†M݉ö¤‰aë(Üt^7îÅ>ÐD$gvEt„äŒó™À8a‰²n3~ÕÔeáeAÙ&YdƒqÖ\¥“}Ü]Ö…Y#òª”£’äŒõÕFç?í§«Ï‹Ÿïði¾–ä4îŒ\q°ì7FnRénŒœŽcá&«˜×n{aäÜ[÷t_ä&5^{_d}ÑÙäj¼úÓäV±Ê,*4íaÜCÓ;k [µ¨áVé dsNËó¼´%ÑXú,ºáñ94\º4r˜Š&>r8”lž,‡&%Œ3sµ’C3¢ê`‡Ð…‰C3f~‡æzMLKl”àà“rŒx)Òª(‘’B9ÁóÂP± ÛÕœ£»Ú\ttP͈×?MMƱ`Ÿ ‡f7ÑlMÚ›C\™Ýh³°¶„zéäqSd5.cŠå,’ó,‹nxtMÜSÜŒ×I¦QöDsŠšq6x¯š3ó¼‚C3¦(ôÀš‡ˆ+¢84cT*qh®ãд–”ʨIG-âØiˆÌˆC1Ô n˜Ö;FK94#¼ú‡fdð“84¡Vx„s§QšΣ¼Gt·”‡›p¶ˆ„’Q^ä åÔ:„á®(´'ÜeÑ Î¡Izœ.­«’é H4O•CsfW° Fyï“áÐ$üHš1ê’84×sh¡]®À}–X Ä÷(;@ÆÊ°í©¯¯l;’–šœž<‡&‰âÐ$ñš'æïaÇü½T*wÔÁš‚8q E¹$È(i P#oeM ÕðØš1f`9‡¦î1±Œl»iÇ X%ÓSáЌʫvðÄ”‰C3f>>cÍ­W×ÍXÇÝÙå¶84­Ì!À* 2\€sãÒ!ãŠpƒB8§È8×^äÐŒÅú/EͨŸýôø¾„|ºšé<Ä'ub¤³j·cR[ØKÜJàÄŸÓ•O€?³Þgütù3«]Åη¦UfŒ³Ùu‰¬àÏŒQËyšÀØõœø3ŸYåÔ1 J£ù37êÈþ̘(rW•^ÁŸ¹‹Ñÿ”ø39=yþÌHUçÏܬªKâjʺ]úÓ@ S"&¸ƒÍ)Ê‹\#¹•¥¥àÌ×E Q O„?/ãϬ„Óñ^ÂCIçÄù3ã@’6fÍŠ} þÌÙ¦ëfO“?ó±ï±íž‰nÞÿíí’?ˆ?üøâ¿^~ÿüåWo^E±gRÏž9ßvwöÌßeMžÙ½”z·Ýļ™˜7ófbÞLÌ›‰yó 1oƸë§Î¼¹õófbÞLÌ›‰y31o>>óæcn÷³ïxtŒQ Š¢Ò‚aQ9C–z ‡Ä [©©öYtÃÓ€%™^Kò®‡À%S‡%YGX2÷ÃÁ’1²M°äiÂ’®ÂXír™‚áØhV”š1Hö•²R-½° ¶(Ñ×ooq_ýåk䯾¾þý_DÿÃðy¶È:`‹l¿Ø"†¬‚ËRR‹=/ ÍÁÉ”RJk BI™/ÅôâàÂÝ¿ÝÀÆ&¸0Á… .Lpa‚ O.ŒñÀO.ÜzŒ .Lpa‚ \˜àÂLJ —cµq’ëFКmH¿!&¸&N¼4š<2,)ZÈÛ{W\úÛ~ó¸þÍÕý»Á°×l÷®ýÝí èAš` ?žbr¡üý²”J=²Q‘¡a6].A&ADã ¾ bÊ-¹rhì¯ hÝ~YÃp½›KèÈ—?܇¡ è*“Ñ ¾…Xú9]„ßÙš‚ÿË Ãrçç*3úoU½üy6fá ¨-íL{šõ5癇ö‹ë=ÌJZ¥xX¯›U›ãñå¬â/ 7üa†Rfw£}FéyfÇÙy˜€óúZæ X·âÂÚÐ 5»WÿÆÞÚëÁßG½»[;‡*¥É¢/…eû»¦$£=üEÖèþw0¯_¿ì›žù—¥¯ÌlzE@œCb©f¿«}¸¶ÉÆ÷Hs 6ðÿÙ»²&·$ýW¸zñËU WGxw5Ù£k,[’cÆŽ D¡ª@ÂÂe€d³gCÿ}³즚€ÔìénãAj¨3++óËÌ:þëdé·ñ&õ$™þ÷€‚ƒº²«ö|룕ø®¤Æ››Ò")·_.Z6‡ÖJ)ÑgGº@…御ºGÈB€†Óâ[”…>ù!æ`x‚BÎ)ŠåºXãØaþbtÂ߲ܿÄ™ß:uæøÖ„øÖÚÎñ­?h|«üÍýÑùî¯øG_üð7ï¶°Õ¨ø™ß"s|kŽoÍñ­9¾5Ç·æøÖßšã[s|kŽoÍñ­9¾5Ç·æøÖß:ß"K;œv]‹í8®{1 ¹<«Åg!û“#àØÀ„•$\C>*áØúÝËÁ‰­ã‘öó²A­'w—–÷I:OóIž‹4w~ðªŠJ(ŸÞß%Ù^¼y…~îN¯úÊ^ºÞ}Þúj“i>MË%Ò{&i•¢þø­¯Œí³h;2tb*>¹–¾M×:A{ò (ó§[ÉvÒU:fÈu)¦õ_PÆtw+æÌÖ(Ãk'ãb†^Y&_'Äò\8Ü\رçÌŒs€Ó¥áýŸ!ûyóýø½-æ£ÖqZ´3©à[fî¹—QÑþ‹È2ÜG¸×A.±ï¸áÀK`¤\†ÛÿŽãÐŽ±ã*¥"O—º®‚úCÙÛ›ÕÌK•r[8B¼;PD]Ýž6ªÐ(´ÞÕž”5ƒ×¼¼ìÜ–Jµ^#@‘o3q“Ý—a×¹XÚ=d“ @ı\è?§.^,K>–®ß>öÖñ±Ç¡ÐÂHønŒµmè)D8¦ <× µãäL°Ü;%@çEj»ßŠ'¼d› ¬ŠB,ÅžæU&¤^ìÉ–JÀŸ¡ÄåÀðQì ò|ÏuÝÄs‹ ÉÐ:çû!u‚Í¥#›º@¨ …Ôˆ% þ:Ú„= ,ò¹$¸çcžÉLîI”$Ì£=D¾%`Û¡ØN8¨;§ñXY‹öËf-×2¨'IãD?鯿˜E ~Óå2cY’m›µüç© Z'–§üŒ»œÅˆAç”w·©ClS+ì¼oèNèE*@h”¤™¹.‹îöºŒ}£žó|¯^ƒV7U(Ï&Í9‚™+¶¿Œ‹2-v¼Í•ÕF—­ãq¥œÆIµUdiC4ú²-U|³ËÕ)Ð5bk¦+›Ý¥î¦PÍ©tôÝtÖ”ßU}<š¥«ÒÊG‡åeU‹Dl˜"Ks%«ËÚ!{•™ååN}ýV(³x’¡tùš•õ¹F‹•@9Õ£[ëe#ªÁÛ<Õ3>§êoŲ|›ñßåï,®UÉù¦®;Z·MÞå¦[„bÈCç·Í¦% ÈRíFí(\èÜû•ØÄ;5\hfÜÅêGÒ¬¹L¸-|©¨–Ñue¹æѵ…u#húT/yº;𤻴Þt_YdbEÙ•áU13ãñoQòhvâ•°V:$Ç¡;•fË2SSwíÓ\ç¦z} LÅt¦æUªªÞÛ òusÍ_¶WVL…x9b&H—䊜U‘ªÖé_,»4i„Ç5¯i¡ûµ×?*TëªDÎ>`®LÓD3|ÎÃÐ=Ø1Zé3¯S·¨‰Ú)Us¦&“¢·¨«žLŒš9Õ1aõ´…‘ú×ÇÁB$ŸúØphP.~V€¤ER'–a‡êËzpêË:®¾Æš€ãMËY}=õu(éZÐIžv~ß¼½Èj…îÑ)x¨ZÜê­VùÛŠ…N~IÔ˳~ÞÉfÏ'ÔE'ºZ¡y  Xº&az1ÐjÕN+·Ú·—¡JD i£;øê*»¡ÿZÃHïVòurVk“Núà#Z;•uMÝÀŠ¡öèZ­‚zÉkDé@=]7­†ÊÒÒ)†JȨ¶êiQáæ(¼å¨Mƒ¨z¥sCwšõPpJùâý™ß«$ƒ¨Œ~9дå\ÇdC|u inhAüŒ¢5zµC:« ðP³®ã¯»ÌÖ«ÏôÖÎý€úºw—˜ëNs‰%žJ&Iö¥Qh‚ BÛGaPpî$ÔYŒNøb²8ln£ÌxGعH3;ÂLvÌŸr„-cv„Í1Ù9&;Çdç˜ì“}ø1Y×õo…YÛMš5J Gê§Þ |ÑZDf0¢,ó&µ¶­cá\4ê„EZȳ]à`ÑÈ“x³>ÚP\¤Ò|N÷Tcž÷íRû±­àhC'˜²}lq;‰}$@“ ‚] 8' È%“x.ÖHrTÂ) [õGèúBº¼Meénðxçûµ}»¹xãqø¹¨÷Ð÷k“©×¤9áùök¡í¼_ûaî×ö˜z–†‰°#œ0ˆãÄÃAÓϺÔ˲ìÀÇÌ–îž4³ýwâfïMî½Wå7oïþíòo»Í¯Ü¿Ù[à4`ˆàBâY€±õ²Ä"ØþBšÞ×Öðyw÷¼»{ÞÝ=ïîžwwÏ»»úîî1*÷±ïîþì>λ»çÝÝóîîyw÷¼»û1íî¾_×lxû‘žIºûÙàå–½Sÿââ[yþæ¢-ÿÿ¾ÒÎ%jaÊø ˜«>"`x"01²b,dÌÛ¡ŠæÊq•éÇÓ DAŽ[6F¦NYÌF´ÎYÖ)m+3¨Ñ"å®¶äzWKÝWùf !öûèÅ7ï^ýüR¹”¶1Ô+_þú/ù¸¦µµ~«-ù¯ŒbBS~/å¤0=®t&éÓ’•õ&j¤Ã+Ý\E&ÆÐ7”­AÖ#Ë©K Z}!öšEÛ´K}/ Å¢Ö·…Ø)OY—¤Z_5©\ß×R·oP›¤+©Y4;¨&ß³H"]Ú¼ÔnÖðÉelWš™ÖR:µ¼ñ¹û’V;É;¢i¢†•ªÍ¦1ðÍûÔ7.V§Uëß“ÝËl¹.@Á®zn誫̜_Ñv8šì 7øE–ÓtnKU‹]*DÅVúV$C}\tKÕÙÞšaÌç`é:ִ󸇱/C™G 1 9aȘr ÐÁº]ŒNxÆ0„}†˜²8@ûÊ›…³tCÜÜF¶ ‡3œ‰n~!^Ka|Ï“½™:/@è€D³ ¥sé'‘(´9]"‰báAAB]cæ±=ì($ŸdtWÖ&SœpŒ};UÁ-DÀFE 8àWâøÜEâÛ ¦©d°ÍvkÂØ#´ `®ï/nClµ:æKWÅÆî|F³CôЦ =Á€¨Ò¦ã ÌÛÇwƈ‰uòŒ‘e<åVö].·2ŒõÉ¥VF<OäîS‹Ó¢šµ^߈LÍÛu­çù¹ç€¶Lå1ŒeNµ×ì30­niÕýðýå›o/äö}¿‡¬õõ‹¿¿ñ½^×nÝ ðZuÍFkcTª QßÐF­1ùóê{ûåßþús’»ïž}¼ßÕá’8dÚŽ|îúrqr™ç &> ) çÂ~h‡ÌŠ£ž’|þòä)Œ±ÀË…-’´îÄüg¢íS_¿L\¿ìøäñmä1ä'7ò,c^¿üHíNµîÝ@ø~=ãŸß¿ú^ïŽk½*c—FÈ-ÑøÕ)¹ØP˜¶Töù£YºùJåîlŠ9ÆÚ7AÈàÕ˜æù¨6€¡Ñ™7ªýí>L¹}°¦¹ü%Ý%j‹£y-ªµÈEM3³û±¹¤•ùYÖé*-¤G¦]±a-a\Ôv1±‡1äö´FÕ´¾ŒêbuA³¬¼T{3ŸIWÇ3¹áö™ñp_Gü2X¯z[ãsQ«UÔ Qu Ы7;Ò\÷Ækß̸ð$.¬êr% kR¿üÇ;ôâ—‹þ±–¨úz°ˆ×kÚwÄUË&fõ0ôö§ŸÑû·ß]dt[ÈÍý²­ÃïQâì,÷)dSÞ¾{{±¡Í‡¨[ãlv˜8Í Ù.ïÅÛ4ã7“TÀŸu—J±yƒ¤ë²à‚£]™msÑ\˜¿ÐœÔÔ’1¥³Nî@þ žÚõS—_ßpéÞS9î/;Ö’¸ÓŽP fvŒmäúLîF°bD–l ÒIx&îbtÂÇ—­%¶Žáåž´ãñò¹hûÄñ²ƒ'âeb{/òSxyl3^žñòÙð2q-7á”È“Ö, Ås9á$a»À>"v ó$àŒ$V˜ÐrˆãÛ™qöƒÃÙžqöƒÁÙíâÿ4Ö¾ùyÆØÁÍ#1 ¼¤PG­÷ ¾•Ý_¨ûsSu—­×ÏÆËâë¯ÿ»}-µá³M ÿÂ6;²¼#mp–8ð'á|Ë¥œ98D®å Ö<År%K⇶'@_€Ð[ŒNøüâ>vÀ­"íÄý„ç¢íSÇùöTœÿýâc†üÎ[ÆŒógœ?ãüçÏ8ÆùŸÄùãW|Úû^ÑËbö½ßŽað%v6AGgcVL;Í*üÀ›;ˆ0!âÇÑÄâ( õ˜ïÛ”àÅè„OÁ*p±ßÜFÚñVÁ¹hûÔ­ò° Æ ù)«`l³U0[³U0[³U0[³UpßV·Q0 “S&l‡Ú¹òt4â‡Q'°ó‚Är½Äжði`òc·"÷¤ÉÏEÛ§ŽÉÝ?&3ä§0ùØ2fL>cò“Ϙ|Æä3&Ÿ1ù}cré9Î$Lî$ŽÅÝ0FŽíxòŒÂ$àòŽ Œc˶El/F'| ˜œ„NsiÇcòsÑö©cr"&÷|çÑaò1C~ “-cÆäO“ë#´fP>ƒò»åÞMPþì N‘Ó#Ô_ñJLáêTyÿ^ÊÿíÕzæ`FuÈÞá7ôúÅ79eQ[JB/,ï¾sAâ H¯Gf6#¡øsš)qŒ7÷ú܇‰qûö úJߥùIÓÂzj¦…‹¿hs@·æG-Òªë`o@pbP°´oÚ`H\Šb[â"Û·Pè&Å–Ë\ϧ¥d1:á“°n·¹´öŸ‰¶³uóø­›1C~rðÈ2fëf¶nfëf¶nfëf¶nfëf¶n>Ǻ!Œ½iÇq2WP…G@`DŒ…îÍ4¼¤ l=îšYÉQ^r‘ýOÿSÝöuk5à¥ç;pV`–st6î¨}"§ERS À&Í֒ܧG¦žkyÖI›ë¦•¢?Í·ùÐz³–øH:º¿™îö-0Gˆ÷† ƒÄá ©Ã€É+ãÄ`Lö× vOØvêæ¾ €Ýõ„B‡:üÞ ©;ž>Gí'Uÿ~c”2ä9ªù¬Oj>•¥—–æÄî è õ!m†¢²Ë§êÙV]Ž\äe}/}Ï_FyiͪD1ÀÛA5áö”¾Z$·Úo­} _ SâkÕ*ù&KXâÃ,æ=éß«zÛ÷xÙµ§½ͧ>¶ñPlƒ #l› :J›†Ô‰å¯æ*ÕOžÇânÆ‚b?Œ½ @Ž—€uÉŒ(s c*¸ûDß%¥fdf#(C–m¹`“àŽ< º°£{Ì·nX´]kÞÌ[ófhwY}æuêXŸ…Éx™÷-Gš?÷ —{ÚžJí‡v‚ܘ«$E¥¢‰Ãœ æÞbtÂ隈ܛ? €÷ ˜•0m,4·Ñp†â3ñ‰ûà‰5 ¾9Ä·߆âC~rCñÈ2füˆ™,’iÀ8M‘~¶{å69 q…·^Ë_¾~íSﵤþµZ)Whñ‚¥eÛÒ'Újº” ]ãT^V›ø %. „À\Hç{®ë&. cÝßÑî«ãÐL*è!@êWÈäØg®ZÀ¥’GÛ¦CY=Z3/=‚ù†I“ZÀK¹©;aûÒ 8ùV¶ø¶Æ‹¤_9+i Óêm!WãF»¼*_w£v”Aç$A|G  ìºRÑ•Öl-)µ¼ÈS´Sæ‹|õòÍ?¿A?•¹@;õa' ®ýÏ^¼Ö›Ç˪ìp¥ b"Ë:È#±É¦%+kÑ~Ù¬Î\=©Ø~Ò_0‹ü¦*<²$Û6kù3ÎSËcªE9‹ƒÎ*Gð†mêL>쪽SB£$Í6B•Kw{]ƾQÏy¾W¯A•›*,õœs35VleZìx›/ƒX—­ª€T±úTmY†d¡Ãªøfd”þzÄÖʹ]6»KÝM¡šS­Ä ³¦üF¨êsàÑ,]V>:¼(/«Z$`±Jv%«ËÚ!‘F¥,*/wê뇴B™Å“ íäµô€_e} [Ób%Pα4M¬-ÕàmžêŸSõ·bY¾ÍøïÊ%תä|S×­Û&ïrÓ-B 1äÍòÛfÓ’†di!´<1.tîýJlâ.43îbõ#iVML5dáKEµŒ®“(Ë5/ˆ®-¬AÓ§ xÉÓÝÑ$Ý¥õ¦ûÊê +Ê® ¨Š™‹ÚG³¯„µRÃ]sèN¥IJÌÔÔ]û4Ź©^ý)+VltÖ*UUïmPùº¹æ/Û«àL…x9’“Gõ?W䬊TÕ°¦HÿbÙ¥iL#´8®yM ݯ½¥:M…j]•ÈÙÌ•išh†Ïycz£g[#F+ØHuÞ¢&j§TÍAšþ?{çÿÛ6Ž,ðÅðÐÞÑ!%ê ó°X,ÒìÝ»m±í.wW”D¥¾ulŸd§í-ò¿¿!EÉ’#9rê8q2»@“HEŽÈ™ù ‡’½ÈÈ[å‹e9™içT=ÑZ¶ð¤>ÞÆÞÉï6_ìÉ™/Öm¾B' phˆ#=0_‰J‰ž"‰î0 áa—ùb6_´Ë|•†MóEo›/ææK 5_ôHÍW[ÓU6¡Ö<Õü¾­x×*«RºS°m*\Ù­JYý[©…ZZM´Ögëyo5›U<=æ¢V]•ÒlH«–64ÌZ TVµ¶Ê•õ]ëЖ)•´µV}Õ7»eÿVÃjïJóÕz¶´&µöoù VµÖ&kÃܶ܊¦õoØÚÒ­5¯U¥ ó´éÜT¢©KžÎ¬i„¬ik˜žÊkh[®†Á«½œ–Ù´ÕÚèܲǵem+î¶–Ÿµ¼«ó×&ÉzTÖ¾´,­õr6}²¦Õ²4·¬ uü¬¡µvµöt¬¯Òð‡j7kÓÿª|ë³­ÍgË{«ÎÚûóuð÷Üc_a¼œËiqúIæég™C½r23¹Z‰^YdLÛ:Ž+‹ßšb¡peñØVû§Mg¨ ýÇ)ãÒ I“„ž!‰³,$Ô¥È7¦¥u¬üè®XçœÎ:]éäo¶Üè—v9•e𘒯&?o’ÙGÖÎ6jèÕ9BÉ|Uzí¤Ž“Ÿ8²W±ÊGólT/F2Y®@³éêF¶ºtl|§Ù¤™ùB¾Òk-'þë_'z@Á³ü£[~©røí/úO;ÂÍYzcm›µÇ=ßz?m·µ–óVëªñ 8a{¸®î`ßOÛo¶þ¡_f5ÕÍÖZòÕ)P#›µø¡d½Ÿf7d}1—¼›[%š=º”¿­Õ+äílàÍìÛ{®¡v¨™xl¤wÿ{ßëÆuÒ±‘MïHÁõÏ< ^úÿRzV.PØ4òVÎmª¦ªuìиàGŸh³h' ‡ö}4-8¬èé7æ!î‰7äH ÇF ½³f+,¸’ù±Ã)q©âz§#BÅ.‘ŠúçIÆUЄ…vÕ]˜ µÇ¨Ub_f¥ÑáÍÞ£m¹ÿÝÛFÛ¨hWV3Ýl ™C ýö&ƒb&°½È¡K¹ "›8w¹¤é|<»µÉ.zÈ<—&؃øª}jë5»¦Y[‘'¦&ódž3sn“]ôùQ–ϯFŸ?M’O Ý:1&êfï2Öw:¸ž‚ºT7¸C;Ô|cËV“¼Üx°îÃÇrc–yÑ•œ¾köÔ䨙K‹å<-æóé~ä§kêêãûòN#}¾)¿Ê¼[zƒj®¥7¬^Ýb{øV½¿›Fúôý<¤â]ÚÛù¬Tš=iÞ|ÐÐÓl:Õ9Þó¥ì”ð†#o¬@¡›«Q¾šÁHU•èßËz°®z¹aŒjµ0f7müVK: ¶g²ìÒ¨g”4&׎rn5ªo îÚ(;ïFfiô>Ê's½®«-?OÀ ´&ÿ…!ÕˆÌjüjÞµwBÛtÞ¡Š¡9P›šù>×75Ó7ÜßœW3#ÇšeáHÿQ®GÈç¤Z ­þhÓÇFKÚ5u¾¹kºéÅ¡ÉòS½UÌ‚t×S¬Z¥Š‘^‹µ¯#¼ÅÒóÆwk$‘®V×cg=é·k…3^à†O‚ñØèÝÛ÷÷„<¹FºõSó´í¼ž… ÛÝç‰vë`QæÑT á~î†zÉ’º$ɤ“ŽÏÝŽ¨QsO*iK•0*<Ç•¹‹ÓYífÝ…ŠdnæÓ??Þ<°~3)m ½ÓF²~SôÈK ORˆŒq’Æ®q=žøÝ¤°AùáA™í”7ÿV<24šx|9ü0ôXÍöh×Ð@}aŒ`_€ûÌÜ=‡¾± íXÀZ[nŠû@޳wðUŸ°góöÍ_ߢgƒžÍKölNªn¤*™hH@7Of0JNÎáÙÁÓÙrùa >v¨÷  s™¡–:@ßÙè¡ô(ÐûßÎÏ/.^_¼F] tŽÇrÍò÷¼|éŒY@ƒÀ¤åK>viø²¼ºžä- ^zuèÕ¡W‡^zuèÕ½¯ÎîsJý¾T‘Z-}74ÒºÅ6Ñ Oôí>‘ãR}¢cN©Ýub JÁýsýº¶É,Õ²®¿)ðHïjc´R凅žÄë×úÚsà7ªUÍ =b9ôKÒúÚs¸÷žÝ%‘¾Êìa<üÛÉÊâ/k¶D{5• OÅÌ< bJx8Dx%‚{>çq:Y²¬]Yî!ièr:È*=Ù¡ëéVµòcg·ü«>nßpÏ´­ Ó$\ »Yd]¢)ø“ÿ9iª)J»Õ½›ØÒKÝMlÒÄ­ ch»nMÔº–õÚ±mvÚ mÚ­‰ÓÕ´¾BÛšö±gøõâüí/¿\¼±‘†½álÃA8:i÷ µßpÿ6ÚÞNÙüxh´ãÁ³Úû8èy˜Ì… è‘¦nîç|yî˜ynÐlê„8D6D6D6D6D6D6D6D¶gƒl·÷üݵæç>ém{|ìOeqïÝÎÿv8ìÍsòþ|¦²Æ=VOËi¯¿:f> ™+Ÿý‚›Uõæî›‡ÇŸ886^„ÐxXh츜?R¢¨üŸòÚ+IZyàjâ S|á*B!B!B!B!B!B!B!Bá‡ÂÆûÓ ·@a½Ñø‹ð“ž(÷¤í‰ÃrÙ#Ö5ìhtvû@ªÃFT„Ŷþ¢–éÐ2µÌQh™á3áñõ‹ã‹#Ò/‘nânPœeœ;)P¡—ž¤ã$]OŠÌõxâ÷/ŒÖGEƒŠæ¨ÍŽSâñ5çl°Æ6‘0†+8Oˆ ¤CxÆDÄ,!.ôÊO o<öFƒ îY…Íæ×rÈÃrÆì´œLÅ©çQ!RŠËy@8Ø"|•†«ŸpÊÔ3 ÆŠm¦¹R‚{V…'k•òFËuC#:cÏ:j°W+ÁSXÀUÍý²Ä —òU¹­zõ/[…³q;“É$Õõ }°e-¶õßPdž NŸ² fÜ =šf¡ëQþ ~c®‘}—qæ{Iè¦AÜåľ&JÒ”rJ)®‚jJ?¶æõÇ~àî¤yý8ôe*"™ψÀCã$p˜àͨ ØhpÁ}æ6<˜ÚuÆŽK‹éñÝÔîC‰ïE«ÝÛyÌÄÑ)ä!ü.…<´Ž{äd<5¥MŸÒþó¤¬àÆòI¹V9¤&½ÎQ­JYíAîÒƒ¤¼aÌs9PL(ª<À•^+:ùáüÃO¿_èc 9[FvÍ• 0‚†LR¸L —ª0T0ÇÀê˜*¨Ú÷E,}Æ„Èã JÊ…Tg> ÃXêâWj)aÞJÝé›jþ“¹:Ëü £0O•dKb_p7I¥HÜÔñh <¡r¥b UzÌUF“+°h 9ú4M…Çñe(ôš/'a&=c„±>uÃŲͥ#ݶūcÃ4¦8Ô†›ZÙT^ÏËqp,Ì#az5K^éßœP/4NŠ?ìaµø¤®T.u{©~ŒŸåÂþ:Ï'—“™œÖkØWl ÏÓ,Uª/0¢b¡’ÂÜéÓç(Ÿ]žÉétþY©}ÈWêäæfßß™Üï„ÿ8Y¯ªu/©qSD¦)زB•÷ ýŒðÀKHè¸ðOBãX81u=“ñ[e=O £ùLNÛ;3FuÃbÞñZ+×iä9÷šâlž'p8žU”i¼ :³x5U·PŸiv=ec燃¹ã.óHÌ¡ÿ©ô¸””90žŽ¥ëÛŸ=ë~öTÕ F‰ ¼˜pé8€ä¾ 4–Ü—Òó„—>¤¼½ Àè¢f÷ïv ­Çøaš Åã TÎɈø(,‹˜7ÅP%þïCîaDÀîAè¤AŠ•8ÒÀ݈ž"‰öÀiè7Jü¾"8¼zÇçÓ¯@%“$Jr•ÚïM‚˜ƒvÙ-BÚÇ(­¤d@Þzîù1 ÷ƒŒ7¦„ÅTéñ˜:ÂXzÍ9ºü7ìKÒÕÔæt]w…öô2½šÌJü‰V ¸JokãWËü¡ß»Ñ²ƒåÖ|{4Z7×Lõ&)gUKJ» P1h€ŠžJwW]0¤­Ê©‡4s3—sW'H8ḡÇC®ja¡Cå·éòž{Uú]z¾R£Q=ÆfÙü•îj{b(®\?£1çŠA—}貟ºÄMÜÔϤ` ­úÌFX±Õ¸3ó£še  dæ$ð”ÒÁ)ŸÈ”q’pG&Žç§/í,³ÂH][ùá˜9ÎØaa9@í+ff$èŽÞtÆ~ý{‡ânþÁCÕ=£ÎÝCJ¹=CÕ¹ÇP™ˆUMŠùÔÜTËä7_å:öt§ªå i·Ê Ü·ŠCw·Ðž“¤TeB;0\Ç%ÂvqÝ,M’Ô£4 Fƒ îö4™¿ô|*‹*´÷î·FhO­–ù|6Œöéÿ·w%»$9ôW„:Ì-äXÛ…¹ôW Ð0b)t- ÉݘóïÃHÉr©”V2e§RK]ízÁx ò1ɇÍI]?PXï¨_¾ýY6”ŠûÔB±Šþzøqµ>,=-8²ïž¤¦ûþûaG]B¸Q|øßéùA”üà±d×aQq?œ³£ìÇa.M¹T’È>Yç“ö?Ç•U]©NùòÑ.ŠQ´ã‚Fʆœ#Ò·‰ÙXuþ\ÚùXÿ Œ9QþìIÝJºÐf³út|ÿ¡. IûØ™cu¹4Âs*¥âÖÀœ­­}­ˆXÒÌVí„Á$ÌF!-|›S9l»8Ù/øÒº¾rÚ Gø‰@œÍ¼M.yÌ 0:¡+`t˜‘Ñgî@ˆȘÔÛ6]W –,—Ì$P–³¨U+‹€¨E2&ÀæþEZ8/ mó€÷€$$YÃNBSx‡$DAèIhŒiÏMBj #ZÞwÚ}1ÑxïYÔª¢fA[‰ß¸À­Q›>ž¤…ó’ÐöV¼~ \ˆ[Ç Ó÷ŽfÑŽ­°™Åke!u: QºCeÛ@C'hŒxÊeåÞj`!·YFUg¼&§Ê¬Ñ6kˆÉK}Z]  -E¼*ž*H9¢+ZJ@‚wÒóäT@“ŠY$8£xJy”Op­nXvfñT/a¤Sƒ{(ªbÕ:Ë 4Ä¥tÌyF$£, òÂËO)öÙ2†½“}_0¤û©@¼ÖŒ¡>=cHAèŽÅSR 5sÂP/'ž ©D@ xŒ•¤b±ºÚ¦œcl#=nj]^†xJqM<•b} C: Mâ’¡;OI Ê™IÈ,…wòxIÁTVø­²¶,¨˜ÍÅJW‚ÓuÓš•´ðBÄSÊ…YdoÙD: M…âµ²9…(ݳxJ’f§!©Æ¡â­>§xÃp«Ÿ#sZcà˹RA-Æ,È ß™†~+ÿ^?á‡){¥ÚäÆõÃÐÐÆÖE˜õ1ðèô3z7I?Ï­Höžf–(ÈÒRÔo N¦ªðšPRq±h¥”פò£sg$!_«ÐV©`«ÒY€ht…LuvZšÂÖç§#0#é(N!‹¦&ŒÎ[<Þ”'Ül >¡&ïÔ‚¼ðèH6‹³+Wá!-[ÎÙTÜ"ÙÅdn} ¼t4z?éè…ŽÈÝ+ ÙúÅÓÑaeÙ/ÛY§‹­Ò»_óâ¹jÑÍP]Ôo«ç_·¤ãºCÏcÙ%¸q…·ØEl·ê‡z®m§ÜýÆöƒ»ÜõVÛn¬à"q¯ÑnZöÌWÃb¶xMÄëœ-Dv~32f„´rmvDþö½–&¯ÝÒ —Yk™öÝbÉ™E%+kU4ÐMCL—hi·EXêÚÍÈr+0XÕ¬F•ñvóHb dã«âDÈîýÞÝ¿NKûõ¬O(NyÂó˹¥™ ®† °ªQ¯s¡d†ö^5†Aä…3שìG-”#a½°½¯Ùî°¤‡õSy­a½;])¦ tõ*'˜øÜ)Q·ôv)‰Xò§bJˆÖ@ -CäȬ­A™•×nA^8«B³uë‡!_±àKÅÝú~# ç&ð&‰è4‘†‚Üý‰4ds¿xRzf¨¹^Ïcù%¸qýGA£µiÓb¬˜¸ ˜©²\\Uê Å¦µiáEê4C8îë4|©yoíÍÛoALîµò¨ŸK§¡àûS§9õÌŒÕiŒT™DZgÀ“aÎ+Ë*z´+OBÖÓtJ?Òét¼–¦ iàh'-_kË}æÀ“7ÚÊ“Z¨ö櫨(Þ™N£ü›“QÝh‡ÁTÏn%5¸Ëߥ=½(mŽpaRX‹de,óB†Ö2kä€dç7£Ïžƒ¸v3 ÉIndeZàv‚N‰9 3B©ÀÑMñZ.ÑŒ®1{Nýö½–ƯÝÒj¸L‚m#n9ƒ( $Ó>†˜0¾­.\¢ß»7KSî:-í׳>¡8å Ï«Óø¥3ãÂüÂ¥íýM°†4x§°Žq£TS½‰›·@H /K§¡‰–µ~ý –bdsœ‰À¼É°~ ] ¡Ÿ: ÉÄçN‰úeÓCGÕˆ—`D žIÍ#ÞPMd¡FÅ|-&B 6›M“ÒÂËÐi†|E{·¯ÄQÃoä«ÅSx“DtâË4äîX§ÆvNRú?v+òRÇ*O././@LongLink0000644000000000000000000000016200000000000011602 Lustar rootroothome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_results.subunit.gzhome/zuul/zuul-output/logs/ci-framework-data/tests/test_operator/tempest-tests-tempest/tempest_resul0000644000175000017500000104143415133740601033544 0ustar zuulzuul‹Áoitempest_results.subunitì][Œ#WZ^ñ€!^L¿L`ººÏ­Î¥Ã™Ì ¹(™™ÍL´³³Í©séöŽÛv\å¹d4PÐÄåi/ä6Úˆ. вâË< •H´Ò"Vb—ÕòWÙnÛÓ¶§Ü]înwŸyHìrUÿrÎÿ}ÿ_§þ~çì·žµÞz÷Öß½÷Þëç?yWgfÛu63·Óvi¶Ùnt·ê͵ >§kº]_Óv§ÿ}S›¬Þj®Ý€Ï×·[w_¬§Ù…Þ¡âçF}÷œôfºÓºín­>ýmï¿s¶ýüåþSòÖ‹ðû3w/[o7t½ù”ÙÖÔe纙—ßݾŸm·šÖ ¶µqæÌó7 "´iÔ]3»U{Ù½Ú…ïµ'÷ʸ±GÆÞ¨„jÏ^¾QÛβvº±¾Þ·FÔî&º‰Zm×L3mnƒ%Úid:¦ÐD^¿ƒ×û·©¡5ŒDúÄdX®À¥Ëϼòì\ Dµçœ¶®“nÔœ¹Øjfðktã~ÛÙ¨a@:¾þ©´Õ<³Z;sÁ×Φýz¹ž+]¸ö|ô1¸/üšŸ\oúŽ=³úN ¯±üÜŸŒ.t³íèø¯8åG[;õ,söÇÎ<|¢Öÿ÷LËÞߨ]i5]qèe—¶Án\l«³BÜ]· –®½ ›µÜH»æ©=ûÒ|ÄÔuî¸N~ê…¶ûçÇL_ç†kneÛùo˜ÊB¾;ºs?ÿ>Y'8a×kÌßfo}§»Ý*×Єóô½½ç±½çÝ™i¼ØÙ WÁ"ˆL«u»^œ´’žZމ¦Fz«%RV3ä‰cXHr.ö–!ê¹#D©DH+bŽ]Ì“ŠjjŸªµu¶}ný©Ús0‹¯6÷Ÿª]w¦Ûqð½ã®×3w.wU_¾¦+æm>¶i´Òâ0¨—uÓü¬ˆ1ó·zÂç?d‘ì™;É™+ýßV6j7¬t»u ŸV޹ւG31El¤9ö‘¤,vÚ sµ²Zë_ ñJ77×*JD⊒ñˆi’D‰•8Ò&Ö`_é¢óksu]~ÁµËW.=åÙ‘ûåŽËi¶ÚùѶî€ oÁ×F½y»/ïvÇùüăXe½¬²×ÈÇJ]ï<\­dô}À„ÝÑÛ+o LÎÆLYI–°¾ÑHiD£9K-±ˆIs$î*7‘áÔ²&Y€SçzšS¥ÜÆTFBI1e¤c+"‹˜p‚µä‡áÔ´áÜ·–Rqn-k”¸uΡGÝzëá™'¾÷½?ûÁwξqþÁaѾoùλ­ÎmPÝþÚ¹çߊûz1ô¿ýÚoŸßYÐЛÉýÍ‘ùØ—äó_zs ï ?›ÿå·ïnòøå ðßOâ³àGD®ˆ?ýhT8W&$ä,ZÈÉ,ºo…À¢‹>Ý,zK+pïÀ½÷Ü;pï#àÞßxãý/äÜûÓGD@‡Tü÷Þz£“Sñ× I>ÿŠ<¿µHIº¶žõe¸°ú™ïÊIx=ùÃÿŸ'mäòôû¯&OÈ¢éw.leÄ;¿Y c,õGž`³V@$ÌEÚ3âpŒpb=Pn$§®¢rÊ(÷¼‹*í@¶Ùd;í# Ûßþ¹ßüÛœlÿÜ¡Í!Íþ™7ëOsš]Û?üúW^?¿]¡ )°ü»õl{³p~_ˆo¾ñÆ/Ïþè÷åCíWäÏoèÒDûZk"ÝU×¹'K{Ô%nÄÕ¾-B‰;ðíÀ·C‰;°îÀºë¬{yX÷$>#™X&BW*\åüMtо2ð·Šøï1‹@ß–¾•ZHÙÚñ$hÖ¥¦Soç?åG_ìå±5]»rõZmÇ¥©Þrùyõf» Ùµî€#2˜9pòƒ•ÁïypvF«ö­NÃæQ;¿ `MÇgì¦Îò߆öF?’ˆ³m ÔóLÃížÚì6p¬Û¶zì ÓÛW?ý=yMèç¿(2, ýõ/ýßyQ(+„øÝ³íóºj!`á÷Ïë~í‡þøÍ¼ôó“ñG¯ýã!ŒY¾ ¤'¡¨¢r¬a(æ‘×ä”úO_óÀBý'ÔBý'ÔBý'ÔBýg9ë?­""–‚É•.üÈIï¦  Ä-~Bá'~BáçØ~þäìÇ‹ÂÏObýcXñùÏÕßÏ+>¿£oþï·kçïÍ?z1É .ö¹T¨~ù,þÌõ¤¹–ŸQ\Ò3á„Wþùí§?ûÎÙöë7?Y’¯¾róKG'KéÑë7Ñ^¸Å«’dGþLÉ7¦H^0 \»võújÜv÷Ó ¼_fqÒu h»žåh›7‹a”O¢»º-•x4BïrƒýÓŠç£1V4ÿå^”v“O˜EÙ^¦2ÂÆèLqÝÐ;=Eu›Ÿ ß"i•°‚“—ÊGÌ%Þß§.8A ’v@Ÿ@€^ã©ÁÊ'SJUŒ‰19'¥F–[ª¼Ç± T Oc‹Ö;‰*zü8 ß÷4žäÅO}üƒÅl{ U[§)E[$M]˜Å¶µ! øØCpë¼î6²<À7AÕüÐ¥þ¡6û'ù8VZÚ$6–)†”¤ÆKJ–Bh.F¯.X/»ë °éîµë°~F@"Gÿb{½/ìµlëµî K_~•$ÏuÍ×é–þh!úØÕc%{“| ÿ>^°‚4íNG³ñsÛV>É`ÄéÝZ¤Œ[™N|‚¹QV(öVJÚ‰·\ìPb Ö*1ž0Œ\BpXŽ'8¡nôâNNÆ®Ž™”@ˆ‰)SÚ*'5ÂpáyÌ8½zÇí$ùÕ•Йéiᚶݪ÷ ׃Ýó· ®›ë©I-$&Æi¦)—ÇÎc#‰ž÷Šp×ñÚ7(¾4u£Gh¶r¬èÝ©÷åj³¸y·ÓåT½Q£¾O£Á=Ö†Ë.½c6QdxÛñ{晦„±„3,rà+A´òR€ù©0c{”è­úƒ¨ðظ1U‘[»b5#³)m<Æ’0c¹R¼g‹9¯ïôi÷#6(ì2Å×ÍÖ=4³.ŽY⬓f“U, ¦©–Øx/y5žÎÇœæ_UlýYÃ¥œ<.½±Iˆ‡$Ç%,áZ:›k"ó¬R *\\È^fi0ônŒmb9s\cY.–Ô' £!’ B£ÞŽÉÔ˜ õgz×u³N«9â`B8²2FQF½×`(3 yNmEî ;u sÅ˹wøÔ:¬½Ñ‰H˜2‚8ƒ¸)uZaY‰‡ûÂW±z…ä"­Q˜%ŒšX²D;&i¢¼#–ÓQÿ6]–§Gcþíë?ËÅéݺÏVFâ³±Þ ÎP¥°NÁrÔ[Ta¡bÈr™÷…Wn<·Y;ÑSIFආ‰Ó „Ñ6޵âFp\ÑDîi:-TÁô;¸ŽÃÉ¢àÜXr A‹qb¥—¸ùJUs< Z=êü´3zVš5_ i3n8ïÐ–ØÆ‚Á” VX¬ %¸ŒUÚUcËÝg„~Yj*LP ë „4‰süÒ±¬D ¸•f”ÄÒW1í‡ TÌœ  à`%8† Ï%Š`›Qo)¼× ³ÜèN‰ÙH MòŠ$Yð…ieÏ™R”á˜A*¦ª0Õ`ÔXjÔá{•ðX[`@“0šxåCbÈâ¸cV3ewÕ˜d—Aù„äë+a@M “Î&Ž`' Ÿ–½ºßÀÕtF;º D®3êì] Ìòµ©7!K¸CG| q#ÁÊj"fa¯¤*" °$Š«ðuoÔRIr)gïÕÂ! édF„PˆST YL%†kã^íúàÎîë1=8ñYŒxÒïc•CÃŽ+‰'´âGR¬;ÀcÁ­dÂë¶»³sêvï¡fá©_å>@„ðÔoÙžú¬“™õ`öZˆ>"ÒñˆÅLD’©8Ñ\BjÃÔ»+îX<å©§°žïoîV½Š%™›ÿê¼ó›û›iÛ™ºï»¢ê‡j=%˪Pá#µ} \ö߈Ñ“Ãj{žMzÈ6qŸYEðå<™ïYiQòÍmÀ­‹þý˜¦SÔÃ'8Ή‰ó@É#B‹ +¢‘Œ½‰ ëâÉj2á©xßQnÜhܬ× ˜´EÆS,Ü9âAšuà&[÷‡325­‚?Þ¼õpQØtð½ã3kȺd^«È ‚£<_ޤe82 ©$Ž1“VNÙ ‹Š‹E\íV˜q÷ÏÆ2Sce…nÎ ÛÅE{°{°x·¬àÁáþýÕmÙÇâ«z+ÌÁDGðaÀ{üþŠ×䌂οMf"ì©xÙ·‘[¥EæÆ¦ º ™ÛTt$óen$l×\Òíš½u2ã­™Þ =ºufß ©›ÕioGXññVí¢n4j›ºk¿Ñ]ÿ馇‰‘n;[븬ÛUœuº®Vo«9Æ$®¥Ì`'¯kBør&"EþAÔL­Nlþ1˜›ó’£þåýÂòÕ+—¯?wõÆn­ôN‘rô¡ol‡nÿØy¸¨¨Y ©L×A™£œG„qà±p‘rG Ö1 ¿·±O&Gi‰B}m9S‰ÙD™1oíe–d +†8ž¹Þ&í«?²„b|3þêSŒrkq™ÅÜ#'{ƒâXŠ¡»Yk3ëÔ·¶Š=šƒ-Mw/Ûìt››°\GŒ¼ÝJ³q³ƒä쑳\Ó>rÄ·:ŬÁí—Ø5‚¸RªšÄ†2´t‰MyÏ•L’ÎÒ<ä=ä=’…âÜò%>s𨥃ݫWž½`÷tÁîÊ@ ëL=¨zÓEheqh< ϸ|":³UFO8:Oþs+CÍ:OBg6/:«€Î:_åâÅË—/]¾ð9àóòãó~Jþ0ù²ºnì©íçé=T̨íÃ¸ŠŸp^À㙚^xAà^xÁ1äñ‰Çg¥ÒYš|øð9àsÀç€ÏÇŸEÕy;ZÃa…gæí\ŠeÞF<ú§ŸKøÕLS¢PQˆ Da™÷Ï»°JíS~0|)´Þ´¹­[Ý6«ܦÞzÄ“8¢Ì’ˆqᣄhíܱL$×N¹Á¼ääQ\_ñIO˜‰Â4bÆ$‘4:‰”VVÀWa´\™€üCª°Õh%@!ª ôÙ¥(/_¾xõ¥—._é“”jÛÉöŒ»^Öh•÷”Ýßøã,aïΰ[SPR¾ÌhUÊLÓ;™ïê ªˆâ4ü𥆍R«i". (´…öî–®2#ìoxþÆ_þ÷½¼áùo}›ïaôgÞýÏÏ ú '_5ÿú+ ªg® Býò7¿òżúõ7A÷õk/~äèd)ßýå÷'µä Þ*·WòŠ[+I2™†HŽ ©ˆ†„ÖJ¡µRh­´”­•ت‚(x!¾êÖJSÒM%OGk%1‡SÏ"M´öí€7j„"dm‚±H<Õ|ÎÆ-œ—8â8uVb‡ÚYÉE‰"tÔ:b²›ò¢H8©QÞ”*3­³˜x’;+•™£¸x ôD5V*kà6VšS„4Vbk*æ‚*Þ?ŽW‘`Ë–¶=ÚXIMÌÛvU yÛ$pŒÃÎÐY)<± µâ ŸX– ¹•µàRóYÛ}âU¼èmÀ‹JX{-¸Ð4­ÄilÁU–a\ña´à’ çCŽ`bb#–xiÙ6Y‡™å …\§©W™1oª9a×r¼†9a± -¸æZ‹‹Ù³<çÈ' L?ðW“I—..ïùâÉ&O§h2äª2äЂky_*Å£–vOE ®»GþªP|°W…âY¯ ‰UÊÕIGç‰õë]Í:OBg^å è¼Ìè|J^å ø|:ð¹Ú\Xñµ}±Ê(?á¼`r ®]Í/¼ ð‚À /¼àò‚˜²ŽÏJ¤³4øð9àsÀç€ÏŸ/>WÛ‚ 0QŠÙy;'ñ2o8íTš( ™¦D¡¢6¨Ÿ \ûfûÚÐÎј$$r'Ã\m§±´ÈŸX2aC{Y˜:¡ÚËmQÚçÚŪÀd™Ñª”™ŠgÐSjÍ}ýDUQ¡ײ·à*³šöÛ‚+ ÐiC¡ù[pU²áY¬Jv4žàÈ‹—o\><\ÃD¥³Lpmn\;ÖðuÌ¡‰;hš >Š^n Äá²^ÎÓYú‡èPëÅqxÓpá¡…ÃЬ·Óiu6w\šê­‚>øÄ'V¼î62Ó²>oÔà?‹5VkƒŸt‚ ƒ†Á£Vja›V·akÍVVK\Í·ºM;¸¹uIÞLÓ·Š[ )/·¾ãoÎ Ú”qÎa›Ò¿ø¿OämJß*„ú©Æçï/X(×;¥ð‡ Lë_~à#÷ŽP˜òJÿ?&÷E7˜ zÕJéÜ ü«2Ü JC§ÒЩt);•ÊUŒÅÑÄøŠ[•Nn³«ß‰oUê=UÂ)9#Dļ±ùÕãqž9&&,™»b,gœ§V¥ò°[• Å<ŠbÉ °hÁ£„q1 AÞKí¥¡UéimUúØ©1 Œ‡±@OZ«ÒR^l«ÒyD8@«R¹†CÕôi‘«„³¥KÜéUŠYœÎÒ-dns£cØ z•†^¥¡Wéœ[»òZ¯RÌ"rƾh¹Ê[Ò”µ¶XNS+>¥ÍJKq¬ãѬTF³RË÷F&÷I1íe¤+5òy|†x<¯†DF"/6‘댕÷6ˆ$Rò’{ÞЄ.Ÿ%@§éŠž9Zh  %€–ZgÕÐZ-‘Õ4"k<‰ŒDF"#‘‘ÈgœÈuúæ ™à%yì\4›‹þø(õâñLƒ¡òh™ƒÉW*˜|ÖU_ð9D`8ŒM_FÒaÊÇ(ø)$n@¢À © Ü«‚iIƒÏ«VÚIŸÏXþÑ‚ÏEƒH¾pÉK®&q™2È›xCˆ‡±Ï˜½„ÙK˜½”$‘ m ´5ŽokÌ%Ñ lÍÝR×Ü››éSK¢›«U©˜èv–ÝÄ<Ý€©Öõt|Ka{Æ:ZKê¾eÖÂh=ÝV)Ñ­J¨aOAlxTJE1Ñm¦±x2; 3–¼‰nÐý ·x¬ŽD7Ñ |q6ï«´uÙ =åX_׊ &º-îæ}%Ëiá@»‰nÚSߺÇÛº/;‚ž«îÒñXëxŠ®xÜêT+ ¦C/2W$˜‰¼ôD&'è£L•Ó©÷ôÒYBMÑ•âA¬h  %€–Zh œUK€k¹|Dq™®Hd$2‰ŒDF"Ÿ]"לè&¤+ÝRß\µ¸‰n•M]ª<š5˜˜è¶D‰nG¶Ž”§@7RÌG°!Ôñƒ$ã@…†JlÀÅdðyU0-iðyÕJ;©àóË?Zð¹jH./ÑMɸLäM ¼!B!p0Ñ Ý0Ñ Ý0ÑÍÔßUÐ,E³ô>fé|r"•⌔®â(ª*'R¹¥z`NäYΉTóȉôa¦ô­´3:p˜¯ŒcA+|¢¥’4[oœÈUɉ¬Ò#jØ~RŠ0ÏÜÈÙÆâÉl>ÍXòäD&ÝxïÕ‘©š-NNd•¶N/ž²™£æDÖç9‘‹çQÉrZ8ЮDN$‚öÔ£<Ôñ¢<ÔÔ(rÁ% —Še㱫X\¦+òx‚ÇP=.Æ]"™Ç+w‰D^z"ËȉÔÊ£jÚŠ}Z.!jù,·TW´Š,‚–Zh  %€–ÀéZD“¥#²ôâ2]‘ÈHd$2‰ŒD>»D®9'RzZÑRßÜ[K`JêVUÓ àZ‚¼òhÔ``NäåDÙV8RJ‹¶Æ:Ò`î°PIÇ—š9$0®`F#ÂÉàóª`ZÒàóª•vRÁç3–„àótЦ w9múÆ‹tÊ%€y¥;5p‡(Šñ[‹ žlÄ`Ž$æHbŽ$æHbŽ$æHžÙÉlyª–Êy<ît{Í—ìí‹­ð‘ôç°Õ½hâà‘Œˆ$¢ØîÅJJ€ýßxù÷ï{móWZ¯ßyûÝÝÝ|1®™Y˜Pp«ÕN%ŠAÀÖ† w³ßóIšÅÖóF‘õü¹xŒÂ|ðf'‘Öq¿ð7w߸wŠñþÞc›/„1<Ï8“㽇»ß¾wnïÊËIéÿö™›Ï̵ô‡{Ð;ÎÃVûcÁ¶é‚Uw±ß‹ÔC{·{ÛöNg JÞºðè£O¿Uä°¹Øë°¬uú;•¸]¶?—©ŒÎP Π }¡Eö…*¦BG Ý"t‹& ˜ÉLÎûír¹³'c> þ÷ÿ«ãWO¸#³ãëJbv|1•£ùù¿ÚìÎCŽfh{¦µ“‰#´÷ýÄúøËDˆÿøï¿uOCˆÊFÈ•)"2Œê9!™ÈµÚ"ƒWæw2ªÌ^©u‹­N9Z'uY'­“ŶNŽ6¾pa-˜3lÁ$[Ϭÿ|'±a¾|šØ™2ú›Ïû‰)óz*Î÷Þ¸µ¹?q²Eè„™H½òù7s&]Qz÷É+>-Aª¯«üsÆÅ\ÖUrbŸÆ ñ¦ì7 \bÁ%4bp‰ ”Å\b9ÿw>š˜'¿qÚ™(W¸õc‰‰²"½úO;Ç6ƒ™DÚk5ÃVt`&» õÄ^ëòðÁð3ÙDwPþOþÚsöÈg¿””úŸÿòýÏ¥ÔÊÆÇÏ|w¿¼Á?†ñ‘—ð„„E•¾doÇ=˜j« EzÞfÏ÷Ì&Ç•RR+=TâtmˆÃ³òÐ(8ÿùŒqÎD§Î·œ¸ï¿sz“&JÎ@³cÒïHÞT‘Ó “OÂoŽñ#ëÁ?'Ôžq˜v]x$P®ï)ˆP(~4Âû\h)/ˆh@´ ¬ò-§”jN˜Ç‰wQ)ã†"¤:Š—”QFŒK¬rç¨æ‘»q!¼Ó?%Ù9ë»m˜Rl}ÏÄ1Ìház ñ8MCye=ììÂPOp6´‘éïôòÙM—³GI²Oö¡ˆsmTèó dš¹ZÑ R”ƒ¥4Bæ¿ÎIëiæÐ@€¦½µ×‚ñ3–’™ ­Lا¶:æqûêµÎ%—¿ôŒó|?¾m¥¢}{Œ9jÐÉ7Üô¿Òtã¸?O‡?»×í$üÕⲈ1 ϸ–EÄóYd#!„18,‘?Y-éwãæ°¸ƒ ngÇfÆÇàÕ*pu $!¡! †ŽOD† ¾µVa᫾l]?ˆÑ~q­ïÎ=I¹OmþËÝt:û6gJ%ìz` ij« “0Be$8nþÛ»v×O¾4ts¼ÈV¼Úá^§ÕîeJ|~ ФågjÒ&Ÿ{5ÌP¡ÂmDåIÁoÃS‘#“f4 ~i›Ñ²•à|ð¦Á/϶ӗ÷»;yãiPª“µ©sðŽÑ°‹÷ƒ ÚÓÞèµãïL«gšAè ©e¡­¤gtó1T cJ FýqT¸ï¼1U‘C±=C$ À9 ô^W› "DÉ ­Å .ò[»fk¬Ûdu00+nëvgߌ*‰…–sæÛÐ* ½)ÔÌ— º©Q$ˆ"%êié¤Ìií S;¿ïmJ<.½–<ð½Èw…õ™/Œ².81žJÜIéÖÑÄ©ì€P¦Á¨u9 ýP0+ ±àÞE#ß0žb£"ߺ`ãìõ{c훪_Úº¶ßëvÚ¹öÀà w©K"@Or#A­àaM <(vêZTkÞ ñih‰‰ÀÅ”> |W¹‚Á¼Ä¸¥Öh¢jiáLø:F¯T¦È0ЄùŒ\1ßX¦¨¯ÁÌ Í·oÛößf¬}3ýËš8¾ÙŠzë¹ù‚…\É(ðÀ°ÕšDÒ0°,Bã×QCi‘Õüì'®_{¦Y…À÷í ‡ôÔŠyðÚ€yÊeÌÀ%rn´¤ 5uä¦Ó¦*è~Ç×qÔY´¯tD” 0i1á…*RÜd¤j—26t¦?اݱaPKeý¼ÈÀî‚Í;ªKrÉÉ\¥Œ0®aJÌ}¶L¨­§.‡—LýªRW(PAÈ0 `JS$á—áXé2°­ £WQÝ~¤@SƒO˜Õ”Bv]Ÿp˜ô…r¥öˆáA¾µÇž¬…²æöM×Ç,7‡ú¦Kp²$ð…ú‘`ZƒSF8WL×QU¥£¦ò >©DDL`zŒú‘¶~àqÈbE•YO—ª1 d”T¡¼ï%ãËg`šLÙз"ë°§•Ðù¦§ÓÙ5m“œH?Ëâ ÊÚ:hµÁKا¹¶†yÃ':jº,;ˆDZétf+‰’:ÚzPj%'¹RcOja]îxFžGaž¢ZJÂ8UæØ{¦žÆÎô˜>9‰2 r­ î7'ÉE20ž‰Z‘â­ce–VX•;êî_ŽDE\&4îäÕ±’Gn–î|…kgSðÕ×>3xá´þ`#º­½^6.þڊנ‰FßÊ“Önn·‚í5ÓÚ×zµÖ.<ß·k{Û·c¨øä “¸Óï6^ëÇ0¯õ¶»þÖöšo¡Ût×~ú§Ö†ìÝHJ?uù¥¡}rpLP?y¾~éúóÏ?u5=;h×Ü:¨©õµ‘®=ì¶ÚãOÝ:÷»&¶¯n¤3V¶R‘+xqä¿óèƒþîï_M¶¥îÎu7f´õ›?x³•ìAÝNËÿÞÿloFu—¨…2þä¾ò…{çöžúARð·ÿë½y\y'ꩊð!Éhà© ÷»ðéæà¨á:t:ôƺÕ*yý!͘­ •²WÕ®KÁ{Ç•¸iýmxP‡¯ª[‰¢÷Ž+qbŽËaÁá…a'ˆs¨ëtaf²ûvuJKžœOÌ”xÏÎ>ÙØîíîä^>ð€}ú·ó@Mmôô£ivÝï<ö{çÍÝa9M—ã_Kœ¦_1~é›—öÚ|y&1ú¤Å_J#ü¯§ú—Óþ'Ò¿¥„ÿ>ÝLìžV»ßéHóæ³÷þ|§»?'@ˆ7ß~ð»ïœ‚•}¨»·¿8醈†÷æèNÔÁ/” ^w˜;+Î÷ª¶|aîâ,…¹3Q¡#iHfƒÐQÆ÷å‘„'=×`˜ûІ¹“k[í½˜^¿víÊMã?¹sÍÛ¿=Q)Ì]Ìæ.0ÌÃÜ1ÌÃÜ1ÌÃÜ1ÌÃÜ1ÌÃÜ1ÌÃÜ1ÌÃÜ—%Ì]4´:•µºc}•\ÈŸOO¨IOæÔq™b QÃjC!íP«Ü8)½··êE¸gC…­è?:4êr:$“b“¿OÃJ¶†ZQÖHÕµ‘5P²ª 5îÕ©àñͼéA‰ ܽÀr7ÊNúTt8Táy²áª³°sœx—ô®¼Âi>Ñn™ïhÙ#RQŠ9aAO#4r”UÔñ‚@ùcjx,ûsO]½üñ«WNÕk̯ܩۨ6¾N&Ãhƒǽ†¢‰oÌ“0ý^§Ùë¶¶¶Ò@̃¸¿ä^áf·ßn ÌUóäó {·wèS¶zuºé6ÕÁëïï¿xÌe©Ç¡p.’ÿR½éËÖ+éR[ óuo$׈Ʌóof0Ž¥ÈÒ¥diÕ v¬‹X¢Å±CÅ¢EÕQ„(B!н/D ip¡—¢„Ò¸Xq‰’Ó JB!ŠEˆ"DïQÚD,7DY!D‡Š#D‹ J¢Q„(B!zˆò†rår/çþ?{g#ÉuÕqˆâ¤E( Z“‡5Ú®žûýá2«ÙÁ¶²;cï®)^3©Ï&³Ó­©™]›Åàå[‘‘yq^#Y a1R2AH8ˆ`%Q"EBH É`% …?À­êîéé[µÕ3ÕÕÝÕÇÖnÏôÖ=·î=¿ÿ¹çXÓ ˆÚ :fÚbE@ :aˆn¬ß·­7DG@§{¾hi”ªKË‚Ðo'Þéå’uÐÒLÀöè×1ï=“Á긇¦ÍxÜk§u:FOG«ç\!–}::y®5ßÊUY†ûýÀ~`?°Ø?Eö‹&f¼Ö &Ü ƒÁÀ``ð´LÈ”Ž4?xöòêýÕDÂ&µ.bk|B§ÛËV˜¦ í]÷ÝÛJ>Zîùµ¤f©»½ßó{g×W×Ο_;gæÔ à=fž;E1Àà=axÇ6àð=_ø-‚1ê.×u_ÍÆqžáI—cÂÆc€1À`l‡q! —¹— P¢rö²E“ÖüFU&ýû†ýþ@ ?Ðè_ ýßöï{7) ýÉ)ÖÑþ毼÷{IíßI[ó¾¯ýûÊö¤[Þ0þ«ßæÉ÷&%´ÿü}æù¯¾}ê¯WûüâÕ³oÿ†UEèjŽ!¤m>‘rJ´aZVBJÓBœ w>«€xóƒ·ÞøµÞ?Ø0oß’|ðÓvÜ0¯hø­~½çÆÍ­¶¿ÕpÛ×MÔi´¯›Ïo„îÖã±éø$<Š;ûÆéÇýؽ6ö¶v;û×¶^h†ÍnãÊ…ÆAy¼Vº½Õ~#Õ›oà"ÙSIòðÅ‹kë—“JÝì%-ØJËG5úiJ²ÃðhŠâ~1áCžŸög„Ǭ¢ú'÷³G‹ž gا©ËòºPô ŠžAѳy,zf!¯¨èÙй—[ï g¶õÎ|-}é¹ãs‚&eix:Ô¹ËE;­L6àù£`:J‘Gó9RQQ<óÏ=*#©œ·05—h}{­^QU5z&aíJüÐ>·íD€µ^úF—f<ðŒ—)Pˆˆï(|‡Q¦ŨñªÜô <¡‘ÈÊ €êX¯ÈˆXÊîÙSh±Ò;íÃòÏóŒùäÌó1~?õ&«g×W×Ο_;gfC…°•` °l‡#p ¸­·G¿ÎT‹ ‰¥ìÿ+0Œ×÷ú 3lÀ–ÆTL¦S©‹ÀÔ»ÁT”µw»·»ŸnÝ&cBæïÜJ‚ë» Í³l†[€8@ ˆâWŸûËë·Ï<³ò\»óåWß>õÎ×W¶ûý¿ÙÇÉfw{ÿZ{'íôؼƒvË ®÷ÿÞ£b+‡¡­ †>_7 xôGâfg÷cæe£/ÿÔ=uûÌ{VžJò‹o¼´²3醿ouMù£/<÷Øí3Ý[L¾øOïÿøƒU7àg÷Ì Zîn»íø[î®ñåÜߋԩîã{[íÎ5óðk÷ž>ý›ŸµÉUÑõ¬~£O*‚Ÿ/§Î,9Ê.rúVÈ)Aä0¡@äÌ›È94OrELQ-qDFíØøœ¹°t.’Éc“Ÿ†Qdºß|3î†~;꿊Ë’=#‹šP¢‚8ÖƒGD6«Å½ akÛ¶ñ;#²VJUîÞqãÁK' rSrn›r<í!Ë€Œè€ceç¡àx8yâòƒþáëÏeb‘¡q˜‰ULЩÿ¥†úcνIÄüÇoÂ(»GBý»ÝLµ””Zàr΀iÉæ)\sÓ9n"`w'—å}³ ^+!^ã’ŸænQúÐD±Âéð/ô\òAŒÕÞ ’¾ë¤k´©OÂÂôšjÇ— 9,"ÒÑÆí9(Ð1ŸS¥½áZôà[.W™Ntia¡”"Ù‹èæ¹”£:eYð@x <„¯„ðf|Ö—´á8Ïj -H ¤ÒiK%í¹ý/<–\+þýi]¦^,&ß¾ÙM."mŠØ½gåñI7åf{ok³½cFE;ØLçq¿Ußýê‡þâö™îÕÿNÚòý7Þ<5Ŷ¾n|õ—m ‚‹jjem¹71¢v‰ÄÜ<.K"ÁÍc¸y 7çñæ±q„BŠizúr/!cœ÷­¬ý%dOJO2Á㓇ifÄ®ŠB3)ã›a¨Ç½ã¨8–,fèr>¡J¿„L˜¦Z‡ÚAQ@Œµ¡t´ðMÿâ!‚BO—òr‘¡qULÐZ]B.ÚÁ¼„²&qž…Å•ÅaL Œƒ Ép!.$§LIZV`¨PŸÚáÚeÉòºç¸KÇ #óÖ±ÚŽ•¢‹ò5*E;mRCeÌçëîzA<—vw]3Yî±;#±§§‡XR¥ëäר‘À¹Æ-Ú5ö¢Úü_9{þsc_mOg@…2M‚J›¸Jc9`ÕgáîngwózÇîµtÞºzu)r÷·÷üNš?ßÛ0ÿ[M'­ùC³1ø±!œù׿ð@ÏÝ_ØÝßkDÝFÔ·ƒewÏüš·¿6ÒÞj\IjÔ™¯œî÷«§[ÆãîìtöŒïÜ3ŽÕ Ó}½ï· B/Ù¹Œ:éÓ1Ÿì¯|ãì¯';Á8[žÃMá¿~ñé’MágÓV}kë啽JZµÓiÐwÞ¿òæí3Ýß~Ù4ãÏþ塟|e:Í(¼üÄ;6°h$«£æ é%çŸÚM¬À.0ìÃ.ð"ï“&"dJN¾ì `ëyŸÄ@ºÀÚ=Hrâwå9,ò©£Q$ŠósäiWŽä–Pª%]ä`{1=ë(åšà©ÈQHzŽ`È󵘰Ì4Ôó¤Ö;ÀE†Æa4V2Ckµ\´‡'¸û<}b;¬¨”µ¢¢,üÏkâ˜BJjîÀ»éѼÓN4ÃɉÍ|ÝÊgÖdמÏÊVŒdh;ðÙÆg6.Ÿ!±ðy–ø¼ ©à€Ð‹Aè’Óª+Êrïw™çjV{e I®í  @€2eÊ”Á *.yýcwçÙ„B¡Ð@h ô” }ÏîòóÉåý¦{?}xoÿûŸ~êɽýO¥ úÈ·ž_y²’ÝÜíì\Û=hÖo\û©Ï¿xûL÷¡×“&ýÇw?|júM*|Ÿÿ¡±é¡huÌfF5×CCaI¤,Á…ͨÅ×Càz\ë!p=dC±ù‘gT½2/]ãrWqã–iú(<:TŠFu*;mbCe¼çï&Q1%WÞM")‘ÊÝg”œL]A—–NRæÚ¸h·Š%œ‹Ccêt¢A¦CvÈcd‡ìöî¡ü·®ž¶L’«§GrGšžN”ÞûS¥÷ÃÁdI~”tpòÙpºþ4™0ƒ¿?‘d¥\{¬k^ƒqÒn#yrÃ´Óøk?lß0Ÿ ZŸž²½øÇÉ ×§ggõf¸ÚõÒÿR²ÚõxÚ¸ÿü“¯®Dh\o°÷Ûý&|óÙgÄí3Ý'¯¼bžüÚÛ¾þVUO.¼tõä•÷ب¤èÄÖ®·¶äì“RÙÛ·¨JdŸ„ì“}r.³O²¦&¨2·^n¾ÉÌ›ºÖ75†ù&‰$u±1IÖ}ß /nšŠ|ŒÃPŽ[Ï +˜ÂšãYÊ7É*Í7‰Lw†T¹r#ì0J°ãy2)§=Rãß} ù&2ßd‘¡q†•ÌÐZå›,ÚÃÌ79fNo’µ4’LÐ2’'ð&Âz´#õ­?0"48BGà!€#p„ŽÀ‚9;BPLÉ•WŠRQFrŽð&Fx~V¼z ]8×’E;(P4@›S¼Šô£‘ñz^ „ãùÚtIÄGû8rüÐåœG”+D!ýè"¥-2"Æ]ª²ÜÔâ-$µ‘Ÿ~t¬¹8™{Zc>¹éGÍðSLPUÎ šÇs±‚Vüm§Ç yœg-,°MmH8Z§KÑ…´ÓÜ¡v!Žj§~%šŸìJ4ÏKZ"›D YYKb'ÖBŠÑL"KHSDžg"/Hš`rí™<‰£\KrÖíe3Yׯ¡@¹Ö‚-Z´hÐ3¨Åud²Œó¬&“ÉÀd`20yv™\f|ž0ÑŒs‘Ÿ3Më¸{N²¬… — @ €-Z`Vµ×ÕíŸ3Ãók—×*Á²æqžÁ€å±±<Óôq²²"«Ý^ÕB3Ž 2qž±yÖ·¼@ âs¸:^AZK6S⼤ܗ©—hšÍ~g;hìtö^؈:û;Á]òKwÞ¿ô!0¦ùK’ÈzWÉs­ï Þ¼kM½ëÇþùéM²÷>SušÚaŽÞ;E. rô¾övÔ~y"MèØ#Mxö£ïþo’£·MÌ“_ÿáß_üÓªž\+!>#ýMDdè… ½¡2ôB†^ÈÐ zËÍÐ[p¨øFW{f:\(l"!£û\߉PdâI…ÄG†ÊÑHÍðR°K&†—ñž¼TÍÅ$}iÕž1W¹ÕžUi>? Ÿi¬„D®%‹–ª¹h¤>z"ucýòëo<|éŽlÍK’ô¢ð ækVUäkFB› H#ã©ë° ÇãÈ8EÅ4òˆ”ˆŒ»2ŒÔ1_s‘1åŒj!3‡½Û¤[¬”ÍE;¿ü{0c>9óÌgœƒ¤ÍÉÔË2UUóùXT-þ¾{gNãRבÓ:γ8 œN§ÓÀéyá´B“(h"ZœÇ+YåñÏ^^½¿… Y®½5UÆuºÉøÛ »Û®ö.^ïm%-÷œ¨ùÄÌÑýž“=»¾ºvþüÚ93+ƒ°˜1a1œ -@ZÌ—´-%8‘:_ahŽë¸Àã káè\yÀÆl6€ À.Øw#5™ÀZ€”¡ƒµ€n÷•ϪEUZ0iX-ŠtÿöݤZÔŽiÂßýç^ÿÊÊ#ÇkÂ¥­ÎÍóíxïЃ·ÛƒßˆûÏýƒ6Þ¸}¦{ßÏ'OûÆO_|k¢O+\êWŸ>20ku’U™‘Þ{g Ëhé‹í´Ä°õ ½,Ú ymAÚk>µ—=½xú£ž>8XR íßÖ3’‰¾£\Ž†Ò§Üe’Žƒ¢T*Æ…ç„a¥üÐq™™†Ê5¨uŸI#ºŽPc&2¡ØQ‰µ±¾véþË#úêÒë«kk禬¯ÊVS{zjj¼'gª©#%€Æ¾ˆ0¢uÒ´²óK|>ÑU‚Æ¡øÎ›¯‰ødúÜŸûÚ÷VnMâ¹›¦OS9fzéZûF¸³9šú´ß®ßzì¿vðŤ5ßþÌÆ©©¶¦¸€ø ÁT‰ ˆ»YPŽÀøPâ>>XÄפâ–Ù¥H¿@Š€Yd)R|2hÑ2¢åÞú¿KDËK3롨é¾vî+‰¨ÙMÛõ¹•­•ÍrÛu³½·eþtý`Eeã›ÿ“¿þ½›Gþãæ£ÏOü‘Å«^ÿî«6,39‰õa3K¯§Fìò‚IH9X–¼àÒäC9µÖ: ±æL9a×aÒçŽGdà¸>¦(b.–::Zø¨(­jZï¦h§MªÞ͘Ï?F½›Â.·¼z7áœ{¦9ÆkMžd¥ºAZäš°p…nŒ‡™Òæ‘™õÌÌzOãÈ <z$¢¾¸f£%ê8*p'Uãæn0-ë°@è*j/t¤vM— ×øR¤#G`—óÈUÊͬqƒàLgkÜ%Dù¬ÅÆ‹ò"kRÑž/?êóÉŒú+É™Ô~B RBê$ÃSÁÔl·Å_sÞÒº`pײ¬ØW1 øœÓ–…DÓÜ1v!.Zc§{’2•':Iyðu+ŠESž¨ÒÜÿ³w½1’×]H!Qä€"ÅJ>8“û€±½Wÿÿ>±øä3ÁÈ`.ëêîªÝÁ»;›™ÙÛ;‚[2Ä&ØDÂŽ-9–ɱb„­8Š"Å Dù#Ç`ÉÄ‘¢Û"±‰ò!¯ºgvfv{æzvzfwvë>ÜíìõT½÷ªÞûýêÕ«êÃÅÅò÷Ô P\Åãv`áڃŇ ŠǦvãÆ“‚±ªúXYÄŠ1Xm OÑ‹%è‘"t¤šH@ pI€–d®*¿lÒ# mh‹1 »Ç¡ô+”~…Ò¯l[ÕKVbª$2—“â3 ¶Ž´Œãz‹…Â,5&Ù;UÊâü*e6­©2fÿû«,Ï•U "Å‘‘‚ H‰9©ĘSA†*ÁÃ^%(fQ%ˆ˜ã@ÙhD±p³HGÊa9ÇR‹%’L›P%xœªË̈ 2&rQ©µ U‚cùâ”ÎŽ×ó¨„éÇU´Š*A¹&š‡]‰2ÜÝ4[£Ô y’"¸–¡JðØÜÃX†4ÍÆ×1Œ=è= 9Ùž„µ'¡ÕG ŠEá9?P“( Å:(žg(>&Œ:34…*ANA#Rôzœô(‘-FªH@ H@ ‡€£Ì×ýpª5J€¶ -*\ªC•`¨ U‚¡J0©~ª ;ÎаŸ–ŒpÃ¥Ú8EmjµJ ¢JIJxD§JY£MkªŒÙÿþ J=““3¼vRSÊFf«¸æóRPJåHBAéa.(Õ³((e8Á Lù(‰ei¤R‹À.š&RpF JSAi™QArM/‚Ý(f¡ t,_œNjmÌž@A)L?ÿnTYEA©^j. JË sVPJ[£Ô )µJ6°BAé¼n`•"Ms‡±Ç¢ 4`ìo_éɶ¯ôˆí+‚¤dG ŠuÑÙŽLÍðžçaPLp¨% P<ÏP|LjIy0æS((•š 2±d§Ðm—…ÁôïHp÷«ßyÔÓ!áû}æ#/_1£~Ë3£Ç yƒäÓbF}²Î˜$q6„$Ép—ÂP’DI $)¤@’IšIºï¶ïÝìIÒC3f =¾ôÞOýxËó¥GA‚~õ üÊÒ½cK°sD9%áöîo²§\} F×ÃËñÅå7í&•ÿ™?uÓo{i^»óòçTšÒÜêÆ?ÙK7ø‚"“Ü9 ø©’‚WB´všn]ç>]&|fEþ¼ˆvíØ!Ю"ÚÅÇ£]\¢@»æ’víÇ«†W&ôZ,QpF&+a‚tÄâÔFZr‘&<ÑÎÆ˜™L$O¥IÀtË#ƒ¸¥Ô Ø“)ó© n±©”bõL{²¬5«æZûatõ(Vv+Íç^üÜy¶ñ‰C®=òÀ×Ðmžƒ|<“kùïÞ¶ôÀ å˜]Ù~õ̶ç!^¢×¯øË¯¸Då¹ÈSE¬Ÿ¾j>Òmüt™˜1|¿ÌÛ#¤‚' œdžxIà%ò’gþóµy^òéCƒ¶=nr˳Ïþç&f²]yß•KëÕË–öì²pG’/ÿBëç€‰ÜøCßÿÿ~ñgÑŒû/Ï;Î⬢ÕòŽ"Q+fo’ËèèxCà 7À¯L B&ð;k¿qgÚõpÿ³ö äqÿÞL’¯|áÁ¥Õ)I²§ ÷÷¯úÀ:@~ütý­o]|nv]—Fû˜ïEG±€¤žÚW}§ð Òë¢[{ºÙË…»!ÊiìbDXÄ„v3)‰b§I„,áœúøš‡ÊÔ¶’f}ÓËæ¿Ö±Fä š5Â%‘–šªnŒ'&wƒhÑNñÃS¿ˆ¸/*’X¥Î9ˆ…™m±ÀQÌé8¦Š§þAÅ´Hðp¥â|ÞH| Z´ó>‰S£ŸÍÄCçÿ”Ô˜Î7eV4¦ÃXÑ¥«QˆXD‚q¡+¸` 9w®Dk”.G µÚ¥ÖEÎ_þI£˜É$RÇ9éLjÆ L3¦ÓúøB82Ĉˆ+§@[Á£˜‚G§œ'\cCÁ—„K/35ú!|&z¤ ¼¬…§ácŠ0„c&5—Õ@8‘xÞ £!«p"ɱ€ðDs®ˆH"Ç=]¤>á!ò/ôIc¤¨dÜáßiE”ÖÇx®“8M±f5\Ø!i£8xtšR+Áê‰~,!¼ÌÔè‡ð™xè‘‚ð²ž"„)ÂDN¸FZTá4‡½éBx…uy}·jÝ¥RØ9 ^d-9è4ï%w—¼~0l¡‡-ô±¶Ðû/g›Ö.CØ,8´›ƒ—óM)E2M‡6ÓTÑ¥xýUáeoÇ+£pÝ?zÏßÜïë{>4ûÒ–^iOú£Ÿþ¤/íy â=ŸßÒZõBô¾î>ÚD]ùé¶èK¾ûï¾þWͶûòÆ\VDã¯8¹X iÅ«“Rð:¼èwGç°t©`é"TÈ«ÍûÊ¥”CL¾Mk3NòMÂL±faé3ÿKŸ:>~jîòÏ|ÿ]ž®<|0PÝ£,üæ;_õ”Å×Eë¥ËŸ?»´=AöÞóÚ“Ÿ¼Á³—oxI^~ã-|`’”'2?_êœò©™ª¯ÀÛ§Q¸˜Óp@N8Mà4Ó+NsË›þúSžÓüáxÞ<üÒ'®÷ô&K ýëe_¬-5«—)7Æn©Lºs÷Üwù&0›;þÔ ñÃ_þ¥¢4©y÷E¨.°¨–Ô •wuÜ’s•ŽVG¾lýbÍ´kþSÍ %¨ä4¢‰ƒp+ÓÈÊ—TI>.8hˆF˜q„o=Xì´ÁÆ …©‹˜æÞ¢ð“q8ÜÒˆ:„ã 8ÞQ®+35úéÛ¬õHí¹•5öIÚ˜"LT&# WS&%Ä£ÚÙëo?ssmfÃ>ê@WG÷#JÀÉ|0õ“èd¨€ÉÑØÌ¶èÓÔ8oÖ¶r§î{èþs3ÌwˆðÎÛ¹Ïw”¢B‡ 0w9E@ŹFʼn.Ñ÷ ªß¹ŠXV]G})°¬,¿_*…•2\TVÞ…³@ïÞ¼;H¼ëÝ—?öù'}ÿ2QÝKÞÿýùï¿Ù'ï?œ‰S{Ë+K[³§i×ç»ÕÏ¿ý‰k}þ>9žÿÛœ;{@r”Oá?UÜJ©YP–\äi寬˜‘(¥[?A–%ܰˆ„FÌ2Åq ÁßXšÆ„:Ê®}È[(ˆþÇ/aO“X%ibA[˜N ±$R ÅQJ @+Æ,ÏË6HÛ‘NØ—™CøXÕ~y¤XYY»N‘•)ÂD¹yE…V•\ž&Â3ÆîJÓóeÌž!Æ’É<)eñ1¦u2‡ÐeˆÛ­ÆZ=Í‚vV@‹‰IGÇ@L* &Z“@Læ˜ w›ÑoîÜÑ$A‘ HE,Iã(æ’‚oqƒmb-1i?ý(ê C¡z ¼¿w(î·²çjgv?gƒaJ..·6mRw!ËéÀν¤õÍ-( `.ÐÕÖF» u}ûª­µm³ ·C_ W³&^³i­ÓB-kaÑyk£Þîß7ZµëÆ·rïÝwŸðsþ9Uƒ¿ê0+¶ ?-øIý/º?ç ]1Å­iÊ–—·'逄 G-¶µnƒÓ¸î§ÏFb—×ë+ÍÌîe¥½ãÖZï;i7mÓ5šëÕŠ{®B‚˜{DÙ ^!-ÜWǃdp8ÿ§8:ÅTÿíÉäqÂ!¹ BÅ1ƒÎ‚¢î‹\L«ždì†$îI¸  2>€9 ÕñsGv{Ë%²I“ÒHÅ2‰˜`,R‰6QÂ9!â`v? ÈZ,ÂýwdŽÙp¢¸­í¡ UÅö>åÊŠ^a€ßïƒQ~ S/r0ÃèØ¦iÂmð˜ŒhðÕ<›MP©Ù®gwïÞ{bÐ%|plç¿ÞÅnÍs¹Äõ*ÐnÖtÅkm` Ý´Om{µ¾­i&«`µ°…ÚfÃOî:¶Äl¤^`àgµÛµ<5]q¸_l×êmߪ½ ÚN­3[kí_÷êy'÷ÒåRåô%ûߌFxým³ÞH‹Êhc}ÝÖ<ižIêÐX0me"®Ø¶äš÷Ì:ŒwR3++M»²cÛQKðbß?˜`×4ëí‹#…ˆm{ÛÚZ{»Q[ò±£å‚€Ýí,ë…‘†‘ó`àI°x²x)ah.KŸøËðÍÕb»Ü¸µ‘E§ÚVË÷Øèõ_[‡æê›0–}úúd\¬Ý¦³ >`ŽÆõúF¿åjy×µíúÚZ_ÛþÉìôW¦ZZwÎ6a†ôº‚Ž:­eó0{6³4“ýGŸÕÚ]³‚õWì€}ñ=}3×tƒ.)Î>tŸ†9 S`К' § 9Ö'c|­Üã'î¿àæíaç÷ÝÏÐ ü)&}”¢Y“¾™¼àvG³ãTiã„ fdðG,PCñ ‡Hcê7oõ˜r¦õ˜Ì¨TXn"d¨õ—áÈ ¤#Cœ06 ÄPy,ë1ËL!{sUûå‘Úª+k×)nÕ)Â[ur‘bŒ„¨¦“Q:ûŒM…™eìž½=´†èÏŽIAfæŠ}•˜Ù€ \–Ð 7v;9J[a˜J#”ò4bƒADCd@Vâ˜Á2çnt©¢Ï®|?»bÓ`c}ÙJ©%î`£;cdÃ¥VáU±Ž™2“j0ïµ=¥˜áøÃX]È! |uªé¦=—i–M‹í¹Ls'±¸GÜc²2!¹È0“„Œ.ˆåÏÑ&Ò> ’C*b;Ú‡¦*P“Ѐš5jÔœgÔìÁå‹ü»ÏøâÚǺ‚´W]ûÐC_|uíGA¤~tÕ¯œ]úÀ„"ÉÌyCf©ñrk¿äßî\ú³§¯Ù\ýæÛ/|é#_?HaJWÙ®žÜKôFz4TîSÃå.ÚZy¿½Øj”qs >Ö^=Ùö4Àï«P\ø¢cP ‚}•ݱCZ&à'j<~±ÎÊ…¨µ•í'Fí½ªÀ ð¬ì{=¦ÑÌMÕSÿ$|Š8e–à$Žœ °Eú;{¬ŒDB°³ (ƒŠ÷Ç@b.´tŠ$€]XL©ØrJ©æ˜ŽÉi¥ JEJµsàŒé(O1Ãa«ÐìSúûžÆ…Ì"û¯¼è!Û„ÎòĦiµ *¦'<&lÁ È·Åëò×4¿²*ߊíc7t~åwj;9Î5TÌ“”i†´¢‰S”&FIi„x-©`y‘F.À²½°YÿéKþúmûÌ×ë]aéÙfû¶•{Þu†loØÛ.6ïB7-og¢|{Tî¿‹(ûs—ï³ÞjmÀ®g7›lÓ|ÿfAÌ1&`>d™Ã$fÎ:!„1 †Iï5KöÝÖòNwάµ¬GõÆZ÷ÑyÓ*A:QãÔ`fbc‘èTêì­µJ ›î~Ù¢8I°ÑqâÃÈÆÅï°"Æ1µý_nfádàÛœ)LpYmRm•aR&B:Á™xñºÍê2ò¢NÓ6€"¹v#ÝlÔ7Ú­ÁÚ畵l«Ç‚ЦtbNk˜¡B%˜[‡E¤rð){ÒW²8“tŠ|áÃFž‰mÚ_ô‘·”xçFÖøVs­Ÿ•å½F1ºm,öÜ®u>9¥‰&½fÛ(4Þ­D’ÁJ‘5>Ÿ`´SÌOe¢ÀqÛ£Dîõ“¨pɸ1T‘s;bƒ%M`ñ–0˜½H›Äa¬°~¡µÈmѭ娯›•iÓ±Af—!c½Ñ8ozFb©åœÅ6µJÂlJ5‹%ƒijNœS¢š‘ö}_Uìäy²ˆK ò ôZò$&.FÂÆ,FYÄŽ Q~¹+QCœÉ^FiÐ]ŽÓ8 ‹ØÂò+êâ€1!Š%ŒŠþÑí”Ûôo¦þÈѵ[íf¾Ðë 0!¥Š#Š(£Î0T3 9A­àiEœw;Ô‡…å†wø4µØ¸ÄÄ2fIŒ âã–Z£±ªd„;ÂWá½R ‘i¢1‹M¸b±±LÑX;KRAªçlۯƷ£ÿ¨!nm×]ûD_¼`)WÒ%H€M¨ÖØIk€`YêRWa¡¬Ërkøëß}ûÍËeø’sa—žZ1Í&Œ(Ę%“rn´H¤ÀMä\Óa¡ ¦ßä:ö&‹Ž•vX A‹ ’*§p½§j„{K #à§Íˆ[iÔ|ÉVäëv£Ï–8å¨>CJ1ð0®!ŸLª­Æ–;ýªÔT(PAÈÔ%Òöøe¸¬D ¸•a”p媘ö=ª 1fVKP °‹bÌ!è …¤&Øäï¨ëŽö€Â{­0j¸cÓŒaaÖCc áYð…ÆN0­aQ†9ƒ¥˜®ÂTÝ^'°Tÿ€ïUÂa“˜„ÑØi'„#@+³š)»£Æ0 £¸ ÊÇÄûWÌ€š$LÙ4¶"v àÓJèþ¡†Eg´n6€È5Ï:t,0j¬“ú¬ÎÓ¾±†¸cí5Ka§•Î" °$Š«ë¼×R‹äRƒ½W ‹ ,7`eD…8Eµ”˜qª0ÄØ”SÍ`wôœÄ( úF–ßcí¡‰a+´ÂÅ -%"W7ñ©ø¬Žoøn¤WL†ÝÈaÙ>=^¶…÷£Íë1øÌOFn2–-£ÝSA»ûÀÛ ™Kvk߆o¯þdsY*?ÙF’㪡àd$þ }`Ùè¶v»ºª»º/1Þóz}gr·gûìóasžTwWïv<;³LÏìÝåXLj!A‘ÿàKIÀáèŠHl$¾d#Å@Dìó +!JbaÀCŽ,ªº{>z¦{®û¶{vg¶,}ž©ézU¯«~¿÷ê½WOî€XµNÃwš.« ¬’XTë©'Ÿ»p`ãž×„€_~äe· ˜ÿb´KCx<ñÑ´±”ìš6`:‰+éŒtMK×´tMï]×ôöò%KÝõK¾'SÍØúu¨í5wµ©iü•Ó\à9‚ªÄ¦Åà¯%²=Wó<+Ã^øÅŽª2• á_,þuøo£ýWüÛÃ{ØÍlŠ9×7ô0Aœê;¦lŒt¸Ìµu˜á ²°ùLû±ó¼þ6lÅö—loÍÆ‹vhÕΔùŸwÖ+4ÿ а-/7Q¯z9^n˜3`^6BS1ÃóÏŠ4Ëð|ò>Í©÷|ç¢<%0î$0GÄ¿þoÖ„_ü™ÝêßíûÊç÷‘k»e¾ôåß¼á'ªváGs˜îÂwŸ0• 6îý}!Ì›¿þ£oì¤0¹}à'¿‘†õ®¥Ê]¶¿ÛL'1ñÀ$‰‘þnéï–þî½ëï&ÚŽìð%‡b“ŒÚ8ñèfÞ·m«Ä@Ø À"ȹ. DåÓáèT³mJMJRÌ€x6€˜\œV1ßä°i¼wÙÔ%–§ ¸Ôf‹Šñ6ñp‘JD-ËöÔ Ã^—AÙ3íÌÎój$òT'±BgÊ>Ï;ÃÚçEØ–ãš@bà’³MÕØ PÇh.ß½¬LLÿ!ö“`Ü$H¯0ŽîjÔÚ刄+u5ç"$£°•±K˜êäw Ìw‰Ò޲ro(7r‹(Á  (oÕû ÞûËùý¬Õj¶jë,D¥½øjñ°ØŸpÞwï_ —Q÷zñðëèšÅnƒÄF¢äZÞN³Sw•F³-î:õš†Û}¾Ëláf÷šáÓCº$Ê>×—¿x}/Þ§ýóý3Œ?ü×KoŠ3Œ¹X/½þì'_[„*}rÛý £~õ`œèò¼'ÍŸ‹¦.!,|¦2ì7ÕÏ~í˽ûTslCut50&àö´ îªÄE޽DE.ê·¼zóL-TÿÁÞUªÃ¡À‡¢vÊñ¡v“ Î;¶Òƒ‚ v<SvßÕ  ì¹"€ â1P‘Dd9ªªÁɼ™pœ:õNÀ¢&\ƒmþ'¦0êYŠš)Ç’Í&©™¼#+]3;ÎÒŒŒ˜ß‰ˆù„ lbªñ•å:"¯Î#&°=Ï*²©åd«0±q­Ñ–{†¶X´:X£ëÖÈ‘¸]´<úí²uÓ§‡u“?ß_1”5_LÿqÍiv"ëh(îóî5¦4:Âý­4=¥Û÷îG|òžyHD<*$zéÿc.¶«“(ŒQHþ$hóÌ·.ظýu!Æ¥sçoÜ1rÇÜþž4BŽ1ªÆÐH‘¸d;caÙd™ïQeÒ¤Ñ1åFGbåŒ ä›¤±±ÎD½ ¯'Ž6”D±zÆg§%2WëõF&Þ?Ô,nºÑj:@ü‹A³ø›ÁÀõ"é4½ù:[a2°ÏñIßnR?Wà N0€8›æäh{¦å‹Æ6výàÁð¡‘9‡OÍÓºÁDØŒ?ßaþ&só¶ø;·==7ª8¾µvêír{ßwÓ@ÑÒJöA!KÄuÕ é¸AâºÄu‰ë×%®WŽë©»pTw·É‚B‰–%–¼À¦,(ÁXF!O-”,h©`RúY§!íeZg#%ÀDúÌn¥9*æ[óÓæ©ß4­þÓ‹?·!L±­ÉY&}KìÉ›ÿê…%Úo½ë?”Å+ë|4 óíÓ'¿*Œ²ÏñÞ/½°ÿ‰Ëí=·}vôÝ£ˆ„çTV «e¦þ ˜jDMÃ×Þh$¾¦á+–¦š4Õ¤©&MµjM5<õiÔÈj³2PêšD•’PEZmÒj“VÛn±Ú¾ñ½O?-¬¶ÇvÄtépO|âí·…wVÈñ_—¾~q‘’£Ýâ³°z.)H÷ã¼è#¿w˜÷Â+¿öunº­½‡÷ûê?ÿù=§&Ôon£mõ÷FIŸƒåm± Ó-;• ©©§k½±Ì^*ÞM©lšëZªk2`bϪ žC€fPϵñp2L¦²í¡T¶Ãî ÿرûNݹrÎjòtd0÷Ô¹RÙô©lºLe“©l2•M¦²ÉT6™Ê&SÙd*›Le“©l2•M¦²ÉT6™Ê6+©lúœfá‰8ç¶sìÕ{’ÈgCZ0n òØ+Í»§óîÂòÜkêνzë$=ž¢÷õÐ%f®Mõ€M`ì˜À$ª 4ÝQ9—åûMºœv‡rÆžÒø'çjÝï |WÚÙVOî…¼¢–yvÕ½'OÉV›´^ëN¹nÙ:Õ<p,´Ö- ,›i€›Üî¶)òh¸Ç‡?êÎm§Ñ«>ëîOÞªå0•PÓ&ÀÆÀt, ]×4fëÜ&q’0Dè:¬¾[ÄJÓó¸î˜Â_Ì Y÷Ýð­¬H£yE¯F£{£QÍÐ93pT`hª °ãÚ€ÿq„Ò)dcñ»‘Ðh´×’óœÐ¬ç©&§–`*Dü±ŽÍ䯌Å3'sЩfœ¦Ù¨Žq÷°"eæ•¶eì}Œ29¾»œ8y|y2ƒ/OL€‰4 ,ݦ†i`D™ÑÔ'/$„§Œºeóç˜:)8’Ä0A¦m¨ª†GkQ‡Ïœ©ødWÖ¤"Z+ýÖh5ï(ªÑjÁÞ' UÕ`QžfÀí l ]`è&S‘Ž ² ­”OÕj—F+@\Ðõ:Sâ‚»Êr|i5jÎ;¬jÔ\°÷I,^j"Æ÷ ¾p±0‡~ÀÁC%Ü´¢Ú,±xE¨PMÕq2×=óÖòÞF9ÖoÓSxUK7ç*ZºÅzÇ—<—kÔå6Ÿƒ¹N1"Ë!PU •a“ŒèÔ©wnDG:á„›'¡aªcŠ=¢ËãH5JmXº¶‡mÏ3­ä9‡ËÄÆÜì´VaGÃÊ^áÍ…¹6W–›W ÄyGVÞ ö>yV…OWm“æ©À›Àv!ß1ˆÇ ëºÌµõ¤âý€ë•ù«kvºÝ³"Z(+-*áÊùÄ®Š+ê}ŒV-æi†Ðªj[ `n;ê˜ãº.Îø©‡˜1¢Õ!$Y21lfP,r¯Û°‘K€JU¢!lq$ ƒúlvÚuÖŽbæZái:=¶RZ)Üpbnå,:çhЍyßÜÇ>{¯ü• ‡öƒ&·>õÇ'EÐäf(ÁçÿôÆE§d ¢ðÍø£¸ÿ¼ò7wáÀÆáD¯/=ô³'Òkî€ÉÛžMse"b”î“MˆYžG6º˜'Lr3Óý²ˆÈ:ceùe K·ìôºe£Å2öú*éð™2‡O¼ÚâqS#¨Ì #C7Z| ­väl?6Qôhò~±FGE*½G(ìlhô'BrÂ6QRDVzPAó"ƒ%^Ù"3r^ÿ­`ñÿê¼¶˦¥uÌçQøÆvµIv¼ÕëÍý[üŸö½öÞÏ?(XÅÃE×>§h½&úÿ¾ÅGÂþ?|øòb£ÊþGsB¾ý­Ç¿"è…¸ÉèÕWoþ“Ç&-@~¦ñ|8c½b¦QföcÒK’I:$é¤C’Ž"/_<½ OìæöùdzŸ{ü‚ˆKÿ÷ÿÞqß‹cE Ö -¿uÃÎòí¢ÍjÝ€ŠP¢åèÃCáfœôi7¤"ù›î“‚¾îÁg Ýô]¿ù—Ÿyñž8;yr“Çn::„Öè ŠçTk;·{gJ{0]ÚíòvÄ'•†©¢ÖaˆGeJ’ÊAøô¬ž§©’‚L\'©ôc° )Zr/¤NÛ¯Ñöþõ´²Dëu¥F[|o«×kƒ}Õ<þbkÌUZ¬ÝiñUÜnu˜â7ÂÕ U¢+ãÓযkMÇS´[ ö, ÆŽ‰QêzúئË=+kÏ*Z;†¹iMÛ¦5º\ÆZNy9Sc8S ¨{†¾gžÇÕᜠ9¾ïŪ 7Ë«hÐyÇR¢]uU«>cfTŸµ2Ê̤mŒØT§hÓ ƈ{·ëcSÖ¡,k×7¥·lª½eÝõ2vÛ—)S˜2‘á4û™€kv‡ÊG*–ˆ>o¶VÜõÚ@Å Ñg?=š—ˆt¾EGô÷ncÚjÑÐyÇ_öõäWWxN-nw~ØM¶N^’ÎTj¿±Ñi×úÃÏÕwXzÇu}!­ß1ø0˜¶¢¾©ã·˜Væ”5­ÓÓWz`Æù/·2pYßÖ= W…ËCeÆŠÙÄa%#!c/‘Ð}”Rilpd3 ʉ¶Hs¨a¨|‹ *ß"LXb‹0™k˜¦«c/*1äJŽgˆÉÉi:4‘ްju7„"Hïô¢À>8Íp)Ýz«*¦±}wLòÕ[0±îaê8@5D˜¡­êÀbB"âK7ÍÈU‘¤8ÕSX®7.©þ±ô&Ï«1Ho&±„Ë%½Ã¢Œ®÷Ã4jW}»š¥Z2‡Û¦I"×ßÇìñ.8¯„ mL)Ø4[>ƒ˜Ûª=º3ü@ÐÀ`Ü€f–$_¼ZÑ-)þyÌl¯,Ÿ8rüî^eŽÍ įÐîöû‡Y÷þFsc‹^gA ÞuO©•{›­º»k‹sÖÝM‚l@lBDµ-¾—z† lJ<ÀC÷<Ž€ýÒ9€å‰Ütr€ñПçHól€´Ü0 b¢±ËR 6üìŽå•[o_9ÉQg>ÆTÇ]­„[ ·n%Üî!¸%dúr‚›ÔÅdç…@CÆMƒ„À cA3¥x•+kL¶C =Dò $ŒA@KNr-ðÿì]is7¶ý+©|y_Ô6Öª|P:QŲ-YæUŠ…Uæ˜ÛcS²2©ùïïöBª)±[M™’MS•‘Éf7p/.î9@8Ò𨠡AÍl€wª± x®G¦õ»aÈî˶}¾peûË®æn¹6.ºZ { Ää|wU+Ö)gÕ­Š© ©Ÿ«¸`ÿe+âP'uܵÖ6i˜ôÙtOPX¦­S‚Š¢]×=A‚¶ÚQož¨{uO¢îÉ>èžÈ„ØÎëž4dý¥q1ëo!ëGÝ“¨{uO¢îIÔ=yÝyãÏ]×=iåʲ½×=Q”y!¨N$³"az·L!OxO ÑÊÁņ¢ “T( vKøD>«ð RÈXæ}â$“ “Ä&†0š`-¶!ƒÓ&á“ÈqöZø¤KhÔùͳôá¯Yù¤kƒ<¡òɆUøåùÉ”#µscä!d'•O6¼/ úÚ”OºÆßÓ(ŸdCï›8vW³ÅÄ@Ú§JžÈç<¡ yŠHÀZ°D‰TÊ&Âyä´NxÞp~z”=ÛKÉ“.Ññhtù\F…Œ’'›gŽíŸˆÞµa·"ú†%ïÖ D¾J¥Ûá.t§Þ:lÐèžœ5W^=ެÁjF"Vï¨ÖI'†öEzí|èÐ÷QâD~ÚöÙ¶ýF¨tqs‘5q{¸gè#î?7îï»ÆYDþˆüOŽü|ûâf‚AIË¢vu€R¾âf]§”hõB¤ [  QÜlÄÍÍIµIÌx^€îÉ4¦Pš³‰ÂZ&Öyè@Dss“XW„Ú_a™®~{ªmb–ÿ8q3u€w«:y¨(™5˜¤h(Å;®3™ºô¦ÇžÉ1è+Ä Íe]ä6^ôªJÈu5ÌyÖf|7Ûš¸™Šâf #~>q³ˆ‚›Ì‰ª¶9QuÀPºïã=I³6Óãxo(u^"Ê}U(÷Ô:/û‚r;÷ A£¦ÐÞƒÞº N·¦GÐ[zEЋ A/‚Þþ>H)ÛsÐÃl-è-M ·ôpT[‰ AïsAaïñ°‡q'ØÛ®¸ÅX±–EŸP® lïǘªÕô·n#ÜF¸pûÁ­DbÄÍ>mšué†[€@Æd„À½7{4®73î@:œ0‡M¢(Ñ UÚxcS'µo7뚆;‰›-·/>±¼YWƒŸ@Þlâ”7ƒ4©˜Ú]y3ÌpÖfULþ[HþÇ­nQß,ê›E}³v}³¼ÂqÀ̇Ð퀶‘¤pôly˜&iËÄ29@Tí¼Dž”­¶Eæ´as”È‹yQ"o$ò 1b¼y,k3.fýuYŸD‰¼(‘%ò¢D^”ÈûÒ$òºè à¬Hä$²6Ëö^"[iëDäF O41:ISg™µLK­7”×’s!b;¥×Î4¶®ç .µ,ñÖ«Üà7’úD(¢8BH†À›òâ’¨½VÈëuzó]økÈëÚO(·a/‡É ¬ åñÎåDí¤@^#-à}y]ãïiòì{=¾ôýñäZ÷spÙ^w´–[/_Ad˜!$ûDý[h-¸Ó'è…ó7þ…¿Ñ`¸ÏòÛOÚ{6£e®¬3R$&PHƆàDyAA=Ò§)vM‡ø IÄ íu‰ˆnçó0£ …ö>_Úþ)ÿ]dû§üoXòî öå=ˆAÄo‰K¥˜îžpO—Fo^H¾4:¾Ù»Œp|9²«Ê=¨ÞÉ ö[±/2ƒ=eŸAÿ“OÛ›FÚö¦ÑBÑތӬÁh D ˆ¸!ˆç&û.ý)D¤;C!ðH"L8jYôO(N÷@B°ódkõBä2[à2QBp$Ím·Óð"–‰’Ææ;úx¢I='޼ ÷7ÑuE¨ý•oêê·'Û‰¹Yù’̳´"»zòY;xÖfz¨-T”Üõ“Ϻô¦Çž|1è+Ä Å“6 6¾z¦Lí°„`WPS*k3>JnKBpc$Œ‚ ¿*$|j Áˆ‚›Ì‰Òö9Q.Ô¾÷dÃËÕÊô8ÞÛÊE5¥ˆr_Ê=µšÒ¾ Ü£Î¹~RÐcñ==LPÖfz½u Ç¢¼C½zŸõÀÓ{‡=öì¥Û^ÿ‚_LÆ-ë_ \É÷þ¢j5=Âm„Û·n#Ü~Ep+S¼jJ!emnˆ¸diTSÚ5¥GÃáZ5¥à¥C\éDcOÃÆ$Zh“Hí‰ÀÊØ4¨&5¥®i¸“šRëŽ'VXêê„'PXڰ臖ØRŸyã@Þ†]€¼À/'YRµv¡¯DiÖfÓg‡ƒ?’Ûìù&7ó*åÂ/ `Ø-ZSsµ…ê›…!7·-˜ízç÷‹ßµ‚ËA«Ûî”2+[.¸üyð)!ÒK–w K˜H×*QÔû„8\JFœ”OYl{ü3CΦ ƒ•¹ )GH)À üUáûÀpÊ­¤†õ)#&M¥Þ:‡“Z«gÇ¡Göϵ ²¸Xfc3€¤PœcZ”‘Oî\ÙjØ’óîÛ+~8D·×Kâ]mpt Ê]‚d&¸M$¡ð£ˆA”˜ððHþûb'ÛXHs•Õw Öáçjúm—í`/Pñ¿êäìâ1}dÅ’õ-j®ï&Ç‹j Üq@~|³»úûX^©›îp@H¨4!LÊ„QÌa ö;͙ֈ§]1½½íñú¶GÊ+ª0J¼à0°Ö„$¥*AF³TkÎwOèÄ·ê€"ÕÍ`êÒ Z¤Òa“ÀÄô"þ’T¤œóÀ™2¬î†¼¼mÅ}à\ ‰kB4@i‰ÒÜ'6¢‘$Š ùT.`uÁzFÆ0—»ÃÈJ"‘½t~®Ü”ñµÒM¹Y*’²u¤ŒoHÊøÎQ2%ðNæraX"Ub°¸¢q“ E{ˆ’u}F¤dm´‘•ùj¶»!'‘íÔ(ñ=´>PÍlROMH±¬Á:SÓReåÍJNÖXJT>Ö3 ²‹dÀœ& °kMб+3n[rêúŒ˜œ:ôÔµ9ªö³rðXq_™†?4 ˆŸD‰¶4$Ƨiï¨÷½½½_£ó0žCׯÚÃó“¿öN.î\ªÂ®b`‹ùÑíŠÍDXGRùø[ÒÉj¸\œh³×ï>†XOYó£o®í´0U¿G~4™ýÝø,lóiUhûaÿ²øF-~Þ¿Ê eT¿gñ%Ǥv_ý§aæ}¦GU8‹/¡zj…@Üæs»ý“Ù‡áD/îŸ]ÇTýëBµ•f}èëk§ÜºþŒË"hþéU0“òÜ¡™-övÝÈ´Ÿ¾M\9}Ú{÷çQr:ù亸píÇn2+4±NŠIéùd:N )–¾Íªyé8o¸‰ýàç çÙÉÌ/®Ì߃Ÿ]ñ)÷qðOåÕÿ­KÑøY拳™ì0 ¯²÷ù?ÍhPH!œÚ¢F# 9ŒwL½Mì|V po2}]͆ƒ£“0Îˉ}}S>ã&+>F7Å×3=¯ŠÀÅç‘K §š"ì?šñd0¾v‹ûú“i©Ç¤Ë#˜Ì´× Ó«Â-™M2häâšvÅã³kp£vn–Ø÷ŠtÙõÇÒL_TgzékÆVÏÏ|Qübt8¸ÃoóÔ'§3üÜnÉþ΋.šÄß7ÛÑ亸úa0M†Ø…a•Ïg…ÄÕ4+ß!$# ÐSÖÄ”¢hE…¯Fƒ²Çtñwj‡£«¡û¿â5¹™OÍg³¥¯U¾Uf1]9£¯Ý¿¯²ùÂ5`8Wïü+Ë»o.ýÜ\ãòmqŒ×¦øGÈ.3£KäQxm¨ß‡þpTÆ‚_ÖÅ.[°²i ±”–æ”.½ÌæË«v&‡þ2_PÆGQ°­Úã?~V¹§ '7õø²TSv`δ HËùMÙlY¿2ŠÌ¨*¾ø3™Úñ¼¼u:(о!ùeu«¿ö¦ªCWËý¼óö wNǃ¢„÷:)ÿe‡«Êd¾LÇ37ÓãÒ®\­}Q»iÈ{×°[+ª2rY`MÙìûÄê©6ƒá ÿÊÛgA´èR3Ù´º©ð·ŸMçeg²ºêSË œöo} -õ׋¹2 -‘†2$¯ö þ%±Lòi ¥©aŽÈð…¿8øÂëá«ë óÜ•¾ÜµhK7å+ëÕ—3Ÿ4ŒK½JUûµOI¿ãø;ŒOY39ÎJíG›?4k8ŸM†ù…ñ$±‹‚§§î{f1ñ´þ–ç–‚5ÈÅ!F N˜“$Q“$M)q(%ÞR÷¸y!V)¬B^¥a^p†:åµJ¿R…648©X ̽J™£–CŒ{ž}^èùzçÚ ¤òRAT~þ½ôî¢ÿP¦““?òôvôöäÝÅy¯ÿÛÛ×'½þáùùáÑÏýßÏîŸþ´æ½?Î{o~¬_8{{ôKï¼ÿîè¸ÿæâä°øêÕñ›ãó?Wn>~{rrÑ?yûcï5|8=?~[¿||røS¯þç;¨ÁÉq~¥VÓ³³¹ÿUýöÓÞÙÑE¯ÿëßêßþtzøîç㣳ªÔÞý|ÖPèéáï-w¾yûf¥¸³ó·§ù­?\œõ_ýxÔtéìðü°ÉÈ_ŽëWÞ€û~;~µpÏÉð½ûƒªiŽßœ÷N_õÖ6Òê“z¸z;»¬^ïè⚦Ñ{u\~‚º¾-Õn¨Í½ÆªÛxqöÃý¦axm™çïNú¸OÃâðâ¼)(~=zû;i®ã»#øÜøÜÜc¯×DòÉÅëóãÊ­MítzÜh é£&¯Ü÷ÙˆjwêÙÑÙqËÍGǧ§+‘ü¾¯><:ê½îÂ3Ïš½vzþZbªšð¦G~É»uƒsŽÏV,8‡J÷~ìõNÏ[J={wøî´ÿÛëÃ7k‡4¹äxÕÀuý¡ÍÝ?­tÄ{¿Cÿ®óSuÆ@K÷éÝ«æYzé÷RuÿÒýLW"º¤, >³îéÿw6|ëò®‚¾Ô@^Îs‚”“?º~/ÞÒ¬ÏKþîÂß’Î=ß›@N(.éQveþ Ô!™ß'—5~µÂ@¤U@ò”f \ï™.à€X,+`ë‰^%Ããh•á©A¨ÅÊ[/ç”RÅ1#“ï¥ÔÈ¥Žª0”j(w˜a°—èùõ1ÆëYR~©˜ùùû‰+ ÓTgÙÇÉÌF®³ân2ÒƒqmvÏù ¯†óºÄÅÕWÿ].Õ FvÂI†DPF[e´§ V§ª~÷B€»µË'‚É"‚ãRPk#?2¾™(k)a:€ŽW;Èq¹OoPY©~^þëêßo~ý#ý8üáô·<á²°yåî•5`²ìÕ°3QYvÕ²^lå·U?ÁŸ¸}š’ ,Œ¸’Hy,°ÓF~‚?ËR²þ²b ‰Sù•×°k±VÆBm0ò†`Î ô!ŸlèŠêɬH:ßÖfÁ=gR*eá”)  Ñ l*BÊYŠêwWM[ì̓Π‡“ËêXò±›NÕ¶–¿¿êq9‰TÍ@S‡5œX¯™¦©´˜{H’àÓRŠ9h{oÑèÌ_æ›PÊ'•Þ–óFW³a}gGYjR5`²xÆ‹ÛΙ]ÛïQäö±«Ï,ÜÓd„u0” È!¯1t­Œ±¦ÂJ8c÷Œ(sç˜ð`vi4ä¯eµ¡ß j• –y¨¾Ò6`, äïT©´ôÅâ Ä`¤/W¦òAá—†¶^¬ê,KcÎsÎŒw^ ˆ&§Œ!LµÄ6™n§¥‹Õ í+ IóuyµöJpkH0(õ†™TK¸åX™ï\hM¼ÁJ­Ë±3.e>ÕØCúÀ’c>-‘̲òÀrûÖíRßó[[×_Íg“q­ I‘“QD Aƒ£,D )õi¹ô{ \ÛØ‡S•vkÞ{Õ§Îc¬6Â0kD)ƒ¼Ä¸§^+,·ÒÂUå·Ñ{…L!E:«03ŒZ.™ÑžIjTðÄ¥´Þ¾c?Ï_q­´oe[gaþm-_0ˆ,±ŽyK•ÂAx 4ÌÓØ¶ EvÛÿ#óŸû]àöÁX¸c§’Œ°„Hʆ%¬vœk•Z‘â-riiSª‚ðûtoƒE©–)…¤ÅRâd¸yOU§x%LʰØÙJF(½Ô/Ë)Å[_bdz‚!)ô0®  €pªj¹Ê'ûòv.³9õw …5&¤Â )Mâ¿4×€•ˆ·ÒŒ.Ã6Â~ƒÉØ­m0óJ@Ešì"ƒ9$ýT"¡ÖÜÖ[{Åàû^hkn£g†oµj(¤KŠ À¦•3!eJÁÐ s6µ W-JýOÕü¾k (À$ŒB_óÆŽY|À™Û Ù¥M@Fq”7$ï_†5±Lzg|j(é€OËrø¶hjš&#=Ö—åXìžÚÚÚÆ0J¸¦µ¶†¼a° €š(_£qPR™XÅÛhë²ÔNCéN}ß 4 7`dD…`$ n`¼[aþ_œ¡ûæÕäj쾩žòÍ?ÿSN÷äjgè%4a€C‰,NÃQ!ÒäS$¹ÇóßwâRÊ$ ®’ª¼üs¨Ê8ŸÈŸóæ7h7ŒËcúWS¸ëüÿÙ»¶æ¶u$ý>¿‚ëÏT™6q! ª*[«È²£Kvtñ­ê @[¶n#J¶•ÝùïÛ ©›EÉrâ““8|HÅ"A ÑÝ@ÝhC=ÛíŽÆðQŠ—‚9ÅR³r^Ž<ãÚÕõ»Ñ-Æ+žG‰½›F^AÊ¿û‘?èƒÒN’t„IWÔŽüH‡ŸÚ£‰Ÿæ|Í •½©s¯ÛÑõ ûÀ°aA=%гLSÞ-¤ó§A5î}ˆãV³"ƒÛIÔÖiRSîÎ š‰ÔžïãpVB²C,×…":à8 ­§©P:hâë]|þ­ž3¦\y={Óä??n1‚â89á­vÒ¹u ý¶É%&Xt"bi…¿Þ.(p©•ã&æVhRKR“;¶c†ŽKs•có—wAmYÇ;Ø…ÿ‚-šöf., l£}ÏŽò[<ˆHgb>;†è¯ ~~Ñ·𺶵ËrÚ0KGL 3ØÖK;Õb­UHÿìÛ7ížvã§‹ïhäoÕPO£!÷õÖ(néöÑön ¼Óé?Æû¢v´¼£7»MÈÍN‡ð®ÙÙT$uÔãăXhl@UÎèTp³'ÎôIŽ‚^DAƒaÿF36:”._6Íâua%¨2eªˆkñå°ý0{v¯fÇO§GAEú¹Ùj:|ÜÓ'˜-|¼ð~¤†€¯øhµ„&¥ÑlF<º÷g›ÓãÐÒûB±‡î¼P0nwäj‘èçpV*VóÈÔñ®ž>>ô;㮊 éÿ@ÎH›i9;KT ©0 q¢9á:&”œ¦’‰ÑžKè»E‡˜dÝ}wÚÎÑa:Äè7@‡<Ä ¥0¥êȳLÏ¥¡rÅ<*Î]ù:ܶŽæè0G‡¿ :Ä(G‡9:|GèìQæ½[tèÒ¬3ÛçÎÑástˆ_‰i²sù—B‡¡Å0Ö«„Èqõyë®gê»9LzŽÍCé Ë} n[GŽstø× C¦¦`ŠcLpKèÌh¢„À<°µ‘Í’Üm¹VèHFBbç¨òçC•8G•? ªœîŒùû‘å€?ö~a\é­Á•)¼zä`‡†ÑŸFCÓiÀ`ëEmÝF:», kãÇÿž=ž²Åà!T`ô¦VCW˜A‰½gün®MP´©Ó9Â}Žp_{+ѯxÊ´ëz -ÄIõ™Œ`× „"ñýg^Û7!ÜmëÈnŽps„›#Üáæ7ánŸùø>±°³ç"ò»ågêNÓf!Pçw@ ÌcJRiÄA&åðWž2—a¢{œ½ˆ@·¬#G 9ÍhŽ@sš#Ðf!P¶‡í÷‹@m”u>fÜéf"P÷7@ „[úD'ÏDÂÕGxÇV3Ǥ®g¹žp±t^¼™}Û:rš#Ðæ4G 9ÍhõöÛ~·”°Ìè¬Ó9}Ž@½ßz!Á²…©8á&¥Ä1f)8uˆãO9Ù¶Žæ4G 9ÍhŽ@sš@ ÚsèûE ËÊ;íä4ë•Ôqì_ož}ˆ±0…àH…MLÏq¨)Ál*rþâ*ü–uäô]"Ðäá‚æôm hÆñJ;ßxŒv"tJ…4­8¾™ÁÚG–µoíÓ$R9D“#¾üάK….þ´’S ª€xAЂí¦BÉñòO„—cÕ|fÎRËôž´„¥W7-¢hÚŸ\ɾC£¿ CÛîwîêšmߊ÷t%æå@éé†.„6ïè"xÏ~DZdæ¹ÑšNçH>É£ßÉc¡ ´…;̤.*¤L›+K©¸Hn¦Ø„ä·­#Gò9’Ï‘|Žäs$Ÿ#ùÉ¿O$÷<ëýÞ@2ÏýŠ;߉¡_yîFÞ¯—º,Ô÷[šŽk}cŒm2„•ÉMúzhAçÅs¿¶¬#ÇÐ9†Î1tŽ¡s cèC?ÇÐP_±Ù¬ô¤ß\›Ú[k_Œ:ƒï©}õÄ»ƒŽÒ l'ã˶–KO¨Ùž>0Ê-”õÕ-¨ûð¡õ‡¾nzvqî«›AAEÓûDãmÍÞÓ¸ëÓqVù„ã¾¾(÷iYÀK¼xn«´²¥Pš'SÀC›ó¶êyµ÷jØS”ÈÌ®ð®VÉM%úý‘/ÕC{ÝðûàAò¬ò±¥Km× ‡ÜýpçIsÙŸÛóÖÙÎzTèY²÷#AÛC?§?èŒÁêìk¹/£ý€GêO#™ãaN1´Â{ÒØý£õ±\:­UŽ?Üö»êàëxÜ9؇ùçfäÛv̦þq?T2}a˜=c6aÃèÖ€)`Ä­G&ü?„ M_{F×´ xm 0vâ¶oìT&[硽Z‡_<=çÖõåçðŠ|DðìA^Øð»òÇ>ÇÞèú²ÞïN|:w+½Ï=$ºµNåÎj×påñúâó]õkutݬu®K–uÚ¬ “‹£ûj·:ªÞU¾^á«'ø7¹>üØ­´Ûù<¸FžÅ/PGúmpYlŸ5*Oµ¯W¾µOË“ÓfÙªô¬›êÝ—Çêa1ýWWKÅY¹Z3)Wê®öCM>O®/¡/—Ÿï®¯r'ÛÕãóöÕ×êד‹Ö×ë‹/£Úáý¤Ö@·×‡ŸïNš•I×ºÕ ø×ýòxÝ®D•®7á2”ÇàAͺº@ºÏÕ¦À§ðíióæ©zwÿT+}ö*‡_èœÎâÓÉ]ñf^®eÅ劃»ë‹N`Ô‘Çç“K\{”—Q[tÏ¿ä|r…[šäêîcçª  NŸßŸ4¿ØÕ»ÖèêâËäjbMªwµ»ë»#ø÷ù¾z|Õ>)}~ÝNï’ÔÀƒ¯òøh$JºÏeR»»oïiøUm~i‡"©ÞçÃqç¿ÖÔO·cæ*5³þg‰ ­u&F ÈlÖµ­×aÃD¹öçJ5 IŸM•s¿«x4oÄèGàÃŒ3L×*Þä ÎvžÿÃ0­R©Ühfj¬uĪn¤ŒX7÷ÿ‘I?û»ï·L¨®E¾ì›!ýñ¼àÞC[Æn:w-¬Ï° 0tŽ* 1ÄÌ0ÄÜã$ ³аö(2¬}‹e®ÌØð·¯d†Çuá› ´ŸœÏûÖȦ%„w¶Û—í°­dv-NÁF4KËÏÚj‘ø®ÔÔï‡ýŽ~Ñë›bÚÐÚ‰UÎLײ?y9%‡*áÊÐ3¹¶IŦG2•«‹ºÒ–œ|ÛR·\æ ÏR.ö< Úqmlžé)î9Â9‚$”Ì£!¦ÒbØ¡’;p˜Rá_ øq£3sq y¥óO~é¬å_2ǯV/µw_:­žµšeÿüô¤U-ûÅf³Xúä_TšŸüfñ8£Dù²Y®.¾hœ–þ(7ý³RůµªE¿xtT©UšWKWN«Õ–_lu?êÍÊéâëJµx\ö›Wg@Aµ¢ß,PÚh”ñê£ÅÏëåF©Uö?/>=®Ï>UJ´Õ§¥O5Ö‹¾¬Ö–šk4OëúÓ­†tXZ÷ªQl×uòÊâ›°ï¼r4eOõçRÑTÀ¯KåL!-×TFi˜rF^¹ÔªƒhüVù¨’üZOO›¨YÖb[«¢¡(³ÍæYÕG>^«ÅVsR|)^àõ4ž•à÷Úz5ÇN24¹ÚO&eë:9Õ+k»‚}kWVyöL£63µQjT6|\ªÔë­%M®ÁóÅßE3'åzêl¬çZ½yÂñÖ¨•ñzX¯aN¥±Ôƒ&Õ,ƮĆVgųº~R¬e(^Ç’Êr³ÆÃ&v/ ÄÃòyÆ ãJí¥áS^!³Q&;:Zº2Uû7ª§†< ŒâÌ@(ÝCûÑ`g§9ZWܲžÚf%‰pH# 4ø#8ë8¹y·þ^ð÷ÜüÍàÜ_…ÜVq˜ JàQ4î:˜£Up¹€¯–è‹°JPÎ(·ƒt9Ø ”Ée@ME]J¹K ò¬oƒUíxnȰ‰@žŠÊ&„x6¢ØFøcÜ’Ž$^"Û%„»!±%¢ˆ[H1K¾5¬B/ÁªoVãl”¤_ÅKÌÚ¥ìË0MýþxÀ륛¸„ìwy»·)0]Ç[Ȩ8œ.íéÄ‚­^—áRæì·‘¯ÄºÖU݈Ô+¦)å0% ÚÃx±']­‰—¥Ç²­ó3’^ Òjù·årýú¸üw/­3t}UŒû¼ôõÒb(K~º/Õ·£h¼~át¹lJñwðs›¼’oägÒJäÏ›®}O¥Ò5Ü„eB î¨A– 0²m cH9 ˆZ$bO:ÉZ{úµMó¼ÀÂ6¡†6¸ÂqCÇ¦Žµøu*Úx©ïôoBTOúíÞèÙÚòMG¯øîÌØÅˆD l,§œ8L […H0ì²~Å%a´ CðV’EcøÑãØÖÝ,¬æÆ?N{qåãag1A iÕLhNëxôÞW»\gÌžu\¹Ð’–↠÷Bð'®`2´)]éD27|O^œ]ÖväÏÙ0î]"< pßBKçÂ!Ä0Òñ<'áÅ4Û$ÉBZ|ʃ˜/kd=MxHZ£RÙ6 ”TÌm’ \ jÊaÈœ·‘tœ ²F¾Ìuiœ…²•—©÷\[8 ,G4;§,[؈cÆÁ v­·ñ+òh¶®d ªŽLˆ‘0À| ̨ ÄY”nšM±(߸û¥«Æ£!´?0ÆŽ%™m‹P†%@“¬Ð!ʱå 8ivív‡rO¡C=\7dS}ïø[°jÚêwpjQà«—€€0˜˜k*ضÀ²('f¾Êκ±Î´•°_h"(S2PŽÐ^8“€§Yâ¾ME ®©Ùå=rÃEaÏ8°IÖBçAÈ‚¬aÞЧ Õ´t°Ÿ£Ðc^<³J"è-d´º•+½•°W{¡,îxF˜§ˆçºˆÚ„!*icþ6ÂNû±~rr2zðÍqº83ÜOmþŸß¡3Žúãž4ÒZŒÿÝMÂ=ã.… £„˜ìÉ(³á¯ÐEhaœlH××å¿13^W1Û®¡ëyÉê¸ì¶{Iš©?ÀW:³žwGcø(ÅKÁœdcHàЮ~¨Nw£[>ŒW<ÿz7 ¼‚”÷#Ð¥$é“®¨?ù³Ükè_ЉJ •½©s¯ÛÑõ ûÀ°aAçÊjÅY¦)ïRŽùÓ š÷>Äq«Y‘Áí$‚Þ™êÄAÓ"‘ºÑóý4=J8Är](¢‰Ó¹ÐúJ‚»«çŒ)W^ÏÞ´ÔO7O€¶õcšSbà³îÝBzïÿ³wîOm+Yÿ}þ -»U™©u›~IÝMUj– Ü\2Á$B`*åjI-""0kÙ$P›ÿ}[’ßÈÆ&†`qnê&`É-~œÏ·§»Ÿ7 µ7ŸÛfyÜ ó0[òÛXouGSwŠÁ»±¡ºÁÄi–N/Úãž»Úæ:Î&™›—ÝlÄ#«P?ž‰q¢VÛ)*lI³5?ùyÖt|xýA«[…“N1ˆU4*s,nía‘h”K)(cb¿õ±X™7v«šê}ÉBŒõ÷B‚¸í€!ߺÄ#&B¡ˆ½VDÍ»în·×i›ÃagQA?a2bÁó¹9Íg–ŸÈ|×úÞ#…¥Í$åzHzž›e/1¶“ÃÃV.ðÕÐlÂÃZUe›ˆc¤…ë£Hji¬ð²‚ßø:o|¥ø:_Lë<µïñÃéæz‹G §›ïÙs„ÓÍ”–+½÷:¼[{Û>÷>5nMçèëÎZy ¬qWoë„yr6Û~Ìãé,£aë„I`-z˜[Á£,Ž%Å‘A2ÌB³ŠA¹ÌêœiW³ðÞ„çM¶Nøi²TÌ,A°>«£,`„§ÝÁövïÛ¡wË3<’¢*h±Mžò8Šé‡Ld‰u“=f‚ã—´²êP•nN;4Ôá¤:\ø ³"6eµÆ°ç ][ƒ¸Q!òígÈj_piÃÒÈûDô¼i€ˆ "D4ˆhÑ ¢ïˆh›ÞæááÇÌ«åäö€KêA'¹Jô¥©›úâ*1™*[+ùfœ•Ëe`-¸ÿ*ÞÓ²o}µÕ½}§­v3{ôà|Þ…o Ê&Ô?¶4?8É㫲û‹ofçñþ/à±¼˜„UVÙzZZ>à:Öz&¬&“ýfÚ—&é½d©)ú"«’³îhµ:ÍÐ\Ç#Ù½n_¿uÙý9êzðºg§å'ï=e¹ÜýèýÚ»Tbbˆþ»îØg·›½âl^%]‹zVn6/Óº¯SóÅ)œ¼õ)NÖÑ—¡óê_Gìlí7þÜ}ózýkë¬ßv»ÉzÝúŸuë‘¿Æ—–›Ù/ߺ¾)<€Ó té –ÓN¿:Ö¥XñÕtSdÿm[‡–Úzc©‹°c/£ÀÒ.øÚrÖvoþ8:þô‡}^#ÑÇ?®ýãOøôóÛè„ýAìg×á±kßý× ýtå¿QÓÏ“ QçÁ_ŸÄîåÛ$ Šd÷Ç{t—ìý8ÝþÐÙ?Üä'1Æû‡GôÝámœuo>ÜîJN7ñ =ºÝ¿Ç>{{uJÖÇ$ ØÇ¯þçÍøýÁîÆí ß?Üu÷·÷~4Îw÷Ÿíø¾·½Ùû§»·µ9¸¯qXÜ·uq×sóöæô³µåóÛóÓƒ]µ{Þˆ‡I²wü¿;üö}ÿÍn§±ý4bÌç'äÝáÇo{·&§Ç;ß6_önvÓÝ u£Ã(|“Øûtcó'ˇۓó#÷ôðÏo-ìîmß~°¶žtö·OhããS›?§ÇŸ¾îm¬Tƒ1é÷ýJi;æÍ £Ó®í8­nÇöa6œ÷ÚfzVlo(Ô¶8ãKûùßçàhkkçà`cP³:m‹ÉÖ6­ŽqòºYÿ[éûso…8‹q¢ÔÁu,Ëö§ËíSèJgèb3‚à•›ÐTk`IC|Äý Å™HÈIèâÀãÚÜ70o0PÚ4KÇø{׊ñ£ÞÈ:*àQˆ¸ ¼l–iŸúÙ˜õ(Çrt”ÿ‚Ô/â Ýz¼1ÇÞK®ÏõfKs\ìÙ_J2òW*2×BŒ…ý÷lõåRDÈ'Âþ1 Eìµh"sûƒä›·s½Ø#åí|Ïž’·_JG†hÍU¿ù ×žÚ˜§ Èz1ÔØÌB3†*Ò)V±gÁÐRFd7Ç—Q[[c;ñ…Cêü9s”×½—{wI{_ÆÝ‹Q‚’z ‘/ô»÷ñ™ä.ɼÀL+±Ð#T³@F¡–X…šãˆ 4I_»QÈ1‹Ng^ ^_*^Õ¼~I{™éöçíV”õ&&]þæÈµe9ô{æ}Õ%zõ‡?}ܵgth.JÚüKÓp›Ïú›l3‰¨ùÊøÿJ­Yºoªµ4k¨ø´ÞjŸ­‡muæëÅgÿ™Gjô–¸·üs[S{+­¯L»÷Ü÷VÖ‹ï{7ëv[ßäÖÁŽ_º'fï¾ál&g;^üÌ3/muÛ)Û–Þ’O×7‡æÏõìŸÅbÿ|« ¼½–u˜~ÏþßnÜ.VÂŽ½kÙC¿Ü—à”í7Ná²|z.çýþÁC'AòaìÛDòy<ÊÒÆòp)¿ <ßói€Â3Û°Š4ŠÂ@‚ø.õòáÁñ‰±±Åìh<[!ŠK幞è{„E©÷õž¶ÝoìüµXÈÑN]— «Ð„JöOêîLcÇ·fíŽÚ^>6~À2ÌdK§¨‹th=!¥,ˆHÑGkÓø ôx¸ÄìçO«uŸ·†H×õ™ 8GAÄ­¶.ùÆÖ*›©ãFU.”Òa5¥ÃlÅ0O(Aeî_QìJ5³1&_ßï4¶woVI$±µm¦¶yyeË×éòcX‚(/׉ûû÷Í$Imf¶M<¥]”ŠÃ,=û¢ÜxÊ  |"N Aš¸iA™KCÑ0,Ré½ý/¤ñ脇‰ð gÒÅa$™‹±R8>7Š^Gœxn Y(¤ëqê{ž „ Âs.mÿàÉ¡óÀöYJþÅÂû±u Y÷c-F6’Ó z}”Ld¯˜$ÁÃë…Ê.â†*ÃDˆ°ô"Ä… I™ý+À¾¯¨™›3áÖæHvl m_ꤕnö.kÖ;ù‰ ÇXÓ½Z›CŒÓ:ÎÿËÅ|œæÉ4­þ·…?TôQ«ØÃÖ÷ìÃH'©É0‘©mˆa71w3`peÔôD åÙÚ*%⌸¶WhíµËõÿ³weÍmãÊú¯¸ò2/aB,WÍ­ò8J¢šx9¶œÉÌ­)V['Ú)ËΙÊ? ”(K²åØÉ$>$–béÝ Hƃ>ý(¤ß.{´^ö±°‚G6M`-1ŽTÌD+I™”I"ó5<*‚-j’_›§ø…žQTÜFV Ê Ê’’I›XÌm ®ÙɈ: Ÿr‘Ö„f”ÊÞɶm£…d·MШÌV¡íM6IÐj•xÒ¨YŒ›¦)æqqu­iz i"´LÈü¡ŒÁ‰¶)ÃQV"%‘B`g¬”ÜèØIŽï4N۶ѧ-fêZÕx­\ÿò Õº÷b¬?ÚiÍ<=Îm]2½>›ðÍóØYЧ²ôÿÊ„_–„íÄ\þ£ö±ÿë qÞÙP«Hq£Pcbu¤§yXà^rVEÃÑ‘ë¦e`AήË6®‹ð}8¼sXà”]”ÖCÁLUAí¯ÔhÜÍL]/O¦eÛ¡ xK…¢Ée`K¡£„ʤ Í3`£4&ôÅGÿ`\Ì®J2mÎäÜ6ˆ­Ú/lè~::èŸà]ÿ•˜Ñøj’[g§:°¥øä»Ô"±×¡²Žg¡ôc qƒ1šÂ’Ó÷Wè 9:·ÑPƒë)G¢£0àËa¿œñCþNô`x90ÿ {â*-§y>çu=äÙ°"‹ÊŠ™4ÿ¾,¦5k (À ?²¥=©8<*k_ŸÛ©š¡rk¸TÆ™ \q^(Y2À7þ"pm /\6–º`çcÑs V4M@—XINÉÒY?ŸÎKuÎöܧ”ú:Ö•<þkóŠ=¥:™‰EçAܹr&¥€Yö•Š|>¾R‹Ô°ê>üOôhZVôC××\~9Ü꯾Ku˜ t9ó“'Ð? 윌ú¡‡ •ŸôàªLaKsœ›\ŽJº®Q ZÚ0º‰ó³”kPò¤Tø¡)*jÊ™ /"-'Rõýi¿¬;ÊA‰ê)•°¦U¥Ào›O¦ådÒ²šSs%œd Þ‚¤þübUˆLcÌc) ¨”Z Ÿ8â‘[I5˜oá¾Ðwç¾Ðz÷µmœfûøÏ×q_hûb4^ã¾ÐŠûJc"Ö¸/þÔÝײ¥«}ÂÜòÔó{Õð.LVmt×NÁe×PÛàÚoÕ&¨²¿µY˜ÛÏÊ-ìÙbÞW–­2<ÜÅÜtÕFsÉAVf醅Y˜Ú«Î½rí}6tɉ”Fºò•ùšw¶âÿ^£²Þµå›ÛÙқ̭ÿn¨LëÜeÝp·K°¢éý¾¶tA Ë[™Ò†{º njÑ´¥ ¤3j:¡Êµ5\O–=WÃáÍQÎ’Û¬ÕÂ鬸ã¹g]6ÜËV~´„~*›¿pI¢ªüË’§­PÎMLÖÄWKžfÅ VÀ¯r´•_# «4ðÐfÝÄ_5v©0ÛÂ}.¡·pÎѸ¯M1¢4ý›ÏÀAhë§ìËOÈø2×6›äãYßÇC^n³–|9ÍeZ„Ä3VÜÆ†ï7ñlΦô‹ï'ž4÷껾5ë[a» j\w¿&8Nã­­}£~×pš¾`4ŽtÝÑÆðÔ*gêÀÓú*wç"0cD8à;J"3*åcØ’#œ$¥‚}Y\”•§ZÄ6ÅBĘÚ4Á‰©"FX)ØÏN©Š8Ãu˜€WŒ¢ÐqkÝ7 }»Ù¹6€T òö·lÿø,ûéààƒ7oûGÇg½NöþèÝÙA'Ûëõöößf¿u{o³ÞÞ›5ot>ô:‡¯š§Gû¿vzÙñ~7;<;ØËö^¿îv{¿/UîœeG¯:ïàËI¯{Ô,îì½éd½ßa]_Òééi¯>jV?éœîŸu²_^¿o>}s²wü¶»ZõúËÑþÛÓ žìývKÍãåîN{G'¾ê/g§ÙëWû›ŠN÷z{›ˆüµÛ,9ö½ï¾®Ùsð›/T¢éö:'¯÷ö;k…´ÜRU»³óáuöÏN@4ÙYçu·üc=:êÝ2ša5i<;ýeU4­í³w|¡ oT‹½³Þ&¥ø×þÑoxó÷áûÆv=ÇÞ­Ñ䃳w½nÅÖMr:én$gñ&®¬òì†FÝÎÔÓýÓî-•÷»''gKš|Ï›ß÷ö÷;ï:'{Ðæéf®ôÞqDÄæ;øW?­70§{ºDAÕë¼Êö;'½[z==Þ;>ÉÞ¿Û;\£8xKºË®›·±ûÍÒD|Õyß…ùSçMu£À-Ó§³2ÌÓyögH5½aª³s;²y0ÿ~Ѽ,òç±øæ‡óÐÎñÑé-~´ŸŠ)ø·mö*ÈK éåÔ¤2ótíN✬¿üÝts8÷ívLP ŠKõo€Ñt\6ðÕ½V©D!Çb¡Äx,€„?Å"é(!’[ÅÝž P ©ãX;­Zm¹² !D$ˆâáŸ9—±a†çP’Bo©#‰AÉY?ú™t¬úb5^’|Qˆ íôblJÀ4‘Eq5ÎM˜ð°rÍÃf<”ýQ#ºg¬“—ƒ°è­#”¯ªGŸç©ZN¥X¢™Ôp§N(©…BÒkÉD³v5y¢[§|”RÎö'(tmh‡ª\X×#“0éÃÄ[´úhžì({*Fu/“³˜é]^4»Üf`Ï&"´¥œ‹Ml%‚i#…ƒµ ’$Õܸ„Ò"JÛðî´. ùs>l˜÷)Ñ‚;M- _Híâ˜jÄ`%/êˆþPž/©MŃÀ— ²®³:ËÞ¨±IB•5–§ MFPX!‚šÂÒ[;ÇÙãH:d;l/OaIêó¶òòèEšh…Š™UT1pjq¢$1÷ÇÔÒø1D|L-¤› £ £–IdÁ| NœRà>5æTÓr –n#Õw‰ü[¥k/§ùxÔ0Æ,6<‰IL(qN£4hR챬Lý~—ÝnœÃL°íÄ»2|b,’NK•*ªUÌcFÁ.ÑÄ+â"ájð1{SÎÀD-U”è„S%-åD g±a¤)ß‘ú-®%ùVôß&ââªï¦Ïö‚ðhNc$^!K­f‰ßö ]nwþVæo³mÜíºpƒNÁ)¦& æ1¥ Tª¥Ié 1ôHŠ\RºÉTú=œÆ…²Å…Cœ0Z”aÇëgªˆCKÆ`\.ÅæK¡äÒmú2).x‰L’RÒ˜s 3,`„ pŠ*]åÁ¼\Ä27›þíTa ,5NƒIãÈû/™Hð•1l%)Á w¡ö÷Æn!m…¨) 0e Ün¬PFŸñ8ÉD7¥½Dð*n·’¹‚å[Æ*æ–b)ø*…QŽQ!`é† 6ñ¬ª{}§š_%Â!i1p˜˜˜kViœÄàY,sÀÌÇQÙ9›AÛxy…ýüR ‰¦Üe™t"¸<ÍËå[-jXšFC9 —7…=çÀm²Öý¬f¤!k° ^3öy19ÁE°,€’z Y—½nµ”ÞJØ«TØXÂrVF°SD¤)¢ áˆ:k,GØ›[CÁÇé\ÿÖ»•Ïÿó #t;¯Ç—#³Sµ²ó×Oe¸Çc<"Ž`–ˆ‚Šx¸úF¸ÄicÌ•‘xŽû÷·[âB)ŠDDU¾‰) eäþ»| ¯ Ͱ?ÊBŠUv9Z½ÜGÏ~N/á ¢/söö{Ý÷à¹TЯè/(ø©¸yØñ|]®¯ª¢÷ÊÆE6ƒÒ~*+ù“ohœO³Â‡ŸúÓOY•óµ¨Õ‹{ßo'Ãò]{]*Îò˜Bxw·âXVÕ|¸wâVóW&ŸŠ¾O“ª¹»PýJaϽ½á¬rÈŒÄ>Å÷'p(Þ«T(Ÿ ô)ó§ø² o3j®ÏKú“Í|Þƒ- жqs5(c›ÊŒ-tÞŸÔѶ°?}zLË‘þ´àáTžÏ;[\üSï–B?x—¤øv o{+·³¾ßdÎF—>âáêóÎ<#lÇóRaW§-FÏSþÍJ /‡×¿àŒÒyÁÖþ*d H<Ñ#:õù«ø»_¤®¬ €Zðbéf|à䤼hÄ_"*"ï¡#j¸“I¤bÂÊ\€i (Õ älœW•”3qœbQfPDaý)°4u$5©@P h5·o\³½öב|~À^¿çíE8ä&<ÖA:¤LbXB#€é)0É»O€©VpMŒP`™ÍwÊj˘s(B©±)G Q H)‚­t©¸óÔ¶méE„Ñ4a2µˆò»<ȶm´ÇhMÕÍ<¯.Ž$ýrÖ}WžK©âÛîoû”„lûô‚¡J˜²ÒÓû¹:mÔ µçºÁŠmAôªÇ}§S¼Üj €ªçX>Œ¿>åîärè?a^.ªÛÉ…Ú\ª“HÅ•œTÇyÿ¼?ò‹øzë½¹„ƒözšËÌ )BOWY>:ß•ƒÁø*œŠzæWÇÏüQ·ú6ܵÉýѸbç¶WªezH;B“àŠ¢{<£µàæOXý¤Aw‚ I>>÷Œ­„ow>ô¢½?vWB*5Suh%3y6öÑÎoš®.<‚†NOÞGg§ovòräï/[ºä¸Q>µ9À+9]}Ãå´wº;•ÅÇl~”±º ­ ¸7^› /©ËþÀ¬¾2ýÌço5/"ík¢Ùxp9´Ånõ†3õ^ÚÌoõçâL#¦%Z ÜG„Ê»TÖ‚Còœ–±Œ' 1]—é‰q ×Ã{þº9¢˜ÿpàÐ~ÃØaÀs^yÒˆsJ" ŠÃQ$åwÞɹm-8lÁáW‡‰P‰²©”© ‰H¹`<‘)ÑN§ÊH‚¤•ÂIâ÷ñ„I±ÐT:­ nAå÷*I *¿PY'>þýÀr"¯F?.¬Lâ wôUèêJ‚Ê‹?wNý8w`²Š¾ï£²®/ÀzççŸÿoþ¸fËŽtÐÀª~ukÇ7¸f$ìy‚иþÎãu?8ˆn/_ pé}îýÊà4µ8òYç BÉDÉÈ,´ÀdÊ’»î¶m´·¸-Àmn p[€»àn¿±ý4¡°xžò„¨(6ÝÞb½€¦ÿª BÈ"I«ˆ’”EÜJQnŽ´í¸ €nÛF @[ÚЀ¶´ -]Åb=?QŠ^ x]þç‚è€Þ $þP‡1ÚÑH!‚#+ 0’“Hi.ý¯Ó[,îÞâß²€¶´ -mh @[º‹‘ç©Hž.%ë~btAt @oPü  §½¯“E6‰xš¢(¡JccRKîÎ1ݶ€¶´ -mh @[º‹%Ï¢Oö_{ýû‚è€Þ ÷ÍeŒþx9 (fqJÒˆ[šDTÊ–”L¥ÏA±º3tË6ZúhyC\‹@[ú(”¬A Ï¾ð‚ÄR:‹¥UÃaªÄþË_Ä/DˆtÐT† "—Ë¢ƒ½ýÝ¡ÔY݈“»ˆí»Ë]ewQR ¥…Ëß\ªy?ȼN-«_Àxö ô깯&ˆ– ýåmn„Ðèo‚Ð=ð@×üäV8ÎUº——ÞGÏÏr‘ÛsöœÅÉ“ò‚¯»n2ÍZ ¿È'ÿ o]*d6JˆVµ˜DÒ21£ á,L£;/CܲÈ·@¾ò-o| ä[ ÿ$<{.’§ 'ˆn“1ÖBhv??„F,%Š¥€8ÀYK)¦D¤¸Ñ ²–}g,|Û6ZÝBèB·º…Ð-„n!ô  ííõz'»Þ¨5~y5ú{×Ú”8³­¿ï_‘ã÷®2Ú·\zª¦ê  G@¹ˆPõÕét àá¢â9û¿ŸÕ ((Î8ó:î|˜C:ݽ.½Ö³ú¶ð¾G7‘è«}u/z7‘Ò˜lgÍ—-—¾T‹<ÿÁLzŽèº¯Ú îÃÛÎh0lé¦ ÑÞÜ< *šç‰Š3•™÷–õ@£!ZW>áxK'@»_ð /žº*­l3$-pÛâ%Wõ´Ök5ì«hÖǵ”ˆžÖÈ—J ãV n;KÜ>€çƒÛ@¬+;º™ëzår»ß:i&·Ýyílçã)ûÉUkwb m[3i¶n¢ 8}-6àåhß#õ—‘˜x0)†?D?0v¿×óÙRñÈ;þzÐôÔÁÃdìƒù9ƒÜîôÁkê‡ë‰¯` ¤aö…½2†£¶PD[MF&ü?{¦³™‚Ï5‘¯M ¾N¶ÆŽ7=¬Õ/¡½b$ê÷·~ý5/OÂ=ÄðÛmP·àÙûÞ 7þ17/Ë‘ŒxW~»p¼þI$ DzWŒ¼.êê'×Åú9)VÏÇERî§»y|Z÷p£Z7«×¬ñP¼.Õ=ZÈE×^ç®ãÓ“›&æHÔq$i¹í_f:gï¾øÐ`¥ªg•r’”ª©×GW…îù]!—™ýËO ÙÌ¢\±š”ËöžÓ¡¦'Óæ%ÐryÒmV<îu:ÍÜÅu±[C§ÕàºÙ•ãb®q_¬àN±®û[³JÇ…‡f.ê2V3뼟ŠzÇð ˆu|Ó¬ÛÍ]OKÕ+Zì^“Bç„{¹söØÏÌýi7sõX®q—»ºé6ëÑÈ'8 Ž/¦—¤x\Ž:²wñàÓ‹iƒÔb>4z縙kàbÑæqƒžVÏIxÙè^´¡¿Q©ÚîȹÕèÊ»Rý¼sš=¹•½¨IË7Àƒ‡àøh,³šæ<ôïÊ*t¯ðÌ*v½NXÉÐB7óÈÓ »ór‹r¤”û²×|Û(ûnãÉ>?]’ý3žB?? O Õs´YOåôéé=ü¶Yþµ$ë…1EK¹$ÿnžl–ÿÕý’ÿ´¸<¦žÈ¿”;OäõõëŽñ†v®63Ìþ®TN[Ù|¹ÚÊyå¯j,]#yâÆàP=t´˜¾|âS«|šÃqt n::“ùàdµ³k ú††"Æ.u!2#û.ÝÇ„¿ˆ+^œ§ÚYŒj OÆãüŽ1éÇðعìÇ{.µMÙ\ÀÚf-Ûy6L”kÿQ©Ògs¥„¸¼ÕSb4`ÄLÆÂ|1Î0]«Cqvúðû? £RËfó•Ê—…k1aCÕŒ•ëæþ?ÖößFÎß»Vð†ÔðБÁdÑÊ<¯ïèÀ".â¦O€8¦˜ž°Å®†DpA}ºû4¬3hÑu—Ù=²áo_=X;9® /Ødà}Âë‹÷ÙE¢ÙÞ è„8ÕóšZì/þ‚—’¬;ÿ‰hüFWjê÷ÃνۘrÞÐÆõˆçœ™¯4¬ÿäõ“>ç®K±Éˆ˜L:ÒtÝ 4]Á$§¡ùƒ# 与äH9„sD˜r,bùÜñiÀ•àö×ÐǶ> —³°¹Äf•–o»J…¿}!à÷εKÉ+œï|«·²gµÖ¥k· …KÝgK…³Z5ߺ(Ö ùV¦ZÍd¿µê^õ[«š9^S"YÍsË/*¥ì÷|µu–õZÅZ!ÓÊyE¯ÚXùØ+ µV¡”ËŸÂC¹ê•–_{…Ìq¾UmœA ž~³ÔÓJ%Ožÿ´üy9_ÉÖò­Ã£‹å_Ë™³o^¶2kõ°”ýVÙÐh9SáËb©¸Ò\¥Z*ëOk•ÖQ.»éU%SÍl"ò»·ü¦ì»ðŽæì)\Âôi™h¼b5_>Êdók…´ZSÏf)ÝËgkeM«–?ò’'èk©T}¡7Ï„µLc­rø\4 ¯m³zVháÙ¨™Zu“RœgKu²¹gYxÞX¯æØéM.ÔN«ÞŒ­›äTö6’BZhWžóì‰F½ÌÔJ¶â½ðqÖ+—k+š\„ß—Ÿ3fNóå ÔYÙ̵rõÔÅ”o.PÌ“ïzXo`ŽWY¡  ªæsq(ñB«•³ÌY¹uqš)®Q²‰%Þ*ëÆÃKì>^ˆ¹ü…ã†Î±W|møäŸu³’§;z¶ô™©n]©¾ŠÙĨµv"ÔÝCÎoßX‚³Rå-B(aY_m³D¤ƒ±HüQl^"ëïOÝßÎý*äö‡Y„Î6&~ ƒ9~.—ðÕ }V9và0ú¦ƒ¹o2SˆÀ2%±‘®^É Vù–ÍÐ%2¤s%•ë+‹RÊ-̈…ÉW×(°ÊÃ[¥Â ©`†ÂÊEÁ{Ã*ü¬úa5^’ô«x…Y‡”ƒ Ló¸?ðzé&. z¢Ó_Ú(0_Æ[ÚO‘›¯ìé}[ïkxÛn ‡¹6À~ ëé•X×zªçC'õ‚é¬ç`n:Ãx±g¶Z¯JO‚ŽÞž‘P‰³}Z>›Üœ7I‰4zwAÝ/µÏcšW¾^Y u“Ñ1[ Wê;£Ñä…uÓ•²³ÿ?·ÙVòƒüLZµ›¯}AL¥fK¸I'ò¥Ä‚ûzƒ‘ò ¶,cHÙ>ö©ZîÄ06:ÉRûìk‹¹.ç>"e\@ñ‘ãHÛ m‹Ùhùë™hã•b "\%QýàfÐéŸ,-_EzÁwgÁ.—˜Sß"R &¨íJl©K—8nOqImâ•dÍú"Ú‰}ÝÕÒbnüPêÇ•O†Ñòþ€¤Us&@s^ÇÓI?ÂÉcµ«uÆìÙD„ ” Q€”À0l!Ä‚:‚K‹±gD$¶ágHxÕºl$ä¯E·aÜ;Tr°Ï¾…ˆ bì&›s;áÅ|³I² iIð3Ä|Ù ëù~‡¤5‹Èb¾ ”ë€6œù5.–aèÚï#éx'ÈùºŽÃâM([ yµ÷ܱ¤OBÙÊg¾-\…,iaA\A°ƒÞCÄoØF³…t-øÍ”-°ó]ú>¸OI\&µ—¥;ÛL±,ߘü¥«&ã!´ÿ(`Bl¸¢ˆ2†%A“PhSe[Á; 8ivã¶¹½xŸuŸ ‹P ßñ™ô‘‹lv‰YŠ*Á±û.žuþ=F¯ãÚ`"É1ó•–Ë|¡˜K}*ØtY¾óífËòÑÿ’ˆGwp¼³d/X-”DLIÊ9%†)‚o{ÅMn3ðDæßZÛ¸ÛWuá Üe„…0Hˆ‹`  pÖÜ–ŽßI‘J7™*P¿Ÿ§ñQY¸ïò»6£Ål¸¡ WTްWŒÁ ôÙŠEH¸ô’¾,¦y‰ËaÒaÈuŒ0 ¢ß'à8N.Ôûðòq.s³éßNÖ`;A(Á¤¹Xû/a 𕈶ŒË ßCíß0»…´}Ìw ƒŽmƒÛE>¶ÀèÛ.r8ÁÂ’ËÒ^!ø9^·/†>„oK6Ô§`.!sÀ¿0Á?´çºa‹AÀÆßƒUóV‚SËNDˆEȇI…±¦|I,žEÙ!0ó}TvAÆ&GFñ6^Þ'z|ù  ‰d® |eK½'Û O»Iø65„¦fOôÈ —…½àÀK²–zäð–.Éì†y^éÉ~CîòزJ¢ø=d´ºU(½•°ŸS¡€p"#B(Ø)Ê3‹º˜é½øD¼°gtl6Nö ~xž.ÞÞšùü¿~p†Î8Lú1«ÅøßÝdºGc<*iÂ(¡&?dºÌµà¯Ð eˆqã£4šãºünŒ×U,Nkèz^óúô:ýd›ikr_éÕð{o<ÌY™ÌIÎ…Ä<ÚÕ?ê §»£¶Æ+žGI|½;›xCWþg0jÝ @i§ÉGz†IW4Ž[‹­×@ŸÅ Í:ôçÁ½nG×3Æ_ô^Y­8«}Чw¿Ì8ÖšOªééÞÛxÞjQä¦=Áæ:±Ô¡y‘‘ºÒö~¾;JØ9ÑIйÔú³ýí­¶¶s>{½xÓ¹¹e­Ù٠жAÜçYgà½éÝÒöÞ9o"…»0,ûrúÈC½åwÞØlwGKŒ“É»•©ò…:M]Ïì°Ç+¥†ê¶£™[ý‰žñÐ õocFg¤Œp04…]3lù ‹ß=½NV§×àŒ†¾ ÛZ›¡EÄ?é™Ì•Sk?t1 Q|<¼UNN«l{p+915ûÈ„â›Ì°É ü2}04& ©8ûΆöÌmO&³m s­ýû'–"Ü·-E0oMx¯³‰Hç´-i’PéëQø)4ˆpÀ ÿq‡^-hÓr|“ƒtM&ôe9¦ •Ò†€ß¯zݶŽOpè•ü‚C¯ÛgÝFû~ýYº­zñ‹ÎÒm×ögé¶?‘ã¼31JŽV2á­SS{°³þ˜ß³þÄ+„·á¬ö‰KF/^›ðÔañ7Þµ–Š›–mƒ¯ 1¹ä`b KZޝ^MY°m)þLñgŠ?Sü™âϦøó9³÷nÞùO¾îÞ£G¢SüùZÿøÛལ&ñuÆXÀlàëph*Âø;$1Ú"eÖvu¤ø3ÅŸ)þLñgŠ?Sü™âÏçPÌÝsÿ´óŸœ­]_âϧøó÷vbÛ¦þdœƒ‹GI}áë«Ö±)/M7ൠ؎½†?·­#ÅŸŸ~„Œ­)ý<ÔùÍ[í÷ÈØJÜ/¶üÂÓ±5EËï›±•Ù¿8cëßž¹ó½´åüä^ÚŦÙx'mâ^´‹žo£å¯l£å{µ?ñ6w´h'…ñë`¼ûã©c‡”Ijrâ‚ò0DMA)5Kq²Ð-òŒß¶ŽƧ0>…ñ)ŒOa| ãSÿa<ßãüónfÌm :ݼA¿ñ.‚Ý?ù6RfRE˜I¶É)à`ª„ áûÒw^CÐÛÖ‘"èA§:EÐ)‚NtŠ W4Ô—©VË_´Q[Jwe¢}9Žn"ÑWûê^ôn"¥!ÙΚ/;Z.}©xþƒ™ô±u_µA݇·Ñ`ØÒM/²P¼¹yT4¿œ?NavÈ ër6\W>áxKg¸_ð /žz*­l3 -pÛâOõ´Òk5ì«hÖŵ„ˆžVÈ—J ãV n;KÌ>€çƒÛ@¬+û¹™çzåN‘ß8i·½yílç¢) íÊ­wb m[3a¶n¢ øœ}-5àåhß#õ—‘Xx°(†>D?0v¿×óÙRñÈ;þzÐôÔÁÃdìƒõ9{ÜîôÁiê‡ë‰¯’ño ¤aö…¹2†£¶Eç(U“‘ ÿÁœé RàrMdÀkS‚«“í±ãMkõ‹Ch¯‰úý­_¿@ÍË“°A1üvÔ-xö¾7ÈÅÌÇÍËr$#Þ•ß.¯I±ì#¯‹:…\†5®H±^zͨÑA¨Y•ä´îÝ5ªùqñ¸1mTÛ×…j 5®ï½Î]ǧ'7MÌ‘¨ãHÒrÛ¿ÌtÎ*Þ}ñ¡ÁJUÏ*å®ï ^äõÑU¡{®ÿžýËO ÙÌ¢\±š”ËöžÓ¡¦'Óæ%ÐryÒmV<îu3w¥ã+v/º§Õ“^³îAßj´ØÁÂqþþ´ZîzyÖÌåqñ¸`*ÞÈëñ©¨apЍQÇw1Í@ôqZª^Yº_Åì ÷rç챟™ûÓnæê±\c—ËÜt›õhäÇÓKR¼ .GÙ»xðéÅ´Ajšð}»[Ê5pcЦÍÞEúÍãF÷°]¨»'íÒñù}±Zî–ªùÎiöäVö¢þ%-ßþŸ½+}nÛXòßß_Áõ¿WeȘ ˜Q•·V‘éXëˆHåØ-jN‰¯¤lg÷ýïÛ3HP)ž{¼ºmæý»ËÄûöÇïoÒ”? šwŽ7Ë©Žœ~(y¼žÿé‡Ä¶eM•záðÿ]oæÿå_ˆÿOêkêÿ¡ß‚ÿ—/^ ­•Á´Ö? g <žµòYp=ݬÿëÛñnÄ\¥¡'Ö-ѱÖ[ÿc« ¬í6)ºÝµ·ªy8ú¬Jp˳•ù |‘Öh6f¿u&è^À2ØÙÂõ´Z‹ÃÃv§³?c/ÓÀ&˜ØÄFSÛ ²¹÷µãçü¥ÌƒCPѱï!±.•ÆÏé&Oš%iî˜JƒÅãûà¯Ê8œÚˆ2."© ‹„åTnrü¶»¶Ñ|ظ>7ÆùýÍ"ŽFä  yE>'p¦Aw<)ÝùÅÛï£Åý(^œ) +ˆ@qdS¦"*1ŽTœˆ(V’&R2&ŠÃЫàZýHÑE´ <²ºžœk!Þá4V §™^šÉÀ\äõƒM4\6£÷Ã*B–+˜Ÿ ¿{ô¬ ƒLn\ª#Ç (·i¤Rî¢$McŽQ¡h UŒñ>H@¾ Ð-$àØ¤),®K$€Þ"!™´sXÆ RKý%H@ï•Û–A¼~0#b¿W'Šyâ"š2qLà:VJ`f¿ä2À÷H€²¯]%ÀüN}ê¹8NEaÊï±HQ˜¿‘ŒJ# jõANýíÚh#¯à’aìTöú”!šo›VÊ>”±GÉ„rÒ¹$bÌcX¢JEÜPPh1ÆIJ± äÖ#6wm£dÛè–ì‹òÈz„{T^ââk`]5‘4ß0»¦‚ÏZÕtÇ æ„¦ïü_©¥HŒ°#G4¡$Øh#Áü!;L@·)§]Ûh”Ó+u­Žª=V8¥ßÈO%€ûHâ€~0 R)›˜XZCTüžOÎ¸×ÆZãUÒÍÏíã‹·é;Тÿ¯új݇DIøÂØgôÇôw¹–Ôµ«Ÿ·»ÿ¸²úäŸ* ‹‡”µÁhò1(ø&©(¾­Ë~v®ˆêñl–‡ïí¸þNu‘\{¯þ¨›X›Mä è á4­.† †¢ äv‚—ù¬¨þHš2áb2ú=‡Ùõ /[ ï•é5}›õarž ©¿ÍzC7 t•}å)õ'Yh7™"•¨}öûat>Øè:ܸ¶CRÔž%›FãQtù14ä½³*k-÷yÓŠxz4±ÕéÐÙ„_!ëÍ‚<wÿ§&,ùynIÈê»þ,¿òªA/ä‚8”è0¢V‘†É Ãc«#=׿C.‹ ‹±BG®×Ÿ•¼þP´ñ!¿ƒáòœ¢‹Y)&‚•ª‚Ø¿WÃQoxmª÷²ÑxZ´º€§T¸5ž²ä\5Ù·E\h>¿2út³H_…ܬQ~ý¾˜¦ Ã_ÚÚdËösº€Œö{—CxÖÿ$f8z?žXg§:%ÿè»ëW,±ÂËz0ºwÿè£>2®Á †Sp5}àLÊá¥:*’ó\… Àgƒ^±â2ü;ÖýÁ¬oþ i%jZL'“9­«!_ÊiQY#“æÝ,ŸV¤1 ýÞÐú¤¤ð°xûÃ¥ªëÀc a¼Vá—_æþËWÕø^ Z_^¹¬?(dÁÎÇ¢ç,ç4YJŠé$½îM¦ó»zÂûöRê¥|„ŽuÉ¿ì¤$O!NflÑe`÷ÄÀtÆ…€Zö/å“ùø )Rƒ²ûðÏh¬‡ÓâÕq/týƒÉ/†[þ«?„0 ,²œùÅæ?ä{¡‡+éþûr0¹-ÔñÄLä°˜×&-mÝØùÕÂÕ/hRüÀä¥ÀlŠ• ¯"-ÇE^^¯xw8!ª–ÔÄ€6-_ ô¶“ñ´XLZ–kj.„ãlA[àÔÛ‡˜G™\,SïΈHQKá/ŽxäCVBE æ;˜/ôàÌZo¾vÑíûûŠæ LïnæK ô=š¯eMWÙ„¹æ©Ö÷ªâ]¨¬Jé®]‚˦¡ÒÁ•ݪTP©+µ0ן¥&Zè³Åº/5[©x6˜‹¹êª”æ’,ÕÒ ³P•U[åÊú.tè’)”ti;Kõ5ïlÅþÕ¬F©½+Í7׳…5™kÿ%ÜPªÖ¹Éºan—`EÝú×lma‚š·T¥5ótÜT¢®KkHgX7B¥i«™ž 5,[®šÁ›£œ%³Y"ª…ÑY±Çs˺¬¸—µüp ý”:a’JDUÚ—%K[¢œ›˜¬Ž¯–,ÍŠ,_ihK»:G:%V©á¡9̺‰¿*ìRb¶…ù\Boàœ£0_›bDx‡l–/#¡­_²;¸Ÿ0Ñl¢m6žŒ®{>ò|_òùt"{SŸ|Sœo#ÃßLZ+ñÏÉÔB{X<œxRl\Ö«çzÖ¬o%&öÑ<`¾®†tŠhߨÿT6ŒúþÆp骣á©UÊT§õ¯Ü^Öƒ+¡©#§4¢‰²‘ $‰XêbAEbö‰'Û°òT‹Ø¦XˆS›2Ì”H1ÂJ‘¼p T…TÄ.¨ÃÔ¼J¨!šŒ[ë¾z\èë­Îµ¤âV*¯ÍÏ.²ß2ÿæÕÛáéñÙE·ýrúæâ¸t»‡¯³_º¯³îÁkžhÿÖmŸ¼¬ßèœþÔîfg‡GÙÉÅñAvðêÕÑÉQ÷÷¥—N/²ãÓ—í7ðã¼{tZ¿}t|ðc;ëþ~#8>òwj#ítÚxõRýõóvçð¢ýðê—úÕÏÎ^vÊ^8=|ÝÙÐéùÁ¯[Þ<9=Yê®Ó==÷¯þpÑÉ^½<Üt«sÐ=Ø4ÉŸŽêwN€|¿½ªÈsü\ 7(YstÒmŸ¿:8l¯eÒrKmT~¯}xq¬É.Ú¯ŽŠ_0ÖÓÓî–Ѭ0«>NjΫ¬¡hmŸÝ³ã ex£X\t7 Åχ§¿âÍc<;„ßÛõ{³F’/ÞtJ²nâÓùÑÆ©à,ÞD•UšÝ¨íDív޶¼|xt~~±$É'p½þûàð°ý¦}~mv6Sí¼û†#"6?pÒÆ?ùe½8G¥taPÝöË”¼¥×ÎÙÁÙyöË›ƒ“5‚ƒ7‘ähy‚ëÖÃ6rÿ¸´_¶9‚õKçÇ£“Û–O{e˜6yâ÷]­¨êìÒíD–[¬ø°˜ò¯~R2jvhñû1Ÿ‚}Ûå[y. =Ÿz€äÁá<ß6­¿üÝ4s8÷õ¾2LPò™zÐ!š®‚˾ZB ·Â*–?%(b­PDc‘l%Rb—ÊDSŸ«KDê8ÖŽh$¬¶\YF QÌ~Á¹ŒMbˆp±”™: ¢HÆÈòØÜ7¬B·ÁªOãõ(Éß ñ Ÿœ>2`ªv„ï7†'Ìh {ÃZt¯Ú\«Ëð²Ú"lX÷)Ñ‚;ÐÏ0|!µCˆcªM"DRТúQT3©1¾¤A Ë^W½EoÔXƨ²Æò¤É "ˆ©äH;Ç“ûátÈvØÀ_ž‚KêóvbòòèEÊ´ÂNʼnUT%’Û˜i†$æ’Ç"ïƒÅwÈÔØ» ej‰,¨ĉS ̧ƜjZ|¨¸[Kó^šþVîÚÙt2ÖŒqÎbJœ“@( ’»„ؤHû¿Ýn\ÉHvcïÊð‰±H:-Uª¨V1@2 Ã-±R ~/.«7å ¨H£¢ŠÍ8UÒRN|"lRçoU·¦ÎßrþÛXœ¿ï¹é“š¾ ,šÓXj5¹ÔJ€a–8°m÷A¡Ðå.‹=Ïüu¶‹¹½UnÌSpŠ©ƒE‚yL©•ji“"Ñi‚îI‹™nRU ~Ÿ?Ç…°Å…C˜Îà¢/sŠ“!À3SЯ¿èKW=ͯä$|ñ|Uø×O˨À†òç(ÏÆ#ÚÅK>ÂäM¦Ù¼†[™óµ¨VνïÇ·3Á&û¾ê–œå1…ðî~I±¬ ªùpïuˆ[Í_}Ì{>Mª¢îb@Õ#¹½ôú¾*³O$$ö9RO}À¡p:k½¯ÊË®¼Î¨(¸r{~§7¾¦YY„¤mÆ\î%›îÕ …U´écŸÞËr¨?.h苇U•u"29-‚wK¡¼OÒÿöí,6n{jb¯{þ#s6œùˆ‡¨·æa-7š´ ]³lÉ3”¯^ÇËáõOØ£ÔB{€ómú·è,U¿ý¤z¶ˆ ,/P>¯{^¾ÜµlQ|µ|I9Ç)VM Š(8`‘UQGR“ ÷-wi¸g³ÒiÛAaûê¢ÿþz#(É ÷µ“.Z §mM óJP$‘RFÆÀ=%êÑ킊S`+‹ãHSa#oo"®Eù˜"wÊQ’ÞZ>{×6¾]Pø lÑÜ­2ö.Ò÷åËòî4Š/T–w·¾w(Ë»{qÛ€ôÎd¨àûäjÔÊ_¿÷Ù“õ%CÉ3†áf»P¶ïá”å&Ýlñ_k°È·ø“G¸ÇÊY„aÚ?MÒH¤±Š,Õ*¡)‘àãÞfAvm£ÙGûÐä^ÍÌ=ÖŦ¤p‚äß{Cs’Â×=I‘[OR(Y:IáaNðM  »N°î`‚;J°zÃá›jË?)ë@•!÷ 5æÕ¬×7«,W™ÿ†ã¹{FÿfÑ¡HH¾aÒ¢A‡ëÐ!½#:¤ÅÞ”G…¤¬f~«¯(¢˜›HÑ”G±H“8Å©‘R߆wm£A‡ :ü2è Å”M¥La"å"áL¦D;*# ’V '‰ÿ”'LŠ…¦ÒiMpƒ*ª¤ ª|0¨rÓ‘W_YŽåûáãÅ•lSéÐ^½—`‡&ùÛVdz ï÷BüB»>¯!ëÖ‹ÿ9¿\‘¥%4ЭÜOdZ¾Á5#IŸ1»—Çù†I£á®C¸Éw€p±°’)æ?|)Q®M$8üD&áK„øf¿­§˜çk'ÆÍ™îk(ùb ,•˜Yé˜Q°uÌD a1B92æ®(ø¹5ºc mhƒ@Ú Ð6tMâo8»sm ÔOº‰®E ìŽ4Ißö$&’F±d¾ä¼¢‘rGí Ž-A¨(ú² îÚFƒ@¿IZÔk hAï‚ú˜È*}ò‰å î,Žx¥eá¢nì#ß‹÷H ‰¢)Ë|†òË÷¢ãƒÃýÔYÕˆ“û(Ù'v»}!÷eÅ”/? ¼Dón˜yX–ç[<ùJXz5ᵎ¢%Hq”æF þ Æè3÷jÍ7e…Z…yyîtµM ‘mû´`鳘°oɲÉûI' ’_‡ä“ïÉ#;¬©‹RkxD­ûö®µ)qf[ß¿"Ç/³w•ѾåÒVMÕAD'Ž€ÃEĪ·¨N§£`oçìÿ~V'qÆñuÜù05†tº{]z­gõm…¦‹,dRâæÓ `¿„ä7­#Cò’Ï|†ä3$Ÿ!ù ÉN$ïlÛŽói1´MV`è”è C/bhçuš`þçíÇÀÈôi[&‘–e2"À¿>5©²øi ‰Ú/bè ëÈ0t†¡3 aè Cg:ÃЋêËÕj•=mÔf2«šxGŽ¢›HôÔŽºÝ›HiP¶µä˶–KOªéžü`&=GÖ²¯®@Ý·íaÐÒMOž½ºyT4Ég"3-çñ ùxYù„ã-àì~^Às¼XôUZÙR(-pÛb­¯Z¬öZ z*J;¹”ÑÕ*¹®D¿?jê¶=Ãî]xÞ½ IJò±§K}× {¼{ð¤¹ÜzòçõÓ­7Œ¨Ü…«‚ïÄÚ´Rq¶n¢1x-7àåpÇCõ—‘Øx°)†@D/0¾|¯ïòåÒ¡wôu÷ªßU»ãq´»ög,òU»nS?\}•X£/ ³gL –1^`RF\©ñЄÿ`ÐtºRpº&2àµ)ÁÙÉ«¾±å=ì×gûÐ^)û[¿q†.ÎÃ&ÝÇðÛmаàÙûÞ$g7þ]œW"ñŽüvæx½ãHŽe·yÔ.=FæcÔm’úè¢Q¸+= T®5ïO…ûæãõ¨Ø8¾nvЏT«ß;¥¶×¾kûôøæs$8’´råŸçÚ§Uï¾ôØdåšg•k9Zê\Z^];?ô_a\Ìç¦åJ¤\¾ûœõpüpq´œw.ª÷:Òj’¢ueOgWÅ9*\“b_Eë¤vؾ8ò¡Ÿ¸Xó›moèuùƒhapJ¨ÙÀwšæbM’òÁõC¹v}÷¥z̽ƒ쩟¹û“Nîò©\ó1.÷ã¦sш†>ÁQptöpNJwÁù°-»g>={j>Ðr£Ô)7. ß8j/Nj?€Ö¨Y;씫è¾Ù­´‹uàiá¡H¼öIþøVv£Þ9­Üƒ£Ã‘Ìkš 1Šk èÕ}i‡Õ-vrO<­²;ï`ZŽ”:q¹!{¨kì¯?ìA+y üþ8<-Ö~ Õz*ñÒÓ{ømµü/?’ü­5cŠ¥ß|{Z «å‰>üJ³cjAþå™Èÿòë×-ãÿ í\mf˜ü]­ž´ò…J­uàU¾îª‘Ü}r€ä!ŠCíw}ð¬)…é{A¤b:ê÷#bÍ+#ñ¡Ãéæ‚O}ªr1I1âhWÜ´uªò;Êjë‹ÑïŠ_¨ ¡Ùqé ¸¸‚¿|{Øpxõ—‘×Ѩðd<Íð£þB;{„|1ÄÐø¢qÅã®=° †Cˆ#ƒd&qY?´ìFxl_÷wâm:m+ô!iVÆ?ÓXTß¶m$ªF<WýÖâ;ü_Ëq6hDOŠBm鄚ñÏ$\ƒ˜ç_ÆpŸá8ú¯Íê_ÅÌç<ÔÌúï9>δ=édÀ’fÝmÂÜ×aÃD¹vž”j:%}:QJÌ[]%†cˆFŒþx1Ìžq*€éZ  ˆ³ÝƒßÿaÕz>_¨V÷¦j¬uÄ„ T·?RF¬›;ÿXÞÿdùß·ZðŠÜï»Ð‘þxÑÊ$q/„éÂAÄEÜô ǃ¿\ìšaHÔ×¹¹wAÃÚ£¡v[º~0eÃß¾~°tz\ž²ÉÀ;ÉÝï¶„°öZ»H@8Ûíí°çr^R‹½gá=Œ&µ,;Š’ûÞt¥¦~?èëdÏ_z}SNZ¹"ñœ3“µ†åŸ¼|Áˆð…%Cd2KX&“>1]…¹éXù!·CÎòÚcב)‡pŽSŽE,Ÿ;> ¸Üþúؖ§aàr —Ø, ÒòmW©ðÝ—Þot.]H^éà|ë[£•?­·Î]»U,žëè>_.žÖk…ÖYù¤^,´rµZ.ÿ­ÕðjßZµÜÑ’…óZ¡t0û¢ZÎ/ÔZ§y¯Uªs­Üá¡Wòj͹½r±XoË…x¨Ô¼òìk¯˜;*´jÍSèAÑÓofzZ­ÈóŸf?¯ªùz¡µx6ûëQ%wúÍËWÓV÷ËùoÕVr5_–Ê¥¹æªµrEº_¯¶ò«^UsµÜ*"¿{³oJÀ¾3ïpžâ9ü@ ¤¢ñVsùÂR!Í×TÀé4å´{…|½¢iÕ ‡^ò}-—kkzóLX³4Ö«ûÏEÃðÒ6k§Ån‘•j‘«×V)Å|¹AV÷ñ4Ï+ëÕ;Y¢ÉÅúIÍKÙºJNo%)¤…Vqå9Ï4j=S«ùª·æã¼W©Ôç4¹¿Ï>çÌœ*9¨³ºšk•Ú‰‹)_] T ßõ°^Á¯:GA :U+ġĚV«§¹ÓJëì$WZ¢8dK¼y—‡uì>šˆ…3Æ #¯ôÒð)<ëfµ@·ôlé3SݺT=5éĨ½t"Ôݶ1{o°ˆÓrõ -B(aYOm²’Dw¤Ý‘HüQlבõ÷‚¿E÷7…s¿ ¹=Ça¡é^ãáØït0GÏÁå ¾šC /ªÐÑ@°€²|Çd!¦¸eúœXL(E”B?«|ËæNèR‰¹’Êõ•E)åfÄÂä«ë Øåaˆ-‡Rá„Ô 0Ãaå¢à­a~ Vý´/GIúU¼Ä¬CÊ~¦IÜx½t—ú]ÑîÍ올ãÍì¨8˜,íéolxÝ~ ‡¹6À~ ëé•X׺ªëC'õŠiÚs0 7íA¼Ø“®ÖÄËÒã ­÷g$TšW¤Òº­ÖªN»y€r”¹ì¾~Ó<÷õÜb¨›ŒŽt14^ªo‡ã5 §seÓÿ?7ÙWò“üLZ¶¦›¬}AL¥Ò5ܤ ùRbÁ} ½ÁHù[1¤lûTÍvbd­=ýÚb®Ë¹ˆE‡‘¬\ÐGÚNh[ÌF³_§¢—Ša0ˆ¨™tDõ‚›~»7ZX[¾ŒôŠïÖ”]. 0§¾E¤LPÛ•ØR!–.qÜžâ’0Ú!D+É¢1<ôD´ûºË™ÕÜø¡Ü‹+¢Ù I«f*@sRÇâ¤áä©Úù:cö¬"BÊ…(@J`6‚‡ bAé¡ÅØ3"Ûð+$¼h]Vò×´Û0î*¹JßBÄ… 1v “͹ðb²Û$Ù…4#ø”1_VÈz²á!iʲ˜¯å: Mg¾Ã@M…‹eºöÛH:Þ ²B¾®ã°xÊFBžï=w,é“ÐG¶ò™o W!KZXW@ì ·ñ+öÑl ] ~`3e ¬À|`—†¾îS—IFíY馻)få“¿Vºj<@ûO&ÄFk!Š(£a(€Q4 …6U¶¼‘€“fWŽa›Û›‰÷Y÷i °¥ðŸI¹Èf`—˜¥¨»o"á´óo1z×HŽ™Ï¨´\æ Å\êóP‘À¦³òì7›•oJÿ:ïÚáhkÆ^°Íe®6ý›©Âl'%˜4kÿ%,¾1ÀV‚Qb¹á[¨ý+&c7¶™‚ˆL ǶÁí"[`ôm9œ`aÉYiÏüœ ëÄí‹áÛŒ õ)˜KÅð/LðÀmÆ9„nØb:×â[°jÒê/pjVàω±Ùà0 £0Ö”/‰…À³(;f¾ÊNÉXåÈ(ÞÄËûD/Ÿ4‘ÌU¯l©7e»ài7 ß&¢†ÐÔ승Á¬°§X'k©÷An錬Ánø˜‡à5‘žì8ä.-  $ŠßBÖI«…Ò û9 7 2"„‚¢Üq0³¨‹™ÞŒOÄÛ;¥cµq²—PðÓótñÎðVêóÿúÉ:ã°?îFZ‹ñ¿_’éñ¨¤ £„š üé2ׂ¿B+”!"į–Ò×årg¼®bz\C×ó’Ôˆ Ûî%ÛL[ãøJst߻£1<`ÆÈÜdNr0$žàûЮþQo8ý2¼ƒxÅó0‰¯¿¤³¯èÊÿô‡­›>(íCò‘žaÒõ£Ötï5ÐçGqCiGƒÞ$¸×íèz}`Ø`Oï•ÕŠ3ß§xzw/åXk2©¦§{oãy«i‘›«‡!Œðh¢3šªKmï'Û£¡„M‘ã@=á3­?ÛàÞºÒ6cÂÁg¯§oÚ7·¬•žmëÇ}N;ïìUïf¶÷Nx(ÜaÙ“O<Ô[~'¥»;Zb”LÞÍMý=ê\èzÒÓ/”¨Û¶^dnõÆzÆC+Ô¿”ÎHa`$ û|Øb´íðw?¹Iæ§×↻x¸Ž Ox*sîÜÚODs1u- Økz|«’œWÙôèVrf*ýÈ„â›Ì°É þ2}°4zšÝ Žá] AÓ±úíñ8Ù6°×úPпßo-‚‘x1à­Ž'2$¸¢˜›t‰É„ L?TRß¾mYȘ†áwîP4çH)ÓQ(0õ®É]EMp8¶Á Ü3álZÇ'8÷J~ù×ÍŽ´n¢}¿ÿ4ÝF½øM§é6k{ƒÓt›ŸI‹Þ©ˆÞm•ŽTýìÇ@Þ9'ÐβåmpWœÛÞÍ ›pÖ@;˜£á ¢³›–9¬§ ‹Þ>FôçåRsôšCM›; ¬?¡¦¯,a2ô±ºåÅ\jÖ‘Ýœð ÐäMÝ̯ãÕ•È"»ÿà=ï?ЖñÅûÒ"0!ŧA¯»Rà=“Q¬N1¡+Gh’ L¶ÙŸ˜hwCpÈ®#:‡‹à¼6Íqÿ8pˆ@7fSa¢ ;É9 MZ<àB_1Ë^‡›Ö‘à þpè*J¡)´Ä•I½ñ…*)‰ðA1-P'ë [úÀÚKCje òãJœÊ*ß;ËÙ§Ì]¦–M1ï°N2/,¦cH“/¬Ï½€Ù¶ãºŸàâJ–Ü)ÑÀ]¸¯ÏãûçÍ~b@$$œRPf9¦›Â ±P, l¬^¼7vÃ:2€›Ü àf7¸ÀÍÒø.Ábö¶c}ÞåwNùpÑ] ÖUœrl3`ˆš9€G‡™Ü¶¬ÞØäÅ \›Ö‘Ð €f4 Íh@—`1w› öy—ø©5\Gt@¨ó@¶‰‹‰F‹€Ç€HÓç24mæ*ÄBüzøâÿ†ud4 Íh@3šÐ%XŒoÛÌþÄtéü”è €.PþJjÛÖ@ÁKD„)˜Ð„ûÒä¶MŸÚˆaSAÄKtÓ:2úèGÈÜš!Ðσ@ÝwÎÜŠÉ[¤nµ‚=,öü0©[3¼ü¶©[±û›S·þí<ß C[¿º¡vºs6ÞN›ø—]í¤'{iÝöÒòmþi÷Ò¢º|&yJtäÿ|ºÒ69w}“YHoCÇa1;/Û´Ž Èg@>òÏ€|ä3 ÿ)´WŠDãþÖoœ¡‹óã°I÷1üv4,xö¾7ÉÙÄGç•HF¼#¿9^ï8’„cÙ-E^µKûWåFý±X»]ÕïŠm„š³ë“Æq÷¢Q5s¸T«ß•Há¾H.º^û®íÓã› ˆ(DG’V®üó\û´êÝ—›¬\ó,øwW|l¯‡.‹wŃ\ú¯0.æsÓr¥NR.ß}N‡z8~¸8ZÎ;U{PO³EÅÇ‚uÒ¨DÅoT::Œ.ò¸}Ñ=ëœ4ŠwÐO\<®ŠµR÷¢í ½. Ž"àA èÂwšæbM’òÁõC¹výP<(’Rû˜{?ØS?s÷'ÜåS¹&ŽË]Þt.ÑÐ'8 ŽÎÎIé.8¶e÷ìѧgMR×|øöε¹mKÃßçWh½[Õ3µ‚+h+;›rÜÝÙê8™Ø™íÎTJ £D–<¢”ÛnþûÔ]¦dÊ‘‹9ÝÕÕ²D‚<ÀÁy^$~öˉx}þìÓó3òþõùãÏ¿¿|ûúþ6üãòu÷Ïäݳ'¯B>fœŸ|y}ùGç·ãÿþ`/»½ßÙË«P_Ü/?íq´ù„¾»ÏÞ½ÿ=þrúîNvö˜…Ïó:=ãŸ>™î·8îA´}¨·õmÿåäµýÉç…¶_­Svú€êôÙùßðz?µìùé§ðÝÚö¿{8í/6ô)þìËjÿw't}û_ÐÔþŸOûÔµö?nÿ‹Gÿ׈pMx¹ðùìì·öñÉËóö“§/ù¡=š£1ù0Š ö/Ó@V‡¬Aé¨çº¾è°ßï6ÂXómcÌÐ|–¿\aê¼ÈÕ—ÈaÌU'¾JòcÐÉþà§F¿×ˆR¤ñSahF c3½QWlLÔæùÛ7ã8B"üÕ˜'xÃþÊuZ”þÔ0y㧨+~j|ì ƒX˜¼|œH,½E–ïãÊñØyß?,yÄ×j…{_ֻƟ'cÑ= rwœOm黳_ÛúPÿ¥ô"|u‰vÙEbN4”6ɧ5þ<­…!Ï_ù¨{f£î¿¬)_V«Ìëu+ë¿–êqájÝÏI2 ä²¤‰WwÞ¤ ÇÎu8wªYFúÅÔ)ø¼}éM> ƒ‘F4 C˜Vã… •] †œ ÍÙé…ïÿÔhœ½:>>9;kÍÜ8úth¦`ØÀ_ö‡¾QøæáŸJï? 1¾ïdÁ¤¾ª½”v]?Žoœ‚(©¼[dåVs ¡†Y•¹ø¢qg8ΨçD*úHdñÁ Yâ)Õ:•ÊI‘/ï•f†¹{ÏÊߺ§”¦Ý'v|–…*‹ïTì¹XwýA>]Oßw–Rî-×)Ò”qÄ•KV¡ï1J°â^(‘‰H3ra{zOW„IdÒp*Ï’¥FfÈÛDdY¨øPéãtü ¸îÅçىιDq†Òâ¥jÜ*¤$N'˜¥Æ-8ÍbL3)ñÇ‹n?5ÝöÔº©I³dD?OžœÍ1::÷†è:»PÕZ»+Úòú[¸o‘ÈÞ”NÄA…¾qP1vºyqóíâc7›n·Ñ6ßÚ‹æ´³ ‘‹¡ÚÀGƒ0¢F>ŒëŠ‘ §JL¶K”qh¢÷hävÑ7ÝühÔ³]“第ŽVâ¶Áømã7.% ßömøv½»”â¦|:†eL•‰@4G:õ)"S•¦†e†-.™Z,ø`¼¸&„¤9v^­ü>#j\=ÓÉ&M3[·º#ÖŒ®jË!s« /Óe’#,¡KÒ¸ÅÕ„.« šÌA;ßõKß­ax‚þDÎt|~42!êc©óMÆAÔßAÔW’v{õKúËÆ°_uXQ6šX ù~ÛU@_°§ê­î0ªßþêË¡=Ò¡½-i‹“Öᶘúòq7uÔbuè¿Å÷]š©©ÁÒØÐøÛÃþàâÈ L6D˜¿û×bµòd™g?}²ý¢+ýãÍ×»Rß>1µìzGY¨i«©BÂxló)$SiujS†¹)—838w/qÈnç%—›£¼©â‹òæ>ºðn…ÀÝ$Šw–û½EWÝuú÷ÛnaYÈÍÃãÆû$ âœÍÇíׯèecù5ú@(¶wú`¼ÂFæk âµ–ËŽ×Þ6$MNŸ(Ûç§'g¿>?‹ÑaÜ_һЊž ö¬ªîƒËÎEìöë”ôø÷Å3º“}eÞ뻥}1dí¾W8ø°Õ³Ö즹>8 ©.I—IÄ"Pˆšy­,s^mãñÍ–Ú~×}GK¥¶VgÖ#op°4ú„!V£P)BÊÒ8µôÀ…Y~Ä ‘2ãYB2Ä­ ,rÜ E‰e,1˜ˆlÍã—N@í¥ Û¬Ãª¸DYš •QU%Û#g3Ú/NNŸ<=ýeŸ´Dó)šïZlW ¿w¡±·¾ò²´¾.k–Ķ ûíá sqQ<éaº³ç? ÛƒQhöÎâ†æ… ³Ó†f0\9Ê÷ÜÊ7Y?´àBñ7K|!­`üF‰Ÿ$bŸVÒWoô˜T$_ctSv;š²#Œ ÐO{·Ð~ Ùü EÖóÓ_žƒÈ‘"ëGYS3œ·ûQ`R§Úòàî´×¢kÃé¥ZŒ6é÷~Ð]j1©òMFƒ+Óbtk-«fA‹Ý·[ÚÂj Ô¨1PcuQc·Ù8zͰcº%;¤’„2‰7ì¢M&øž>Ûâ¯ó}‡*ÊB‚åÆZY¸Y($Ìpîõ£0¶íX»{tFF\¨,Æð2 |¥¥)¦ˆY.g3FÇÛÏWQ‘PßgÇñË“ãçÏžœÞåžãªõvW{Ž·¼þ†=ÇÅÜÑ›5Œü ÈwĪJ5T¬0Çù&ÓP;T m±×€ªÔ›J© •1èújŠ]Ž×.ˆ M!¾Ã*^<>?þõþ FË7_S¨…ÞjñÀøqOŒk¿*—ïCÚ⋦;ZZÇ÷õÍ=’PÀP Hø#‘paµ,Pð~)Xr:ÝœM8®ûxO­ï%œÀxoW”“(”û(·°\(·r³iÄ¢»…ÿ$ûžÐcM™ÐšCÐRèEÓ@oô@ ÐèÕz¼©YwèáÒ$h4^òz Ðèôê=ÑÔIRûå,"_cºè­ƒžèôz½úAO6±µé•Bof:@¯ z @ ÐèÕzªI’ú/d)MoÎLè•AOôz=€^ý §›œ©šCÊÒíä3ÓzeÐÓ=€@ W;è1Ü”Ö~¤GóM¦ôJ Ç0@ ÐèÕz¤™ìí3ĪoY({wa:Ìé­…èôz½úA6%×µ_½Y6§77 W=ØœÐèôj=Ö †Õ}¤ÇKÓ›ÑtxDôZèÁæt€@ WCè‰&&u_½IHÙ–…¹é½2èÁæt€@ WCè%MR{èa]:§M‡go®…ìÓèôz5„žlRRûô&&ùÓ!½¹z Ðèôê=Õ¤:ù!ß²07 W=ØœÐèôj=ÝdŠ×ze›Óç¦ôÊ ›Óz=€^ý Çq“Ëú?†ŒçkL‡9½uÐã°9 ÐèÕz¤)ôù>½ÂtxŸÞZèÁæt€@ WCèÑf"Õù²¹é½2èÁæt€@ WC豦ÔúÇ鱦°Oo-ô`s:@ Ы!ôxSóÚ§7y)ô¢éÞ\ =ØœÐèôj½¤‰k¿…вgo¦ÃB–µÐƒ7§ôz½BO6IÂjÿD–²Íé…é°ea-ô`s:@ Ы!ôT“éºïÓ£Tå›Lè•A6§ôz½BO7EÐôuŸÓ+Ûœ^˜«7×B6§ôz½úAOàfÂIíÓ›e Yæ¦ôJ '`s:@ Ы!ôHSÖ¤‡Ë^-T˜#½µÐƒÍé=€@¯†Ð£MUÿÕ›$É7™Ð+ƒÞÖ›Ó@ ÷AïìÕññÉÉ““'€½ˆ=q#önÎò†n^TM»øø¦qlºÝУÃŽé6~8ôòÆp0òN¯Áð!#$¾º'÷¡‹ºrèhUû}ñD®1]o·À[à-ðöÇâ-kâ=|ðgþ×…æ)œýQåèõ?˜*5@ÉÑØCCP míÑÈù ˆ¸ñ¥™·Èb!–†°¬HnÉ5óV’=ŒäÖïhÞ¯Nc=¬„z(’‡ ÖvÍPcW¡ýÓÛý4oHT4ïÊñÓã6—æÆÊY¹Ê`Ü>¨ãbyá/dƒ'x¦=bÞùì˜G©Ì0bÍ\Ê2Ÿ&x\Êäî¿¡Œ•8äl‚‰L gJ`—)&0Ö:Ä ”û Üeœ$Â*æ¤ §i’(+½us®ŒÑ÷‡îª V ?¼Iù.™ö;Œ=¬ôyƒs[!ö|cRL6&íUT2RJ®$A §6@›Zd¬4( ]ŸR*©#䦨TµŒ[dôZäÂ(rýïÁ¸€ƒàË“4{…’bšwš$Ÿôt´1h¡ñe"¡ˆL’é<ï(¦ÉŸ?ýûIü.TŠé Ûã[‘åIB3m1åBIf:Èí‰$Τ*ž0 %OÏRI ÁÄI§8–™NMZ.©5‰Ž‡_ú¡ }ÖDƒ¿N–d=-ÎVž±p)ÜDYƒmª3ϼµÔ¤‚pA„áš:•šÄ¦¡p–8Å2&b©Ksáê0ÁÎiÆ·‰Q:26ÈØÌ”b+Uêu‚™Z™'XÍšÇ{[ÉÛWô‹âfò£J÷PÌîd]ó¡?ööªhùæ2~¢*.7ëäï'_û«·þÒL¼_›ñ£¹š|ì:žéÎfP.ÉahÏ~´ÆL;¿ò6/®ôöc{лh™n·ÿѵv>ùƒ¯_çëàJ§ ~}0ŸP(ŸM`Å!ƹÀœÜ¯WÍOãœk-4êùáÇþàý¸u&5üÁ'Ç “bÙa|ø|¼Þó3tòû9zúâ¬5]¥u>y·üzöø¸uil{ZJfZ$i1ß®EL ÛI«˜@º<úâG,~“L¿¹î@Å´Ïígë 2žbÚ÷nwí7ãª}rüs+zhYç"^õÙãÓW+V‡ úÑ &.:iˆÇ¯[æƒétMÚév†ŸÛ_BüŽçÅ»,Vb%µÝ óÁÏ|3|ÿÞϦ'‹.Cg/ÿŽ^ýÒêšQ/ }í,Q‡¸øç`ù¼¡\†n³ºœ3‰7w1è©7næiÏr>3£îpVѨ³óày&ßžÍJ«DCµ,ôár~HÌÏð+\…>9˜{}?G¡ûž ñ¡ß]ú¼5ù¸éa”4n¶§oße¦›ûb±jn«á¸ MÌš‹ñÌð×Ò)?Ñä<©€Æeo©˜Û zU@où† ¼w:h m #(Þ#®±F©%%Y¦ƒöPŽjv“€®Zè: èqúñ (hPлQÐüº‚Mº3Mº"´Ì)–Ï,•œó*›“]KÕ&þNj3HRµ9Q_MÀÔ Ó8‹÷Ù]±—wâ5¦é‹£™ØnzÖ7*EÛu]£×6RßÈbá‡åÑ;i*Œ÷i®_jÜÆzä ž—8b5"©KY¨BYZ, ^9†ù¶í#ç^HF%1\ðÐ'p†8öi“J$¨4Ê„Ž’¹ì¦YµŒq®¿J¬8×/›ŠìÏ\¥ØC‚Ô/Ý”m¥{v¡Úöq®_0F™‘iJ5â4Q(e4EVR)’ŒHoœë¯Z¤*w¹JR•UJºuª’0B5Ö W0Ù©ÊÛ¤*ùt&cª2¹çÉ~¶‹¹~šµ´iõ`æú+…‚;Ê«V»ö~Íõssý•³¯ª©ïi®iϪƒ÷ògG[%è2­êŸöÔÎ¥)7)2˜Äm µ–Ø -074Éh†ÕMú¹jö¼[9½}Ú³R䨞öÔMrO³E;J{b¬¬ ƒhæSÄãð‚xFrDp«IŒœIiäŒærˆœ[Gν ‰÷NQúÎl|B€ a.ãˆKc=±‚8qc‚¡j?bÚ³J¬˜öÔMEñÞ¤=+ÆYþú¥™­{VcÞ6í™è½‹JÊú4#Ê!ž…8OdpžÔ£ÌÐ Mœ¸qãeÕ2 í¹ÓÈU’ö¬RÒ­Óžœ ¬¸¢ô„¤çí’žLßœôÔ÷œôLv’ôT­Ä¶tö`’ž•Á%=«]{Ÿ’ž¼ÅHzVKz&-Œ›šª½IzV”ÏX_ô Ÿ—äs¬šú'=U l"E˜z@eHg– „˜L)GƒÆð7ªçŠe@ÒónÅôöIÏJ‘£bÒ3ôÒÄ:Ù§¤'Ip‰àHºL"ž PE©^+ËœNƒÜwEÒSæ›Ì…ȹUäܯµžÿÏÞ•óF’dgHÖ2$K–€E;k £'†Ã©ž¦¦Iöò˜‹E!NvíÔ¥Ê"›-@ÎÊZHúòå Æ¤ CŽ Ã'úúмŠYdAv±§‹ÆL³*+#⽌øÞ/_¼G¤Š[F÷/ÂÅd€Àp"áÆyb,ŠH·6Ö3±Ñ陲SœžÅzLlÓ3{8‡ÙY[Ö¶{Ðc=·ðXºçØK€S!"J0(ÉðÔ k 4"صÇÒÛhžE®NÏ”–îíôT”KE¨$­×³õzÞÏë‰Ñ¯gŽºïÙë©6áõ„ú™ñÏû`¼žIHð@^Ï´¾·ËëIHëõLözâ)·Ç뙺wG$[%kËŸoògüø½ž FR .ÀR@™PÑFCBœ-žjJ9qkJ%¶Ñz=–MßÝ뙄é^O²!ÞÞÂ"mœÂ6P“‡HÄyìMqâ0eõ©%…›Â·µ.6€¥máÆGT¸1eam®p£Åqe-ˆZ(‚ hO `Nªâî™0t»pcÊsáÆT­=TáÆ;ö‡Â4nqWn, I¼}…STVÔbQÙ*¡[{µÈ^µµ™¶¯pcÊ‚H|ƒFv°”ÛT¸1•¼.89зƒ ¶½pã=éæb ÛÍ"ušÇí¼ö@zDãÖ>8 À¡•Ç–Ú²p£’Ù¹ÛªÎ-<²Â k"ÁÛàG S9 ”ã@rÎòw³È{ ©õ$çt‰s‹‘6 îݱ`«Þ)¬fNÏòDŒLH ­W Æc5^÷. µ1À/e &ÂÝd{êÎ$azÅÌVÉÚbϰga€Þ:TÂÎPN$>ò@‰‡@“hùŠi#°Uf*¥¶Ñøm¹ø¥´tÿdŽ˜J)0!âËðcÊ0ã…ÖB¦„T\2-ˆ V§ Ò^« IðŽ)'°ŠT4XKpá÷>#üÈ3"ÖGø½÷Êh!~ùàá3øádsL‚ ñKë{›BüÈ3ÚVnLñc;’Ñ­ ñKݽ/öîç²²–A/bÐìñ‡øY—h4Tpt4Ý@3â|NKˆ\[Ä&µ6ÄïaùôÝCü’#=ÄïÀíÊæ( ôÆ<‰¦…*'­Ã`¹7²;X–ÿZø$·ÍæxwäÜ®lŽA ‰ƒPc¨†H"- ½òD¯Mw›ÚÆGYÄ&a &ú=ùŽPÛ“Í1{„`ÙYÛZ ±‡~OÅVR`Ç€Jª!(fršA† \ï÷Lm£õ{n¹±Ihéþ~ÏÜk)!´=Ù¼5~O…ßÉï9èÙÉFŸH­w|²÷ìø¤ñ{êg–>câéb“‚UÅ&©ïí:ÚŒÚ*6é~O±#ËȾí¨b“Æ ¡¤Ù*Y[}“A‹ Š ãÒ DG.*¤Êéh¸ÓPX„™XΔÚFë÷|X>}*6)È‘î÷;Šóí=Ú¬óÀw#0@ F@y j8GÎç8*x¶Jø6|XÚm~DG›SÖæŽ6g¢‘J ¨t (»$ža‡ Þ…ÛG›SÆø˜6§jí¡Ž6ß±ÿ;mŽ»vºúh³ÜmßÑæ•©8òþ\èöhóýìU{zéƒ<Úœ² ß¡ÉÄÅ6mN%¯r Tâ¶`° d [t´ùžts1 `&¶òh³w68n)ðùÉ2Ê”s„ŠAe¬À™­’»ÅƒÍÑæ”5‘ „‹íuu =ANÅòdîHB •²@8½“Ö ÏŠPi•-¾M„r?th]]ÚÕ•²°6çêò8¶âò¤幜œ i ¬ó†±fæ¶«+eŒÙÕ•ªµ‡ruݱÿ»¹ºÐ:WUjû\])*ËíÙ*¡[{Õ²ÙÇáêJYÉT–ýxeøî³¿O$¯P±l•¸-´`°í®®{ÒÍÅ0ÀÙvfñƒ K½NR ¨ÄL ˆxè´ÕÄs<à([%w‹-<WWÊšHA·ØÕE9¢´QÐÀ 0Zà-g!Äi§@áÙ*á[th]]­«ë® kƒQ]˜zKcG š¿Ûç@ɸT FPRÏ$3ø¶«+eŒ:ª+QkÕu·þïäê‚|«K!¹…Q] *+ŠÌ/y5S ÝÚ«–Í>’¨®„‘HeÕ¤x›\]‰äá…IasqI -<W×=éæb@d;]]’²@µµrm5å±¹ŒÂ Ť×Ë]ß¹Üí{°¥x Z<ØFWWÊšHLéŸ9i”9MzÖgEŒÍV‰Òë¾Ó:_p¬—^«­:×í4‡ˆ ¤cyy'M⌃uÚsH„_w®;µ61ÒÒõ¹4ïQ~±tö˜Þ0΃:ÿGTÒÐ]ØÊ”gº¾âû}x}™¯X%à‚3Æ£ÊЦêd;›Py?*@kT ±"+ÀšEÄÞ€ÒÌÖPbE„|(Ðûª ÷ÝþÍþÁÿðÉ_|ö×½Ñ?þý¿üó_^}6®a·â,Ýqÿâ¼7,p6{šÙ8ÐIoT|ìú’tukÏûÓ•Llþžº¥ìw~’çÛÊ¡åoÿÕÿÕŸüîg¿ƒù¯ÿû½ÿù‡Ï.ï1£³ží$½9žÏó¯Oªw‹îhx¾þ÷ï~ûË>ÿæ?þ¨7ú§£³ßÿäÇÉNýÕôÓøWoøÇuŠ–‹i¿?~;}=öGçqçÏ~ö³ßüûù-&ÊðŽ"ìÝIõÜ€Ÿ­ðF 6‹ŽHbµ—l†?‚m"-ÅŒ@À\4:AŒÅX$XÐ ifõ:‚ÚFK°?r‚Í>^‚Í>v‚M[‚M[‚M߉`ßf/d¸U¤¬NçüT÷úEÄÞ¢—×’µ¼ì]yÛ:V&ƒÁ\Ò˜ÍcŒÊx â”à.‚””|­Û3µ–•­Z +2¾W™wÃâpÛöН㈄35Ñ a”­°E§›ètÇ:½„ŠíK·˜!>ä¯)=Q€·ÎZÀ'Vs¤µµk«‡'¶ÑâSÂJ]SŸ•[ÈŠÇmáqDxˆŠ·mIÆsµwÄ”µ%®oïæ ³Ž ^O´oPÂ…´±Ñxèÿƒ³—®K Èóÿ*ºÛí‹â*j„ËWÅ×Ñ2W]U{õÀ¸RM1íߘá¨7¼tõ}¹ïºl»è"þªÈŽÆ…Z2 ²ø}Yt£h>»ŒjÌK\ûº¨1Ê.ß”búb8ãsß¶j?óE÷ƒ8Gû½óaümþ‘¸áèÍx⃟ÚB-ÙÛ¼»~ýHüUq³Œ.‹«ß÷Æ \èƒ8ˆá4n<óþ2ûZÏ=XPVbÎ2S8,|1è•+~ ‹Ƕ?¸è»?-ΘIÑò`:™Ìt]ùrP‰Eu¥Œ®v¿¾È¦µj\œýÞ°J][ixXÞ}uî§æ²xenÛ(ƒ)þÙy‰’¯Zh­¯_‡nPÎ?‹=ÁJ¦qœK¼§Téeo2]µÙ÷çùqˆr~Ûêyü™ŸTê)§“{t^&ÃpQœq9",ç7e“ÙøÊYdU÷Å?£±NË[ǽ¢ë+M~9Üê_{UlØãRq.wóÅSÈ?(Ô9öŠ^kPþeûoªÁd¾„㉛èa)×*„Ö¾Ý8ä«/N®~©“rÂ\VM€(M¹ìk`õ¸¬Ò+ïNâ$ª—ÔÄE4­n*ôí'ãi¹˜¬®ÖÔlŽ»×ºOêW^x@ªŠFZ@,¡çy<I$Aî¼Pšê°L0_èƒ3_h±ùJõÖ¤{>.ó%ðl¾æ‘®¶ 3ä©×÷mཆ¬t.ÁyÓPcpm·jªð·†…~VHtg×ë¾B¶ x–˜‹tÕ 9g +Xº0×0P[Õ™U®­ï5†Î‘¤+ÛYÁ׬³[ö¯a5*ô®‘o†³U¦ôýçxC­3“uÃÜÎÑŠ¦õoØÚÒ]#o¥ ót“ÜÔ¢‰¥ ¦3l¡Ê´5LOÍæ-WÃàÍXΜ٬յѹeg–u¸çQ~8Ç~*Ì¿6I£ªìËœ¥­XÎMNÖäWs–æ–¬ˆ_eh+»:c:Wið¡ͺɿjîRq¶kó9ÇÞjÂ9c?Ñ|-sH~t7QüÚú|Õ&ì@ãXFë»ãÉè²—»D>MÙN~×›a¾DfK4A?ìþ™š~ŠžbõḔúÑÌhÀz¡çÝâVbè‚u+ \äu  ¼Ñüõát2êç†#`×Öy¾­™Ú÷´ø–õUì–H{ ‚à<§<hÁÞk®4r2ÜÏ5'«VA/°RS/fF CœòZñŸÑBœT4`ê"ÃâÔËâ÷>¼w×Ðû[ }H奂«¼ø¦»÷ê¬ûmdMßæ·wtðêì´ÓýúèåÙA§»{zº»÷¢ûÍþé‹îéî— ~Ñùö´søEóÂÉÑÞWÓýîáÙÁnw÷ùóýÃýÓïænÞ?:88ë}Ñy?Ÿî5/ïì~Ùéž~÷*Žà`?¿ÒéÉIßþªyûqçdï¬Óýüù×Ío¿<Þ}õbï¤êõó£½'K:=ÞýfŇG‡sÝœç·~~vÒ}þÅÞ²K'»§»Ë„üj¿yå0ªïëýçµz¾_›?¨Íþáiçøùî^gáCšo©ƒª×´³áuöÎŽã£éžužï—ŸâXŽNWŒæÖÃjÊxvòùíGCÑÂ>O_tQ/»g§Ë&Å/ö޾ÁËÇøj/~^Ún®±— fòÁÙËÓýJ­ËžÓñþRQp.ÓÊmݘQ«•z²w²¿âæ½ýãã³¹™|¿o~ÞÝÛë¼ìïÆ6O–kíøô¥DD-ÿÁa•/ë%ÊÙ?™“à4ê´óEw¯s|º¢×“W»¯Ž»_¿Ü=\0qð2•ìÏ ¸h=¬R÷—s ñ‹Î×ûqýÄ¥óåþáºåÓ¹5Ì“yò«"SÄ ¨îžû¡Ÿèª¾'BK#çòG Œè§¯ŽN®ã÷þm66.å•ùTG’ôé4'I9$f«$ûq àM8£tïï… Ã•)»0¿ŽôLoÌÇšc¡ ñžFHc ^C@…×@b‘Ćã·úž±š†q%‚Ä6‹”·^Ï!Š!ŠÂ?—RCÇQ! &Ñ"æE"/áÆk¢uÔêÞÓx1SÊ/n¡Ÿ¾¹’4u–½M\±èóBëÅ/Üh {Æ“¯.Eܨ ÿE]x·…Lj`B¡”Kn fI#Æ—΋5åçV=PD@B)á "P1Í~`Ê­u=èˆ ãÞ¤¨NÜp–W{•€Œ›ËÃ?™œâޛ鷃7§‡“éÛ7…¸swÏÅ‚ÉraT±`E¡ñ^–]¬Ÿœûm5âwQ¥ ÎǹGFTEUBƒ’R±`™,íÚÝUYvugcª‹7ÇÝ”Ÿ{롱ielÜc è FŒá¸r<7ÈßìR@Í“† Ü3‡ª ÄŒP¥ãÖEjš;‰EàŒrؼ»zªE&¢¸tt^%«ºñ¨7œÞ(Š}ÞÏKª6‚‰CŠDh°^SM¸´ˆù€lD â§â—y¨hÐöVÜèÄŸçv¤l©üpT:.&ýf^¦²WP=;P·ñôzIf—ö™Â _7;ßf¡žeBX7q:è5¢kâ.i"¬tQzKˆÞE„µ˜²T_͆uœ§VÉ`©ÃWÚ„$¦Öq¥x©‹úõCo Ïç¦M¥ƒB/KžuØY%sž1j¼óRÄÙä{Ã8MµD6É7ó¤‹P‡%ÏWЏ̓’òüè•`Öà` ÷†®¥‡Ì2¤±Ìó¸‰G|‡0„§Ë3ŽSÏ5ò$I0&M‹%µ´|P?ÝF´ïœø+Ÿ®¿˜NFÃÆƘC'$®H:*ÊÆ™'ž—ÑßxÀe·K×0W<íñÞ~„l¤ƒÕFj ”ÓˆK”yâµBr#O¸ü&V¯ß¡Ÿæï·æžo%ÿªGœ½é…é“^PǤ[G½%J¡^$_ž§Í&4Tt™–á"îÉ_tS,íÚ¹pCN%)¦!.,!¥:”°Ú1¦·‚£ MäRÒeP§ß»Ëx=Y”‘* ÉI-ʱ“AFƒ›¯TGs`0*·‘»Næ¡ÔÒªù2s&^ë9&èÿ³wµOmëÌþûóWøò¥Ï3ƒA’e[b¦wn†’„’„·™ŽG¶dä…'PzïùßïÊvç•ÐæôPŽ?tJlYZí®´¿ÝÕKàRÄ@is˜„|€K0éZ•Ÿæå$й|êgk©Â‚.8® ˜ÒÖöKØl%¢€­µˆÍÂM¨ý+°kHÛÇTqtÌ.ò1¸^é‘ˉÞ.—•öT‡ç¹°Jܾèûà´eæPß‚é0ì \ú¡C9‡ ÛÜ4¾ VZý Ne>߉ ȃI¨å‡\ù±Xå„ÀÌͨì¸Ë ™…×±ò>Ñã˧MÊ”ô•:áLžfÏŠR³#ºäúYa9°JÖA« ^£•‘5Ì>æ!XM¤Å sg@IÞ„¬“V×r ×ö|/àn€gDÀñ \‹».¦¶Å°¾×&b3ÂNû±|rrVõàë’€ÖË7…­oàô¦ÖÿëéŒÃÞ°+´"ã?$G<iú0bLJ|dúœ*ÓW.–Nèp@:J¢Ù¯Ë¿ìê:»:œc¦M鯪+º:"§_°…ú!;­®¯³ò†ðU£¯cg:ƒ!ü€oÉT(§Pl”ÏKqxgèC»ú¡>øCt+úqÎó0ñ³?¤WòG/òz ¼ÏÉG:¾¤+êõ^¤ƒO­Á³—.üš*»#'_·£ëé÷€Wý=õ-Q išâï^Ê1oRÓßÇ8j5.òpû Üí‘Fd‰Ôž÷ã`VB²m3dž":ð8Ÿ™ÖÓõPzIг§7ôy·zîqpîõøMëá‘zzñƒŠ"/ z1Í)1ðÎYöNª(è·F±¶8CMô'žÝàyÂø7ôUºk0 ÝÍDˆs­ë™ì-\Uª¯[:Íìu‡:ò¡êOc¼,Ì{}#Q؃ÖÞvÑß_'ÓñõØ®dd-:úÒ§w¸Ug´+ÿ­¯K¾11&¶å âÆ&D‡OÎ’ÃÂÁI–ܦÜÔvÚ¤Ò¢& …mú(pÁ?ç²b¬¶Åc¯Ÿ~ä‡!—ø&u$6)xa¦]ø+´\ér ïb šŽìÔzÎi_g¢Ö„ÿùëò”Äk6µë媒Z&ØÊá/Nˆ4mà( ™‘â¿Ý>(„°Xï% BdRc“ ˜ÂFXÙœ @y/íƒZ·Žw°Šüû4WlÐÌ$ÖѾ™Û ²w 赘37 üUc Áó ü8¯k[û-µºyP<ÜÓË©aÎ[:_°U)T›…“dmŠŠnó<Ìx!£äK\Q óNE/žØ¾:¢AË=؇vf·mÌ~ÏÍüë0×@;Ô]˜ûÖýÆùfÚE6Ë~åVËùý6û ËB,àÔäÈ&&µBm”e Âz¸ÅäE#²nùfÚŸ@'µ4?…V'{’ö›å“dcÊÈ _7½­#xë/,言Ñ*tWÿL·•ã¯Çð9Ã…u!ô¼½Ý€É‹‰‰v×¢0õÉÇô¶@é;}ÑÑ–î.J«‡[ÕQ}ÑN7EOâ!ý³×oÝ´ºÚ¥ßñÈ%Þ©¡¾H=½3$Š[º}òúÝ›=Ñn÷žâmQ[Ú3ÞÒ{ݶR‡xñZû:sÒΪ"©‹/=ˆ…&`ö¢òé# nüÄ=É!Ћè¡ß»ÑŒM…¥K— ³p½7N15ˆkñd¿õ8~v¯Æ×m¥çAEõ³s³Y?Úk‹aWc6Yz3ý~ ú®&G-MJhRêúÞ@D÷Þx/cz&ZtÏ{ìL ùÃV[ÎyýìKÅj™:ÒÕ…IÆ|쵇í¥ÿ9m åèš°¶Þ'3‹a2¢ á:”œ§²ºÛyßÐ,:þ~ÒïÎBC÷•Ðë÷;þžŠšŽ"ȤŠP#0aO Xª—¿_³ŽæÐpÓÐP:M¨EŠ…®+)¶…+!¢€Î|âX¡¥a Ťã`…GäòíAJ7‡”oRŽ–>þý°òAØï—àçºuäð3‡Ÿ9üÌág?sø™ÃÏiƶY|·Éw×–ô;_û¹~¾vk“cÓß~bꆔބn@Mª„0}Î3p†ÂÂT¾˜|_·Ž~¾3ø™œ—ãÏnêPÈ<þÜzýYˆ‰`&—¾Ò´ÎX×¾ |í° )Ÿ’IÏþŒO‚œ~gV ŽŽ¼Q%¡ØÃΞ¥öÝCö©Gð9‚?£m‡ºï;[Ѫ~çØy;ó×agSøo‡%Ý(e†zÇ•p¯°™iûÌ!ˆÚEÝ—°óºuäØ9ÇÎ9vαsŽsìœcçûB}…FãlOÏg™ëUM¼ Ú#ªõMtÚJ#±­_¶´\ºÝÑ3¡¹‹¾ºuï?¶¢^ßÓMo={uó (¨ht T|™Ùyü£ûGY‹Ê'÷ô-gߦ<Å‹Y¥•-ÅÑ1ŒŽV¨Ù ïU¿«Ú)y ;!:ZW•èõžT­ £wá÷ÊÇæ-5X/]÷ËÝ%Í_obÄ›§[ô¡œ™c,žÄÚî{© Áï‚©ÙÑb^F; MõÕH&v˜M íoˆ®4>|nî—Šµêaùèãîm¯£v¿‡íݘyva.¾muÁVê÷C_%cßè†Ù5ÆS•Ñn ˜L;ܪadÂÿ}˜Êôm¥`iMdÀk3 ÜöŒ­òó~óâ|Ú«¶ÅÅ·Gÿâ]_‡WÖ>†gò†ßåÏWäüÁ?âƒë˳vÐæwÁ§s·Ü=n„ã Sm—ïP«rqÝ©tï«•Aí ô­VG¨Öøòý¤qÿ\é|T·­ëÆY§vtØ©5írë©å[Çט#qÛuvë_Z§õò·ê÷+ZkTž*•§êÝ•]ÊÝø]Hÿ•†•b!-W¶«ß“rÅÎ|?Ôóñóõ%ôåòøîº^æå»ÃÎõÝñíõ¦íæ[¥q?¨Ü£Ê3²+wÇ÷'&½ê4ÑõÝííõÝ~»V/Gå2”GmàA]]৸πÔî¿MðïŠÔêǼ|ð…Nè,|;¹+ܤåžkð\îËÃÝõE;ò nË£óçKR}’—0Ä;çß}ëüùŠ4c>\w®ž¯.¾hÚh¥Q²O_옿òóuáÚÑq»ztE¯.®ž®÷­“âñcÐiw/­³àÁwyt8ŠºÏ%«zwcW¾Mß ¤zwß ë«rW˜ð´NŸÊi¹»{«ÖˆË½ Ù×WKe_;(¿!Ù—ž3²Ÿå)­¾!žV WKõô†¾!=ýÏ–Ë¿QzKò·WŒ)àÉ’ÿ]‰,—ÿ½õ†äÿ\ÍŽ©)ùWâg±üo>~Ü2þÏÐÆÕ¡†)áïzýÄ+–ÎÞAùìã®»Ó\·Ô^ÇË*Í@˜þ°+Û*6 ƒ^¯m€ƒyk$64Ç+glê¤ÊÙ;ŠG»â¡¥o*ˆ¬¶>½®¡¡ˆñÁbà”‘fí`—à ÷ås¢èö«QÔ.¨ð˘tŒAo¦=B>"2>h\ñÁxj ,ˆ(R&Ã…t°™[9€ÇÖ}o'^Сok’f•4þz¡úRÌm#‰Ÿq¸®þÉã;ü? q]çåFt jKãgÆ¿G ¼ÿÑ0v;Ãaû¿–ÔÏÖcæ<5³þgŠ™ÖÚÏFXÐ,Þ¶¨ý:l˜(×ÎD©ÆèÓ‘R‚Kîu”ˆ†à‡½á¼—=ãTÓµ €$ˆ³Õ…çÿ2Œz³X,Õë{c5Ö: b‚ŽõU§7PF¬›;ÿZL?c{~à·¿ï-½a–Ñ•½Ñ®+\Dâ¦O TQø‹afj× Ë×·sïq­Ad DI´„oã°º…q]xÌ&½é”ÿʤÆ«’m¾l§'[a+¾ÅyA-ΞaŽjY´ÇÅi†@Wjê÷ýž¾æùC·g£†–æ æ93Ê.,þ䳊6sA‘¨mR Q“ù¶29Æ6¶ÄvÀ~,ø/ËÜ€#åΡʵ‰ís×·$W‚;C;ð­P2NCB%bÄ¡Ò lßaJ…¿<øÿëFçÂt@òJûç[Ÿ.¼âiÓ»dŽW©\j¿X«œ6%ï¼vÒ¬”¼B£Q(~ò.ÊO^£p´ Dé²Qªd_ÔkÅÏ¥†wZ,{Õf¥àËÕrãjêãr­Riz€i'ðã¬Q®e_—+…£’׸: *eý&Ci½^"󲟟•êÅfÉÛ?<Ï>=:+œ~*ëi«ûµâ§ú’FÏ +¾¬ÖªSÍÕµ3ýé~³î—½ª…eü\ξ©ûΡ#öT.á5[ M¹Ú(Š¥…B𮩄Ó嘼R±y¢ñš¥Ãrò h­Õ+¨™V¶Íúþ¼h(^Øfã´âa,U‹B³±L)¾kd9§Eø½´^ͱ“š\iž4Ê)[—É鬼´+ÄC˸2ϳZÍÔz±^^ñq±|vÖœÒä*<Ïþ.ž9) Îúr®5NNÒn‹ TKä³ÖK˜S®Oõ D5J±7±¢ÕúiáôÌ;?)T(YÆ’òt‡Uì>šˆ¥ó2Œ:GåêKç4Gf½dmé€éÜTíݨ®ê‹46ŠñÂ`(Þvñß±qZ«O#xàuÕ:©$kWHÚh¤ µà.¸lÏþ^8kÇî¯BoóXÌ&')úwÌÁ<ÀÌ`¬)ú"´âH€¥¾™Ý2iÀ¨ÉÇfH|KBBü£gªù¶ÃÝ‘ ´ÌU ˜¯l˲¸u&•|dL éH‹‡!¶]Ënh–£X ¬’›†Vø%hõÃj¼)éWqzY{–=™€¦‘ûzÁ‰KÈ^G´º™U£D^fÅÁ(·§¬½¨aíUÜr‘E©åèK¬fÕñ>-M‰†Yá¡ÕÓ=i¾&NIeK/ËH:øäÐãÇÀ9mÉ}íøóÁ]ž9…¸»S_O%BY20ÒDhœ¡oEÑpyÒtºlJñϰrå$¯geÒ@äi%¾À›Riê6i_!?°à~>FÊ'ض ŒåøØ·T¶ý~<Õ$)öôk›©ÜGĶ(àº0A]7pÜб©ƒ²_§R3Ä0D»w“¢ºò¡×êfRÊ7mèÝsŠYsË·I –Ãl«Œ¸,„_qIcýü”$W ?º¢½[¹›L7þQëÆ•ûí캀¤U3•9ªc6âG8™T;]gÌže$8q!’H L]ð|Bð±°Ü€ÉЦt®ÉŒð3]xqNYÚ‘¯c²‰= 8 pÜBÄEbÌ ¤Ã¹“ðb´È$Yw”|ʃ˜/Kd=Zç´F¥²mê+©˜ Ú$9õ] j*Â9›‘t¼d‰|™ëÒxñÉZBž¦ž»và“ÐGŽò©ï¦ØX&ÀýuÑ&DüŠå3kH×ÆÒ—UŽÀŠ" 3+ô}0ša4гIFºé"Ь|ã®úÐþDÀ„8H2Y0]Ya(€Qh K9¶Ü€“f—Ža‡;ë‰wŽ|˜²±á»> |ÄCa^¢¶²”à˜mDÂ)ñ›½.s`Š”ÇÔ§˜ê E™åóPéXYùŽ–™eå›ö•ˆ£§V8ØÊÌTÚÌ Hª‹sºJøRV(…¿ ÅM®3ð.øäŸ¼u,틺0ÓOÎ(¡!ÕwP JLPn ¤m î.ÀØÍ(rÒÓeS¨ßÏ÷q¢,Üg<Ä̱`Ò¢‘,d`põHå;xj2è%nNMÍ —VéË8˜8á%–¶K—"ÆÂH›Ã$ä°\‚ j3¼œD1—Oýl-UXÐÇ•aSÃÚ~ [€­D°• ±Y¸ µEv iû˜*î®ã€ÙE>¶aÒwr9Á²Ҟêð<V‰Û}œ¶Ìê[0]‚æ‚}¡‚K?t(çà°a›‚›Æ7ÁªQ«?Á©¬Àç;b!9`0 µü+? 6Ë¢œ˜¹•wc™!³ð:VÞ'z|ù I@™’¾r½ ›IÀÓÌáYQÿ?{×úÕ¶®ì¿Ÿ¿Â—/Ý{]$¿ÍZ]çR 4ì&´ž÷ì•凜8ØNNì¼8wÿïw$ËŽ -PÈö‡–XÖc4ÍüFIàŠ¡;çÀccíÐðÇáX.Œ5è ›^ I0¢Ëüd2Í(IÆÏ1Öi«k9Ðk öý^d»ž‘ޝ£Ë¦®cE• ¬xÄU%ëy›÷ãaå¤=Öƒ?XÐZ}í osëÿç/Ò Ÿû£ÈxEÂ>¤+>šëHà)¸¢ 3FT$‰¶©Ñ&:v5O3ÐUÊ~šÿéñ´t¾Qƒ}J\a iË ý(5mPŠVCz˜ŒàÊJ K9é–¶¼3²¡]šH£N?Ä]kȾy~Nýì|aà ¤ü»·}ÞYZˆ®/ÑŠúä‡^Cÿì€5Ä u£ÌɧíÐz†}àÕp—ÌRZ¤‰-ðîr޵³%5ºà;f«Vy–Awܦ›&8wçeYbÒ¡z?‹Ž†ªjh*d¡ ©óYhý^|{»KuGÆÁ{¯ó7þ`¬´ù¶‰vìôÍœx§=ô®ã›ñ& s¦gäÌæ<¤q¿Yc<Ä£m%éÒÝÒ>I»¡õð}+r ÉØ§Ÿ™Ûш®|PúKàý ˆàõ‡B*°%“VÞÖ5õ¬¯K‹ëë?°MƒF)e™°>mêA& ÛÕž¼MVÒeEË·m¦›UÖݲ•î•â…lÏ…Ú$[T4‹ xa¢é¥Íž¬»º‰á¢|fsë=q»†¢¦;‚þz½ïŠÄ><Û†D[GT“EÕ±-àJDÃv=ÑqM Ò”‘d¼¿cÆ`Ý3 ÑSi§,ƒ æˆ Ñm`ÃX¹ÓuÍ:6`§«ô;]×Üĺ†ô½ÂVºu¨x©­tkµ½ÆVºõ7¤1˜÷Íb»î¶N÷÷³±qÞõ[å[}”m„ÞéQck0W@5IÖâÇú]—°l³ä'5&¿Ã»*T×6V¢aZ <¶fˆ–§ Ñ@L›UFdÝ:ªã~<«¥ù)´ú¦îª¨N=xÍS¨R\yêÏòïœØô´Ó^󾉇o‘ •‚wzV·5ÙØdh¨I¥'iåý® á24|ò5f’üþ®1Óˆ*ɦ"jÈSÀ„™@…ÿ)ޤY&HWWÞ#±n4¬ ásCCEWeSö°ƒ%;Ä5, ëótA /s5ÏÀØ1%W‘ à4åTòíAJ¥‚”oR¾ö5fy9Wªô“,ÌauzÅÂò½ ü–…Ç/YÀú¶$£M†·ª^úm2ïwo—á­ö7¸¥×µiš#‹660§Ž+Ä!Y-»ŽIÀÞ®‚·ëÖQÁÛ ÞVð¶‚·¼­àmuKï" 3¶ ¬m6ü4âú]ÝSP ?¿ü44€jصDÓ¦ë¡DËR€„%UU±¤{+ïøZ·Ž ~V𳂟ü¬àg?+ø¹Ã$´ ¶r“á§Œpü@¿«¸ÏRøiþ à§‚0Øzâ‰:Ñ Q[-ÚÄ6DIG²®éŽf«ö*ø¹nü¬àg?+øYÁÏ ~Vðs†ámCÞèÕOÍ4ãÇú]ÁÏ%ø)=q«,¡÷wK+Ö\l:–+['¢¢¸ªh`ÍÀá!,zXÈÊïëÖQÁÏ ƒŸoá–Ö n þ”ÐëÝÒª<Ç-­ØÛÅö®…ßÎ-­N~Ö[Z%ô·´þò+;Ÿ ;+ÊO†Ðæ±²,€6µ,;Ô2gѳúãѳ’´-áÍ^?ÖQüX¿+ÿwðŠn#Û‚™nèŽ**ÄPEK–@‚ ]ò OÖ±»À¯[Gà+_ø ÀW¾ð€ß /mƒíÝdì¬`3~¬ßv^ÆÎÒÓ°³*üÝag„dG³m"Z†¦[H4ˆŠDËİeÙX_…×­£ÂÎv®°s…+ì\aç ;3ì õíµZ§»TŸ®·QÍIŠIL­pŠÄ¶JJút\"‡äs7KSÊ‘QVª â>ûqئMç·N<¹y(¨(;„Ÿ]!zhÔÓ§²]–?åx›Þ21]à^,(*lG3?f –+¼%Èœ¼ÒNX!ÆÇrôûIÛ%c¿ÀèxÞ»VY~fÞ¸ÁZqtÈ«»K”¿í¹?ÿ¶õŒ>”*/ú+¶‡m>à÷ŒÀÔÔè°/ãŒ&ùSH;húVä þ8ÿt¸Òü\?ú¸Óí‡dçn4 vj yv@wýl%}¸Ù$ûBßÄHÈU•0Œ»(z )Å"ü‚*£·E¥‘¯E,œÓí [õÙ§óË‹OÐ^3°.§cûòÝ\{×ò' ic÷R…çú×ÒÅÀ>2“›«ÓÀ ÌžóåB¯GÇ#™Ø ›A½‡üÆe]·Î§Í^#i^6ýë3„N.‚¯­®st\KßÕFoovÒjL½®ûß–7ØDÖ%ù´k_íùßÎêÓæÝµÂò|Ÿ5{çwõu½ïð¼ÇÿŽû{<_]mÞ¥ùöÃûý ³ãÙÍôåê¸wsV7ë½Ï~óè7Z×w_[½ëð0itðÍR®ÃÓðëeóêoïu¥yVë¡9³.]Ï= €Mt}‰'¬Ï-G:9 ùöP£w³c³~ð]™Ó¹7ýÚÛëð|ÐwGfù&ƒÞÍeÛÜ£‹Ù•Ôœ¸W0ÅË;[¾˜]KçŒ×½Ón³u(5f_KÇݯ­ïJóò<99:¾½ñqïêÕÆðõàÜÿºÊÍ^‡æ›4êR³Õð½³= eoÎÓ3eR?àùz·Ð–ïMŒýIëúÁ±?9h¼¡±?œÆþO›½·ÃÓFë;zXN)½oFN‡Ç¿UKã¯>2§Ôfë ÆëÁñ‡ùÿvÆÖ,Ω…ñ§}:LÇ¿óñã–ð5®š"ˆ.ü>;ûÚÞ?Àw6L…«6ª|ú[&”à’·CbÅ#ðC„þ(ïeWøfÓ©€äZ0œ~éÿ„³óýýó³Ý\Œ©LÃ0Adž$ì'D`²YûG ýÊ6¿þûgÙz×ÎRÿ£ö]üsþ“ݺö1[ŠF5M—âǺûË? ”®zÓÌ~ä -`A⇮)¯úià‰×qH]¹ÿÓAèG~8 ‹Ÿp •䳦÷ó=þ)¢„w?°:o™†'»–,Ù1<—Þ/îZ ò$¢`Ý>ªž« ÙÓˆ$™¦­®®j˜¨!†)[²ûê«óÏ<}JåYûÓ„/þ@™Òüà +2wÏù•‹ù×YB4m\ôÍór¬Ñ /‚jÎ Q×ts1±Úít‡ùþ*– ÍÐ…Ôy¶@ÒYÈŽ³wÙê³QL(æDKÍéÈÐjh±OWæé¬Ý,Õrz² ãtKGžhK Ã¢À/¢çI–iÉ6½ð•_­úÐX j,žg,,¤›¶f¢¬y¦¨8-GöD›h.²ˆ+ÛºB×ÊK0žlnkš¾‰öU) YeÝ5*ûú€}•Ÿ|ìYØÊÀVöWXöñ‹ÎÔvæÔ‘©Œ\Rø¢À3<9öKª¬!I/4Ròy„¿ÉÇ"ýþÍS ŸÁyJñƒy^t1Æ€'ϯÒ^7¶¼÷I…§gŒÅ”ƒ®"‹Æ`-MøeJ’+ª†MϰÍbüp¤Í’.µå…ʳ¶ï‡ó¥WóP8Œ¢ÿ²(Àt´ ÑŒ–$—iwß)ÆFZºf¸žîˆžê È‰.‚Ãቚ®©ªê©Ši§ý];’©ƒP£TD9ĘC:ö ˆ Y°ìíQœÃ‰9,á‰à„ʳzCB„¼$›Y"‡*4•Òr;ÁkÓàoexd8ŠèžÝö8Ì -+ÇCÕÒ s”!ºL+tžaŸñÕ:]Ê©©¡µ5Æ;æÑ¤Ão×ûâi?$☽“Èe‘ž[{ô°³þ ô;3V‘C‚ 7óÔ'óœþdo’.ðÙeO,x”€<¥oÿ· ,lðã˜È,¦.ð‚QÜ¥?íЗè_k,tv:¶è@ç"Vb@ÑI†}˜ÆVŠV0Zôü !¬^k´Øß„£Àý7 Ó²‡¬æ0s^g$CÞ-ÅâÌh[no'k\€ÀR(™q8JKO;$±Çl\’ ãØf?¼¸Ó/ÉYå5ƵÀêzí Leä´8ùò> @–RT¦,ûÃ$ë €t,gÆåƒ5ìðñ¸#CΞTœÜÁ6ÜCº3HÔ2-súR)²CÞ<ûÓ8Q’ø¬é©&?%—ÿu¦Ì‘…©à,·éäaý;‘ÏZèZbúË &œ˜˜¤êxè­(í×4[·£nàÑÙ¤tc.Лt&8]ѱiŒ«Ÿ–† DÙ”º My!Æo2$édr,>§r!´ç¼…‘úó/æL>Í«_a¾ð›3_¸Ü|’«ëhDÉRéù ÄM œ‡và‰èF™ù›k¾ðƘ¯EM—Ù„\ódóû¾â«¬Lé–NÁEÓéàÌne*ˆëßL-äú“k¢¹>›Ï{®Ù¸âyÀ\äª+Sš ’«¥% 3W™UÍ­rf}ç:tÁˆ¤JšÛN®¾òÆîÙ¿‚ÕàÚ;Ó|¹žM­I®ýpW­¹ÉZ2· °¢hý ¶65AsÍËUiÁ<-ƒ›ÌBuiéDE#ÄM[Áôd¨aÑr ^ŽrÌ>s£sÏç–uQq/jùhýp?7IQqû²`i9ÊYÆdE|µ`iîYAü¸¡åv5G:«ðP³–ñW†]8f››Ïô–Îý€ùzx™È|?Qç ‰A¼ÄŸ‹¢K¬!̽øŸÌÎ~L—ŸS7çÚ¯©£t˜Æ ÇÔA#†&¿\L«_yõ˜:@†‚ßý~ u|stÁb”¯äfp-™£›/MÏ=2Ñõå¤ÏØŽN§£!,îö¼»¹lŽíðôîJ>»GŸc2;ØIVy|ó¡Úð/=j´ê³¯½ÃIã ¯žtf4>ø&ú|kû/„z®>a÷ènÎÔ€ÐXÜ£ið•æañÏh¥q¾ÇƒH_/Îøzrrð}’Æ™7–öj¤ïöÃÇx0Õëa0bugñЭ[Úéd_™6zuèßÞä¤w«œÔi¨'q¾\ ›34> û˧øý¹Phì¶}t>¢yX?.Í[Æ·0¸…ôõâ’{{Jó`/K^Œï–OZìÝvõ^°¸nÏ‘.z¶¤Þ:À/›öçKì[—*­{”ÅO_ ?× ôoFǯq°§´:Jçü¿™Þ)”ÿPž¸W§Á×ÖÞèZ>aœ€?磛«.ŒÁ§Æò Ú„Ê å‡uy ékűKƒjìÓ8ö†¼´`ÆÞí½ylÜ.í9ßy”–÷›œlŠ<:wKû¦›" KûY¾oŠ<ªÍÙÒþ—»M‘ÇÃÉIq®Ý±½)›Ò·Yc¹o|Ü6hÍGþZ_€Ò±Lÿ)_1%íå|²ú_ÃÀÛŠŠßïþF¿Tù2ëÛêÖ [}ö"¶zÚ<8Ÿ=à˰wÏ`«§+lõôelõ!j¶êø2ìÝ3سÃöìðeìYë;nøø2ôÝÈc‰/³)òXâËlŠ<–ø2"%¾Ì¦Èc‰/³)òXæËlLßJ|™´o›äËä8òû2@ÇËû2x[•_ð»FYý¯ã˘zǾŒ´¥wvV@§o1?˯ ã÷ßMÅÕpéFÖM¹ÚÃø@»òÄãƒMSª¶0¾·-ŒO›ÒXòlWŒ¤©žì8HÔ$D£Ñ\[´U]†¹¥Z˜8„H–[<§·¬ƒ“??àrëŒå£Fe1ñ<&gÆÎqõ=>d‹çSòˆ·6ÝÚ³?JƒŽÏÜju ¨ÀÄ „hÚÐVßxDŸí±`5ÔXTUäǾ†tçÑÖþõ¯-*CðgW€ÿ|ޝmúÈ…š½Eñ=pœÌ!¡!iÄm¯OïœÒ ©*·‰UøRçt†~‡í@‹Ö¥ö¢!ÌËpjiXN>/¹.L»|ì̈u¼x.ãÚ·ýC ççß2pDRr¬¶«¢]Åøo„vÓ üã…ã_]¤…´²p%j5ÍwvÐ?mÕ'ñ« Ò•ø±ÎUà V‘Ra‚÷† –gË£H@vÒ-W [wDESÑpLKtTU’¨.0ÛE$Àj,3ýL€Õðh@©p)<—z/tn]ÒŸQÇÿx닊žÚŠöSÁ+´ ‘1÷›Ð‹Öbîà”‚ÙfÁäô1·éôdfPŽIš¼éä\/6=t¼€À3ÜeÏpy…ìLlaÒõx$4–ú¶„AŸ ·¸ÍG— Mh¥Î옰 ÔÞ6L?¡- á7¨›\þ; ÑåÛ4RªR“kN‘D6ì÷ݲ1äè‡D `d8Jüˆßg3;$I¸+žø0ÞŽ`u:CÒÉyûXã:ÌbÚ>°,¯EOa”›$B"!™ô…|Q…µJ}È #íÓO°øZ@m1rJK|ºï¾[Ηϣ(]2¡Û:(×óö…ªó0– i†5á3°ŽoMÙfÃúQ‘sBÚôÿ³w.¿m$éG’Ë÷¶§ †€`Ã’êýÐÀ˜qlÍ»ccÏb°AT×Cæš"6){2p0@N $§œ’ÿ Ç`€\ò?ä ÈŸ‘ ÷Tu7É&Õ¤š%‹fÍa,µº«ê«Ç÷ý¾¯^ÞöúýZÚñÍГR4ÛóÞÅ "ó¬BFUjE?,Þ-j!$Sü¡VkãiµŽâþŠ…úfñ`ê\ÿú0˜rqyËCõvèÃñÔ…Ú<8‹»Šû%jÈ¿Ágí^/¯°˜?X(a™Øå"ÌžO©¼¿‚û‚€ûЃçÏ^\üôÄöÆEÌ­F !œ¯î#å¾¹;U<[ ¬Â€*¶—9g­õZQÓàÙÕ/2‹Õ $Ü((ÄÔÊlb•¦Z˜ÈͰýêýmÁì)j©ë)†•¡Ê9vP))Ð +@µðÖFä>k¦he‚èÛ‡h´Uˆ^jþµ ݦkÔú.†ðíÐåt°w7uf^ò#¶å\g¼nÙ;¸a]„¹Ž\ªTá!–˜ÂZ|èR,¨)f´Š¸Ú­øP-©ÈÉ|`)6´…؆ɨíZd¨>N-Zý…’ÏVhq5lOƽ~^äÞ-~|õàqtÝÎõ¨ŒÜx2Š„Ñ$ºäŰUˆÐ©KÞ˜/b=˜Âq|­L­ã²h»›BSõyå9?{zòâ«g/‹cª0ÎܾÍc_…û¼Š!ű³ðPŒ×ÀÕ1’Ö®wp¶ï· “qêd¦Dq(ãѸaJ"”¦ÌpeV, à*)ùô\Ö;,mzÄ¥ ?hÂNJ8tí8Äóüä铯Ÿ~¹sʇP+ ½â`’†˜}äݪÿÔNY܆۴q΋ÞÒec°à?éÉxØz§§ÅuÕÓ³bîݸ;š º1v<ÿ´vÐÔ4±q –¥·ÜÀ.=ñÑ©ŸÅ{µ×FmÇkc-N€¸_^[ûvt(Wðã,9uÛšð‡)V¹ƒnÝœwÿ°àÙÓ/Ÿ%,HX°KXp0Ã:Ó‹ª Ú8n6À„5Ÿ7Òíp?fz@°qÚx&w¢‡&z ›ÒJAáDwJÅ6©“''O?$~Hüð¡ùa›3Bø)Z=#D;‚à:êÁÑ*¹ÓÎÇÄ-‰[·$nIÜ’¸åºÜ"vm/d}‰Îg¥ž‰cûak  +€B¥ë ·¥…;½:nÓ‘Õj5Ýószëzv§ßÝ‚Pì£ ¿âCøÁÎ5˜–-•áîŽ*¨— ZÄ)A¥¼Ç <Ä5 Ô! ¤u€81䢶*mS„¼;í³ÀÓŽµØ›fmZ¶eyÿðåªü6>µ8}©=mï¢gçû<7îyyP«r«:Ÿ±ð·'Ÿ}óÍÉÓŠ†·†pµáwÔ¶a· r7Èç./yµg¤d»‹3­*iõR™ô‰a¶Â02EvšaZ §FpI˜’0%aJ” 1åòºÙmÆvV.}¥%È¡žç^>þêpO%ÿGÊ=a€E“{ÐQ9ãíŽç¥æXÝ”YÛÙ6ƒ÷¯î–T ø$XJ°”`)ÁÒòf¯Jw J ŸÓu“`¬ýø£F6">“>E¶B¥C%J ”@hy{[¡5 4[ZThãðo;’‹DíòAX­£JªqkÔLúÄEM\$%.J\”¸(qQâ¢ýâ"ÕÁ”ì‰F.šIŸ¸¨‰‹Tâ¢ÄE‰‹%.J\´W\ÄP‡p±óh¸‰‹ éÓ²U\ÄPâ¢ÄE‰‹%.J\´_\D:”Ñ}Ø•ÆòÒ§]i+¹ˆ$.J\”¸(qQâ¢ÄEûÅE¬Ãö"^U¾NúÄEM\Ä%.J\”¸(qQâ¢ýâ"Ñáï‘|…ôi}ÑJ.Jë®%.J\”¸(qÑžq‘êIö‹D¾NúÄEM\”Ö]'.J\”¸(qQâ¢}â"y QGª}˜GC—¯«KŸ¸èÅêI\”¸(qQâ¢ÄE‰‹ö‹‹h’}˜G#8_!}Э䢴î:qQâ¢ÄE‰‹íñâ|¸æë¤O\ÔÄEqQ!¸1ñÄE‰‹%.J\ÿüâ»ÇONžœdüþ¨•£rêõO‹ûnÞ hÞ¥÷§ï­Õ+µ•³”˨lг1½ðP6³ÆÉö1¬‚„>XKHY¦€È‰2•ªô7HcIYÃ!¢D2h½$ zê'£Î(ÿÐSÄ™‘Ä Œ8Î8—F8c-¤Tj­î\ÝÖl­y$Uw=ár‹j‡+Ú¬vBwHj§Iílz1çp÷2©àÀ#ì% òð(xñA.2¬µåÙ• ©eט׹oJ Þ#¥õãA™ÀAèËeÔ¾MJ1š; ÃW#¬ÒW Ì ZUʧK&1~ðèñ˯wŸ…úЃq·*… ÖÅ n†U’g„P¯¤TÌ&‰*ð!åéëˆcD0¡6£”‡×¡fÉLXŒFEžgn¬ÃpÕQÖ÷ÕR¾¯‹¯mp61Ç’lCBXŠ˜Ö o<¤ŠÑ sâ‰ãšiÐ3p52\ÇT{gúÔÕªCÒ  p-­Z|Y¯È`€ÖÌ—È¥™€å¸x,ÛRd¾e—( üé6e(€ø¾¾–Ía΋&A1T¯ÏâOXÆù”^þ¦zìÎ_»37Ò±¼06ã[}^ý8õN{ÝŸM✡ÃОŌŒ{úB7?w&/rzý¶;œë~øÖµör4qïßÏ×O6.žDä÷ó)ƒÆù„ŠW´µÁÜä®ÌïÊ.ª8B‚b†ÀÀßGoʆ©ôhø…Vi}-®: Þøa±øâÙ pòýKðõóÇÓ%,¾÷.”náoà›GÏ´éNñúñc⎑?FÙ±FU{è`Þòüëç4¾uP§O.wbJçúÝfcMRNm¯ßn–÷«²jŸ<þâ8öÍ@ ¾wsýæÑÓïý¶X:4žÆPuΪ!ýþX_è^_g½~oüC÷o‚ÒŽßÅRkw‹”ºvÔ»p³^ž¿q³¹Éj†5$øâÛßï^|yÜדA°ç+WüâÐUŠÿ¿»ÑY0Ë €óhYbáNGÃÀw‹SžÖy=égU…zñ2ô<¿éÎf‹uÅ¡Z_º8›¿ðné…ó0G³wâxæ Œ]7ª\ û“3—Wÿ†B#ÇØÙšº¡ySüæu?w—æa+ñÆú´\…÷¾q:w‚rºm`¦ÁU¿#`†²q/Љ073Þt1Ú9^P!1He, Ì ¨Å@`ä<% ¯âå¶i\ÅËŸ>0¯õ(óÃï^~ä½Çgz¯|þ}aÜ>Ž¿N¶` 3´Q{†rÈ™ç%|]­þyÐJs˜á¤o †ã¸ÔÇÇÄš5&é Éw%¸é=Ö– ƒ¯¨ ?)Œ-`J©—ÚC§‚Òĸ1Ê0“4)Í”æNéF¢- ^[hzõZÆ ÐB ŒÇ–)~•nl›Æ^7[ Á–ÁMÒáïDp³Ú >¾N̤v–ÕÙƒà&´A„È$AA™ ´ÔàŽB‹¸â"“W)¤¶i¤àæV•VSp³EJ× n"ÌHÐ"7Spó:ÁM~ÌØÕÁMrwÁM¹à¦¤ÇC}‚›mÆÿm7[å½[ÁMÈSp³up“vÜàf;`n>L}.fæe`¦pS+Mv Pj2@±Ä@Ù`ž•P^p‡ø«x¹m)¸y»ø|àfÍÑ>¸É:˜É{½a=2w÷,TKÿ³ùÅa§£2Ö¸Zs&]Z¸½ e\™´-}×¶¥_=~5S‘ÿ»qá›ný`®©eA‡fÜ›ÌÜ¡{§ÏÎû.ªÂ¿ŸÌýôj“ïì/¼‹Ýà¯åu›}Wä39Ÿ}qæÎ†£¸A9Ø'µø°{–…tŠNµ(C¸–MtÆæÄÝÓ…×ÑôoSVÖÔß„KÙ–¢‹]à‹ŸTÏéüy‘ïô9<œ•gº“[hqèx ÃA‰Q¼ïL" ¢¶¶:£þb9R»Uèºw¦?),Æ›«n^)ÓhÀýê/³¶(]üêiÍÓ¯žÔc³OÃ(Õãàqý! ‹ Â7Õ‡—ü†êù´bÛû£+;9L|;\C¡2.% ܇¶0mˆ™ãjç”è­vò…’S'o·ªk’»Ø»sóI&*µ×_}•F$M#5‚ÛôØÎ9ÅH Ç€ BµŽ‰­ž1 TXó+·ì´M#M"­ k¦‰ªÐ]ƒ"¨ƒÜ}?4@F¾B:”üÐê‰Àä‡&?4ù¡ÉM~hòC“º—~(å ?‚™ˆÀùù éÒý׫òÍPât>nÀ€ ·Ä)Óº_ÓÓ+`º—ÞMØÒˆ-+¬«è ïs”w˜ƒêN‰<ÈNÌ×I‘B¼7´ ˆ ¼sA^ô’÷ ! DK 5ã@ #xÖ›+Ai›F ò®Ÿ+#¼ñ¥Îz](âbq,ˆNÌx8:¨ÎÏÿâú}8ÿ{yÃW©î˜UÁIb@É= ‚ 1 ÿ30ËÎ a…›4]†Û ‚Žº¿¸A fï—,ÆçbS\[x»’üpdÂc;|;˜ºE…q\ª€<.uôÝå ˜ý¥.ºE>8ˆŠLƒº§1Ñ ¿ÕŒj ýiWD_ßö¨¹í¡rŠ(,Tc 2È€™¦<ŒW¦˜½Í `[­€BÕÅ¿š”*‹/¸´^à™ ý@:ö{ÀgŒyFUFëÕ0]‰ÞŒXÖY[`vóAWÔˆÄVˆ gÖ,ÔHÈ (Í0‘O¡Äй¾F®ß)èu;Å*$#ìNî zþÝ‘ì¨MOŒË ÎWˆ*>Rnû±¡o½¿ȉÍ@‹ÝÛñi©AFÇCgQœhàT»€C(¥—ˆ¨Ì^ÅqmÓHw³A½öŠë÷ÉÚ]_·‹CŒEjcÝTûŸýñýüÉß}þ½á¿?ûOóæŸ_Lc¥åºçýÉioP´D~˜›PÎQoxØpñkB<\¥Þ×_û'¿ˆ›#JþÏÿeÿöó'úùC‘.þãoÿü—×*’œýp¹HOâãæ"•_Ô¯0ü×OÿâçOÎúç %ùé¿õ÷ÿõ¡Jò«E< ?õŸN7­LÆ^þòü‡ñëá ?< …8=þõ¯ú§ÿ]²`êó[8gv¡ÀÇë \Xoôàù³sóýÆýC÷o3ÚÉ‘&ìhMXS!—O_¨Köam󲚙ÜëšÒ(Úf¦”!EJ³“O²8AÆ—ÍÍ4.0•FÏY'µÁ‰s^—†Ÿg6x8‚0‚ôš«Ë2Æ•ðO RÎ8™9FQ ÅMÉø¡”Zn‰òŵmZøàW#Š‚+é$Üú¼ºÊ`]»7Z£âO…-:sa(Ûò>ÓsçAÚâÎҸ׿xÃÏ‚¨m¸Ÿî‰­IðdºMvîûàqji3f,U*ILàb´BsQÿZÛ³Aq¹jY€0ÂÏ{£bËkeJÞÏn€ëU…ýÍÞæè÷öÛo¾|úýË3í^ÿæ¯àiQô…¯,—,;yå•×{y>Yeå–ß­foP-zJ¹çÁórÔ#œQï<çÁA7¡?ûìrµßæÝYvÓyäѰ? U—Ã̤Uf<¦º #ÆpèàŽg(#®žô¨Ðå¤Då%¨ŒY¨Î|†¸QV(ZK)i 6ËšQ)•Ê f„*m•“šF§SxÎ(‡õÏ\¼Å®ÜPº¹V¤º©q`χ½ênÝùìÓ~ÜÄWsg‰ J'cØ8M5 ‰˜óÈHÀ'üV¼c^›KŽ‘;¶¢L©üåÙ H|2ê×·Ñ—¹‚ªMÁ4Ãù°Ë/̱ ϓ]LsášÅe!ŒÅœzh¡ µ-°V^ŠÐvD˜€s¬¼AwAˆrÔßD„+õÆJA^ÍŠ5Ä(é ½*mè 3·å>{ØtB½_ÝÇ\#%²L&òQ§UVìnåçãÆG‡íÓçGÙPè…K+r~ƒ®.6Éζrüv·3…d—cë#‰ñ(Ýàkµ§T`=-¬! [èpÉ®{¿2»Ÿ Âê¼`±i^àÕŒ"H7è¬ô°Ù²íãöá“ýÃg4O¨8·;@e«™Ãz¾ø>†k®æ ‹0XÉät2êNâÞù¹[tY¬ñÚˉ۞îZRré™5€¯¯Üe‡æÊ/n1~©øëó’Ð÷·‘¯„ümœ™z«ùÊúvO#‡šóôËr7éLo¸u‹g ¾>½WùÌQÔ½#Ý£ÃgG é~Z¤[läöŒÕ½ <¨ÞÐfÛñßo@Â5c޵Ü,!Ê?jn4Y%wÃÍuÜ,6åfÑpsÃÍwˆ›OÏZ­vûIûIÃÎ ;ßkvÛÇÇ;ˆ1ÎWã‹G}Ü{€—É›¨ ‰ š¨ ‰ š¨ ‰ îhT€Ãàþ®ÿùUæ§©«|¾6]/IâsE4t½ºf!ièú>/ÚÔ±ÖZ`ô»ù>ŽÞФºåo&KalZœøÒÐRå”M <DxKŸÚ ÍzÓá*»>Œ"ŸG˜jžOO³ÓÊãZ*OHaBøjÉÖðÏû#D^ˆVÈ3 NÚ­£ƒƒöa*lŸKÊÝ]WiÛdéw¨¿ÊÕ‹3¿/—p ðý媵””gÉéICP["¨€Ð† î3A­åMµ¬ÔpPÃA ´¸꺬l+Û/Ä#ÊØ¡´ã½Nëù-’Zý.™ü)©ƒ¥€šö ÝÌ¡kŒÆÙ9 î°“ô‡ ÙŸV–^þøò™5©ZÄŸ –V77,x»,Xó¸X=6ɲŒçãÎ÷&K¤§M¾·-–kiXîÓa¹Òrâ†åV°Ül:ÏùZñ*°Hz= >Èën›ôj^3Y–¾!½Ò#¨!½†ôÒkHï##=ò(ôS ½ºS!œô¬!½e¤GÒkH¯!½†ô>2Òc„>å,µ3Núf{ÄRÒc’^ØÐÖÞ'Cz•½ íÝ1Ú#ô:ÚÃÛÞ‡ìPÊ„O—ïCLëåŸ݆|¥ô Ý6tÛÐmC· Ý~t<òƒð>Ò^ò«òËìÝF¤µ7PÔ³Î4ÑP`nx"8"¢áÀ{Ê7t­{ürB((É2­ÓÔ£’ÂÿBk=ÅüÐ3)Ð-²¹wS_mÆ&ìYÏNy‰³÷ÏŽÆÙ ác›¿YðåÖ),Ù]WÜ­³×ÆU—ˆË5`f0Ê$JÐ4ô(!ÜS’ÁKŒiÀ‘ý@[¯3½³®©”÷aÖͪ^fV$˜a¡žFÊ2DyÊ×Ü VAh¸e<¼³&}k »Žïðëªå=vêˆ}¹$¾Cdë‡.º30tßÊátœ|èóB?Y%wÍm!šc¢ÙÛœ×М×ÐŒvlvZêшe|…ƒ[à+ ¼ð¢Ýißââ.Ì“Uò6<µ1OÝi:ºãTCïÜØy=Þy4Øì8Ðp ä’68ÐàÀýÅw:ѳ(¹°á»^ÝDD¬¹‚ î7lúúó:Lø¹wù›Ÿ>û«/þ®7úç¿ü·_üí¿~q‘7¤›»ÄÓóÞÐÕžì$ÚeÜíÔÌB:sì,Ã…Õó–?û“7£øu:iû¿ùÙOŸýñMú‡ÿùÏÿúÃ}ƒ&¥óÂÝL¢Ê¡¶åv=‡kóKõ-¼ZÀßüéä?}6þ}òOЮÿû÷ÿøÇ?ºíúÅÄ^NvA…½áŸéW2?ø|:‰øÏÇo'¯FÃþèštþø—¿ü}üßU8$*†Ä6ŽyXÒòÇ+[^3¶9]Èu<ï ÝQ⥠ÕÓÖ½ô5\8¸¯"߇ûï¼9l¦b^A}¼Ã‚[ƒz§š 眱Wb2èr f~Pr9· çìzåþ⾕¬òh¥Ú®Ôg–óz&-¾y2R¾ðÕÌ£aÀ=!mÉ“4Üè0 P˜•’·þʸÁ©ÑB…(áÌ7'Ì÷…‚RÔj}Q0͉ 9 (VAÀuhµ1>¥\JqëC¤7ôÏÚÏâb6À§z–o³YH¨#]H:Õ“Qü0_ã3¿bû}~=[ä“ O2#ü0ãA쥘ö8&ð?í+%°ò sw¿¤÷»sʇ²_̤M7;”ªoMezmêæÏV¾¥…w|÷[KÔK\1ÝØJ0þ•ÈM×ŒÞ ‹cÈÝðâ$àˆfÚ·‹ ˜])‹nPäû¡¡ÝÛìñôA“Q¦’U’60u¦øf0EhˆîPùÔ¦ƒƒYP•F—!à‹â‚M‚"á.hyP­[FTkxj-^•nË’Ê<&†ÄHÀ $ˆ„Ü÷¤&‘§l`|i Q¡‹‰çwË»J®½¯‰µd©ðb]æ×탳+—òn WD‘éyÜí³5¥ ‘€ï ³03O£Ó7m˜¬Ÿ[Ô‡²é Ï.ô؉ÊáóÀFñÛî@Á÷0Eº‚lßïž»_Dq{w𨴡~ù™âG†pé¹ò­Qlm7–ƒ¼„ÅмץJ ß¦ë\»é€r$‹çãépª{1Hò_ÜsòºS*]·Â¥ IZÈxÚí £‘Ó«Œµ;Fü’ÝÀén02Ùúœöñ÷-ïd4°Þ…»pa‡f”¾ÖìáÞ[Ä4GýÑù[WPšÀ¦µ£Ôp#ýÚN åéQl‹+“W gã¾¥:Ž,ô§ìê¯KÅ?I¬{ežîGýiò*ý¨=œþP ]‹Zyn>Î=1¶ÚÓ“Ø%¾—‰¼°ÙÊ`P´õú“lÀA^\fe\&îû`pé~bΫ@îûÀxà©Êuû7j8ê /Lñ\:•íª€»”»4ž:µ$ÚKÀÈÙÊvãŠO.@Ò˜ØÓ¯^»ÃÚ“‹7™˜Ö5g|nKÂæå'ÙâæôÑ~ï|÷¦_‰ŽÞŒcÙ‰vjIÞ¦Õõ “ØK÷°Œ.ÜÕ×½±×G&ê{Јá$v«ÕƉ~%‡çÖh ž¬%Ê 8t žz™Çd¶ÀZ÷Ó¾ù[¼¦bWò`Ç3]M¾äbQ™+£+ÍÓdR¨Æ@è÷†6Ó\ÃÃìéËs;Q(Û±–uÆ å>DÉy¢d¦€´ð§µ¾|uûƒ¬/ØY[ôÌ‚¹LcèKA&N¦Ò‹^<™]Õ1ïÛótÍ^Ö?\Å:·Çomœ«'ëNflѹ3wl@œqÖ–Ó‡’xÖ¾¬©A^½û3ëá${tÜsU_b ü¬¹ù_}éRxp…úr7u'ÿÀ©s<ì¹^I/û¤ûoòÆ$6ƒãØÄr˜Éu‰œÐÒºÖ£Ôû sõ3d~`’¼€4™'èWž–c©zýÞ¤—=;Œ¡.@Óü!§o'™3i™ûÔ¬Ž»sÝ‚¥^þèÆD28eècžŽ?cœÎ÷SøÄ÷Òá !‰¢ó5è Ý9úBõôµîøÍúãB }Ýúª"]Á 3ä)ü{xçU€n­ V©¡Àà‚· Êñ·€…~æH4dz¹ßçȖϺ˜AWš‚Ìaé ÂÌa `Õ+ì;ÇÐ ‰d sg_³Êø¯Ä9zÈ7ÃÙŒMfè_‰rhQÖº­„eö/qmFAsäÍ¡´DOWƒ›‚!ÊXZŠt†eÊ©­D=EÔPe®áÍ¢œ mæÕœtøxƬU஢ü°ýä˜?§¤<¢Êù¥Â´y”s5&+ÇW¦Y`Á<ðˉ6çÕY¤“Ç*¥xhf]¿ŠØ%ÙæôY‰ÞŠ€sý}-/"¾¸;ãEî@©û®‘ŠB£FÓXÛî8]ôÒ±‘ÝuòÊ]h[o’¸%ê,Y¥’»»m¦¦h‹»3¶Ô¾ó€ÉzQÏšúR‚Ç =F~QJÍ 9ÍWf¥…¦3‹“xÔO/ Gž.*Z:Tµ¨™bªþ‘kÇ™B‚}F!¸ BbnmtëcD·çµƒIÙ%´<ÿ¶Û:>ë~áÓÁÁw)ÔµŽŽÏ:íî7G/ÎÚݽNg¯õ¼ûí~çy·³÷¬æŽöwöá“ò…Ó£ÖWíN÷¸µß=<;Øëî=}º¸ßù¾òðþÑÁÁY÷àèIû|9éì•/ïì=kw;ßC öÓ+¥–žž¶ñâOåÇOÚ§­³v÷˧ߔ}v²wü|¿uš×úåQëùé’JOö¾]ñäáÑa¥ºÓÎÑIúè—g§Ý§OZË.îuö– ùÕ~ùÊ!¨ï›ý§…z¾ƒÈÕrÓìvÚ'O÷ZíZ#UKj£|wÖ¼vëìLÓ=k?ÝϾA[Ž:+Z³`¬²Œg§_.š†¢Ú:;Ç]ÔÅK»ÅÞYgY§øºuô-^ÞÆã|_Znª±5=ùàìEg?Wë2;ì/wýeZYÔÙ•µZ©§­Óý·öONÎ*=ù~/ßkµÚ/Ú'{Pæér­t^pDÄòÛø«Ô­—(gÿ´"AÕi?é¶Ú'µžïŸt¿y±wXÓqð2•ìW¬ó‡Uê~VqÄ'íoöÁÀužåg¯pŸöB3OÛÄ'°ÕÝs;´±ƒÿ4e –DŽã2rDŽNç¡ãkû6™Ù­3‰Av%DK»“4ZJ#AB—D‚¹ˆ6¼Ê…³Øîö¦¦$‹•’©úâo²i–‚­J8zmŒ…E¤±6&Ít²€z¤«G>Ñ!üëß,ÆR,aÄ±ŽˆFÂjË•e„ÁÅ áÏ9—¾ Q„XHˆ # ¢HúÈrë›Ðu1Ö»q}È”^rE;y52Yô4–IòfçýÒÆî3J=¬4ìgl$§}— C—OòŸ~œ­í²Bð04ixj©EˆS0(1ž¥•ŸÎÇ»Þý=BÌ-p€ˆ¨äzÜÀT–wí|÷ÀýJoží¬ï岞ÿùñØ“Ö)Â?tχϣƒÎw¯¾v’Wž®,ã™äKÇþ T%ÉtÅ2³Ê½y‹ßE«Ò`ÅUH(Br)£HÚÇQ dd™~g­fu%ÝYóÜ¢·” F}[™«µ¾ÒI¡4ØùVaIJBŠØrSb@KCå–QÎ…P>f„ ™ —4L£€ÑÀ/?Øm«ÇýÑy~ìÂÐŒG½üœœßÍî?ï§Â•–ƒQ k+©$׈ÙiŽCÁ7wgºÈ4’zaÅilÏÓ/YIÙ—£lpi÷ˇ dµz¹½¢Œ¹£&ú±ÀÏ‹­–éÔ³Lm Ç‹|ã[‰hˆ¥ˆ ID’„š›ˆQº D†ï"µH³T—³fc‰¦4µÐ|HŠ#ÀLµ „2]Ó½<¯t›\N/Kl], Íj¬aŒ*k,¡7A!u„n*9ÒQăíXÚ-‰Xb_À<êC¬eäjëEȴ‘ò«¨ $·>Ó IÌÓ=q¡¿ o°œc ë2d” ¨ $²Ô'ˆ“H¢äíÞùï§ARµZŽ5Y&|ÈŒE‚XºÝ_7€+¸øÚ '#]¦ª@üÞ>Ɖ°pÉxˆ˜G@iQ+20¸f¦ryhJôgmJ#$TZ%/ãXã„–H¹> |ê0Fa†¹”Ä`¸æ´¼™–“ çrÕÏÖ…Cð) Ò2öK¸l¥C[ J°ËÂMˆý+¢´kp["ª¹ô=Ì®#‘ JßcŽÏ1‰ÀŒ¸=5ày*¬b·} ®\F‡JpÊ5¸e>Ø*¸’¡G97¹œ7¾ RZ}¥² ŸDˆŒKË=0˜àAKp‰d€],‹öB æfDv<Œe†Œ u¬¼Äf~I Ð$ L+©½Ð g ð4óx–Õà¦ÚÑ ×Ï2{LU¼Z]ðîI†× 7$â!XMÇ$ÏrÆcÍ()q"ßÊë¤ÕµÜ굘=? íp7À3˜€ž"Ü÷u C4ÔÊÅb3ÌNDZ\9yé–´^^í [àé¦vþë¢uÖ~oØUVZ£õï’Ð?A…8´)2Ûx‰Ëmp± ž!Á`“´ÔñCqSþŽ.ñÀ/p(&vÚ¨©'.d"¦²— ¡ù@¨N«ÛŒ“±šÃ;øªÑ7á´wÁ~ JñTt§Pl”OKqÄg(¡]óМ¥÷.ºýx=t?q²ß¥‚Wtå?½¨y×É}J>2!'SQ¯?hF&Õ<5Óì°IGUwäá›vL=ýP­¿«é™îSüÝM)ÖEÙL0ø>d‹Ü]?E-“P5¢î¤C£"‘¾2J?Žo%]†@sHüÎLÛiÊ”Ézjš]€Ík£6Fô›{=~Óº»§M“¡£¨½¸ÇiWà·ìÒQÐoÝ‚oñÚ56iP03»ÁÓ„‚q5nlroAË›9꺗¦žÉ†ÄU¥úú¾e ›Ý¡ zqúÓgŽYa¯o%â:?‹‘óžsÿGFÞñtäýö8Yx›?Z5¸¿á¶žÑþ­8ø á»äkl$æŽK™[M©%a‚Ϭ¸K¹m̶9N™Ú,®9SÙw{‰¡kØ÷½~ú‘ •ãøXÚÔSȦà”Ù ˆà¯øÊçÞŸ4ë3gÛ¯£ÄÍá—~¿Å ŠãÕ‚MmÇstH°ÃM*l8žÍqÀlF”9kB!7~¹íSŒ"G*’Ü9Ã;`º‡¹ÍŸ‡Àm¦äKÛ§Ö­ão°} ÿûÄ÷ݤè>îÿh7•ÙÔóféF¥ô±¾»ÖÝítSô îÒ?{ýÖU«kÜüÑ =ھě>ô#ð´i6™DqK×Í~÷jW´Û½‡x‡Õ–ñ ·Ì¶¹Ñ… 3'P’2‘zÍ‹‹ Ëd[MìÊÇÙ 1Ó‚(*ßÓãÆO¼Ñ“½‹îú½+CØ”éPºtÞ° —»sa—Qƒ¸–¦ê·îÇÏnõøn‰ôP%¨¨^;µOê»m1ìš3Ò¦îq̼è>.1˜/aºRoÔw"ºmŽ·E¦®¥qùL±ûΤ¶Új¾ÈÈg\*óÈ6ñ°®Òʾ﵇í¦ÿ‡î Œ­Vã»ÒÌ;•É—ÉD’&7Q£äŒ–…p¿Õ÷[ÀELH´„<‡‹‹à"~%\¤„þrpQ»žË0‘¶ïqmÎ]ñAxBlS­]Å% ÕKpqÝ:r¸˜ÃÅ¿.z!ÓÐ’òuè©€qIGQ*¨ÓÕ8¤ ûÄ÷8ÊÚGŠJ?ɨÉaæÏ3q3˜9ʘüñPóN‰7 ®˜¬ä^¦¥Ðý hè³sÇi¸qnnbdvŒ½%æú/$æò÷>'¿¾g>‹V Ç÷³øžýø^x¤&Ô¶9Ô„'¶D Û<äÓy11wÝ:r|Ÿãûßçø>Ç÷9¾Ïñýßßcç=bÎï‘`ì/:Ë3&Ê¡õ"hÍ_­1vü_oÏ e@d‡P6õRm¢•v1¥§_Þó¶f9´Î¡u­shCëZçÐz´†ú Fmר¶Ìu]¶³ ÚwmÑÕÛúQtîÚÚà³­_¶ _`BŒ§ñèôÜዾºqïß·¢^?ƪã[4^Ý<0 *Ý+ß–a{úJ´ž;xQù„âMskÆã4ƒ§h1k¶Œ°¥àÚ¼Î@ëh¥Ùš­ûV÷»ºötáxDÇÈ媽ޠ©ô}+Cóø½s¯Ä¢ò±ÑKÍØ Ç›|wÇ*öS&¦ýäxkƒÞŸÙÍø Ðv¿™ò´yׂÚ6|ZFÛRDú«•¨{P,–qHDWYïþ8ùX*U÷Ëv®{½ó<¶w¶A í€Z¾nuÁ‚š·C©5`õËîZc­eõ£k ôйvU#þß­f.Âûk;¼¶°{ÁuÏÚ*?}<9;ýíUÛâìñ^ž:—çŸÃ òÁ³{uæÂïòøôNðÁåy­´ùMðéÔ/w?·ÌQЩ¶Ë7N«rpÚ©<—ŽöJƒÊsÁ¹¨;ÎÅs6nŸ.ž¯G{ÕÛ˃ ¹ì|y¬žUoÊ­‡–$Ÿï.wÄj¤v-Ï ­ãzù±ú|A•‡ÊMù¡ß—»ÎUåæËCe¯þ+ +ÅBZ®ì¿¸\±3?ýôùéòÆrþùæ²^æå›íË›ÊSeïêñÚ¨”ÕøËq+ =l\=_Ônªøò¶Ò8½¹x*Gåg*Tm AÕ¹8Cñ˜>Ú»}®ì•¡¾’[i}æå½/tÒÏÂãáMá*-÷tÔ¸Eq¹«»›Ë³v$1j«ƒÓ§s\}PçQ+èœ>KrútO .Ï.ž+7Z©;ÐFíú°Q»©ì] ŽŸoŽŠ­àÚíųê\î•Ю´‹ŸïƒN»{Njw@ƒgu°?ŠfÌ%R½¹r/OPß#ЫÖ þžÐ´NÊ{i¹›[÷h/.÷Sðþ¨q±„÷óû'â}é)Ãûiš>ª?M+/Î9…1lüÖ 7ÓÎ.Æï,Yï ®xg=´ÒKÍ“Èâ¢~`<“¨q'<¶n{Ûqbˆ¹ ú4«•õÏÔ#µð6€Þ$ÀjÅñ¼ú§&ßæÿZØ™=¦mQ#&H µ¥6량ÏŽÏ¿¬h{ á°ý?ëÕ¿Œ˜ó44Äúß):fZk?Yi\`a³Ì¥¯Ã†‰pmO„j¢> %xçÍŽÑ\«7€#³k ºp‰”v¶ºðü–U?)KõúîXŒL›``}Ýé ´Ëæö?öŸ£Ÿèô¼WÜ0ºê û์n†‹v|á;˜9Ü–J5…¿bvbÁ‘æÈè[kYζãzÑ*’üðµ……¡sSxL& mƒnùŽË ðdÅòB[€Ûé©VØŠ/ \P‹·ë¢]4®eÑöR'>w:0•Úæ}¿gn|×íÙÁ¨¡¥«ó”­C,þäÅ¥Éü @4°w”MWÙRkÇvB¤˜ïú8 ߸éS8>ÔÍícÎLµïbWr_ŵàÞ‡P"/’„Šqj¢ËÃU$p¥Ç´¿û2Á÷› ’WÆQßútÖ,Ÿ4ϙ׬TΧ_<ªŸ4JÍӣÓJ©Yh4 ÅOͳrãS³Q8XP¢tÞ(U÷²/êGÅ?Jæq±Ü¬žT ÍÂþ~¹Zn\L}\>ªTNšÀl‡ð£Ö(e_—+…ƒR³qq =¨”Í›LOëõž”ý¼VªOJÍû§Ù§µÂñ§r±ž¶úñ¨ø©¾¤ÑZálÅ—Õ£êTsõÆQÍ|úñ¤ÞÜß+.{U/4 ËùG9û¦ ä;-ïÈS9‡d¶@ÊšrµQªíŠ¥…Lš®©„Ò¸å¸{¥âI XÓ<)í—“_Ð×££ÆŠÞÌ1+;Æ“úÇyÖP´°ÍÆq¥‰šx©XNË„âKñè /ïãq~/­×Pìp$WNå”¬ËøT+/ n:˨2O³‰ZMÔz±^^ñq±\«LIržgØ–j¨³¾œjµÆ!C„//P-á?Ì´^Bœr}j èT£´»+Z­ŽkÍÓÃBuààe$)OpÑ|XE‰¸W:-Ãü©sP®¾4}Jsݬ—ÈÖ×ø‚èUÝ4óöE$ExaT½ÇÞMïFÓwÅ‚þZW¯u÷Ž´´30hÉ ABÝ=7âE‚³¶pŒíþ*7Ê\LÓã1¢¡4LÛƒy¤™[SpôEŒåûT»„„¶KQ`SÅc1€\û!'å8¹ªúõKº÷C†ƒˆë@3iZ"ÜE»`L8ÊS„‡!r}B„W!Š„ƒ4sÔ¦1z c}³/†LæU¼ m|ÍžJÐÓ( Ï~³¦—H®óÎdŒVù2©{£…¿ÉÕôk$?|Câò)b{ˆØé•ævG›û¬ãUÕ´ÿ îZýx-(]̉—®‡ªe29’±Þ´ŽOƒ’S¨W†ç·ßF7÷OüK<ò©¯§LY2ýÓÓxQ¿EÃå‹«ÓeÓ¿…ªkd ¼‰ªI[£;Ü3 dàlétµ7íŠ#Á\Àcäh‰‘ëb˜OÚ“HíJ?V@ɪ|úµKã\:Ø%” ðl˜ ¾x~è¹Ôs²_§ Ž•abˆvï*éˆîª»ž¹¶}zúªm·5&# q"]hAñX€\¢€aŸ…ð+. 4é‡àÆ$ËËÉ]õ[±¼Ê¬ûÆ?ŽºqåÃ~;›J´j§l´GuÌF1Ç“j§ëŒÉ³l/t”£¢>8F!8‰H?`*t)D¢'Þ2„5ÍÒ|w ä“€³0¿.t¸BИÊãÜKh1ÊKI²–2ŒOiÓe ¯G©Ik k\—J­4óAš§Ò§ ¦‚¡ ™·NÇI#Kø :Æù*k1yº÷Üw‰CéxZRé ¦7p‘ÀL€wì;›`ñ+2nÖ஋”TÕž@š:ÄlF’ žt€ÁLSâe¹›æ]dù%wõpЇö' ÆØssâJ@ù¡$'ôˆö\µ!'Í.Ã÷Öcï\÷‰ÒH„¾¤t˜ãQÐKÔÕD ŽØF8œv~³×g¨HpD%%˨š2"y¨±Jr Gü¥¦eù›Ž‹£‡V8ØÊè ª\æ‡Õá…¾É4 •› PÜä:“í€Ëþ©¹ŽÑ}QfÆÉÅ4„I‚™C©åB¹®à^à{hC‚œŒt™ªñ{û'ÂÂ%ã!b¥E=¬XÈÀàš™Êä¡)eÐKœ³6¥*­’—q¬qBK¤\Ÿ>u£0Ã\JHb°æê.ôfh9 r.Wýl-QX0r*!c¿„+ÀV:°• »,܄ؿ"J»·%¢šûÐAßóÀì:¹ ô=æø#‘̈ÛSž§Â*vKÑ—àÊet¨§\ƒ[æƒ}¡‚+‚#ÈÁCà%RÌ7AªQ«o T–áóƒ‘P€€<0˜àAKp‰d€],‹öB æfDv<Œe†Œ u¬¼Äf~I Ð$ L+©½À$q3xšy<ËjpSíŽèëg™=¦À*^&c²O2¼½!Áj:f@ 3k@I‰ùV^'­®åV¯ÅìùQü—½kkj×ÖïûWøðÒ{׉‚$˲LU×> 0 = ô}S])Ù’! ;N¸ôœþïgÉv®8!@'DM'Ž¬Ë’´¾o--IK07À2¢Ô=å¾O˜ç Âb­<*çÓÙy;Æ+'ž·àÉ>»4n¼’ãü÷9xëœß›†rò¿ße®ìÓØœ[å!æzó‘"° ] ˜¤Cíw‰‘¸IÿœHz“Oo‡Éì1 4/HU¯6²€ÔJçÞ2Øð¼ÞîÀÂòîd»IRO'„rÍCšú.¹­t=ô÷ÌÈ~—;f¨ÊšIåº #÷>{ɸœLFÍV»Ò Õ†ö…µ´ ¼¢ªÑµðM9&ŸV¤ÖÚ0Qµfô ×)uþnä«t½lÆ|“:²zI®/î˜æµî ¨P7I¢ÏÒïFSC èH`|™Ý9PöƒhøÊ…Q]ù=ø¹÷Kõú†Uòý•$j¦5Ϋ¿ñq¿ „w%S£øff#ºïKЄw Ë£@*²ùò}@4Ø`Þ™É'ß òHª–¾©šèJ£cœf8ýtòvÖ´7[N6\ f1-yü—œH‡=ïOØÝ᲋‹EL'ÞèÎΡ½oÏØÍÆ™çÁÈ=Æ›r”mw™vÿW¶ñ*)ŒÆ> ㊠FEŸb×W~@à·”—æs=óN'ƒªi”¸ÙSôó‹d¶Å FÓH†ymtŒCEbJ|òá#¦•Dïi©8 °%ƒå;=òBˆ™=‡Ðó.GÂå. %ô·Â\hùèÚióx;hé ì nsì4£ïå7ãMU‹ÚŒ7]ÙSlÆ›~K[Jü>ÉtßÞÚîŸÕËû££ºt³p-Ü-1!–û<†i¤lŽ2&…ç1ô`Ïc/:ãQgî2uF… Z„Hù xæ IÄÃ8Љö½]cÚ<ìy Ï )s…œy1Ø…º]ëðºÇ*Púè± taoÉx´h¶3 ^ó†Œñ÷^˜Ì:µ%½ù‚²’¿ìÇwMI©p“I°tq”.²Y/csÙÒÑE¡b?Œ”‹|Æ4P=7FAðœ1 ƒ‡û¡ÿ]œ6K-]|AºÐÀ£0*¸çá8Ú£n¸.äqé NqsêsÅ…Ë©”~(¤'¹oiæâÑLfiæÂÐÌ×¾ŒíM^±–ò¬à™÷@ô©vvÄèõÙedòe”—(e+Ay™[¸®Ù€¥¼£”×[û‡`~S{¡ÙFFÈììF!Í8b Õ£ëmÓæa)¯¥¼–òZÊk)¯¥¼öþá±äX”ÄJPRRö’L€¥¤£”Ô_JʹvE 9rA¹#† FR†!Š"*âØ@䆀M™‡¥¤–’ZJj)©¥¤–’ZJ:Ž’º¸¬D`)Æ’1°÷zRÒ`¼¤ŠÆ’àQ¢)b\ûHê€!î«Hy¾ôµzI§ÌÃRRKI-%µ”ÔRRKI-%KIi ´Öjlmb8™$KIG(©KW€’’8Vœxaéîa 0 9r)2J¤zŒ’N›‡¥¤–’ZJj)©¥¤–’ZJ:–’z%ŒÅJxI1/Š%MXJZDIÝ))_FJJ]€p!!Ì•D\a˜#Wp`•*¢Š>ºÛ~Ú<,%}»”4;¯ÎrRËIçÂIÝNºöœ3³.Ê•+|ayîéYÀ¸L0.›¿eïü„ÒôËáßÐþæÖF]F•n.±Ü |ÃÕ‘ÞÉ Ö¬k,^ ÐÙ¨tÑàÌ/èX{%Šýp_Ù ¹–Y7z"µ&¿ˆZ“çnëí K·‹e ³nðº·WŒNÞ,µŒ¯„ÏYPžŒ€o ~Á÷Và!!^nžçéîO®hšîüúòìk- )©©Ý/÷ßèÁ­ú–T£ú—¡ûåþ”~9|¨ŸÖÿº;»Ü3²¼=Kë{T;ÛÝižDäì˜\žížzû—Ÿñ~ýʼª~ÜúpÕkoîÑ5Èà‡Úý½mA›á݃ËsoÿÇæýþêµW7ÝýË;LÙíÞvžîò dš¦[ˆ¾?<9Ó÷û¦Ž Ô÷;÷}?,SHs°@2Ý?ù §Ð¦M¶@ãôžïÿ“EêoìœúuÞ^ þ¿Ü¡ãûê¼8ý08§Fûÿr3ëÿó÷ïלÿs ¸ræ Ÿ?V¶vŽN*Û{Gï×u;ZïC#Ðy0èÚ¨ÍzȪP$QØi¨šN´ÝlÖ0;/œ C“žCsSûYŽ^ÉŒ¼.¯«æbö[`ËzíÓl8†Š8ï\¦- ·Lh0‘WLôâ&ÉÅwg˦†HÀ7§ïñqÚÍ‘rÀL}çÈÄygxÅ;ç¶Ú² “¬I•y ë᎜Wq-¦0ðPHA‰1Íà“ Å1•tC¦¨ÈîE53µÒE}Õ:J¸>òs[Eɲ+péä¿ôº%óäçOúù“A×ïÕáÕ’ü1@æ%ÌViò¸òç]Oïk;Þ±ïóïûAÈ…@.Ä"‘ŒÌùøš+,µrCŸ½ÒxÇŒØcÂ{kãëØ¥Xäb&AƘ£€F W©Èñ¢È,½+dN ó%eŒçMÇ: ”¤m¤n2††T›e4?Ó\ßÅqDQÌFY@,O\6ž8vÖÒîŽ6G,V0"¼…ùÉ8"(ˆ|‚1Çš 0ª£ ÿµ,Pµ·î¹¶•%sö‡“é8†>ŠîÓ…þjœ÷W/访R=º2üILÛ²ÁEñ”<<½ì'Ü[O—isFÁò0ßððÿñF¶:œÇ8 ­ƒi ‡žã%‡|õµª“õѬp@“I ¶ð0xð…káaÙàa¼™Z Wû˜ZǘA„„ âØ÷"%‰ 5ˆÑÌ‹ÐÁ(g@s8]Õ±6Ghð´m˜#<½ôa<0R™¬Ó—AìÔ­¯ÍöÒŒÓ 8°d®u«]Ícâz±bŒ¿ôáphÆÚÉ…vLIN3vÚð¹ëÒ5éÛ‹jtá4´VÎȈ还L}Œ5‚;×Ï)è¶Z«9Y6i’Ah0ÉÊE%ÿL%ÿŸNµ•©‹k²¶ÐØ~x°{h±ÝbûËbûZ·JGU£g¨¿jzdíå ¬Ÿðz`¤Dˆ· ØçÚ€¥€‘Y)€ r²àWQ€t³èÎöζ%–X0øz0 ˜çr -»Ø ¿\bÊ|EÈ'»Ç’K>,ù°äÃ’Õ$”ó7ÖõïLE˜yùþ¹. Ê-+˜+ð³¬`™ãÀfXSÅýÝßU[m(#ëf+éêæ.¶ºœEX»Á…˜ò9’Ñ(â8 =®D(ûä`V&ò²P~^k†@'º­ì6­GWŽv¶÷÷wrÂ27Ìóú´ò›'r?£üaü~¸„þ} ~¹>yø5•´Ò-On2I ´æZœy´–´¦šM…HeqÉâÒ$\zh6Oëm\¬èwÆÝ¥†9 ’ýNÈèä”W|>F*f!o^Þ[7°·œ÷Ä™5ÁPËU~D ‰‹aiÎÍ£‚ P…1"BcŸQxÌÏîñ®Æ,`Y$žç×uûF²qn\¡7²’yœŸ™—ùNA¤É¼eÊå±>­æŽY3=WiºÁ¥§UL€F„ÂEÌ' …1|R:r±Ïcî+ý X¯ž·vÙtCì%:vZ±¼@ÇÎXô`ÇŽ³…½Àÿµ$áÓæÉÖ¯h »c¬aïMÁ ƒßÀRz§RO6¯Ó{¥40ãú7²Öš?¿¿¢ Í­ßךЫhB`Ÿ5Ÿ_×|~ø:#“?…+ä<¦Á˜8(!kIÏ ù|kI[ä[EäØf‘oòõbˆÒiÿ§èö+•0Å«´ŠJ Czb°@X„®B „-¾] ä%J‚UBO$“Ä`°¹B „-¾] %¯’k žLƒÂ" -Z ´@øfÐÃ%Ox«´Fè³dŒ¸Â1@èa „-Z |»@HK<Ûo±*¡ï%cÄ`O, „Ô¡B „ß.²’¿Z@¹Fûb°@X„Ì¡B „ß.ò’ðýU –!$™$ „E@hƒe,Z ´@ø†P”o¥‚eü¢¨ÑT 6jt,Ú` „-¾U $˜”ðjÆZ`ŠÁá ñØ` „-¾a tK„“ß>1( „E@8ë†zaoø¶@¸Š@8t»—…Â…‚BcïL…s½Þ’”=îRŒ»ß2-˜º|¥¼²lœìò¤Å`‹Áƒ-¯*»K~¾Û3®4™$ ‹s€E{ù³½>d!®B){Ȳ^ 2©í"/t…HŠŠ ¿àiéÝÚQMËFç:ùÕ×?‹1ær.Ë æa.c{“¦½þÙ^ÿlmé'_þ<ÉÖbc¯ b ÀâãÎÉÎk^|%’I-·à53x-4F-8þ°…s×ëÎðélÉú´t6ð’1m¶V#,¹F˜~*L­ |,™.¨˜Ö €dÝÚ(7ÐÈ“~lU*º®âÈS@`}’Ú¸~2©ñV)X¥°ÜJaÆ91¥v`%7øµ„qRO#Z&ëÙ0MÖãP‘” Â1üaZ1ë{E*¨Çh ýJóBÇW¯Í¿\)|CýÉu`ä0¢hÙã‹£ÆÎOØ5 §[Ý»~G¢´{GÒwÓMÔ0¥‰Â)¥•õª*“|C¡f¾tCÀMê ÄH0/eÜ×T­¼,—¼öÏÈcD©ˆc⇄¹ÂÃ*®‡q€" ™Ž‚ø}Ì÷"á*_xœÑsù:R 3&¤ ^]½ÔœRy%Êù¯sÅ¿ ~á®)ÓàÀ* "4ãaR„ ºtªI(Ï#±ŠOC ”’šÅˆ —ê˜R 1ácªiÚ<žàò_4õ…H}ý½–e°cy-s§O““ñÿv½èùLGk.”•…gžçqßÇÝ•ãŽñ¢¯mnì}Ù1ÏÒÛ•®_ÑP„¾ŸIè‘8–<Â4挵™:u7yßW1eJ3Mˆ`òÿÙ»vØF’ôìsp¸Ð™#Æo§5UÝÕÕU:,n´Î ±£ÇJÔìî‹FUu5Å›&›î&%ÍÙ“ìÙ€ÇN94pp²°obç9pæØ¡¶þ«º›lR|IâjG»\`GìG½þçWýUM}JFc®‰‡Íë== ¹Â û]™Ö²¥¹Ë}Ä‚ú>Š¹Ð¾ëIîyP‹¢ÂgÔEqLÝ€F ˜Ô€W™ðµËðÝžèè%)Š"îîPÁ¸C"8,¾#‘ ˜Ôœ"Í,#ÌÕMßfÂúkJ‡íLþd­>Ø|8i! j`Y‚Mœ_ôÌ/—™ô¶nþ¦¼­级3aú‹ /Å ü™fÝN·/’ñBKï?S3}Âæ­rÛÒùe˜õ;{"IÒKm©ÖÎFzçÝ»IÞÝܤ;×ýÅÎd½aþb±¯ˆ(ϓ뢽H«G âzN_/ÓìMÁ¢Ò¸Â)k7­c´‹LÛá_ÓèÑ©Óü¬í´ŽO÷ªä‡¸{¥£égÎÁ~c¯'TXÕ‹=L÷<½§ôžÄ0ˆ’5œ^ž·Ž/ˆyk§~‡Vw®K‘]º½ÝؾËP›ᛵýEAÚgç{FLKÄÝŽiõ`ÿðlÿ•M:ÉÒŽ‘…RNKFìÿbO\ˆn"d7é߆¿SnÊ™^ÚôO[SeÝ =P¸ÿF—ËLO¨ðôäµsvúb/£>xùÅI£dÙÿv¦Ë uÖÝ™Í!Í¿1ëd) ¾‚Í•zE:£d8&Ôi$OäoÂñÊ¥MM²îL¿tÑ›¼bÂ÷zæ…(f6~Ǩ~š; ÆºéȹH“QOç{å_èôР›hœ•ª7ö*I®m†l®²î`X¨P9¼¡è«Èïæ. ÒǽÇð?1¨í~õ‚×ñ€·€zPßðP:ŒñƒÃÓÚxÊ# må9B¸‘ƒIÀ&k¼ O¯[Ç*<ý³Gê\d€¨?w{ÄxÀ[@= ¨Ù÷ *…½ÔñyŒÀg,ìS&ì4Ðq¬´DÞÊ€èšul¢ß,¼¾y@t-˱~@”=¦ßf0âF‰²’‡= PòóÉO»þÃJOѮϘLÊÝmªø¦Ì¦ƒí~臶zµþ̵Q¶ý«a *¡LX?#ªò1xW ³ÕMïê+Ñ$Ú(•˜"“i™Ü·íV÷Ñî¸?Õî@ÈÁs¤ FŒh˜œK†™Ç®à“$rmX ÐÔ°”€P_©dd}G¥Ë6–™VT7g6P>³¥”wk1òN=z0.:p)oÄ엠!7ô”¯M+Êû×ÏßY(ïh+w.)cŽGÍy7Š!G(/v¤¦:òd@îIÞ§ß!y_3D²!0XËU·›˜qêæ †´]ß |pÓgŽòcmL † o ¤ÃYÄâc„˜Ô‘¤+§ÏëÖ±]ŽZ¦ KœÊpß{ä’Ç`¡¿K3VJQ¾lœÛëCåzÛëvƺ±ng¬Ûëvƺ±ng¬cäDÐcL½ïBDó¢çö”¼EÑã7CˆÌÝý¾ˆ[€ømÄ —ŠöK˜Q}פ8íþ/Óž¶pf1œYèj]JFp8Íòc ¹Í¬âù²ñl#Ã3î”Üðkר{€±aÂ9–¾ÙWÀbß!‹(×qý8 ¾ |WÆ«bÃëÖ± /ÔÏ…aó°pÚ²ÛÖ$Û<\Ç|;q¤†i¶S¦ëOžè$A“çÅ7¬ ÃçGž9ˆQ³+ØW€@øG!)¹+‘çÛÙS•ñkìSÖÉô¶„šóŸñ+ŽÿöÜZŽïBȧ™‚ÛQzÙ¯fKÖSÎ 7Yµ£D_'ÀøI}莘}ê¸ ?]u$§ Ÿ°ÙãðP†¾œ÷x>ï×Üã9:ð¥C„ë:Qî )Â÷¹}“ð7Jk‹êÃ_ ›JßPÅrbß,_18ÒX,Pß÷cŸpIêd¨’Þçã­ÒÀ[JƒE(íîDÁ+ˆÂÜ(ÀÔ:®ð(Кʼnµ¼Š˜Ë½€-'Êíå‚ÜV.á3Bïù;8ÇgwÆgOÖK³¼?7=Þš~GAÜŸÌ‘²w÷‡êÜ=8Pc*=—iGrYŒÀÄrÉ&8 I½ Ô­[ÇÔÝM©—!?›ÿ>¹¾[[y‚v=B9a7¶ò`ä{ø/ü«~ýôoºé?þß¿ÿÇo~çéŸUž²´rá uº}ˉ|7WÐϬ›î.ýºéîjk¿¼‚üÈì4(ó·?ýõ|õÁï>ýËnúõOþóë~úô-ˆüÙ ‘ˆ<ô“[t6ð&::”"™íëiñ¨!Àhu‡o?*Þ¨ºüG?LþëO¿ú`ðô_߃¾ü¾ 9>‰ìöVíš cöÂñØèöÁj?ê’aב Sº=Š5H[¦URòúïþí_}ðçOÿê=ЄåÝ|ý†å_B¯öÿéö~ô4½UOlÅ]Owb|wêm)ò®ªÊ¼ýßOþ¶ŒþòÞ@~óßOúôÞ»°ˆ¿¿7x;§Ð[8ÇèÜ×¢‘ÿ­&€wPÚèësOèE:Ê”6û‡/º&òd‰äh½;´9Á‚·ÿžä,Ü;&Ó#¼ëò÷'˜”€ƒsÀuu㮎æ×B÷|¼‡Ç£sÂâÕñº¦R³X8ÌÒÄ<è§ŽZùY¥ë”©¢Nó‹¬ ,a/À~ ‘£´‡Bvx àÒoÌ‚Ýr'+ G:p9G.Ñïú’Ò‹¸œ~K°BzqÄ81ßšlEIä)d\ëøÞƒB÷§s£GÅ#‹R^~6ŽÏÂÏ/|fl[ãèàø¬Ý _½:;h†ûíö~ãeøi«ý2l￘óFó³vóðYýÁéQããf;:1E?:; Ÿ?k,ztºßÞ_4È[õ'‡@¾×­çy>ƒÞì %kZ‡íæÉóýFs.“¦kjârQvܽfãìXž5Ÿ·Š+èëÑQ{Io®1«>ƳӮ³†à¹m¶Bº Åbÿ¬½H(>i}ê.îãq®Ök(öjŽ$œ½j·J².âÓIkáPÜ-¢ÊušÍHÔr¢ž6N[K 7Z''gS’|÷ë×ûFóUódê<]Lµ“ö+†=¾ø…æû±QëÄiN  j7Ÿ…æI{I«§ÇûÇ'áëWû‡sÇ]D’ÖôçéÃ2r¿˜RÄgÍ×-ÐP­ÃUêÓ¼ÖÍÓ¦·c¾ŸqÍT‡Ý×v³·™Š»xTdÅaè÷ñ£ã£Ó V|£ßæCðnë,SxOÀ£'C ôó\ž/“÷íC¿Yç7s÷·è»ÅQwWN>’ætgxZÖÐÕþ\ýõ G?Ö®£gÿïHó}aø÷v Jú”1sUì)̵ÒLjßóãJÍ™ÏU°â»m}w0Ã.ò‰Ió+€rzº'‹ÉtÕe0ƒnf¿úS ŠQÔ5F•1«:Ÿ¼x«_Ÿ²nû@„YWœ;—v°S¥§2¾X¡eÆ—ýŒW7ÏGK²Ã¦Þ-{|B ¢SZ(‚|Ĩ«cI01”ŠoCÈ¢ú<÷¨: æPzjÍU#©\*˜Y`¤¥‹}ß­ÑTbéézë™53;µ·Ö3Î%r}p&ˆ 1õ EõÒ%Oí—£@üE’vŠŽè~4H»ýá̧¦:vƒH-!Ћ0÷¤ï­ˆð(SØ×1VÌ X WöM“ u-74 ¥ýòh±â⨲¤þ½°¢U§äœSÕ±;QÇüBíq—»“j§ë,ΞY0ÁÔ-FÒ“À<†¹^ Xû„\Da î2„•ödá@¾wÛ8ðÀFÇŠhè>*Ƙ¹DE”sZТZn(>MXc|IK—¼®’7‹ÖH¤}ŸHi€4EœÀŒÄT0¬â˜ÑÍpÚ¦6,à/ ` j’Öbòtï9EéÆQ-‰¤‚iV —™ó²ŠÓ$ïÊâ¤e¬Á]G2¢à~Öy˜y±”à0•ˈ"EÀ¿ân-£wjøK¹«GÃ,í×ìºEÌGòˆÇ¥@’PL=M‹ ï 0¸hv¡SN×cïµî{‘Æ"VB’(þ¡ìñµ§Çl#.;¿ í )މ$žò‘BæIØ+¢^¿Õ÷'ëü-Ç¿ŒÅùe7îÔì4ÄÊUÑÊãǼ´GBn‚B¶ÉõNvƒ™øËp?»RfÆÉqI Jâ2DL JD¾/8UÅäb¤‹LˆßÝÇ8.¼Í¨F‹P7b±©Ðh*G˜â)cS³ësÊ"TZ&/ãâ„–8ò¢‚# a>#$]ð<Pæ¦Ü™–“ØåbÓÏÖ…9C A+0i ÿ%|¾ÀV‚x®ÏâMˆý ‚¯kp[bÀët0 Ü.’Ø£O ¸‹EqÊjÅí©_§Â2vK‘I˜°Õl¨ôÀ\Âä+ÿBdL ç0YÃ>)ß©ªVï@©:ï"Æ"DÁaºÄ“1×R¹>Ï¢i Ä܌Ȏ‡±È‘yx//]£_’4Q„éHjªÌ—šYxšý?{WÖܶެßçWðúÅ3U¡M,$WåÖUdÙQŽ%9’¼V¥X Ú²µ;öÌü÷Û )‰Z-'>9I†©X$ »ô×ÚãYQƒ1jwD€Ü +ì)6ÉZÆGÏHFÖ°n„°ÖtLŒ@g<^Y%%i²¿WÖI«[Ï[ {™ í07À2˜À:E¸ï#ê†h¤•‹ÅÛ;¥cýâäm¢ –ö&‡ÖF']œ6:HÀ—oqÏYqòI+­Âú×nâëa°yÚ&>’6u$±@[K׉\…ˆçÄÃ|S~³™ ªÉó"h’,Û|:Mãû‡^Pƒæ¡:­nrCg0îÃW&×2<ïŒÆðQŠç<8IÂøØ«3¡]óÐdÞÞŠA¼Éy”˜Ø»³k¬·íÊ?{à߃qû”|dÜJ¦¢Þ`L³1§1^³Žªîľ7í˜z=`ÔàÀ$L6cg¾O±G÷ åX0ñ¤ïCÌûi‘þíÈÔ¤TO¹;ëФÈPߘ%?öa%]ÆŒPŠŸCbwfZ_JyÜšecÂÁ¥×Ó7­þ Ò¤êÁPöâ>§wÞºw™ÄÏÞ´± g‚™Ù•O3šdГÆÒð%»·ö¯M=³£ƒ›J ôCËì+ݱqz˜õkfE½• Øå¹êâwÈq¨CÏ;Ô¿á4’…÷0ZugFÍïyVL~ìñÛÎE7¹kŸ1îîð_†ñ˜Ô“¼õ`+îRnÕlSE¨Í"áÚ¡#}0ɹçžFmñФ…‘r‡6õ²)^vˆ|ø+"¾ò9‚w‰1™Ñ©ÂžÜÙ»ÍêlîìýÏÛv 8Bx³³r€é±•\‰m0C›æÛ®Aj<ô\©¢_î¨XŽr¶=ÍAÔ:ôl«°íúB¡ÆßKG¶­ã78ê„ÿ„C˜N_fw¶}q|e«;™šƒ$èw¨Ûñ›ÛA2Ïÿì9@à´ñdÙ‰+è;𺶠x­5ìÃâщ˜†?j™-‚J¡zV8IBiS4tX§¿`xLv[âŠbxw*†q|<»¬>_±ª÷xÔ/­Ê]ë)‚ɯvF ¶Zhf2ÜDq~RvA[¹øµ×“')õ9 Qß&‚Âà›ÖŽÚ ‰(t5¾ç¼¤>¶­#?)û¸äMuÌw ÔÙq£gå“äÌÉÄèÞvÛÄÛÇ,&Š2'‰Êñ×SØœáÁ¶ÐyYϾª‹;3Üߪ€¥§>î6GÖ@t¦Iµ2Ù´tÿVwô@´Ó3EÃGÑOÿì Z7­®1Ø';íhäÂÐ_Aª9ô1Œ[º} Ý›Ñn÷ãO;ÆÞ1ÇØvRxeЃ‹®3ç¬.‚¯“c.±IGÄB°ö‡åÓ:Üô‰7y’CŸ¡Oл1ŒM…¥K—M»p}°ä>™0UƵj`·¥ÏîõÓd˜¤×AEú¹}Ö8>h‹q×ÜJ6‹±™?ÒU³›“f%LWÍÆÁH ïgYoÒ+ÎRÿz¦ØCgV(·Új¹HÆç,ý\<̇¶ñlu•VöC¯=îÆJÿ‡îŒŒzV;‰/gg)#\Æ#4ë¸ñþ$—¤¬„„äcÎï ]ê7QœCÂEHøÚÁôW¼ÖÉÅ.þcssŒR¬ìP*f»8T~ès¸á‹×:mYG sHø¶)Gi¡]ä²Úô#âB}ßÁa¨#BµïG<â®x!á…RæPò烒$‡’? ”œD7þÕprùõ/#×IÕ£Í3~±¦ŸL³î°eÚH×Õý ¶Þ¿ÿßÉc£«v,ÁDz†Úܨk™ÊVôÂ}‡}ï÷³„­ôoN)ÎÁì"˜¥¯³¿ “› k'rmh @FPˆ¸kcx…$¤øÅ›·­#³9˜ÍÁlfs0›ƒÙùÛoX¯÷¢öÅc÷Wõ¡cäûÀo‚r3°wÊú’ ¯÷ޱßtkßå«Î¯Çç™ÇWB_ï¿úú€Tˆ&¾Í|d²ÈxÊœ…¶ö=Ï÷•/"õ¢wÛ:rè›CßúæÐ7‡¾9ôÍ¡o„ñwñG؉ö]ucfL1Ëaç*Øéÿ7x\¥ã0Ô¶/co©/mRlK廈 @ zÑãºe9ìÌag;sØ™ÃÎvæ°s ÂȃÞ:û=a§Ã—7ú³ç°svkœWÂNò_v†GÈQ6ã˜ØT#i‡’1[†’ in´QäEعe9ìü­`gr©GŽ;sÜù6¸“-ãÎWÞe“He–Ÿ‹¦Æ7¤ÅYo÷œ=/;ʧ_Òk›â |æßÙ•Bñ #d0©$È; ú@ºˆp7FŽ"pÉ×äUÃ1“ÆþGçͺôR’i-`F`^—ëhëøÜiDB¦¨•¹ð\¾)F:a®ÉùMc8õ†›(ÎQû"jGÿ¨]+ák s\à…Áã›kÚ‘r]¤\šéK¨}Û:rÔž£öµç¨=Gí9jÏQûïÚñ;ÏÿiP¯‹†›(Îó"`~å}]yþ¯çæ6)b‹l—ùØÜñéÚ€M˜Í) B‰Rî‹÷um[G˜sÀœæ0ç€9Ì9`†ú ÍfýÀ,f™X¶³'Gí~[tõžþ*:ý¶6 lgÅ—-#—®ÔÓ‰;y`'=O2…,µÃ}ðÐöizš™âÕ̓  ¢ÉmýqÊÛi‘ÇÛ¾­*Ÿp<0™(¾Î xŽ‹ºÉ ¶?_ÐM‹ÕÝëAW·Óέ$AtÌPÜT¢×J?´2lÞ‡ßûJ¬*k¶TW}×Í#‚…d¸Ìô÷ÙéΚMþ obm‚TŒA¿=-³gä¼î)¤¿XÉšk‰e ÑUÖîgJÅZõ¨|ü~ÿ¶×ÑûÏãq{Ö}X‰o[]P“æÇý8ÔÉÌ·zÒ²»Öt¡²Ã[ –“£T‡6ü?€…Ìä“%k;¼¶%(7yÛ³vÊOÎ.Î?@{Õ¶¸øú^œ;×—Ÿ¢+òÁ³uáÂïòWø¼óÑõe½-ÛüN~<÷ËÝOm‰9’j»|ç´®%©~º½ê|Ušçw•–ãTpµuÒ¼®ÊQµykgîÕݺÂõN¹õØ É§þ5⎸@mIê·áe¡uÚ(­>_ÑZ³òXy¾yªÞ]¹å®sS¹ûüX9,¤ÿJãJ±0+w˜”+v–éÐOŸž®/–ËOw×2/w>“*Ô{uñéþ¤YBWÏåQõ¾n9.´GNšgnõ®Ý®]”qõ¢zÝ*Ëþ$.T¤ŽÛÀƒªsu Í•¦ÄµÃûçÊa…Vî®p­ñ‰—?ÓY? _Oî 7³r¥¯q¹Ïý»ë‹ö0Ĩ­ŽÏŸ.qõQ]‚}Ü9ÉùÓ>>|º¯>KZéµ®‹Î×êEåé¤ùùù —G@3­>9¨Ö¼r¯›íVõîüîúøªuRüô ;íî%©÷Ïêøh$‹@ó]‰Tïn€¾È躻oE©Üf|ÿce#>å/7bœŸP[ê8³þž˜i`ëüÃŽc£3·ÿg»ú×1s™‡†Yÿ7ÇÇLkí'+5þW4KÞáEóKØ0\{³A5u=ŸN%äAG‹á¬«7ír` `º`)âluáùß,«qV,–ƒé06cÄ„ t§7ÒV<6÷þ¶²ÿÄÿ+ïk~EfÎ}èEo<Se’Sm¸ï ßÁÌávˆ2ª)üų£ .Hh2'îCë­ÑÐ2¸‰ù&ÁJ¸),‹†¢•m6O+ ðÚaQ8k®Ÿ‹µ ¼¾§Eø½¶^ñ“#¹rvÒ,§l]'§zy-)8pÖqe™g #j3SÅFyÃÇÅr½~67’«ð<û»Hæ¤T/@õ\«7O"|}j ÿa¦õæ”s4¡SÍÒalGlhµqZ8­ç'…ꊃױ¤ãíøÖp8^·IºX6íñw0r›Ø‘×22©~’Ô<³Ñ6”N7j“ÖµJ‰%XÈÑ!F®‹aÖh/D!ÑÙÖñ2“l¨§_ƒè硃]B¹ƒ… êûÒó#Ï¥ž“ý:•i¼ Ã_´{7IGtWõ{&‹ùüòMÛlëîLùĈBœ„.^QA<&‘«#$öY¿â’0¿X'ÉÎp’¼}'Öm7™-ÛøG­W>´³QI«v*9{RÇ¢‡s<«v¾Î˜=ëˆ L·ÈQŽˆú`ïD`û!AL4YäRºDD²| /®'k ù2í6È'’³H‚¹9\È!†©Tç^‹IHIb”|ʃ˜/kd=‰jHZ£J». µÒ̇Ѥ8 } ÃT0$£ˆyo#é8Þc|™ïÓ8Ôd+!Ï÷žÃ¢â(t<ÒÐL;æî{™£×wÞBį–ÙBº.R¡ò¨öÒÔLD¢0…)1£’/+Ý4d"+ߘüÒÕãÑÚŸ  G1×!¡$Š0JÂHr"hÏUo$à¤Ùµs Ævâ]ê>Q‰HŠÐ© æxÖ%êj¢GìM$œvþ-f¯ÏLjýC/¨AóPV7 + Æ}øÊDPÃóÎh¼kœÏyp’ƒ±WgB»æ¡ 0ÝÞŠA¼Éy”˜Ø»©Gà]ùgoô{0nŸ’Œ[ÉTÔŒ‚iŒ5жã†ÒŽªîľ7í˜z=`ÔàÀÄÆš±3ß§Ø£{r,˜xÒŒ‡÷!æý´Hÿö djŽF¤ÜuhRd¨oÌ’? ƒ†˜êAãsHìÎLëKìÁ­Y6&\z=}Óê?Ð = e/îsÚxç­{— çð¦¡ðÌÌ®|šñЄøNK£91J'ËKjµlÉöXò™ü÷©nµdÙ° à­‡[—¾TW×÷U»«‹L|ú»r»?¦‹T¡~¼Ÿ¼ÁHH¶`®»H²^tA]^^Pÿ‰H A©(rቂYo¶0Ôr)m³ð2U—Á4d# Ê:O¢QÖ ÈJ"¡øKŽç"dÈŽ¨ê®Dƒ=Ñ‘ øä)†kXÜK–“Í{<æ kkXgòóãå~vPe¶ á©‚ e ±5=ÑvdŠn:¢ãx†¨;*OÕµVß\+L8&Å1ÑU6¤ŠÀŸaä-àžÀ>N@õ¡(ÖuËØ‚(Vù¢X× P]Gûž?Vn­V²5V«l'k·Ì¢ãy=.Yû*k×þ¬]Õe,ÛéÁ|ðMQDDzUQq5›ÐìÖ¦¦ xã »`‡Tzb0ˆÛ.™ø91ïÁ÷½‰k=ÏcÕ#缸‡D¥Û^à÷·/;Oé6™ËNÄÔŽ¡îQ›c{Œe*tÜ@–Q\!ò]Hl:Ø:vßÞýõíãÑÁYýSõøÃ^w’½Ûñ8Ø«€ÝÙKÜõû“ôËÍØ!ÉÌXûBf¨„QÔÀ”ÐL¡d‰ðw†Œfu‘·E à†»a§:ÿøíêò#ÔWì«ÙĹºD­ë¯©|”àÚĽÒà{õ¯¦|9tŽ­¸u}àÀêáÏ—Fµ`Ù’pXª=ä×z7ÓzxÞ;;nÆÍ«ê¼vP½×õO¯NüVÇõ°ŠZÇ'aýø«V;®¡ª?õådØ’,d_IVλÎõ¾ÿå¢:«ß6Õ³FmZ»½‘ÏUµÚGZïë´v¸Ïÿkû‹ç“ç»ý ó“yëúr}Òk]T­j¯ªÕ[7ÍÛnxzõ Ú}×›jÓ—üfØTN-¿~|m>¿9k|ìÕªQ5´æö•ë¹ÇÈ ŽšWÒ”õ¹å³Ã›ÛÚaM«÷næg'Võð«ºhçþì´·ßY }>R꽎V»Ý¿=k4µZ¯ã{ûJ­·¿é…:­fÏÍêÉs¯bì¡Í÷}£óŠÆþhžûU™Îk¯H¦µÆWt¿žVÑ+ÒÓ\»ü{ø5¿öÀœ‚g_Ñø÷ŽäûÇ¿vûŠÆ^ÏÏ©Õñ¿m&ãßùðaGø?‚«® ¢ Ÿ/.NÛGçöaõüÉñÞÁƒ× BÕ±-:ã¾ ñ`à[v…C£l¡rSE®ærCÚ³‡>Íè8‚LvÞ ƒ¾@©ˆðN1Á%“+¦R‘dëA^ñàrlu¿ Ôû¤D¾ ‹•!¬Ôó^–ß v$¼£¼â0õc <)w²bXØM[nÇÐòèß *lßMmmHª%®ð÷A¹<7Y8Ø:ÝÅç¶U±þ,¨ÄØEÊ•ÐÅO(/œ $nø: ј9Þ8ø¯õÊ¿O˜weH…õßKrÌÕÌîüV«­žÁû7L”«²PªléùKª”à·CbGcðB„Á8ßå½ðÅ¡S/ȵa8ý>\ÿ‡ \|;88º¸xŸ©1Õi&èØˆ„ƒ˜L7+ÿ(h¿¹+£ßyÎÖz‰a©çÑ. þµøÈ’£}HWŸéaÉrôPGû/… Ýôa¿ïlA쇂TQ_ô×€ sh˜H{tíþß÷Ãq˜ÿ@ª ‚çìÙÝçNùT »ŸX·-ÓS\]’鲪çÒ à®­"O&ªd˜òÍsU¤x:‘eËr Ó54]"šNˆi)¶â¾ø‚üOŸÂuxVÿ,æ‹>ðΆ++ì•…cÎ3#fw\?bÚ`c£¼Wž½Çê³7B0j£9\4tÃZ¾Øv²rü~M’sÕÐÔÅ li¤³ô¸”ÞK—œÍü…ü“h¥ÚZB-¿Â¯«‹ë¬Þô:ªdíIó»¶dP<Ñ‘Á†©D…O¦dŠž'Û–­84%+O~zßX r,žf,ldXŽnš¢¢Ól"ÑÆŠ':Dw‘M\Å1èÒoѪ‘¢ìšªµ]Ȫ׺èh‰¬Ȫ(%²–ÈZ"k‰¬åX< ²ªøÜúV!«Qè³²Ž%²Þƒ¬êÆI~,©„ÖZKhýMÐÊ6’ЙÚN—HÉ c—ä~Ÿçüʾ¤„‚­üN6É62~5·›Œ_Éï;Ë^]ÞªÇ/GƒLŠ ¶òïlOà×S±®¿í©d,¯‚±<›Š›¦¥kŠ©ëÛ¦â®e;®(iXU;¢¥˜†¨YºE@àv½û‰ njo$ža‰‹½iÑž böÐ3dÑC]+Vi߆IpÕx{¹‘b£;¥5ðT—°hi.;àéB†©iä±À…uË(Ö˜©…$3÷XB47CŠGöªÞÜ+à[ˆá¹ÂÓ-à_jßVn-6“K!ú/ÝIéÙ¶r $¢›I–éþòÔ®û8Z`ºéz=Í5EÕ$†n†'ꆮiš§©–“ôwe/ðý,æŽò £ ÊAÇ>ö2 öx{e4bAGøE]E¹÷òz#B€„¼¤XéENQèUÚÐÛ(^›îÑvÊCFã>=ߢ= SˆeïñÍÞiÐ9*ƒ’!ÊJÀ0¹Ú#Ü¥’š™z[g²cn½tô¥y žB"NØ é»,Pbg¿–œ:‚AgÎ Â$2€§H§ÂÃIïÄ]³Ë¾±Ø ú”ÜýwNYØàGQØ®ôÀ ÆQ—~tBŸEœö³-Ù“0Cçúì!Á"ŽGý2‹ì„§ m´èùALX¹öd–”1‹Ø÷0œ±Ë½¼ ‰}]fªÃÔ~êô~â¦ïµÁ‘NÊfUÀS»53±DXŒ`I†ÁŠ& Fü â.‹D“iÒMš3ì\gyùaÕ‡ £ßéóô«âöÓáˆxx{lN« Ò!¡Î(-*LØÝ(’ë"4¢[£õE¸k÷;D ±˜„¨D‘“PrÖàqè'3>´Ùß!ÂqàþÛêìŒXÉa<e²N›< y·T› £m»½q§¢qA¿ŸÈTÂýäíY‡Ä΄ €Keœ8ìƒu"º+-¼Â¤Ø]¯„‰.¬-8AÞ§!èRÂgÃD¤gwñÈ HÇÆs®¬bÌÇã–Œ¸xur‡Dê°á¹Ða¢`–éKÑ(k_¢ENÈ«gCÜ“W‡>«z&ä'ÍåñŒ¹¯0<Ðå6<¬ÿ!ç°ï³º¶˜|ÂÁ”7&"‰9¹#»Ÿôk&±NÛ„µnèÑÙÊ$2I>t#®Ð›d&ஈía%â'ïöG D锹`MùKLÞd4Œ“É„m>§2%¶²…‘úþƒ9‘›ùò?jñ»àK*†/S(ÛÀ&®hÙ1í02eK1Ì"ø’¶¾¤àKyÅðµléRLÈ,O:¿ïÞ…ÉJná\††Ô§¸•š nS³ÙOn‰öl1ï¹eã†ç¸ÈLWj4—’›¥ ³0)ªf¨œ¢ï†.Hb¤9vró•Uvÿr¨Á­wjù2;› Ifý—x7­d­Àí­È£kZX^nJsð´JnR„ÈÛÒÓéçAˆC[zRÖ°Œ\9ÀËXÎlrFµ;xœ!ë²á^¶òý%öÃmþ’8£âø²„´œå¬r²<¿ZBš;(ȉZŽ«Óá\%LJ2šµÊ¿RîÂ9Û>—Ø[J83öðuÿ‘õv"·À‚x#ˆ¿¶=¶G0÷¢1œý,n°/}!µß»/Úa¬îM~ò}é´Ý|¾}é¬|ëÅ÷¥khW²¤7³¨MZÇ—,ÎçZ©MÙ·>×=÷ØBÍ«i¾KNÿ<À ù<`±+—Ömëª>qÂóÛkå|âŠÈüdèôi\Æc„Ž´š¯Ò˜£q­QŸöަµÃvvؙӛVÿÓãÃs!”sýQr¿Åµ­çϦÎñ§qëB g9ž§ô™ C$A[i¬Ìɰ×׉թÒØ¶›Y«U[‰yKî„É`fTÃ`ÌÊNcŠ7´?òÙ:«õªÐ¿ýéYïF=;¬Ò˜œ_ésPNŒ?_¢ÖšBóùcòþ\ª4þÉ9þ6¦Ï°~\Y7Lnap×׉íA4¾ð¬q”Äö¬Æöؽ¿œʽd±Q–/{ެÝ`—Cûó9òí+–=æ1HðíOS…þÍéøÕ÷õ³FG­ùTþ­YëX¥ò‡r¤©{}œ6öÇMå<‚qù|·®»0#?xÑ~ÄTo¨<ì«s¸¾N,ØWã©Õ.h,XMY‰ýÔØ¿¯o_ë‡7+1xÕmÑGy5f³ÞØ}Ä·+1žê¶èãÙá·•˜À£mÑG­>_Ž!­n‹>MÏVâcë·[Ó·ùŠ¡±Ö¬o[£ºà‘¿×€vÈHzf_€V¢«Ïç •ÿ2¾€ñ–cTYûK_f¬n<‚ÕσÕõÛν¾ ½÷X={«gÏ„ÕÊÙá½¾ ½÷xvôž=žaõ~_î}}ûúXäËl‰>ù2[¢E¾Ìvèc‘/³%úXäËl‰>ú2ÛÒ·"_†õm»|Î#»/c¬æ-z_ÆÔgõeLÝ|y_FÚUtó û2Ò®ªIo%v±3°ƒˆŸƒÛ†Œï&Š‚*È,ŠY\t°ŒY,ؼ¢Ùh󺕤P-CßRÈâýÓ¦pyì¥kž‚1uÑ}h®#:š¡ÀÜÒl‰`BdÛÍo_Tß}6 ììpè ö…“åçˆçÁ0á9;Ý÷ø-ŸíÌ÷ºµi$ØÍÁ8Ùn´|ŠîN£KÀøÅv ôÇ¡u <ïåÒè VB…í§êûù£¥A®!6Úùßÿüg‡êüy/À> G‡ŒàÓ.ýÊ•šÝE?xÔoæˆÐÍhÄm¯ßÞEK—ZH¸C„´Àçjpv¸uèwXÌYÝÖ^Ö„Å;¼µtCÎ`>ms¿/ê¾zˆúÖu<~<“ÚÏ×ýSggÇ3p.Rp’º,è½jþ¡÷IhO°ttº š´t­h£ ¦&½™cø•ﱂ)Ðï!¼[%x2 iH-ÙÀ[c«³åA `‚ ÛUDÓ1°¨êª*šØ²E¬i²LÀh`ç9+±ô?²‰9ð<º‰T¸ÃžÊ°ç:·nӟкÿ|íË&ž¢D{SÆ^zŒ‹1—›ÐDÈŒe±Míàˆ`³ äôk†æ4£Ç8¹¼BjÉä\¦-MÕ‘ãàãr渹Bjí…i×à+¡ûש? TA¨rûÀØ08·´Á@΄FâÀN+ ðÁì틱àÇ´$üeót²m¹<4#iUÂ]’d ”C$[…ý[Ô!Æý”†Œ&пÏó=G¬‰ÇÜýŽ}o,ØÎˆt2Ù>T¹³˜Ö¢̵iî’áxJH_ˆ§![€ÁNk¥>< #íÓEO°¹ÿ_y¬1JÒ–\ói”}·X.ŸÆýd™„†rP©gõ !ça,s-¤äÚX>èx8Ê.ÆÐïç%'$U S?reÓ'aÆI×\ßó YTñÒ˜²g™ v#'µ8ëˆÆT,ÉgàÐcx6œü4Hq’‰? :L3„/Is'¤,%SŽìoðÚz'YŸ–Z˜v· Ùõô;”òãÇ=ŒO—^ö+Iørvñ“”Ï»~ÌVØj*šmJŠêÖ–2¾… §!žåŠª‰ QU`€ˆe×ÈÑÒ¤o.ŸøG\«¨!@GMù ø² ¥c½ ˆð€Mÿñ\4ö—ùÓŠêí)6,WsDK³@î–cAßEÄ ±v]Y’¼bþl ³¤ÏÏOŸ¥'¥Ï+Ãÿ0{^C5òìù%¦ðóðÊt²·7u²ïxOåüÌ|}b¿à›°ì,l䃋AÜV SE‹5¡;ë?EëD÷1Ãx+kB6³ mMÙÒ¬è¡.•ëAO°$£ÎÞÚjP~žbYþ„™½ûé‰4Žý bµ·ÙÇïÂu׆öˆ¹þ#GtñàÿÙ»zßH’ën]$@‰2N >Ö°¾?(,n\ÞÝ:îâvO$ƒê/îø†3ÄôÌÞJ‚”JÿGNœ(Ñß`…Nÿ¶CWõô|÷4»—=³3ÃwÁÙ쮪WUïý~ïÕ«ªÁÈ»áYû­Ÿ¹^X¯&t¿¼–ÌYa|4ì •E$l×%Jù繟üââüÕç/^gäA›¦Í"]™³¼xaÙÁÓ`Ðø×5ñÊn¶s¬wÛiIO#‰ Ü A,sœÏÑ=K0GÖÌY¶„¯Yø— Œû^ú*å.J•±àGEDÓõŒ‘¦TK§í¼<¿xöüâ³½óI¶oTbwÙ±#Ñù,œÛ¨¿TÍTlÂMª]ó¢w´  þ’ ûíá suæÎ€íÅï†íÁ¨×öQâÙ§sÇHM :®²ôVÜ‹–ž$ýA8ÂîÝ^š³5Œ‹f¼4möæ2‚#^–á—K N\‹úK@ú½sãjð»Ý£/.>{tèÀþУ‰Qv¼¡B΀vz1ÂG›c 5èAÉç…¬i“5PUtKàLb` E¬Õf °– ¬a«¬!Ûötþìüðà À>oP¸éuÚbÎ (V²îÃ)åP¼Tbà+E|…_¾|ø ðà+e|…Q¶9lŸŒí‹×éÇ•‰„J×tìlŒHb€HìsÖ[]ͪ”%÷íì4ƒN/ò}=½“o{Gd{¢Ü¯´…?Øé“6¥6lïÀùx,œÐ¢ ÒX0!3Žx@B`c–RžPEçsÎêRÇ °°«n?püo2±gÓtLÇc9¾7xµ+¿ôÏ}/NÞ_Ϩó¶ÍölÖžyG4×åç}>åÀ_žŸ½øâ‹ó‹œ7FÞæÔï¤êÀ6IáîQÿ"‘[Mò¸\GdÌ^&ãWꞌ½Ð´Ln`/° 9û{Í^*©S!e‚ ”še5'¶ÉxÎÚ´V~,ð¶ÓZ_>}}öùöÁ:]#ù!3§ZlýÜ9«¡¿‘ñfl3\æ·[æ;Ý:p{¹Mšd È4 hÐ$ I˸€"m—"|ÎË—¼„–‡)ZÇ›4DŠ£@”ÀYŸ@€ ´¼i (P š¦eÖØý?›T’Éc)œÉ´Ln`DEŒH#FŒ0"`D‹éceô!3"B ÏÿœÊ Œ¨ˆi`DÀˆ€#FŒè1"~ŠÉ1Óæ‘Ы1¢y¹­0"×=0"`DÀˆ€#zXŒˆsuÐŒk•–É Œ¨ˆ1`DÀˆ€#FŒèa1"q,?hFdxZ&70¢"F$€#FŒ0¢‡ÅˆÔÁgVk“–É Œ¨ˆ)`DÀˆ€#FŒèa1"s¬8}hç4ÎË Œ¨ˆ`DÀˆ€#FŒèA1"B޵À½× ‹´Ln`DŒˆ`DÀˆ€#FŒèa1"vl”8ìÝ÷E1¢Ln8¡q-#‚Ìj`DÀˆ€#FôÀ‘<Æê°o73E{Í2¹á<¢µŒ¨~fµFŒ0"`Dþϯ¾:;;?‡»Ív‘y|»‹ÝÍ FÃN7ͺ¦ýxùèÌv»Îà†7—ñp4ðz;Å:]IK(ì4êQ; “"Åa'uËurCR÷Z2&Œ2d ȱ‡GÆ(Û³³ÓOæÆ&SÅÇ•S¼IZÖÀàG†3 GûIÞS³ ©R^â &x)„ ' JÄ“Ø"m‹,“BÒ8$q3x^jFh/†¥¼D?àO{c{Wž#½µm?­;Ž´Lïlv>¦ëÔ¬é—#ZzRµ³ÚUÏáXÖ€ÉPXÅ¥Ô#*´ãK2¤(pß"kp@©5‚a²•asÆåA«6Í61´U;fC[³êù¡½\à m6½¹=õÜ»±ínÒ&ã#ŸÌèüã*\> •¬¡Œ M…JÇÀö9TRW³J¨À¸À±±…8 ÄQ Žq”Zq”ÊqŽu|†k±a>ÃoøÉùëó-f$K–– <¦6Ùi¶²ãL„ïÜ¢M±)ï¶)𸚞Tuf 7‰ FŒÀþêªPYý%»¯þmߨ®«"=aA¨L$d„Qˆ›À8~0²Øà0Š(¯oˆ5v —ìØý¶5u¢²APšlÛ øµ‡*’Ó9ÏÌô„,#7¶È”8?Y(…dÀ£ ᑜ{§€‹´LÌn~†fútáûaÉЖ»cÖªäÄÓŸ4÷Ýl Q6¼KïOÞ+5*Ç¥³TË`<>¨ùòÜoÈ$‰S¢ØˆÄ㤣ɒKD0‹¨vj!—’·þe,ÙŸ(”˜¨€p¦ŽÍÆÆ8Ûð84Éã„)B×J Éi ¥UìTs®­5[·?›RÁŠfGsª¶ºÂ²A›#y!÷˜Ê6羋)Rˆ½³FD²DHÃU6@œFYë:f¦…PqÄû¬QÕ2Þc!g×,Þ!‹õíѸ€#7—Æaú*%ùðí$îžk:*4Vh\¹¢ó×YÂâD‰P0#¸Žh #¡MèÆ×ha¬Îëxh²Z/émž°÷<8!¡ÁI•ØDiÅL•–k)¹õ\ÛV&ŠµÒ¡ë!B}©k{ÏužÄQäÚ`´Ú 1Žtb p¨t‰™^ ü/‡Á}Û–ñ'DÖ˜ô¤R²d£¤kßöǃÿ6¼É†„øÈ¼½ö?Qí—O:é×ùãøæM|¬o/öÃø½Éì:WžíN×l®IËg¶¿sÓ¡ÞÄašÕôæ›ö wuj»Ýþ7qÖk¯£øèöv–%Y˜"‰åÏf+ÅËãWl9°Iãq}åÔyÍRÂêÅÃoúƒ¯Ç£’›P÷ Ï ÌÖ¾üyiÎo_Í‹Wèüg¯Ñó—¯N'¹*IçkÚÂßÐOÏN¯mØž’X×ÎSŸ†É) N•ÊÃ:dKÓç/ßrÿÖÑü9y²:o²å›÷Ÿ3µÈx©¨¹I[¯îËq×>;ûôÔOLG’Ε¯õ‹§_=ýI–#4è_ùÑÏgf>O~jßÚN×ngøËö¯œ½ößùVfé¹YIíhÐyO§¤{þu<]‡ÌWS]¯¾ü)úêÕg§];ê9(_›ÔKx gÿ-~7Œ×N[–s|S*¾qWƒ¾£v‹Ë›QœØQw8í/Ô«×næÙôëötu1KvÝz´øÒÛëÙ+>Þþ6^záÆ©â`úŽWö~ŠœâÆ½(ŽÐÛ~wtí˜gþ×è¡§0Ñ4y®~ý–Øn¯¬¹æâ íÕ8Ýî¶péN Í6J”¹óÏ·D” ×é9å"¢¬ëf‘½ãÉXb„F¡„zŽºA1 ¬‘’F1Ö†ßÅ“«–qOþñ£ð8¦üø«×Ÿ"½ó´™ï”£ïèžÓÛ‹þðÓþ¨e,#ìGÞtºvfd3MÇÄðèyžæó¨’åû£nô¨×úœžÄÞ:Zg.•Ø‹pf¤”vs5BD„qÈ0­0ÒÄ&ps(ç8È´LL°˜µ,æ^Ƙ²X†‘F±–Ü9ÿŒ:ÕÀ%ZŠHØ„:/ì.ÃXµŒ‡ά¢‚Ùæ˜¹óáÌŠ6‡çUMe›s_–¶áÌÄ,‚p¢âD¤•¢HDN=‰ã(Šî²FUË€pf£« œY¥¤úáL­LK áLg¾O8“ž rw8So)œ) g ×àS#v&œYIõ7άV÷>…3ÝŒÕάΤø˜2¹óá̪Î9.:t&#å%¢ìž|8SXf,õÉù!Önî04f MÅŠÛ$Á]<¹jÎÜ,m®άd9*‡3)јîîFtOµÛ×®OºŸÌ~ÌN(xl_®œl{*«Æ»a³üƒöÕÂëdò·‰ãªçÌ¿‰—ªotÎvw/~’?ç³çY½“ç¸5mÏd‡¶² S7ñP@ã±sºM4Jjehæî5µÏ€vü.ìŽ2¸˜æü…û¤ˆK( ùù_¦#1öëó§sî}þd>0ýt1v’?vžÖ?9¥¨³É?\ñòç“n­žV³vŠc˜âÍLq‹•#'Z#&ƒx¨1²!KPËÛ8bâ››â‹aÚâÃk¨Ÿ!t÷—”\vº™/lÒ2)À¾/ÃÛ¿%#k.e” ˆÚÈY¢üYd …Úñ9cK3wfÀW-–ŒÊ´dQ(Ö˜ &…’{î}JV£›‰Þgmb5/éÑÎ:çœÏå|6ä%Mú¾d0&§x·WÞ§©Ðiº]­ óe÷ý±oÖ ã4»ùw „*,€ÚÁgÝí­ŒÐýËNÕ±ãß$BŽAk7û¥õgP„ˆ„LÅ‚Qnôù`UËr¿V?×2{ÿÇ1HžÍ¬p–üQ£pØå R³¿ÄÝ.žý}|CC~zyd°b"BXËq%B¤)sÿ„8 0YŒf’qÑq‚z¶»˜6öKpqLJŒÎåX¬¥IºÇQÿ›Þ$&“!ãR¤>«aÔW;`ú—yÑ#’`gé%¢\ûÅX"PÀü‘ÜZL¨›Oû"zùØ“â±Ç&6ÌŒb%Ä-¥(ÀÒ X.­ˆh“ í€ÌÍ‹7Mšœü.u”¨%"ró@Ç 9Ο ©¤"Ü|¾&IGÅüªf°Ò>(de÷ïrGh)åì,¢VxóGÈX£Ð“S¬©aJ—÷ÈûO þ¾“b3”mœ½üêÞ|ì¤Ê4t¤––Éy€¤íÛ‚‰u»=GÞ?GD’ÌémPç]2Š´N"$£U‡ëäNW± q÷Sê2¦—%'íÔ½¿a—-M°G-Ãîìú|.ÿôÝÇ¿}ò»Nÿÿö¿OþáÉ“þs+׾鎮:½l$ÒVºv:ýÖÂÅ]éÔˆ· M{«äš¯ï}ßg—{ù?Ñoþó»?zò›¬-ÿòÝßl¡-Ñèúú—Ó¶ü+ý¿þîã›_ÿþß]þð×üù/[oÂßúPቛiÞ'©ˆ£a¢xóËá›~¯Û¿rµ_þèG¿þýG«`¥Ž1%›» m±©÷]¸ê»Yx’•™Ý±R3™JË .—–ömÙaNO m]u³72!OÕ±D\p…4£X©%¸‰çw¨e%æ á Î잌g™Júj³}J“ëWüV¥N’EÓ÷…¬*BƒWN¼WÅ‹wM¬¿’Sž |ÊõìJÎ,Ï¡yåšÎBËBmöÅ´Ïpfßå:ûnàØùµö]Õ³ïr|h Ø÷}²ïËÊRjä“Ä9‡”‡(ÆÄŸlHûÃ{Œ5‘r¿ªÐêF~¢ðM^"4'OÕÖ6hÏß¿öE£îq¡]Z³VºþÆÜ£¡ÓŠ C3×ófàd ;ùf\ÿ É~Zºf*¿1jZÄ£ÜýÌö†ç»kÇïŒï¨ï†<}ÄZ~y8×ìéêm®ÁþwÜ¢·yÛhQÅ®]w–W<~g±â£7q·Û?º½½]c¤áÓÙî‚1òèå‹W¯¹Z!»=…¥kÄâ c³ ·2ŠàÄ)@Dâ–k¤mlcq(ÌuÁui“¼fß¹h±[‘Ò˜PÆ$ž¨P•›Z°Æ1 ûÙþÅåí¦°¹ñ (VI‚,Õv¼òë°ÍMC+0&$røhב¸c{ ¤€lò‹RNPejÌs‚m¨pCйrùce_¾üqZdcw%¾‡‚6}]âýš°HxfF±Ô¥Ím_‹H®˜˜y¶+^l‘·»†8=ÝÏvþ–¹lÑP§e"WÛ€W ¹Òû}/t¥{ž/ËmC©"†n¾ª’ýxùèÌv»Þwvl÷Ñ Žþ†ãÁ(~Ôéejk¸›…iìÓwŠØÕ~¹)ãÄSV*ÍÁz'‹HخˌòÏs·öÅÅù«Ï_¼ÎVw}fÖÛÌ#É1mæÌO0m·]ˆôD+–mŠp O¸D:VaCXÂddðâÙ(s»T„÷Ós(wªÌˆ• "*b»æóRšf3¼<¿xöüâ³Ý÷T<ÛöܨÏPM#7á*Ô®yÑCX5† >ƒ ûíá su•œ9ÙáÝ‹ß ³Ô>§´sçÅÍí»™6tx½ôVÜ‹–žd‰,sÅßí©¢¨fÍx*’ѽñTªx–~ÁÓ5ƒ#Ó”#£DâöÏ“©Á¢vt_\|ö@@wt'; P‡o3S^<ÞDz!,®Â%Ÿb³™l®<@lV$-“°¹›M]l€Í€ÍÛÄæW_Ÿ?;è èü@йÉ8>m¡Œ4%q|W¯f‡Ê T©ÄÀ €+V¬XÁβ-Í>fþ|2Vc¯I+ØE1\kû_š‚k¡ À¾×©Bu«RjÑ·³=Œ^äûºŸâê Xކ\KÂ’ Í…¸Tþ™¡DjED¬Z4k`аð½êö‡óÑ&òLyÄ—çg/¾øâü"g!ó\çžTí´&ñùõ/¢ôêšïå”2l/óS+uO¶5“¦er45M’A.Õ^CS%m*Ä#@@ŸôYÍjÒ[—ÂÄñ±³ö[³—O_Ÿ}¾=8+>}w&ùÂÙ/ü.âá?wNÆjè¯+õ7» è:0̼µÝÑB6æíå1òŸÎ%<þmÿV?ç¸$éÀqÐ>ž¡i™Üàãà¯y㔄ãÕß¾Í徕àÛtÙ.ÓµÉYùîè1ÓÒ¤¤h;ËLn€»"¸£wwwwwüX`zÈpGHaÈÓË p·î8ÀÀÀÀÝÁ<–T6Ü™´Ln€»"¸«yW„TpìÀ݃»…mx»x¢à5¹»P¶„¤Fòõ» }½Æôª¡b¥rÐÐÐÐÐ> UZíय़ÌÍxcQUð+¼‘0ë à×øfýöýÞSµJöìåP0£Ø†13R¡€`WZDZ#EZ…‘æÂÙk}Kͨƒ›Å¸”—8½a©“ïwwÝ—6}÷a.ûIUqÇ­ÚUÏAVÖ€é€A5”„þd†%2T$ˆ mMLt)û¬ÚdÚȰVì”M k½ª× +"”A@L$qÅPŒlÇHq&0‘Úʰ¦Ý8^Ø*Bnb`«v˶fÕó{¹†ÙiÕìyv”EØmot“~ðÃÖÄ1r¡Ê5@å\> ‡/Àá ä¨yôBY¢¬Ô1ox{¬¸…Ÿœ¿>ß^°]ˆÂ-:^X õ^ µÓX´ã8Ãw.^^l æ»m 8Õ3R[ÖF`/ŒÀ½æ\£þ /HlDýkÞÑšy¬$-“ìØý¶uï6/2ÿõ§Ë?|÷ñoŸü®Óÿãþúƒ?ÿåI?oH;W Ç8FW^V{ÚJøg~kaÙ1j«Ð&´J)¿÷ýoúƒ¯ýÚìo?²ÿøÝÇ=ù}Ö–¿ûï>ùÕÆÛâ‹ÿŸ½kinãØÎ«ì²È.[–6ZÄ#M?¦§[)¥Š¦ eQ¤IP–¸¦úIÂ0ð R÷–7÷äÇdÊ_ɯÈ:§{f€ñ $Q/_¸Ê"æÑóès¾>}º'JÞìHŽô¼øÛÿû‡è¿þeü7ó?ýü¿ãÿýÇÿŒ?goþybo&AØýÑ¿ê+Y€²?Nÿ§ñÛÉU>ä—БË'þÍüÃ:›—"úñ7özMÌr”Ïä.*Ž¡Çyy+Ô×¶ú2k²Þž×´}v{þ:ZØÅ—žÌ[f?JØ—cË×,$c‘n5ºÀË1Èû !äf!Á(ÈõÖûÍ{[ÝÆ7[Ùv«•¢’\Ô7¾>¸Šì¤œÆi¤”ø q­i”¤´“ÖicªZêÞ@ïú4šÅ(Uˆ˜—Ç ˜c!À)jµpOE,Ñœ@F±bŒëÔB{1¥\JñÉCŸï9>×2›‡UàNõÁ<¾­–¡ Ÿ:Õ“¼xP§ì,žØÁ ^<¯rvª°cÈ6%‰‰bÎ\DÓDGøGÇJ ¬b’„3ºþñï‡cÄGrÐ,M˰Æ:’j`ÍÒšÙ4,ŠÝUÃâð_H ê—¡š¬°„ë|p“™üzÔœ†·PÂ@4Ó]eÀüI›tƒ\§‚E˜r¿Fšª(ÐodB¥Œ¶U´ðk }»ìÑzÙÇ "PÙ4Q•G*f0çQ’2)“D$æc2 ¹W[Ô&¿1Oñ#=ø }do$à;ë}Ø‚ 2eܸTG.ñkµ0틽ºˆ¥,I—P¡h› ¾½ûbù4,@w°€c“¦`X#,`´ ™ØH;‡e̱ )ÿX, ïË‚MqxžŠ¯™U€¢|lìDöœ± ‘÷š¼=8ûPp–|uÐŒ)MBX”:•zKÜTÄR\&)‰•ãè.h¶k{h¶m€nDg¶^HÞ`›G_å¬ñ ´ g™·MTÌE¹J¼7Q÷`¢MÑWg¤L‰†)„sFDÔ¹$âÇ2U:¬ßi¤v­co¤v©kmUëµj2Yca˜)Ó!Â0^ó8’š¸HYfbQiÀ‹âY{sÈÝû8\ [•7I–?vŽ/n=ªÕž"@þÿøfýpÀ4ÀÆ! +xYOŸý‡ÁÞûï>§XaýwÈfzHåð{h‡yñ6*¸NY*|FÈ~]†;¢y=›–Öw4n—in&·Êµ_u…µY!‡uˆ¥ÍMèÞ›V# ·>i5óãA.›òÅt4¥Êfò¾Êɨ“§.qž!)ñ•Œ§YäòÀWYèpÞ÷ g ¼æ¦Ê·éœþ|åC̓™™ÜmìÁáqHJšäã|_¾ ù‰«oyÁåú4ÌÓya›'“+à³ WžÇ΂>UOÿ½¥,AøeiIج4pƒiyåªaû¿1z4Ô* m¡ÄØêHOŠ0á½)åÌVi¾ÀèÈõ“*Ð g7U7e¸oÂmp½u(\M#Uµ¿V£¼?š™¦\–'UÝ¡ x+$‰¹ñ4°¥ÔQ BϤ Õ—3`£4¦ˆôÕ›pªz9»®È´¡;ãKÛ"¶®¿¬2•‡ £ƒþåÞõ—ÄŒòëqaèÀ–ò­onЈÄÞ„Âz˜ÏÂÓ7ýq4@Æ "èÄhRTßÝ+õ•]Úh¨ÁõT=QÀQèðtدFüPVÙÒz0œÌï!M¡æá¤(æ¼nº<ÖdQY3#“æ·i9iXc@ý‘­ìIÍáQUúæÒNÔ UÏ*eœ©ðÕ—¥’|å×òÊeƒa¥ vÞ=—`MÓt‰UäT,õ‹Éü©.øÀ^ú¼J?Bú–Ç_lQ³§R'3¶è²únŸrÆ•€Yö…ÊbÞ¿J‹Ô°n>üÉÇz4©ŠŽû¡é .¿ênýWß„©; ºœùÁèvŽGýЕŒª_zp]w¦´•9.L!G]7(-mèÝØùÑÊ5¨xR)üДµ5ÕHÐW‘–c©úƒþ¤_• DÍ* XÓºPà·-Æ“j0iY©¹޳oAR¿þb!•9Oec‹Ha@¥ÔRøÅ|CH¢¨Á|÷…¾8÷…Ö»¯]ã6»Çƒ>ŽûBëÜ£ñ÷…VÝWLÄ÷ÅïÃ}¡/Ø}-[ºÆ'Ì-O3¾W ïÂd5Fwí\v nüVc‚jûÛ˜…¹ý¬-Ñž-Æ}mÙjóÁ]ÌMWc4—dm–nY˜…h¼êÜ+7ÞwaC—œHe¤kßY›¯yc+þ¯å5jëÝX¾¹­¼ÉÜú/á†Ú´Î]Ö-w»+ÚÞ¿åk+´°¼µ)m¹§Ûà¦ñm[ÚB:£¶ª][Ëõ4¨aÙsµÞå,¹ÍQ-œÎŠ?ž{ÖeýlåGKè§¶ù —T#ªÚ¿,yÚåÜÆdm|µäiV¼` üjG[ûÕ9Ò©±J ÍaÖmüÕ`—³-Üçzkçý€ûZ+âßÄé’a>Ôã‡îÓPèP>- ¾q‘Ïú>.òx—9åch½?)7ïpŸ³ãËM2›³é=Ââ“Æ•ø¶¸Ò|]^¬ïúÖ¬¯…=IÐ4ÿ²Äš`9­Ó­|¥~5qRäÿ`”Gºihc˜j•3Mj}‘;cLq*0ÂQ¢¨Ö4ÚÁe*ˆ1DZ‘è÷‹²òT‹Ø¦XˆS›&8Q"UÄ+{ê˜ ©ˆ3\P‡©˜Å¨!:·Ö}òøÐ§kIÕ£X¾ÿ);:½È^t:>~íÍÜÑÉñéE¯“½:yqqÜÉ{½Ã£ï³Ÿº½ï³ÞáwkÞè¼îu^>k?8?9ú¡ÓËNºÙË‹ãÃìðùóîËnïç¥ÂÝ“ãã‹ìøäYç\œõº'íÇÝãÃï:YïçSèÁq×?iõôü¼ƒWoµ‹ŸuÎ.:Ù·Ï_µï~wvxú}÷è¼nõÛ“£ïÏ74zvøÓ–’/O^.5wÞ;9óE¿½8Ïž?;Úôèü°w¸‰Èºí'/}¯ºÏö¿†äö µhº/{³ç‡GµBZ®©ƒêUÛy÷:Gg šì¢ó¼[]A_ONz[z³"¬6ç߮І¢µmöN3”ájqxÑÛ¤?ü„7÷ñô®7Öë9öb&_¼èuk¶n’ÓYw#)8‹7qe•g·4j;SÏλ[ uÏÎ.–4ù%Üo_u^tΡÎóÍ\;ë½àˆˆÍ/¼ìàü°ÞÀœîù=èT¯ó,;êœõ¶´z~zxz–½zqørâàM,é.¸ncœÂ,¸ Y>«oý1Ïå"ŽX—&:žRn°â&áB+jO„NÛ¥ëÁ­úâÇ õ)`„‚’ íPUSì¦Ë`Æ}q­oüÎ7Å÷kòÓŸ~üùìšþøûɯ&]|9ûmò—Ã@ìRé¥ì0^ ‹:;ì—“*Ëé–L²¥wë#%µœk+µr”ÆI̶NQ$bFk÷>Œ¬ª/³yB*›7÷ùÀ.­ÄÚXi¤P0¯¡(¶ £$Á0j,SHÛn½fæA+nAô\ã„P!aîÂ%õ¡âÔ±„²¸]º–iØê/ùe}HÂÈŒó~}¤Í_çï_¼éo%ƒQ ^QI×(±iŽSîà*¼éSGÔ+y¤p(eUMÕÅI:šƒö‘U«Q-¹¨©ãÑb8–3ýD`Õ.×س‰m`çb[‰hŠ¥p0 D’¤š—PºBDe >„„;íÉFB~wK”-¸ÓÔB÷…ÔæÆ˜jÄ`/šEˆþP^.©M̓À— ²n=ë#1ŒMª¬±<m2‚ÂäÔTr¤ãì~$6È—§0õ©; y¹÷Œ¢ÂNÅÌ*ª˜ä6+‰üþ.‹4¾¿C²ÆÒMQ†QË$²4&ˆ§8L9Õ´Zh¤ÛÊþ]"«títR䣖€1f±áILÀÅç$0Jƒ&ÅŽ˪lð{pÕìÆ1ÌÛM¼+Ý'Æ"é´T©¢ZÅÔþâ°;H[!Àë)t0e Ün¬Â‚ŒÇ©Àþ,’¶´—^åÂ6q+Y(˜°µl¨"`.aò•‚¡Rå&k(¡0E÷Áª¦ÕàT[à«D8$ S¢œ°Jã$Ïb™fÞÊÎÉØäÈÚÅË+ìÇ—¢M4åÖ(Ë4 Á àiÎD[Ô0†r@®h {Îm²ÖýÌf¤%k° lxÍØ§ÆHäÁ²J"è>d]µºÓäy'a¯Rac Ó ˜aLÀN‘¦ˆ&„#ê¬I°¼a×tl6NlAÚZwŸæú70í­À¯©;xžOGæ ®í௫°gÀAÎlDR¤#ê>â€F"«“Ø%‡Ø‰—ƒûŒ¼cÕíø¢¡+>*BEwxD_@ša”…œ«l:†R½ÂGÏ'S¸@”â¥`ÎáQ¯ûªþáêƒyŠØË‹ƒJa× [ñM¶M†x9Ìþ›˜Ð#‚מ>;'ìO¸w§Ù ※pÆqåt|å¬:¯&ËF$TDÞ_GÔq'“HÅ:…yº`1 ˜Õ ä,/êBÊ™8N±Š(3(¢0‹Já—#©I‚gUl±۷ΟßÅNû3*ÿøtk‡$…ûÚa—ØU€Ó#§)P½Ž”Fq8=uH ˜5»¯nW¸‹a ãˆb#N¬ŽåiBŒLµµwíŠÚµŽ?Á®(ü¶nnÙ³ÙZØEûn Û>ÎÖgfÞ:Ìöc ß>Ëöý;ðnm{D{r=;zþÄ'WƒÁw}¿nðàøðåÅá‹*ë¶ÆE—€zÆ·f#ÍL¨(½SY†TúãÓßÙþùztú‚<øcÝ2w#>æÇÓ?ö&ÿ]8 >‰¸Ü@<Ùï¯]ç¸Ä»~è‡á¯Î“H7MMD¤åq¼âq3—héÏ Çü.O²kûýµQîÕݼ?^]ìQúö¢û¢Ú¨ÒLÄw]æö) ÙîéC;‘0T¥§ózûQ7”žè vÑ«÷œ^èLùx§>„/ÐÔX>ô¿Ùåwòrèa^ï6ªoÛñ•ÚBêHåµ×?ó¢ÙùI|³\ÂÎ {BÍüN‘2´tu£Ë'r0ȯÃ6©~vüÀï}k>¾·>'BüÒ:ƒgÛ+õ4=$!¡I0ýeÙ=ÑFpó;¬¹³Aw‚ q‘_zÆÖB‡·;¯{Ñá/OVB* Su¨%3E6¿÷ÆÎ?øPŸˆŸ½Š.ο{2Ó‘?àl雊­ç[¼’“Õ7|WÎ{çO&²|“Í÷6Ö§¥Õá÷Ök³áâ%5íÌê+cÐÏbþVPó2òÑ®‘±&šåƒéÐVýº3ñÞÙÌ¿^æ7Ê™VZL+J´è¸U‡¬¬‡ø›¤ú8ÁŸÆØÚ É@|º‡kÀa‚ÞRüõØ+ÇD£ÄúS‹iJ"nxÅX¦„Ntw†v¬c÷àð^Á!7±±Ò&(%0AqÐfê|. MÓ+e¡6Mp"I;I¦´ÞƒÊ/T&h*¿PÙ¤A~v`Y¯h|ÅÀ’lø°G«®%8 ¢üõàÜ÷ó†Û¨ìû6jûú¸­ž>ý·æv‹1ÒAø ´þÐÞ_åš¾ÐoþóG@ÉÚodâ÷е —¼+Èý # L¤,aLG€I(‘4ÎD°£0H+“;AݱŽ=È݃Ü=È݃ܵ ïAîß-ÈÝ}q{sœu,¯G_+ Fȇá6êmá9[j(Lï€Â Ð úÓÇ{_ᅦ·¡pòw…1ŒwŠhÌáŸáÈosŒÆ’ÿÅ<¹3Þ»k{(¼‡Â{(¼‡Â{(¼‡Â{(ÜÂ`ŸõÐ¥O@iBËmÄïèÿ³w¥MóÊúûù¾|™sª0h³,S5U7„À„! “…US)É–!! 7 Û=翟–í„$dãÞ†ñ‡©Á±¬¥»Õý´ÔRÏP÷ ŠS¸$°CšuT—Ø ëÐ¦Š¹Hàs[@7­# )Mh @SšÐ€Ž1˜³‡Ð6âèãG¼ò—7ÃO> óôµÇ¡8¿œÒ+i£D†™¿ ÂÌ U€…»€nZG @?¯ IhŠ@ß.8GµõÊ[rb®<§cI…Ñ5lȤ±ÜA;îÉŸIn š}g2Ù½ŽôãJB¹‡ùÕ{œïa´²„)L~G09É×AåEâ˜Ü†¼õ“ ôËàßið,Á,Å)˜–Bgü« ³øÁ˜ÞI¼BÄ›•]c“Ç ­ aˆz‘´~h/¬ 'ƒOW_xCš?À»Êu\B• € À·ã([)ÅmÀ²À2”Ì[›/|Ó:RŸøÀ§>ð)€Oü‡ðxlû‡‡ÎÎbèlORèüЙŠûí ³'±ÉÞ‰à“î^!sSƒ”6CZQí ¢µWmZG SèœBç:§Ð9…ΦxÃäÀx˜eð -æM“¶IV›¦ùÚnt¿«ÛIߎ@vŒ$®*Ñë ¾kNQyžw﹨|dØSµæ&“Ÿî*Enȳù®n½¥ÿ4wãÿ½BÛýFÂÅÆm{Ffǰ h9ØQr ¿[±JUb7CvëÓ×Ú~.[*æ>ï^÷:z÷i4jïî€ÚÙE|Ýì‚•47#¥ã‰oõ|ËîZ=eõ×h“U6üß=fYµ‘¯ml›ݳ¶òûµúÙ>´WlËú꟡Ëóãð‚îcøí.¨;ðœÿzAÎnÕ‘7¼Þ²þmãÊ™eðw¥rÒÈæÊÕÆA¾üyWýÝgÓœ¶!Ô^Ge l_ÚjÔ Ú:2 Ã^¯mkymÅ6t0Y¦œ³©ÏUΧ¯CÚ•·M“Äòð±Þúdõº–"Ö'*À##;‚î`â-ÆZ“<\·²Æù4@ž¬çukØ›kgO–XŸ ®ødÝ7‡’<äñzáÂ~й‹Òn%€ÇæMo'Šå0)¼ q³:°þ™¸ Ù˜/›ZÑ*]åKÃÛñþµ°Ž7hÄ,}Bmɲ™õÏØKWç_Ö`ùœá¨ý?Kê§›ó% ±þw†ŽS­µ­Ä÷_Ð,ÙÆ‚¾ÆÂµó,T“…çÓ±P‚?Þèh9bõFCp]ö¬S D7"NP Í.üþ˪ԲÙ\¥²7c#ÓÀ&X_wzCmE²¹ó…ý'ôì ¼";è.t¨7êC}ãdnƒ]WºˆäÙŠ˜UZÍà/…†Dz’*“½qZoÚAŒV‘ã—ï,\ 7…'d²ð蕟¹a@Vm´%x³^Ð ›Q~¿µð=ïáɶâó(>Æh*µÍû~Ï$üÔíÙþ¸¡¥û/)3ÞYXüÉÚÍ,]Á}*lE ²÷A¤¤Ð¶vñ¥ ¼Àÿ‹Ù¤$r…ë{H»ÄóaÚuˆ£[IZÝ/e¿T–4ZÎÔW|Y,gš«TKeóé~­Ò8<È.{UÉT3Ëù5?ý¦ä;ËŽÉS8‡è|„5ùb5W>Ìds ™4[S'«”“îå²µ2°¦QËæã'èk©T]ћ̚c­²ÿ’5 /l³zZhàY*™Zu™P|Ë–êdyO³ð¼´^C±“’\¨Tó Y—ñ©œ_:Ò@˨ò’fsµš¨•l%¿âãl¾\®ÍHr~Ÿ~Ψ9É•3Pge9ÕÊÕ©·¼@1G¾ši½„8ùÊ̪Щjî r)V´Z9Íœ–g'™âÁ!ËH’Ÿà¢ù°ŠÜG3ñ w–‡ùSç(_\7}r/ºYÉÑ­ïQ*æ9UÝ0¹tû2Y Å|áŠ(Ùæè—cãÙä®à€ŸÖÕåÏÞ•€”v‡)H¹3X2<ç×£Ày;8Áu„{ È‚“£ƒ‘2ù íáK”9´f èúá\ÉÐfPÀ)²…CÀRøÌ'>FñV åpÏ ñCêcOûZ(íPJ=3â`òY‰P/ ±ãR*Ý:fX"¬ Þ_áuøê/‹ñb¸d^E[ÌÆÇì1r/D3ßìåD%âìÛS‘ãý¼©@Šƒñß$¥ü& ›…a` râž$·;Ú䛎¶L“.ƒn¸mö£mŸdß&Ú—M˜/S!­ªsp[–õŽVƒ\ç([\Eƒùzf7TÄÓ"Ù ö蛃ÁhÙÎé|Ù¤Ç?@ÈMJ^Kȸúqbõ©í/p§t²{·®‘ò},=僓‘V;Y£¹ÂŠêéÖû‘š‰wÙ“¯õÂó"e8DZHæº>wCî0ަ¿NxmƒøËvï*îˆî·=“I}vWùªmTÿÖ„N‚Ø£Ê!@+&)>vtˆ}A\ÂSTæW?G%Þ.ŽÈoEfîjj7z(u£ÊGýöth@ܪpÎ×1¿îG<ò\íly– ÂÀ‹ Q€´ÄÌ×'7Kêú"Æ^ "Ö?2„µúdé@¾OºM$v©ï‰ÐÏ-DžôCŒa~À=Ç´Ç™ÄqGSŒOhÑe ¯Ç¡qk,ЎÔ´pAš)—˜Jý0üm8,á¯p]ÅŸlÄäÙÞ›‹A âZ1ťд$–DHð]ô,~EÍÜup Î4—X3D± ¡R`0}"˜Ï(ŸænG1Íßhø+¹«GÃ>´ÿÌ`B8 „ƒ(¢Œ†¡Bù I(äTs'x#ÇÍ.ÃÜã›±÷E÷i ± }©\Å|…â ôs4ÕÒÃâM8œtþ-f¯+8¨ÈÀ÷0SŒúŽ`Jj&L ¡&§ÓüGšMó7ÿ*î›ápkJ_0@n.`Ú§ž‡CWK^š†ToA¡¨ÉM&Þ§üKc;»VæÆé FX“„Ęåú2péqßåø9é2Uâ÷ãc|O (-8¥Å8 Dh*43ÕC˜ãeЋ]³M6£b*­’—Éjâ3-qà¸Ìw‚Á sû»w¥X›Ï}[¸Ž¶¸M $ŽcsÂ4%y ’×wÝ´ŽpÜ•ü Ç]7;ɺ‰ôýý§ê6êÅßtªn³¶78U·ùÙ´èÊèÞVpô-Ø?rŽÉÙYukñÁ¾íÑßøâ„M(l¡WàÁ’Á§',4\ü•wŽÑß0kE ”rX,| ^(lŶ}×qÕ4ô×_œ°iéÅ ?QÞÔÜüu¼ú®²V¤÷üÌûŒF\sÿÁ¤È;Ì>ñ!@Ðë®ø™™'–ç“0•Ú¿kF ±MþáÁ!Eb°jð)8œ‡¯Ni/kü^9u‰³E‰ KÙÆœÛЏ®zTrI=MZ›SwÃ:Rp˜‚Ã7‡Ä3—ö P…Ø eè ¦±ËBDÂÍN(gRR_H%å™4á#`’‚Ê÷*ÝT¾Pù³Sš}ÌDe€¬8ûÁl ÏÀ:η0Ÿ„!N¹@Öd\ð¶]ôñ.Ø›ÁªÁ§wàz@Î^dêJõ…Í|/°=¡@Œ(ç¾`¢˜¿ànZG pS€›Üà¦7¸iÎÞg †ñ¶Ç>:Å;„,Zaï¦tÅè  1á޶Cs4Þ³Á^3›\à>¢ˆÅÑi«è¦u¤4 )Mh @SšÐ) F·]‚>~ü''ƒUƒOè<%¥¡9ÈRÛ 5±Íµ6ØliäÃÞ€íÓkOlXG @SšÐ€¦4 )Â`Î6Ž3}ì-x¾è.öçÁ§t€²WPμ߀ú˜±Pi{ä†aš¬«žíD3Qs÷ß:ºi)ýHô=dnMè‡A ˜þ¤Ì­½QêV*÷|ÿݤnMqò[¦n5òø7§nýå©<ß;“eá«ÒN"f£0ÚØ®ì£<Ž¡õVÇÐb¾)ýðÞ#‹®Ñ| àç¼óøQBµ+f3s™ŒrÐÖT£›Jh-€ß´ŽÀ§>ð)€O| àSÿ1<ßöòá±³@Þ`ÕàSì<_yûÁœÿ~,8ÜeX„¶ÀÆfL¶à‚ØÊ C„ÒõZì¼i)vN±sŠSìœbç;§ØêËT«å=£Í¦^ÙxǶoÛ²«wôƒìܶµa[ ¾l¾@9ngüƒ÷éE_]ƒ¸÷^?B¦“<¯n/äDدy%ð†cŠ7LÞ‰‡YÏÐbÞ6aK ô`µmš¯íF÷»ºômádÇHâª½Þ°è»æ•wáy÷.‹ÊG–-±Uknùé¾Rä‡<ÛïÚéÖ:PÏú÷rm÷ ·íX™Ã6 å`GÉþnÅ:T‰eü Ù ¬O_kû¹l©x˜?ú¼{ÝëèݧѨ½»jgñu³ fÒ<ÜŒ”Ž'¾Õó-»kMô”Õ\[ ILBR=Øðô˜IFÖF¼¶}0nþuÏÚÊ?î×êgûÐ^±-ëwª~†.Ïà ºá·» îÀsþë9»UGÞðò¼ÜöÛ^Ëÿrææ»ÇmŸxØïÛùj^¶Î®‹­³NáéjXèp©‚ÐeýÛÓIõÆ)¶üaéÞWóN±~Ù*vÎnòÍû¦¢Ç·—ØC²ŽÛ>-_«óLó¿ì]mS¹–þ~…—/so-2zo‰­Ô,E˜ S1d’I²•r©»ÕÄàÖmÈÝü÷=j·_é66bƒRE0²Zjéœç9G§[ïN¯¾âǧµ«£Óz|úéú°Ïjç^Õ^ïå?ýÚþÞ¨^í|Po¿u{öæ›Ïa,ÿ8ÿ|r¨[ŸÈ§ÓOäóy¿=ýãüèô¢wôæÃEí hƒ½==ƒïßߟ~h}úþ¹ùyÿ0=léówœÄoš ƒ#üéoråÆ\;èñë‹ïµ×ï¯Î/híä}øúO>¾Ï½ë·ç{gãz‡8«÷çåùç¿›iHI3~óáæ#=ºŠ?¦¨õá{È>Ü|¢ïA´Žþ> Gú~¼o>}/ÞžþÕüüºÖ;>½ G7˜Ã÷¤v~A>·jdÝx»ÿÇ·¨Õld]‚ ¾Ço~ëEû0æóvt~&jß÷HíôÌÇA#9Ùcµó½±LOøÕáëQ½­«·s¿ËçþûÞÍýÁÍÄÜÏÊô{mdZ;ý—¯Ó]£u ò=›3ÿë4ÿbŽNáÚùÍ?ØÌòùÿ“¬ÑüßMêÔÌü½>ÌÿÙ«W[•ÿ«8p•¼‚bø|rò¶¾ð×iýõá_¯vl/ÚC#xðÚz¨VȣȠ°ßŽ›6Ð^§Ó¬€oùµ2ÀÐt§œÁÔq“³GÆawÌeÃyüØnýRé´+ŽŠT~a œ1ZU¬J¨žË+æfÓôë—ʾó>‘€¿*ã@N¥×™ég—Ò_*&­üâxÅ/•«FÈB~ö÷ `XxÁL†Ç¥òظèT³dwlÜà[Wþ™û Zš;ˆ›V²0ÝÉïu]Õÿ*è$ØÆLß݉‹}BkyܬòÏ—®Î¿*i?ó9“~ó?ŠÛ×l1aÞ–¡ÖOÉq¢·æM%wþ »Á’Üp°¸ªãE5Š<¿.JðÇë-kÒ>8!•N¿®Ënå¡»%NPl`:m(ÿG¥rò~ÿàädw´ŒÝš†i‚um«Ó³•lmVÿQpÿj›È5ÙÈå¶ØQ´Î ©·:±mþ:þ˜Áöj‡ÆU¡‹ÞI—y=òi CÞ®r£t ˆ ×hUH•?é¾À’/^Vƒ÷.ÏâßÞ7h5ÚV¿5¹@ª/pn™ëÛõøÜ}ˆÙÝ#4o´JX, uÖ$vgŽÇ†ã„ZNE_‰$æ˜%ÒRªu¨8’X!­Uš?yh~ÅêS‘Ïú¿îåá¸fÉKvÉØGÏ`}7Ò¬ æ6tÐG×eýô/GW´À¾uo 0ž.¬·Âú †“¡ݸXêø‚,Jr6U ¿FŸÕdÁdM<Óm×ÍŒk¡Š§/ÉËù¸<ëwXŽ«£û˜SXx(¤`øåðI…’„mXèÍ[-› ¼è\ e?g2¶†Èv«îË›ƒJ¥“‰Fƶ&Ïseak6fê1·só˜ë1×c®Ç\¹‚¹\osÉž-æò"ÌÙcnærµìÛ‡”ö ëA׃îOÝ, Åij}ˆ‰ö:jöc;±½ŸWx@à ‚D…ü›ÑD ’ÐòÒ‰\´¼d2kmtét¢_^|Ù휃N,‘`˜_x+¹!/Juñœ©‡S¿ÂWÀ]k…KM™KYfÏm… ’PŽ’ˆGˆô£0" •.u6P2)g„’¨ d„gÅ,‹´ç$îz€·1„«D”AI´'‚eDpɃx¸&žn,ÕšBú7²/Iñ$uŠ8ðd’ˆ c‰-WÁäío 2ÕCGÙº[ûƒj•Út5›$0GÑM–‘ÞHòù= 6ίžÍg¾‡$Ùd*wFîß÷½:¥qgÉÅù>|AR³Ü\ºÿÄxwÓœ'ãOe1õ·Se%Àw²À0NÞ™í k’– –xhX4ŠyhØ4h˜£7sÁÁÅl¤ N°‚)$q ¢ØZ> ³!Ãï.s¬6¡¸¹¹ÙZ!L xÑ1¬îßû488©/ ÔÙEw u––fÝ2 ΞÔæÒv{üÁ­Ióíܼ¬púÑ‚­Ó¯¶âzªt’J>õ®~åêk#úZi[WfVÄðq-“»çE… ÇþåC:ºj4›•A3Y•IhpÕªE=ÿÈ$ÿ¿ýFwðÅíQ?/˜¢ØO;oŠTÞŸÜAM?nô²¼½&4˜:‡Š²tÞŸ)jŽŸíb†ÃPãQaÀÃ& XšcŒMÁ… ‚…[·ž«™zº M‹AƒB(ÎåP!—Qàá\/c€Ó¨“­ìÿùò㱨ÀƒAhfé툈J*‰¢Dƈ …±Š"b4S1 Ua !ÊsÇç d¥dfúç;¥ ,IÞñ*ü(@<Ôõú²Œktá<êµ*6uÍ]1¥zà-L󪱵œëpçF±ª° ûÝ·|ì"_¼„6h¼‰Y“ŠºÛ%q”8-Á®ÊÑöùo›çgOêI!ÀMVе_î­Hý^£™f½×³_*û| ðíz Ó¬tm¯ßuíuû¶ÒhgjK¾†¶@ÞÆ?ï³{5™3CHÙÀȳvf¦ñ±¾,‘Ê/ÏÝã㣃“ßO³wìÀ€»ß2&Gºqì ,Np×Öú5÷QÒ F¹±(0Ù¦khPH-C‚Jlj"Ò’b«­1õf{#]“ùÉ"+b^$K`IØ\ýå0¼;8z}xôfƒ½‘ŽUû4‹iúc¸2K÷<íÁÜ6ËS>é÷:õ^·qv–½\n˜ZÒ¶×½z·ß®ƒ1˜xÍDVÔ°±ˆ™Z¶Ï”$n4™·s·'¥5¡˜¯À“D't0Zbò³Mμw´ (‚ÀË9ZšûÍÍó´– jkëÙ› ^¼öÈî‘ý‘}ø”ŠmÔp–l´aF¶ð—@úÛ— œ_>Ÿ¬6FšÅt07FBÞÎï“BØÜÁ{âቇ'žxxâá‰Ç‹#Œã ßÃýu`œN¾Z”`œÎ“†g+`BqÏ6yÓwYÅZh“øßãÇfíØÉºÓM‡vyˆ«„sñ#+‹xb 2!àª1X„¡Žb’Ø11X–…<.ŒŸ5;!P‰á(‡CQ•¿ökµƒ£œ¬¬ ¯'ä¼³¨üV‰Úè»oÇÌ¿”`Çbñk!I¹Ø¹äé<xÀZ`I.<`m2`-¤M…(å1ÉcÒ_ ¶1Ö/ia8D@|>g)J‚=z|¾ ¨·±Æ/%G4(ôG"ð X‚Úƒ A‚Ÿ)Ê]L¶)})Jåæ"ðÏúƒ A‚=>_dÛŒª“JÒøWš—‚ ó èAЃ Áç ‚b›SùR¡Z¦%"<– ð èAЃ Áç ‚Á¶ /æ½1J¤%"ðáÐR <zô èAðù‚ Þ–ìÅ„C‰Nç‰Àƒ`úÄ‚=>_$d;Pü¥€ /JŒÉDàß Z‚dÙÄE<z| 8u‡‡Áµ‚A°cw XõéS”T)—,(=~*ëX¿˜7x;¡™|$Öã¯Ç_¿_&þÒmÌ77+'ýubš‡Å,ü¬†Jç‰ÃCâ џ˸±xOÍšs S C„2Z(l¬â„€¶D!ÊLÈÃÄÐ0ÎÎFœ½eÀ´¡ò‡G:F_MûÌsøÍÔݲndV*>x Ôš¯ÜÒE…°r\[ºë HËn`8IÄDÂTHË‘‘FA¨“XH††>É4¶gÝÛ“¶Ø2{Œ©]T00µKv=9µ_JHaÁJIBvÒeÔ´¦Ý¿LòŒXã´dÐ~‹¶” ,û*WìÏ·ò2ú½ë|ïãç¹¶e¸Eùcã|x{pzð”OXê´d°¯î‡Wk Kk9|í²Å¦ þx}MÁâGÏgÉõ%¤Õ?fíÀÆÅUaqõWlýÕ¿înª ]¤;"¢’Š@¢(‘1â"³gEÄh¦b*ªBg+±ƒì2o¼Øl;°¤N,lOm\Œy‘‘Ó*Ù¬Ìt'FŠ„)D#¡·1CZË)aÕ"‰¤S Jø@>ÌŸn>¢±>99̘Zr}l@©J‚Ä.aÞ+ÃÛ½O$ʦw¦þ°Þ\£²=W83½tóƒ±kþBq€šs”Ž'‰H3 Z"„¶¡5„ÅvÐJ~÷hcÆþÄ‘Ä$ gJ`€d&0ÖlOÈm¤“W 'RDŠÅ’ÓPJ6Šc̹2F?¹ýy,\Ðì°mÐ'¤?¢Í‘¬è-ã1z›óÀ 9èŽØ8kCŠc”Ø0Aœ'…±Œ,À"£"ÌÌ]ÖhÑ6î±_7‹…×Èbý{kÐÀ¬å­|w–\øvÏ5+4hQÂÕRÒáînß…½·ööO?¸²,‚Þ«ç™Ü*Y… çX`%©MBNtBdE‰» -çÕYÂlˆH0-¸Š),#¡tÓ«¡Ó(ÛÔnÙž]5n ?ò­Ãìj ­F'aB‚Ä$â–<ÁœNÕ”Ü8ª ¾¨ula –1ÉFÒh™3;!;‰ãîA#iÈ.f©Äâ(P¡Õ35÷Ÿ‚»{›‰Ã/¸²›Iwº‡lO+išoÁÜ‹.³)!.0oZîU.ý¬‘^äÅöò«mÙ®q÷‹Ý4^™Ëüc§Û8k´Ms´3Ò"U˜Ï޽†ÕPO/m”f=}½ªwÛg»¦Ùì\ÙLj§Ý¾ÝúñcœW˜‡åç­ñAñîͪ˜8¬Ií ¿ùëS2!%!Œ ¶í]uºƒYÉ-(üÁó³})ŠþwýŸ ƒ§èðÝÉî0'!i\´cüªííï¶LT¶’˜]"w™Ý•ð¿Ù¢|6 [š¾ûÆ]­­É9,¹½p²í›û/š¥È`«hu«v¹¾¿ Dûzÿ·]·20$3×kmïèýÞÛ,¤Û9sÓŸ/Í|"ö>ïšo¦Ñ4a£ÙèÝÔ¿ƒ½v×¹»Ì22³–êq·ñÍŽÖ$”_ØÑv_ž| žüõ½?y³Û4ý6@yi'aUœýÛš¾®g»-P—Ù´ÎÔŠ»¹³n¨Ý`š‡ÛÄô›½‘Ü NNaå™ô¢>Ú]̲EA¬[Ó•¾µÆU\¼ý›©p ºØÕqÚÞIh®mÇ6Fß:Í~ ˜gþnºç(Lð=ÐÛ£Nï·N¿g4#êÄÎtÂ}fl3MÌpëÐÝG;²•…,GÔé7ãJ»Ó«„p…k¼ºUf.¹V›Î8$¡%Q¶§[F#¡’À1ï@ÉÄYL¤ó†é-æRs³ £28¤1FàìÁ HˆtLKd)Ýilã%†3QÁÙb›P¼öáÌmޤEo®ÏÆH¼ÍYK“‚oœ5b¡±äiÅ2Ø"m$ÜV`P„ˆ#wY£EÛðáÌ•Z¬‚pæ"--Δš2%e>œéÙ÷ gò]®ïgò' g+Šf¼›ðµ‰f.¤ùÍ\¬ïMŠfò]¡}4sáh¦Ü¦”®}4sAžŒ‹}óÑ=OžåÉòùG3U‚m iˆŒ%M t„€˜†Ž”²$¼Ói_´ Í|\Ö¼|4s!˱x4Sn+¼ÆÏ;ª]oLš¿Ž?f¢¿ª&® ÅÓ’¡ù§´Vf)¹òo~޸NJïÖŸB³”õÝË©#\SŸ|³ÒVH5ê5Ýãc¶j¯Më²iRe>½»d잃O6óä%÷ pnZ:ÉíF×eýô/GW´l«ÓuÏô2ÐÓ…õVíd‹Ø™PAèD7Î _à êgSÕÉð»¡ãª& &kâ™n»nf\ U<}I^ÎÇåY¿Ãr\ÝÏð9èÀ˜ÂÂC!#Æ-8Ý¡" % 5Ú°Ç4s÷šZÏW@Ý^GÍ~CœWx@†Ø –Ÿ3šˆ[Ÿ—Nx÷yÉd`tétè$/Gëtb‰M~á-w!/½/eᤚÒŽý _Í 78СT 1™À\D #±…VÆØÀÔ„´>4|F+|Á`G ñÓ„¬ý~R m4³'ñi:oÞ~(¿Û¼ôwJ¡iDxŒqñÀÀ6ðUÈ"-ïr„mÃïÍSÐ9;By¬®À1º-ÞpßSò¢sÆCó¾gmbÄûžÞ÷ô¾§÷=½ïé}Oï{¾0ß“«mJÔ¦?ZDüÆCóးñ%\½ñ¼Ïó>Ïû~ï[CÊ~Îd ë¼Õ~òì#ÏYÊ9K)º2¬md·3 FȦYXW¥ó†àú³ª– ° ìbNx0ŠxaÄC `¨ É ˆÇÖ$ú®Àî¢møÀn©~–FuÝ—œm“Yá,¹ûQ¯ÓÝÊSãÇߨf¿œÆ”{±Æ1w$éÞÿE8 5 1™4̵uoýî¶Msú€ ¼Ÿ‹;ÞlÍéDvm)KH:ÝŠãÎU{èeà8#€Ôå³ö›ö¶FßL=& K/å`ë9è* 9Œ?6‚ƒ …õ´)CŸ?÷¤xî±¶šipm Bð")E!–áÐpiŒZÄ)±Rd¶hrøw3¥î©â$ˆP"bXÊhÆJ !ÁuÈ'Å0L7/¦XKʀ͕A1{¸PÈBQ4[-1¢F€P 7¤°(r+ªY æ åþë‚ßw]”Q2Áø£S²wïLÉvY‰ÀÛ(æé¼q>CÞöï‚…õãéˆ ðÿ³w5¿m$ËÉáárÈ!@®„.>¬Gšîé™éV°KË´M¬õ±"e{7X º{zD>“î II›,¼\¼cN¹$§œÉ-@Žï?Èß ©îùàP$EÊÖz%k†Åùèªêª_×TW=8‡8ó‰ãPKIŠ`)‹† ç#J »,BwŽÛ¶Ç}Ü¢¾ ì™Èôûdí>\±Ó]‚Âî­;èõß½üÓ_ýüÅ?~õÏýø¿ìÿù‹?Ú_ýXÇ\ËãÁô¼?2œHwS ãLúñîBδTâ»+UûîvU=ÿì·ú”¡†“¿ù‡úù‹?ÿê_Ͱ.[½¯þø‹Ë8+@ÇS T2›Æƒ~h¶apÑŸô>Äÿòßÿô?1þÃþ†øïÿû÷ÿöÛ{7Ŀ־Ç=ÚþèoŠ#-ÓIDÿr|5éÅ£A|£;ßòäÿ᯲{Þ/YÚõvS¹c Zmè½{R¼õÁ;h0ó^âYׇa3iy;`”Á<2Ç–ç(rÛ„mL¨µmµa¯4µƒ¦vб=¼j‚ØJJáX>WÒ"õ`í¢Ð‚‹aRâÛÎÆ“Û¶Qãµ;?)‹—9ôóÙ_ö@4¤¦ñ‚Þ"vºfê¬Ö[w ·â?¼d'®ç“ÈÂL×%ÕßòåÔ’¶/@aøœ’ÍškË6j͵ÅJ]©À*eÛÎÛE^Ï_¿eœÙ5¹jV/Ò«}Ó:<»vkž¨ ÎÔÿrˆôÇ&eŠxta¬s·Ò…süv»„íw«Á®Žï®F§•aoóp8ÍûAp.Šh7óx0MËÀµy¨\~1 “+Þ«>% Ìæ Ï/.æásE' · ^ =Óƒ˜ï'Ó‘þj̆E65ó^žHm ‚LNÄwt#ãiÐE±¡+OdOSê’zghg¢Iõ¥ÖÉ·Öi»ÌÚ¸LÍïáðÒ\#œwÌïahÁJFì/Ä(îfañ^'YÛ¦ xJ˜[ã©!K*­˜¬²‡¦ùtdÔ‰-Ù3Yøâtv‘MS™áŒÏUe²yû©2ÝAFýó<«:á(¾'*RiÈ’^éîKtŒ¯njÏÌÝ÷ý±5@a4°`£ lVu©ìñѹ²†ÒÊÒ?¦©ÈâGÍ€§Ã~¶â‡Üü?–ƒátþ`’ŠÄ´<œ$IIëbȳa>-Âsb<üý4¤ AýQv*£ ð({ûò\MÄÌ0 T™0΄ù#JÏSÁ3èÆw Õ¼ƒa& ª‹,9˜Ïi ²äeÓÉH:ë'“ò®Lè@sy•ˇéXæüøQ%9y2q Ç v'!Lgœ ¨eýRš”ãˤH óîÍñXŽ&Ù«ã¾éúƒÉφ›ÿ//Í&–B²èÅcæ?4äú¦‡·²¿äà"Lª2uœ„ eóºDfÒ\™Ñ#½ú@¸M2†i.0›l%Èž%ù8ËÀØÏÞ% DÅ’JBЦùK†Þ*O²Å$y¾¦J!sÚ§¾ÿÉxMnw4nƒùB÷Î|¡Õæk[Ïöž£Gf¾Ð=6_‹š®° ¥æ)Ö÷²â«¬Bé®\‚‹¦¡ÐÁ…Ý*TP® µPêÏ\ÍõÙ|Ýçš-W²‹VV%ùÈs³êFõÇÈIôQlÉÕu–)Sx¥V¿²ÑñD8‘<äÄò1hcbsÇb0BKDTØÒaBFôÜF ¬Ô—ÌV>fÌÆDù.vó…2Å™÷e$@páD!e$Â$ìå‘Б.ȸRÑ'w}ºÕ¹Ò»”Ý2(æÕÛààä,xxêððÖ}LJ'gÝVðæøõÙa+hv»ÍƒWÁÛv÷UÐm¾\ñDë]·uô¼z£s|ðu«œ´ƒ£³ÃfÐ|ñ¢}Ôî~»ðrûøðð,8<~Þz ?N»íãêíöaóe+è~{#8lë;•‘v:-¼|©úúi«spÖ ž½xS½úò´yòª}ÐÉ{}v|𪳦ÓÓæÛÞ<:>Zè®Ó=>Õ¯>;ë/ž¬»Õiv›ë&ùu»zçÈ÷¦ý¢ Ïá;¸à\ gMû¨Û:}ÑÝW* #A-D‰·à-GY„aDYÄ"®¢]Âõ˜Q,#G"¦¤¢B¹Žã0ì"ü%¥Ü½ÐaQ„\ßq¸9nˆâ6RÔ¾óœhèú`1^¡ô-ãJªI/385æiz'¡Qº–y"ŒõƒŠc°(S©Öõ¼¨#SƇmS=k»ÔIˆ"l»D‡æé‹¬¡Šl3^ ƸŸ˜*2·"Ÿ†}ì(›Þ;7~§ØÛ¿QjܼèœSÿØ4“]x{!âŒfË"83… úi:½!:máÙ|ÄAÈm’4Ý–YóiPލÈê{,µðÍVÙBJÄõþd+‘ëbX5ÊH8ªÚ{bÔÌNÅe®€õ”1ac×!ŒÃ††r¢Ê~ä¹Ä³«oç<5•ˆ@üù >Ï¢Fá8î&×Jô˜J@¢"æ­w<*‘«"$)öi¿Ì“:5âr)65 EÉZÊ~gN¦i2¨ÖŸÊzµrÎYE»óå˜Îä>à ϛ]l3K¢²f2„­]d‡¶âˆø˜³ö†ˆ;¾Eè²4‰L|Ì6ꓵù¾6æÈw@YG’(>ã2Bˆb"C1/£Eñ¹"+nWa|NC—5¼.‚G³ÞH¨\—¥«æ4…ŒÀŽÄ”S$£ˆzwÃi±†¿Ô‡-ªŠØŠÉ‹£g Ž„í)A„Ç©²AK"Ž©NüäÛwÁâ[„ulÁ]…"ôˆò8RÄvu"!À`JL‰$Ùƒ‚»•ˆâ…éßÈ]5$ñ¨Â`Œ=;¤®íØ´¢ˆ¡$H’éÓ Y„ù08ëvíö˜·{—†ï„ ñHrá "…Mm€^"®rgˆÞ ‡óÁßÅêõ©*2” AéR"¸"Ô,R8ôœ*‹r†Uþæó¿‰ÅéE?šìTô4àGËPŸáe E¾â¼”…\Ü…L—Û¥(ƒú«`;»Q®Í“Q‚I‹S› Ê—‘>±)%°Â\JH`°,Ƕ|4-ç¾ÍõªŸn% +¦àùa$A¥Q¤íw9ØJ›¶âÄÁ.îBìoáœÝ‚Û^÷a€¾çÙµrAé{Ôöa Æ]Yåö„—©p»OlØ*:T8 .aóåƒ}!œ…"òc°YC.-» R½~¥ª _žD„xȃ‰a÷1%$vm°,Ê‹€˜w#²å4Ö2mcåÖëK€&’P åI]ë—†J×+fUVÃfÔò¹¤Êì’7ñZöG°K˜9^ƒÞ ƒÀjÚ:ˆ†£ˆQf4  $ݯ³^·Úlä]4þîIæ ¢•zÊr|$-bë¤Q,%];rCäx¶q¨hæèçoY›Y¿Z 7þ£ fR¿ÀÃa”¥¢ ¦cxK×ö…ëÃÉ~ Bð‚‡'+In¼>SýꋺÊí“´Çó‘ôE¶2OѼíP~ˆÓ` t•WÙKÚí¤Š“IPVÿÍcÈæ GÅþ_÷£ÛIb T²¯ ôjÙZ“ñïç O›öÏ íËGƽ«´¯Ã® êÎT<’ªsm210CÆÔ!<¢}Ù¾´ÒûR‰å §ÕJAÁ¥ÛåþxF‚¼lwÊØŒ9 ÜóÖÝ«.h3À:\ VîH^Íi¨‹åEÆ>ÉñBdØ·YùðWäø¡ÏÜ˼قÏí}‘»vå­s×þôé¾Zlbîì(Šdäb‚rHHXLÁ_?‚ J¤Ü‡—¬+‚GaK8JGÿd1ÄB‹cäË«M'­¶mã38i…3¢7­~DØBúLxgT,Í$‹9NÕÀ¬Û^’­ó_z d:ï\/‡<ó$}àn׷ƾÇëùÁ‹}° ?êë/ ;‡Í£³æë,’7Kç…Æ×ö-ÅÇÓA'<5áùô¨ò7ž$ô‡«Õuµ]ç©MÏ-ÅÀd×¹!Uᕆ"u‚UÖÌÅ·Íéíá‡g^lŸFñ,Ɉ FWìS®TÊ·ùæ”QÛ¶QäýÜr§6èÃAìü0Ô³³öëìDL±eßö+¹Žh¶N¸^BIŸsj›·KT]!Á¶ÈzÙ ß%4ƒI÷¶@íà›ñW«G%|X–›ªÔ™R㞪„òOéçÆIÿ¼?ÒÛýâ;>Ú¾˜#"ê˜è#)©é©w$£ó}>Äæ<ÖŽÞGïèCv;ùöyeH…‹¿«¤ºé‘|Cob Ó8¨þ4mŸÌHÁ¸òŠW\©‘ÑFd4NâsMØœéðtë]×j~·¿ä|)ˆ*M+A˜è’fùµ÷ꪓ¦Oó#*Å»xeEnC‘º"÷JTê=Tª¨í ]†×¶•Ì¢¾çY>åLRJu7~½ß¶•Ö¨´F¥5*­QiJkTZ`0߯Omì¢ó ¾GÝô&ŠÔ¨ô:*un‰J=B*u”ðm£|êX:« JÛ·$e.[O\mB¥Û¶Q£ÒÏ •f9CjXZÃÒ;€¥Ú° Kwn™*'ãʼ¼É4 Úl] s×Þõ+¨¤}è&Ïeò-Þ³›ûC.ƒ¢‘ˆï#oßQûˆí»lß sfÔØùag#’·ÃÏ«Ä1Ï“¼ó‰põroQs0KY§µxýJx{›[ášÈÜ̬ìi›\†åÚ7ÅåÂ(ÈSFíLjêÑ.vô&ŠÔ¨þ1¢zWØ‘°Î80 [T1ߊ8G®k;L ¼ ÕoÛFêkT_£úÕר¾Fõ5ªÿ,P½÷Ôføqâidãô&ŠÔxú:ž¾å97 ÐîÁáiO:„낪>SÜ"J!‹áZ”3Ø Qd‡›ðô¶mÔxºÆÓ5ž®ñt§k<ýèñ4´×ìvO÷µ2«ð²ì]9Œ|¤vÕ%ŽJc°oö5_F€3‹~Š V6r;ZõVÄ=™õÓ8 t×e][wŒ‚†ŠZ¦à…õ~ä ååUºêùŒâ®£q¹ÈàZ\7MZØrxÞlš®·ö^%#5ÈǶr|¨%ñ¦'âx„jÖ¯Py~ïÍB¾êycØrSµ!sÉ'ß?iâsó}v²sw›*d_K•qÁ'Ðwä\ ƃ)™]Í6 eº+xª¾od*TICo3ø(l<ùúìYëàøèEûå—{½x¨ö~œN{» vö@÷ú#°’úÇû©PÙÂoIJa¥žj$i¯šDXUÓÔ‚ÿÐcºØXËnÀmK‚m“½¸±Ó¾zvööÍ3èïhÀßþ?{×Öœ¶²¬ß÷¯Ðñ‹×ªŠì¹é2©JÕ!€9–°ACUŠÒŒ$ÌÅÛ€m8{ÿ÷Ó# ¯xe9‰â i4—îžé¯{zÔ÷¢v—'q~Æpï>¬pí|­“‹[q̇ËrGvx[~¹°œÞIGŽe×ë8mÔjŽºuRŸÔÛçC·]¥^!¯}Ô:õ;oRº~y¤Î¼I¹Ûð«Në¡%èÉmsÔpGÒòµ¸ÌµÎ*Σ7©³’ï>xm‡¸~nâôЕÛ>p ¹é¿âÈÍçæåÜIZ.ß}>Žh|2n\ÂX.OÚŠÃîùc£ëu]â SßÁªo^¡þXo!£áK|ê½BØ-$jt«ØÍ;§ËÇA-ŒÃãÐÀCõ~Pcv}IJ…›‰[¨½vñÁŸp§pΞú™{µ•OòÀ¦˜ð­¸b«³v0¸þ¦å•ñ©€\iO~mØ_iç#!ûZ0Ðö®Ø×”/V›å2Oý…kû± rxlÝô’¨•ñ ú6…ÚST˜û ¥nS-ñÒU¾4ùÿs}#Ü~¹åú„Ú¦n3íÔJSçOm0JlÎxÔùŸÝêßDÌç4TÄúß%:.´ÖkSÛm³¦I^‡ Sá:xª¹ãùl&”`7»Q0¢õGC0]>jg]‰Aaìlõàþ¿4­RÍç‹•Êǹ+™6ÁÀî¢ni‰lük}ÿù{«EÚÑÃy;³„pƒC+°±×‘³ˆÁ/Ûz“€`Ó‡Ä>„~´† ,bj ¶ÑèßBXë!W…çdREü‡î"lý.I'·Û[q+ɸ¦ó£?âù9ÒugFQúÁU©®žßõUÁý^_—³†6nJ<§Ìl»aý+/î(`#Ýæ’é,0‘Î9%:Ô eÌ6þâWïdÙ–ä(²爰È2ˆ!¸%hÈ£€›ŸbM‡6g1a!²‰ÉB* aÚQÿðÝ€7;×å¾÷¥ÖÌŸU›—¶ÙtÝKeúçKîYÕ/6/J§U·ØÌù~.ÿ¥Ysü/M?w¼¦DñÒ/z…Å•RþkÑožå¦WusÍÜÑ‘ã9~}ée§äºÕ¦[*Oá¢ì;¥ÅÇŽ›;.6ýúôÀuÔ“…žV*EòüÖâëåb%_-6?],Þ=.çξ8ùÊ´ÕÏ¥ü—ʆF˹ږ7½’·Ô\Å/•Õ«Ÿ«•æQ!¿éQ%çç6 ò«³øÄò]8G3ò¸—pƒ®˜²Æñübù(—/®eÒrMES²nâSÙÙ8ÒD›¨òœf+µ¨•|ÅÙòrÞ)—«K’ìÁýÅë Ób9uV6S­ìŸÚ˜òͼ"ùª¦õâ8•¥øÐ)¿XHìŒ-­VÎrgåæÅiÎ[#8dIœå®›ÛÈ}¼4 Å æLcÇ{iúŸu³R¤{ß’Ï+KuSåã½ ¦^Sl¯u“Zæï Jâå±`E€E׋vÊÖ}µ\|RÐbs°mÌÿ,4\UŽs°÷wáºç(Í ØJÁÓ`$T¢i}øz. ¯%|ú"èŠ Ll2Ýä¡¡3Ф. né&FqlpCDâ/†`ÃäVlS‰y$#[D¥”˜hõ“m(4CÊã¥S#Ä G6 ßtá—@×_ãõJ=J6£•5ÚS85s$ËÚõIJ¤i½ã1¦; !…Ùfà<ý.!»lô&È`Èäú4›¹ÞT"ëdsuÚeX0n[wÉÑt‡'ÙÁ…-‘NŠÞ‰Wš-qäuvëþ<ìÒÛKû¦v:ã§û¦Én~k0mÙc]*;íñwr—Г×2­~–±}a£ l¬hºÏ›¶!!%¸`y` ‚ ƒÀ¬‰L[¿K–™t?~ú6°Þæ\ &À ±fYÒ´bÓ`æRÔΔ§Év2ˆÐé_¥‰zám_¥h_Þ¾ê¨]á½9lbN…A€V, ¦-±ÅXÚIJc¸JJÂüº‹ÁzI7–ÓÌô{‰î»ZØñM.J½¤òÑ]g1ˆ mUŸrNŸÕ±ê!$œ€­ô{BFfãÁ6Šdq2âWgd#øçË,€°P1løcA/lËÒÍÛÈ6—/{$v­#ƒŒd|[ÈH VÉQ,blÅAlÙ,‹1ˆ©6XM •v C™3¶eKd†˜dPóÝAMŒ2¨ùn æNÉöK&ZK •ý‰!žàvšb5_Ä4;Äöä˜|0 ã÷„½ÆÚ”oOÉ`ï*ì%¯NDüóyJ9±-ƒð‘Ú?•&×n„zÄ„‰$H•ˆ£ïXG{3Ø›ÁÞ öf°7ƒ½Y&âEF?pþ›ÂRF×zcEÌ –®ƒ¥ô7€¥ „° ¡Ç tÆÓ ]’Ø6¥mƒÎG/ÁÒ]ëÈ`iK3XšÁÒ –f°4ƒ¥‹ Ìü€0ýa)>@Èl£HKWa©ñÀR âë\HCgB‚ð°ÐÖcy†e™añâ±…ëÈ`iK3XšÁÒ –f°4ƒ¥‹ Ìþ@èo KÉzX:§HKWaé+ïb“ñŸ/#-%ëÂF„'ŠôÀލÎ-‘X} ˆó3ÒîXGK)XúRÒf¸ô×Á¥ÆJIËÞ"%­$£à#‹ßMJÚ <¿mJZlüÍ)iÿñ¥o¨ ôñ¹ó@Ü$:7U+‡J)ÏBsù ¡¹ü¶ÓNÙ`E2T¿ŠêíßÕ‹È,#ݰLCg‘TŽpKBÆ…16øËßÈÙ±Ž Õg¨>CõªÏP}†ê3Tÿk zþqë7ý*çƒmÉõ* ~åWÁ6­ŸP‡& +tAcÐà44uŽÍPTdÙQ‘—õ®ud€:Ô Îu¨3@j¨/çûåj1[Hä¥ã9ìÜv‚^t=ÝÛN¤@ØÞš7[Š/=š³vf7ô´ç­{ëÄýî¾5èß5UÓóü¯nÍr $‰/t:ù7n ^W>¥xSåÓx\fð-Vu“¶)¾¼ ›V«»‰îzQgÚ¹µCºJ·•è÷‡Í0ºo-ù®ïÃ`]ùD³MuÕ ß/ùᔢnóIWÏöÞά2ÐJR€‡`mß5§llÞvF e߀–ƒ ¢oZº¦ÃZ¢)C#è…Úþ×êçb¾ä9ÇŸ¯ûÝèp2u`Ý9„•øºÕ5©.nF"Jg¾Ö—šÞÓæ •v7¸Ö`)Q™V£Ñ@‡ÿï`!SY±@ÉêHƒÇºå&¯ûÚž3þ\­]|†ö¼NP{¼µ Ô¸<‰ëô3†{÷aÍ€kçk\ÜŠc>l\–;²ÃÛòË…åôN:’p,»^Çi£–7É=ºÇŽáN®†n÷¨åæª×ŽnNý›±[ÃFÁE^ồóÇFûºå´Z‚žÜ60GA w$-_‹Ë\ë¬â7/çNÒrùîóqDã“qãÆryÒnTî´åƒënÁ{ìÔ?¹®·sCïøèº‘G†ÛÎÑÓÚùú‰<ßEn­Îê-gàtù8¨…qxÜx0.ü Æìú’” 7·PŸ”üêC)ÂÂ9{êgîñ´»z*ç’¤\î¶Ý¨u‚àNx|1¾$ÞCx9hÉîÅDЋqT(Œó¡Þ¾™”òh\¯9§~ùº^;–|çÁã %д ý=ê–ŽÖiþä^v;½KZ¾LÂ㣡̫1©×¾Þäˆ;¹ÁnáªWrÆûDÓ {p ór0ž¤Ü»à}ɯoä½WpÞï‹ãÞ¯Òê}?4uýs´YNÏÙ;’ÓG¸·™ÿ~ñ=ñߨ2§°WxGüoÉfþWé;âÿØ[œS«üoçRþ_}ú´§ýGSÊÕdšÂïJå´™/–ýfÁ):Œ†òðI5‚«m µß YC]ºõÂN”(Ða¿ßÑÀ¶¼ÖR:˜;*WtêS•«¹ðG‡ÁmKeÄ|€ííkýž¦ ˆ¶Om0ÉÈM0á[qÅVwí`pýMË+ëS ¸Òž<9Ú°¿ÒÎGBöµ` í+\±¯)o¬6Kjžz ×öƒå~Ü[7ýƒ$îC¥þ‚>¤ÍF¡öÇÔÕÈàÜÔqª%~ºÊ—&?à®od5Øc]#Êù µMgÚ©™¶ÎŸÿÏÞÙü¸qdÉi±§\‚—!ø`Uß\¶!½lI°dÃØX ª»«G\ócÀ&GR]6@€ä”\ƒä¶È1 [Nûä/È-—䘪bók¦ÉiŽ8#ræ°D»«ª_U½÷{¯^5Å4:ù´ÿ§ê×õ„yY†AXŸ®Éq¥µþÛFéü_n–â–'ôÝØp6¹ÚËIµ=?›OJïwÎSï…4FÓ‰÷]:gÖ =LïeÖgoèËÞh<ÿöÑ£“çÏ;‹iæ´&ÿ`c7M\#ÎÍöÏ+û¯=à-ƒR˜õ~x7x&Ýo²ÿÉòcüq¹‡óè4nK\õV¼¥ >øNAe <\ÜæcëE0é ¤Íos·€îøBhMÙ•±ýË» ƒÞ°7˜Vw HW\gß\¾ŽoݨÝ5öÖèœe’Ðvͳð ë™å8§Ž¥éC‘g³\:JI”Î”Ä éœ6̲ìÖö{^>•qúØþ›I ~·ÈK¼e鸗¿,¹ø&ë±À«[¬zí‹ûb;ӳůôÆo}¡’ʬvIwÙ‰QAèJ3!Àº¼!†NN×.'óïæ!i½Z°z%¾Ðì8ŒL¨¡×o)Ëù²<¶;/ÇíEæ¿§¬ÂÔO<”PÞ;Îý'M4ÊsjeIøÉÛòÇe7®;sÙoŒæÜÜ…ŸþœøÿËd÷tt,V&‘Z#&Ãnaª1²)ËQâd†­ËX¢xˆªWð “-føý²Å´ÊGA°Ål1`‹Áƒ-[ ¶ø¦l± -ŠÅ½²ÅÊTI‰‚`‹7ØbAv}’Á`ŒÁƒ1þ@Æ8&³„•ÚÛJ÷&íO3·’#P^ð>i„³*ÒÊo#1Ke+KW2ÚÊ’ÕÜ·Å­ëé‚eñÙxô¿(vHS,o¼”"Q–/ÄZ;õêý¦øˆæ¦¦8§œ ãgÓ]›áÉÓÜëD…ˆK’„#“ÂU®ÏÀ›9‘ vW8ñtäTæ=®7æ'£WoÅ6VñᎿ(d <<6<ܼl*±p®v¨9KSŒ$ÅÚ+ó,A‰P̯-a‰K£6[=ÎPÕ@s–ïmë"¸ù<^¶ëׯsyî‡)}Þ{y9dë¹¼¥ÅŽz§ðMM‡“æ¥¬Éæ‹W®1Mlß›ãAâÛåÒt7æe¬¡Ó⇽ÕTb/×APíÍŸ~ø¡æÿ«Óðôüpœº±ÿÔ ÿ,'uü¿+ £ìæØõ=x.¨ßßeO×z6ÉטWxS^$3z§Ñ¾ëöö»¯Ë{ÊÞž¹q>öÛÝ—ëIü“毱"êNðÕóQj×oûZ /Î D”¹™ó²#p‡ë1îÌçËk©òÞ3tke°+uW°a™¸þ`KÃ!(-¶ b¡1 ÄÑ!D½%´'¬à–çŠ"“{Uç]5†¬M¼³NHæ}¤$ϵYʼn-íTQÅy˜Àñòu¸hÌUJs&dE"uŸlväú­¯“`º»_¼é*ê‹É“.¼¢+ò\’Ƴ§Ï¯iƒí4ëMbÊißW]Dc»a?Gâ»ì¯/™ÛŠTÐÜHä ÷ J2îP®“ŒgYš'ø½z2­‹Qʱà’Ñù2ÝeY/´äʺHGq~ÿùËw7Eïm».L½25’‰” ,7)â"uH ËT¹Mµ4MY5º(›c·€.d¯èraø·2J©±Ê(·±„oÆ}© ÛBIÿßÒµ¿äÆW¹û›¸âî¸ö6j’nØ» L+¶=28ð{pà)Á£óßW×I¥\½`Æs]{!M'½~[ïÆ/l¿ïåã]?ÛoŒÝd:^ÔØ{h½a\¶œH^¾¹zkŠï–/] N7=-¹Ó.к%íîŠ_åí¥kýôÉÉó_=}_*åx|ÝžÒ&.Ã!‡¹~Ø®KñÀi—МgHb­':G†[ÿ‡©È]¢Dj6[ e}”ËvG¥ÎŒ¨LEU¸©Â‘«­km‘ZóìäÉçŸ|yGü•: cßnM½~ÞÌÎ-¯;1—õíš[¤ÕŒ{§§ñ=‰óô¦¡{3鎧îW+¯bZÉÌ›W6ñÈpá*7Ì.”ä£qºš;vµ3¥1fÄìÇ™25^‘p,ÎTý M«b›DÀ×ÚG¾ƒ³qÇçlí@mÇbäŸ>ùò)y0ò{4òóÓ€(si/èäÕ^oènÞœíßÁèo¹½’D crOYÀb›D€ªX€ïÊXXàó@|Ÿ×Éç'Ÿ l¦ºï­Ú&+…·l•øvÕ}¥©·J(¤ŠBPPPPPÈ]¤"Ì]Löúd¦ ¢|ø~ ìáøà˜ÓÃv]YµÒÉ~Zžîî ³ ëѸ¸í£ÝñLÿ'mãvZ{Þr¡·w{µÁVιF‹4W ¤¨Â!ù*÷Ô”:d³ÜSSFušê%™íJ„·†Q§ýQâ±n>ÝÖçØb¤g#<{“Íeʃlç×_å¬wÞË|iò6žùÚy>6ÿ¬¹2—#±@ÛoN=ýúë“'%Üî ùV僺ýOð{ö×ñïrrÆË øC¹¼‹øSK|‘yD±M.À<û` GÚ›yj-§JЬ¬¬¬Ù Ö\΀Ýgìhc«h1…Œ’ž}öâѯn“6¼ù'Hæ.où¥LtüYÝÙ2 ?j{6Ó)^€©[]Ñ‹Lÿw/o®(”®®®®¶ÀÕÊ),«Û«ŠÛÅöM9AÔ}ŽJmxUóB.•Ú 81 ààààà´œVN¶8m§EjTÔÑþïG’£TKb|¿w÷p±M.ÀQU¥€£€£€£€£€£€£€£:´¤f÷›£*¯/äUÅQ8 8 8 8 8 8êÞs”î`ÒÒŒÀ¾^¥\(pT%GñGGGGGGGu0k"!µY.ÀQUÅ€£€£€£€£€£€£€£:XÞ©WA^'%h±M.ÀQUyæÀQÀQÀQÀQÀQÀQÞ ê%ú~ïëñb›\€£ª8JGGGGGGGun1Bïõ¾ž©ŠGE¹@žù&Ž"8 8 8 8 8 8 8ªCh‹³{}^Yl“ pTGQà(à(à(à(à(à(à¨á-Aïù{T±A.8jGqà(à(à(à(à(à(਑-y¿ßgŽ .¶É8ªŠ£$pppppppT‡è–÷;ÏœUÆ£‚\ pÔ&Ž‚Q¶OzÅe±;{ånlCqÆ×ö¬ü8÷N{CÛ_ìä HÛgÜ€qoütèg.-bK¯^wÇÃÓŽí÷G¯]”Ú‹ñÔ5ß½[fÒV¦Ñbóëær‡ z{@ÅKl–ycS¸Y{Û'¨w/¤$~z¢¡›¼œJ©Bý?xYah„³×ÞoÇiüô9:ùþzüìygžÓ’÷Þ¸lý;ôõg:›vç•ä¶Cd‡¹NJ;Îvx^†õ–­(?;çáªæj‰œ—\ž7qûæúsfg%2Û*Úߤݭí—3Ñ~þè‹N˜˜òÞihõëÏž|ûÙW1sh<: £_ÎÌr >ûuÇžÛ^ß&½~oò¶û^_ÏvÏmLáŽ5u³qïÜ-¦¤/ÿÑ-v'Ë=V_áóo¾Cß>ÿ²Ó·Ó¡7忉hãø_sý¾‰üj¹˜^£:w:y´[ßÞÌ\n§ýÉBᡞ¿ð3Ï?v»‹1½Ü‹µ¹~Ñù`yIˆ·Ÿ» œù¥8^\û¨@~áºaæ2t>êOž<Ë¿}§'a²Eþä(ý1þ+·ýÂ]Ús-obOg—襁îi¥o”¹÷Ïo”7å#-Ÿ@ù(3²k.9:NNÍT.3”qaWœYSçh^•R±|FÐ9ïKiRð£ÓFDy“£]‚Tšäˆc§‘¥Š"¦UB%q©°ü*mT·gîUcU„3ëÔ´s8“SN…áX@4¢™×‰fÊŽ WF3¹¥h¦ÚG4“˜Ž0–L4³ÖÊ¿¡hf½¶+š¦ D3kF3Y‹*sðÑÌšœŒUÕùƒðŒ'Wq2»ûÑLbœdy"‘V#γ Yì ‚Qœ+«IveRÝ: šy³Ô¼{4³–æ¨Íd-mÌážN¨Ýx™ô?Y~Œ/2x8_š¸-‰*¶=$fïCSrƒá ú±A¿zýTª¥Øþ›I‰Žálðê«Øæf…´ÓI?sm÷ÆÎú.,ªèÓ‡[–îyyvwñgîXÐõnZ±Êv‹ûb;Ó³Å7ùc%•Y/ì’pr9Lâ B¡+Í7lyC(èž®]NæßÍW½Z°z%¾Ðììœs<ò½~KYΗå±Ýy9n/ú3?¶­¬Âžè J¨WbÜ…—êh¢QžSk¬Wö½Ý%®Ôn9ºîMÚŸFs1æò‚÷É›ÕPùå7‹‘˜ùõeéŠ{_–¬·®ÇNÊbïiýÆ/Šb6å—ü…²|!ÖÚY5§8†)¾Ÿ)n±2‰Ô1™ÄS‘MYŽ'3l]ÆÅolНG ïÐ ¯í¨$?ÞÂÔþ†’—h¯OÝT&öø§`à ïðŽ/ÿÝ0!œ`¢)æ(x˜H³|9³ÊIoh£Žy(üÖØ4ŒÆÍ2!jùë÷ñòûÙvÌtÈ VLdk™#®DŠ4eþ'‰¡ f"eæ=ÿ ã¡í¯'~­X” æâŠ÷rº’S±Ñå£qꋳÑëá<Má!‹aÚw—°øfõÑ3’c¯é%¢ÜëzΈ@ ÷ÏŸ…×wZL¨›½Þó}ûØ“ê±ÇÆfFN‰qK)J°4'–Kk…0"»Iˆ½ ê¢ÕÇ¿š‹Js¯¤Îr•¢\d~h§¼²Ò9’Ê;•"Ü$|U ó$£}ˆ€ÝŽÈ"Ð4SÊ+VD­ð"ð­!c…CiÀO¬©aJß”øuEìãïNÿãwÿÕ§ÿÜýë?ýÏ_þÃÏ>ýëy̺d–îYzÚF=[´‹Ôwtܵ×~ä§XÐV»’ÁÚïñ“@ð³†4ÏW¿Gÿþ»ÿðÓŒ}ýïßÿß§s@} ½ü-=ùc/гßþýöFÿö‹ÿú—¿ýþ{ù'Á5}à'toøËyæËt’ë?:{;y5öG§¾ƒ§>úíßýï%À¸…=„ŸŒ*Ÿf¿P¯ª²0–Ï P¡ÞÐ\+ã,rœKÄ…T¾(Å(SÒ[|ʨÎÅ•!úšuÔÔÔÔÔÔÿ?{×Öœ8¬ÿ 5/û2ÎXÛRªöT1„É0 ÈõÔ–K–ä@†Ûb —SûßOË0ÙÉÎf&~HÛ².Ý­îOr«ûúuèï×Al«^6Š6 »—²´9ö/ïUbiB”‹ 2Ìbš™$paÀdˆGÞ6ȶkd{q¯ ˜¼˜:¿Ô*³ÒP5.«.;Ú0ú"$êK¨.B½Ÿïp”­l´«-œ¶E‘ãZ¨<B:ŽÒœÑ­‡£v­£P^;ÌÔµ:,W,Y|>ÏIxñú3ýɵ€3Wyvûkµ~úèÑâ`7è!Ûü¥@ÙïŽâ#Þ(â²=„±ÑT™O/,·sÇüw]+ì¾Yy+rÞ¯aî0±p¤0¼ïù×Aæ'÷§ÑÜåaád‘ÞL,²÷òEñ !úiÈõ²›©ãEÖÈ­I6ë›êÞPd遼•?ëg§¯ã÷Òƒ×=í›üq† 1•Œ¦~wcºŠ±ìJÝ1×wcÚÅ^GæVõø²b ûÚšÅfz â ïÊõ8'Üd8ö†×÷É9[ÌûT³¥Šgƒ¹˜«®Li.ÈT-=Ò0 5YÕ¹UάïB‡.‘DI§¶3U_óÆVì_Îj¤Ú;Ó|s=›X“¹ö_ ©j›¬Gæv Vä­ÎÖ&&h¡ySUš3OÁMf!òº4‡ty#”š¶œéÉPòåʼ9ÊY2›)¢Z{<·¬ËŠ{YË–ÐOªó&)ET©}Y²´)ÊyŒÉòøjÉÒ¬XÁø¥†6µ«s¤“b•šÃ¬Çø+Ã.)f[˜Ï%ô–Î9úóµi‰8ìuï!‘ÚLé–§ó¦Fã¡É2 «Ó]Öš +ÝIìÜ`;ÑSdz½§|æd*¡=Ì_Ï~Sl Ö­vµZ_‹»ï }4¯e]LŠ4œ‹©Ô|•œŒ‡=ó`0´äÖ€¼«”É6¦Ö¿²=0O(´Ž *¤gñÐå–äW’(ÍÄ?t>aežä¶ö0ç6¦Ús°p/ ŠkÁÝßÃT‰H¨§!¦ à—K‘ȸÖáß7úq³síSò(2ŸÏýÊñ©ª^¿0ê¯Ò¬Ÿ¶«þYóè´^õËív¹òÙ?¯µ?ûíòášÕ‹vµqÐjVþ¨¶ýãJÍoœÖË~ùÓ§Z£Ö¾\z¹Ö¬×Oýzó z'íZ3ÿ¸V/Výöå1ô ^3Or=mµªxõVþõ“j«rZõ?~:Ëß=<)®UZi«›•Ï­ ž”ÏŸx³Ñl,5×j7OÌ«O[þ§ƒÊ¦G­r»¼iÔòO@¾³Ú§Œ<õ ¸AHYSk´«'ŸÊ•êZ&-×TEé×ßy÷ª•Ó`ZýTK® ¯Ífû‰Þ¬0+?ÆÓÖÇUÖP´¶ÍöqÝG>Þ(åÓö&¡øZižãÍ}<®ÀõÆz ÅŽÖHrýô¨]Kɺ‰O'µCÁ¾½‰*«4{$QOµUiÕžx¹R;99]’äÜÏ_—+•êQõ¤ u¶6Sí¤}Äá› 4ªø3­7§ÖZA:Õ®ø•êIû‰V[Çåãÿì¨ÜX#8xIjË\7ž"÷áÒD<¨žÕ`þÀÔ9¬5¶MŸêJ7[Uò΄h\QÕþµèøH›Y­wšt½W÷E•Ž›­œü¦ï£ À]>vÔ‡‰AP´Á‹"ö‹ÛÇ9ÞûqŸœ¹ DÓÀ„B±&«è3À– êVÜe¢©H2ËÆ&Wqèi‹S¿l@_”+!܈»Çå^Ȱ ‰D\KÍíB¸ƒ(vþ1a+W†Èñ^H…(¨™ýâ'´Ñ6ÜõÅx=Œ2â ¥¾žt†*AT#E·Ã±Š5‚‰Ÿ—PþèòÀÓP³¹ßYôÙ¹¯Ø.1·w‹õƒ¶CËaoÇêë~,ɳ.ƒÎuÇqìÙÜæb’üº›op©šw‡Oîχ‘†6›£Îm<Ø¥·—¼ÏX2-Rï³8|t7Ц›=Ֆ˦=þBîU蹄Lªüy²0D°ÌÒK_nµH‰$,>­ŒìÑn€¢ó­c5ó.·q®õŒóÀÆ¡\Àš† j¶–½Ðu¨»&>åi¿Ä_ô†×IGô@†ÝÁäQÀãëž ›™sN$ q8hEq™DŽ‘dØc!\Å%kj(䊟ê(F%©)¹h&[MÓq/µ:iÕJ9geuì-¦c4“ûs¼¨v¹ÎäÈý†AH«»Ðø)D=,xËC$ˆ'™ $’ÛÒ mð=CتO6äÏy·±@‘œ…’jè>2Dˆa*•˹›Ð"ûh‘„ÄÏ1>¥AL— ¼ÎI“Ö¨ÒŽCmbíƒ4)NM@)C2 ™û2œŽ$6ð—y°J5®;1y¹÷”b€ÃÀvu@W0mƒ–D3&ij_‚ÅÏpîØ»Rr©vÒÔ&ˆ‘0À`J̨¤ÉgƒŒ»9ïâ¥á?É]=Œ‡ƒƒ1vmś؄’0@( ’fŸh7ñ6'ÍnœÃ.wwcïJ÷‰ÒH„R^@e`3Û¥ —¨£‰±ápÚù—˜½sAE*É (‘£Ð”‘€‡+—äù›%AÈó7ÿS,Žn»áä]N_P@^(±TTKÂ9p'xi*¼…â&w h‹õÏþ.vv«,<§q(£!LÌlJ((O å8‚»ÒsÑ r2ÒMª ÄïûǸ0(Í\J‹ºX±ÐThf*·‘‹–”Á0Yn/i„„JOÉË|—qAK¤ÂjÀfŒÂ s8(¡ƒà L@êáòÝ´\lonVýl'QX3×S¡•Ʊ_Â`+m ØJP‚¾„Ø?cvnðºô\Ì® ”¾Ëlc$™çöÒ€W©ð»1`Á–Ó¡u ‹/ì \¡K9‡År(,ÑøK*kõ;(•gøê B$  &¦$¹$vl°,Ú ˜/#²óal2díbålæW@šHÊ´ ´+M† ¦´ÉrÄó¬†Å¨Õrã<³çxŠ×²;€UÂŒäx z#VÓ6®4…œñX³J"è%x´ºÓây'f¯ŽBÛ–°2˜€ž"ÜóLøe†h¨•ƒÅË0;Çfåä>5‚˜Ûÿx/N^ä§àÏi¯§L(¥­”þï·d;ˆ¹@Yæj‹xÈlIb1@)––Ž: ׎÷T Lùg&u2¯Î3ŒÅ[H[,¥yA¨~wD3ó§#xË$‚ûýÉ.¥xi“'ÉeoüLh×Ü4éq~‹:b*ý”¬Â[„Þµ+ #¤•÷ÉKfçÉT4OüyÚ Ô™lÑQ5ȶL;¦žñ5Þ7™}Œx-÷)ÞÞO)æg›mfŸxÓ~^dÔ¹ºÆÿ*£î¢CY‘H_«HBÜeÌu¡ˆÙ–H–¦¹ÖWr3ù£Y2 ®<ž?éŽfÔOó}ù‘Æ}N;ÏÜMÏrŠ2Úô°ñ›‚É;÷ š¬EYciv2_L’M½¥!¼½+SÏâ¤ãS¥ÆzÖ5_§ýÁÔì‹ú»4w5+…Ãq)Ø5Ó™¼÷Ы;܈—·åÿÁá©Ù³éÚ³Aóÿ‚gƒ–20>+::baîÒ\*“$Û®i“üéKA¨lÛÃE]…, Ë7+@ü ‰§<ŽàY²™LúÔìg!wQà&âß?îãű·ÃKíÓ„ÁâÞu- ´´¨'™Å<Û¶$}%lE€´?ß±«96ÖŽ…<`E:´`™®,.)¬×‡ÎÖ0»Öñ »Âÿ™Ñݲ²î"}ÿ~†Èzñ/eˆÜ­í2Dîžg1F€Ç"N&ùî¦õ¥Õùëºâ~™ŠõI¹ÀNqþzQv¡|ÉÞÞ"Jq°÷±A{n¦â’Ÿ/:¬†HSi‘øP.FŽ%0ó,O¸AàÙA뜭Ñaw¬£8ØûÐåEÍÐwÙÅ騧µ£ƒÿ69x‘äûG&ù6*qk’ï´ÈR’ïב?û—@GÏËŸ½.wö3óf¯>ß{cÖë4®ÛÓy¯ƒi·§V‹,g¾¶ÿƒÌ׎ó{ìí¢F¾5ΉR ÆÇ¨ÑynXüó…ƒ!J»ŒÇBÄG‹#/t„íÊ ™Þ†w­£@j|YÔÈ”­´ÐòˆXmz¡q·¡žgã Ð!¡Úó`ÕÂ'$p'D°’‘²@›¯mÒm¾´™yZþ÷ˆs$n?1Þä¼RXu+ÀþŒ£?K-ÓÏL¶AÔ5m¤ÚõCq—~ÿýæ·3²”D”p)Ò&æpÉT¸¦'ì=çÎE¾xÏå,Ú@”"âZäë>ùþ„û¥N¸Ë9·8f <(DSgy\¢Àñ„³ ùîZG| ä[ ßùÈ·@¾Ë%vÿFþ bd¾oã÷6fo™ÚxÕ /O”™.!S ý©ëŠ2M-áHd“£Õ±8s£ŽBÒ³·!Ó]ë(iL dZ әȴ@¦yfÜ)ù›õàċօÙ2]‡LÉ@¦6Á„a--s×¢®ÐC6±< _*0ôbkæ«]ë(iL dZ әȴ@¦yæ½·1yÃ{¦nôQ dú™:o™2í1A²ò˜EóÀ *a*T`̃P º ™îZGL dZ әȴ@¦2̓0þ“·ú5ía›DˆÂ dº™²g"S—òŸÏÏÔõ8¦Ž´°G) JŠ-®ÛÈ=eÂãë­'¬v­£@¦¿2M"Ý䈦/MAݺ«ÐôÝ3<&\YdÇ¥i…qda“ÐÞ³÷¼2©ÂIÃÆ/—ŸYõre¿/¤ŸUŠ}äî½ïÒ}ÏÝÇÞý l½zØ,ªØ¥$ éFLþ#L½)ÓèÎ§ÈæÇÅâ3d‰Yù`Œrv€ ¹O ãûÈ~\ôv½!l=E”Ù?Föü {1ÀYXÛ¢4ô¬@ºàsìÙ!å€&¶úéîZGì d_ ûÙȾ@ö²ÿ%=Bïm‚ß,¦fîºÝòQ LýS£gž}ÃÈõ~:LÍÀ€¥Àµ©m ,þ Z ®¶úqìZG© L]`êS˜ºÀÔ¦†úÊíöɾQf¹ ´–½''½QO ôž¾ýQOönÍ›]×`ͬ솕ô¡¸oÁÝ-3x‰m“¶bG[lÓãê¾éñ@÷Òέ‚èQ|ªÄp8ñ•žusdþ×fJ¬+[¶ÔVm ¶÷ÃQ†ºþÂ~Ÿ¿{Á•}tLñVL í±Ÿ²Ñõ¦`eö ߀–Ñ^ "ýg)Ñé KJf¡!ªôÛ§«•fãSíð÷a_x˜N{ö@ï|MÜéÀLš‹oÓ@'3¿4”%kPš+ªÒ8ê”@•lèèidÁÿ1(2“ÎŒ¬e—à±%Á¸Éΰô®vÿñôüì#´×è‰ó»Yp~f_]| /ÉG÷fêÜëÚ—ølòÉÕÅIOöøü|æÕ_zs$û^íÆî^µë´Ù®ÒÆÍå¤~Óé_¶l»ëô¨}MêåÉ%®¢Ëó“NýðëCã¡Ó­uo»ù2ºBÜç¨'ÉI'¸(w[µ»ÆÃ%ÔU¿m<œÞÕ¾ÞÖöuýæë-Ô“þU§õJyQî )W鯎Cß¹¿º€±\|¹¹jÕx­úÐ<øv×<¸ÄGí½êW'uӬشñP¾=:ot矾]¶?~«?HzÙ­Eµ>¿ç*T‡= Aþ$Íjeýžê æüÜ+1œZ±®ùÞñÇÒF0ñžnÄ?¡¶Ôpfýž¨i ëüa DZÒ;ÿXQ?ߌ˜ihˆõ¯9:fZëÜ[©ò¿´Y—ñçaÃdrf“jjz>™LJPÈý®–Ã1h!V<Ýeß:‘@t3@ RØÙîÁýß,«yZ*•›Íýé46sØèn¤­xn~[ÚPe·Ûk0MV¿Î>mj’Òx¸çIŽ„<Ó ~qÌí("RH˜Üæ{Еöhh¡rðp™¶#6g©™Üž’Éœ?Ô•€×¹:ÔÜn_µ£vœåzI-3‰e‡HQbc7•Úæù oÒ`ïöúv8ih¥gâ1e&>‡å¯<ýI½€yž ÚöÙ,Rž-dzµEZ‘1‡þ=—€D÷B´G„@„iÏ!N ¼€*¡¥pßFvCÐHqÁ"ÂâÄeІNàr­£îøq«s©“ yd”÷÷ç~éäÔÿÄ]¿Zýd´ÿR½zrÚ*ûgõãÓjÙ/¶ZÅÒ{ÿ¼Òzï·ŠGKJ”?µÊµƒìƒf½ôg¹åŸ”*~í´Zô‹‡‡•Z¥u1÷r¥^­žúÕúAù.­J=û¸R-•ýÖÅ ô Z1O2=m6Ëäñ­ìër³tZößžeï5Š'ï+¥fÚê»zé}sE£âùš7kõÚ\sÍV½a^}wÚôJ«5‹­âªAþYÉ>©ùÎ*‡òT?Á ºX eM aã°X*/eÒ|Meœš/§Ý+—NÀÿ´|XI® ¯õzkMo1+;ÆÓæ»Ç¬axi›­“ª}²rZO[«&ÅÇRýœ¬îãI ®WÖk(v¼d&WOAûIɺŠOÊÊ¡­¢Êcš-̨õDm–š•5/—*ÆéÜL®ÁýìuÀÎq¹Q„:›«©ÖhsLÅêµ2ùÓ,ëÄ©4çFЂNµÊ±ª±¦ÕæIñ¤áŸkK&YE’Êü—­‡uä>š[ˆå³ ¬X:G•ÚS˧ü¨›Í2Ý1ÖÔG[µ¥{z SÃ)AK-¥4‰­C“Ø:©7gpt ÐëzzÝ“€ öFAtHÙÒ(3ì-@‡‹òqŠ÷¾´{ Ô‚ÓO¶ ÇÁ ` {ô}fØD}ú³– ‹È1 mFÇæ&# Ï•Êóú›Ç^ÄIÑ jh‡R*̈ƒÉ[nŽEºŠŠ(ÂŽG©ô"ê(̰DXs¤^wá§p×ßžÆËa”yû¤NÚW ¢šâÁø~âªß•í^&´`âÌ„^L|‚&aãHˆÍ70Ç9 ¹ÂfâIÖÕÝzg|¬i—aϸmb7Qêç‰ÙcÕ6‘Éð®ê­¦™×(ë‡J–°²[ü.ìÜÛsîSž¬øÔ};õÛÃáxµ«u¾lÚão ä&(Ï%dRýПöhâ.5K§îÞ4aˆ¥BP>0ÒÁŽC`Õh7ÀÕÙÖñ6“¸åÓ·õ\ˆ‡2!A§áT©Ðõ"×a.ʾò4ö*Ãô—þUÒÝS·ývo´à†¾êçðΔNœÂV[Z1I]bGG8äÄã\Å%a} "P`ÿ2\ôdg'WÇo|QïÅ•l,AÒªrΞԱh'$‚̪¯3&ϪA„ ´»)¤%f¨D¨‡XR/ä*r{4ˆd7ø–!<¹Ÿ¬È_Ón‰= … ÑEHÈ0˜*W7¡Å$0% TÊ0>¥AL—¼žÄF$­1¥‡ZiîÁlR‚ƒi*9£ˆ»/Ãé8jd¹ç±8`e#&Ï÷^À¦(@®XàJ®ì’X.A/öÐK°ø!7p6Ê@¹L»k†(æ0Ìp2êf¹›^dù-wõx4€ög &ÄEŠ;ˆ"@`Q$P!Ì$¹T»Žz!'Í®\îp7cï£îS¥±ŒBx Ä‘Ë`_bަZ Ì_„Ãiç_bõzÜ…-R…³€ÑÐá,šqy¨‰ri–¿“д,Óñ¯cñð®v2û4àE! Ó!Gž–¼4” ^‚Bq“›,¼Êú{9ûä\X§àŒ° áˆ1 ”Jå8R¸¡çâšÈÉHWmU0ý¾}Œ³É"¥¹KaÓb.Q<2š•*vñÜfÐOTãV›Û*­›/S+㌖X9 =†8g°Â›P@@"@ê—¡å̼¹zëçM…%Cp=…°¥qlä—t$ÈJÄ[IF‰Ã£—˜öϰÏnÀí^÷ ƒžë‚ØEv`Ów9òÁÒ ³Üžðc*¬cw (l™=4 °]‚òå|aR¨ r™ ¬a‡Š&^‚T“V¿RY†?„Q_¹æ[å ½FB!qHíF@Ì—™²Óa¬do"åbÖWÀš„Œkh74qÛ\žæ®È²”Q»+{äYfO)°Ž×¡ ™|¡^þÀRû¿Ä‘à"ÞY%Qü¼NZÝHyÞˆÙG¡‘u4#B(ìSTxfå˜EZ9D¾ ³Óq¬ÞœÜu#ˆ¹½Î µÖއ”û)øë;Yð¬Ãþ¸§¬´ëÿwsw²ÜÕ6õph3R›J±uè ÈQ˜º(¶©þ˜òÏ µ7¯NÏ}Ä&¤'$¥yAªn»—įúã[xË„jÃýîh ˜12gäIN˜Ä†Ÿqíš›&’uwx-±«ô0ÑÂwS£Á3ºòý¡ ¤ ï“—ŒåÉTÔŒüi07Œ/èÄ ¥U½‰ À´cêôPƒ}„k¦×|Ÿb»ð~J1bl3vâ/1í§En¯ï‡°t&s%Ó¡I‘¡¾2Rao %§Ì…"Æ,‘¨¦™ÖEÌû×fg™PðÑãé“öíæ§§0üaØûœvž¹«žeâ†'´é(|‹·ÞÏhhb‰'¥a#¾%F½9ËÙ'Þ¥©'=6òD©þÒ6Þi¿76v3¡þc¥ãìh+ê¬dÂ.YÎô G[÷‰o2o–ÿ§B,\}¸bÀì•ûœ;÷¼£ntÏ´9= ÖHNÆlz8,9••¾D !6s¶¨ov€=øQOyóÄ™,úTìÇ©ynƒ Ü?úÏ78/ÈóœŒÄÑ/uð‘шJ" >4¡ F(ÌYæ9pí ŸïDmÀ”"ÉmiÎd€+l.±]F©ä”„\‰§NÔnZÇ+8QK¾Ã‰ÚÍËn2û¾ÿ¹½zñÎímÖöçö6?ý#ÀñÛ9<§œ~õ~HAZê/wÞ ü ¿Ù° åã//˽%Ͻ±T =7+ý so¬4Òžgs'”0y¸ksW"Œ¯±Ð~ò› Ö‘³á Ë‹Š¡o²[•{#ÿôÂüô‚ÙŸüôBZd sh¼ tô¼¯üÈü«³b˜ÊÆŸ4/ö^ç—¾6D±á:¢ä¨q5ºÏÍØFðχ¹§$u´í¹_€ˆÍq€íÈ!Ê ‘ë° z5nXGŽsÔø²¨‘@­¡@Qa/’‘Ç™†ÞFˆ8Ä5ÎV—IIC.Í‡ç„ sã0UòY˜mnÚts´¹5hóGgl{•yØbh%¾1gÄ q'Y#SI$‰#Èy#ĘC¿®½”‰á ¢äy#–"_þ ä*V"¢~Hã†0ÌÚJc@!a„©'ŸB¾›Ö‘#ßùæÈ7G¾9òÍ‘ož«8ÂÞ(böu"STð–"ÓQrdº€L úiHO:Ú–ŠÛŒ¾äØ“ `ÊC‘§é¦uäÈ4G¦92Í‘iŽLsdš#Ó,#o˜+~YdʖƘΈ’#ÓEdJ~dŠ„ 9w¹í†!ÈBµñô‡vRÇQ!ÉŸB¦›Ö‘#Ó™æÈ4G¦92Í‘iŽL³ Œ½AÔýe‘©ã,;ºÅË‘é2dúÜÓO®ƒ~:dÊ"L…ëIÛu·YÓCFJÛ0•"€XzúÉóµ›Ö‘#ÓW…L·!cmM_ 4%ôe¬Åè%RÖ*ºO¼}D¶&em _6e-¡ß9eíÿ<ƒéKjæ}c°î4*7ÕMäÊž‘Ê“8]±>N:Áè¯ks¦/Göl1lŽìSÒüÈ>R<ˆ(Àp‰lF%r¬ s¨¦ç:O#ûÍêÈ‘}ŽìsdŸ#ûÙçÈ>Gö¯Ùó 2ܾZPí¹ÃuDÉAõ7‚j‚]þÓjÐ*÷„´©c1¦ÈæJ…6LœÈC@î>ª7­#Õ9¨ÎAuªsPƒêT›úŠ­Vcßìf™L_6.„£ÎmGötA•ÝÛŽ6(lgÉ›m×€ÍI;“vÒódŸ{ÔL÷Á—ö°?ðMÓÓÏnM2Ä™1ìÑgÁñUä-+ŸPÜ7 7¾Î3xŽ‹ÂÉL¶cŸN‹Õ}Öƒžî¤[:Ù5Sq]‰~ä+ý¥!ó\ï}QrYùX´¥Âꉚüp-ÊPן ðÓ“T­è‚q'GÐöÀOÙèßvÆ f †o@Ëa!Cý—•lê°—XFÓ=eíþyú®\ª×+Go÷®û]½÷0wö °ïìÁN|Ýîœ4ŸÇNV¾Õ-»gM7*k0¼¶`+1©XõxhÃÿld&mHYYðØAº…×}k§rÿîôüì´WëÈó¯_‚ó3tùéCtAßa¸÷E;p]ùó‚œÝGbtù©Ñ ;â&|æUz:!8ìÖ:•Ô®ÔºUR¾¯·Š£ËîáÍÅ=B—­ÆçãÖu»Þ GÝ*®„¸vtŠj­"­´ïÚýp{‰’ç¸ÒÆuð©Ø>iV¾Ö.X½U½ƒÿ¨~Pe•ºªÞ|¼«Ó¿ò¸Z*ÎÊ$åJÝÇãÐ÷î/?ÁX>}¸¹lVDåæãÃåMíºzóùîøüòú‚TG¦O—%Ä.n>Óãó7µÖGZk5:µƒÓ»Ú}eXéŠ{y®"uÔÔÐÅ9¾3c®¶BR?øüP=Iíàê¡^ú *Ù¬ŸÅ¯Ç7Å«Y¹N\®x{syÞwÔÑÙý'R»SŸ†í°{öгû rj耪äâá¢Uqª%ܽ8¯Ý›>}Õ*Ní·/€–ðwÙúˆ¡íãÒ‡/a·ÓûD·@ƒut8 KfÌeZ»¹rªEøý{¸jGÍ"­Þg4m²»ÊÁ´®&å¶‚÷õÖÅjÞ·N·ˆ÷åû ïÑ´~°=4­¶>¢ÕóôâëÍÓ¯po5ÿo>nÿ5kŠÔ¶ˆÿ7e²šÿáÝñÿ¾–]S‹ü¨&ü¿zûvÇú·e„«Ë,[ÁïfóØ/•-ÿ Òx»§GáÞL4‚µmµß @²*;”v0Žè¨ßïX \^[‰ N-• 2uVåb²<$О¼m›”™wõήÕïYŠX»”ƒ6F œ0kqÅZ“ípxý—U2ê§peÍL9Ö¨¿ÐÎ>!»–Z»WìZÆ"kM²ž'&Ã¥ýp¾|+<¶?÷ qü‡I }HšÕÊú=UB-Rœ›XN­ØP×|ï‹‚øci#{O7b¬ŸP[j9³~OÔ4Ðuþ°†ãXéŒÆ¬¨Cb>¦¡!Ö¿æè˜i­so¥Úÿ’f7ÔsŸ‡ “ÉU˜Mª©íùd2)A!÷»ZÇ …Xýñt—}ëDÑÍ-HI`g»÷³¬æi©Tn6÷§ÓØÌi` l »ý‘¶â¹YømIÿÝ7ˆmù×¢Szn–œ×('~Zíüsö3Î>÷vb¡F×u†+h±©E–ÃMáv/H Á¨ÝµpýPó<GΓöýÇ…n»×YO., çéʯ˱µŠ%´ûF{)xD•‹‰1½FÊdaW’¡ˆh†=NÞ:‘bˆF®&DˆÀãÊs\¬Wk.¨¤ê‡í_xù,µÕÇí¥v!³æŸg|‰_™éîiêÉéÕÆ7`'‘ìâ>}/ng|;}£ ûÞànz®'æoúÝÀOŒ;±aÀÁ$ÓŒ1²Î^ˆ­'WsÅñäÙÄ,ͳ7²%ÑB³ÃSCÍ¿’Þg³ûq»“û¨0íÏ$;ž'=D`âÙ=Œi¿8æv)$ LZÜ4í*^ œ/à ‰<¸œÛÔ„ÍBŽlÒÈ´«ÔŠ3fô%á7¡¿œðõÈp-X.|W_†ŸûÝsé›Kß\úþ¤oì43+ÕŸ¨ƒúkØ+ñE¤¾%^!©a‰[%}2åDâ3Oïf\ç鬓}úê|\Bz{–m|ÓxˆôÅG®˜ôþ„¬›»xsP³ æ»MqN0.K¼¯iŠkÊæ®kI›y!·¹‡Júõx°+n}|ç³dÝUh”ÆXÌ·g™(–q[Â9_F‚äñgƒˆ«—ÍRhø_öÎæÇ;àIN9æ–c‚ 0b›d‘,R cÆðôÌXdìLvm¬*–ZëÒGª$¹½²û$@€ÜrÊ5¹n.ù'öü ùòÈ*}vI]²Õ=­nî`ÝR©Š¿G>²æ–‡ žqŒ‘ ØúD(âa}‹kbbc¨NVc'ë2h•Aw0¾.Z/Ý}vi`ý>“¦ÐLñûÊZTM¶7TÚÎôÕt8i]ŠÐh½:7'“ÑDg0$"Èk”žTÃ÷ÉÜ©t)œº¼a5l ä:°Ö½õãë×-«Cð§sÿô¡9z&‡OmûµRj÷+þPQFUÌÜdÀÍË»,éZ í„|dNæ ^WSƒ~Ïñæ¥ýþéÉò™ª´c“§£|pØâ¾YÜ ÐûˆÑTÁWcÔ>>ïÊx—èdP­+ÕDé‰Ç&?ǸSéUÑ¥kayàšµk[ÈA‘»4Ë´Œ“{°#o ,Y±Kž"@{Š8:ŠhÖ…v…æL³4¤H¥`íåÒ:J"$O)JS©V‰bG>u`ñ n· ìn_ç‹“¹UipY‘HÓšp(ùøÜ×Ç;$u÷e>÷ÐUàçb5Œ=Ä™q·üd ƒI¿ÚÎàpãóQ?.7žÔ Æ;ýÞbˆ ÔýdWÊü–Øq’8‘”Ÿ­ÎœžØg:›š“ןéédôú³“ÑPÎõäÄî ;©^  •I.íͤÚ'6÷õgÕ8´’ŽYèÔI¬æRŽæ»)àöêÐÄyô»íP¸Ö‡µAÄŒ¶™ºuÇ’“Ï_~ä0¬§Iâ‚\2H½°gÊZ¯}Qó;:Þ.É[Ãx‘&J jƒŒ HÅ"E26K&&Žj |u/Z+"8 $ó®ºO×^XÊ= vœŽÿê͇뢈O¿6tïQRF&Ák­íiÛEÄÕԚk,©Iëñ% ü:Ù à 9(¾l4ÿNNi¢«œr#}øzÆè…ß—Ñ6„µCA×Çtã“×'a¿–¦s§o_YÈS¥ÌW\üKî|Û¿.¸`wÈÅ×ΚtíRž ,ÂbW­½#_7ïùªŠý@xl~üj?©Wo(™n›ùàWv¤é¤Ÿ.÷®ûøæä±Î2¸€:;ÉÍdš[o*O­ïæß„ä’U‡AÖwàð;çY‹E8ÞYá;ë ­§Ý})¬z¼ò²Ÿ?;{ùóç¯ÜyPá|漟jd\ÎHÔÌ>´ªwüº,èa(¶xJbˆJâ!‹ã2F‰P'Q‘(Hñ–©Wz“}”¾Ën—¥‰F4œZE—¹“ž ÆCÁvv·E¸Í‹³g_=yöÍq\ÚŒC»8Í:ùux6{ç¼îÐ\¶ºk.ŽðìNò~¯çjšG= ÍŤ›O‡]°+GA¬DìÍ›;lÜe†ÉÆ•t”Ç«1eW9V à`~ÇJá;åX5W K1R[„½ßu ¿KÂâGçxíÁnÇ2Ô?öÍs?Ôû¡þ°C}k^$nM Ëׄ[×G{ ý;¯%ÞÆLÜ_"j‰`!OuDÀö%é‰ÀÁOOî`‘³¯Î¾òLà™À3ÁN&½~BOƒ€ïX?ámBɽe²mB¡žE¶±÷,âYijˆgÏ"w”Eˆw4ì‹ÒLØ®ùð“!A… „0E}ÔÁcûö¬FÁf?.·÷‡‰•õ(/nz¸Û9_é)þɶuÏË@6Êps;µWK`‡Ë9ÝD©a\ ƒDÌ(bDiá(F‚ÄÏÅ3²ä³}¹ðÆ`ª—"€»¹º­ëØ¢¥Ë.½¹,àoíu+Ûùý­œôgý®FïÝΰ½õ±õ×­•†à¸j‰à~{öøùÓ§gÏ*Ä=õ­tÊM›ûì÷ ù¯àåˆ7[ˆ†ôŽP# :ìáÅ.Ñxì9öP¿÷ý¸±§QwªeO6žl<Ùx²9Ù\ŽŒ=ä ÒÖàVÞø-+ÅjQj!Ru(%èRn&ÓÜöæ|jNú0æ§`E ŸÔ£Š$~m‘ox÷ç)ÎSœ§8Oqžâ<Å]EqRÝ=˜*¾Xi>ׇ6>v=,v‰ÉƒÕÀŠqì¹ê8¹ê#{V-cU)–ƒÅ| •*&XcB‚SÄâ8€!WÄ+‚˜h¢•h7‹±Ô\UжÁío%¥û x« BWÐ7âŠM«|ðÑmï¬W6ø¯~a·nY ÞAn·)°£mñ ©‹#X±¥š~eq«PÞ…hÞwJÄíïþ][¨ ²(%ed”Ö1E(ŠhŒWRk®±¤&µv€o±Ôo¹ñvà.Ø=ûDcƒˆ7ÃÑL7©9=%JÍ,° 4U¥:#hX‚d¤BÅœ…¾sº­wªØRÍÛa~@ËþôÌÊaÃÐS.n ØÚ%çžþ¼¸ˆD®y7îŸß·Ó¨´w g#—¼lÔOlzð ™2p‚¢(2ˆ¥ 'Ê@߈*4’¤Z•©T¥ÿ„46ìO Lˆ°@rœ¤2à+¶'b&VéÔÁc$¡ä‚ÑH‡&NÌôYuãö纺`3³Cp›^ûŒÄúºË5ÚEëlβŽÞæìesj–XDY¾£²F"àa’²¼tͰAÒp‰„aLyÑ_eš¦ñË;·Íbá[d±~l• ´@—[åä}“”ìôí|Þ½êé¨ÖX¡2yDB&h($áóeþ©÷n=züêÉ÷göHC'Ýj)c£ã(e s,p^ÄÀ5$"‰ãÔÍ·CÒÕíPb“†<æâL&4’ —*†öU’«Øw`&:«¶5ýP=qOSH5V8R¦: %3PÜSN…fR¦-këHóH%F†¼Ñ„P›j {fEx' ”A!¡¥B, ’)(t„ã@V ȉÿÍip[¶‰ø† á S7“k[^l›ñWGy¿×êl±’3 §ÐžnÆ\€:¸0²Âåtþ®›{e£wÆIíU>5­–wµáv$øek¹BP¿< Ü-:I`°)L™ßnÃ#!AC3y7Êß–­R™PøÂªm†ÄnÓþµù<‰Î~x…ž¼xÙ™§¤ý (ÛÚoèé£ÇŽ»óTRÝ!¢˜NthØÁ´j èoPê'/fÌÞÕZ½"æW.+Ž[¿ùx¥ÙÛŠ”kE‡ÓÚýò~SŠö«Ç_w¬f1¤ýžÍõé£gß=ú… ÊG=Ûü•jV ñè—=ÓýLGý¬?yßý ìrÉq¦]¬§K©›äý™Yè$\kË“Õ"+$øòÛïÑw/¿édz:„±|k„( N±û_ký¹‰ÉÐ]6F ;ªØÂõò°ÝúúfbR=Í& ØJ½|š§‹·ÝÅò¢‹C±¶Öoš –·Ø ÷™Ù¸a }1_Üc{û¨@ÐsÍ01 š²éгú …žX†IW£ø­û–ê¬0—]«êMt¯ ÕúP·vGH üµ’2³‡ØÝ )ƒE)êëH±'åR&dß`$rt l"BåE cÄd ƒ2ááPˆHj œ”\ÊMÓ¸ ”vŸëPùáw¯¾FòÖs3»Už>ðôÛg£É×£é0q˜k:¡œŽ6‹¢$ÃÖ“*ú礑åˆGÓ,9Ž&6Ô'µ‰Ÿ¶¶™KÁø1Ìgš@*(`(ba,‘ AwcÍÈq•‚Ť”[ª)¼ÅÜÛb•aŒƒÈH(€ù£&B¤ U41aBæ*ÃØ4û8ŸÙ¤ 6œÏ¤mÊ[?ŸÙÐæˆ€[꨼Í9¥ ÎÎñ$6Z)B, bI„‘LC,Š”‘jC¯²FMÓðó™µX5ó™MRÚ>SRB•`å, ŸÏôó™ûÎgÊ¿z>“šÏ 1)X'ªnÍtf£®MÓ™Íò>®éL,ütfãéÌ (rë§3‚2F±¥ŽÔƒr(÷`:“ ’H&Ö:²%I, Š Ç*( Ò+§3¦á§3¯›÷ŸÎld9šOgmhŒÛ»?Ý¢vw2ɾX~tG<œwM| Vl©÷¡Ù‡²”L¿ ýØv¡_ÝjÍ’ËÿbR¡£Ý¼zhÓ|X!§ñ$³ÈÌ©¹Ðƒqfl§rN½}déžW»w¿s» ]pÓŠU¶[<çò™ŽO Ì`”ÛÇ¡ÕúÅî ²{—­[Ê ]ÉÆºaËì…noív2ÿmî¸ÊÕ «wâlËÎnÓ÷ú#Õu¶¼îò_ǧ‹ò,v|ëSP<Q0bÌ€ÓI"QšR­t±„:w¿ì©ÝJºæ"Φn¸˜suçĈ•)Ô`~õË¢%J¿¾ººâÞWWV'®ÏT—ÁÓú5tŠ=ælª/ù Õõ¹X›‡ÕlUqìUü0*®q¨"!% Dª‹%F:R‘`m’ Ùõ©øú´áRñ†ÓµèÇÚ„³[¿¤”€Dû™ íáug -ká}áMÂÛ÷Õ¡Ç·d”âX¨€„(5*B,P1R£”ð Hª"_å 7MÃ/íê ;…ªÙºDU;TüؽORwJȲjÞû¬±MTyïÓ{ŸÞûôÞ§÷>½÷é½Ï{ç}²°0yÔèN Š-UóÇßnC?¶§[*1÷äçÉÏ“ßOD~Qn¢lK™ níLî¨$¡~l w~RP쪂ŸÆÝ/Ã}ßÒ¦ÂãÛ‰d˜0OUGŒ3‚´H☪4$¡5PWîDj˜†ŸÈÝÚ?·ÎâÚËQ9êµ³Â.æÙ—RNãÉ(oUÁðË_L–áåïå«J[Ç…ÃZ œü#Iø'ÆQ¤h„î<¢ytm*šu¶ô¿2¢l WœfÍèJ<íÖq(å1\NFï†sÈ …(lë43—°øeµê I1Xzp™ØzŽ"õOìáí út,UßÝö¤¾í±2*P#ò1M)аPGš ­9W<¹Nðƒ ÀÙ¢Õê_ÍEÕp ™¤aŒRž€H"€ü‰PpÎSÎTÄVÅ00?„‚›¹B’&a†QÍAXnnPlñKª‚P^—ÄÇŠÀØÿ8þßþ»/ÿ½?úÃ_ýÏþÓ_þã|ƨb–î8›öúCgg‹Ó"†‚æýÑéÚ«àŠmÖ2Øé§½8îOÿÜîB±ÆçÿþõÁéï?ÿ³/ÿÙ÷‡ÿöå—¿»öâÎ]›}6ÒÉ–Âþêõ?€Ç¿ý/ Åú—ÿþþOþæVë/­ÿù´¶?üÙ<´y:Iå_ŒßOÎGÃlÔƒõ:Ÿ}öÛ?Lë(Fþë{{àÕÅ?,ªó°Õ…ðÛtï-ªÛI+n0FŠrHüÖÆ‘ÐëôÊCš¦áQÝ£ºGuêÕ=ªª×ÑKÈÔ#Ú¥¸Øú74/ëé)íS)íøâbLyÄc@«XÀWÄØIQ‚™˜¤"½2.¶ižÑ Wô¸ýÈsP€Ñb´n«x±«ºÞV}¢­ Xx|Úc¦B¡ E!e!X*‘Tiˆbb_¹¡½iÞZ5詵Fkå¶Ò½Ü/´nùøžq¸X‹”+‰ÏÐùÛ³§ßmü´<Œ‡OÚÿW(Üíݱ< $"ä)¡ÔžÏ3„‡zåh¦¦Þ@s/£jmüÞj<Â"ÐaaÛ>ëö¢y|ƒ»½;-¡ Ëàˆêb1nõÖ47¦›ëA•áüb01Ïô6Å[ Õóùt8¥‚¡e~bŽ{®:,'3]ûÖ_+0°‰Œ§Ýþ09¹ê<>·’º¢+œì\´½töâï£oGƒf&î ©Ö£§îM¾“Ñx”zï˳À•]DDÚÐÅÉ\xñ(7ó_&ç çÄ}sgWЧò×_­(‹kü¢0;Õ'K³iqn?Fƒ¾ ãL‰ˆ]‰q„\ „{blbOrç_º ìk4JûÙ¤œzг‹2‹Â} .Üez«,Ê·B=5rjÿ.ŽúÃY2®;OÊ´]p—;M-OXŠÐȦ<ÆÊ%_Ì@Œöð(Ÿ»“–FÅì]YMãŠ3ÊVéÆe?Íú½!Ük¿Épônœ›ÔLb'–â½Í.›7‰á²I F3÷ëÛþe$I3…NÀ)µùñ¹ö Ĩ<â«(¢2@Èx:è—=~ Ýßqœ ¦Yò÷î«(w)&y¾õ¼È³AU-¦+atuòëi1™‹&ÈúÃ2êv.áaùôEÏL¢)_a]*ã,rÒ¢WDº€MüÔI-Óçi7”º`e‰-XÕi º$Êê”"õóÉâ×8—™éÙ—k—úá2Ž«öøÉ+ñ”ꔌ 鹿ΨθT0Ëö¡"_”¯Ô¢hPeïþŒÆqùô<÷]Ö†ü²¸ÕßøÂ9óöç Ë]Ûy\ýNœãaßåp®Qù)ÎÞU…)LiŽó$×ò^ÄUZWºqj{(WVʤTøART µùö®¬¹m$I¿Ï¯ÀêÅ3†„:p”"¼±4E˰ER&A]D(H”y AJ–vû¿o.‚"x¨­qËmR ÅX¥Xç*÷ÿ=4„zÔ ­?(aµLŸiÂÄŒi˜ SǺÇLLpf¼ =ÐÜ#a`1bÞ2h@|d\ˆð§Š~Þì,(%¯bäòñÜ­ŸöÜ ÀPÍæ…Ôwõvó´ç4ܳöI¯ÙpkŽS«tÏmç£ëÔŽKJ4.œFë¨ø¢Û®n8îiÝv[½fÍ­}ø`·lçréc»ÝlöÜfû¨q?:ŽÝ.¾¶›µã†ë\žBš¶|Sèi·ÛÀ«ŠŸwÝz¯á¾ÿpV|zÜ©~´ëÝ´Õ÷íúÇîšF;µó _¶Ú­¥æºN»#?}ß뺎êë^ukNmÝ ?ÛÅ7- ß™ý!#Oó§RÖØ-§ÑùP«7J™´\S¥ ºy÷õ^XãöìäôµÝv6ôf…YÅ1öºïWYCQi›ÎiÓE.^+µž³N(¾ÔÛçx}Oëð{m½’b'%’Üì8vJÖu|êØk‡‚]mUViöD¢6µ[ïÚ>®ÛNoI’[ð¼ø»V¯7NÔÙ]OµŽsb!ÂÖh5ðg9­×Çî.ÀN9#·Þè8ZížÖN;îÙI­U"8xIìå–͇Mä>^šˆG3æLc»µmú4VºÙm=yöŠªv¯ÅHÄgϤ{NX)|´ÞbLþrøˆ”Óvw¿‰‡ho—å rÀ2Ì$d’p²Ë³ãq¾‚ ÞÄàý¼ÅB#3LÑÜ“7¨³U¸Y@\K˜t+ÐB:Ã~hªÐdji=$ªç›D%ÄtàqAÑŸ<;íé3C j'>b–'tìÖà9„ßY×# , ‘nÂÍ袈kHXÚ‹ŸFÛ€ÖŸãrÜ$_Å!£¡˜ÝŒƒBMxÁ b ³šÄ%‚ñ÷G…`– zå(Ë ï÷Ú%Ênw` aM§rÛ`z …:C/qº³.ƒ’˜ô§qF€BøÏƒ¾¼´"^¤ž}¿>khΠ}ÚhèA§súpR‹»ôõÒ2+™ñé²8©G?Šæv›-•M{ü„Üå²ç2©>róe·s€_%–Öf…æù>âÌóÁÛ@šð0Òu ³Fòˆ(¶>ÕÌ^!4.€õcž†uB'ÆâTÁSÒ©¡¿Nyg•ñçƒñuÒ1 &ãþhö$ Åõ@^f^Ø`HĈ§c åİ|¤‹ù6­~Å%åöÒû+{M§@!°#IMÉvLšOÅ\"I«jÊ95«c1£;ÿa†Õ.×™†_3?w.ÔMpDMÌYþ âÄô­ Ô)]D¢ ~d[õÉÚ|Í»92‰Ï¬Ð§ºÏ¸"daêcFB‹lY"ITT`|Jƒ˜.kxmM¯E „®SOÈ H M£à%‚˜r ùah/Ãéx ÄþZ&¸¥róÃNL^î=¥èáÐÓ áQÏà–Ð@K"Ž-y‡©½‹Ÿ±}cîê(ðƒ ƒ#A5‚,zL[Ô§ÉÂ@ÆÝÂá¥áo䮘ϦãQÁZ`éÑ%aÈP>H’DÉŽñ`pÒìÚ9l0c7ö®tŸñÐçžéQßÓ,Í  —¨.ˆà Y/Âá´ó/1{MËø Q_·¨„VñX(p`"³ÔTEþ¦ãßÄâè¾Îö ú‚0Cû>a …¦à¼ î½…â&w»j¼óî.vv«,<'³(¦!Lli”rPP¦Ï]çÌðM½ '#]§ª@ü~|Œ aaž¥-ƒ€Ò¢¬PV(g*Ó–”Á8q ·N—4BB¥Mò’‡´DnRߤšeQ˜a:%äa°,îaùaZ.â™ëU¿µ“(” Á0ƒÐ•f!i¿¸ÎÁVj°§ëVøbÿŒ€ìÜöàu:h˜]M&,·¨ai&Èë~‘ÛK^¥Â&v{|êÃVСu Η ö…rx¡Ag éàôaö¤ÊZýJ¾:ˆñSâ…Lx>Ö5°,˜/#²ù0Ö2‚v±ò–óË£M|j‰À†/ó6Z¹'Y‘ÕàŒªC> 7-2;§À&^ûýx w¤ÀkÐè °ššÜ,ÃQÈ,k@I½¯“Vwržwböê(„ÆÁÝÏczŠ0ÓDT'¢¡tÌ_†Ùé8Ö+'cÓbno hm ÜÅ)%Ý|}©g®RÒj•ÿ}“Ä,HiB%&òUªùDµ–¨Â×µP1´8ˆ""Ë?3·¦ü4OôÇŒ¶˜Fù†ýQr±˜;ŸÀW27#<ÎæðQŠ—¢:IJÙ8Ò3÷ ]ùPf)|Ýði¼ú!q»ß,®×ܵ+ÿGî¨é?$ÉP“¬h<¹yöÆtØ¢£Á(óùe;²žé5=” ¥<-÷)Žü¦s³èšŒßÅ´Ï‹Ln¢¾ÜR•QwÑ¡¬H$®¥H˜w[„PDÆ!_´ÐúJŠL÷Fª’Œ‚+¯ó7ýÉuÓ´«näã>§wƺw…D‘mXn…‚Ù:ò4”É#³ÆÒ$±.Ÿ%Q¼¥¬›ø›W²žÅñÄM¥¦â®/ןÝÑ\B¤@ý¡ä»Ç”pî1ÇÇ”ó¤ …l br#†bÊé¹¥èžOÒ?ÇÓþu$ûl•í_âƒâ;p5¾+2Š[º¹w§£ëC>ŒïãSU{ÒcÞ“GåöRG¹tÄžì”H½äMER×=Þ¡3ƒî"ûôŽfŒËŸÙ“ m…C“éøZ6e:”n\8jíêp%Ì’Õkqƒ©L<“>û&21I¯T‚Šº3µ×=>ðùHÞ¶ØŸ³ü~&¦´·8-JÈ®tîáŒGß—ú§×­¥±ùB1@Hy!oÞ«E& Ÿ‹ô9±˜GªŒ€¨wãÁ|¸+ýº3“æ9ØKb>{+m ‘£EÇe”(¹œ¥&â·5#˜h”u$¬ &–ÁDôÜä†ø×ƒ‰€µ-+ŸPÜ•‰6¾/3x‰O“¶TG[ŒÓÓ꾉éH ÒΕ¥(n*1ÏÜ@Üõ d>€ßw/+›¶ÔXm¹å§»M’ºî€÷N÷^ЗzzáÜ=ŸAÛS7e£;ÌÁÌìK¾-£}Gâ«’(uÐ%Šô4ø(PÞ|î½oÔÛ­öñ»ƒ›ñP<Î烃}Ð; ‰oú#°“òÇ·¹'’™¯Œ}E)¹¢R¦ÑªD¦`óH…§ Èdº,°²ª¦ÀkÕëæßŒ•=ûá}ïüì=´×ðóïwÞù™vuñ)¼$ï<» ÎÁz]ØŸ/ñÙÄ;f³«‹ÎÀ°[ÿã™i> |ð¬üak`ßjýæQ^>Ö¾·Æìò¶¯ºšvuÜÓNœoøòÑžµ®n›GµÇ–ÓÓ[·þƒÝ¿ï{äÓä 1Ÿ£O:7ÞE­Úµ¿·/iÛiÞ·¡ÎöÑj´ëæí—{ø>ý¯1oÖky9¨3.W®ŽC<|z¸º€±\|º½êÚ̾­¡öqó¾é|û~rm {³ÖqgЪkzkØ|8q®¡¿ÐÆcµKÒìÛ‘=dü<ƒãР¥]ž£ûxÌŽÛGß›Gר}t­µëŸ˜ ýXô³öýä¶v½('û åj“Û«óAäa4ŽÏ.pë>¸ˆúþðìÑ#g—¸'é㺚5ôfA[Wƒ§óíÊù2k;@˾F¡¿ÐFµ€Æ­G»Rÿtç£ Ò™ ƒã3¿.ÇÜ ­Ûk½ùX£-çš¶Ž®ûa·Fš·µM»ôÞ>ÊËáfRîUðø°ž÷·_^ïޯдõøzhÚt¾hëåÔ¿Erúž­çÿcó5ñ_ß0§ä¿¯‡ÿPçþ믈ÿ­âœzÂÿö‘ðÿúÝ»=åÿi\ ª¨üÝힸõFÇqìλ1ó¦<¸m30¨ã¡–5P}®zóQ0±ÇœË%±¡Q©|bSU>M’§1í€Oú2Uæ=d±÷F E”7ÄŸ ï[dpÜF\±1FE7_•ºt?%€_Ê"”£ÌÆOÚ9ÄøÂ#åÄo”ûþ ÀBší< –öÃЗû1áû߯ûñ™ ú4+埩ªà}À¹IäT‰uÝ.Ûgÿ*m„Q¼½ý„ÚÒÈ™òÏÄM_ç_J4Îp>ø¯5õ“݈¹JCI¬ÿY¢c¡µÁƒ’zÿ%Ͳ·ÄbÏÆ‰pí/„*=ŸfB ¹;<šƒ¢Œç3ð]•SD—"^PÀý<ÿ‡¢t{õz£Û=ÌÅXÊ4° 6ÃñL(±lîÿ£´ÿÔ ¯làÉH gãùÜ—,e\t`rSÖÆTÃh© ð—…dJÌ'žLy­÷g‘¢ík&‰6Ñå/_9( ŒËÂ9™´ÙO]<`›üÚá8è‡ý8‹`I-Æ¡ŽQžÔ¤ì(hz#¬T•ï§c™fðÍh¬úYCk×"V)“­2”²u! ,ót2•Z(÷EÕ"–§RÏ æk¾‚?·À5Ó2}¦ 3¦a*Lë3=0Á™ñ.ôás„Åhˆi YØ ñuϰ„ú"ÀÏ›¥ËÉ+é­ï}¿B›—ÌT…6nÁT¥vYq”cÉŽ%Û±·N©@´eS—#J¾ÍÎßHI”-Ér¢ä8 ‹ ®Ý ô‡Fƒ=W¸¶_¯µëû;Õ=x8lÕöó¯kõònµÝ:=€ÔkæM®§Íf•Þ+7YF’Úü͇UäÞ›ˆ;Õã̘:»µÆSÓ§ú¨›Í*}õ§üü`©n›ˆ½C™YJ ]hõßô÷χ…ÝìÜzz­¸ÝÛ ÓöÈ@¦dyh:3ÎàHòP!NÞ÷Âr‘™K°—¦d˜ðÓÎè1ÜÌ!®9Lúô‡ÝB­„i‡*´„ï;’ËÈ¡ÌJH0÷+ã·.÷½HAÕ¾VZÚ¥”ú.fÄÅä…<¤~a×£TzuC̰DX nhá§€ÖW‹ñbÜd^Ùcg³ëì‡)„š˜ì`NwlŽ4ØwÎ{`rė󮨙œúMCÙ¯ãì°žo˜ —!î;YŒs§«Mxk{Ššu‰Agh‚²“{T=;ÆY#Þ_GÝÓ†×?ïwï.ÚŸÃZåbçÆv®ôÜ©H§Ev@jÏí;I2^q˜:—7ëñ7r'“ç2­~Ç=w û*覭k(…¥(Øm`¤‚]—À¬Ñ<ÀÕùÖ‡v™IÞ³ÒÀz˜µ".e¾„MŒÌóì‡l\ÆQ¾tÆS{n â/ãþyÚÝ }¸}þ ù<6Ç¿¯¦t4Ä> \´b’r¡°«#¬ñDO6'̯a;–ô9WÿÊê»óÜÑ®}ØïÙÊÇÃ8ï-¶êdœs&u<´ŸÌª¯Ó’gÙ TÛ¹…HKÌ<ØE°Ä’zJ„‘ËØ£A¤«Á· áÉõdé@þœv›HìQå‹HÁ.B¾TÆ‚0ûaŸ§´˜¸ž¤¾H9Æg4°tYÂë‰÷CÚ µë²@''¦ÐgÇ@L¥À*Šß §­_Èþ ÏcÖ%e-&Ï÷Þ‡E1 Q€¸XÀ¥ÐVI, (4ä{h,~†SÍÜuq„œi.±fˆbA£ …©ˆ`ŠQžçnæZ‘ç¯þJîêñhíÏLG¡pE”Ñ(’@(’„"N5wà 18mvéæ>_½ºOCe¤dàLH Î`]b®¦ZúXl„ÃYç71{=Áa‰ •YÀ¨r ¤f‚½H˜º›Lø;ñ>Ëó7ÿ*'7hô*·^0@^¤ˆ ™VÔ÷qäi ÀKÓ(”Á&(d›\gàmØl¯£gŸ”…ãô#,‚Ibbj0 ”§dèºÒçÊãxC‚œŽtÙRâ÷ícœ ‹"Ç‚SX´'¡ˆL…f¦ús<·ôÓ-98›[R*­’—©YqFKºSCB0˜a®‹P@@ø!¨©7CË™=sùÒ/Ö…Cà^)XÒ6úKºt%b€­$£ÄÑ&ÄþÙ5¸`ÀëtÐãÔ. ° ‹>Èó –®Ês{nÀ©°ŠÝ°aË­¡…å6_è&ý0ˆ8ó}جa—ÁÍß©&­~¥ò <ˆË…I "_Џ4‹æs3";Æ2EFñ:Z> f~  ‰bB‡æÊ¸f‹P÷r?ÏjØŒ:]Ù 7Ì3{JU¼VÆ)rxMs¼†u#€5´&2‰#_øve”Dñ&x¶ºÖæy-f?…6gBvF„PX§¨ïy˜¹T`éÐ%r3ÌÎÆ±|qâ«F`¹½Ê µÒpgÆÛøsS&»Ò‡þ¸–²jKÿ~ÚR ®êaå0¤¨#–8Z¹(rCL9²FÓÿ™îó¦èô.‡µ=¡Mv;½Ô%µ=@)ã} éÝÑ0cdΪ“Þ±–žqíšDãœú:¹C{ú!Ýv¿Î¬ÏèÊ_ý¤=jª»´15™ŠúÃQ{êŸ ã bÛPÖѰ7Ùó›vL=Ã>jøÖøÕyšï“µü¾Í(ÖžX׌%øÚÒ~šepq—ÀÄ'‘ëÐ$K¢Ï˜¸PC"(ãÅØ!Ò½h®õGNðí ³”L(øèõôMgpÍÚÙÍŠv¢ú¶ÏYgà_ö.ç <¡ML ó%ÌÖžº›ÑиOËœ¿ø-¢o¦»áÌÞ¿âfG‰nôØ#!ûEïnÎÝn{Ö}5ß'ÈŰo›^ò:L/·¬{Á+½Y• ¢!ã!vìÏÒ8Ø,¢^èùÞ¥ÖÆt’gz}<Îìok,ØæÑ~Üé#ÖaS—±Ž|ŸQê‰Ãh»¡ƒ<å¦è¾oË×ÅÔcØÆ˜Ã¢AR˜ç`5VSŒžº»n¿À­XònÅ®wáuéûþWïÖêÅwºz·^Ûk\½[ÿ›E|ÒÞÒ{uÒ­’±¦ãï3¼~|nÕÈé/ð¡…uHmÎǹHVQ¡øÐœ3¤yæçÊ('?J¡ARWK0€80 4p|¦Q(‘?cÝ:Š-|VÙ¨Þùzàú¢b`ŸKø‘ŸK€‘<ñ¹³h¾ÔX¿zÞ‡~d‹åÑ)Leãø§ŒOòì¾A®÷û Dîòd D¡ÄgGí%?¡áG t9r¢€‡q ¹rˆÖÂçÚ\>ixX³Ž%(q£(Q„(ÔR»Ø£2´éEÆ_†y"A #Ê´çE~ä»nD!%Â’Jèòå¡KV Ëƒ.t¤´_0þYЬ–]ã^;rà a§±tHÃ7Uá 'ü õÙod%~²„ …=t!Ò}~PàŸÏÊ@QGŽÄÊJÔàDH…ÚU8BT=…t×­£@ºÒ-nt ¤[ Ý"&pƒ‰7äw:™'«¨P чHÔû (¢˜©qGiŽAx8r| ÇÓsFDò'c¯[GD $Z щH´@¢a0ŒÞ`þ;!Q¾È&:£BD"Qÿ7@¢Ú\ÙÚu<é ‡‘ëîyc”–ˆt@èSHtÝ: $Z щH´@¢-hƒá7®Ï$Ê0KVQ¡@¢(ÆÏD¢œý|aa‰Ædç„QÀAxr@ç1‡FLPa¾9†õSHtÝ: $ú+!Ñ—¶€¢¿ ÅèE…õ7Öo5Ëñ‹ [àåM…5âøƒÂþí1B7„¡aIúF_Û©S­õ´MÕʶÑÉ7[±ÚÍ“7ÈûÜlÙb“ò” ÿ¼«e‚SÇE@¸+\G*!œÀçnö5ð'¿d³n/€|ä _ùÈ@þ—òä óýßÉŽch€%†^„¡Éó048÷Óaha‚W8aà ‡ ½ Äw¢@ H!­…÷äGÖ­£ÀІ.0t¡ ]`èßCC}åVëð­YÌrq´´¥Fñ –=½¥oewkƒÁ^-(Ù1|é)=¸“'íyº`?jÄ}xÝIúöizÞâÙÍ£ ¢ÉçýmÜ ‡žßÝ_J~»(Jñ¶ gq;Ïà9ZE§ô=†´ëðÄ…çÚ§äxìú£³/‡±ŠýKõñØ«õ>ÅŠøXuqíuê'ÇÝýÖªß×G§Ý#·ÞAèô¾~»×ººmœ|ÕwÂËýÖgVo^Õ/Ooj›N@? Î°ä Ž=¼¾”;ÍÚmãþ”í·ê7û;ê®Ñ*³Z×/?ßÔwÊÙ¿ê¸^)Oó5Zi¾J÷ñ8ôݧ»³/0–/Ÿ.Ïš5¿vù!>»¼r;õû½“Oñ~«6jìB¯›È­·Ž¯öZezz…öwªèl§Fê•ZRëúwò$ŒÂÝhÐ@§'øÆŽ¹¥ÈþÎÕ}}çœÖ/nö+ŸüÚŒqÚÏòíÞeù|–ïôÆæ+.ÏNâ$ 8wï¾ÆMø%é¨îñ}@ïNÉ‘¥ÃÙÉ© 4»¯ßáÎYëên¯uxY¿¯Žö[U|VA7 R‡qœß6v?ß5.˽ʧkÕ{_èáhpî~©Šs•6.ÏÝú}™5îkúÛ‰šeèsyFÓ&»©íLó‘zšïEð~¿uºœ÷—§/ˆ÷Õ»ïÑÚ{14­·>£årªî^œÞBÚrþß½$þ»+æÝßyAü¿¬’åü?¿}Aü¿käçÔþïï|NùþîÝ«Òÿ•Œrå¬ä„ð»ÙÜkWª‡­öNíðݶ©í™j›¶(Ô~7Í:J:Á¸ÆÚ*ÐQ¿—`kyQJuh25S>Щ³*F¢C>Ú–ƒŽ‰GyøX¿z]ê÷JŠ”^S;2²%è&þJ\±Ò@›$–*fói€<•fvœÒ¨ÿ ·„¼.ɤôÚàŠ×¥›ÎÀBR<µ.ì!óýH«þ–uî0A¸ i³:,ý3Û‚–ÈÀÜÔlZ²VºæÇ¶¿åÿkq#?W±¨cú„Ú2³YéŸé. ¶:ÿ*%c»çŒÆñ-©ß[˜ihˆõ?st̵ß•²½ÿ‚féÄýçaÃT¸¶fB55<L„öãí®–É6!¥þx[—·¥ D7"› P;;=HÿG©Ô<ªTªÍæÛ©™6ÁÀ†ºÛé’•Í­,ì?w_Ú!AFÀõBÝšÝH»Ûuüß³Ÿ6´Û»‰=m¹bQXÙàÿö³…¦o“¹Ó‹†H0êtKx‹ýÐóg†öÈ}Òšÿøü Ûéuºãnþ\o-øøsWÞ>ÎÇVžG, ÝW˜è¥/"rL$U" MLóP2Ͱ'È;7 ¢ׄø~à‰Ðs9Ö.7_l¦’†?ÜD¿áé³Ð2oÛ¿ev (³ÐØ‚—[l‘Ùf=‹ë8}v›Ð†u7ÉïÔ§ål;ãÁ´Dºá$zÜóçÛÝ s¬%ÀU1kÆØTg¬¹ä|.;ž¼›X¡E>!Ÿ=hvh8cjØBóE²t6K·íNÒÑÖ´?“PtžôÁskÓ ~ ,œ("Ò—40Af³p®Ëx ^l†y~À…p(üôjŒT4rÍC$uH³ùÄGü7Ä¿¼¶åh‘¶µƒ/´í2mKD¡m m[hÛBۼ،¶e&úåµ­GI²jð…¶] mÙ³ù¨P·…º-Ôíߤn­Š™©í‰yUߪxêÜÙ~–áYΘøœ ßã4×Ä7…ìÍ”©Z–šsDËRò.kÓ¢ó^~Yò`Ø¿„Iñ ï¬à#׆,}BVä …°sí°P3ÇçŠ8‚+„¨ëúÜ#ŠyA(æ{‰ø¼ë/$ákúå-Á†Øÿ™¿YÙOœ™§[²é;1ˆf,Y5ÜâÄC$è> RæáŸ/4%ó…”ÌuBð¡Ê´‚ô$<ÁuÈü'CS®YGq b™ºwæ²¥ØóyÊã«=_èã…j=WùÄ¡üsµ~ôàÕÌ5]ø7qÌì ìŠíE¸ØÂ„oõÉZßQù‹ Òã"Œ<åDnh®ÛhÏGäp»®¹ÌÒñ®íY¼Ž•S´1C!†÷1Š È°ÙÛãdŠ,f%Kä åÊå³FC­#t³õ'‰j1©¦ ·C¼©É ÉpÜ3ßÔÕ2Q»¶\æ:ëv ƒ3ñ >2@¶ˆ}KW9T†R·‚·¹¥Ý ™¤êÁiÅ9ìwµsm_\ë^h¯]¼*×Ó’öý¸~g+R:ާJßhçÑ„xª?Ô“7£  shŸìM ò”¾ýßœ°Xæ'‰¶À[ÅQ£\\&¹ÂwãÔ)€éM>¢¯ R—ù™“vþÝÞÀ(Q1¥±±¦îK™¼õàr˜O¦H¹95VÂËæD¶f¤¾üÌâÊÕÂû;Üztî •»/ã °/‘ÁŠ÷éHÅ4ˆl‡¡À’¢Ì}!﾿ûšµt…O[žb~ß6¼“UÝÒ)8ë \ø­Â9û[˜…±ýt–hbÏ&óÞY6gx¸‹±é*ŒæŒƒtfiÎÂLÌ@áUÇ^¹ð¾:ãDr#í|§3_ãÊnù¿)¯á¬waùÆv6÷&cë?à δŽ]Öœ»ÁŠiï?åks4±¼Î”N¹§y¸)<Ä´-"Þ´r®mÊõÔ0빦Þ˜rfܦ#ª‰Ó¹åÇžuÖpÏZùÞ ý8›?qIލœ™ñ´Žræ™lš¯f<Í-/èÀÏ9ZçWǤãXeŠ‡Æ˜5Ï_»8f›¸Ïz+€sL?Æ}-NÉ­?Æ®Î?f‡'>“ãÎ_XŽÎß'ñ¡„}ºn™¿QØ{߉Z&¾Åï;Ù€òÇù§ã«°ûþÇgòþ*>|êïÿ¼ {ö°s/ØQ›Úƒ££³·ßÿüvp}´ßg'û­ïöàÂyïõEØ6÷uM9ŸÿâÃã=ö->¼¹_ÎOYGÛC‡7?í=§ö`2mµþyyn®W:qö ]°üÌÑÜA¢ü³½î2Üo»QVvqPÃxøv€OöèÍÑ··¦¯®O¾]Гý·ö C7úô~dï3å £7áù)¼6}€á›¤F>¦?©=T~Ù{²~|’™Üº s½Ê v´ÿáæäì"?0që0Wöٿ®)÷cvà$‰ðÇo!f‘‘Whûó&m«OÌ–=*vœœÙþüEMÿ¾Ûñ;ÚÅOÎZô¨må~s~H­üM9è:þü¾óçÙ«Ñ_ä}jÆÉÈçÃèüóW3ÿHÍø™{ íÇÐꕇúôÞ\¯rÀæâúøì€œÚ6Gdî@Î>û÷öëãñþÅœ>^<}Ä󡎾=}Œ~ÌœCOEOö?Ì´k=}dÇßgô‘=}<¸>™kôxÿÉôíûÑ|ßœ_{Bÿ&ù{þ™v`Ä6|ðÏV20oÿ²òŃü3ÕÁü»OûŸw,sv‡¯>ÝŒ¯>þ-ŒeìgkðÕ7wøê› ùjrüca,c?[ƒ?;¸ÃŸlÈŸEdq,c>û÷öëcY,óDô±,–y"úXË< },‹ežˆ>–Å2ODKc™§Ò·²X&ëÛÓŠeE,H´ùXF0¾ÑXæVùËð† ÛËð†dx›zµúª“ºçÎVa·ô"”.è4ñ¼mëå«më•ûó]Ûv¾kñ´)Ý_[œÀœ%$Š àÚ:qB3·˜B:Ò«xú)âe¸}9—5~oý4»Ïº˜Ùût’˜aоgšn'nÈfŸ¡ëv5í±cKû£|#ÆìãJëg_µ1ˆCÕ©õFÝÐÔÕOjn—S­Øwž•°“í4éµ§ákäÚµg3êÿç?u«CæÇnÍü×6ÃÑÒó[Ãþé”:ûþtG„\3ÚnÓÑÖVm拉3-´†=Ôµ¢ÀM5xüán»•ÐéUmíÇ£Úä;®µv«BÐ]os¿Ì><{þaÕ÷˜U|ú9Ý™Ôî_÷½*?£;“ã“’'Vó]w©øwóMãîAë3¨Ž&Í\+ÝÂ4 Ûê'°Lýbae`é©ðq÷=4¬¤¶ ªL ¥øÀ9 ‰Ž `¦·€êD¥"´ÀF"˜ A’i|XXKC¯óÉÝ< 5gr¾××è.¦dQµWkô÷¯}ÖqXßÓ\î²/ÝExYp¯íËn3vË6›×`@¶a7ûSÚý8ûµ ÖÚ]]³þpe ­Ýs¯½Mk#j-=ºXxØ6"‰jªÕèÖ¸úb«z%9±ä¯ZØ­¡ÝžlÅ8;e_ΰ´¡^kÝ« ¯ûµqTnd,`Q«¶Í­Fm±'5å‚ñ;cÚòó燋Äï ª½;9½§ÇU£¸=Ì!S`j+†é²®>Qç:¡j²8†3k TF@P¨@‚‰Ô$ˆ’ˆÂÀž~ç˜+@”!he1;W™ÍÅ`¯bŸÓ¨Ÿiôÿ}ùù È,C†_vVsº÷B#a„IH•4*V*”‰’q—³J€¥g•ͳ Z+«Ì ÿR,©¢ÓXò sx3n¹˜íÍU‘lüÅJl¶.ʺÏ$^3jýbfykb8—FíÎ>î † ã“àýV ^Ð/` LÙ6ï*3M{ÊÏrä4]ÐMîƒô{yÜ’×–ú·m]Œ>=OJÞô 9Âý÷½'ÒhØî¤YíÍì×/µ=Õéù˜ Ïm= lx0²¡\6m™¢åJë%Ùþ˜'uøÒ>ÙPgÖc6W¥,÷u3Ÿœ¾99ËÎðºdÀÄ÷M’ ³ …,¨~Ü‘Iú"VAH ƒG ¨P*s¬" µæ.Xq…~Åu;’åqH¨”e0IF’/aãçA¼;8Þ{|ø$b‘%FâVä™Áµ†/Õfú&¢–•kž VnÛÛ™ðE†ýæpÐnµ²Oìé›as0ê5mBtòÕ©“… &ÌÝ¥{ñÜ•¤?ˆ¦ãxwÐD X°ž ‰2²ÕASu-°pˆt™|Lµ†˜JRä}÷ÖU+Ûv8ø“ãÃïགྷ߈ƒ¯݈uÔ¶vó×îië›óû+8ü%_/åÙ`„=#¥k´c)x(ã¹*Ïž~7dgGöö= xð$P™Ö¹,bŸŒŠì1¬ÅË"²Á)z>‚ [$ì Ĉ'O ž@<½È§¦}{×enGŒÝ›ÐÜ,ïßÿùå!q ù¤‘Ç)S§§à699YžœJÉɈzròääÉÉ““''ONžœÈóÜ!Óe²ðäTFNÄ““''ONžœ<9yròäĘ>¿§ˆ ] ÿjÒ…äÄ<9yròääÉÉ““''ONAƒúüÈI¤ËdáÉ©ŒœONžœ<9yròääÉÉ““lPôüÎÖ‰Ò}NVÒ“Ó"ròOÂôääÉÉ““''ONžœjðç—s§ËdáÉ©„œZ™œ¸''ONžœ<9yrZDN§ööü»ë#;YŸW‰–òÂhØî¤™hšÙ¯_j{ªÓ1N`0l]èáh`çò`¤kmãqÑ—ó –j£ñq9¨>»tWÀÉyhóÐæ¡ÍC›‡6mÚ<´-…6Éö³SúÇÔxeSöeåGr¢t\|òk]%)ñµuÏ™UŠT®ÄÜ;~UjJ5VD8â€F’'`$Q@¸ˆCÆ37>׌U ÜU¹í€g<÷UõZ–¥®TÓªuÛÀÍøÝÝ&>5BÍšþeí^.}QUkwp+W=åÛ²C U‚’$ I@•&@˜Ñ EL!C2Œ9[ÎZ55ÛÄÐV̆vŪ§‡öË"ZëÝXÔŒzæ^­z£Ëty”?&Øÿ² óg;ˆ¬ƒ¹N{XGJqèY`›S*«Î¬%(˜[ŸoñùŸoñù–_ηT·”3n È6Ì8Ô°ÄŸg¹Ç§t¹Èv–{¶¹Û}…WnëM¶zsYÙ†ä+EëSÚÕêþ’‹vïõ®ULà I»ek=zuüáÕŸÙ¶¡A¿eGßi¦ˆWç»êJµ;*lwÚÃïÍÆ\ÛïÙVf»x³’šñ }¥Ç*i®_èñÒ¤[`5ž¾ÿ>œîvÔ¨g<ù½¿F]`ö¯>û½¡tÍl™ß œZŸb×ô ÙÍ®nÆ:Q£Îp,Û©Ó3£y*½h޳ÆF¬õÙ›®º“[lºýJÏÝpi¦â`|ìý˜‰«{±ŽÁU¿3êðt?M£‡–`âñ~º~t‘ý•¨Nªo-¹ºî U+ß÷³tåŽ6‡ådjÂóádûò’.ë£çäyN¦«nDB[‡ÉŠA‚P€ÄTÓ .0HƒbJO» “«–q&ÿo-úª”_~8{ Ä£§fú¨â|ƒ{fÞ÷‡¯û£^œQFÔ­é4íÌ`3Ms0¬¿u;j•,GÔuâZ¯?´Û|[øN}‘¹ ߆l&d†— ùƒqmpTS y„à„„1Él-¦¤é‚nÞb®l1·Ê0RBC…„ Q5±?Eæ7Æ@BNÌŽ¥¼Ë0V-ã9f3«LÁŠÙLÖ0zôÙÌŠ6‡ÉRJ³}DÞæ¬ƒÒxÞ¾­²FQ2- ‘Qs42SŸ%*Œ‘ºËU-Ãg3×j±J²™UJZ9›‰°4b•'>éÓ™÷IgÂ]ïNgÒJg"²Ž|fîb½ËÈ£ÉgVšûÊgV«{›ò™Fe¹ÏgVÎgò•Á£ÏgVÎË÷Ù> OÊe¤ÌŸ~>3f˜É8$ hHg†’Áb‰c¥Æü.P®Z†Ïgn–›WÏgV²Õó™AQòx§[ÖnvL:L~ÍžZ𲘚p‡ÓÒ¦íšÍÚ,%•þúÖA¿{þ”š¥¬þ›¡CGóæôó¸ ·‚v¢aÇžÓ;úFu/;ÚNª,ª·_™ÄçîðîøÃÜÙ…¦‰ÓÒi¶/«gt9þFWwû{ð8àœ½Øì†¦œL‰­ eOUcã°Éì…fkævT|VD®búÂôp®Úü svâ{ö+î:\Ïê-®Ãq{ŠSÛ 6ŠBlŒÕ&ê I°’Š„4ÆY¼ŸÏÔ¦Ó€¦¾‰:£Ì]Àìnø•¤J^B æ»OÆ#‘öîêT|ï®LgÆ_Mž¸Ë&Òúf&Å I÷Å[ñ‚»^ˆµzºPÅ¡Wñõ¨¸‚ ¹€ðD TDjC¥ctc*>» ò ixÅÝ[ È@üè—”b#ÑvdžŒ§ zA|(\x«¾ß•mßqÊŒ¶S¶Æœ*cd€À¨˜P¬N-=ŽS± ¿d´l‚.YrɺDpC¸íÁ'„é‚®ùGÊ/²MûàÓŸ>øôÁ§>}ðéƒÏç|RÑàhëÉ—-ÎNºæÉ¯„üèŠQ©Àü<øyðû]à·&B)d¿d0Š×¼4oÝë¥XºÖ@>ÞŸôs.jG:µI]AÓe]ðIÝy÷)VLœ„·.­+‘ÒœA‰@Ó@…ŠÃ(`aš »ÒºUËðiÝ…ósaN×~˜;é°ÝS™Î6Àû®ÑQ4ìênküäÝéÀÉçù+¼r[Çb Íx˜¸Ap3R‹€ÀÄüÁ0”84Ár [mÛ¦£ƒžê̘rösîâŽ'[S<µ¹v!"$ýAd.Çýë^ežqN©ÝÎ:êèÛ2Ýõ%ÐXz05¶ž{xŽšþÇŠQ¥ ÂFŸ¶¥ëËÇ•=”Z‰ Ð Í,Å„KCE¹RŒIoRl­ÈlÑt÷ïÆ$çî.â$ˆ@Âb£BÀ0xÀc £2¤Ób(v›—óÕŠ2 KePJe¿.t‡DŽƒÀØY€31µimxdá ,I –KäþJAï«å<&o~ý݇_æ±ÿgïZzG’³½' øà…OB]ÚÀ6«˜&ɲg1ÕÕêyº[¥êîc@$“™UÚ–(-)©ªg1€±ûlðÍÁØ›~¾ú'øbÿì‹™IRTI*©º5=]Ó<Ìt‰|DDF|ŒŒØÛD uV|oYñ¿Ù<„ í×K뻇â°ï>8'ó1cÇC„:”òÌ:l6Ʊï{Dèu nÓ6÷~‹ú.¤g¢Ò?&S÷îŠ=Ø 4‹Ñ½;èõ×þæ¿~÷³ß~þ÷½á?ýÝ¿½ü½?ýü·¥e,´\4êO.{©áD¾› gÖîÎUvÍ+%¾»TµïÞ³ìïÿ~@ƒÊÿù¯ÿáw?ûÉçmÆ÷òÓÏÿê{_58àƒ>÷íüàþöÿþç'¿ûÙè7ÿú½á?ÿÑÿçŸ?ü˜þX;÷@>{韕'W&cüáèíøj˜ö‡—0œËýG~ó/ÿ»ÌÄá-µ¸ÏØ·ëyÁþr#ŽQ“)k©ÍïéyÁ¡ÿð)W ,䇊ÏO<¸+ü,Å$ˆö¾íáxP'¸bøƒ0‡2ø_ì0)%c„q¬h›¶Ñ´­Ÿx€ÅK‰÷€wW Cóá¼¢bùй6_ñ·¡¨õ^šÁ¥›x¡ë¸˜‚š \…Kf D”‡Cª<m>¿ ÛhTÕ+u©Æª=f7–÷‹˜ž½~Ïø°[@q)˜¬5^&FûEûèâÖ­YŽ5HRÿW€à¨72aÊ!P„»cv­ p.]Û÷Ûl¾¿Xgu\v=°¬ŠX›E²iÞ÷£Ë¸ T3G“¼Š9›E¹m„[ù^ýQ•Ie|Pt€˜_^,"ßÊN@n3¼Ê€ïg“4¡Š¦ƒ2šy¯HÖ—‘.å® âÝÈhõR54t噸Ҕº XÄ íL¨¾Ô>ýêÐ9¤357¦2MLþÀƒ#Sž}< ûÃË·6#lb«Hw’>.‰'†™,€Î‰ùeRJ'{÷/kÂb˜ŸçÒœ6}ÕŸäWúÏxÐ3‰bÂŒh bÇ|a5oŒ¤pÄ83›ß›œÛ€ýB;ª×[§ŸÞØ6nró{0¸1—Áô]˜|8°Rc#ö×q:ì¥Ó¤|/ŽÆ¶mÓ<›[£‰!K.œ˜,mvBÓ|>2ê”€Ž¸2ùó†ùôÚNSšáŒ.em²Eû¹4Ý@Fû½ËžÕ?I’¯G™Tr, Yò·º»~É›«› §æî›ÞÈé£DõD:†í¨î/W<½”Î@86scžÇ6–Ó x2èÙ?àæß‘è&ýäW&-aœ™–ã,«h]y:(¦EyAŒˆ'¿œäã’4 @¿—ÚÓ%…SûöÍ¥ÇSûåGZaœÆæ•_æ1·Ðïªõù•Šú+ ²‹¨8XÌi²Äìt,I§½l\ÝYЗ—\¼-äÃt, ~|+³‚œÍ}CùúhÌ×¼¦+mB¥yÊõ½¨xg*«TºK—à¼i(upi·JTèßR-Tú³ÐD3}6[÷…f+Ï sQ©®RiÎÈB-ÝÒ035PZÕÊ*—Öw¦C猈UÒ…í,ÔWÕÙ‚ý«YB{—š¯Ò³ÖšTÚ7ªµ2Y·Ìí¬¨[ÿš­µ&h¦y UZ3O·ÁMi!꺴†tÒº*L[Íô”¨aÞrÕ ^…ræÌf¨fFgÁW–u^qÏkùtý:f’ DUØ—9K[ œÛ˜¬Ž¯æ,Í‚,€_ah »Z!«ÔðP³n㯻˜mf>çÐ[ 8+ôæk•ÇÈs?*˜ !õÞ`3 ÃN2!õ!ÔiO{Gö6ÙYîAï½±Sp½ _AöqŸ±¬ÈÔB»8üx¼K}°xزžêÉdy+lßÓEôÊV–¥ã(Ò¨êFõ÷Åq6ìëéÐkKá,R¦tC-e}/¦ yèhr(a¡J‰/ŽE‚ØØãwô°¾]éã0t1•¾‡½8ôc’„’‡ì3ƒâà1QIR…i`‹Ñ„d\JõÁ½Dnu.u'Ù[¶|ñ*:<½ˆ^€::z­•ÝáÉÑéE·½9žëî¼{r¦_}rq={z¸êÖùA÷`Õ$¿ìÔïù^vž•ä9z Èí ÖtŽ»í³g‡í¥Lšo©Šï¸ÕðÚ‡gÀšè¢ý¬cÁXONºwŒfYõ9^œ?Yd EKûìžE(Â+ÅâࢻJ(~qxò ¯ãé!ü^Ù®¦Ø‹%’|tñ¢Û)ȺŠOg•SÁ‘»Š*‹4»%Qwõüð¼sǡ³³‹9I>†ëõ߇‡íí³hó|5Õκ/DÂÕ·ñ—zY¯ Nç|n]T·ý4:lŸuïèõüôàô,zùâàx‰ààU$éÌOpÙz¸‹ÜÏçâÓöˬX:Ï;Çë–O{a˜çm²£K#,¨êèR¦Òœ 6ÕEè ì„ä‡Åލuzr>oäÛ| æn“d^Úk¼¤± VÄC“üa±àmkX¡»÷™Ðèø¢–ObóÅ/bÍÜš¤kQ–™rŸ;1R±C%ÁN¬dìÄœS@1~7”{,ôU€…"…RÈ –!$ôÅŸw–P)äù„p_/AqÉÀÝz6 ´e½³/Mú–q äøj˜Xü4ây+,1ë_—©2O$Ãï¥5×_YÐ¥VKëiY㥊ñÚ¤´ÕfIP€°ëQ*X$rrÛív9dУ^f*¼Ô‡|’ôt";½#·‹û¿¢éY{ ®Ÿw¿UÝç8=0“{{.j,°Ë¢ˆ3Ušzy>¹#ÂlîÙbÄïAÈMÒ'Ý—¶ù<ªFTæ[‚M•œû*+ÝXÄÃXÀV¹2ÆÈó0¬ÉbYï=3jf§æ—Àú c{„†v0§Úmì+æQæÖß.xjªøóþðÒD¦ÉhØKÇ·Ê ]öuqŠZP!IPHb­(',È“ ‰û‚_æIRª¸Xˆ/Í€B`GlKölju#M²~½6”íÕ)8ç”mìΖc>û!ñ¬Ùù6mz““ ìå”›¸’#êc*Ø "N|[JÒ…IXmð>SX«OVNä›jؘ#Ÿˆ0P‚J~È…B(ÀT$, ™¥EùAÂVž«1¾ ¡Ë ^— ¶7šHÏ£±Ô%í@š’ÂÄ”H(°ípÚ?¬àoàÞT‡=lÄäùч c¬b—ɘƌÒ-‰8tJ&ß݋︱w=”Ä £’q$©KP@TƒÁ8 ‚ÚO%wkQÁsÓ¿“»r2ΆiÁ37 <—¸„¥8J€$¹ŠÉl”øl»]¹†YÈ6cïÂðI"W‚Ç~LEì.£ —¨'‰ä! ¶ÂábðÛX½~À@E&"D4¦Dx¹¤‰C%qbód–ü-k Öù[Ìÿ.ç×=5Þ©é hÀW‹„JAÂ)_r^’¨„ÇÛ ér³äa°5ÿ"ÚÄή•…[ó Š©‚E‚—R Ê<ñ<2á3´%A¶3]¥ª@üÞŽ3a 㞥EN¥Ô+5tCsÊ`h·€[³9`©t—¼T>Å-QâùTøÔ  +Ì A Å,@˜€ (¢WÞ›–3gæjÕl$ K¦ÀüD PiÒö‹{l¥K[qJ°¨mˆý=¼±p;F€×} Ï˜]7F(}¸~ˆ÷DÛs^¤Â]ìŽyÆ­¦Ccê6_>ØÊÃ$VŒ†!lÖGa‹nƒTe¯ïA©:Ã'¡O10˜˜’X…2ØsÁ²H¦€˜ÛÙj« A›XùëõS€&‚2íµÐ…xƒDêbÂaÕ°u< —Õ™]Qà.^‹^ »„)©ñôF :¬¦«Ãd8RaÍ(‰ mðÚöºÑæy#f/ÎBº¶°3˜€ž"¡ï#ê‘Q%óí0»˜ÇjåÄîšáö;{íL‰à¨@ßlÅ_×2e[E›­_?²ÎŸ€&â#áPW'LâHá¹ÊKa®ñ hnèçïY)Y¿Z•í6£5vQ¿À“A/µ‰!£ÉÞÒ…váú`<ˆR<çÒ±›gC¿ú¢.9û(¿â™ù úÌî¹Ͳ%o:”_ óh4A~k_Ò~&ÝÐ0GU)Þ",l6Ð$-7üºÝN6BeûºZ®¦ù1Ÿï~A±¨t­iðÔоzdtõ6ïéHª’º³•äòRÛË|3dÊàí„°ÑZï õŽ£+­GJ .Ü®îôFSE´£\ ͘‹ÁÀ=¶ê^­êoI›>ÖP°TSñvFC] ¸ì¬(ùñ±uáÕý@ïcÿkÝÎì<â]OerÚÓ_ž£t¢½ Z ¾kUAc-5ÌZV`¯‡‡á®ç]îïpÄ©e"åóÓc?Þ$OfúÆ'x¿*$ðhˆ0³»IíS9³UÌa眄pÏÑÆÛ¡ ¡N ¸çÄ®ðaÓ2—˜wTŸO‡YñR¬×õqìP– ‡ÂÖ̉‘)â'~ˆàžu4Ú%^˜ô2wì&êZçŽýîÃ}˜ 6‰÷¶à!¸ˆ"é–,tx,‘³Ò WŸ×xxÇ¥Pž+ÇÃ:CL}‡.Ÿ+Îa[ÅâµÇ¥6lãGp\ ';ï8ÒYûN°‰ô™Í^Z.ÍÌç²oÖíUf×ù÷½,H.:—nEï8€ûõ­áíɹóôðÙ¾Žº¯zú#ÂÎÑÁñÅÁ Ž[À£K?£[[“ò{ŒiÈà½Sž›ûé›—òLýòØëå|yYk?ö|ÿ¡gØ„Î-w×ó—ÅHÍñÛ%æË»oõ1Âȃ³' ý„ÈØ‘ŒS]ÅsBî2t¸G°€ŠuödÓ6šã·ïT¶jtÞ¶ÎÎ0=¹è¼°YÊmù¦Ÿ¾u˜B´yÈÁíŠEúxRǼ]áè 6ÅÒ‹†w ¶Ï &ßÛh ®+HoÆ_/Ö”ñAUÝ©VÖIŽ®ä@f¼_Tʯù¨øs˜õ.{©ÞÒ—çÑ.ðÅœì7ÀÕHŸ$ÉMOW×Q–^îó~xmŽQíè½òŽ>·Sl‘—ÆIxèëZ¾žåà¯íÙ³i7 †itžwN§´d\u…•W,´ ²á¥&lÁtxºýºë|½¿à`)‰*L+Q’é bŵ7òm)&Eö$hèüì¥sqþ|¿Ï'©N†6 Ë™¿?– ¬Y¦Ùz(çÝóý1ÏßÌʱ™Õ —|í±é`öP<éõ“ÅGF Ÿ³:hFÌsGû¾ÒD&ÎtØŸ tÿÂpÆÚ<';ÖÛ³³Pš¬æ3š \û‡l*–¥‘<Óò‰`D¼´zöŒ F¼É}+Ô⇗¢…£ÀÇ!ò‚à;0ì`Í|Îbè~îÚtŸ›¶Ñ`Ä#n#bhU„®ŠòW~@%ò©r±‡™þHÊ(×Õõx̽8ÔáipY‚pƒ-?>lIlùÑ`Ë2Bò‡Ç—#~>`tÉV ËV]s°?YþMë\³‹-Í{ºB»îÕðuë³Ï~^].ÉÒâ h¡V.uŽß–npÉH¼Ç*¾Pºô¼øŒ νsé}qîô…œ†„x ìi¢“]óØá€*÷%CžbÔgjÎÝ´ç68·Á¹ ÎmpnƒsçŸØük÷ûA½~"8Ô_þM¾"AƒCoãPö àPHáó@8÷‡† ;O”#|ÅIÒdÝ´‡68´Á¡ mphƒCZaÁcÏ'ŸŠ?”,+óiH@º ‡ŸŒ'™ç'–RW€RÌá2 ŽÎÔÖ]g–Y[›{Ó6ÚàЇ68´Á¡ mphÂȾë>ÆÁ'ã]RË´N‚‡ÞÆ¡÷­eÊhøý¡¡ò"D9TÆÜ‰©.؆[' 'âëý¡›µÑàе= ÚÑíÑpˆîÜ3‘åʬž-4kCWÉuwÝ]¯†C:§€gŠ$N&Ïü=çèàpÀET6¢ø>bûDîcºïÉýŠ ZþˆÐ²Éû!æeâX¤-Þù@Hz1·Ž¡9Ø%[7i%‚F?‚^•)kãÛ*˜ÖDØZ³²§r^Ü^k¸øSI5àù]$h`üŒ×¤ù`¼JBƘ«@n(•¾R àK—øD$A‚ÖÁøMÛh`|ãßÀøÆ70¾ñ?>¡jZêG͵-!hŒ˜ÿðáD¼QÜI¤OêûÜ |Á¥B_±P*×[±i ‚ntƒ Ý èA7Ú;èvÏöµ2«•ÌrЮ÷G}žÊ]yã¾Ô lgÉ›=Í—TÈjá–;rä-{ë Ä=›öòa鮫J÷î •ÉüM‰ çm¿?¾ToÙó–â‘®\q3Ïà9ZܶMZØ @¯±M·›{#³Tö‹Á-hQ¼ë‰áp%rÚ«‘y~ïM¾ìycÙ [µ&ËÈß2iêF3û}qº³Å}ñæ7×| }gQÁÆhÔŸ€•ÙÕ|Zæ»1Ïå7-«ÓA—´ôFƒ§IëÑ—OÚ‡'ÇÏ:Ï?Û»äÞ·“IoôÎhâ«^ fRÿx3‰¥]ù­¡h9i«RT­,¿j*Ñ5Må$wàß ™®?FÖq[pÛ`ÜÄÕ°µÓyûäâÕË'ÐßqŸ¿º™Æ¯^º_¿þ õy‚àÚ4yåÁïΗ_á—£øy8þúõÙÿ³wm½mëÊú}ý ¼d- Jīȶë8©ÛÈNm¹©,”D%v|Éñ¥¹œ½ÿûJò5vâ´YÝi뇱Dñ23ä|3r:QG¶£÷ŸÝrïC'ÂEÝJ§ÜvZÞYÓñºðwÖ5»•Ëóºã4ï›ìäì¨uî—FÍû ìFwž_@çí†SnÝ´BòáúIG¡NDj—á—Bë´^¾­Ü7iÕ÷nªþÅ­wï¡rϹðÚŸn¼ÃBþW{Å´\¥•+vŽCß}¸;ÿcùò¡}^/Ërû¨[9üG“³í&ô·rìáj]6»Û“3VÚâµK7•³&ªËÃrWÞ©³8‰;@ƒŠÓ?ë CŒ:ññç»/¸r¶¢îçû|¾kâFJ‡óö§;ø»=¯£VCýZ»Ò¾5Ï>t¼:jW›7•ûò­wø¹[ñ?µNоFÝNï ©] îãã£QT4c. óî ¬zXº÷î­¤nÆX˜Ñ´NoʇÓr¤’•{¼¯úÍõ¼¿^ïKws¼_¦)ÈÅë¡©çrÖËéÅý+’Ó[x¶–ÿP÷kâ?{dNA_ÿÛ%¼žÿWw¯ˆÿw•ù9µÌ¿‘ñÿâíÛëß–Q®œZv ÿ×ë'A±TóƒÃríí¾Eû3Õ¬¶(Ô~7ÍÛ‘²Ãq/îèTŽúý޶奕éÐáÔQ¹¤SgU.gs¤³¯®[&÷ä d½³kõ{–"Ö.`’á=Aö–âŠGý³ÃáåßVÑXŸHÀ/kæÉ±Fý¥v0ÞµÔÐÚ5¸b׺i,äéÃ3áÊ~0´Økà±uÕßK#;LÎ-èC֬ޭ?sÔÂ{€s3Ç©•úéêï¹'ÿZÙ]ìªFŒójËgÖŸ™™¶Î_Öpœɸó?kêç›ó! ±þµ@ǹÖ:wVnü¯lVŠgbÃL¸öfB5u=ŸN„ ò «Õp VˆÕÀv9°N݈XA±v¶zðü˪7ŠÅR½~0c#ÓÀ&Ø@wû#m¥²¹÷ÇŠþã7Ó×´GðŒÔžûЭþx¶Ë$ÛpßU®ƒ…#í›`eMá?„$XIEB“zqZo†–³Öp QØ«Ø5Xé7…§d²Ð–?tãàÑ,Fm··’Vš–oE-ü€¡4Ý~XuöÓIóLE¦RÛ¼ôMÞ¾Ý^ߎ& ­Ý‡xH™ÉÃêOžÜDHÄ¡»¶d ˆ ][IÛ‰ÔR£D°ä[Od*Çn$íb)LµË0 ¥’Xj%ùÛ$D.W=¯x€^NàGÍ/Wç_—½Âq)ð›§Ð¯lÞÌõ´^/á‡æ?¯•êÅF)xwôyþéq­pú¾\¬ç­¾«ß××4Z+œ=òe¥ZYh®îWkæÓwzptX\÷ª^ð ëù±<ÿ¦äû\>šÇûÈrœ5åŠ_ªŠ¥•LZ¬©„rgå´{¥b£¬ ¥£rö úZ­úôæ³æÇب¿{ÈŠV¶éŸz ðZ±(4üuBñ©X=ÃëûxZ„ßkë5;Y!É^ãÄ/çd]ǧZyíPpଣÊCš-IÔãD­ëåG>.–kµÆ‚$Wàùüï@›“R­uÖ×S­æŸDäú•þh¦õâ”ë #ð¡S~é05,iµ~Z8­ŸO •‚ƒ×‘¤¼8ÀUóá1r/LÄÃÒç2̘:ÇåÊSÓ§ô ›õÙù;Í£¼´T&î@ånRÌVúEñÊÿË9YÑbNV°ÀfëéR`ï+ÀKû#ƒ— $„× ò¥\Ö†St÷O¹‡°Œaäfhi8M2g{ôkÎÁ­@úôÝQøÀVH›@eÙ*áØvŠ”J»š~Ê —n"p”IijF‘ QÌ~+„rb™$ˆ¹„(7!,F)iáÄ/²ÐS(ë›Åx5h2¯Òýfcoöã ?Mœéü7û:i‰,uö\ØÀdso.¬âp²ß7Í ¿I”ÃfAH ì0êpiçÃí®6É¢ÓýӼ˰B\·éP¾‡“nRã–‰ÒȆw&Ë'C-CðÑ>½8þÒ:*~<¹H»ðõÂ֨ȦE¾5šnØ·†ÃñºmÔå²y¿ƒ›D—<—Yõ“¬ès[a`Té|+7k];a!%ÃL sÑ FŒa˜5š‡($z¾õAºÌd[îù×Àz!eè`F¨T`ÁE]7ânÂåÎü×9OÓcÕé_dѽøºoÒ /n1_tÌÆïΔN‚ÄH’a •¹GDˆéE»"_iI˜_ƒÌ•lï8Ëþ¾“*»‹¹MÝôGµ—V>tæã²Víœsö¤Že –xVíb)yÖ "ŠÁ–KœØÑ Q  ŒA¤ˆ‰8a”>D¶|Ïž\OÖäïi·±B.‰¤H"°ßGª(AH`Å\JžÑbt’!Í1>§AJ—5¼žÄ=d­ÑX3FCm¢›@šbIC—‚˜*¢$üe8F„¬á¯p]š£lÄäÅÞKXCœ„×! ¹ÚU),XÁ®ó,~F8ÍÜe(cN55L‚IÂf„(áóÜ̓*æù›ÿQîêñhíÏŒ1wbÁâJ’D¡"$'áDs¿ƒ³f×Îa.ùfì}Ð}k¤’H…nH£Ð§°.Q¦‰V‰ápÞù—˜½®à°DÆ‘D4¤$b‚†JSAB™hs2ÏßIØÙ<óñ?ÆâáM+íÌ­Ѐ›D8Š©Žˆ”(qµà¥I«ð%(”6¹É$@û`š¿6ѳOÊÂÒ8¥ ˜&0I°p(U°@¹‘ŠS’Gn_H³‘®[ª@ü¾Œ3a‘¡€Ò‚X´(DZHL…f¦Jq´°ô3“Àl™-¬•“—©OqFK3—F.u„ 0Ø„E(Ä d *@é—¡åÌ™¹~é‰ÂŠ!p7N"XÒ2úK1ºÒ¡€­%˜‰ä%ÄþÞØ ¸"Àë.tÐåÔ®"‹>Ž+1R,šçö€Rá1v‡j‚Á6·††–K0¾\Ð/TÉ8L8•Œ5Ä(˜hò%H5iõ;(5Ïð‡ƒHŠqP˜˜’0‘:Œ0s@³hž1_Fd§ÃX§ÈÚDˇØÌ¯4‰¨Ðq¨ydb²E¬M\¹œg5£vWõÈ æ™=¥Àc¼ŽL8äà+™ã5¬!¬A 5ãíW(‘B¦+  $‚^‚×Y«Ï1ûá(´£ÀÜËcë‘®‹(#ÑDÇ «—av>Žõ‹l)·sh=êµKÃŃüý"þ:ë¨?îÅV^§õ»™óGp £àÚ&.ŠlêDÄ€Il1'a1"x=}ÓºþJƒü玷 kshè??n[‚â4j᥎+‚‡úr;Ö¨âHa«Ä'`%#É5âø§;Kàm [ƒhØT³ÈV…Kvâ ùÔ9ØMëøÎÁâàìfG\7‘¾þ´ÝF½ø‡NÛmÖö§í6?³–¢½S•ÌÛ)݆2òŽë·'ÝY}ˆ½A„ýì÷*lBgAÇÈp ¶ ¯T_ä™7“Ž~:}j¤AJB[cÛGÒV<$¶‹˜9¦†1%Oé“MëØÞ«ð@åE•Î7ƒÖW•æb{9¼Á,ˆO\ŽEèkMWñK ¡çÝ;ð#SU¬O@a*w~Öü h˜ß!:€åp ¶7o­DˆÏNÉ‹~¾»k]ÐßX f#ÎC›2娂EÈV1Ö±¹º(–Γ©Ð6¬c‹·ñ%¢ˆX+ÍKT(hÓML€ u]‡¡NÕ®›ÈD2–x’ °\¢h‹,_²d[dùjåN„ök¦7`…Åw&g˜¡ë,=ÃrΆ,Cz"CƒûFRü› \†ðp Èå®B¹î³þþ|~PÌb‡ÊmЮ̦‰Cí3ž£(æ‚…ŒÕk¹¦zâDç7— mƒ™önœî¼  …Ðó ›|Ø[ÙŠn#Cõbk÷cã]©X­•ßî_ö»zßä9Þ߃UgÖáËV”¤ùq5u6ï­~dÙ=kºLYƒá¥5ËTl/%Æv,xmG Ú¢Ë¾µS¾{×8ûüÚ{˜¨ž}Ïü.o”ý¼]k{þ»–ç7GçÇ æÕÇ$b?9;êzÇ‘‡›Nõл­úç(s·Yrô«ûÊ}é6KŽþimÂñJ;+·QÂùnÓiÞ—nší>9«uª~iT9,°j]ž·ßuNüJ·rxqïùWøÜ/a¯µQÂyæÝG·^špþ]ŸÄ=ºKËm”ÄýC·rìÝzÇ@º:÷¯nOüO&aü¨yÖ¼9¯;÷çmhë¾Ä*ÝÆm¥]Þ,‰»ïÏ/™$îÄkÏ%q¯Ó›òá´©då^ï«~s=ïï/^ïKws¼_¦)õ^M=ÿ“³^N/œW$§ðÍÅZþW£×ÄöÈœbÞá+â?Ð`=ÿáïõðÿ®2?§–ùï73þ_¼}»cýÛ2Ê•SËŽáÿzý$Í –ko÷õ(ÚŸ©FÀï`³@¡ö»!hÖØŽ”Ž{qG§ tÔïw,°,/­L‡§NÊ%:«r9·‡#}uÝ2~në]«ß³ ±v‰ƒ ï ²‡°\‡+ž¾¬a8¼üÛ*ÛÓ øeͼ8Ö¨¿ÔÎÆ»–Z»WìZ7­€…¤¡!Ö¿è8×ZçÎÊMÿÍÒ7Øuž‡ 3áÚ› ÕÔí|:J0ǃ®VÃ1Ø V<ËåÀ:U@t#`Å ØÙêÁó?,«Þ(KõúÁTŒL›``Ýí´•ÊæÞ+ûO~Þ£š`̬½!.#°¢-0lŪûïfcÝn,oÐçmêþ|g2ãØE!Ó6¥„šøum+&;â\Å.3ùµžÜØ´ŽíFÀ3u¥Ç®Ø|"\å¸2äBØ„'Ò¦‘pl‘Ä5¥cºivÖoöþL]ãëÅm€<‘ÏRå§ê§’×Xz5sÏš ïæoâh]§ŽZ á l06ÛìbüT7Ì9ë•ËEœ¸‘°XØTh×]‘ØÜ匱„QfãÝØ»·†é@Ðeé÷Ã8w'îu‘nEtûƒ» Âo—»2ó¡¨Np‘>‘“âÁx˜úUÐü7“‡œ:sßÍMZ õó"'SOUÖˆéÈíoª@r‡Ú`Ü3ñ¤Á×îd? ýnšª'èÀà A\b*¹­^ÒOéªÑ¥¡Ô­àOi×íÇ™«¸tÚ,Ú5PÇÿÏÞ¹ðÆ# ø¯4 ögÚ$E‰d€¹Å\&;7ÀÎÌb';{ÀNРDÒîÛ~Ôm;7È¿")µÔmõ˱·Mpl‰â£HV}U¤Dtãoܘ©öKgßþ^ÆÍgãÙÕGŸQaÆã¦ôÊÅ—ðŠYiš;‹kw³ÿ˯f@,ÃÝt‹ïüª2þ̰blÇ`¹Ý¯ùdä—±,ÉüZÎͤÈQóÇÛ¹õ T,JvÙ]¥B$m®@ÐÈŽÆ‹p,œº¹ yÜUþïÉäÎ_Ó[ávS  ;Êý°¿Í§³ÑôF7Ï góEÈ;ð˜Ïý©yv¾ôb©€‘¡“MXØðÙW7 F·œ€Šk{ŸU7·¡™ÆWgŽ®[ç__üÆèxt5…´îÏDOg·óÒXàz/–ê£+nÜt‰¹ó“Ù¿ûÏщ¶ctãλ*}˜v^×j ?)PXô©ªÜ7pê+¼œŒÂŒŸ(ÿÿ¼O–cý¿>|˜—>çÉ¢,W²nª|3©›ÅT- wdÕ²Z4¢Ñ0Æ£pŽÜJÂÓðôÝ•Yä7¾´ ƒñ&÷¿ØêªrN“ùE8]D]ÛáxÆ‚YÕ¥Xõ`ݦ9Œ¥,4'ˆôfT.Vw‹RŒÍ•*>ÖãÃ\Ôýñ¦¬Å†“žrå»»ÔМy –ÝCU¹ª_Eù¤.Þÿ7›á ÊRÏG¾è; &?T·þ¿¸ó+U0,ŒåaQŸRj'^œóéÈ—p­Pø­ßÖ•©LPÇ¥¿!´ë.¬(ãk7·nöÁà™„?ÑU= 5a&×àÎúË(<;-a5SªÔ M뇼¼M9_„ÉT¨zN­á|ØÊzêçÎIì\qL–(§Ô}ËÁo‚d-UR%¹;wñóEžù"ýæKPíΙLjªÌW¾·T©A…k0T&á×MóE¢ùzþæk]Ó56a¥yšù}_ñ¶*«Qº½SpÝ44:¸±[ ªõo£Vú³ÖD­>kç}­ÙjųÅ\¬TW£4× d­–64L««º²Êõmuèš Jº¶µúZvÏþu¬F­½Í·Ò³Áš¬´ÿ7Ôªue²6ÌíVt­ÇÖÔjÞZ•vÌÓ&Ü4¢«K;¤3í¡Ú´uLOC ë–«cðV”³f6k¢jÎ={¼²¬ëŠ{]ËO×è§Öù­Iª‰ª¶/k–¶¦œM&ëòÕš¥¹gkð« mmWW¤S³J‡‡V˜µÉ_ »ÔÌÖšÏ5zk€sE?`¾>ô®†¦çŸüy——Ä2 µAy¡ ¨L"•‚ ‘aN v.Ö¥ B|!Xß‘[­(^äÙ˜à³OFWNìO~?ÂÛÌÝÊû0<_„¬–‹ÙÙçCyl” Ÿ^ˆŠ j¹¢ÈV ¦¬Fy–STd©©9N÷âuhñPÈÏÖ =¬>™'éÉ¿ÃzˆXä‚°Þ=øNñÖ^¥–ûkzzGÏh¥óT‚ˆ1Uˆ1ž Ði!„Ä™0&ßûQîCóˆ¡÷‡OàÃöà’ÓÑ{ð ÈžIB3±¿øñ‡ïÿúíû~úþënħk!±Í-áÖ†É áÌbšÒL¹ƒ˜RI!T®Ò\j#¸(p¦ ñ¿äF|ú&%û7â§_h#~úñ){“š7«ÎøúñšýO´ÿ°²Oi#>ŒXù…_d=«½²Ÿu|®ï³Êó$¡¯„¥eÆ«]"ˆ,½ÉÒü°´Õ™¢:eH*#ãZ Ár†¨ÌKðˆH÷~æÀ<"KG–Ž,Y:²tdéÈÒ/Œ¥)¾¿ïÿ…²4¾H«v‰ ²ôKÕ—ÏÒ‚PÊR­Q.aSààŒ£$e&'% ³},}h‘¥#KG–Ž,Y:²tdé—ÆÒôœ ñJXš³¾×+[D–Þdiò Xšk¦0pp’å6ÉKD(×XçÄr*ö±ô¡yD–Ž,Y:²tdéÈÒ‘¥_K'ç2“¯„¥Y–V»DYz“¥“WÀÒ,ͨÕEIN2UH£†A#dj-e{÷xšGdéÈÒ‘¥#KG–Ž,Yú¥±4?'‚¼ –¦÷ŸÙŠ ²ô&K¿†w)!J¯ „‹˜(r7x4J©ÀŠ&&SïcéCóˆ,Y:²tdé­,MYdéÈÒ‘¥O‘¥|NøkùŽØ¥j‹â~é^–¯!.­4M27‚¦  –›³Q.¸ÎDšr¹÷Ú‡æY:²tdéÈÒ‘¥#KG–~i,MÏ3,_ K3Ú÷õP'£écéä5ì—NY®©Àr€–;£4“©"J àœ½çÒ˜GdéÈÒ‘¥#Koeé„D–Ž,Yú$YšãäÕì—&}ß—nEYz“¥_Ã~i€S–j"‘a2ËMs¤4Œ‘x„H)„P{ß=<4ÈÒ‘¥#KG–Ž,Y:²ôKcéôœ“×ÂÒïÛ/ÝŠ ²ô&K¿ŠýÒZÁÀ`9BrÄlÊ‘ „¡DŠu’P.ó½û¥Ì#²tdéÈÒ‘¥#KG–Ž,ýÒXšŸS™¾–N³Þ=+D–ÞdéìX–f'ø}iž ™h‰¬å9bg(‡Ÿ(ç€Ã1&!{ãÒ‡æYúE±ô·oßÿð뻯 ÒBcm”I OT.,”Ém’KË8Ç4ÏM˜áÜJ+ÓÔ&pÅ•åEAúùtA:‚ôëé¶Š§EÐ Nú ºFÇ[6¶¬> ~qõÀìV#WF'sÙ:ƒo¾ùƶ\:Ë|6P2P2!Ϧzàrì¯ ONæ¡ãj§­ãLV[ÚÈ"­÷Ñú‘'+rq‚°žš’¢ÌªÂ¶E¹59JE^м0‚ؽ/7šG„õ´—ÆÛÛAû{ª$N+W³eY˜aÝ)N7ýC.ŠÅx>VSsaîÔd>6nŸe¼è{o}¢.e:ÓDZ™ïNîл5³±ŽœØ¦P°)ê]›§ævÛ­Õååò8·¥õ=ÊåtZ‡œVb6 7KÙvÖY‹¦ý¶Þ}?®cëkFÝ––²NÚ¯t—í¨»$äkÞfM>À¿~bᥢװ4Ùs$~ïë1¬8%?93Nl.Ái¥¨(rŠXŠ%ʵLàÏ„p›a½ÏŒšG4ã1æcn1æcn1æcnß·ïßÿõMíÅàôl>¹ò]šrš (Ôœ¤}O]Ãp/oFÕ¬ôTóìñÅCGAFiƒ-ÑÇñxq+ì¨/}88bÚÜ­wðš,6m“l5PW{lÓfvÿ4åÔŒëÊõ6AMÜPÜ•b6[ µ¹uÄ| _ÞhÕ—Þ[¶ÚVÝ¢~Ý «“î°µßûËÙcE^Å9Z~F~Ô­Z@ËËC”(¹tÝ5œÌ´ÿ±ýÕ{ðß4ÈŽ/2,ª--Çøõz.ñhjK"XŒ&îóÏÙ…",DBwz<÷},PÈ£ÉrÒõÈîI§îî§c;}¶á=ÀQÒù@¡n'¥ÕJ`©Öpeý&µšáÄf†R)s.4O3bÒÌ!•è/îÆ<òüéõ^|ùw‹ÚTÂ3½öh{ÈÐ?Òª3ðAòq8»¿0,­ººlõœ/g9_=11“Yù.òŒËõ‹ÃI> öÎëÊ”ÐN1;Û¼A¹ZKNš{ ¨‹î…nJ¼Q¬b¹.ðú#õuÖ^÷å6×ñŪ>M`“+p‰„óÍ)(1fÀÉÈÈZª¤Jr¦ipðüLÖ#tp1^ú°lc êŸãC†zl]}gÕÁ©¯vÜ™úJ×ñY=ºî+Ö—,ÿ&Å>jýà=ûX_?*^ì¹{ëÇqˆ?ÎW˜Ë<%™ï¹©"±(7™ÆÊè$çìɆ8O&<å/m€[Vœ“ i# bX ¤,6(±L$Df†dôlK|]œ§);Y.¼šD.W…ä ¦h÷`è’V»Úi°ýè/Œ¬Hƒ§FƒÛfM/6JÆÐ,Ñi4’%1¡$@$HI. . ™këûÙŸ…x'˜ÑUÐçìïuªÁvSk¡ƒŠ>¬9²ug­GlV¡•v!qXÌ–ÓÅÙ=ùìýµ»;ÉM9˜ÙÁ¯?:›g³AnsSÚY91úÂA§£nà$;qÊüì÷ß~;s£þ{3€#è+SÂoçîÏzXû»øSÕÝ]ÉÅl¡Æªª¥†‘¢«§á·A£<Ÿªª®(­Jíƒ*A_û=UC_›-5¿Qã¥qUÕ¹»:7Ù VÙUá „Ö77Ð›æ° 7Áõ§­ð‡õðòf8÷ó÷Ð Ùd{¹=¼ì¼Šb{lß[‘½Iñ&þã7=[+jñƒÛjÖ®mš,INjÚêeInÃçÕ®†GºyºI('‘nNnöNŸ˜ƒMždEÁQ¦ÝÉhk$“ ~Ü ‰VyÖ‹9kEìD{)Ë.tZ~h3Ñ8<¼ôu áŒÌðXêôíFϹ*á¾Û\î±Ò/^ƒKä·ÕkÙp»ÕëèÈðc¸5XV€6ª¸¶VŠñ²rÎ]•†fµZ•¥úè·1€®Ëë[ «u\×·<ë"+ËÊm|èn~„º×Wýjv³^¹åIŸf}Y]ÏÆº·AߊÅàºÖ þi>FÕ@ Bû€A5ù«pí Ð1\Zká,wzY¸+Èž*u›P)lÇôº²:ÕÑES>õ7þØ\Öeµ¥bø‚l+ nùÀ§(Ô¸XŽÝ+ ÁèöÑåà'n …‡N*¨ÆÀÓξ/†õýj ~ÑÝC{ Îåq:â¡™íï6çnÜU6¤ø´V¿]–‹ Aß\™ÅàºâVÁàw†hÌÏm— ÉlÐdÖ+*¬åî›ÌMºöʧfûÔ°¸ž ³E]Ï´9.áo¨!íÅཟЮ]ÅÇb TB#>úQd–+£ÊâÚµ ž¯.o]¢Áíh<¸×nÜpu9z7Ógp¤å2ðIœÜªÙ¤ISB®³Éà_½C ÃÚŽ¦ÞU e?w0ó•þ·‹ÁŸÚâ}fhYNðËç7°%d6†®Xà­¦l%~æ pöê¬STŸ Þ†:ئ®¡P¨¥oA·œ¾ÁKÖJõ3¦Øh¦wè:ï‚Fx¹5Ãl ®®Js@¼Ôv¼¹Nò’¨žïÍ:C§‰«Ñd>†¾„VÌýià¼úô²k"0¡qf ÕG Ô<\ùµŠP¿í*äÊìÔábð÷`â]uÁ¢ÍùGÇ jRî"¾Ë 3º,íªãÔК¢¨cšÂoP ë-Ík‡£ã{'3”4=ÛÙù»;,ùÙ®.™Ý¯ÂêzówÈå ä¶Ým&Û¢‚¸r³¸5äw;[“g·‡µO þè(tUaû”ÓúˆN0 Êm;8¥_7Bùù—FC| oèj<öÈ/°Ø²Ï‡Ó—ûhž$I­d’"­Ý‚¶ I›S”Ò<%TR’RÕõìn×CëbE„ƒC•°L$7uŒ÷Õtö1tUÌüàþLJOOÑùìPÂÆØ»$\ëÂPŽ„•´M0$2.Pjòœj¥”árËû£”ÅHÒÓG’È£F’6ºgÜè¡Ñ}‘9üa”f®˜­Ü:{¬€ØCæï#GÅ>³ 롱VgîK5sž¦í‚ʽœ¾E–m !Ow÷°òJcèöoy~àl ?ȸOø±ÖN(ŽöîÔVNºó¤×ØutûÃ'Òr1W¾ô¡ÿõÃà­ó=ç |HÕ„‡ÀO-]:,y¦”‰ú«.ýXfâħŸHÿÇ\VÍ{±þͺ­‹VõãµÏüóOï~ù¯Ÿß‡¸kˆ’µV¯] ÚX÷é_M¹¿˜²en®ì‰oo†×ÃP¸?…ñÖ˜÷A‘èû!ŒÄ—´% upœäÓ§gîÉU—–ǤŒÓ1™¤ŒÎ‘Í‹Œæ\e̲-;i=¸Óôàv;n‡ ‰ý þ¨¿—8|…}«jZí?ÿË»Ÿ¾«?4ÊžÛ‰+ÖnŒÿYêØµXô½…ÂzaìÞº˜_ºzT§ú0Uú¾ôÑ%¯»Ð÷Y`Í©VËÅlXoxè¼p15w‹a¹œ]°¾}´óªP“Ùøu#•™ê+vVÝ—Yö»ò2IW^žcž®+øp${wI®D=ýÇx„Ê$’ÑÉùúGñ àÓÏ?}ÿsħˆOŸNŸÎšfhSŒœG`_FSƒðÙÓQÕ8µãñ>ÊbäœHúZ(«÷MÛV‘²z(‹‘£)+”)ë«RÖ/{ûöÝ»ïÞ}9+rVä¬ÈY_‚³äAœõ˜kÍô‚R† ß¾Ö åR™¼¾ÃRîAä»Èw‘ï"ßE¾‹|ù.òÝãò]"Ò±ñøAý:¥÷ÍÁàEª]2‰àõ(à•ÅŸôVåcgÖA[›o?B7šj'ëYY}­/Ðù·s=€à¯÷å³#*ñdŸ‹ÛV‡/óu½¦t ¥;+½¢w¬pθv•à¸ÈP.”@˜sC¢a~¥-€Ëü_‚—¯Æ3`ôa3ä×ǹ; ï1þWwßÉ5¤ÁÞŒÊÅD>õ â‡z#ôÍ{qŸýËY·¯Ã«O½>Ê£Ádgö_Ú‰”ŸQþ:XL[¶ðKŋୃÄè_+¡ÕAÈYYIß;iÈ:h:õ’Uä¨ÈQ‘£"GGÝßÚ¿/ &Ÿ4 –¦äQ±Ì‡‹±QÓå¼z®q®ºÑÁbœ+"XŒsE>‹|ù,ò٣Ĺ2FŸ¨€ËŸß½÷cYW[wj= ¤ž5.=sbÏ.Õ¯ x‚Ÿ·*8n»¦Èª]ÍŒJ *ÓUŸµárËô—òùOÿ#?!éô@Æ«]íz êÓÖÇ~™ùP… åçéìFÒrzA.ÃÈ%xÀ±¿îõÜmNAÝ̯®þµóé''‡ u@/Òìù耭S²Þ(=hª{×v$òÝ»‘¾I·S©œïÎF)eè4Ò.?ø %$ÇyšX~H v2cÊ0#"'…*’º®ÍIçÏcCÿè"Äç„%"ÅÚŠ$ÅXJÐ=93…´ßXF²´‰æ"_<Ï2QpShJÉ/®žj ¨vè¹ ü‹.ñ<¡Î´×qmQçôézäjN–&'§ ðØ)1 vÄ´Pfz†±Ò0N{Jöi£CóxÀJÒsÓXøi¬ßÏBá5¡×? §î;kÍÑ½Ê …ìOôAÊ›×Ò–.ê}öíÛ÷?üúΟˆc¦jº†(f„(Œ*rËN±È¨±9#Ò’L…õ¡vȸNžØÄXži"S&4Í…N…„e¤HeáËœ˜…‚©êxþ½y±éÿ´ÐXeR• er›äÒ2Î1Íscf8·ÒÊ4µ \±DeyQøOš³ CM2¬5ÔA¢L ƒ8Zµ*Eùÿ³w-=r#Éöi{0°_]ÆÀˆ-æƒdf¯žžVI*ú1ÝÕ’f×"™™ì®U½–¬*uïbsðØ›ý Æß|òÁ'ÃÀÿ……±WG&“,VWUWµTÒtÏpYu‘ÌWDdÄ‘‘™¾ŒX¢yèv-ì=núv- ¿¡8ØÎä7ê÷ö"É´'¦Ã‚õS9²,1W£eÂ^’†YqÙé÷X.t_gvo“Ùk–¿#÷g¹W­ÔôÑðsh/¼a°7sûÛ.ÞÆÙà|Wôz÷ÚR­“MÜõx.ciäß'¿ª]½ôŠì'B)05¹»°êfñ I†ä ôج/\q ~PW¡=°Úœ<øŽeâÑ©×zÝñÚǧ»åÞË´{ ]›{çìíïö…ŒËJR±‹Â]¢wi´‹üá˜!À®åyûxJíî»ú“°|²(7vñæÝeæÖ*¤X(ÚžÐÞ®ío Ò>ÙºkàBÚ=·'îží½pוî;ÉtŒØûÕ®˜ŠnÏ.ޝâß¶¶pA/‹Í¦¦XeÝ©®Dž¿ÑÕê£[C… OO^zg§Ïv{b2C¾r­ ÄÅ·ÿ{8_n¬³>Ì–ë‰D¹1)¦söB¿kkõå`% Ì N; y"Wk‹6?ÉmÇ­}4íÏ>1Ñö©¾öÁ¦bV}c&û0÷`âêÒÊ›{“>àN÷/tzlŒ*75‚ {c• ç×UÝðÆâÜÝ-°táŽ<âˆ}P˜LÁ;ÿH0ÙgKOV0cä L^“É-a2B÷%k¢£@¤Òà K y\ªÄ“$[¦Zc²%oZÇ:”üËòBd€“?;ë<õØÍôN¹ù¿·7ÇO‡“A±Ã^»æ¡Ÿlæå¾ývy ìFšC'=õ`0›„ªÔT¾óp¹º¤ü¿ºñ.$F)Å +ÚK¤¹M†Ü‰Fžd¡Ÿ¤=k0Zª1é#\ƼµÆ¼WŠ1 ÃT†*-FÀc ÃÈKpxZ‡iÂÅ$’ëã¦uüƒ™›LÁ ƒ™á# Ðfn¤sð¦KuN5ÆFç\×9ôÖÁÌàÞi#¥¬„œI?R83ØF8ÓÝ@ïVÌøáÙMýÎܬíûΉåM8sãpfô(ðùgnêœ/Ê0FÔå¥@9úñ‡3MÖaÊ#srh <šD¡Ç¬<°€EA ¡ÖáäMëh™6ß>œ¹‘æØ<œÉýïî>xµã>Ф÷7³?퉻Ÿ•SÓßáþ²ëçíТ&/{[š’²f·û½Ûí¾~þ,UK¶ý˱ƒŽP&®Ÿˆ[š´#Ç=³{LïèKÑõ´™TåQÆñÌ=Ÿ<é}˜Û>ˆÁMËëØ®*gÛ™Œª}ÝffwqF|þaÜO +ÄF…ך1nج€yŸÏ}ŽÊw¥ãÊêê_úךµ›š‹C©ç‹¸çtöܶ[>}U>/÷eG"ò1ž—`PbTƒÓ0Æ9Å‚ ’P…‹€‡©±“€X_ÊÞDÕv¼OL¥¨a Ìwo*N~½{ZsïÝ“z  *:;qÁÓú LŠ[Äl\ÁÁ=¯®¹ßØ])â~#âÛqáG< óH˜ràó=!Iê%:T¾ÐŠ$ý`">—ù#ð s·V¿“;¿ ¤€¢Ýž½xxÆ 0m<áeøî¶—ß¿#I16£i–z0ƒ@¿SÍ=®ÁÏwÖÌ­µÙïÖÑ,Ý4AoXr±ºDwÁÅEœÝsß3\¡«­ñ=t‡4¾gã{6¾gã{6¾gã{6¾çOÊ÷¤»ˆ?bAtïÍW ­~«€â ðk€_üà׿ø5Àï'üHðÄè¾?å7 ­~K€¡ ðk€_üà׿ø5Àï'üô(ºçÀí ä+†Öܱ øþí€óƒ÷5¸¯Á}?îkÊÝ(+m)ãøÎfn Ô5—¢™Ó…¢|Å‚&ms™½¼õ%”<ºw‰›È§¡ñ0 ý ‹ÒÄ#’i).]—¸¹iMâæÊù¹2kÓ¼,¬rÒ«…íw Ò@Mäx˜=tG_ÌÞè^ÏŸ½÷ì^õB׊û ”ÎGêÑ(ÃþOúIÂqâ“ÀzDå^ú. 4ˆÞü5‹rÍ\ÜxqÝ¥¸¶{~¥J‡™„ÇjøvPz@Ö^#@nö«Ozz‘Õ›úÐJ}Ðô¡‡)èzJPà%ƯD@…ðyº/C¿™÷h9ï}®9áÈ÷t${‰rÏOL_ è»’À°ÿüÇ¿~ÿéwŸÿswøï¿ø¿ÿýköùß—ñ"‡YâQorÞX=›ïä:šu‡ög¬ °çÚÚYŠÁæ¿^~ßjYÉÕŸýÌ|`TÍ«?<øŸï?ýóÏÿÉtîOø—ןÿãïœáÐìV×xþ’תÿùWúÅ÷ŸŽ¾ûùA×þáü»»3]ûKãu>Yí~Y_0§ì/FWã‹á 7<‡^ï~òÉw?ÿÙ"vÅ|¶Ý] ï0„í‚ô`Y*Ûl  Hÿ)‚tå‡|#áaãj!ã$ñ” ΡB¾öpÐMëh@zÒÞ€ô¤7 ý@ú2ô‚zÏaÚâ.øå7µAjבþÑï‚g)S êI®´à‡x‚ø‡#…Š)0bkqÚ¦u48më»àaòRìßòD@i>œÓWt…gI1jôÕô¡Ñý;Àp–9*tŒä&S™…h^!(x‚"ìGë4Ö¦u4kƒ™ºTqÕ>+ÜÌÛ¥ÖÍŠß2“àl\ -k•—GfÕ:8»öjvø6\iþs8îŽlÆ&Š„lalÎã.SáÀ±®ž©W°¹·±Üš ¾zFB•ê0K0¼ïÅçI™á`?'y•¬0Kp‹Ôˆ²\ýÓ4Ó:ÎDß5€Â¨|èR&ÊF@n3¼*$íÊg“Á„*žö˲m9w8vOÇ=œ!HDL%£IܤCKW‘É C©KÆ¡¥Í2ZÇ_ï{'þö¦öÅT”=XþáÞÁ{¼ÿp4ì Ï¯Š³RÁ¥­r"Mòâ¸$žfº|3¾:+ûËžU¯AžŠ·¿® ‹e~žkbOñI~aþLú]{çjŠB{Rÿ´/ϦJØ#-=9ά+|™‹"µs$€Ð^Úí‹„˜^u\æöw¿iƒéuM û»¯<˜©‰û·É`ØLUY.ŽÆEݶ ø*±¯FK–\z90YÇÖÛêó)ÑïÉ {²ú0Ÿ¾-†©mwFçº6XW®mó}Ñ^÷|ßšŸD †oG™NõXZ²äW¦¹^É“Åeªê§öí›îÈë!•ö<èÄ` Ωi/—bp®½¾ôŠ#ýó<)R„l‡'ýn1ãûÂþ;’½þ¤§~k¬O2[sœe­Ë.OûnXT8bÄBýf’KÒ(€^wPäÝ–¥/Ïõ8™Z(]ã4±¤ùyžˆ‚¦òKµž¸Hã^¿]õEVtc,…Åp ’N»Ù¸z+3ÖÓçB^9ù° KÇßéÌ‘§'5Òèܲ;S0œQ! –M¡<«úWHQÒwÍÛ†#9EG]Ûô%“_t×ý+/­SS!YŽÍä±ãï[rŽ]ÛÂ…ðŠ¿dï­ëL® uœ©L Šq]";h¡mïF©™} \½‚&…À÷UîFSÌyáI1*NÕïeQ9¥2ÚÔ²ôÖÙh\L&)Üœª„pÏh œúæ[%¹Ýæ‡5æ Ý9ó…–›¯M#:›GŠóugÌ×¼¦+mB¥yÊù½¨xg*«TºK§à¼i(upi·Jäôo©*ýé4ÑLŸÍæ½ÓlNñ¬0•ê*•æœtj隆™©ÒªVV¹´¾3:gD %íl§S_Uc ö¯f5œö.5_¥g kRiÿ9ÜàTke²®™Û9XQ·þ5[[˜ ™æuª´fž®ƒ›ÒBÔui é êFÈ™¶šé)Qü媼 åÌ™M‡¨fFgÁW–u^qÏkùÁúq:f’¢röeÎÒ:”s“ÕñÕœ¥Y°‚ø9Cëìj…tV©á¡ f]Ç_%vq˜mf>çÐ[ 8+ôækUà(¸“n°R›y¼O ½N2©Í®¥i×Ioâ`>†Ö»c›»€£|m‚»½)§"Ó´ƒùÝ 2õÀðy`ÒºiW«åµ„»ÚEÕΞeÛ·Ý=¦R³è8Ά=ób0ôäÚ«R)SF£–Ypa"ÒˆÀüO}ߣÊ'^’8¤˜ä!#fλ‹@XY$¹¯#̹©Ž$ë´â—G/ÎZñ^§³·ÿ<~Õî<;{Ï–|ÑzÝi>©¿8=Úÿ²Õ‰÷ÛñáÙÁ^¼÷ôiû°Ýùz®pûèàà,>8zÒz?N:í£úëöÁÞ³VÜùúzpÐ6oj===máÅGõâ'­Óý³VüÅÓ—õ§ÏNöŽŸ·÷O]«_í??]ÑèÉÞ«JÎ5wÚ9:1E¿8;Ÿ>Ù_õêt¯³·j_¶ëo|/ÛOKò¼†äúŽ5íÃNëäéÞ~k)“ækj!·¸[u¯µv¬‰ÏZOÛÅ/èëÑQç†Þ,0«>ƳÓ/YCÑÒ6;Ç1ŠñJ±Ø;ë¬Нö^áÕ}<Þ‡ß+ë5{±D’Î^tÚŽ¬«øtÒ^9û«¨²H³ku3QO÷OÛ7ÞoŸœœÍIò!<¯ÿÞÛßo½hìA§«©vÒyÁá«?8lá/Í´^AœöéÜ:ЩNëI¼ß:éÜÐêéñÞñIüòÅÞáÁÁ«HÒžà²ùp¹ŸÍMÄ'­—m˜?0užµ×MŸÖB7O[䡹;oAUÇçz  °f¶¦…+ $§äN@Hôàøèt†!ßè«| ¥7YÖ À¦Çc› $$lÅ¢£ë ¯Å ä}¼EÃ#·¾–OsV€7^„œ5Ô5‡K×çŠ(2×ßz4äÊ£,ˆ<–`䥔JM‰BAÞ l%AÈ£”a™‰¸–š%: „ðQ ücÂW¡"CX«OV䛪ÛX ˆHºšjè>2Eˆa*UÈyXТ\ž(.(¯1ÞÑÀÒe¯ËäТ5ªtÐD+Í"&Å)xŠ ¦‚!™¦,ܧm*Ä þ²\S“±“ç{ÏA)&8MüP'4 Ó>hI$03GyDþ6X|‹4Ž ¸ •¨êP M}‚I“ ¦ÄŒJZ,”Ü­e Ï ÿFîêÉ8j Æ8ô |âJÒT¡$H’Ÿ†D‡Eù\4»r‡<ÜŒ½ Ý'J#‘J‘D •‰Ïü‚^¢&ZpĶÂa×ùmÌÞˆ… "•äˆ&”È€ÑDx•ðTc’:Ë+éëüu㿉ÅùÛn:~XÓÐ@”J,•I契¼4I•H¶A!Ûäf‡Î€‡þ<ÞÄή•…kãäŒbšÂ$Á̧T€‚ФPA x(£mI‹‘®RU ~ï?Æ™°ð„Á×,$ ´hˆKM…f¦r…hN —pk6§ *Ý$/UhqFK¤‚ˆÊˆúŒQ˜a%”`°\ p¹,ïMËYLsµêg‰Â’!„‘J%¨4†Œý[éSÀV‚°tb‹ ìÜNàõ:…!˜]?A(ýùÇH²Îí¹/Rá&v'"KÀa«éЄ€ºç+ûBWIRÎÁYCoƒTe«ïA©:Ñ"¡…`01%IÊu"qàƒeÑa ÄÜŽÈVÃXeÈÚÄÊ'ØÌ¯„4‘”i•èP:áLžf!¯³œQ¯/ä²:³+ ÜÄkÙ€—0%5^ƒÞH@ÕôMÒŒ@)gÜj@Imƒ×E«9Ï1{qÚàn€g„1=Ex!†hªU€Åv˜íƱZ9…7Àr{E@kýúoÚ½·×!€o¶¶{`o­àª~ðûOŠ œ,Ô‰ô¨oöü4ñ´ ü4Pˆ„¾ ¤¦˜ïovÁd…&Ñy®St¬b`B6n´Æ<šBõ»ƒâ˜±x2‚RÌ„Ò>é'ðQŠç";{ûöË–öLh×<üõ7æç…Èì¢èÓÂõþdvØæ¦]ùí0GCç«¢ 7™Š†Ù8ÎM,ª;¾Š]®Ø¬£jPúý¦SO6Be»ú²©ù>Ùð®£X\FØLDxji_}2º¸Ê»&½ª¤î¬Cå'¹>7¦ `¾í2f„†ð‰‰Eþh­u—Be²ˆ® Iº0ꤤàÂëêMw4¥±É—Ðyçrhûì:ïÂUï”ÎeÖ•¡7»„MZÌØ¼šÑp,ΫÆd¦ÝfÄ"’W¼‹£_™zf[oú*ÓÓ®Y‡Ž 1õíƒ*“ìA:Ì»dÓG”Fw"çðï° ÊÉY~Ó(„û}þŸ½kkn[GÒïó+¸~ÉL•i H®ÊÖ*²â(±$GߪN±@´eëâ%;ÎîùïÛ )™².–OŽṡÄ" âÒÝèþºÑ§;¼’á³Î v@"ÎÒ“°“KSG âDJ — ÛXr›*‡Ú<’® /<ä$ïD=y;e/‘BˆvWئà§Ùfð+r˜bó4ê˜Nô̾OÏ#ÜDi›óÿüu«”$¹ /µE/ô\.‘¶R(ª`׿(’6 °æË~ÃTŽÞ6ò(µJ³ʵq¾*¸'ÃÓ;©6«ão°“Šüö~®Ùô™[4ØDú’ôÍî`:5GiNq¬{ɼ½¥óü?=RÄœ5/û2ý`ž×¶Áº–½_þ¸g²AáG]³¢°U+Õ;¥Ã4S7Inù)ÓÅ™¤¢õÉ8I¿² ÿ̃ófÿ€oý¹t5ÜÝÆÌû›° ¹-´ÃÈÒ3Í %X±Aw™{î‡lüvf%Bí9J´ ¡öìÀCÌv#¼@KÏeÁSfeÓ:Š º?W^Ôöü8x}Øäô¡S=LwºL]ôMWÃMæ‚¿yÂã_˜ýKÕäíšÎ‘`SD½h~_À&‰w7ê@ì°OúŸÿîÇHög É}!Dß\ê¾É^¶“)¾“7ÙÏá¨{Ñ÷~º^w€/ÉÖý ˜ê›­&qÒÒå?\ìÉ^ox—ì³Ú2~ó–Ù<·•¹ËËS'èyîxŸuE2>ÉUH˜&AõÇqõè–N7»ãMïˆèIDt3^ÂfL‡Ò•Ó¶]:ß[¶L‰&µøjd>F“Ý»Ö÷S1É[‚ŠZÍc»Ó:ØëÉÉÀœö©3ÿ|¬G€µÎwz(aºÒj·öÆ2¾~8è?;ˆ-‹ÒçŠÝö “nO-¹ù|ø¤N"æ±mâ`¥•};ìMú½²¿Ð±±Îj+ül-|å&?z踉¥G¶,EŠÞ¶‹·…¼t£¡DqôÔR¤è=÷“‡Îï‡A>À¶ÊŽ$Ö6•šÛ’ƒe“ò0Öˆy‘~ )nZG ¤ø¢H‘+¤´Ô.fŽ LÊrÄ"“?CC$täPÍX$"ẑw",½ „ùú¦W ÌWƒ0§©“9Ê Øó•6gbø} ÓoŒ7ÉŠe aÝI0E£ø«eúiÁÄÄ]ÓF¦iwsˆÛzÿþ¿§·—’È’Tfa+ÖæÀ`ËT¾¤Wb›¼’ÅË_„‚ñÃ"^A Q àe(˜=ÿ†ñR¢)Â!‹ÀÜ¡Mgv BlóÀ G+¦çÊ®CÁ›ÖQ à(¸@Á .Pð\‰Í×ÅWGeoäÝàwÅÈ€Á<þsy9Ρå2„L×!dwámPßo !cgq÷}žBžCÈ@ô2£8ÌÆÜRÛ [("\é¹QOƉ7­£@ÈB.r „\ ä!ç0Ùæ[Y Ôuãu”(Ðèc4JÞE˜`®´cë0Ä6¥Adƒém2©ÁÀ+íEO¡ÑMë(ÐhF 4Z Ñh´@£9 F·ñÆÐ¨Kp¼Ž}ŒF7€FÍÞ(®µk‡"0¦Re "›«@â@))ù“»­6­£@£-ÐhF 4Z Ñæ0˜·Mˆx[h”c/§„ƒ 4º ºorâ@’š"›º R¢Ð¦ÔÅ€û‚ ŒÂ§Ðè¦uh´@£-ÐhF 4Z ÑcÛœâ7(^A R Ñehô¹;«<*~;4êè@#E©-°Ò&ç3´%’ÂÆ\†Š1ºX<…F7­£@£'4šžá\ÀÑ޾5a‘E8ºõÌ£ËS®dÔ|”1«0ùPÚÁí˜ÿsp¤z°&;¾?9È}þ™]+•÷ú2ô§µDr{{ŽÞSxy{bÊ4¿"МÈäó€ó2yÌ>X·õ‹õâY y(-Á.Ýêµ@ÿE@ÚÃ?ypÂlÏW²,µ+»Æ(ÏÎI OlãÛŽCÞXâ-[ ç %œοU82ä–ž ÿƒðH©m.±£ÀcL å„)„]ç7­£€óœ/à|ç 8_ÀùÎÿ=à<ßæÜ}cqqÇ×Q¢Ò4&Øó~; pñ"…ì!0Ý\r; („ûL0 ͉óÞ´ŽH@ºÒ.€t¤ õ•ÚíæžÑf‰îÎì+Ú Ç½›žèýMöozÚ€°­%ov _¡žÍÜé ;í9fËÞºqÝvãáÈ7MÏ>iüìæQPÑôs®É·†mWÉïrBâeåSŠûæÆßæTÊúÇêÁûÝËa_ï~ŸLz»; vvA_v`&ÍÅõ$ÐéÄ·†¡e¬™ž²Fñ¥š`Ã¥žÄ6ü‹ÇÃYYðØÁ¸…—Ck«zÿ¡srüÚ«÷äÉ·ÛàäŸ~ŽÎœîݪ®«_ÎÈñMp Æç§Í^ØWá§cV|î…Dà°_ïU¯P÷ìûnTÜZ¿2>?øzwÞEèüª‚Ûwçp¯qr~]?9¾¬ïWèÙUÇ©vïºóùæ $Op/tš—Ái©{Ôª~«?£ví[­]‚¿%\ ‹ÚÕ×»Ú~)ûW™ÔÊ¥i¹»Æ~Z®Ü_‡¾ÿ|~ c9ý|uÞªŠj¿FêíËËFûóåáIóºvp6®œ}«·­œ_¶{ýóýãÞYûë·ÆA×ï«qµ/î削ÔAhPGg'øÎŒ¹ÖIcÿú{­]>\ßÕ[ŸEuÿ+}ègéÛáUébVnÿâ{RîëÍÕùI/ãûSR¿S§q7ìœãû3Ò:|¾ª_uèYûúþ¬…¯Ï÷?ôÛÍ~­Ý7à÷Y ¹çý¯øü¤‚jíËn½vËŸoÃ~opê4o€ßÕÁÇqX†1_UœúÕ…[û^ù}pkûnÔ*9µ«ÒM[ô®º?-W¢ÉßýΫà}£}¶†÷ׯˆ÷•ûïÓÔ­½"šÖÚ_Ñj9½Æ¯HN¿Á½Õüo_¼&þ»«çTå®Ö~Eü¿ª•üo—Ð+âÿ}=?§æùå”ÿïßoYÿgãêQËVð»Õ:ôË•fÛ߯6ßïêq¸û`Àƒ×6ƒ:ì`Y•J;˜ TO't<ö,ð-/­Ô†Æ³8å#›úPå΃»߆{ ´+oº»·x÷ð±Þzg –"Ö;‡ƒ3Fv¸³ƒ‰X‹+ÖFiãøò«l¼O$àÊzäXãá£vöygÉØzgpÅ;ë®;° ãüG• —öƒ<êÇðؽî$y7ÃÑú6«•õÏ̵ÈÀÜ4nj%aºÖ'_ìˆ-oDlЈ‰}BmYÜÌúgꥫó/+ž$>g4éý׊ú½Íˆ¹HCC¬ÿ™£c®µÞ½•9ÿKšÛbÏÆ©pí<Õ,ò|4JðÇý¾–ñœk8ƒë²gI ºp‚”vvpÿ–Õê”Ë•Vko&ÆF¦M0°‘îÇÚJdsçËûÏ_ã·IÀE uß„!ŸöÓ¡wÃÉ\ émׄ¿w™dˆp$ì€Àˆ©¦ð‹cnG‘B:U„ïBëÝql¡ÄX¼Ž6ùÚÁÒи)<#“…wˆø¥ËbÝòAO‚kÛªnÔÕjy-Þž‹÷ðìPçeÛBMž˜Jmó|4왃¡NZ¹±H™é:ÃòWž>~Ä ‘`˜Ø¡Ë˜MA°ì@ ×0ñ4µð4ý±e‰g¡@š!¡š¹Ä  %´Þû(À^('R\ЈP…8ñ¨rB70§™D¿|à×ÍÎ¥ é#ã±o}:ñËGÿ”{~­vj\þr£vÔiWüãÆa§VñKív©üÉ?©¶?ùíÒÁ’•Óv¥¾ŸÐj”¿TÚþQ¹ê×;µ’_úø±Z¯¶Ïæ^®6jµŽ_kìWá¢Ù®6ò«µÒAÅoŸAjUó$×ÓV«Boå_oVZåNÅÿðñ8÷ Y:úT-·²V?4ÊŸZ+m–NÖ¼YoÔçškµMóê‡NËÿ¸_^õ¨Uj—V òK5ÿ¤ä;®~œ’§v 7œÇ2ÖTëíJóc©\Yʤùš*8 YκW)wšÀ¿SùXM¯ ¯F{Mo˜•c§õa‘5/m³}Tó±OVŠE©Ó^%_˲ºGe¸^Y¯¡ØáI®uÛÕŒ¬«øÔ¬® ñÑ*ª,Òì‘D­'j«Üª®y¹\m6;s’\‡ûùë œÃJ³u¶VS­Ù>䨫 Ô+ä‹™Ö+ˆSmÍ  jWöÿbM«­£ÒQÓ?>,Õ—YE’êü—͇uä>˜›ˆû•ã*̘:ÕúSÓ§²ÐÍVÅÙ2!ÔUí_èNÁh[–…G1ÚFÌ{[GÖ†¯<¸Þd­ÉÙ•›vÇ6Hèðeé$cýk!ác£8yÿ)<·ˆÎ\‚Y šâIp€Â/BÎêšÃ¥O/™aæH°üµ)’Ê‹mF”ëFRêÀýA°¸ž`'aä„XèPó@»ŽãSâbòžs‰”§EØeŽ#Yä¸ S,Ö©—[ø)°õÃb¼;™GÉê³ñ>‡*…QÓA¢Ì*ORB û²;È%LWúr9ûÓÅ?“s°qÎÃf˜c‚\Š f~ IH¹VöB“¡Íàiî‰<«Áµûr@n”göŒëxšÜÈÑ­“ã5ètXMd‚þG‚‹D³JrðKð:mu#çy#f/ŽB# îxF„8 §Á¦®Ã1´r‰|fgãX­œ¼u#H¸½" õôúo’;îgà— ÛY‡“²²ª­ÿ}—Æ€¸ääž¶†C›¢Ð±9@[‡.Š\…%ÃSþ™™ôæÕÙ¶Ž$nô„y4/HÕïÒôTro™Dl¸ßOàSJæ";é’$Ú3  ]sÓ$ª¾‹/å(Yý˜ºÞï²HÁ3ºòïaìß AžïÓ—L¸ÉT4ýYª6Œ/è% eUƒ©ßoÚ1õŒ†@¨ÑžÉ±525ß§$¼—QÌŸFØLDø6¡ý¬ÈÍå} “¿7\‡¦Eb}aLÁ4›JîPŠ˜XDêæZ_ȇ÷/:™RpáñìI÷æ–úÙ& ?‡IŸ³ÎÀ3oÕ³\Zð”6=…¯`ÆÂûšTáicYVˆ/Çi$/rÈa禞lWÈ¥Fú¶kÖ¡ýÁÄCŒ@ýieãìi+ެT`—Ìa² âý*ðd>ÿ=,²Cù²ó¶“Q²¿éNι½nÏÚ½fb-SÎÜÙ¦¯fºÙeÓ _éN«ì¥ R1ØÔS؆j#;À ~ESL`x–†Ó™žøÉ$ Äm µÍŽ¢?|™?ó+à”$É /µ—‘æF¢¶øö®¶©m][?¿Â—™;=g. ²üޙιØ-=Mh -…}˜ŒlËÄÔN²íçö¿_I–'Øy¡& -‰#KKKKk=^€*úÀ.tÝÀÖ)fÕ-{ó6Éê&4h˜ûOGžM«çÚ plQ,†Ìl’bæ&Ùóx›dÑ#l’]lÿë"Ö÷ø[ñ’â‘¶â-Vö[ñßÐÆaß'Ìwím¹4Ú¿¡<îÊÚªÜ-Dã”ekÏäì…EÔ­À @i&työBU[öö`ÍÔ6.¬XqMÝü«& °†À–EŸBÕp5^XY4yöÂ/à••Æž_@¯kuE†Óx›Ý1šlà ]LÇ&flW§sbÓtv?HÒ%‘®² 8f¦8+E¯7hûä:,©y‡~ß¹öqUzÙD¬šsÉ“3'¦Ýö8~ý´µB:¥©“$âhÙI[4c» i”i°v£ºL.NÉ…’ùtêKF4p×W^ýëëÛƒ½£Ö‡ïÞìtz1Ù¹£õ;;ÔwÂ. “ìË¡K²ž¯ô<t•ÂQ)IÚQ¨+a7£’a èß„:2v‹ ²*ôgàÑàæuzÊÖáíÛ¯§ßÞÒòZ>]»§ßàù÷Á™öV¥Ï®ýSƒ~?ü×úÖwß9ƒóï_"/r®¼÷߬Ãî‡ÈCŽêÅ­èð †Í«Z5áÑþçÁÑICØ|÷%þxúGØ|w8hÑ¿çW—ðüʃ­}O? oBWûÐ?WˆOÕÈÓ¾tÜï»á§ãÃQëîL?:iŽš'‡·Í»æè° /›WŸošû»âßÁ°¹·›§»9ÚÏÒíÅ÷ëAn?Üž§uùþáêüøÐ9¼:4Zw­«Öþ%üxòÃ8¿ú1hí¿ýqª³«·áÇ“o³øLo½;ÓZûŸµ£½Ãô0vnñ©øï"ªƒ<;UoxOÃz;¥e¯Žè³ºöÑgëÔþF}Ÿ:¸iÞ­Qû_ Úö?ÙEkÔþ·­rŸº×þ?²ö¿|ófKù?…WSW€O?lï|9iï~y³CÞÎ84ROYÛ€Ô^ìÒÈêwØõ#Âè ×‹Ê-;JCÓb r*¦Ž³œ¾»:p÷Cvƒå Èdë•Òë* Š(¯4›R2Ô°µ†Šœ:\æÓ¦içBÙcì“ úMä(ƒÞT94×W N•W W¼Rn âòlİR}ê„ß>¦à1üÑkðuìÊ.*CV,ñ•¿ ª ŹÙÀ©ÂÇéŽß·†óÊBthÏ/„ ~ÒÜÄÀ™ò÷Œ¦Q®ó%rÒ £ÿªÉßYL™÷uÈ”õ¿z,•Ý*‚üWk[p9l˜WclTÅÐó§Ü()!oǧCÊB”Þp@¹Ëkå¦Jg&@Yis†]úüoŠrüuoïàøøuaÆÌ¦i3ÑŠ%$î ˆÂm³ñ· ùµm­ãéÎB‰‹]ËI;îù$úçø#¿ îM>* –Q¹Ô¦PÀoŸ!¨g‰Ãn`ª‚A+jCÒY‚%ﱡ1wLÿþ,BvÃx—gÔ¬H‡G÷Óé3g%*t÷€zìØæ›*bíÏnB÷±DtÕ²Ñ#ðu¨&AÈq\Ëö-ÃT‰ab;Öü'¨_q÷©Ÿçåb0ˆ¾³äˆ eLØÅMÅ/~˜òmê{Ó2[/Þãå ûÅ1uvÉ-}h™–3ù°»ílD‡**ÃVÇ/ð!“ˉäjþ[>m—”S©b¹£c94àä+â¹>~ÎËÍŸÃF!O~o…-ˆ¨áQ¦~²UÂÖ\v5­¸¶®- l‹Õ´†–ãš¶ 4“ {6ØcÛ·‰éCL|͵t6v^ú4gi΋ˆ¸&¬:Wv¬q+"®f/{z‚eÈ•!W†Üßrùôë©íœø‘‘ }Ršu ~eaB–CÅŠø¥h‰lr\<-Í‘‹'åÙôâÕÉâñøÆïE>ˆïMºˆç¹ZŸÌ•Hf-Ìc™¸¦™Ú–i?7 ÷LÃÆÂÀ÷aô@5€  œÀ7ÖUÛ5¬z|¨™›~A/ã‰øtǧê#j~*2Óš*Ûr•f\ò,-M·6ïb-ß°-¨C ,G³î:.°±ªUÕ¶ U ‚¹G».š‡\¥¹@O­Äž¥dþ\.€ÌY˜SЧbreh/ež¯wû|Ðü:õÓxåœÊÖÑù²‘°Ï×Ð9T#¦M½b‹érzåu”˜†+?°<>54›X€²˜–iF`莛ÕwjáS}«! Se`P Ž1amQP‘ ž¼=L t1F)â¡©ÃÒ{å¤ABÅ ±(jNþP ö”ÉAí6¡†×f £ÎáI2ì²Í¿íë8½ü=±²-"íˆVŽ)Äb‰J{\¯8ñ:LS#Ûl›\wœ ±GŸÎöÀ—^LÀ5ÿášt}¾*tk·™¡Öë÷¢Þå-ÏÈ#QT~¡¹ò¼^Bò_ªgŸã M µ§ì×?KÆÂ?M‰Æ—àEA4L;죇|y-Å—(ö\àÑÊuù}âoDìË(Å~écªh„Ñ€ð|ñõ(Ëc”òïq<âièE¨ü{ìÚS]nö7n·v¯ýü½6å×YÞ¼šÊå?õ‡\-©RÚÈ$[sʳO¯©ÙJOàuø²È^z}“U“pqú—¤TY‘Jxñ1µÑ(¼ìÒ´ì«æw{7ý„„ÂAžì–åMÂ8*Ë*î]ó_„}©~*Dw@Q+/õ:¸{I@ìl=nšºRçã0ëñ1æû^#ÿ/¾®ËMxÎñ I ]ç"_Ç¢Z:Êhcÿj˜rÕøÔ¢°›Ë\ÃÝìíÑ%¸×¼|’ãµË?éeʦžóÌ\kîí(Îl²xE Š:õ©-™Yu2•^‡É øÕKìˆ\bïVØ/ØíqG¡žÌœü>Q/ys'>­N?3€„/KŒÓ¤/³"7Åó?½¾×d¯öC^ôÑŸ‰+þz#ÈiW¨-·Yçáõ¹:ûÝ—ÐÁ ûäE7B˜”dî8ñÜÍê5Ry¥1áÒõÖû¨qE™N2ƒýT­MÖ¼ðp?[fïvjDy—J|êMÅK\ß$é²Îäaѧ #ì·Çº¥-uñ“sËå(þƒ×•þ®ð¥V‡/ù–E @Ø áË#>p°A€Ç* mähÙŠÅ×ín|øR— _Ú‡¯IO—Ç„Âóäýû¾ã»¬ÜéVvÁÉÐûàX,i/Ë©øKóˆß#GØÉËœ2ñâ~B«”ðAY>nœ Ñ·Ùº.q®Œ˜DÀI‚ùà5âxò§žËV>‰SIʹ¥‰Çsâ_¦@ÇžX<Â~W‚¤+7Ð딀´|K”DuÌN…fƒÕ>õÕ åMaË9ÿäÍò×0L²Ó Æu¸ÈNÈáçTãèS¹¦|åUìòl÷{½h5úc9UÕñ8+Ia¿—õ—£¶ùÚ[(çB{‹åË$ïåûç °Ÿ&ð"/#oe[s­”kR.|!`Ý,ŠØìÞWjx pó(2Ñ]¢$Ã.µT%Ï„}Îò)U@@êltŸU±r"?>çµbNHÒg«)k:Ë2ÂÐ|¯Ô¹– ݪΗJô;¾[úAB%aJT%ËÇÂ@‘ ¼£&U§è4©\jm‡‹Du eC-{懼_öL¿P>ÿt¹ÿäÓ¬mö%›am§T?[ù„gþ¥Äl.J’LæT™øç¼îÆ&[ÂA§8¿GÞªVÌ-w©Âæ6Åm÷8o/¡ö=aI4Hç3lcÛwúÙ^¡š‹Yh=ÖæªÊ§£ã’1<¤õæÛÓ#®T¶.×Hkªûœ'Vƃ/ÐÑØÂM®Š€®‘8žêPa@'°]¯b¦|Š˜T+P)}Õ4›’ì-óÆ^ϧ^ÛýŸ?‹Xþ2£™²½˜ lBµàº@7¡°gi@Õ,MstUS-¿šÑZª- íãZu¥„vªùgÒØEL£LcŸ¤?ËË{{{Y _¼XÏåWÅÔÒsWL×Q„IÎ>ö–3Gr…SlX*Õ<èÞ¼­ä­öæ¹’Áû6›g`:5{lXäîŠÆpåFïÁ-÷“ÊhWNa·WîHÃA¥¼ô6ÿx¡ìQºÍX÷ Ä‘’Á0a”<ÆÆY·µ,]ײUw`GwžáÉxšYËgËs&#g{Yˆ%^´ú¨upüþè„?Ð 'לڈ8°®œþsb„y‘ÝQã1ãy‹Ñ^ü\sâ“î ; ® ðlhÝF*ÀþgÛ…{È$®SÃwThH³™„g6ÏYÄ$ê§ë@XµÓÊöqÔöÜb_ʧƒÖþaëÝæœßêqªæÌša|T3’Žê‡D‹!Ó•²¸ÅÜÐc·¥Kžäl÷ÃÍ‹ÃÃA¯=HÂËK~oL~8C—ŒídØmSGU:š¾´+Ïl@‘ÒT*Òõ§ž½Ä+Ÿ|1Ÿ;:ªM{ÜQ‡ÛÐÜøÅ@KXÃlÐIgiBRËU,ú‡rÑÿ’Ë%0å#£Ö»#‰@$yÉd+¯†O¼ù@@}sØ¥V²õxÀd D2ãõJ ‚¶UM{Y@ZU»¹&t Tj€ŠŽ–*Ž*¨ü Â/Z8Ø?Ø—PEB U6ªèê<¨¢¯zn 5T[7½~n–‹ õÒ š© ‘$D’IB$ ‘$D’i ²ÐsZ²øÏÌ“1ïñfQìbjé,ÕHì²ì‚4yÜf/r\¶g-´(ò?ャ®Ït]œBþ›N¢AcH²+8Öâ ¨:yžøl§\ X£–§>®©Nž§;ižFžðP¥9Êxüs’ÔÅ}T–„!½œFغo¹†ï#tpM7èŽ}êá˜-˹“µ\F=—§ÜOV8Ç¢»å¶–] t_Á_Øs±‡›¶é¤/,uCªá\Ùå$ãeÅoý÷VÙMAXå¨,â„_ª±œdg:ŒEåº×Q K’Õ%ZR6Ñmí^Ç©­.Ñ,Ñ.Êã_öŽšÍƒ–Xí,„E;í*Éç/”?IAï¯û»¨¡`š®=' ¶ÚfM« }HÞµÞeš’wm2ïZ¨;U’-I­$µ’ÔJR+I­$µ’ÔJR«gC­îoðš3‡VL‚ýÒ-´­ëër¾Ç§Ý“½÷OÇÕT¨¦³4òL¹írŒ&0›Úɺ'»÷‡_Ê–ª@q‡’èÆÅŽÛŸOIðl9±& ž$x’àI‚' ž$x’àI‚·æ¯t2‹$wOKî*^G³HÈz‘³sv ãú³s« o:”G?Jò&É›$o’¼Iò&É›$o’¼­9y+j%ÉÛ òVl•ãx‘þ…[¿™ËéÛ†c¿H.gVž´XèCr¹*.§K.'¹œär’ËI.'¹œär’ËI.'¹œärëÁåÌmÓ†/sלÎÒ‡ärU\Δ\Nr9Éå$—“\Nr¹ÿgïj~DZ;’S{Ø[®ºìaŠÕ¤DŠd-;·»ÇØ®-»zz'”DUyZþXÉ®®NЇlùrßýHä°ùrؽå rÊiœCR’-»d[Õ]Ýëêâ fʖįÇÇ÷~¿ÇgÊr9Ëå,—³\Îr¹ÝàrlŸrç!r¹5o@›ËÃr¹:.Ç,—³\Îr9Ëå,—³\Îr9Ëå,—³\Îr¹àrîsô ÷åÂÙy ËåÖp9-—³\Îr9Ëå,—³\Îr9Ëå,—³\Îr¹ÝàrÎ>ç®=ûä¦<,—«ãröìËå,—³\Îr9Ëå,—³\Îr9Ëå,—Û.Gö!{˜çXr'Û$Ëå긱\Îr9Ëå,—³\Îr9Ëå,—³\Îr9ËåvƒËÑ}Äæ¾¯Í±œËÃr¹:.G-—³\Îr9Ëå,—³\Îr9Ëå,—³\Îr¹Ýàr|ß¡ÞÃärµ9–Zv_n-—ã–ËY.g¹œår–ËY.g¹œår–ËY.g¹Üp9ï¢}—:–ËÝ”‡år7¸œår–ËY.g¹œår–ËY.g¹œår–ËY.·\ÎÝÇ=Ìs,½l“<,—«ãrî­¹œc¹œår–ËY.g¹œår–ËY.g¹Üns¹Þy»Ýé<í<µlnçØœBàÍØÜFö2›’̈Æ7¿{ÔV~@AÒt:Pj–Êé,©•˜Îô²{ä(„‚=‡¹2©0fTO›¨Ã"t\²Q–FZii¤¥‘–FZii¤¥‘–FZii¤¥‘;N#üL~¬—ý¬2gÆü>išìI×l²±Ìî˜&6×óž»÷\Yµ$¯¨1÷spr$ÄÐ8&‘W 2ÅÄ…wˆ³Ø@²•nÜÎÕ»«¢F=áú^áúô‰H•MG¿»s¿–=n:ä;wi·nºâÍÔ¿kœ»Û7¤úél¤ž•b4›dwìûÙÕ?iéwp³Mƒ¶Þá.â~®ãY÷pŸã~·]Y¼C^anlmPÐmPÐmPÐmPÐ?“ `ã ]=ãÂûò̸°b6/:ýÎ'LÔwX¶i°–iÝšií4ŸÚq®„w.Gb)àd·MÆLÙã¦áF²MôF Î`kî…h¾/äñÝ_þ¾îT¢šÈ‹ØsaÌ$â Øƒˆº¹Ôu9F.¢yØÕÉ6×Úkî·¸åšhl\B?µA¯D“‘;èq®™ÊrꆘaÀy̆Q D@D3SŒ)Ó¤€ÑlÓ0ÿävàX¬§c-‡sàowlÀÚ%©$6Qóþ¨ìîõb"™Þ•çËç6•ýÂYi%Íç "]Ÿú pU䕟tÜp,¥ÒF‰„±º0¯¥èýÔ±b¢Ðƒˆ»Láñ˜¹DÕ¡V" ° yü$ÆÈ#!s#ʈ‡ÀóXHeEc&ÿäöçc-Á†f‡ìcâ}Ò=àfs”“㵈ù­Í¹•͹¹Ý«Ö¹wÖˆÒJ]OçM NÕÿ0qHCÔÙfšÖñ[Í»f±àY¬¿ÝË+ØSº¼WìÝ4¨I‡oË`{±ÒA­±yõ1;+ÏR¦ÍtÜ{¯Õîw_vô5% 1šúy–ŠòI1Æ@æ920â1ò¢04Y83Uuñ¸»2¦$$.'˜ENÀ"Âx¨æ—3ÂC³c4”S¡«Ð#}WdŸv‹Ç(ä0bDcS†%¢8†q<™ça¡±¶QôS2ÊBèEÈѵ†âBV„çÁ(R}àÀŒëý+ X,`HY ¹]¶ø_ ƒë¾­â*„éLö¸QÞ}§…'âjœOþU81S‚td^ õ'‡éM“Aöº¸,'—r(S¡û õ4¾“âã8\ F"™ïÇ ÑšO³í"¯•:øÙD†™iéòŸŽ.E’ŒßH#µ~:“{ïÞ-R~kó}‘óíÞb‡ ~{›GD)g“ɼ½Í ê¹Äó"`$§oÆéë|V ª¾à¢BÝ R°[oÔ˜I<éΫ>èžöË<¹xp-£å{à¨Õ>ŠÐ/+‰Å!ò]yˆùaäRZL†Pž-˺§WX?µW½â•WnêÙ¾y¹µÉ·ŠîNio×öw¹hŸ¶ŸjÅT€!\èVZÇç­&?1_èÙ/4³˜ˆÖ·‡âJ  ’Áô­IÀÖåt/M®¹©ÉÒÁ•œ«¤ºþZÎ÷˜‹rUaïì%8ï=?LÄl¤7×e¨;JUÌ?{Ëå¦2ªÕ²š°ži§¢;w‘Ž´[Þ±Žd,fÉt.=¨^_ižÈ^ûóÝE“¯Äº·üÐÕpñˆŽ·_É•&j)¦ógôbg@-\9ŠdнÎÃâ¯_n‚Îs@Çákó-I&oì´Ã›Š‹*üÅ:ùià¯(Ù¦1Zø» é-á/B÷ýò8æna„®È‘« ®£´ˆÂX¡è º ý6­cúýé£ðR¤ ÿ>9ï?lçÁ0Þ©}.âÔº=OŸg£È`‡piÓ©úi d–åpo¯[ä•?jd9Âñ,‰ÆÓG|ëÊöÖ™Kîy÷a7?ôÜ@iF pŒ`0J“#"F, Tïæ7[3L»›{‹y¿ £jeˆpI˜Rêá*Ü¥SKê„x«alXÇCÜÍo²îæ³}BœR6´9„álÓ­ÍùP”vwócîpHê? 0 Ê7.âÊ0 ·Y£¦uØ åZ¬š e“šn¤t]BF=fc”6Fù>1J|Hðö%ýD1Jï"H¡Cêr¶3AÊFKÿ#)›µ}¿‚”г»ùÙ|ßcî·3›’sT›j?£Ê«@™þáLîP*ñÀÔá@0„CºÔ bok~Ó:l8óãÂæÛ‡3YŽÆáL÷Ý~nÁœ§±¶?T2I~¶øh|R.Mxà9u?PÖCCö<¸;³”˜ÛãBïÝypÛ×O­Y2í_O è¨ÊøÕ3“K·‚Âi¢OòZ '‰Ô‹Êz]dÁÏ)’œÐ˜; s› ¾âiYÛÍË™vf“y‰¡ŽS}”õ(_¾èUQbmB r*Íh¶( /øK£ò^É\YõBõI¸Òl~º9çm¹Hq/®›vËëð`ÞŸòð)*(t”âÀQF Kź†ˆcGpá8ròˆ‡Y©~¡¾¼“™q%`.øÄ¯¼†˜_Ü™ÏDNì‹«~_\©FæE—ƒ'ÅeÅ´¾W‹âA›¢à ¾P\ŸÖ8Yf­ŠC«âw£âRxŒ×Ós2DèÆ ^…ŒÜ€â¦âËaÃÏHÃF;Ö ?ŒÉÎï(éÙ‰¦Â.Î6ÂRဧ°ïíÞ=Ü1rŽCÀUô`éð4£ÊÆHì"‚]E1·î5¬ÃîmZ ö„Š`] r¼}Èé}'Ÿµvi14K>kl“C,ù´äÓ’OK>-ù´äӒχF>1Ú§Ÿøp¢€üpÝyˆfhù­C~Ýù1H,ð³ÀÏ¿?ð³ewÊZ_Ê<¶³Üq„ú :¡ f›†`£¸è/‘â÷.ŽK"BÌÀYàLd¬oI€G=â‰È!0r·Åq›Öaã¸k×çÚ ®¾™{å`0Æ ›ŒW%¤Q4 §ãt¯È…_Ü‘I÷ó÷*ç¶ŽDR—D@‘Å( Ó‡À²wèÈÊÜÚh:ÉrÎÅ£¬¸‹-orqJ6íZ?ÓP]ŽÆoF%2®pE™Î_%ò¦æwªCP •¥÷€ƒ•­×û úøœD‚`! r”>Ý—¡ož{T?÷Kîr¤$X¿k#€0ØBŸ}L;€±EÕáoÇE…»§‹b‚˜DJ˜¤@üØ+Bb} ®Š¡L/¿ ¸ŸFh‹˜Qª +p„þݨj pA$5ü„Ìán~ˆÑÇ~_hö¯ƒÿ¯¾øû/;ÿîïþøÇ¿þ—/ÿ¡ ˜ÅŸ$³‹ÁÈØÙì UGÓÁø`é=ìÙmÔb°ƒ÷xkûŸý…þ剶8?úÝÿ½ûá‹?ÿòŸUÿé?ÞýæÕ—¿}>^ }]a2úu‘£lœ "ÓbµË/‡ßÏ|%¡ZŒámúüÊkxþû7ÿù㾘üúŒÿ ÿÏ?þî÷÷£ß©iëcõi0úi™=›ÆìÇ“·ÓËñ(_¨._þä'¿þýÿ®€_ª´qŸÜE"ÆÚÞ~@w‹ùÝ›' T‡m1ÿæ×¢y˜?r]ê*(Š<…<¸BÌ@2…¥%Ãaì‰m˜¿ió?hÌO.æ§óÓCç¡c~j1¿Ò‚Âüuè…yø³m72n•¥Ê6Üâ¶Åm÷0ã6Â4à±$P93¬l¹àˆ $!¥ÛšqÛ°‹Úî8ãÖ,^îÁÏk^*Q€5W­WÝI UXëõÖËÅôþývÞCÒ‹¨C@x!ÀŽ$€{ Ä:% 2ôÐVûÕ´k¿¬ÔZ3Vy,§ ·Kã[¿eÒ ¤¬…•ÊËÓz~Ñ9:_¹µ8ø)Ì©ÿ+à²?˜˜#€¸’ˆÇã賀ʬ;Eº+Ç@5e Í™H=ðÕÉ‚Õä‡yVÅ"ÛBÏ}â_e2…yÜŸeó¼ˆE&Fq1ÏÂ(ËUS)ýT ‹GË‹EvFÙˆÒÛT)Þ܇åÓÙh¤”Jy—òpS®8—'‘~¢§B]]ÉdæFñØÈU¤á¥–Ô5ó|ÏÈΤ&éKÓ_¶ÁÙx(Á•¹q%G‘9Ôj¯uôÔ-6žŒ“ñÅÛü˜Ewçé—:OrZ /§²¼3½TrŽÌ7sN–Tú”ßý«Š²˜ÉÏ2éš„’8™e—úc0˜ÓÁbä…¦GÃ0&+ԘȄÓÔÐäëLäY¤¡ âA2ÍÃâê:¯ã:3߇ÃksYyë¢ d¾# Vj`ÔþM0FWQYÎO¦yݦ õT`nMfF,Y25É2?2ËTŸ])1êsª@xiugWoòaJÓÉ…¬ ¶¨?“¦ù¡ÒÑdp1RÏê¯n4¿™¤2–ÓЈ%{«›KÊ)Ñ cºªáøÊÜ}=˜€EqT'FSE\u{Yx)F C'–eAžd:<ò?æï$L†³$ú•9++HMÍÃišÎe]vùjX ‹B¾ˆ¾ŸeÓR4‘R€d0ÊS|K òÒ×r\™ ˆd®ŒWùgY rèÊŒÔqûÉ0×9ïK8ŸÁbL¥K^>œ\¤Wƒt:¿¦,‘"|[è‡i8,æãodZˆ'W§h"Ñ…™î4RÃ™ä  Ì².”¥óþåZ ‹æÍŸñ$Mó¢“iúÚQ.?ïnñ7¼6„_-…X鲯ÿЈs2˜.È?…É›¢3™ÌÍq¥b”ë™A iz7‰õêSÊ•ä2É~e…¨Ñä+!¼¡˜äz ò²£T)Q¹¤ÒHYÓ¢‘·L'Ó|1…¢XSs%œø Ùª™úÜî‡[ÜÚ9÷…êÝWÓhOó(’u_;ã¾–-]éæ–§\ß7 ïÂd•F·v .»†Ò—~«4A…ý-ÍÂÜ~–haÏë¾°l…áYã.榫4šK²0K+faJ¯:÷Ê¥÷]ØÐ%'’éÂwækÞØ ÿWñ…õ.-ßÜÎæÞdný—pCaZç.kÅÝ.ÁŠª÷¯øÚÜ-,oaJ+îiÜ”¢jK+HgTuB…k«¸ž5,{®ŠÃ›£œ%·Y ª…Ó¹áçžuÙp/[ùÑú)lþÂ%ˆªð/Kž¶@9«˜¬Š¯–<Í /X¿ÂÑ~uŽt ¬RÁCs˜µŠ¿JìR`¶…û\Bo%àœ£å¾êÃHdrgçÃHêr(õªnÀPU_dz4”úçRW2yÜ„n>VLM–ƒC³M’ÚÝ_ÍÅô8|wBN‰rƒ@9¸A?k~Ým÷ŠV¿:iÝ[ÓèYë› %OŽ—šëõOÎtѯÎ{þ³§íu·z­~kÝ Þ­Þ9Vâ{Ù}VŠç蕺à®>PLM÷¸ß9{Öjwj'i¹¦*¶çÝë´ÏÏÔÔøçgÝü›êëÉIConLVuŒç½¯nN FµmöO|ä;kÕ¢uÞ_§¿hŸ|ã¬ïãi[}_[¯–Ø‹M>:Ñïb]7OgݵCq|¸N*7e¶¢Q›…Úk÷º ·»ggçKš|¬®W¿·Úí΋ÎYKÕÙ[/µ³þ †\¾þãŽós½¬×§Û[A_uªßyê·;gý ­öN[§gþË­ãÅqÖ‰¤»<Àºõ°IÜÏ—âÓÎË®Z?jé<ïo[>ÝìuÜ=}ˆ÷ Sí_È‘Ì3•õoâø@Ià.¦S G§'½¢|-ßfSå›ly¸…Q§Di€ˆá€XŒüO W]äò}º»å!?ÄÁÅkø²Y ,Ó›´‚Á–PêVè…cì®Ëx°” zyq‡º¡ÀÆò=sEâq3'ŒÝqJH⪦ÂAÎÆŒ¼ÈåqŒu]Ac—D#‘dðÎ̶A¯÷Vãz$¥o™°ÒPN/ÇQª&"ËÔ"‹ŒQÐoY1OD㡌*AÂò}•7Á<-_Q°Èc®ÃÃ"H\…]Çœ(0ô ñ–÷Ȭµ ©9¢zš(ŽÉC9 rž^Ž@™É 5ï+¨DÅ,èC5òÑ~ÿõéÙ·×Ý_õž>¢ïn‹¾¶ÌØ—J/%¦±|•‰iæ#ƒ,›mÈã[z¶èñÈÕeŠu(ù¹‡“ˆÇ‘ZÜôÿÙ»¶æ¶q%ý~~×/9§*´q# ¸*[«ÈŠ£Œ%;ºøV•R hËÖÅG;ÎîùïÛ )‰².–eÆ™ða&¦îúk &Œ­Ân¯IkÃÖ”ÀÉe"à‡™¹Ý]ƒ”ÖX ¥Á;ÁÈ(‚=À˜2¾ÂŠš,1ƒxÚÉ,®q.„BTDHpz¸dvù9ˆ|ù(ûu*â8 Ùé_%„˜^x×o÷FOrf\ÅË„1Ò ª<¢d’ú\cÏDXsðžâ’6ˆ5’z!¢u`®¬…IjJŽ“å¨ñ “M|’´ê¦‚t'uìÎëð^ï "ȬÚù:“³û+:¡Cpÿ""#1 ˆøXÒ@ó0ò[èD2WüHžmVväË”l"1ÌׂGš _Ha{‰”}!ü„“$­RFð)b¾¬õ$ä4i…à™3el¾&ЦP0ð*AM%Ç:Џ¿IÇA+äËpcmøÄFBž§^žV$RÈ7Š)_rƒ<íaI¸½o$@Ûñ @6®‡CúÌø†(æ4R Ì©&œi–l-L¤›‰CžëþZéšñhÐïeLˆBî!Š(£Q$Q4 E>5~—¾'Í®þð7ïù44XFZª@1­G>ƒy‰y†)0ߊ„Sâ·1zîÃj™bT{œ)iûú4+ßI"­¬|Óþ¯ñð¡v2ó =DšèM…ÀQ`$À2CÁÚ©mp(nr³›qÀ›ÿØÚÄì>« Oú)8#q5#ê”0AZ†ž'…¯oI‘“ž®šª@ý~¼3eŠ‹sŸÂ¤Å|òÈ^\fGª@ØÇs“A?qÕæf„„Këôeº 9ã%½€é€!ÎŒ0OÀ$¤X‚ H£`~˜—³õÏÕS?ßH–tÁÂHÔƱµ_Ò“`+l%A¶¡ö/XÀÝ@Ú 3# 0ð}0»Ha&}Ÿ£@,=•ö\‡¹°NÜJ¸s™9TQ˜.Á5 À¾0)BùLpå°ÇÁŠm°jÒêp*+ðÅNDX†€€|0˜0ÄT$ŒÒÄC`YŒ3·£²Ón¬2dobå±ãK1€&šq*ãk›e’‡ÆfÊYQƒ«êve€Ü +ì)ÖÉZ·{à%ÜÓŒ¬aÞPæ"ƒ‘ ·‘8\Ä3  $Š·!ë¤Õ\ë„½Ø ƒ$¸àBaž¢"0ó(Ç,2¡Gäv„öcõääCV,h=œ=ÎpÙJmü—Ÿ·ˆçÄ©µœ´!çß$+BšG 0w }'wÁ“®R0A þ‡ˆ]E±B°å_äý‚½Ã0ÉR>Ijkšf¦c矱ŽövÛ½ä*´Öø¾²¹$á÷îh ˜12·ì“äÀ—‚Æ Úµ?Ú¬Šo†×rïŸ~H<ï7³ A7%åßýaëø«“ìZ”­¨?µ¦Ù&Ó ³¡aoâöÛvl=ƒ>ðm°oBZ•š§)^,ÞO9Öš,¿ÙÅãûx…kZäîúqضqYîΚš+k uˆIf~€±K‰;ši}!¥gëÚÎ&.¼ž¾ißݳVš'¶5Ôý˜æ”xç¯z—Il9áM‡Øx*°=ý8ã¡Mv9i,ÍjÛ’£d™ïÉ­&¿´õÌÎA®+50÷m»eÝêíZˆU¨ÿ8Ó4'êœDa— ðà- üW¸VOæ×ê¿ãh•ƒwy€†ëúü7<64—¼û»–ûÒ›Ž°‚yIdb¼øRKrùnšÏ:I$~¤¢¡€(—ù!vøp®ÂüÑ †wÉÂo2 ¤¶z9ñ¼½Pñ?Þþ#qLĶŽ"±gÏQ°92t%‰€ÇÙ䞈I_ÿrç³4 CSµ„ÊQÚ• \¢9„æ¹óY›Öñ78ŸE~ÂùÒ5K3û ›hßÏÏ4¾?)Óøfmoi|ó|Ý1$<‘qRòæýióÃÙÃǶÏO—%w­–Ïùßò’‚M˜o¯0@b¸Ž/ù!à§6-xá4øõ®ž˜€"¤…:xAµ+`:wµ!QDaÆÖ”=gd6­#?üèe«–hkÈvv®ê}³|”®™8÷›îªÛ€ˆÖæÁ OS{Ø#Såøë)ÔÎpdS¸½h›·`cb†{Ñø{Šúcú³YM²;Mƒ’Ébî®M× d'=<5|wéŸýAûªÝ³ “~¼ r‰O›˜¯ Ò–=Ý2Œ[º~h zWû²Óé?ÄG»v¬Ç½cÏëí¤ŽöòŒà2sÛк"©ë9ÄB“` †ÃòÉ=›nú‹?ù%‡KÏÂ¥»AÿÊ26:”.7ÜÂåþÂ2Í„©:®¥lªô·[ó8Q“ôî'¨¨^;u›õÃýŽ÷ìUn³ˆŸù÷#3 6»njVÂ’RoÔ÷Grx;KcÞ —.ïgŠdšRãv'\,rú9K«ùе+h½Ð„î}¿3îšá~ú/3²Æ:ÜIÖŒvrødVžf„ÛU¦äΘ¥0R¼%ÛHÓøëÂH‘á ¾ä0r)Œä/ÍïHÁ»°„H#ê Ã#—øKúÈw‰§A /ž½ kÃ:r™ÃÈŸ #}?ð$žM'µÔåÛPãB…Aˆ%WZ{‘ B¥=NHh–Œ²~¾>øÉsøùjàç$ 󯇠wò¡÷ëPŠÄrš‚¬ Öh0üâÔ- ¶Þ°mÛHg×½ wÞ½ûïé϶82‚ â ½ÄØ±.RÂÐÛ€‰ß 3ºlEÕòÅ˯U\…z)þWT5Ì#ãš@S Aè*{ÂÊ‹4b£’Ÿ½VqÓ:r(œCá çP8‡Â9^…7ßVÿ[‚fFÞzˆüÎP5 þp_hU—AUü@U{¬D  ¥Ë4sÈ#ß5T?D !=U7­#‡ª9TÍ¡jUs¨šCÕª®†ªô­ÀÞo½ªŠ–¥Hñ%‡ªO¡*ý  jÀ£(Bq¹¶‰²°Ò® ÆÞa | <£ÏAÕMëÈ¡jUs¨šCÕªæP5‡ª«¡ª÷f­ßªŠ¥–/"‡ªË êK³Âúÿå ªbXHª}—y†ƒ9ô1ÀL4(¢¾òBÊ„ÏAÕMëÈ¡êߪ&טäX5Ǫ[ÁªŒ-bÕ»Ì'Ò,CKëoŽC6›ç.ÚåäR>”^g_{4ÿέŠû]©[“J"¹ý}jö™Þ÷¢}ÅRÙäøúáëXC_†±—igzŸóΟ„½£„³¨ÛbÊ$ÕJÌÿ"ÌMù†ÿNã|ãàßÄÊìY‹=‰üåÏDþzoÿÖw)`:\Á’ÿeÀßû €?„®¤alzÃ=‰´3/"Ì •ÜB´øoZGüsàŸÿøçÀ?þ9ðÿ €¿ÿ–ÿwÆÜ`%‡ëø’cîÄÜ„`ôËan0J”cJl ²ñ¸+© \,ˆö¦ˆ‰g/žØ´Žsç˜;ÇÜ9æÎ1w޹s̽sC}…F£¶oç¶L‚2íêQÇbG³k¾Êî]ÇX„¶³ä˶• Œ‡é8žüà&”c±ì«kP÷Á}{Ø´lÓÓ¼!/nM’&ÄùAÜÛñµ{Û^Z>áxËæ ù:/à9^<5\VÙRÌ}ß n•ÌÃu†ëiå·fÐ3”Ô¥’]«˜ëJôû£VhîÛ¦ïÁóÞ}(—•Í^jÈž¹råOw¹,¯[3ãÞ<ÙÙ¢FŸÄ¡?È´=h¥Bßh &h׊ x9ÜUrh¾8É„3‹c}Ù 74ß—ŠÇÕåÃw{×ý®Ùû6wövaÚƒyùºÝjnÇÊ$ó€Ó׎Ûs¦Ó–3^;0±Øl³f?T é¥q¥X˜”{8n$åŠÝÅ~˜ÇO—çЗóO7—õ²(ß”/%\½9í5ªíËÃæ¨zP»¾,âëJ÷Â;j\|«^àãFù¡zX"åa¹+åY…‡àA]œá‡¸Ï MŽn¿UeýûV­åƒÏlFgáëÑMájZîàÖ‹Ë}¾»¹<ë ÁððôñœTÂóa[wO¿)zúxAš–•nékµq—ß.º5 ÷3´ýytÑøÔ=®#èóûnµqûXú«ÝJû¨øé^w;½sZ»| ?ŒtÑö¹D«7W^å[é±zýûÖlGõYÌxZgåƒi¹‡JRîUÈä»Jö_+ÍW$ûÒcFö <=>x=<­€.­ÔÓèÝëÑS åjµüŸ_“ü½5cÊÒüzäS"«åý=ò¬fÇÔSùßTù_½{·ãüŸc«Ï7„¿ëõ£V±Tk´ʵw{f¤÷f¦ð<¸t#0¨ý®ËºZºjÜ ;&6 £~¿ã€ãyí$6t8]Ó|bSgU>Íø‡Ú“wm›÷óà²Ùyãô{Ž…"6µ8hd—Ó]LÄZ\±v}w8¼þâ­kj<9³EgÔÒÎ>!o9tÞX\ñÆyh,¤™Ü“ÅÅ¥tøhžŽ; à±}ÛßcIl¦3 !iÖ„Î?SÔ!»€z“5V'^Ò«l‰]ñ¯¥0ß¾»N µ¥klÎ?§ <Ÿ9Ãqì‚FãÎmVÿ*f.òÐ2ëæø˜i­óè¤+K›å{6L”kw¦TÓU꓉R‚{Þê9ƒOâôÇ#ðdö L·*>Q(AœíüþÇ©7‹ÅR½¾?Uc«Ó &èØÀtû#ãĺ¹û¥ô òúãz^kuhíàÐLÒá ÷ ‘pþ3Ãà/޹ED I•Í…¹·GCí"æ×qê/ßuXº¨n OÙäà]"þÔÝÆCG‚ßÛí‡í¨gH\R‹¿ïá}<½,pÙV”d±•ºöý oS(¾éõ]=ihå>Æ"g&;Ë?yþpª”’6J‡Jî2ɉ+X ÝÈ`ƒâ>ƒïÛ@(àÈDD˜ <â)( #…ÿ.RØ×RÑ(ä‚E„…ˆŸ…T{ÊçÆDúŸ7:—n)$¯¬ÿ¾óñ¬U”“' õø¸±†šaeûج¿_ ÃKÛlœTZ¸EVªE¡ÙX¥Ÿ‹Çgd5'Ex^Y¯åØÑM®4å”­«äT+¯ì i¡U\YäÙZÏÔz±^^óq±\«5ç4¹ ¿gŸ €wŽJµÔY_͵Zãˆc*V¨–ÈvX¯`N¹>׃Õ(ÄÞÆšVë'…“Zëô¨P]¢8dKÊó\6Ö±ûpn ”NË0~`è–«Ï ŸÒ™õÝù§Ê~2U·l6âL×N‰XºX¼%½B@‰çÓã‚GÞ]Ïl”¨|OˆÚY5ŒÓê- K±=ñ©‰œB¾Ÿ…GX@¨áXÙdÛîh€f0ØJ}þ°¥ðòy¬Ç¡Ë„ð]Zapã{¾OBï{“†(ø2ˆ8ÑÕXm¸2¥Tx˜“wœKú!Q„½€RDÔ 1ÃaÃQ¸mè…Ÿƒ^ß­ÆË‘”}o[[Ï´& j²|O v(.‘¤6ÏDL63±“}B¬°q°ÄwEz`Q`Å„Ý4Á»Û56·w¼ ›ö¦»ö Þ;J7â½îqض±Ioï·íQT»¬•ŽÑ:ªßß=<Ä}Ÿûzn‡•'@ºÃ‡´‡ÃñšÝع²)Å?À×MbV~¯Ik“œö™-5ðÃLºAœcÒK¡4x'E°çSÆWXQ“%fOBÉF~úµÇ8B!*"$8=\² Ð~ùóQöëTÄñ>4 Ùé_%„˜^x×·Iìç7®¯âÎíÌÔ‘†XPåm$“Ôç{&š“€Gð—„Ñ7ˆÀÃIv¤á¡';;±}¼ÊlÇǽ¸òñ “>HZuSAº“:ž®%AfÕÎ׳gU'4L~,B!2³|¦üG,i yyŒ-t"™+~¤ ÏÎ6+;òeJ6‘8 ZðHƒË!!u„1'L‡>Lé /&¡,I¤SFð)b¾¬õ$š"i…Æó˜2¡áhS(˜ ¨©äXG÷·#é8Îd…|y°8Äe#!ÏS/O+)äÅ”/¹Ažö°$\‚ã mˆøA:H×á }f|‰ Cs)æTÎ4£~Vºi¨FV¾q÷×J׌Gh&`B|rQD" ŒÒ I(ò)à‚pKNš]9†}áo&Þòih°Œ´TbZ!n>ü?{×ÖܶޤßçWhó’™*Ó!@ð‚T¥fÛq”ɉïÖÖ)€¶dRÒˆºz÷ü÷mð&J¦lùXNl™‰EÄ¥Ñèïk 2¥!EÎZz8©ü:F¯íX`"§ˆ¸Äà¦C\&‰øãI,,#ß¿éb¶|ÿ&í¿¯‹Ãq˼ËÙ "LÇö8æ‚HnPŠ<[2 eÒ´s×!¡¨ÈUúÞü׿*°û .,´“:¨U 'es&L“Q‹ÛZ“"Ç-]fª@ýžÞÆ™²Pסr,Œ‚îx®©TGš3ÝØaPŸÞæ,B,¥ûô%›†œÉ Ó&Ü&ºãa&#äb@*˜\,góŸËM¿³’*4Á²…ÇÁ¤9Há3`¥N€[1èÓñÖ¡ö˜À]¡·]D$µ¡‚¶eìê®Ú/œXŽnSŒ˜Éó½=×à»R¸¯»]ÖwÁËÙP×s ®™ øB®gw®2 0XºQ¥¥>ARù¿Û1 ÈÀ„!æzTº›: ‹´<æzT6kÆ2 3Ð*(ïb5¾\Ô„G WZ\-üvðiÇ¢ù®WU Xˆ\?ßÙ™îëk®YöGF®¯Án¸l‘Dºú@ÀGY`IZG_Ç¥®äZ¯ÔÙw[!uîxF`§ jÛˆ˜†ƒˆ'…‰Ùz:;iÇrãdA î›Ðºw*/ZfÞL0þÏç›Ä«|é;¢’Tùß÷ñŒw< ÈÑ\úNGO‚i® ’ZðŸŽÕ,Šê•þi òUNY°ˆÊî!tT/0´:ñºÖæ°o©Ýp? á‚ç¦}â°”h*hèB¹ê¦Záú>¼fýèûé—Øó~ŸÌ<¢*ÿé†ÍÈ—Oã—Ô\”ʨÛ4³%ßÐ>× J**:©Û¯ÊQùô» ·þGµ8W©Ô|¢Éâ‰Äšéô›š<E3\Y’Þõ4„±ï§Ú“«Pš$”W ÒUÙ‚X6¢DMEÄîh®ô;ëê›×Êš¤¼ó8{ÒêH3 Ýh†¼Õ9© <³–=Ë­'NeãcH܆ÛáÓ™ Õã´°d9I“ âi¾¹É!ë£é4T>I¬É©úrÔRŸ¬›¡š Q õW%i§/+^·_‰¶`€Ó-S‰¦x~®þo„Tð6¶œpI›í  ¯{JÀrt KmšÅ™Å5«Æ˜ÅÁ]ÉK®'tÝÆ®F,4Nœæ"~y†-lŠàY<ó›ü‡Ãd~k ¯Â–þzÂûq8ŽE¬+šÒ!Âöláh¶ça—hÌ@¶&¨‹ml›¶a¾ÂC1mn£šmX†F8cÕm]s$7"\bÛúƒ‡b®˜Ç„éâgÓ]-wí{þx¿•jñLñ~«•½B¼ßêQs'üÁ¢ÐÀwÖÅû{zü1°d…ŸÕé–ìÜ báWôm¬/s9å^E˜F¹ÿšñ ÷_3lÝñ Š0 750ç\£q,l W¸ø!Y5r/ˆ'°—µ"Ñú¨í‹:$¤ÜÓá×îé@èÃ{:ЗzØÇFð¥Çíð+úX~|‡Êlè¿Ò“KÉ€0~ôi˯o&ÕÁžt±éh‚3C#†­BÛÓ$±8Šá=Ä€WÍ£dÀ%.pÉ€WbÀ¨dÀo–¿ñã–'3í§1æ˜ç¸òì,¸˜/ðe²¥Ûô-óe‚ gŒA.Ž^òå"¾l¼¾,½h!²¥™„Øñ(ÕâBBƒ†-Œ‡gŒWÌ£äË%_.ùrÉ—K¾\òå’/ß×í-ÈÇ›åª*è¥hkª™\J®ºÈUÍ7ÀUΩíb¬ŒDbR¤¹®K5Œ™Å7t]ØqÕUó(¹jÉUK®ZrÕ’«–\µäª÷pUºEœ7¼m#\ÈU3¹”\u‘«:䪖M_W¥.r£ô©m[ <†­PhãBG˜ÄqÕUó(¹ê&sÕ—p¼oIV7‡¬Ú¿çx_cÇûröQÒ”¿˜ã}K‚½Þã}Mû™÷ýíç»®‹tSúÄ%ÈÙú‰hQEŒ2s+‘~ß’ 磎¶tl¼eêoPÿD.¤¤þEÔŸ¾ê/$NÆ]Íä.Óˆi›ðk`¶n¸˜º®¡QÿUó(©IýKê_Rÿ’ú—Ô¿¤þOý#rILýM¯cFKHw"—’tÏ‘n%šÇ‘nŒ~u¤Ûu\.]×Ñ\â`Çåᶆ©mØ[j×ù‡H÷ªy”¤»$Ý%é.IwIºKÒ]’îûI7ä·srrôQÙ¶Ü!iÚæ_‘G¹-',èùRQ´wo¶T¿ÀxÈÆqzC‹kŽXÑ[× îýQ+ìö›ªèìì’G¥7Dg”h¶EÉ•oŠÒÇoª³J&ó<'‹EäRÊ–îQRn7¶á½Èµ˜ûìw¤ŸÔµ°E,Pšy_ŠnwÐrÔÊIý\‰BaG¸— Ù“6}y§K »9C÷ÓïÖé‰-ìµ7f(»ßLz¼£!`жê7e¸í²PþY‰->˜–ŠòJXGTÞÿqúy÷°þ¥zðéÃu7n‡CÿÃ6˜¡`˜¯[Quq3tel*]^Ñ:•ÌnUúáu,‹:òVC þöÁ®©È‚5½5Ðǯ»•wÕéçÓó³ÏP^Ýgç“‘{~¦7.¾y—Æg÷FâÜ„ëê—ø¬çÐAãâÈç>mó¯gvµóÍç˜"Ôýj[oîÝÔñ¥ÑØ»Ôq#¨µt½~PÕ¿ŸïßÖNø ±ç·jm>­ßž5øWm[®ñ­×@TgçÈçÆÑµ{±Óúq\Ôo/ÉáImRk_Mê{¶£_ÕÚ?ǵ½äßþ°¶»“¦žÄévƒ»íÓoÓÆ´åâ[»q\¥Õö•ÞØAÿ$ßODÐhWõ½£V}]×n÷ïç?ÍËvÕ€º¢úm Õ§Õ°Ð);ž8ðAuýòU›¡]øpïÚW%µ“Ÿö­îý$³zîL¾·w®fév&Qºq¯Ý8÷C#_œM/p},.ÂÎn]ãlz‰O•Hýà§Ñh‹›Ã]Ýh—Óï'?õËöÏÁ%Ȧ>E7‡çUgÕ¨Ÿð[ø×ú¾ûmÄ¿saõ@·âàË€ïª6ïõö• í›îíë*­w¼mÜ™Éô˜Œ«{Yºq=N÷"úþðärYßOj{üõýþ4×÷‹2…º¾™BõåzªÊx1z:{Ëûÿäò%õ¿yϘšž¼ þoïãåý_¾ þŸÖócj±ÿÛ§qÿ_}úô®ò®©h~oîî4÷ªGŸ>Èÿ0ƒF ôàÓ P» È*4Î4wؾŒtÐíúð<¯+1††Ù¬æ¦Î²\w<¡Ž´Œè–Ùþdz‚è†gIŒ)umGئ…¤iIéPƒâ—Ïñ¯yøNíGåOÉL¼óÈé˜è•™ûžœé™=­0ºÑKæ}÷콨œa/{#ÓןÂMÛ²éüÍfà6ãéžhnÀD8WŒšu½M \Í%Gé³tÚÚÉßȧÔŠí«žQ9lëó¯$÷Éì~Tnz_ßÎê“2h3[Ç xš‹Á†Ià—ƒÍó0£ÌpÕÃÉi¾ËúB/ûb=}Át›º–ãh†åQpG×7<Í•–Й†k5±^À‘³eYôMâoÑÇ}%[/ñw þ"§ÄßKü-ñ·ì‹õà¯A¶ ô&ý_ŒÂûÄQâoþF‰¿%þ–ø[âoÙëÁ_B·¨¡¿Iÿ‡÷‰£Äßü}ôá&ÖK.¸àßÀÑJR5R›éGQ9áþPÈÜŠ¼$ÁWøÇ¬5Lžd¯2Oîæ›'wòËÒ³WçWò'·{ýnÆÈ#"’ï¬OLî§R^}tIs^ÍùEobǦĴȦ)<Æ ™–)5Þ a·eèžI±N˜Å—pISßÒÉfELvCm¶¾=ü  3Z~EE~Ðð>”¡‘OdŽ±Ñ« D\ —Ks(ò4bKKc&ó4FMy®çI \524r…‘ZÈSsÉb®ú8ty Þe9Ú/v!îç2OÃÈ~î×NÍÒ ËiøE«…¦Qˆål#ŒUŒZjý[<­ÈlËžÍ5ÏzCikà©xše[¦iz&¡nÜÞ…x¢å ,æ+ ´ò¬!£#3š¢úÞÆ‘²(ysfÔcFa’›Ñsïå“z})DIºAÓ› ­QwU=@oû x†$Ü¥?ì¨Íº]R ŽÞKÆ|Ùô¡qJ ¶"PŠÉ€KÙäÊúüZIjâX͘Dž“ºµÿãrW;êREF²#¢ØËw;µx{ôn¯ëw¯¦QF\ú~F^Ráñn_¦O× g]Eáœô)~ú?9e‰:? eĸïùÃðZýtƒV=x®jpWãиNôFOrú¾º˜„,f3=‚Ö¼–?Q¾l4‰ó˜„ÑuL¢Û€ÖI(º„#ÕÔ~ìvº­ÎH¤ï5ÁóŽŠ€Tnô¨7ŒÄr-„N–qdg”}81ªJ_GaÝp4Ž›)£êô®d®±Iþ¡ŒŠ@GýÖUÒªKCtºã^_z¸b”lªŠóÓ.Qþ¬Ê*莢§7­žæ#áùT¢3N§Ê ù5ë\I-àZõ†nL㣠ƒV<âýíq?úâ?Q|”Ûrý~&ë´Ê£ ia‰0šL´‡á ð[˜j¦îÄoO®äÀE d¬Œ#7úá…W¡ZÂf¾IÍg×^Ób]Y]xÖƒI›z KVÜœX¤£V=å}Ç—WŒOýˆ æIÜÊ~"žXDO¢«¨»ûšÓ‹̲z)ìgõ‹µÈ ’â£?Ýï âW{­¨è È«›üå“Ȇ¡à.7Õà‰ÚDâìuZQ ×L‹qœT&”±9î‹>ëÄíš ¨ÑLFµëyjôrù±Lb…D˜(´& üZã¬Gš¶âw;}P¢tHõXÓä¥HÞ²ßă‰³dLeJØkÎd =õç_‘ãù¸é€¿®ù»à ׃…m¡Ñ03¾¸eà¶pÕ`ÝÁÔ°"øB%|½|øš·t)&d–'ßw ïÌd¥F·pÎCCjƒSÜJMPbS³ÙÏÄÍìÙlÜ'–-1ò£€×3zÛ8¯ÜàèöÂ8‰ƒ/¡œ~ë¹ l&Åûf­ET òPÏ~oïk{]ópïjªs/7n ÒÏÅg$Nµ]³-&c÷à˰qlúRÁLüï*ͱ Lìjࣼ“@äÚÉj>Ü%“Z» íÛ¶oÈá^Uòüüh¨ÒA>þõLoëchƒî~ý‚| =gDM»§C•&jÇ9½‰äø7p•€àÛÚíªÝžÆÁ‹›´£g¸ä{T{Ÿµ]lÞp—«Úó5l±sSå=L—'‡'ª=—Ú7UýWÛÛ±O®H­¥äߘ4ˆ’?äƒÆââÈÿ~²3¼4ŽBè'Ïé°qq }ð9„þƒ4ºjÇ@é’;?‚û«C¯íÞÖUyÍXØ0ÂŒžý|ýúXß»YܯnŠ>âÅ@ÿúɦè#¿]Ø‚lŠ>î.l$°¿)úhÖ§sú¨6PØ}Ü/´ívcÚ6]°#ð,nÛml1ã‘¿Ý0‰ùü¾€…Ígõîäÿ+|µ9‰ùz7¶ˆêo•¾ÌêX}òV? V«}ð_&z¶¬ž<€Õ“çÁjµ¹Ñå_&z¶<ÛÏöŸÏÔÆQ­%¾Œz¶úXàËlŠ>ø2›¢¾Ì†èc/³)úXàËlŠ>ù2Ó¶_&nÛ&ù2ü; Ôãù¿k¨MôÈ3ú2ùÿ _o!òš}¼…7m“ «.óÃdÇýùRÔòv\9CY°ÄÝ|äæ|”â26òµÅF.6…kͳ¨Ëô ÎuͺZ­&\Í5mÆ–ÉäRb&òÇì¬QƒÁÿÿìÍã8vÀ‘œrÌ-W£€ÅÆt‘)’µhÌ4zjfØþÈt÷`ö£aPåÒŒüËvWï /ä” ç\rX §ä`þ€lîAÿ!‡\rÈqsJ)É_%Ûrµ«º\ÍÌ”-Küx$ïñ‘š¿†âä…½ÏL:«÷é$fŠÞÚ7¯¤IÙd«o‘(#âºfh×á´JZ= ÿäå…9QYk0í‡×0i•­j†M¡c£®éòK,@®}³séä‡_ÿúÄô!øsÖ‚ÿ¥Ð==†OmóµìÔöWü®ÜOWs¬MÈš6ª°iy%])¡Qõ¡nU ÞTç¯Ñè§=»›mд´ßbP[Du¢R‘´ð@"^ „Ÿ,ÅÆ\ê¨æ¡J׬¢E«Ò9'œ@–dÑ´VœE®ŸûêTbf£î¾¸gÚÅ|ÖóÌ8·4gCìÁ,0°áìö«§ÃØ~¬Ã·´¯[†Æ3À¸tÐÊÍ"Yœ·,Z==™”öò$‘D-Õëuož}µ‘£À”‚aŠ×µüc¼ÌÓŸ2/,ÛZˆPOÞh=hMÞ [sË °ÊÕXäp+#5V}ÒR¥ÁÞÙY(Ë»w¦`FîâÆtÒzþìÅ5ç`5Ó‰uŸdP†ÜZí"ßPùû<Ý.È; ñ_"‚¹FTÅRZK[~ÀI ¼_~3Z+âþ¥ÄÃÕpÝgxW¯“ÛGaçÑÐvñ_½~wS ñÞ³×Z×;  äL1³+䆅ؓˆG1á\âPá¸^¸'¼Ü<¼ƒÂËZóoç”]c™SncßÌ4] ö6°«Šº®3†Œ^ïY„UþZèÍ­v}©;TøL²…yÅ”¯3ù7±…¼gæýRR†+0—ù¶Š;3þf¼;(ñø¬øåqR; .ßP0Ý'×HÓIšå6÷®ýøºõHeÈÌ@0ëÆz2¯ñxjŒ=3l&’VÆ^m¾€_÷Ñ*²Æl­ó½5†VgÕî¾ V>^ÚÙÏžž¿øÙ³—vW|é@XÌ ÇĪ‚Ã8Sün›/ù)‰BRÆ–E”0$èiîÍ¥Ôß°rë\®Gjµl7VšôˆFNUT‡œó(¦[ÇØüŒ•ççO¿xüô«{a±lUWœ‡~áQ<¨™Ól¬ß„u³wΫFÍU»bæ¨édØŒÓ^O—NôèËIw<t#uñèÒq?Ub€‡µ»ô ^»’ ÇÑòé©»«@y(ãJ48Ôฌ«æýÂ.¡ò|›\œíuˆH,ê»ùü茯=(î8&ýgO¿zæ&}7éßФRU#ÖQj4 ˜4Â'7Ç{@À–ÇkÙ€¶¥À5øµáUs¹86¨cº/¸WÈ96øàl`w¯œqþ…£GŽö ƒC.ªxy˜ò-‹*¬™ü˜©s±A.£’T•8*qTâ¨ÄQÉ}¦Ö&»¿ÁbŸ*à ÓMõ[Í |‡ ÂB|éxá˜ÃËöYÂÑ~XìO±‘õüh··If©ÉÊëà¶ï»*Y+Ãímå^.™1+Òñ©ˆ$Ž=ÄUÂ5¯¦ ##†ƒ8‰Y˜.Xm_B¼%°êeÃ0¯êl«=lÞÎEûï½*Þ¯Íu#Ùêþµ6ŽÓYÃÕðmkrÞxò““¥f`¸l‡9ê~}þèÙ“'çOKØ=ö- ÉÓ¦}Hø{üWðj@Çë ¶ÁýE FB,¢sómÒqÜsî)§dÇ=ÇÊ=†S-ì8´qhãÐÆ¡ÍÐæjäì!}Hƒ_YÛ¿£.Ͼ|ô³Ûc%Bü|›|î)+Á4Ó´éa§Å`5oášX¾Ñ°×ó=ï^ß&`çXr€åË–¬€µ´›ËÁÕíÂUÍãlû |çÂbê\)ç:<ùn±ƒ'OžƒoÑbx=5rXÓ^‡wG%l¡•— *îå¢!‘mÞµû«û¶ê˜öVá¬å2.Ú¥±I¾¡0µp€„ä ¢Q¨‘À¡aê˜QÉ`~Õ¬H¥,ý{¤±¦Žâ(À„‡„úîL„Ï0–TQHu$“ Ó6~Ì ¨ˆ¸ŽâS*”’·®Žnj6ÔB¢Í¼º€sc*¦@^÷šE• ÚKÕ¬Õ‚rJ’È =CqÄ€ø8Ba@%žò]hh—rjšÆ5Ö‰îšÃwHýpR$p}ù¤Xh’’ñW.ür¤£&º ¹!"°G"¹¬b¦Æ£~òðÑËÇßœ›k 5˜tËu`NUâ‡Ú„Ũ8û‘ú^Ʊo=ùty»¾'£Ì|šxDÆ0¬¼Hz$cnï뉂±«LÅß•1…‹å-Å1"å1—~¬#°UcÓˆé@KGVJ3L˜öƒÀçZZ™¤}ÕÓK² pÃÌ*Q „D4ö)‚”nÄE¨e€}±¶¤°î`7e[sñ7ì¶0ØMÊ`#MN’L͆E_˜E#Û$ÄøüUß|ò„Y˜IóïËËzt¡ûz¬Ly±iÆ7jT~ŽÓ^:PÙ|…¨O:ОviG_Bgèæ#å6§‹7Ýñ w¦²løF[©½OõÉ»w‹@ΚU£]y²X{¨_xàö°,`îÉu‘ß^ýzñ˜ðè‰Yã*©T°ð…–éÛžŒŽÁ|ïØùì:ÿö%züüÅY7“¤—PÒ•ßГ‡Îú*êV‰$êŒg¾>‹Ô™–g2*ÛFÁ¼—çŸÏ¨¹ëdùJP]¹Úì:Ñõ»ÐÞ*¦X“:\Þ/ï×…h¿xôå™é§€IÚ3¹>yøôÕßÛx¥ñ°g:CÙQˆxøË35Si¦Â4K'o»¿mnž3¥´Å6¥nÚÌT#w¯îP[SævZJq2Ï?utçOí?µZÊæ9)Ážé.ŸÖ[Í2¤M2sZ„îèKÕeÚ *ë0,lùòäžù/@äöBlº|™üæÏÙ|¦£ù}ÝŽÍ©C<àrõb·B:¶ FÚR6ÆH[<`.t{+·“ê·ÊÊË–ïÄkÙ§ÙãžV)¯ÓÅu›ouwæå©ŽlâŠc: =ãðÒ`¡‡‚”$ž’ÊiìY;²©Ý²tõe”MíìQátyÃÃÏŠkl‚ò—yÃ>òê’k ¼²ìD˜?ºêw)/ƒYöŒ‘=ü=åƒWŒ‹òz%åæ1:{ˆ<Ÿ05j±ý›¦áÐãøÜÈýæÇbÎÓ²JÙÆ[ ó²Ûi4ŽOʸ¬Å/:Ëðâ÷âq…êc±ÄÜ7ñ‚"Hå,BÂó#³g: ¥bŸY‡NÙ‘BEÇ•­ÆŸ-Íýk³ÇŽsÒ}o)–c#1$Ãq—ãá›AåÀ±åšr=1ÍôUÌY®zLŒÍËz< ªŸú„¡BýcŨR˜xÐŸŽ¥êÛÛžÔ·=–Zú’`¤9 U`›‡8‡ŠJ1&Y|“`€ÕEËÕßMMåìÏA#%þüüÉ«µŸç… Jó_ ÄÝtdO‘ž9 C<Ï!Rm÷¨<åûÙÍmz´5»T–£Øæáq‹°9ÓöY·VQqööî4Ÿ¸-BêÊ‹E8]õÜò­ÉXëîXõË HÀ«‹e˜]• ôÛ1t¼ù¼Q>?žЩº³~u¨‡}®<Ï#ÓÝ *gÂ}“ÈhÚMÉÐÊU£ #©Kt‹@6äÔ\:þ‹Gèëa_£™ýa¦±=çäá“/ìEÃÑ0öÞû¹Á ïû1t&•ð¢áXW¿L.@αýfOÛÑПŠ_µÔYlãç¹¶›~¢,ɦù…ùöSÏ.›“âø¥Y? ‘]°µOŒt„¢ÉØ—¹*¶/%i6)jvY¤q™Ûïýþ¥½ Ós™±ßû1‚‘Únÿ& ÓÁ,®žëG“"m›ÜÚŸFS+–{STSÛâŒzz©²eú¹¶Ù÷¡fio÷š¯~<¾u¢'‘KþÖd—UMbMRýáÌþú}:B‰“ A!0MM~yt¡=ú*%Ê󰵞öÓbÄ÷•ý;вþ4‹ÿž±ŽmÊýÉx<—uUäY¿¬U¥0º*þnšO*ÑÄвtPì-«$<(ž¾ìéI8³ ë¢3ÎBû!É{y¨ ˜Ä;Vj™ºHºY¿è z^–hÞ‚eFЗþŸ½+knWÖïçWðú%çT…6±p«rë*²â0cIŽ$¯U)‚¶m#JÞîÿ~ÜD­–'žŒ3æC*,Ý@·•L'!émw<ÉӓW\<¤òw,R~<ÊqJžDœ‚‘DW1»ÇLg”¨eõR4ÎÇ—H‘ßO»ÿŽÄ`’¼:êÆ]ßc0ùÉpÓÿÅ}ìÒÃRA–=µxâù÷crŽݸ‡k®'‰Þ]:˜H&êxŒù ™×=Š'Íe<ºQ¨VW/¡I"ðý Jf“¬q­ >Ju“wc¢lIЦéK1½åx4I“àéšÊ…päÍh œúöG#yÞùß'Ìzuæ ­6_ÛÆs¶½1ó…_±ùš×t™MÈ5O¶¾—ïLeeJwåœ7 ™ÎìV¦‚Rý›©…\¦šh¦Ïfë>Õl©âYc.rÕ•)Í9™ª¥ 3S™UÍ­rf}g:tΈ$J:µ©úÊ;[²«‘jïLóåz6±&¹öŸÃ ©jÍMÖ‚¹ƒEë_°µ‰ šiÞT•ÌÓ"¸É,DQ—Πh„RÓV0=j˜·\ƒ—£œ9³™"ª™ÑY²Ç¹eWÜóZ~0‡~R?3I)¢JíËœ¥MQÎ"&+â«9K³dSà—ÚÔ®æH'Å*<”ìEü•a—³ÍÌçzËgŽ~À|­‹Ù¶õúâF`4„TËx —7œŽ…Tóo»*F²·¹#ìNâ &‰Öæ•ëÌɤ¡]Ì^OŒ©vO‹Ö »2XÝŠµo¢}”o|\DÏR©FÕÇÉxØS7C]<™~™2Y0jõ+OÆ›×Ý`\lKê”ÙHwÏàºcè3ˆcüÉX«c fH3f`*m›>³}0É™õ!ôA}pŸ„ÃhˆiË¢&ȸ”áOý¼Õ¹2¨”ÜŠÁËç3¯z|〉×ϕʫ6ëÇ'šwÚ<:©×¼J§S©~öÎÜÎg¯S9\ñDí¼Sko´›Õßjï¸êz“zÅ«|úä6ÜÎÅÜËn³^?ñê̓ÚühuÜfñ¶[¯Ö¼ÎÅ1Œ îª;…‘¶Û5¼|©øz«Ö®žÔ¼ŸN‹W[•ãÏnµöú±YýÜ^Ói«r¶áÍF³1×]»Ól©W?ž´½OÕu·Ú•NeÝ$s‹w@¾S÷SFžú9\ ‹¤¬qZëS¥Z[ɤù–j(ý²›¯V=ik¼“Ú'7ùcm6;F³Ä¬âOÚ—YCÑÊ>;Çuyx­XTN:ë„âkµy†×ñ¸ ¿×¶«(v´B’ë'G7%ë:>µÜµSÁž±Ž*Ë4[¨ÍDmWÛ«n«u2'É ¸^ü]©VkGµVÚl¯§Z«sä ÂÖ?ШáßÔ²^C·=7ƒ ªS;ðªµVgC¯íãÊqË;=ª4V^Gw~‚«ÖÃ&rÎ-ăک ë–ΡÛxjùÔ–†Ù®‘•íwIU{Wr ãCËÊC7éJi¿GÖ«øòˆ´ãf{!¿Ë‡hFo›djÚ›(Ô¤!qp´fª¯à“ã¢MÌ1ÞÏûdhbš–Á¦¾Ê†¥O–gtÍÁÒ§¿íY„æPFœó`…t†\؆t0 ÿÖòM‹Ù¡ƒEHbRHÇ—&!„™ˆbáŽÃÀ  CdÚ„p;$f€(⪴€ñâi8ÐSXëO‹ñjè¤nÅ£¾œ\ƒExÁ b- ª1ÄOÃ>ï aÀ,Sy¡€ÄA–¼<ßûE)±mjIÇ 9E¦Ã‰ô‘0‘%wöŸ(?±V À2´öb†L=ÍÀ¦÷eßO<ñl 'FÝqœÉ¼SäÓ «òµ%³=1Îùï'•‡Vÿp$¯+ç§bZoUâ¹Ï½=·¹ÌI@º¹,®MТé†hsϦ#þº’À1)•È¡@M:AAÌä'ŸK®Io‘—0ËSŽ—œû~+ _Ä™/ÀA†ô12M kJZ>ò‰,f+¡Bø\šÔqó lÊ8x9§*Àl‡–I-£øvÊâ89>,Þ^%‘ƒ`4ì& Ùô¯â2…­ˆ$@Œø&’SN,G S†H8ØvBø?©6¢‚fYÚ•:–WêàLÒRò£™œ¦ã^±$BÒ«ž2RÏÚØ-ÖèVì3Ìð¬Ùù6“¬+k&!ð÷B#0$GÔÆœ…à0"Nlá!ˆÄÒ$]ñ#SxR۬ȷ|ؘ#›æ„‚J>ã"DÈÁTcVB‹ìÓER~¥Àø”1]Öð:Û6š*ž@š&õe ¤)`ÜHSî †Žõ2œŽ·I¬á¯Š/Þ ±“çGÏlSø8ô KúÔ·¸# uÈ‘cGeв—`ñ3¶xlÁ]~`Qiq$)è!‡„¾æT`‡ š|<ȸ[ØK<7ýÜ•ÓÉx8(0c€ŽiƒPP%@’ŒÐ"ÒJö–¿ƒ“n×®a‹YÛ±wiø$ îÛ>¾á½DMI$gÈy§ƒ‰Õk;¨È@0D}J„éPŸKꟅ)ò7«°Säo:ÿM,Žîºád§ /h`:v(°¨„1Ú’,“$ ¸ÿŠ»Ü.§¸ïŸ½mÌ°0O@¶˜†°H°cPÊAAÙ‚¦É™%l ½ '3]§ª@ü~|Ž3aa¾ÃBäX”µpà„\µR™,4§ †‰Ã¨v<§*m’—<î8£% L› ›ŽÈ30(!ƒ`˜€tŸËÓrð\¯ú­DaÅ,;¨4)ûÅM¶Ò €­8%Øt—ûgDl·à¶¨d6 ж,0»†LPú–cØ #nŠ"·ç&¼L…MìöùØw® C}ê\3ì å,ðC‹2®2)8pì%H•õú”*2|y!â &¦Ä™ô6 °,Ò ˜/#²ù4Ö2‚¶±ò>Vë˧MudàKK¨jtNxÚ±X‘Õàªê}> 7.2;§À&^ƒK^Â-)ðô†XVÓPj8 ™ÃbÍ(‰ —àuÒëV®õVÌ^ž…48¸àaL@OfÛˆšÄA4”‰ùË0;ÇzådÁ 6´6ÆîâÚw^j㿽`ÔN‹ËêhiËÚÿ¾KB@Ô&µ˜¡KDlFRi>°îÀÊ¥. ’|ÑSTWÏ?ËÝE#˜E¬¬. j*¯Yï‡ÂªxÐï’<•Þto©ºrp½?™ÂD)ž ô$Õ1ãàÏÔ‡~ÕEUaí]tÍÇñ'ÒO‰¯ýn–]~Û¡ü>Œ¼Ñø!yIEŸTCÃñÄË+Ï¥Çf ™£¯úQ팇@¸ñ¾*§„h~Lqø+$ªÐ.‚{1RM—}jÞ³ô¶Û¨t•Þöø„a?ïMòŒ¿Ôá=?Ä~ jÔ'¤:@&GçØ¹ 8±™pþz‰XCl8RçŽ :å¾Ô¯R=ġӀ9OV2ܲÀ!+üœ Ý®ð÷6Ò÷×—ÞjQ™áíúÞ¢ÌðöÅzc xÌãŠÄ;¿ÛúYÒ»£Ó¥AAaã=±Ñ?#—À6ÔÖŒ]›:ÑBàòèî*#Æž›ÞÛþõRB!ßf…B'D0„¡œ0Á5CÜÁ¶Žå¨k³]<ó÷'r Èk–jö„J»ÓÞŸðèû¬ŠLš¯- Ù»íÏò§Ý^°üÈäsV_2óHW1²A ývØ›öe´ŸþÙ(cì$Q¡¥’…ØÒlà*Ž”¤vY‰ñ{bÑ7…™½*CÕŒ%n\À=7Rò æ¨Ä¥’}ê& ¥N¥˜9>ˆ¶D„Y’=]f»6JÜXâÆ¿7ré[¶J•Š‚€˜RK¥ð)ÁŒpõ%]Z¾””B{Ü ÂX+«Ä›¯obTâÍWƒ7³]•?æñ»Á/Œ85ûRuÇÁ£oZ[SƒÅ6ˆºªT»î0·öáÃç—3²h<„4¬EReÖTƒ+FBß[Žý†°¯:­¼*~L§Ä¾«°/y.öýc¦÷Qh#C÷ÍÀÐz8ºÃ‘J#çsZ°\Ñ“ås¶m£Ä¾%ö-±o‰}Kì[bßMØwû/åÿL”l½7Mö¦â²`Ü£M„(±é"65ß6B`"mK7•ݘ;\W§{u““9&·¸ žÂ¦Û¶QbÓ›–شĦ%6-±i‰M×cS罉ß6e¦m"D‰M±©ý°©Ï†Y¨²´K®„ìŸo…z(¥a°´,ž,?ºe%6-±i‰MKlZbÓ›–Øt-6%Æ{ÂÈ‹›®*a8#D‰M±ésÏAY6ûå°© }¬¹Ð¥) Z¡:Äl°„µ…€†OaÓmÛ(±é?›&ÙEJpZ‚Ó—§+Píü`’„K³jd4í Îáf¨Ê™»Æ®]À*î1`ž4±Tœ€hþž^¯T÷û\xY#!ßGÖ>‘ûÚgrŸÓ”9%¢~Eˆ:Ñç¡êUâ™fVÞùIh{y«ogs°ZIÕ§µ(ý=(›"ôƒ{xóͺñÞÄÌì)“mßEÆæý»½ô¶âÐtUÊ¢˜f‰õW`}b¼¬ï#ÄDºoa Â#¨Î NtIYH8€fÓz2“ζm”X¿Äú%Ö/±~‰õK¬_bý·€õUbóm¡ì•§äf„(Qö"Ê~f†ŒúõNÉ1„Mf86l „Ç4tFX c –qÙ=yJnË6J”]¢ìe—(»DÙ%Ê.Qöf” íU:Ö¾Rn…z`º±+&½Ⱥܕ÷¼?êIÑvV¼ÙU|™/ä삞Œù«Þºqßv£áØS]çe:žÝ=0 Ê*Äå8À‚Ð[@ |Õó Å=U–ã~žÁs´X´\JØR”l?SÑ&ËµØøw9È^:Ô•â}%˜›ž'^ o»¢ïÁï½Û`å”c»—Z²'’£üt'KÑÚ›Y÷“ãô¼ì…íåw|}½”©Þ¨7´«Ø´Œv}ÉoZ¢ñ¯šrJø ÐÞývò±Vm6>¹‡ö®‡}¹÷8öövA í^¾îÀˆªß§¾Lô€6š>Ðrµ¥£k ‹*î*§‘ÿA­©R[`‚uCƒÛºÓ'®‡ÚŽûðñäìô#ô×èñ³û[ÿìÔ¸<ÿ^®Ýg&üv»À§#ÿM.Ï[=Ñc7âó©í¾ôfHô=÷Æè^ô/.ú_‹›¯“úãu¿Q5Œ ìÒ£³ÚCýàbR?l]×…yñxE/ðŃ۽ëúäËè1ƒŸ¡ž ­kÿ¼Ò=n»÷Ç ÚìÔïõx‡ºãª~óõ®~PIÿÕ¦õj%®ÞIž«ö—ç!¾<\žÃ\οÜ\¶]æö¿ôëý/߇®qÔ©ÓKoã°ÑmVÑuý¦‚:¿_tê¤yV§ÍÃF¿Þu#·ÏøY‡= Aø8CwjÎõŽÀ̓ïõÎ×Çú ¼SýÂ܃¯t6ÎÊýÑMåjö\ ÇÏUF7—g½ÈǨž>œãÆ]puEÿôÑ'§øèð¥{yÿZ] åcóðÆÛº¹¸¹š\tÜ»F׸»<¬=6{7̓ë›Ë·{Týr+ú½Á9i€Áᧉ¨Âœoj¤qseÖkFýÑ…w®ºa»B`¾3š¶é{?wßìÄϽ Þ7;ëyã¾"Þ«ù®¥éCãÑÆm¬—S—¾"9½‡këùt}Eü77¬©ÇÆÁ+âÿ 袵ü¯“WÄÿ‡FqM-ðî%ü¿úðaGû?MW‹jz·ÛG^µÖêxnëÞœˆ½™i<>Ý ê°ïƒe tÁu:z26 “á°§çy­%64ʃš 6uÖäb=ƒ{|ÔUe6ï.ËwÚp )(¢½#8hx×!»³¸bcD7Š®¿iUå›* ¿´YÔG› úÙÇøÆ#íÂï´»îÀBZ8=‰.®[Ø¿1â»ß‡»ñ†Uf Æt+íß©Gªá]@½IU‹czíÏÛeÿYÙ µÈÓ¨@)´–Ù´'Nx>ÿÑ¢i삆ÓÞ­iŸnGÌe*býÏ ½õ´44°²[fÒçaÃD¸vgB•‡©3¡÷ÜëKMÁ'Ñ†Ó x2ûÚ1¢+Ÿ(àÀÎî®ÿKÓÚ'Õj­ÝÞÏÅXÉ4° &6–ýáDj±lîþkÅøÉ{ïï«Â3j™îÁà†Ó1x0Yñ¹hÏæ*Œf0ÝÇXé£ð—ƒ= 1gœøªÖ䌰;‰4FYuªtFš¿ý;ÃÊ0ºz8'SœSð§~jÀ›>5ô88ºýaÐ »q=­Xû&ÚGù¶ UGQ$SjTW÷ÇCU°ðÝÿ³weMëÚúýüŠ\^úœª6Xƒm‰ª®ºéèt“@“„éÖ.—&CèL;NÂpïùïwÉvB vºñƒmYÒ¤õ­µ$«ÛsÔ¤¡¥™‹Çœ™ä$¿²2í ‰„Q‡‚9û¾Ã¹!c„Rêc¢yô×R X ¸k̹‹© <ìIH¨ÒîŠ$ò•$ÒŒÓSí2ìSM”'}fLôÓS?ot.L"¤¬Ã¾ñå$,6ÃSæ‡Õê©õøKÕÃf£ì7«å°ØhK_“JãKØ(î-(Q>m”k;³ê¥oåFxXª„µfµww+µJãlîåÊAµÚ «;å}¸8jTfWªÅ½rØ8;„T+öÉLOëõ2~|köõ£r½Ô,‡Ÿwgïî¿TJõ¬ÕÏ¥/õ%Ožx³vP›k®Þ88²¯~nÖÃÝÒ²Gõb£¸ŒÈo•Ù'5`ßqewžê)Ü  d¢©Ôå£Ýb©¼PHó5•QÀœv¯\jhÂfy·’^A_Oôæ‘°filÖ?? E ÛlVCâ¥jQl6–)Å÷ÒÁ ^ÞÇÃ\/­×rl&W›ûJÆÖer:ª,%‡î2®<æÙzš©õR½òÄË¥ÊÑQsN“kpöºg¿|T„:ë˹vÔØgˆðåjeüÍë%Ì©Ôç(h@§åĽx¢Õúañð(<Þ/Ö(^Æ’Ê<‹ÆÃSìÞ›ˆ;åã Œ:{•ÚªáS~ÔÍz™lü‘Eý`ªíÙ¿‘K Z%ky1?A¢ùÃhÁgÿ­kÖ:ù{KjÚZÔd!A8~ŠÔÿ,"|h§ïpî™ßWö0Ͷ-Æ#iϲv†ç 蚃¥+±V€\åc)—áÐHD\"íjã»Üò¯a-éù<ˆVQˆe˜4!„{ˆbáOŒ Wûšð(B^@ˆ"âiD‘p‘a®~m¬…Va­¿¬Æ‹¡“}”d¦­ïÙÓ)Šš’YÀæx’éÉá3 &i¿™å;“L ]°özˆ¿´˜»>À^Ì‘çdç§;cÎN­0Oô[ƒ$;”¥w’löH·ìòŽ 3^rQÝ 4nKW¼ØŒþü“^$´Ï½=—Ceé(Ér¨I¦¿Ç£åùÖù²Y_À×u–¥¼¯ik“#ãg’fàx™,œvƸR)$¸TàŽ ×HŒ<Ø2¾D’˜ÙÎ ’I(MÕgo{”1ûåGìÊx9LÐ P~ùõÝÙ·3'™f¢Ý»H;bººß³gÄϧ¦/,yIûi[Œhĉô°2‚ â3…<!ÅpÀ"¸JJÂèDàÒ¤9g¸èŠöFb/f’ÁÉÅA7©|4hÏ®/H[u2A:“:F 1Ç÷ÕÎ×™°gJƒ¿¹Ú5Ñœ¤F$H ˜Ž@%‘Î/!aål³”?¦ÝÆDq)ðñ"— !Ä0UÚçÜOy1Y¬’.fš|ƃ„/Kd=Y/‘M<Úx•F€6iNe@AMC*Š˜ÿ:’NV’,‘/ƒ‰/YIJ–ç{ÏOII×7’J_0ãz0k ÌxÊû"~Æ2œ5¤ë!-µO/¡01I æTaF%þ¬t³Å³òMÈRºf4@û÷ÆØw5ó\âJ¢H£h’ùÄøž~%§Í.Ã>÷×ï£î &0RB’*é2×§0/QÏ#8b¯"á¬ó¯1zæÃ©GTR¢Ÿ5¸ªNGtÈ f…=åÀS²Vvå`Lfd ó†D<«éÚŒ€@g<™Y%ô²N[]˵^KØ©0®w<#Œ ÌS„¢aˆFF{X¼Ž°3:–ON>P°8 ÅÜ•±»d!y˜Ùø?^1jWØíººÕ\øßiˆÄ¥>wƒHàPÀH >ì090ÔKÒŒžåº-ÿÂEö¶ªé[ß*{h_ºÓê¦kUÃQÞ²‹´á~g8‚ D)ž ô¤{M’àÏHB»ö¦]µú!¾ƒ$Eº›úÚ²HÁ3ºòg/û=PàÛô%}²õÃpºŒè“í¤¡¬£º;qôm;¶žA7ض n­Í÷)‰og '7'1­i‘þåm £½=Ñ—™MŠÄæÂÎý“•ÖP‚€jr(bƒ©:Óú£µòá¥?&|ôxú¤ÕÓ0Ûƪ—ô9ë <ó—=›Y#<áMCá+¢]u{ÏC»nxÒX¶D$Ã4°7¢|Û#ç¶žlÉŠR3nÙ¬tØÙè‡U¨2:Û¦õ…Ta iï#Ãob›(žÇÿ…= ¼Ié¢CÂ"ýßt èÜ&¹—l{Cž( ¦ÓÍbG鮘u7Š¥;´²—d¤]7ÀÒ¡¾F7Í‘(€ÿ"è€#x– ÕlØgæ}4Êœß5¦t»õèß?/…Aq²Îáµ¶Dú<@Ê—ÒA®Ž€I¾â<â(êyàÐz®ÔÑ/·×–—sÀ}ŽVʵ›e™#¼ pŒHn^µ×vÝ:~ƒ½¶øoØk»Þ6Úu´ïïß³·V/þ¦={뵽ƞ½õw¾%ðP$Ûû6üæõ¼öey0èl,ÞGäÜù{|ÁanÜMñSŒÈ¿àðЈ=÷,9ò ž×!„ •‰"j˜r$ޏC”’ÂÃÑJ«²nù^W^Õô¼”}Sçuäbø¹b ÞÊ1dEÞ๿>zÞ7 ~æ™ËOÒ°•Ú¿êY à~W¸‘ ¿ü5eDŽâÆgŸóF¼_7r—ráîhª„C™Vp‹y"—†I­ÇÜ5zá³éN²d{Yjg¶¬Ížì-C«6—ñ^ð¾À¾‹uš0"û Á>{`ßß3’F P” ”:^àauÚ]ö×­#û9ØÏÁ~ös°Ÿƒýì¿°ï¹)Gïk½'ñSŒÈaöC˜ýÌo8žÄ¿Ì ¢,à®Ã\P ª¥ï_h€ÎL˜'°ÀjÌ^·Žfç0;‡Ù9ÌÎav³s˜½fC}ÅFãhÛÎn3ÇÕ:hS Û}Pv³inD§ß6£m,x³eåÒUf:’'7œ´çH-zëÔ}0nŽAh›žž"÷ìæAPPÑä@­ä´8‡¸®ÁýÁí¢ò)ÇC{jÜͼ€çxñÐtYeË`öeËÉ\?eºVþà º¦uu!A¢có©½Þ0ÔfÜšaú\oµXT>1|™)[ñí¾ŸîeY^‡÷æ½y¸ñš®×ƒÀþµBÛƒ0jØoÀmZ±/ãM)bóG!òA®땈®.|øÖü\.Ôv+{Ÿ¶.{³u7µ·6aÚ‚yù²Õ+j/~Œ¤IçBOœna:mñe&@—f;ðwÓš= l°ãà±£Àö©Ë^a£rû¹yrüÚ«µÅÉÍXž»ç§_£3òÁ½±>ñàºòí ÷垟µU›_©/ÇA¥ûµ­‡¨N­]¹r[µ«¤zRÅgÊ°Úøüã¼åºµ«ó«ýÆe§Ö¨Ïî¾£ÚIõöì®y}Ö9êTZ×-I¾öÏwÅ j+rt)O‹­Ãzå¦vwFÕ›ÚNóº¶óëtÝ‹êÕ÷ëêN1û)ª¥â´\µ‘–+uÓan¿ÞžŸ-§_¯Îë^¹:ójw»WµÎ×Ö~£|}¾w6¬íœá³[—ž_5ïöOªn­q|UíTQuï+ÐQ‰+~+Nt¤÷ÚÀƒš{v‚®-ÍÕ†Â;?îªï¨ºóÝ;¨å•ïô¾ŸÅ›ý«âÅ}¹2MÊ}ï_Ÿ´c‰Q[ïßžâÚµ>[ªs|'ÉñínZ>àƒ†º9»;oµÜ›êÞQg¿ñ×:ÕáÁÞªÞ¢+à:»ûzUk|n­ýÒױ괻§ä¨<¸Ó{»CU²4—Iíê«ޕ¶¢{ÐøÑŠêER½*Þó´N¯+;Ór·Õ´Ü›ýAãl¹ìA/ÞŽìo;ËyZ»{;<…~»Ëõ´zý†ôôî-—ÿ]õ-Éß{bLÝÕ®Þü¯Êø ù{oHþ·µÙ1õ@þµJ*ÿ‹OŸ6 ÿW°ÆÕ§GÃÿõú~X*5ÂÊѧ-3T[÷¦ð<8uC0¨½Ž˪%9êê¶I è°×kÀõ¼,¤64žF5ØÔû*žÿìrwKô[öøk€ËfãC¡×-X(Rø@øfx“‘M„ù“¸âÉn_þQ(YçÔ ¸*܇} ÃÞƒv¶1þPqáƒÅ ×­!€Ç5u^\Ô‘ù~ô€ÇÖÞf²dÄž‚ }H›5ºðÏÌ%-àM@½i”µõê_B¾Éÿµ¸‘‡û5b#¥P[e+ü3uÚÀóùW!%.h4jÿ×’úÙzÌ|ÌCˬÿžããLkíÛBXÐ,úHôm’ÁQ—ID¾¯S2MÒþ…™!6«?6IóÐÑvë¢ eí%ÑÝÞu`"@÷ [â[Û\{"s“¼¬:½qòôG«ï´‘ŽÚt¢;Lƒ·ýX]Š.`ùŽrÒÜPË„ÀnÒáQ§•ŽøŽHþöU»3jë?“ ¢$5w†ƒÁ”ד.;YTdÌ…¾Åà k4(@¼t>É8ÜMß¾¹0C9N MªŒc™üűõs&•o&\k‹Ë(lwR]0Ó¾¨©3šú K~JNÊÒqk0œ>UÿÏÞ¹÷¶k ü«w¦|I¢t/ºÞ¹fÚbÚ™½¸;…A‘Tê?ËNÒ;èwßCвdG¶å4iã˜ý#M$ФÉs~çð¡™™ ©>ûþá V¾=þef^Wè­Î%ý€ùúØ9'JO9y»¾hôîíû‡_úLVÁB|&HgXi)'VúÓNć¶i~ª¥ü¹‡Ï™ÛYøAõ|Å'r1Ÿž|ùòíbU‡·ŸL+U0-r”+š<ƒ2ð$™””¢2MvªúæñUô{-tõš¡#ŒÕ¥7Ù)!ÉQ-ã‡då6A„0üºj£ûî–ÍO»ÑL †œ+œ޲‚kTТHi,Y&Å.íÖ7†ÂËø~ýã//>¼~ócXÉVòßËJþ˜†•üa%Ø0Û¬Öö®ÛÖÓ(ë¾Y~š0zTÀã®ãiœ º—NàæGܹTLèàV™‘çÒ K‚r’¤y¢RÌâB;ï›GîܸpàÀ€ûÈ€;=…8.àKð¬ ÂìÀp<å™IRdX6v_`’b¤U¬Š<Šì^RÒ7ܸpàÀ€;÷179Çø”%ü¨¾x”&¤Ü&ˆÜëÀ-ޏuJ•ƹ@©Ì–©N‘$R"bâØ Kª’;Tzæ€;wîܸpà>2ধIv\Ÿe4)7"D¸o7ˆ†p§:ɵa!s{ø F"à ™$+2Eiª%Ûùí£žyàÀ€;wîܸ ¸ùiÌâãúØ(Ë ‚§”t7;àN²„sJ)2®¿æ†£\S†ÒÄà”g4Åjç¦É¾yàÀ€;w/à¶ú7wîÜO¸“SÎØqwÇî¶ p¯÷1lšÄÝpÛeR8QÊS†ɹ*’Œ¥4‰wwß<pàÀ€;wîÜGÜéiÆðÑošl "÷:pæI%’KÌPZØOYj’ äLÍG— nÌ™¹‘ãË‘±cø¤RÉó®'ðÆ'|)“©Þ§ˆõäx{rK䉘Žô`hÅ6‚mO©XßÚ£‰¹Þtkyy±ØÏ·i\[Û‘™WÔ¶ü ºX̦¹NfÝdócÚ²ù^»ÓZMS§첌ô4áÇuLnL;PKAkõ•ÖŠRBÎ\qCWGLj…¸ÌÊ“\!ªÒŒ’¢‰Ü9ãÛ7`®B* B* B* v  ¿>ürîa¾û¯?¹DøºœúªjNT×SŸ »Ï®†åtæüˆúÙý‹‡†‚Œ*æ¯Tê 1Œ ½œ}îJ_IümnVxEë¦Ëv6Ù5eçµ.(·™®õÌÿ0³‰ùªv¾Û޹-Åt:hs5l ýüýìJË®ôÎðySv;Àø}ãVփƼÿúî侂’ì”áGxœÄµœÃûÏú(VòÌ6Ú` nùè¯Í¯Îµ}^S>>Kx×9Éîý‡ÇÕéPØÄÃI1“ ‚ùp ž#ÿ¦^ÝsÚŸ$t§“tÛ-%=/Æmw‹œu¬Ë›ÛéøV7¯Cxwð|d& ¦B%S¢ÐRàLKŽ jÀûôy\hŽY‘J³,O…Nㄘ81¸G2ýÍ=Ÿ{?+ÿfîÍ'<Ói£6GÓÜ#RG%UPçî€zwÀ®e[£-Ÿså,.—OŒÍx æìåÉsüÅäòl™÷rž:$I³rÛ[zï¢w‚’OŸÞ7šNf¯U¡ Óqô˜°q!3$€ ‘ÌÒÌ`¥2¦x{%éíìOª%‡`\—ˬNjíýw;•) h õÙ­,¾±V×H-35;8jº˜ÌOn­B9ùðÉ€5çfM‹è·Ÿ£Ö®­ù4ÊMtifÅt66úÌ­Cœ ÛKµ@²c«ÒOþüý÷Û‹à¿ó~ ¡A.Ì ~;µúníîâ/4Öª»½’óé\ŽZU• =EG˧ᷨ^ÄôPUµEi9ÓnáRµ\Ëmé¸Úl¨ù•-Œ­2¨ÎÅÈÖ¹Î&Zf³W…+!ܱ¾¹Ö4ý*\¯o}Ø \]й¾€òã·ï€l¯ur»{Ùw*x¹nÔÉ`ó–žÄ­¢ÿ‰ñyÇŽ/~mÜ¢æÚ´ñ¡/(ó£|hZšz¥Ë8˜—Û^?0Î=0ï!0Ρ1ÎÎá³v°ÉY¢TŠm Ä)Ö(c üPi!2l´Ì“NØY)b+ðÜJy_Ö¡õæ}_ãMÄÝK_µÖÔ öeO÷Ðv½”3¸oO8ppév‘€{ü7úM%p{6ôZÖÀáçêV´(pdÙw--D¨Ñ¢´§ØK‡ õ.9›I·¼†ÃØïZñ·@V5ð<ئo¨ÖF]¥ÝÔÞ{ u÷WÝ.’zŸÀ†']š9´eùi:Ò/ôÃPÍ£khZýa>GÃ2’QõþÀ‡$w®]@V—VÞpšÛà†ßŽÑdG•Ú¯_SµØéJòÑFV¾t¿ü¾¹¬ÊjCÅÀœn* n¹<®ÍðâÓ¼S€”`‡|‚ª€g¡äH-FöÊèv1fô:¤íCÕÑUª¹nÙîìÚbàï— ðŽnîÚ>—ûiˆ»f¶»=šœ«Pä¶²!Å—•úmÀ °l|ÚæÂÌ£OÐ×:¿5DCÐ`nlÛufQY§¸wvªj×Ä®Á\§k®|©÷1Ô§éP™ ÊèÓTÛžcþþ—2ªÒžEÜ€¶ï¥>«PÐ ^â³ëE0siäL}²oÏ—gÑK›(ºŽF‘=ûÅvW›£s6]g@Z6—ÄÊ­œŽë43Èu:ŽþݹµÐ­‹áÄ9¬U™•·M]¥ÿã,ú[S¼Ë -f“È~¹ü¢b™ )V:x£)‰Ÿ¸¬½:iÕ%¨—UŠº®U¡PK÷írº:/Y)Õbéޢ|×µ.pr«»Y$/.fæ¢yðU›þfÉIÂw<ך>C«‰Ëáørm oqiÜ<‘õíg —í+{a Z}BÃÃ¥›Ç¨jã¶›A…l™­:œEÿS™x[]°h@sîÑ‘„šøÂm<Â5™2Ã+ÈЮÜO ­( ‘XÓn§h5SŸrÑ瑞IWšoÔCv‚…âÛ5I0nʪoÉpP ¨®^ñ·ÅÄÁï²3Ô~‡Ð<ÐÞ²x.«ÖŸe™† ´–ŸŽ:uíï´Ò…ª¢«1Õä=¯ãŽQô°(@/LæMQPÏÍJ¨‰‰Øvv7š:¹¿]ï‚Qta¾¢á;3”49ÙÚøÛë—üd[“W™Ý®Âòzýw•ËÈl»ÝĹATâÊÍüÚßõtEžíÖ.)ø£Ãª©j;Û¥œV{4ÃÐ);÷Øñø”Äâƒ$z÷öýc".ž7°õ9ðÆg4ëZzÞ¼í€4ÁÏü"Åã i]0ıÂ(K˜AФ˜ŸNbStD@Û›eѪXQ’Ä<Í(Mj—j¬NïãE—jêzøÿ~üòPa¯Ž'¬u½gœ‹Œ¨ #§1âšS$”ШÐ\(L²§âI)e!œôðá$r¯á¤µæß<êÓ5ÚÁ£o1„"”RõÁ¾Q³åƒ»Ãg÷»Ëð½çÈØWVa5<Ö¨Ì]ǤYkxFhÊk¦VnM£tM·làJÅO­H§9v•—;µ3ËmofQºÌm¼çYh8½C›Ci“N‹×NPñÛ_î<óá¨t¥ܯ£—Ö ½”àMÊ:Pë̤'nØ&„3Èp÷fIò$\«¥K¶¾ä“õtVíæ`_Êò{úí›WïÿþöC‡­¢flæ†ÖæºgWnO®l˜W ës;âÝë!ÆÕ°îLa¼1Þ+2};¤Á\I\½ã&_¾|y(+s?To´J£(e©FœðeXÈà<ã1ÏMAɆõ4æÁ®¤3WîXí¸»Kì^€ºXœ žðx«jZ®M÷êÍþ›‰‡ìŸbmÇü¥Ž]‰Mßš8ôe·æÉÜTÖ½:ØýTéCøÕ{—¼êNßf[.æÓ_ÑÚŒ117óÁl1Øà}óhk[QÙ(v-•™èµ+Åt¦Ú_v»õŒ“ûqëyº[ß¿#X÷Aˆr› ‚×^?¡Yvžß¿D½}óãÛQ¢D&DÔ¯¡Z=ŽÀ¾ 'ᓇc«= jË㬕žÆñÃgÉZI×—fAÖêb­toÖ 'éÖú¾¬õþ×—/_½úáÕ¶mÚ ´õxhë>gŸé‰átËìsz &ë¸(/#[(/P^ ¼@yòåÊ ”w¿”—>mµVSþµRÂVõ=ï_Y¹A2á0˜ûï$ øuÈ ™÷Y½>ÿÙY7œh+ëé¬ü^çÕ¹]¼Cð÷;'mJ<Øár›êðmÎâ«K§PºµÕ5ÆfœÉ ‚HV䈅Byž dòBX¥ËÖÂå}Éÿ[PóÅh ¤>¨»üj? ¯zõñ_ì}+×*-öj8›/@äcP¿€"®«×B_¿×÷É¿´ÛºÚÕé©ÜR¶Fÿ³¾ÍyŸ`ùå¯âeoæú¸ºyJ›Áz só¹{Va>óÞP‹±°gì Q«×pêä«@S¦Mš:,šº½ðÿû†Ä2ü4Bbà³7mTyî=A ZnMˆ‰Ý¨… ÉÅ´;¬-!±-ÇÀ z(»›ñP##'‹Ëò{ãSQn“AP¼ú†‘wÒ¹Ætù¸JlãªGMOœŒø£‹wk’áƒÒ {®;ç冷ë΃N8pðU+Ç»µM“ƒÓ{œ»9ö»|ý ‚Z8lµ°ïqô}õCü°K©{è‡ÉôJö=#ϪŽZ>K²”¨$ÏÁ|ë$QH1CŠÇ±¢*ƹ.ìÖ ¶âG²Kí¨^o¬Ö´=‹“Ç£6ŽP¿$ª«{Ó4$rÍ»–¾N·UÇœnÎZ)³ª}ÐPÛüà/dRiV(–˜!`EsJQÆ9‘’¥œkRåâkÿy¬©#­LÒœp&b蟂Åg¨¢œ•Ï N’X ¦S'œæI"Tj”Ö†¶”Ù7WG5ûi¡Ÿ²,ýž³E¦‚È™¬ÜöÊAí¥‚:&†‘œr¢'y]:D ×ÿ0Ë™N?_ ¾ÿå7ôëûÏGr1K¿a^ Ÿóä »'«ÏÍÍl Ãg}MeimŽ­œûêÚº€úSеìK½ÿ=O– –ó˜n©¦?¥ •èjÜ$±¡ü+³–àÆæl™ÆŽþi‰`$›‰6]MG‹±)ÏýÿPéÿgïLz$Ë®,X!±aÄ6U›FrÞ¬;i•Ýí ·ìÆ» [­àŽYÑŽ!‰™U%ä…Å’é/xÄÆ ¶ö $$øHl?ç¾!âEf /«¢ª2«î¢Jo¸ïŽç|ç¼ûÎYf ݷޠã~Vÿê¾·Þ|‡Û6oi/Ú=XÛ^ zÊ4y'±Ÿ¹«s“YÁê-X-ȱ´øÃÃêD$U2"bY@œ‡,6y¡½q&òö±z`«ßa¬n\”ß)\]¸ú(\-Èm®.„z4B}HºmRlÞ¹@×Ú†ží‡D{Ù¿%ö4;â^·öÌŽs,®/O>[ÖéëvVëüö­Sãñ ½Ož<ùÆJ&?Î îÑI½wõ¤ Êx’KÛR v*¨y“Ì1SLè¶tèë&¾‰ÀìŽLȃ#`I¼"Q;„…”ˆ"‘Ì"∠*Å;–‡–qˆ€¿~âŸÚ0ð“/>ÿÒ÷ˆù½zQäëöçËïͯfM(>߄׃zÖÜXuþ>n7ÆŸ ’~~5 '³ù2Îrág¶ qv*ßúî¡—éq—¨ ÜqÄtâˆ{§‘¥,SÆkíÍ”Ëj_«‹½“}Xž‚¨’—! #°Ç2‘Q$”ôÑ1-§=Ëxw Y‚wpXÎ9P³Õ¹jrA¯ÊpR‹'œ¼7JK¯Ay+‚8£0y4NÈ9ÏŒ£Ä‰¦Qû„ÓÐ2Šó¨l‹sHI¯êƤŠ0 «„–ÝÅ‹ùr^Lb{1Ù[Ú Ž±9“sÏ-¿7› †×äzö쇵9€š²9`°ƒVœ‚è}hžÑ¡†=Ùê]5¹PõMªï¾gÔeÐP#,…Cܵn³HXárNˆ¤AõÐ2Šgôõ2öÝ=£ƒ$ÇpϨ|Û_,Üé² æ£)tÑä›ë?ë¤?Oº•ŠÏ„ÁÕŽ–êò å±§)ô^«Ãëg«”ªŸÿ|Ù‚%Ü3ê'åé´ 9óËIÏâs;½œÄ¼¨ºlJ£µ1¼›4æN}ˆ¼>0£®ê“ßê¾ú9W—«;¦q:_ä¨AJ*³yp4uPN=‰³D„ö“´õ ùÀèbãrÒëÌ\Ý?пßxl¬¨É‹µyK{œ¯×ÏíŽã³U}ºxKÊfÇ6ÈQb<‚‰î4Ñ(%jeŽªsjçXà2Ç ‹•qRkÄd2 n5FÖ-¹(¶10×x™©9jWã(>÷“«ÐÏ3Õ^p¼-~My[̳öÌj\ÿL{´ç¦iô:«[7}`ía°¿quß[{ã-;¯=Þuòð­[e¿O~ÓüMøN«Ä.(~hotðxRïõÚçm£ŠGã&˜Ë—‰ký ØZ°ú¥E ç ¬j €¬“QʳC¡e”·„ûèž÷€»bdÓsPrDêwˇ`µ¯¥Å‡pKTA÷âC(>„âC(>„2ŇP|eÂÂ=ô!Ðsh'â]"vrF©öµ´ûb§ª{!öBì…ØËXb/Ä^&|!ö{I윟b!Þ1;åÕŽ––T»ˆßñ³A °`/À^€½ðËNÕJùƒÙP3¯jLç䡸ŒhZíkQÙMsS}ò»&k6/x¨œ:?ÈÊä× ¡ ¹ä¨ Æ$×諽_Ý,£ì§Ù¹>wn¦É'%íÆ3[ åú{R”À]ùå|ñ¨ýð|}&N&x}Õ_†6¢O“?Jk f´`FSÿy육3QÛKÝ—«chèbf'›Ø÷Ì í±7Á+¬(ÚûVu§ZJó…‡ÃaþlÖÙGµf¼ÑUþ:ôjowÀêL¿é$ ‚_"ÊAôsFrÚ¬àÖbBa>=”¦ï{²}챉†‚QTù3>K)rX„åÒZ!Œ¯±˜8jÔ²¨ßüØÔj%uHÊ£$ÌAN)TR‘7Ž÷»¡ûxûs€½™. º@Ó VD­€.€§!cED>Ó(ÖÔ0¥_S0ù²]yìïÿ ÿó¯¾öWþÃxþëÿþ·¿þ¿_øww©e–Ñåäêb<«åluVy¨èb<¯ŽbÃ^£U¦q×Ñ×Ù4ÛQÈFºòßú|< žÿúÍïþǯ¾öÛþr<ÿÍïÿçG¿üþ‡ûUÍ#°ÎnÞ¯æOàÌ'݉íUܼy´™)ýÿæ#û«¯]þâÿ*øç¿þ×ÿ—{VÁ?Èæéc˜ÅãÙ׻–IÿÞå‹åÓùl2¿€º]œðÁ/þç§7¨–S~jض™nmÄùðFÔON>ýÑgk‚ÿY|Q-á¦!”À[@ÝÇËŒº™á™ºÍðýÖ¾]†¿É0+0YÏM»ƒ ÊLƒ«Õ•ËžY´¼m&ôzÖ8Ë “@“S(H!ŽÁ©-\³$uŒ¿äÆq'¤QISŸ˜'&ú¨]Œ1#†¦O´¶8ÈÀLJD(ƬJÀq„@—¨ñÑTäè¾ô4ÞŠºõ©ú£öi„åjæ}ti« jxôe›©¾"̧ z’º°%½pRßé"™¬”ž4ÎJ’­‘H¸çÁjHKkíì`T[%"„‚µƒ9Àdû&MãÔ5LÚÕDÅåxQ‡4iU\‰§Îo:n[ºœ™çòãù·?cÄñWÏ~p½üÑÇâ¢n÷ÆÝU7+¤Õ¨u”¢qU]íÒ¾7¯mkü }±áš¬arI€/qÔ:Âs}"ÓWìÓæIÕhU¹î]Éb>鬢®"Î{bó‰r‚££D k)JG‹ýŠ,jáÓ8ÛÚ»aýjc¦‚qcƒ‰ÚòLH*IÁ%îßÝo!…=ÔT$ÎÂå˜ùFH‹L±Ç^,Ü >Zn˜«DÄD¼¦¡ð«¾2“w²þ†/âEÖ1MIÍÍꯓ~\¤æ©¨DÔ•q¶^¤Õµ?7ÔÐu±›e6¾ÈðJžpÀÑ®¨5I+è~¦< µàüV#ñ*M8(ev6äËUµ©%Šy£“çªo,ÌR¢)÷A#›¾è‚l5AØzßöAÝ/;ƺãä6€\ˆ"ç-Q+˜MÁp§8LS« €¶–ÇéÚØ1¾Z)^{ òfíÞ®Ã2:î¤Õ /ˆ¥:¿?QøC|_É€Ñ$¸ y”–DŽ•ì¨QO5È{&û£Û3ž6š¿wtãÕrÏ_0¥ :3ÎR²ÐQfN’EÙÓGàæ±;×°4rØðÞª> ‘Øä­SŽ{‡5–ä‘Ekˆ>Ê·•?ÆêUZ‚ˆ Þî8óBsg#€—NƒdýñíÂìõÇ·mÿ¾!®žÓòQO^ð ´JžúÀ£gƤ¢‹,ëŽÑCõ#‡½éûè‹Ï¿?¢rÎ…í4šSž`‘P9·  ”·Ak¤W’i"7-Ý%ª`ú½zדÅ8mÑ’Ðâ’4(ܼR &’lƒyc(Í.6$BÓKûæ X§>N×}I‚PÜ+LÉa… BÈÐp@Øxœ¾\=xè׃¦Â–&H’‘¦IÖ_VXЕ˜[YΨÐéÓ~Ý€cˆGx4 *¨¤µ‹ ôs˜UC‰¾?Ú ¾Ý û†ÛÙ…3®'Cq &™ý­ `LpcÀ„#‚ƒáfŽÑUÝS_¡§ú~»‰Ø$AaRÎ\2Ñy*0h–(tæq¦ìª»#C´¼£y}9h⹎ÁEésLZ€§µ4ý¡Mí @nÑìUìk?ž•pÍzc rÓ@kâüºÞ’d´©% P#Çëæ©ƒLêAƒ}»[07À2¢”œbF)ÂÓ„§µÇì¶»…“ìµ`‡Cëp£:î¨Õõ_×qwR‡Ù;i ?ùË/%ØšüìJ…8Xˆ¬9ŒˆÃ1¿XÔÔ¯lóäë‡[½ í@àŠ»Á¹˜Uë\Ö!µ˜o°a:ž5{:FW—pWŽ1 ǧË+øA8§~ž&Tvíû¹rðÜ|0G[ý zj1?õ{ÉýÁz£ãЪüż]Îa¿hnÊΧ\Ð|±­¢Ð¶/Ö ³ÎÞÏÏÉå,æÐi‹ó(6Ï¥Í:]až·=6êümq¯k—Öê’˧/*Xô“nºô*Ô]RÅ‹¬šéPW™+™7Š~}Ú{ú­P¿£§YŒt=xëôêÌøòšÚpÒ£ÊÏë:·•sr×¹^ÀÛ®o&.þ VêÌ¿X÷a‚Û=¬ ~=²ËƯwã}ŒÐ?Éå¬ßÚì»j¯ÇyWÁhv• yBýü¤mç$ÇŽ\œ4vËŠÖ§‚‘{â§›ù—q¶FŽì·óÜN³æÿÎ~½î"ˆ ªÍ*Öý› ÞCãÜ7æÛ›\ +ê@çX.`­!ÌðWb*(ÔŠ6éR›eßjùÕV°âþáwnåŸâÕî埲_awþ©’GêMæ‘ÊÒñ@©Õ%y¤îGJ¦w‚î–’i[:¦;¦bº}~GÊ¥‰”Ú}êûS)¹«ñ$ܾämg»g猜raÞ/n$g˜lãÆu_n¼Á ß‘9•Ž5Çž:œ³ ûümqȲˆ‘q@h,ãÌAnZFáÆÂ¯¹ "Ë£³š˜(Rxò ˜>Ñ1h<×ÁóDLâ†0°—9e…7ïo2\xóÞðæ® oš9oŸ~0¬©évÖlÙê™%´¨¾<ù,×ó–Ù¬çg´rõq¶Ož<ùFw8«­G'6ÁÍ'ô¤ŠùÛÉ“\Ø–Z°S¬Õûæ)•˜W;úBâÝF¼ô®Äû=¥DØà6H¥A±J‰\Þ¼’”¡2±€Ú=D¼CË(Ä[ˆ·o!ÞB¼…x_gbûêÒ>›=To,ð˜Ñ¯FÈ ÷ØxÕ!-ó|ÌO%~ïøX`Uíë‹ÂÇ7ù˜¿| 4 q/=âÊd (o¥WŠZ~0®ÖÐ2 >.|\ø¸ðqáãÂÇ;øXžÂŠ}ÿØTWûú¢°éM6ï›Z)³”#‘cYqe8²Lä¥NDÈDœö‡Øth…M ›6-lZØ´°iaÓlªN%cï›rê}}QØô&›Þ5§TìÁ±)KŒab”Éü=wD&é€8 t„Òèè!6ZFaÓw•M›¸&N œNåm8}ô ¡}šj%kN^Ô^Ãgã³üT>þ€§ kU‡=Ú<‡>ùèÛçSëG])ÉžyÎâ¹bçÜÃõÍÈœ¾G8]ÏÏ»!õ¶¹Ù˨ð&P{ÿâuÎ͈MÞb üŠˆW»!ê-ŽÙØ?¬ìЧ„É÷Žóµ¨öõEáü÷‘óuÄÂ"G3™SE‰#G„RYi-?øÅÜÀ2 çÎ/œ_8¿p~áüÂùï4çs|Êå{ÌŒž1²m rÝ%˜ÙVľc03ÚQ|X©}E´5Æ`Ä%¶Èh“6 Í9 éà'zCË(ˆ]» vAì‚Ø± bïBl(ï£Ï?ÿñùðœÕ7ïçq™ù¸ZÅÝÔÔœ„mw=…龸WóÅ(?z•ä·‚‚º udÉÝâ«m×7=>ÊÙ@žoðF_ÜÔYy²µ˜~EÕÕ^u³äŸÅÅ,NÚznmæY¹ïŠù|9 ñzÜëñÇðûñu°Û®¯5^«Ã^)Ëk0¯rGÖzý‹OËæ"§DÜÏ×mFëaùÕò¸¦ó'ß\ÿYçyÒá=>“j[ü¿º îÇמ[-‰|ñx–º`9žž3þ&Í-~×€D’ƒÖÑm{ „ôxz5íÛYä o¹Î>¿}Ýþmü[:ï%Lktb–e^Ðjl€jq¢ÌMŸärÌ’Œ”|”´2Fm˜eᛚëóvo”=¡“¹ípeq5ËG×ÓNùÖ÷­R5Ž&иÜ!ŠåB^À¾™×ýjþiî©çZŽdÝw5ÆçCßýôϾ~<ŸFt]Ÿ¸Ž³P»¦}ôIó!èür>™_¼¨ òq2Y©þ¬£—]çùù"vg–O¡ŸCý«övG˜OÍÙŸö&K=øUk‡¾Ÿ¤ÉUõ4ÿé¦ã‘užÝë©wÈCãêìÆÙŸürQ§®}^ÙÆŸri¡£QO–MV`{ý¼)ãyUÿžNŸ×‡Aõ¶¨3ûÚi@°R]=ퟹÙ|<»Ý}#0 ›²›üÞî²Nšœ.¯ên©<ª`cãø®‹¯®¡³‡ù§µ;v^]?kšëê\^Ä^cÛò«X?~ st2¾˜Áµù' ³ÿoïÜz#DZ;޼å%ß¡P@°[´I‰ºÐAc¶áöÌ40}ÁtÏ`±³F…’(»ÒªËJUnÏü”ç<äkä5_  @ò•BR”Jª’ªTî²»Ê>3@ÛÖ…"Èsþ?òHš~ž¥"RêÃ~U—KŠ[¢àJ5žÞ轟F3”(NÐúÞ©ÔqêzYxÍ'WC”/ dY+w]áÅx”ø1×?ga2^$Ñ_ô$Rê’Çó4-m]TùflšE¹1†údé"›¦‰dHFùg„K Oò³o¯Ä<¸Ñ7 yg¼ ô/qv•<7€*üD[-á×ñ0ç}A”u Ë;hÚ4“}ÉÍ›“›ôf”Î˽aê'⊇¿šþ¡/šûñW‘óäÝ)š r¥owÉæÌò ݲ:)KËúå½(›ËëÓY˜‡˜BnÆTÙ gÃ¥m庼Ӭ¹›n_äàÂi_¾yž4È⎠_¡ˆãŽ@¡j0ö-f{~Sø"¾pSøÊ{5|áõðE\¯!|±®á iøª{º"&”ž§ßëŽwé² §Û8ë¡¡ðÁEÜ*\ñ¿…[(ý§ñDK¶÷ƳÇÓ.J×U8ÍZ€4niÅÃ,Ý@U˨\Dߥ­‘ÜI›ØiÜWy±µøW‰Æ{ž¯ô³y4)½M7×Z†¬•p[“Õè_‰µyZz^ãJ+áiUÜ¢êK+JgR B&´UBO¡ê‘«ðJ•S ›FQ-ƒÎZ<.#kÝq×½ü¤¦~ŒÏ_†$£¨L|©EZ£rV5YU_Õ"ÍZ4ÂÏZWK¥c´JE•2kUÚÅh¶eø¬©·Bp–êG†¯¶©#êØÇ¿&v5åIvzÍÓè3Oe¹|4Ñi@¡Z #„e›ška{˜D"~þjX ;¦µ°öqÓ8SLV¡ÜòŠÂP}ÃÞóQÇ>ÂvÀYìÙÎãX¡x›.`d ”‡e*Lÿ{s\ïMý8Çò6…¿êܯQlnY=“¥âPİÌ? §‹<þ×ú¯…”œã@¤½iÜ+Ïz<œ/¤þµ§Šë™â¢­r&£jV4òX­ôûóŸûªCÉg=ùªù•Håoõ§éáz/¾3KV¦ÎJO¤ ÞOÝMi½ù´Vû‡ª|(åÒ ®Š{4ƒï§îƒWkÿP•Ï3fÊjw«­šœUé5=“o³4øcÙz?Õ®ØúqÌœg‡v¬n‘ÄôÕ­üeµ~X#_Ö3MW3;︺ơjR«¶Þý¯}¯ — ­Ú&5¹!½Ó=sðõñY¾”`R”kùœ‘HDm[‹°w¼'ìfR)G";­_Géz‹d--‡·}ézËö)èúcÓõ­Ãf£¬·9q‹bdcAÕó1؈ ìz”†1^UÖ׋nôÊ}ôjGì+TZصÚ{Œ÷¿z=¨h2Ü•ªôIÛÐjÆSy„zSŒ†&=Y †Y’¨üáéœ7ZxErë(©ª¢—.&²§öŠBÔïy9•QÏðë Z,6™GwÎzn­&3•aÙ2Xv©Œ,§V׎•²Ö*ÕÖw­”w=½ÜxŸJ¥£©z ª©.?Œ¤ 4Œþ*»Te¦bR‚Rõª­Ú¤Švu ÕŽZõÌ÷9¿ê™¾àúz¿˜h;þ¢—Z‡ê|•u˜Iûô‹EÏâ Û\VjR/©ñà»mÃM-¸Œæ×åCy›îbqÓ ‡õÔú¦yûÙõNSÙ¿k=Iéb•mÙw–ƒ~³Wh¦1Ï>”¯zÞûwî‰c|![>TUO´Y%„9-‹+¦ÁO–0±ƒ#ňºA€¨í«;l£0æVȤy\j7ÌÄTŸ!Du³""Q3DzY!÷v‘‡ÅÓ‡»(ú,œêžÿËåÝC¡å3ÍJß;õdWVov-r"DÃÈA,&EíHƒØ Ýf¦õˆHûðHKöŠ´+·#ÈvéU}”1ü0œWŒöá®_žØNóûbõûŒÜ=ûV¡NíKo¹q6×8Å—ùžç,'u×&p›&z[d„/ìÑOêæ¨V´„À-󸦱0»y\ !ïØfq«ã¤1ÞUÈÕÛïî=óQ’é«õ¯—½s‰Üмç#žôR1_¤ ËÓ…PD®†­ÅHñ©í¦l °MŸ ôhGŬ¶v:OšuêÑs¸«Ì2§¸~÷öâÃ÷ï>êYÙàôF㉃ËiëÆ)ê_jóÌ]ž“ZÎoKK¿»¼;pøÉN…Ïc‹»òÔóc|‹ûÈØ÷1%QÀí–ü<ìô'ôlf.]¢}Ñ5 Væ17¢£uä–O¨¼¿xûêõÛïŽr¾ªÇiZAp[&ó­–ùt«}b´œ8Ý+ÉusCp;_¹Îmëá¦Fr|1ŸçéèêJ¿Ñ²xQÃDÜ·éb2”ŽªòF¬Ê]Eas©•VŽ“heKaZ“ƒN‚êU§ùU_ÒŸjK…4 ù²’ÈåÓ·w—‰x>,®ââââââââ8âUÞÒx÷¸x×p:Ýœ&é>…÷ì•ùŒE`…nøF1¼ ð ð ð ð ð ð ð ðíÀñ­ò‚+À· øV>2§õ¢ü‰û_™æÜç°gšoéãl“E€æšhÎššššššššššš; šó¾Kam®É"@sM4çÍÍÍÍÍÍÍÍÍÍÍÍ9xÀüçJsÄÏZ,i£9ÍÍÍÍÍÍÍÍÍÍÍÍÙìyÏ4Ó’5eZ.-4×Ds6ÐÐÐÐÐÐÐÐÐÐÐÜaМ3°ð3}nŽXksÒ"͵ќ44444444444w4ç ,æ<×· 4=7·´Ð\Íy@s@s@s@s@s@s@s@s@s@s@s‡Asl`3ü\3-i®´Ð\Í1 9 9 9 9 9 9 9 9 9 9 ¹ 9z†É€²gû½9+Ûd ¹5šSæššššššššššš; š³®e?×çæhÖbøBA+Ííþ hhhhhhhhhî°iîÃOçç¯.^ÏÏInmã¹íô²˜’L›f¨½ìË8 %i:Én–Šù"È‘˜.Ô°ëv‚l»¸— ©1£flò¬çúÈc- yà éã'“æ™}S¹kÚ¿èÊvžŸµX>•°/¶£d|)ÚÝsd5bž)1…J¢Ø‰í0pPG Q[8ˆÛ„IÑÄŒqàkQ¶R]]sÀ2%ª®ö™à§öÌx*M¨+z¹÷È–vmòÞƒÚΗ®Ä3ùsaäÁÂÈ0]Läi‚O³lŸ3ß,%þ‹.ú^?Ð(@±·I@Ûr!Ró$à®#kC È Ìý.Ì !Ì !Ì !Ì á™!ì<ƒ× _t€îÅ[ëðE%äüpññâSø½Æ²U» @×½ ë ÑêÀ±‰\îD³W Gä”’’Íï6 ƒ™Ÿmj1øƒ&@Á…?è>:{ËeGå †ª~‰¼@vêY˜PjE‰œÑ0r‹ EQ`;œÅ¶CC·}¯l:¸p Çív}¥ä+ú†Éô†w1‚uBNóNš:f,’Ͱ)õ•^1W„(ÝÀ )öyähj Ù¦u—ðG´Zo•V<ƒu⸇ãZG§´ØLv^QÝÛåDúö®_·Ñ¿ 6gå*i~Ð(RåɿțLiˆ¸Ç-Dc?@, !²åqC9Nhà䥘ÚA+®( ]L¼€PÛwpû¶ƒew•n( "dñ‹˜× };ò|©é­ÀuýÐaaJ}ÎÙ£»¢‡‚=;p=ûk-?˜û±N,g-Í¥à~vv?ë«ÄÄõØÑ9&7ð]ùq‹ÇˆJ7€¤_ È³£1Ž1÷È6ÇÔµŒ{¬PšóÂä¼~ëçôe_îç+7]JR³¾Å½éh›ßBù•!ŽM¥ªõY‘¿´P3çý—ç_ÿ|¡¶IÃðÉ|hV 0£>eØ'ËÓ³±ð}!ÇX(å!¶ôt½,Úî²€»„0 BC*Us,¥±‚Ø•ŒpuøX̹·\5úÎ$³¾ÖgDZëÅXöEB#Á‰EÂÀeÔ#Î"!/j9Øcñ©—E:ÄÚ£1¿;º8Š˜Cr¹ÏÔ E~ÌiÇÐóÁ\lû+K«éªn+Sùû†®LvÚ©w—ÊqÂo¦y?¸ gú–5·ÏÇê7ËWË.£ì“Ù,f×b,R®ê‹ÕmüÌgæ×i:ºMxR®èɉ¼ŸzáFÜÊÎ0Ìf"Ìô•®?ÓÉÕO’ég¡­ö1]ˆþÝÝ2ƒ¸1}ØòÿÔ_®14/0P}"w2‘_¯s_%²¿ùÄ!F1ÿ|w–ðÅD­-¶e¿Ûî ÖÿõëçÍE:–Cg5>SÁFUî*JÉW_DÌɼ4jÔ‡²çñìÓ°\¬Ô9öÒ¬ýúA7ãå!jÎþF¬0“ã2-Q#š!9ŠÅ$2K§gæç°XS-³K§á'ýWÌ“L¬-ÜšæÍùUžz׸è |b=––¦J°=†–n}‡WÙ\ÐÒ«ZzÇ/¥BŽNJ!‰\‡(Š‚¤v—¹–”1¶™ Û¤t×2¶Iéè…×<•búÅO¿EþÁ+kzPÓRÊqûv:ÿvº˜DZ}„ÓHyQYO-B³,Œý×&e§×És„ÓEõ&Óy/½X~ÒoöœþÀfÖQ$°+5>Kó$ß,Õ/¼(F)>q¼ÆwU¨VÚ°²7§éHS?¶4õíã§ÑCéëßΠ”ç «Ïu†œ„óD¥rˆqËdzD¨A¥§Ô)K‚—Ø$9æè=R‰ë CIrYUñ•çéë,fåc1ž¦*ÃÓs=Vß8²݉•7•hV¹Œ¢³å jÃðªv8)ölëW7TÄ+—Í“uúyý³.·ëëÛñIYŸ"'Öã¶dÇC%˜ Ìò7µÇgÜhdù9FµÞ ÷b?÷‚c®ï#Û¢¡íÂ0‘xTÏOi¯94£q(nÃd¡£x4æ€=͆兕·#XŒ’È`›ÙWÞ–|NÆl­L͘-ÕIœòÔú¼—Ù,ÁøŸ¤·Úa¾Íœ¸†wf{aãŽèÞ¢]êÓ ŠJu%Šë+ÛÔ àºU‰âï(Qœ£Ã:9|°yÒÑ—#! ³HŽK1¶ ÛŠu]Ë€’MtÈ™„jðF(ñdHÊ%^ÖÒJÈ=osS– $$$$÷HêhHÊfßõžvq›2`u+}Ð.-ÚÅf»i; ]@º€téòì¥KsX¥x€ >† Êi¦ÒH½4ŸÚ>—­ÙÉ/ ÄbÞÑÍOr+ O8(òqˆ¨ìÿR_Z9Nó؉8 ·>ZÒµ ˜ŸlŸ­““jg ƒÑ„k‡¬3‘ú¤É"œOÓ¾Éc^îI‚—ûó·òšˆöÔÔ1öÝQÏ ‘oÙòŸ³l;:°È…Ɇ¦žÔóµ+Áe%rlyõ‡mU²[CR README for CIFMW Logs

Logs of interest

Generated content of interest

home/zuul/zuul-output/logs/installed-pkgs.log0000644000175000017500000004753215133753431020532 0ustar zuulzuulaardvark-dns-1.17.0-1.el9.x86_64 abattis-cantarell-fonts-0.301-4.el9.noarch acl-2.3.1-4.el9.x86_64 adobe-source-code-pro-fonts-2.030.1.050-12.el9.1.noarch alternatives-1.24-2.el9.x86_64 annobin-12.98-1.el9.x86_64 ansible-core-2.14.18-2.el9.x86_64 apr-1.7.0-12.el9.x86_64 apr-util-1.6.1-23.el9.x86_64 apr-util-bdb-1.6.1-23.el9.x86_64 apr-util-openssl-1.6.1-23.el9.x86_64 attr-2.5.1-3.el9.x86_64 audit-3.1.5-8.el9.x86_64 audit-libs-3.1.5-8.el9.x86_64 authselect-1.2.6-3.el9.x86_64 authselect-compat-1.2.6-3.el9.x86_64 authselect-libs-1.2.6-3.el9.x86_64 basesystem-11-13.el9.noarch bash-5.1.8-9.el9.x86_64 bash-completion-2.11-5.el9.noarch binutils-2.35.2-69.el9.x86_64 binutils-gold-2.35.2-69.el9.x86_64 buildah-1.41.3-1.el9.x86_64 bzip2-1.0.8-10.el9.x86_64 bzip2-libs-1.0.8-10.el9.x86_64 ca-certificates-2025.2.80_v9.0.305-91.el9.noarch c-ares-1.19.1-2.el9.x86_64 centos-gpg-keys-9.0-34.el9.noarch centos-logos-90.9-1.el9.x86_64 centos-stream-release-9.0-34.el9.noarch centos-stream-repos-9.0-34.el9.noarch checkpolicy-3.6-1.el9.x86_64 chrony-4.8-1.el9.x86_64 cloud-init-24.4-8.el9.noarch cloud-utils-growpart-0.33-1.el9.x86_64 cmake-filesystem-3.31.8-3.el9.x86_64 cockpit-bridge-348-1.el9.noarch cockpit-system-348-1.el9.noarch cockpit-ws-348-1.el9.x86_64 cockpit-ws-selinux-348-1.el9.x86_64 conmon-2.1.13-1.el9.x86_64 containers-common-1-134.el9.x86_64 containers-common-extra-1-134.el9.x86_64 container-selinux-2.244.0-1.el9.noarch coreutils-8.32-39.el9.x86_64 coreutils-common-8.32-39.el9.x86_64 cpio-2.13-16.el9.x86_64 cpp-11.5.0-14.el9.x86_64 cracklib-2.9.6-28.el9.x86_64 cracklib-dicts-2.9.6-28.el9.x86_64 createrepo_c-0.20.1-4.el9.x86_64 createrepo_c-libs-0.20.1-4.el9.x86_64 criu-3.19-3.el9.x86_64 criu-libs-3.19-3.el9.x86_64 cronie-1.5.7-14.el9.x86_64 cronie-anacron-1.5.7-14.el9.x86_64 crontabs-1.11-26.20190603git.el9.noarch crun-1.24-1.el9.x86_64 crypto-policies-20251126-1.gite9c4db2.el9.noarch crypto-policies-scripts-20251126-1.gite9c4db2.el9.noarch cryptsetup-libs-2.8.1-2.el9.x86_64 curl-7.76.1-38.el9.x86_64 cyrus-sasl-2.1.27-21.el9.x86_64 cyrus-sasl-devel-2.1.27-21.el9.x86_64 cyrus-sasl-gssapi-2.1.27-21.el9.x86_64 cyrus-sasl-lib-2.1.27-21.el9.x86_64 dbus-1.12.20-8.el9.x86_64 dbus-broker-28-7.el9.x86_64 dbus-common-1.12.20-8.el9.noarch dbus-libs-1.12.20-8.el9.x86_64 dbus-tools-1.12.20-8.el9.x86_64 debugedit-5.0-11.el9.x86_64 dejavu-sans-fonts-2.37-18.el9.noarch desktop-file-utils-0.26-6.el9.x86_64 device-mapper-1.02.206-2.el9.x86_64 device-mapper-libs-1.02.206-2.el9.x86_64 dhcp-client-4.4.2-19.b1.el9.x86_64 dhcp-common-4.4.2-19.b1.el9.noarch diffutils-3.7-12.el9.x86_64 dnf-4.14.0-31.el9.noarch dnf-data-4.14.0-31.el9.noarch dnf-plugins-core-4.3.0-25.el9.noarch dracut-057-102.git20250818.el9.x86_64 dracut-config-generic-057-102.git20250818.el9.x86_64 dracut-network-057-102.git20250818.el9.x86_64 dracut-squash-057-102.git20250818.el9.x86_64 dwz-0.16-1.el9.x86_64 e2fsprogs-1.46.5-8.el9.x86_64 e2fsprogs-libs-1.46.5-8.el9.x86_64 ed-1.14.2-12.el9.x86_64 efi-srpm-macros-6-4.el9.noarch elfutils-0.194-1.el9.x86_64 elfutils-debuginfod-client-0.194-1.el9.x86_64 elfutils-default-yama-scope-0.194-1.el9.noarch elfutils-libelf-0.194-1.el9.x86_64 elfutils-libs-0.194-1.el9.x86_64 emacs-filesystem-27.2-18.el9.noarch enchant-1.6.0-30.el9.x86_64 ethtool-6.15-2.el9.x86_64 expat-2.5.0-6.el9.x86_64 expect-5.45.4-16.el9.x86_64 file-5.39-16.el9.x86_64 file-libs-5.39-16.el9.x86_64 filesystem-3.16-5.el9.x86_64 findutils-4.8.0-7.el9.x86_64 fonts-filesystem-2.0.5-7.el9.1.noarch fonts-srpm-macros-2.0.5-7.el9.1.noarch fuse3-3.10.2-9.el9.x86_64 fuse3-libs-3.10.2-9.el9.x86_64 fuse-common-3.10.2-9.el9.x86_64 fuse-libs-2.9.9-17.el9.x86_64 fuse-overlayfs-1.16-1.el9.x86_64 gawk-5.1.0-6.el9.x86_64 gawk-all-langpacks-5.1.0-6.el9.x86_64 gcc-11.5.0-14.el9.x86_64 gcc-c++-11.5.0-14.el9.x86_64 gcc-plugin-annobin-11.5.0-14.el9.x86_64 gdb-minimal-16.3-2.el9.x86_64 gdbm-libs-1.23-1.el9.x86_64 gdisk-1.0.7-5.el9.x86_64 gdk-pixbuf2-2.42.6-6.el9.x86_64 geolite2-city-20191217-6.el9.noarch geolite2-country-20191217-6.el9.noarch gettext-0.21-8.el9.x86_64 gettext-libs-0.21-8.el9.x86_64 ghc-srpm-macros-1.5.0-6.el9.noarch git-2.47.3-1.el9.x86_64 git-core-2.47.3-1.el9.x86_64 git-core-doc-2.47.3-1.el9.noarch glib2-2.68.4-18.el9.x86_64 glibc-2.34-245.el9.x86_64 glibc-common-2.34-245.el9.x86_64 glibc-devel-2.34-245.el9.x86_64 glibc-gconv-extra-2.34-245.el9.x86_64 glibc-headers-2.34-245.el9.x86_64 glibc-langpack-en-2.34-245.el9.x86_64 glib-networking-2.68.3-3.el9.x86_64 gmp-6.2.0-13.el9.x86_64 gnupg2-2.3.3-5.el9.x86_64 gnutls-3.8.10-2.el9.x86_64 gobject-introspection-1.68.0-11.el9.x86_64 go-srpm-macros-3.8.1-1.el9.noarch gpgme-1.15.1-6.el9.x86_64 gpg-pubkey-8483c65d-5ccc5b19 grep-3.6-5.el9.x86_64 groff-base-1.22.4-10.el9.x86_64 grub2-common-2.06-120.el9.noarch grub2-pc-2.06-120.el9.x86_64 grub2-pc-modules-2.06-120.el9.noarch grub2-tools-2.06-120.el9.x86_64 grub2-tools-minimal-2.06-120.el9.x86_64 grubby-8.40-69.el9.x86_64 gsettings-desktop-schemas-40.0-8.el9.x86_64 gssproxy-0.8.4-7.el9.x86_64 gzip-1.12-1.el9.x86_64 hostname-3.23-6.el9.x86_64 httpd-tools-2.4.62-10.el9.x86_64 hunspell-1.7.0-11.el9.x86_64 hunspell-en-GB-0.20140811.1-20.el9.noarch hunspell-en-US-0.20140811.1-20.el9.noarch hunspell-filesystem-1.7.0-11.el9.x86_64 hwdata-0.348-9.20.el9.noarch ima-evm-utils-1.6.2-2.el9.x86_64 info-6.7-15.el9.x86_64 inih-49-6.el9.x86_64 initscripts-rename-device-10.11.8-4.el9.x86_64 initscripts-service-10.11.8-4.el9.noarch ipcalc-1.0.0-5.el9.x86_64 iproute-6.17.0-1.el9.x86_64 iproute-tc-6.17.0-1.el9.x86_64 iptables-libs-1.8.10-11.el9.x86_64 iptables-nft-1.8.10-11.el9.x86_64 iptables-nft-services-1.8.10-11.el9.noarch iputils-20210202-15.el9.x86_64 irqbalance-1.9.4-5.el9.x86_64 jansson-2.14-1.el9.x86_64 jq-1.6-19.el9.x86_64 json-c-0.14-11.el9.x86_64 json-glib-1.6.6-1.el9.x86_64 kbd-2.4.0-11.el9.x86_64 kbd-legacy-2.4.0-11.el9.noarch kbd-misc-2.4.0-11.el9.noarch kernel-5.14.0-661.el9.x86_64 kernel-core-5.14.0-661.el9.x86_64 kernel-headers-5.14.0-661.el9.x86_64 kernel-modules-5.14.0-661.el9.x86_64 kernel-modules-core-5.14.0-661.el9.x86_64 kernel-srpm-macros-1.0-14.el9.noarch kernel-tools-5.14.0-661.el9.x86_64 kernel-tools-libs-5.14.0-661.el9.x86_64 kexec-tools-2.0.29-14.el9.x86_64 keyutils-1.6.3-1.el9.x86_64 keyutils-libs-1.6.3-1.el9.x86_64 kmod-28-11.el9.x86_64 kmod-libs-28-11.el9.x86_64 kpartx-0.8.7-42.el9.x86_64 krb5-libs-1.21.1-8.el9.x86_64 langpacks-core-en_GB-3.0-16.el9.noarch langpacks-core-font-en-3.0-16.el9.noarch langpacks-en_GB-3.0-16.el9.noarch less-590-6.el9.x86_64 libacl-2.3.1-4.el9.x86_64 libappstream-glib-0.7.18-5.el9.x86_64 libarchive-3.5.3-6.el9.x86_64 libassuan-2.5.5-3.el9.x86_64 libattr-2.5.1-3.el9.x86_64 libbasicobjects-0.1.1-53.el9.x86_64 libblkid-2.37.4-21.el9.x86_64 libbpf-1.5.0-3.el9.x86_64 libbrotli-1.0.9-7.el9.x86_64 libburn-1.5.4-5.el9.x86_64 libcap-2.48-10.el9.x86_64 libcap-ng-0.8.2-7.el9.x86_64 libcbor-0.7.0-5.el9.x86_64 libcollection-0.7.0-53.el9.x86_64 libcom_err-1.46.5-8.el9.x86_64 libcomps-0.1.18-1.el9.x86_64 libcurl-7.76.1-38.el9.x86_64 libdaemon-0.14-23.el9.x86_64 libdb-5.3.28-57.el9.x86_64 libdhash-0.5.0-53.el9.x86_64 libdnf-0.69.0-16.el9.x86_64 libeconf-0.4.1-5.el9.x86_64 libedit-3.1-38.20210216cvs.el9.x86_64 libestr-0.1.11-4.el9.x86_64 libev-4.33-6.el9.x86_64 libevent-2.1.12-8.el9.x86_64 libfastjson-0.99.9-5.el9.x86_64 libfdisk-2.37.4-21.el9.x86_64 libffi-3.4.2-8.el9.x86_64 libffi-devel-3.4.2-8.el9.x86_64 libfido2-1.13.0-2.el9.x86_64 libgcc-11.5.0-14.el9.x86_64 libgcrypt-1.10.0-11.el9.x86_64 libgomp-11.5.0-14.el9.x86_64 libgpg-error-1.42-5.el9.x86_64 libgpg-error-devel-1.42-5.el9.x86_64 libibverbs-57.0-2.el9.x86_64 libicu-67.1-10.el9.x86_64 libidn2-2.3.0-7.el9.x86_64 libini_config-1.3.1-53.el9.x86_64 libisoburn-1.5.4-5.el9.x86_64 libisofs-1.5.4-4.el9.x86_64 libjpeg-turbo-2.0.90-7.el9.x86_64 libkcapi-1.4.0-2.el9.x86_64 libkcapi-hmaccalc-1.4.0-2.el9.x86_64 libksba-1.5.1-7.el9.x86_64 libldb-4.23.4-2.el9.x86_64 libmaxminddb-1.5.2-4.el9.x86_64 libmnl-1.0.4-16.el9.x86_64 libmodulemd-2.13.0-2.el9.x86_64 libmount-2.37.4-21.el9.x86_64 libmpc-1.2.1-4.el9.x86_64 libndp-1.9-1.el9.x86_64 libnet-1.2-7.el9.x86_64 libnetfilter_conntrack-1.0.9-1.el9.x86_64 libnfnetlink-1.0.1-23.el9.x86_64 libnfsidmap-2.5.4-41.el9.x86_64 libnftnl-1.2.6-4.el9.x86_64 libnghttp2-1.43.0-6.el9.x86_64 libnl3-3.11.0-1.el9.x86_64 libnl3-cli-3.11.0-1.el9.x86_64 libosinfo-1.10.0-1.el9.x86_64 libpath_utils-0.2.1-53.el9.x86_64 libpcap-1.10.0-4.el9.x86_64 libpipeline-1.5.3-4.el9.x86_64 libpkgconf-1.7.3-10.el9.x86_64 libpng-1.6.37-12.el9.x86_64 libproxy-0.4.15-35.el9.x86_64 libproxy-webkitgtk4-0.4.15-35.el9.x86_64 libpsl-0.21.1-5.el9.x86_64 libpwquality-1.4.4-8.el9.x86_64 libref_array-0.1.5-53.el9.x86_64 librepo-1.19.0-1.el9.x86_64 libreport-filesystem-2.15.2-6.el9.noarch libseccomp-2.5.2-2.el9.x86_64 libselinux-3.6-3.el9.x86_64 libselinux-utils-3.6-3.el9.x86_64 libsemanage-3.6-5.el9.x86_64 libsepol-3.6-3.el9.x86_64 libsigsegv-2.13-4.el9.x86_64 libslirp-4.4.0-8.el9.x86_64 libsmartcols-2.37.4-21.el9.x86_64 libsolv-0.7.24-3.el9.x86_64 libsoup-2.72.0-10.el9.x86_64 libss-1.46.5-8.el9.x86_64 libssh-0.10.4-17.el9.x86_64 libssh-config-0.10.4-17.el9.noarch libsss_certmap-2.9.7-5.el9.x86_64 libsss_idmap-2.9.7-5.el9.x86_64 libsss_nss_idmap-2.9.7-5.el9.x86_64 libsss_sudo-2.9.7-5.el9.x86_64 libstdc++-11.5.0-14.el9.x86_64 libstdc++-devel-11.5.0-14.el9.x86_64 libstemmer-0-18.585svn.el9.x86_64 libsysfs-2.1.1-11.el9.x86_64 libtalloc-2.4.3-1.el9.x86_64 libtasn1-4.16.0-9.el9.x86_64 libtdb-1.4.14-1.el9.x86_64 libteam-1.31-16.el9.x86_64 libtevent-0.17.1-1.el9.x86_64 libtirpc-1.3.3-9.el9.x86_64 libtool-ltdl-2.4.6-46.el9.x86_64 libunistring-0.9.10-15.el9.x86_64 liburing-2.12-1.el9.x86_64 libuser-0.63-17.el9.x86_64 libutempter-1.2.1-6.el9.x86_64 libuuid-2.37.4-21.el9.x86_64 libverto-0.3.2-3.el9.x86_64 libverto-libev-0.3.2-3.el9.x86_64 libvirt-client-11.10.0-2.el9.x86_64 libvirt-libs-11.10.0-2.el9.x86_64 libxcrypt-4.4.18-3.el9.x86_64 libxcrypt-compat-4.4.18-3.el9.x86_64 libxcrypt-devel-4.4.18-3.el9.x86_64 libxml2-2.9.13-14.el9.x86_64 libxml2-devel-2.9.13-14.el9.x86_64 libxslt-1.1.34-12.el9.x86_64 libxslt-devel-1.1.34-12.el9.x86_64 libyaml-0.2.5-7.el9.x86_64 libzstd-1.5.5-1.el9.x86_64 llvm-filesystem-21.1.7-1.el9.x86_64 llvm-libs-21.1.7-1.el9.x86_64 lmdb-libs-0.9.29-3.el9.x86_64 logrotate-3.18.0-12.el9.x86_64 lshw-B.02.20-4.el9.x86_64 lsscsi-0.32-6.el9.x86_64 lua-libs-5.4.4-4.el9.x86_64 lua-srpm-macros-1-6.el9.noarch lz4-libs-1.9.3-5.el9.x86_64 lzo-2.10-7.el9.x86_64 make-4.3-8.el9.x86_64 man-db-2.9.3-9.el9.x86_64 microcode_ctl-20251111-1.el9.noarch mpfr-4.1.0-8.el9.x86_64 ncurses-6.2-12.20210508.el9.x86_64 ncurses-base-6.2-12.20210508.el9.noarch ncurses-c++-libs-6.2-12.20210508.el9.x86_64 ncurses-devel-6.2-12.20210508.el9.x86_64 ncurses-libs-6.2-12.20210508.el9.x86_64 netavark-1.16.0-1.el9.x86_64 nettle-3.10.1-1.el9.x86_64 NetworkManager-1.54.3-2.el9.x86_64 NetworkManager-libnm-1.54.3-2.el9.x86_64 NetworkManager-team-1.54.3-2.el9.x86_64 NetworkManager-tui-1.54.3-2.el9.x86_64 newt-0.52.21-11.el9.x86_64 nfs-utils-2.5.4-41.el9.x86_64 nftables-1.0.9-6.el9.x86_64 npth-1.6-8.el9.x86_64 numactl-libs-2.0.19-3.el9.x86_64 ocaml-srpm-macros-6-6.el9.noarch oddjob-0.34.7-7.el9.x86_64 oddjob-mkhomedir-0.34.7-7.el9.x86_64 oniguruma-6.9.6-1.el9.6.x86_64 openblas-srpm-macros-2-11.el9.noarch openldap-2.6.8-4.el9.x86_64 openldap-devel-2.6.8-4.el9.x86_64 openssh-9.9p1-3.el9.x86_64 openssh-clients-9.9p1-3.el9.x86_64 openssh-server-9.9p1-3.el9.x86_64 openssl-3.5.1-6.el9.x86_64 openssl-devel-3.5.1-6.el9.x86_64 openssl-fips-provider-3.5.1-6.el9.x86_64 openssl-libs-3.5.1-6.el9.x86_64 osinfo-db-20250606-1.el9.noarch osinfo-db-tools-1.10.0-1.el9.x86_64 os-prober-1.77-12.el9.x86_64 p11-kit-0.25.10-1.el9.x86_64 p11-kit-trust-0.25.10-1.el9.x86_64 pam-1.5.1-28.el9.x86_64 parted-3.5-3.el9.x86_64 passt-0^20251210.gd04c480-2.el9.x86_64 passt-selinux-0^20251210.gd04c480-2.el9.noarch passwd-0.80-12.el9.x86_64 patch-2.7.6-16.el9.x86_64 pciutils-libs-3.7.0-7.el9.x86_64 pcre2-10.40-6.el9.x86_64 pcre2-syntax-10.40-6.el9.noarch pcre-8.44-4.el9.x86_64 perl-AutoLoader-5.74-483.el9.noarch perl-B-1.80-483.el9.x86_64 perl-base-2.27-483.el9.noarch perl-Carp-1.50-460.el9.noarch perl-Class-Struct-0.66-483.el9.noarch perl-constant-1.33-461.el9.noarch perl-Data-Dumper-2.174-462.el9.x86_64 perl-Digest-1.19-4.el9.noarch perl-Digest-MD5-2.58-4.el9.x86_64 perl-DynaLoader-1.47-483.el9.x86_64 perl-Encode-3.08-462.el9.x86_64 perl-Errno-1.30-483.el9.x86_64 perl-Error-0.17029-7.el9.noarch perl-Exporter-5.74-461.el9.noarch perl-Fcntl-1.13-483.el9.x86_64 perl-File-Basename-2.85-483.el9.noarch perl-File-Find-1.37-483.el9.noarch perl-FileHandle-2.03-483.el9.noarch perl-File-Path-2.18-4.el9.noarch perl-File-stat-1.09-483.el9.noarch perl-File-Temp-0.231.100-4.el9.noarch perl-Getopt-Long-2.52-4.el9.noarch perl-Getopt-Std-1.12-483.el9.noarch perl-Git-2.47.3-1.el9.noarch perl-HTTP-Tiny-0.076-462.el9.noarch perl-if-0.60.800-483.el9.noarch perl-interpreter-5.32.1-483.el9.x86_64 perl-IO-1.43-483.el9.x86_64 perl-IO-Socket-IP-0.41-5.el9.noarch perl-IO-Socket-SSL-2.073-2.el9.noarch perl-IPC-Open3-1.21-483.el9.noarch perl-lib-0.65-483.el9.x86_64 perl-libnet-3.13-4.el9.noarch perl-libs-5.32.1-483.el9.x86_64 perl-MIME-Base64-3.16-4.el9.x86_64 perl-Mozilla-CA-20200520-6.el9.noarch perl-mro-1.23-483.el9.x86_64 perl-NDBM_File-1.15-483.el9.x86_64 perl-Net-SSLeay-1.94-3.el9.x86_64 perl-overload-1.31-483.el9.noarch perl-overloading-0.02-483.el9.noarch perl-parent-0.238-460.el9.noarch perl-PathTools-3.78-461.el9.x86_64 perl-Pod-Escapes-1.07-460.el9.noarch perl-podlators-4.14-460.el9.noarch perl-Pod-Perldoc-3.28.01-461.el9.noarch perl-Pod-Simple-3.42-4.el9.noarch perl-Pod-Usage-2.01-4.el9.noarch perl-POSIX-1.94-483.el9.x86_64 perl-Scalar-List-Utils-1.56-462.el9.x86_64 perl-SelectSaver-1.02-483.el9.noarch perl-Socket-2.031-4.el9.x86_64 perl-srpm-macros-1-41.el9.noarch perl-Storable-3.21-460.el9.x86_64 perl-subs-1.03-483.el9.noarch perl-Symbol-1.08-483.el9.noarch perl-Term-ANSIColor-5.01-461.el9.noarch perl-Term-Cap-1.17-460.el9.noarch perl-TermReadKey-2.38-11.el9.x86_64 perl-Text-ParseWords-3.30-460.el9.noarch perl-Text-Tabs+Wrap-2013.0523-460.el9.noarch perl-Time-Local-1.300-7.el9.noarch perl-URI-5.09-3.el9.noarch perl-vars-1.05-483.el9.noarch pigz-2.5-4.el9.x86_64 pkgconf-1.7.3-10.el9.x86_64 pkgconf-m4-1.7.3-10.el9.noarch pkgconf-pkg-config-1.7.3-10.el9.x86_64 podman-5.6.0-2.el9.x86_64 policycoreutils-3.6-4.el9.x86_64 policycoreutils-python-utils-3.6-4.el9.noarch polkit-0.117-14.el9.x86_64 polkit-libs-0.117-14.el9.x86_64 polkit-pkla-compat-0.1-21.el9.x86_64 popt-1.18-8.el9.x86_64 prefixdevname-0.1.0-8.el9.x86_64 procps-ng-3.3.17-14.el9.x86_64 protobuf-c-1.3.3-13.el9.x86_64 psmisc-23.4-3.el9.x86_64 publicsuffix-list-dafsa-20210518-3.el9.noarch pyproject-srpm-macros-1.18.5-1.el9.noarch python3-3.9.25-3.el9.x86_64 python3-argcomplete-1.12.0-5.el9.noarch python3-attrs-20.3.0-7.el9.noarch python3-audit-3.1.5-8.el9.x86_64 python3-babel-2.9.1-2.el9.noarch python3-cffi-1.14.5-5.el9.x86_64 python3-chardet-4.0.0-5.el9.noarch python3-configobj-5.0.6-25.el9.noarch python3-cryptography-36.0.1-5.el9.x86_64 python3-dasbus-1.7-1.el9.noarch python3-dateutil-2.9.0.post0-1.el9.noarch python3-dbus-1.2.18-2.el9.x86_64 python3-devel-3.9.25-3.el9.x86_64 python3-distro-1.5.0-7.el9.noarch python3-dnf-4.14.0-31.el9.noarch python3-dnf-plugins-core-4.3.0-25.el9.noarch python3-enchant-3.2.0-5.el9.noarch python3-file-magic-5.39-16.el9.noarch python3-gobject-base-3.40.1-6.el9.x86_64 python3-gobject-base-noarch-3.40.1-6.el9.noarch python3-gpg-1.15.1-6.el9.x86_64 python3-hawkey-0.69.0-16.el9.x86_64 python3-idna-2.10-7.el9.1.noarch python3-jinja2-2.11.3-8.el9.noarch python3-jmespath-1.0.1-1.el9.noarch python3-jsonpatch-1.21-16.el9.noarch python3-jsonpointer-2.0-4.el9.noarch python3-jsonschema-3.2.0-13.el9.noarch python3-libcomps-0.1.18-1.el9.x86_64 python3-libdnf-0.69.0-16.el9.x86_64 python3-libs-3.9.25-3.el9.x86_64 python3-libselinux-3.6-3.el9.x86_64 python3-libsemanage-3.6-5.el9.x86_64 python3-libvirt-11.10.0-1.el9.x86_64 python3-libxml2-2.9.13-14.el9.x86_64 python3-lxml-4.6.5-3.el9.x86_64 python3-markupsafe-1.1.1-12.el9.x86_64 python3-netaddr-0.10.1-3.el9.noarch python3-netifaces-0.10.6-15.el9.x86_64 python3-oauthlib-3.1.1-5.el9.noarch python3-packaging-20.9-5.el9.noarch python3-pexpect-4.8.0-7.el9.noarch python3-pip-21.3.1-1.el9.noarch python3-pip-wheel-21.3.1-1.el9.noarch python3-ply-3.11-14.el9.noarch python3-policycoreutils-3.6-4.el9.noarch python3-prettytable-0.7.2-27.el9.noarch python3-ptyprocess-0.6.0-12.el9.noarch python3-pycparser-2.20-6.el9.noarch python3-pyparsing-2.4.7-9.el9.noarch python3-pyrsistent-0.17.3-8.el9.x86_64 python3-pyserial-3.4-12.el9.noarch python3-pysocks-1.7.1-12.el9.noarch python3-pytz-2021.1-5.el9.noarch python3-pyyaml-5.4.1-6.el9.x86_64 python3-requests-2.25.1-10.el9.noarch python3-resolvelib-0.5.4-5.el9.noarch python3-rpm-4.16.1.3-40.el9.x86_64 python3-rpm-generators-12-9.el9.noarch python3-rpm-macros-3.9-54.el9.noarch python3-setools-4.4.4-1.el9.x86_64 python3-setuptools-53.0.0-15.el9.noarch python3-setuptools-wheel-53.0.0-15.el9.noarch python3-six-1.15.0-9.el9.noarch python3-systemd-234-19.el9.x86_64 python3-urllib3-1.26.5-6.el9.noarch python-rpm-macros-3.9-54.el9.noarch python-srpm-macros-3.9-54.el9.noarch python-unversioned-command-3.9.25-3.el9.noarch qemu-guest-agent-10.1.0-10.el9.x86_64 qt5-srpm-macros-5.15.9-1.el9.noarch quota-4.09-4.el9.x86_64 quota-nls-4.09-4.el9.noarch readline-8.1-4.el9.x86_64 readline-devel-8.1-4.el9.x86_64 redhat-rpm-config-210-1.el9.noarch rootfiles-8.1-35.el9.noarch rpcbind-1.2.6-7.el9.x86_64 rpm-4.16.1.3-40.el9.x86_64 rpm-build-4.16.1.3-40.el9.x86_64 rpm-build-libs-4.16.1.3-40.el9.x86_64 rpm-libs-4.16.1.3-40.el9.x86_64 rpmlint-1.11-19.el9.noarch rpm-plugin-audit-4.16.1.3-40.el9.x86_64 rpm-plugin-selinux-4.16.1.3-40.el9.x86_64 rpm-plugin-systemd-inhibit-4.16.1.3-40.el9.x86_64 rpm-sign-4.16.1.3-40.el9.x86_64 rpm-sign-libs-4.16.1.3-40.el9.x86_64 rsync-3.2.5-4.el9.x86_64 rsyslog-8.2510.0-2.el9.x86_64 rsyslog-logrotate-8.2510.0-2.el9.x86_64 ruby-3.0.7-165.el9.x86_64 ruby-default-gems-3.0.7-165.el9.noarch ruby-devel-3.0.7-165.el9.x86_64 rubygem-bigdecimal-3.0.0-165.el9.x86_64 rubygem-bundler-2.2.33-165.el9.noarch rubygem-io-console-0.5.7-165.el9.x86_64 rubygem-json-2.5.1-165.el9.x86_64 rubygem-psych-3.3.2-165.el9.x86_64 rubygem-rdoc-6.3.4.1-165.el9.noarch rubygems-3.2.33-165.el9.noarch ruby-libs-3.0.7-165.el9.x86_64 rust-srpm-macros-17-4.el9.noarch sed-4.8-9.el9.x86_64 selinux-policy-38.1.71-1.el9.noarch selinux-policy-targeted-38.1.71-1.el9.noarch setroubleshoot-plugins-3.3.14-4.el9.noarch setroubleshoot-server-3.3.35-2.el9.x86_64 setup-2.13.7-10.el9.noarch sg3_utils-1.47-10.el9.x86_64 sg3_utils-libs-1.47-10.el9.x86_64 shadow-utils-4.9-16.el9.x86_64 shadow-utils-subid-4.9-16.el9.x86_64 shared-mime-info-2.1-5.el9.x86_64 skopeo-1.20.0-2.el9.x86_64 slang-2.3.2-11.el9.x86_64 slirp4netns-1.3.3-1.el9.x86_64 snappy-1.1.8-8.el9.x86_64 sos-4.10.1-2.el9.noarch sqlite-3.34.1-9.el9.x86_64 sqlite-libs-3.34.1-9.el9.x86_64 squashfs-tools-4.4-10.git1.el9.x86_64 sscg-4.0.3-2.el9.x86_64 sshpass-1.09-4.el9.x86_64 sssd-client-2.9.7-5.el9.x86_64 sssd-common-2.9.7-5.el9.x86_64 sssd-kcm-2.9.7-5.el9.x86_64 sssd-nfs-idmap-2.9.7-5.el9.x86_64 sudo-1.9.5p2-13.el9.x86_64 systemd-252-64.el9.x86_64 systemd-devel-252-64.el9.x86_64 systemd-libs-252-64.el9.x86_64 systemd-pam-252-64.el9.x86_64 systemd-rpm-macros-252-64.el9.noarch systemd-udev-252-64.el9.x86_64 tar-1.34-9.el9.x86_64 tcl-8.6.10-7.el9.x86_64 tcpdump-4.99.0-9.el9.x86_64 teamd-1.31-16.el9.x86_64 time-1.9-18.el9.x86_64 tmux-3.2a-5.el9.x86_64 tpm2-tss-3.2.3-1.el9.x86_64 traceroute-2.1.1-1.el9.x86_64 tzdata-2025c-1.el9.noarch unzip-6.0-59.el9.x86_64 userspace-rcu-0.12.1-6.el9.x86_64 util-linux-2.37.4-21.el9.x86_64 util-linux-core-2.37.4-21.el9.x86_64 vim-minimal-8.2.2637-23.el9.x86_64 virt-install-5.0.0-1.el9.noarch virt-manager-common-5.0.0-1.el9.noarch webkit2gtk3-jsc-2.50.4-1.el9.x86_64 wget-1.21.1-8.el9.x86_64 which-2.21-30.el9.x86_64 xfsprogs-6.4.0-7.el9.x86_64 xmlstarlet-1.6.1-20.el9.x86_64 xorriso-1.5.4-5.el9.x86_64 xz-5.2.5-8.el9.x86_64 xz-devel-5.2.5-8.el9.x86_64 xz-libs-5.2.5-8.el9.x86_64 yajl-2.1.0-25.el9.x86_64 yum-4.14.0-31.el9.noarch yum-utils-4.3.0-25.el9.noarch zip-3.0-35.el9.x86_64 zlib-1.2.11-41.el9.x86_64 zlib-devel-1.2.11-41.el9.x86_64 zstd-1.5.5-1.el9.x86_64 home/zuul/zuul-output/logs/python.log0000644000175000017500000000520215133753432017117 0ustar zuulzuulPython 3.9.25 pip 21.3.1 from /usr/lib/python3.9/site-packages/pip (python 3.9) ansible [core 2.15.13] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/zuul/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /home/zuul/.local/lib/python3.9/site-packages/ansible ansible collection location = /home/zuul/.ansible/collections:/usr/share/ansible/collections executable location = /home/zuul/.local/bin/ansible python version = 3.9.25 (main, Jan 14 2026, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-14)] (/usr/bin/python3) jinja version = 3.1.6 libyaml = True ansible-core==2.15.13 argcomplete==1.12.0 attrs==25.4.0 autopage==0.5.2 Babel==2.9.1 certifi==2026.1.4 cffi==2.0.0 chardet==4.0.0 charset-normalizer==3.4.4 cliff==4.9.1 cloud-init==24.4 cmd2==2.7.0 cockpit @ file:///builddir/build/BUILD/cockpit-348/tmp/wheel/cockpit-348-py3-none-any.whl configobj==5.0.6 cryptography==43.0.3 dasbus==1.7 dbus-python==1.2.18 debtcollector==3.0.0 decorator==5.2.1 distro==1.5.0 dogpile.cache==1.4.1 durationpy==0.10 file-magic==0.4.0 google-auth==2.47.0 gpg==1.15.1 idna==2.10 importlib-resources==5.0.7 importlib_metadata==8.7.1 iso8601==2.1.0 Jinja2==3.1.6 jmespath==1.0.1 jsonpatch==1.21 jsonpointer==2.0 jsonschema==4.23.0 jsonschema-specifications==2025.9.1 keystoneauth1==5.11.1 kubernetes==31.0.0 kubernetes-validate==1.31.0 libcomps==0.1.18 libvirt-python==11.10.0 lxml==4.6.5 markdown-it-py==3.0.0 MarkupSafe==3.0.3 mdurl==0.1.2 msgpack==1.1.2 netaddr==1.3.0 netifaces==0.10.6 oauthlib==3.2.2 openstacksdk==4.1.0 os-service-types==1.7.0 osc-lib==4.0.2 oslo.config==10.0.0 oslo.i18n==6.6.0 oslo.serialization==5.8.0 oslo.utils==9.1.0 packaging==20.9 pbr==7.0.3 pexpect==4.8.0 platformdirs==4.4.0 ply==3.11 prettytable==0.7.2 psutil==7.2.1 ptyprocess==0.6.0 pyasn1==0.6.2 pyasn1_modules==0.4.2 pycparser==2.23 pyenchant==3.2.0 Pygments==2.19.2 PyGObject==3.40.1 pyOpenSSL==24.2.1 pyparsing==2.4.7 pyperclip==1.11.0 pyrsistent==0.17.3 pyserial==3.4 PySocks==1.7.1 python-cinderclient==9.7.0 python-dateutil==2.9.0.post0 python-keystoneclient==5.6.0 python-openstackclient==8.0.0 pytz==2021.1 PyYAML==5.4.1 referencing==0.36.2 requests==2.32.5 requests-oauthlib==2.0.0 requestsexceptions==1.4.0 resolvelib==0.5.4 rfc3986==2.0.0 rich==14.2.0 rich-argparse==1.7.2 rpds-py==0.27.1 rpm==4.16.1.3 rsa==4.9.1 selinux==3.6 sepolicy==3.6 setools==4.4.4 setroubleshoot @ file:///builddir/build/BUILD/setroubleshoot-3.3.35/src six==1.15.0 sos==4.10.1 stevedore==5.5.0 systemd-python==234 typing_extensions==4.15.0 tzdata==2025.3 urllib3==1.26.5 wcwidth==0.2.14 websocket-client==1.9.0 wrapt==2.0.1 zipp==3.23.0 home/zuul/zuul-output/logs/dmesg.log0000644000175000017500000014714315133753432016710 0ustar zuulzuul[Tue Jan 20 16:23:19 2026] Linux version 5.14.0-661.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Fri Jan 16 09:19:22 UTC 2026 [Tue Jan 20 16:23:19 2026] The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. [Tue Jan 20 16:23:19 2026] Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M [Tue Jan 20 16:23:19 2026] BIOS-provided physical RAM map: [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved [Tue Jan 20 16:23:19 2026] BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable [Tue Jan 20 16:23:19 2026] NX (Execute Disable) protection: active [Tue Jan 20 16:23:19 2026] APIC: Static calls initialized [Tue Jan 20 16:23:19 2026] SMBIOS 2.8 present. [Tue Jan 20 16:23:19 2026] DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 [Tue Jan 20 16:23:19 2026] Hypervisor detected: KVM [Tue Jan 20 16:23:19 2026] kvm-clock: Using msrs 4b564d01 and 4b564d00 [Tue Jan 20 16:23:19 2026] kvm-clock: using sched offset of 4021641447 cycles [Tue Jan 20 16:23:19 2026] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [Tue Jan 20 16:23:19 2026] tsc: Detected 2800.000 MHz processor [Tue Jan 20 16:23:19 2026] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved [Tue Jan 20 16:23:19 2026] e820: remove [mem 0x000a0000-0x000fffff] usable [Tue Jan 20 16:23:19 2026] last_pfn = 0x140000 max_arch_pfn = 0x400000000 [Tue Jan 20 16:23:19 2026] MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs [Tue Jan 20 16:23:19 2026] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [Tue Jan 20 16:23:19 2026] last_pfn = 0xbffdb max_arch_pfn = 0x400000000 [Tue Jan 20 16:23:19 2026] found SMP MP-table at [mem 0x000f5b60-0x000f5b6f] [Tue Jan 20 16:23:19 2026] Using GB pages for direct mapping [Tue Jan 20 16:23:19 2026] RAMDISK: [mem 0x2d426000-0x32a0afff] [Tue Jan 20 16:23:19 2026] ACPI: Early table checksum verification disabled [Tue Jan 20 16:23:19 2026] ACPI: RSDP 0x00000000000F5910 000014 (v00 BOCHS ) [Tue Jan 20 16:23:19 2026] ACPI: RSDT 0x00000000BFFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) [Tue Jan 20 16:23:19 2026] ACPI: FACP 0x00000000BFFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) [Tue Jan 20 16:23:19 2026] ACPI: DSDT 0x00000000BFFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) [Tue Jan 20 16:23:19 2026] ACPI: FACS 0x00000000BFFE0000 000040 [Tue Jan 20 16:23:19 2026] ACPI: APIC 0x00000000BFFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) [Tue Jan 20 16:23:19 2026] ACPI: WAET 0x00000000BFFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) [Tue Jan 20 16:23:19 2026] ACPI: Reserving FACP table memory at [mem 0xbffe172c-0xbffe179f] [Tue Jan 20 16:23:19 2026] ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe172b] [Tue Jan 20 16:23:19 2026] ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] [Tue Jan 20 16:23:19 2026] ACPI: Reserving APIC table memory at [mem 0xbffe17a0-0xbffe181f] [Tue Jan 20 16:23:19 2026] ACPI: Reserving WAET table memory at [mem 0xbffe1820-0xbffe1847] [Tue Jan 20 16:23:19 2026] No NUMA configuration found [Tue Jan 20 16:23:19 2026] Faking a node at [mem 0x0000000000000000-0x000000013fffffff] [Tue Jan 20 16:23:19 2026] NODE_DATA(0) allocated [mem 0x13ffd3000-0x13fffdfff] [Tue Jan 20 16:23:19 2026] crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) [Tue Jan 20 16:23:19 2026] Zone ranges: [Tue Jan 20 16:23:19 2026] DMA [mem 0x0000000000001000-0x0000000000ffffff] [Tue Jan 20 16:23:19 2026] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [Tue Jan 20 16:23:19 2026] Normal [mem 0x0000000100000000-0x000000013fffffff] [Tue Jan 20 16:23:19 2026] Device empty [Tue Jan 20 16:23:19 2026] Movable zone start for each node [Tue Jan 20 16:23:19 2026] Early memory node ranges [Tue Jan 20 16:23:19 2026] node 0: [mem 0x0000000000001000-0x000000000009efff] [Tue Jan 20 16:23:19 2026] node 0: [mem 0x0000000000100000-0x00000000bffdafff] [Tue Jan 20 16:23:19 2026] node 0: [mem 0x0000000100000000-0x000000013fffffff] [Tue Jan 20 16:23:19 2026] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [Tue Jan 20 16:23:19 2026] On node 0, zone DMA: 1 pages in unavailable ranges [Tue Jan 20 16:23:19 2026] On node 0, zone DMA: 97 pages in unavailable ranges [Tue Jan 20 16:23:19 2026] On node 0, zone Normal: 37 pages in unavailable ranges [Tue Jan 20 16:23:19 2026] ACPI: PM-Timer IO Port: 0x608 [Tue Jan 20 16:23:19 2026] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [Tue Jan 20 16:23:19 2026] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [Tue Jan 20 16:23:19 2026] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [Tue Jan 20 16:23:19 2026] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [Tue Jan 20 16:23:19 2026] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [Tue Jan 20 16:23:19 2026] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [Tue Jan 20 16:23:19 2026] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [Tue Jan 20 16:23:19 2026] ACPI: Using ACPI (MADT) for SMP configuration information [Tue Jan 20 16:23:19 2026] TSC deadline timer available [Tue Jan 20 16:23:19 2026] CPU topo: Max. logical packages: 2 [Tue Jan 20 16:23:19 2026] CPU topo: Max. logical dies: 2 [Tue Jan 20 16:23:19 2026] CPU topo: Max. dies per package: 1 [Tue Jan 20 16:23:19 2026] CPU topo: Max. threads per core: 1 [Tue Jan 20 16:23:19 2026] CPU topo: Num. cores per package: 1 [Tue Jan 20 16:23:19 2026] CPU topo: Num. threads per package: 1 [Tue Jan 20 16:23:19 2026] CPU topo: Allowing 2 present CPUs plus 0 hotplug CPUs [Tue Jan 20 16:23:19 2026] kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] [Tue Jan 20 16:23:19 2026] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] [Tue Jan 20 16:23:19 2026] [mem 0xc0000000-0xfeffbfff] available for PCI devices [Tue Jan 20 16:23:19 2026] Booting paravirtualized kernel on KVM [Tue Jan 20 16:23:19 2026] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [Tue Jan 20 16:23:19 2026] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 [Tue Jan 20 16:23:19 2026] percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u1048576 [Tue Jan 20 16:23:19 2026] pcpu-alloc: s225280 r8192 d28672 u1048576 alloc=1*2097152 [Tue Jan 20 16:23:19 2026] pcpu-alloc: [0] 0 1 [Tue Jan 20 16:23:19 2026] kvm-guest: PV spinlocks disabled, no host support [Tue Jan 20 16:23:19 2026] Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 root=UUID=22ac9141-3960-4912-b20e-19fc8a328d40 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M [Tue Jan 20 16:23:19 2026] Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64", will be passed to user space. [Tue Jan 20 16:23:19 2026] random: crng init done [Tue Jan 20 16:23:19 2026] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) [Tue Jan 20 16:23:19 2026] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [Tue Jan 20 16:23:19 2026] Fallback order for Node 0: 0 [Tue Jan 20 16:23:19 2026] Built 1 zonelists, mobility grouping on. Total pages: 1031899 [Tue Jan 20 16:23:19 2026] Policy zone: Normal [Tue Jan 20 16:23:19 2026] mem auto-init: stack:off, heap alloc:off, heap free:off [Tue Jan 20 16:23:19 2026] software IO TLB: area num 2. [Tue Jan 20 16:23:19 2026] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [Tue Jan 20 16:23:19 2026] ftrace: allocating 49417 entries in 194 pages [Tue Jan 20 16:23:19 2026] ftrace: allocated 194 pages with 3 groups [Tue Jan 20 16:23:19 2026] Dynamic Preempt: voluntary [Tue Jan 20 16:23:19 2026] rcu: Preemptible hierarchical RCU implementation. [Tue Jan 20 16:23:19 2026] rcu: RCU event tracing is enabled. [Tue Jan 20 16:23:19 2026] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=2. [Tue Jan 20 16:23:19 2026] Trampoline variant of Tasks RCU enabled. [Tue Jan 20 16:23:19 2026] Rude variant of Tasks RCU enabled. [Tue Jan 20 16:23:19 2026] Tracing variant of Tasks RCU enabled. [Tue Jan 20 16:23:19 2026] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [Tue Jan 20 16:23:19 2026] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [Tue Jan 20 16:23:19 2026] RCU Tasks: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. [Tue Jan 20 16:23:19 2026] RCU Tasks Rude: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. [Tue Jan 20 16:23:19 2026] RCU Tasks Trace: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. [Tue Jan 20 16:23:19 2026] NR_IRQS: 524544, nr_irqs: 440, preallocated irqs: 16 [Tue Jan 20 16:23:19 2026] rcu: srcu_init: Setting srcu_struct sizes based on contention. [Tue Jan 20 16:23:19 2026] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) [Tue Jan 20 16:23:19 2026] Console: colour VGA+ 80x25 [Tue Jan 20 16:23:19 2026] printk: console [ttyS0] enabled [Tue Jan 20 16:23:19 2026] ACPI: Core revision 20230331 [Tue Jan 20 16:23:19 2026] APIC: Switch to symmetric I/O mode setup [Tue Jan 20 16:23:19 2026] x2apic enabled [Tue Jan 20 16:23:19 2026] APIC: Switched APIC routing to: physical x2apic [Tue Jan 20 16:23:19 2026] tsc: Marking TSC unstable due to TSCs unsynchronized [Tue Jan 20 16:23:19 2026] Calibrating delay loop (skipped) preset value.. 5600.00 BogoMIPS (lpj=2800000) [Tue Jan 20 16:23:19 2026] x86/cpu: User Mode Instruction Prevention (UMIP) activated [Tue Jan 20 16:23:19 2026] Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 [Tue Jan 20 16:23:19 2026] Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 [Tue Jan 20 16:23:19 2026] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [Tue Jan 20 16:23:19 2026] Spectre V2 : Mitigation: Retpolines [Tue Jan 20 16:23:19 2026] Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT [Tue Jan 20 16:23:19 2026] Spectre V2 : Enabling Speculation Barrier for firmware calls [Tue Jan 20 16:23:19 2026] RETBleed: Mitigation: untrained return thunk [Tue Jan 20 16:23:19 2026] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [Tue Jan 20 16:23:19 2026] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [Tue Jan 20 16:23:19 2026] Speculative Return Stack Overflow: IBPB-extending microcode not applied! [Tue Jan 20 16:23:19 2026] Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. [Tue Jan 20 16:23:19 2026] x86/bugs: return thunk changed [Tue Jan 20 16:23:19 2026] Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode [Tue Jan 20 16:23:19 2026] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [Tue Jan 20 16:23:19 2026] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [Tue Jan 20 16:23:19 2026] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [Tue Jan 20 16:23:19 2026] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [Tue Jan 20 16:23:19 2026] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. [Tue Jan 20 16:23:19 2026] Freeing SMP alternatives memory: 40K [Tue Jan 20 16:23:19 2026] pid_max: default: 32768 minimum: 301 [Tue Jan 20 16:23:19 2026] LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf [Tue Jan 20 16:23:19 2026] landlock: Up and running. [Tue Jan 20 16:23:19 2026] Yama: becoming mindful. [Tue Jan 20 16:23:19 2026] SELinux: Initializing. [Tue Jan 20 16:23:19 2026] LSM support for eBPF active [Tue Jan 20 16:23:19 2026] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [Tue Jan 20 16:23:19 2026] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) [Tue Jan 20 16:23:19 2026] smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) [Tue Jan 20 16:23:19 2026] Performance Events: Fam17h+ core perfctr, AMD PMU driver. [Tue Jan 20 16:23:19 2026] ... version: 0 [Tue Jan 20 16:23:19 2026] ... bit width: 48 [Tue Jan 20 16:23:19 2026] ... generic registers: 6 [Tue Jan 20 16:23:19 2026] ... value mask: 0000ffffffffffff [Tue Jan 20 16:23:19 2026] ... max period: 00007fffffffffff [Tue Jan 20 16:23:19 2026] ... fixed-purpose events: 0 [Tue Jan 20 16:23:19 2026] ... event mask: 000000000000003f [Tue Jan 20 16:23:19 2026] signal: max sigframe size: 1776 [Tue Jan 20 16:23:19 2026] rcu: Hierarchical SRCU implementation. [Tue Jan 20 16:23:19 2026] rcu: Max phase no-delay instances is 400. [Tue Jan 20 16:23:19 2026] smp: Bringing up secondary CPUs ... [Tue Jan 20 16:23:19 2026] smpboot: x86: Booting SMP configuration: [Tue Jan 20 16:23:19 2026] .... node #0, CPUs: #1 [Tue Jan 20 16:23:19 2026] smp: Brought up 1 node, 2 CPUs [Tue Jan 20 16:23:19 2026] smpboot: Total of 2 processors activated (11200.00 BogoMIPS) [Tue Jan 20 16:23:19 2026] node 0 deferred pages initialised in 5ms [Tue Jan 20 16:23:19 2026] Memory: 3644976K/4193764K available (16384K kernel code, 5797K rwdata, 13916K rodata, 4200K init, 7192K bss, 545100K reserved, 0K cma-reserved) [Tue Jan 20 16:23:19 2026] devtmpfs: initialized [Tue Jan 20 16:23:19 2026] x86/mm: Memory block size: 128MB [Tue Jan 20 16:23:19 2026] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [Tue Jan 20 16:23:19 2026] futex hash table entries: 512 (32768 bytes on 1 NUMA nodes, total 32 KiB, linear). [Tue Jan 20 16:23:19 2026] pinctrl core: initialized pinctrl subsystem [Tue Jan 20 16:23:19 2026] NET: Registered PF_NETLINK/PF_ROUTE protocol family [Tue Jan 20 16:23:19 2026] DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations [Tue Jan 20 16:23:19 2026] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [Tue Jan 20 16:23:19 2026] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [Tue Jan 20 16:23:19 2026] audit: initializing netlink subsys (disabled) [Tue Jan 20 16:23:19 2026] thermal_sys: Registered thermal governor 'fair_share' [Tue Jan 20 16:23:19 2026] thermal_sys: Registered thermal governor 'step_wise' [Tue Jan 20 16:23:19 2026] thermal_sys: Registered thermal governor 'user_space' [Tue Jan 20 16:23:19 2026] audit: type=2000 audit(1768926199.378:1): state=initialized audit_enabled=0 res=1 [Tue Jan 20 16:23:19 2026] cpuidle: using governor menu [Tue Jan 20 16:23:19 2026] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [Tue Jan 20 16:23:19 2026] PCI: Using configuration type 1 for base access [Tue Jan 20 16:23:19 2026] PCI: Using configuration type 1 for extended access [Tue Jan 20 16:23:19 2026] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [Tue Jan 20 16:23:19 2026] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages [Tue Jan 20 16:23:19 2026] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page [Tue Jan 20 16:23:19 2026] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages [Tue Jan 20 16:23:19 2026] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page [Tue Jan 20 16:23:19 2026] Demotion targets for Node 0: null [Tue Jan 20 16:23:19 2026] cryptd: max_cpu_qlen set to 1000 [Tue Jan 20 16:23:19 2026] ACPI: Added _OSI(Module Device) [Tue Jan 20 16:23:19 2026] ACPI: Added _OSI(Processor Device) [Tue Jan 20 16:23:19 2026] ACPI: Added _OSI(Processor Aggregator Device) [Tue Jan 20 16:23:19 2026] ACPI: 1 ACPI AML tables successfully acquired and loaded [Tue Jan 20 16:23:19 2026] ACPI: Interpreter enabled [Tue Jan 20 16:23:19 2026] ACPI: PM: (supports S0 S3 S4 S5) [Tue Jan 20 16:23:19 2026] ACPI: Using IOAPIC for interrupt routing [Tue Jan 20 16:23:19 2026] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [Tue Jan 20 16:23:19 2026] PCI: Using E820 reservations for host bridge windows [Tue Jan 20 16:23:19 2026] ACPI: Enabled 2 GPEs in block 00 to 0F [Tue Jan 20 16:23:19 2026] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [Tue Jan 20 16:23:19 2026] acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [Tue Jan 20 16:23:19 2026] acpiphp: Slot [3] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [4] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [5] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [6] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [7] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [8] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [9] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [10] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [11] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [12] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [13] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [14] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [15] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [16] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [17] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [18] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [19] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [20] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [21] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [22] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [23] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [24] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [25] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [26] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [27] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [28] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [29] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [30] registered [Tue Jan 20 16:23:19 2026] acpiphp: Slot [31] registered [Tue Jan 20 16:23:19 2026] PCI host bridge to bus 0000:00 [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [mem 0x140000000-0x1bfffffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: root bus resource [bus 00-ff] [Tue Jan 20 16:23:19 2026] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk [Tue Jan 20 16:23:19 2026] pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk [Tue Jan 20 16:23:19 2026] pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] [Tue Jan 20 16:23:19 2026] pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI [Tue Jan 20 16:23:19 2026] pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [Tue Jan 20 16:23:19 2026] pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] [Tue Jan 20 16:23:19 2026] pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] [Tue Jan 20 16:23:19 2026] pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] [Tue Jan 20 16:23:19 2026] pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] [Tue Jan 20 16:23:19 2026] pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] [Tue Jan 20 16:23:19 2026] pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] [Tue Jan 20 16:23:19 2026] pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint [Tue Jan 20 16:23:19 2026] pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] [Tue Jan 20 16:23:19 2026] pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] [Tue Jan 20 16:23:19 2026] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 [Tue Jan 20 16:23:19 2026] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [Tue Jan 20 16:23:19 2026] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [Tue Jan 20 16:23:19 2026] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [Tue Jan 20 16:23:19 2026] ACPI: PCI: Interrupt link LNKS configured for IRQ 9 [Tue Jan 20 16:23:19 2026] iommu: Default domain type: Translated [Tue Jan 20 16:23:19 2026] iommu: DMA domain TLB invalidation policy: lazy mode [Tue Jan 20 16:23:19 2026] SCSI subsystem initialized [Tue Jan 20 16:23:19 2026] ACPI: bus type USB registered [Tue Jan 20 16:23:19 2026] usbcore: registered new interface driver usbfs [Tue Jan 20 16:23:19 2026] usbcore: registered new interface driver hub [Tue Jan 20 16:23:19 2026] usbcore: registered new device driver usb [Tue Jan 20 16:23:19 2026] pps_core: LinuxPPS API ver. 1 registered [Tue Jan 20 16:23:19 2026] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [Tue Jan 20 16:23:19 2026] PTP clock support registered [Tue Jan 20 16:23:19 2026] EDAC MC: Ver: 3.0.0 [Tue Jan 20 16:23:19 2026] NetLabel: Initializing [Tue Jan 20 16:23:19 2026] NetLabel: domain hash size = 128 [Tue Jan 20 16:23:19 2026] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [Tue Jan 20 16:23:19 2026] NetLabel: unlabeled traffic allowed by default [Tue Jan 20 16:23:19 2026] PCI: Using ACPI for IRQ routing [Tue Jan 20 16:23:19 2026] PCI: pci_cache_line_size set to 64 bytes [Tue Jan 20 16:23:19 2026] e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] [Tue Jan 20 16:23:19 2026] e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: vgaarb: setting as boot VGA device [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: vgaarb: bridge control possible [Tue Jan 20 16:23:19 2026] pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [Tue Jan 20 16:23:19 2026] vgaarb: loaded [Tue Jan 20 16:23:19 2026] clocksource: Switched to clocksource kvm-clock [Tue Jan 20 16:23:19 2026] VFS: Disk quotas dquot_6.6.0 [Tue Jan 20 16:23:19 2026] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [Tue Jan 20 16:23:19 2026] pnp: PnP ACPI init [Tue Jan 20 16:23:19 2026] pnp 00:03: [dma 2] [Tue Jan 20 16:23:19 2026] pnp: PnP ACPI: found 5 devices [Tue Jan 20 16:23:19 2026] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [Tue Jan 20 16:23:19 2026] NET: Registered PF_INET protocol family [Tue Jan 20 16:23:19 2026] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) [Tue Jan 20 16:23:19 2026] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) [Tue Jan 20 16:23:19 2026] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [Tue Jan 20 16:23:19 2026] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) [Tue Jan 20 16:23:19 2026] TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) [Tue Jan 20 16:23:19 2026] TCP: Hash tables configured (established 32768 bind 32768) [Tue Jan 20 16:23:19 2026] MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear) [Tue Jan 20 16:23:19 2026] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) [Tue Jan 20 16:23:19 2026] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) [Tue Jan 20 16:23:19 2026] NET: Registered PF_UNIX/PF_LOCAL protocol family [Tue Jan 20 16:23:19 2026] NET: Registered PF_XDP protocol family [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] [Tue Jan 20 16:23:19 2026] pci_bus 0000:00: resource 8 [mem 0x140000000-0x1bfffffff window] [Tue Jan 20 16:23:19 2026] pci 0000:00:01.0: PIIX3: Enabling Passive Release [Tue Jan 20 16:23:19 2026] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [Tue Jan 20 16:23:20 2026] ACPI: \_SB_.LNKD: Enabled at IRQ 11 [Tue Jan 20 16:23:20 2026] pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 96312 usecs [Tue Jan 20 16:23:20 2026] PCI: CLS 0 bytes, default 64 [Tue Jan 20 16:23:20 2026] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [Tue Jan 20 16:23:20 2026] software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) [Tue Jan 20 16:23:20 2026] Trying to unpack rootfs image as initramfs... [Tue Jan 20 16:23:20 2026] ACPI: bus type thunderbolt registered [Tue Jan 20 16:23:20 2026] Initialise system trusted keyrings [Tue Jan 20 16:23:20 2026] Key type blacklist registered [Tue Jan 20 16:23:20 2026] workingset: timestamp_bits=36 max_order=20 bucket_order=0 [Tue Jan 20 16:23:20 2026] zbud: loaded [Tue Jan 20 16:23:20 2026] integrity: Platform Keyring initialized [Tue Jan 20 16:23:20 2026] integrity: Machine keyring initialized [Tue Jan 20 16:23:21 2026] Freeing initrd memory: 87956K [Tue Jan 20 16:23:21 2026] NET: Registered PF_ALG protocol family [Tue Jan 20 16:23:21 2026] xor: automatically using best checksumming function avx [Tue Jan 20 16:23:21 2026] Key type asymmetric registered [Tue Jan 20 16:23:21 2026] Asymmetric key parser 'x509' registered [Tue Jan 20 16:23:21 2026] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) [Tue Jan 20 16:23:21 2026] io scheduler mq-deadline registered [Tue Jan 20 16:23:21 2026] io scheduler kyber registered [Tue Jan 20 16:23:21 2026] io scheduler bfq registered [Tue Jan 20 16:23:21 2026] atomic64_test: passed for x86-64 platform with CX8 and with SSE [Tue Jan 20 16:23:21 2026] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [Tue Jan 20 16:23:21 2026] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [Tue Jan 20 16:23:21 2026] ACPI: button: Power Button [PWRF] [Tue Jan 20 16:23:21 2026] ACPI: \_SB_.LNKB: Enabled at IRQ 10 [Tue Jan 20 16:23:21 2026] ACPI: \_SB_.LNKC: Enabled at IRQ 11 [Tue Jan 20 16:23:21 2026] ACPI: \_SB_.LNKA: Enabled at IRQ 10 [Tue Jan 20 16:23:21 2026] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [Tue Jan 20 16:23:21 2026] 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [Tue Jan 20 16:23:21 2026] Non-volatile memory driver v1.3 [Tue Jan 20 16:23:21 2026] rdac: device handler registered [Tue Jan 20 16:23:21 2026] hp_sw: device handler registered [Tue Jan 20 16:23:21 2026] emc: device handler registered [Tue Jan 20 16:23:21 2026] alua: device handler registered [Tue Jan 20 16:23:21 2026] uhci_hcd 0000:00:01.2: UHCI Host Controller [Tue Jan 20 16:23:21 2026] uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 [Tue Jan 20 16:23:21 2026] uhci_hcd 0000:00:01.2: detected 2 ports [Tue Jan 20 16:23:21 2026] uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 [Tue Jan 20 16:23:21 2026] usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 [Tue Jan 20 16:23:21 2026] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [Tue Jan 20 16:23:21 2026] usb usb1: Product: UHCI Host Controller [Tue Jan 20 16:23:21 2026] usb usb1: Manufacturer: Linux 5.14.0-661.el9.x86_64 uhci_hcd [Tue Jan 20 16:23:21 2026] usb usb1: SerialNumber: 0000:00:01.2 [Tue Jan 20 16:23:21 2026] hub 1-0:1.0: USB hub found [Tue Jan 20 16:23:21 2026] hub 1-0:1.0: 2 ports detected [Tue Jan 20 16:23:21 2026] usbcore: registered new interface driver usbserial_generic [Tue Jan 20 16:23:21 2026] usbserial: USB Serial support registered for generic [Tue Jan 20 16:23:21 2026] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 [Tue Jan 20 16:23:21 2026] serio: i8042 KBD port at 0x60,0x64 irq 1 [Tue Jan 20 16:23:21 2026] serio: i8042 AUX port at 0x60,0x64 irq 12 [Tue Jan 20 16:23:21 2026] mousedev: PS/2 mouse device common for all mice [Tue Jan 20 16:23:21 2026] rtc_cmos 00:04: RTC can wake from S4 [Tue Jan 20 16:23:21 2026] rtc_cmos 00:04: registered as rtc0 [Tue Jan 20 16:23:21 2026] rtc_cmos 00:04: setting system clock to 2026-01-20T16:23:21 UTC (1768926201) [Tue Jan 20 16:23:21 2026] rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram [Tue Jan 20 16:23:21 2026] amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled [Tue Jan 20 16:23:21 2026] hid: raw HID events driver (C) Jiri Kosina [Tue Jan 20 16:23:21 2026] usbcore: registered new interface driver usbhid [Tue Jan 20 16:23:21 2026] usbhid: USB HID core driver [Tue Jan 20 16:23:21 2026] drop_monitor: Initializing network drop monitor service [Tue Jan 20 16:23:21 2026] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 [Tue Jan 20 16:23:21 2026] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 [Tue Jan 20 16:23:21 2026] input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 [Tue Jan 20 16:23:21 2026] Initializing XFRM netlink socket [Tue Jan 20 16:23:21 2026] NET: Registered PF_INET6 protocol family [Tue Jan 20 16:23:21 2026] Segment Routing with IPv6 [Tue Jan 20 16:23:21 2026] NET: Registered PF_PACKET protocol family [Tue Jan 20 16:23:21 2026] mpls_gso: MPLS GSO support [Tue Jan 20 16:23:21 2026] IPI shorthand broadcast: enabled [Tue Jan 20 16:23:21 2026] AVX2 version of gcm_enc/dec engaged. [Tue Jan 20 16:23:21 2026] AES CTR mode by8 optimization enabled [Tue Jan 20 16:23:21 2026] sched_clock: Marking stable (2349001654, 148964426)->(2621114704, -123148624) [Tue Jan 20 16:23:21 2026] registered taskstats version 1 [Tue Jan 20 16:23:21 2026] Loading compiled-in X.509 certificates [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' [Tue Jan 20 16:23:21 2026] Demotion targets for Node 0: null [Tue Jan 20 16:23:21 2026] page_owner is disabled [Tue Jan 20 16:23:21 2026] Key type .fscrypt registered [Tue Jan 20 16:23:21 2026] Key type fscrypt-provisioning registered [Tue Jan 20 16:23:21 2026] Key type big_key registered [Tue Jan 20 16:23:21 2026] Key type encrypted registered [Tue Jan 20 16:23:21 2026] ima: No TPM chip found, activating TPM-bypass! [Tue Jan 20 16:23:21 2026] Loading compiled-in module X.509 certificates [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 04453f216699002fd63185eeab832de990bee6d7' [Tue Jan 20 16:23:21 2026] ima: Allocated hash algorithm: sha256 [Tue Jan 20 16:23:21 2026] ima: No architecture policies found [Tue Jan 20 16:23:21 2026] evm: Initialising EVM extended attributes: [Tue Jan 20 16:23:21 2026] evm: security.selinux [Tue Jan 20 16:23:21 2026] evm: security.SMACK64 (disabled) [Tue Jan 20 16:23:21 2026] evm: security.SMACK64EXEC (disabled) [Tue Jan 20 16:23:21 2026] evm: security.SMACK64TRANSMUTE (disabled) [Tue Jan 20 16:23:21 2026] evm: security.SMACK64MMAP (disabled) [Tue Jan 20 16:23:21 2026] evm: security.apparmor (disabled) [Tue Jan 20 16:23:21 2026] evm: security.ima [Tue Jan 20 16:23:21 2026] evm: security.capability [Tue Jan 20 16:23:21 2026] evm: HMAC attrs: 0x1 [Tue Jan 20 16:23:21 2026] usb 1-1: new full-speed USB device number 2 using uhci_hcd [Tue Jan 20 16:23:21 2026] Running certificate verification RSA selftest [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' [Tue Jan 20 16:23:21 2026] Running certificate verification ECDSA selftest [Tue Jan 20 16:23:21 2026] Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' [Tue Jan 20 16:23:21 2026] clk: Disabling unused clocks [Tue Jan 20 16:23:21 2026] Freeing unused decrypted memory: 2028K [Tue Jan 20 16:23:21 2026] Freeing unused kernel image (initmem) memory: 4200K [Tue Jan 20 16:23:21 2026] Write protecting the kernel read-only data: 30720k [Tue Jan 20 16:23:21 2026] Freeing unused kernel image (rodata/data gap) memory: 420K [Tue Jan 20 16:23:21 2026] usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 [Tue Jan 20 16:23:21 2026] usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 [Tue Jan 20 16:23:21 2026] usb 1-1: Product: QEMU USB Tablet [Tue Jan 20 16:23:21 2026] usb 1-1: Manufacturer: QEMU [Tue Jan 20 16:23:21 2026] usb 1-1: SerialNumber: 28754-0000:00:01.2-1 [Tue Jan 20 16:23:21 2026] input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 [Tue Jan 20 16:23:21 2026] hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 [Tue Jan 20 16:23:21 2026] x86/mm: Checked W+X mappings: passed, no W+X pages found. [Tue Jan 20 16:23:21 2026] Run /init as init process [Tue Jan 20 16:23:21 2026] with arguments: [Tue Jan 20 16:23:21 2026] /init [Tue Jan 20 16:23:21 2026] with environment: [Tue Jan 20 16:23:21 2026] HOME=/ [Tue Jan 20 16:23:21 2026] TERM=linux [Tue Jan 20 16:23:21 2026] BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-661.el9.x86_64 [Tue Jan 20 16:23:21 2026] systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [Tue Jan 20 16:23:21 2026] systemd[1]: Detected virtualization kvm. [Tue Jan 20 16:23:21 2026] systemd[1]: Detected architecture x86-64. [Tue Jan 20 16:23:21 2026] systemd[1]: Running in initrd. [Tue Jan 20 16:23:21 2026] systemd[1]: No hostname configured, using default hostname. [Tue Jan 20 16:23:21 2026] systemd[1]: Hostname set to . [Tue Jan 20 16:23:21 2026] systemd[1]: Initializing machine ID from VM UUID. [Tue Jan 20 16:23:22 2026] systemd[1]: Queued start job for default target Initrd Default Target. [Tue Jan 20 16:23:22 2026] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Local Encrypted Volumes. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Initrd /usr File System. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Local File Systems. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Path Units. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Slice Units. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Swaps. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Timer Units. [Tue Jan 20 16:23:22 2026] systemd[1]: Listening on D-Bus System Message Bus Socket. [Tue Jan 20 16:23:22 2026] systemd[1]: Listening on Journal Socket (/dev/log). [Tue Jan 20 16:23:22 2026] systemd[1]: Listening on Journal Socket. [Tue Jan 20 16:23:22 2026] systemd[1]: Listening on udev Control Socket. [Tue Jan 20 16:23:22 2026] systemd[1]: Listening on udev Kernel Socket. [Tue Jan 20 16:23:22 2026] systemd[1]: Reached target Socket Units. [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Create List of Static Device Nodes... [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Journal Service... [Tue Jan 20 16:23:22 2026] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Apply Kernel Variables... [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Create System Users... [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Setup Virtual Console... [Tue Jan 20 16:23:22 2026] systemd[1]: Finished Create List of Static Device Nodes. [Tue Jan 20 16:23:22 2026] systemd[1]: Finished Apply Kernel Variables. [Tue Jan 20 16:23:22 2026] systemd[1]: Finished Create System Users. [Tue Jan 20 16:23:22 2026] systemd[1]: Starting Create Static Device Nodes in /dev... [Tue Jan 20 16:23:22 2026] systemd[1]: Started Journal Service. [Tue Jan 20 16:23:22 2026] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [Tue Jan 20 16:23:22 2026] device-mapper: uevent: version 1.0.3 [Tue Jan 20 16:23:22 2026] device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev [Tue Jan 20 16:23:22 2026] RPC: Registered named UNIX socket transport module. [Tue Jan 20 16:23:22 2026] RPC: Registered udp transport module. [Tue Jan 20 16:23:22 2026] RPC: Registered tcp transport module. [Tue Jan 20 16:23:22 2026] RPC: Registered tcp-with-tls transport module. [Tue Jan 20 16:23:22 2026] RPC: Registered tcp NFSv4.1 backchannel transport module. [Tue Jan 20 16:23:22 2026] virtio_blk virtio2: 2/0/0 default/read/poll queues [Tue Jan 20 16:23:22 2026] virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) [Tue Jan 20 16:23:22 2026] vda: vda1 [Tue Jan 20 16:23:23 2026] libata version 3.00 loaded. [Tue Jan 20 16:23:23 2026] ata_piix 0000:00:01.1: version 2.13 [Tue Jan 20 16:23:23 2026] scsi host0: ata_piix [Tue Jan 20 16:23:23 2026] scsi host1: ata_piix [Tue Jan 20 16:23:23 2026] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 [Tue Jan 20 16:23:23 2026] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 [Tue Jan 20 16:23:23 2026] ata1: found unknown device (class 0) [Tue Jan 20 16:23:23 2026] ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 [Tue Jan 20 16:23:23 2026] scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 [Tue Jan 20 16:23:23 2026] scsi 0:0:0:0: Attached scsi generic sg0 type 5 [Tue Jan 20 16:23:23 2026] sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray [Tue Jan 20 16:23:23 2026] cdrom: Uniform CD-ROM driver Revision: 3.20 [Tue Jan 20 16:23:23 2026] sr 0:0:0:0: Attached scsi CD-ROM sr0 [Tue Jan 20 16:23:23 2026] SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled [Tue Jan 20 16:23:23 2026] XFS (vda1): Mounting V5 Filesystem 22ac9141-3960-4912-b20e-19fc8a328d40 [Tue Jan 20 16:23:23 2026] XFS (vda1): Ending clean mount [Tue Jan 20 16:23:24 2026] systemd-journald[244]: Received SIGTERM from PID 1 (systemd). [Tue Jan 20 16:23:24 2026] audit: type=1404 audit(1768926204.395:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability network_peer_controls=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability open_perms=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability extended_socket_class=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability always_check_network=0 [Tue Jan 20 16:23:24 2026] SELinux: policy capability cgroup_seclabel=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability nnp_nosuid_transition=1 [Tue Jan 20 16:23:24 2026] SELinux: policy capability genfs_seclabel_symlinks=1 [Tue Jan 20 16:23:24 2026] audit: type=1403 audit(1768926204.529:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 [Tue Jan 20 16:23:24 2026] systemd[1]: Successfully loaded SELinux policy in 136.823ms. [Tue Jan 20 16:23:24 2026] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.516ms. [Tue Jan 20 16:23:24 2026] systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [Tue Jan 20 16:23:24 2026] systemd[1]: Detected virtualization kvm. [Tue Jan 20 16:23:24 2026] systemd[1]: Detected architecture x86-64. [Tue Jan 20 16:23:24 2026] systemd-rc-local-generator[548]: /etc/rc.d/rc.local is not marked executable, skipping. [Tue Jan 20 16:23:24 2026] systemd[1]: initrd-switch-root.service: Deactivated successfully. [Tue Jan 20 16:23:24 2026] systemd[1]: Stopped Switch Root. [Tue Jan 20 16:23:24 2026] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [Tue Jan 20 16:23:24 2026] systemd[1]: Created slice Slice /system/getty. [Tue Jan 20 16:23:24 2026] systemd[1]: Created slice Slice /system/serial-getty. [Tue Jan 20 16:23:24 2026] systemd[1]: Created slice Slice /system/sshd-keygen. [Tue Jan 20 16:23:24 2026] systemd[1]: Created slice User and Session Slice. [Tue Jan 20 16:23:24 2026] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [Tue Jan 20 16:23:24 2026] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [Tue Jan 20 16:23:24 2026] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Local Encrypted Volumes. [Tue Jan 20 16:23:24 2026] systemd[1]: Stopped target Switch Root. [Tue Jan 20 16:23:24 2026] systemd[1]: Stopped target Initrd File Systems. [Tue Jan 20 16:23:24 2026] systemd[1]: Stopped target Initrd Root File System. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Local Integrity Protected Volumes. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Path Units. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target rpc_pipefs.target. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Slice Units. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Swaps. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target Local Verity Protected Volumes. [Tue Jan 20 16:23:24 2026] systemd[1]: Listening on RPCbind Server Activation Socket. [Tue Jan 20 16:23:24 2026] systemd[1]: Reached target RPC Port Mapper. [Tue Jan 20 16:23:24 2026] systemd[1]: Listening on Process Core Dump Socket. [Tue Jan 20 16:23:24 2026] systemd[1]: Listening on initctl Compatibility Named Pipe. [Tue Jan 20 16:23:24 2026] systemd[1]: Listening on udev Control Socket. [Tue Jan 20 16:23:24 2026] systemd[1]: Listening on udev Kernel Socket. [Tue Jan 20 16:23:24 2026] systemd[1]: Mounting Huge Pages File System... [Tue Jan 20 16:23:24 2026] systemd[1]: Mounting POSIX Message Queue File System... [Tue Jan 20 16:23:24 2026] systemd[1]: Mounting Kernel Debug File System... [Tue Jan 20 16:23:24 2026] systemd[1]: Mounting Kernel Trace File System... [Tue Jan 20 16:23:24 2026] systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). [Tue Jan 20 16:23:24 2026] systemd[1]: Starting Create List of Static Device Nodes... [Tue Jan 20 16:23:24 2026] systemd[1]: Starting Load Kernel Module configfs... [Tue Jan 20 16:23:24 2026] systemd[1]: Starting Load Kernel Module drm... [Tue Jan 20 16:23:24 2026] systemd[1]: Starting Load Kernel Module efi_pstore... [Tue Jan 20 16:23:24 2026] systemd[1]: Starting Load Kernel Module fuse... [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... [Tue Jan 20 16:23:25 2026] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [Tue Jan 20 16:23:25 2026] systemd[1]: Stopped File System Check on Root Device. [Tue Jan 20 16:23:25 2026] systemd[1]: Stopped Journal Service. [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Journal Service... [Tue Jan 20 16:23:25 2026] systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Generate network units from Kernel command line... [Tue Jan 20 16:23:25 2026] ACPI: bus type drm_connector registered [Tue Jan 20 16:23:25 2026] fuse: init (API version 7.37) [Tue Jan 20 16:23:25 2026] systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Remount Root and Kernel File Systems... [Tue Jan 20 16:23:25 2026] systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Apply Kernel Variables... [Tue Jan 20 16:23:25 2026] xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) [Tue Jan 20 16:23:25 2026] systemd[1]: Starting Coldplug All udev Devices... [Tue Jan 20 16:23:25 2026] systemd[1]: Started Journal Service. [Tue Jan 20 16:23:25 2026] systemd-journald[589]: Received client request to flush runtime journal. [Tue Jan 20 16:23:26 2026] Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled [Tue Jan 20 16:23:26 2026] Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled [Tue Jan 20 16:23:26 2026] input: PC Speaker as /devices/platform/pcspkr/input/input6 [Tue Jan 20 16:23:27 2026] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 [Tue Jan 20 16:23:27 2026] i2c i2c-0: 1/1 memory slots populated (from DMI) [Tue Jan 20 16:23:27 2026] i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD [Tue Jan 20 16:23:27 2026] [drm] pci: virtio-vga detected at 0000:00:02.0 [Tue Jan 20 16:23:27 2026] virtio-pci 0000:00:02.0: vgaarb: deactivate vga console [Tue Jan 20 16:23:27 2026] Console: switching to colour dummy device 80x25 [Tue Jan 20 16:23:27 2026] [drm] features: -virgl +edid -resource_blob -host_visible [Tue Jan 20 16:23:27 2026] [drm] features: -context_init [Tue Jan 20 16:23:27 2026] [drm] number of scanouts: 1 [Tue Jan 20 16:23:27 2026] [drm] number of cap sets: 0 [Tue Jan 20 16:23:27 2026] [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 [Tue Jan 20 16:23:27 2026] kvm_amd: TSC scaling supported [Tue Jan 20 16:23:27 2026] kvm_amd: Nested Virtualization enabled [Tue Jan 20 16:23:27 2026] kvm_amd: Nested Paging enabled [Tue Jan 20 16:23:27 2026] kvm_amd: LBR virtualization supported [Tue Jan 20 16:23:27 2026] fbcon: virtio_gpudrmfb (fb0) is primary device [Tue Jan 20 16:23:27 2026] Console: switching to colour frame buffer device 128x48 [Tue Jan 20 16:23:27 2026] virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device [Tue Jan 20 16:23:27 2026] ISO 9660 Extensions: Microsoft Joliet Level 3 [Tue Jan 20 16:23:27 2026] ISO 9660 Extensions: RRIP_1991A [Tue Jan 20 16:23:33 2026] block vda: the capability attribute has been deprecated. [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 0 [io 0x0000-0x003f] [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 1 [mem 0x00000000-0x00000fff] [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 4 [mem 0x00000000-0x00003fff 64bit pref] [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: ROM [mem 0x00000000-0x0007ffff pref] [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: ROM [mem 0xc0000000-0xc007ffff pref]: assigned [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 4 [mem 0x140000000-0x140003fff 64bit pref]: assigned [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 1 [mem 0xc0080000-0xc0080fff]: assigned [Tue Jan 20 16:29:34 2026] pci 0000:00:07.0: BAR 0 [io 0x1000-0x103f]: assigned [Tue Jan 20 16:29:34 2026] virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) [Tue Jan 20 16:36:02 2026] systemd-rc-local-generator[8451]: /etc/rc.d/rc.local is not marked executable, skipping. [Tue Jan 20 16:36:31 2026] SELinux: Converting 387 SID table entries... [Tue Jan 20 16:36:31 2026] SELinux: policy capability network_peer_controls=1 [Tue Jan 20 16:36:31 2026] SELinux: policy capability open_perms=1 [Tue Jan 20 16:36:31 2026] SELinux: policy capability extended_socket_class=1 [Tue Jan 20 16:36:31 2026] SELinux: policy capability always_check_network=0 [Tue Jan 20 16:36:31 2026] SELinux: policy capability cgroup_seclabel=1 [Tue Jan 20 16:36:31 2026] SELinux: policy capability nnp_nosuid_transition=1 [Tue Jan 20 16:36:31 2026] SELinux: policy capability genfs_seclabel_symlinks=1 [Tue Jan 20 16:36:42 2026] SELinux: Converting 388 SID table entries... [Tue Jan 20 16:36:43 2026] SELinux: policy capability network_peer_controls=1 [Tue Jan 20 16:36:43 2026] SELinux: policy capability open_perms=1 [Tue Jan 20 16:36:43 2026] SELinux: policy capability extended_socket_class=1 [Tue Jan 20 16:36:43 2026] SELinux: policy capability always_check_network=0 [Tue Jan 20 16:36:43 2026] SELinux: policy capability cgroup_seclabel=1 [Tue Jan 20 16:36:43 2026] SELinux: policy capability nnp_nosuid_transition=1 [Tue Jan 20 16:36:43 2026] SELinux: policy capability genfs_seclabel_symlinks=1 [Tue Jan 20 16:37:07 2026] systemd-rc-local-generator[9484]: /etc/rc.d/rc.local is not marked executable, skipping. [Tue Jan 20 16:37:13 2026] evm: overlay not supported home/zuul/zuul-output/logs/selinux-denials.log0000644000000000000000000000000015133753433020610 0ustar rootroothome/zuul/zuul-output/logs/system-config/0000755000175000017500000000000015133753434017665 5ustar zuulzuulhome/zuul/zuul-output/logs/system-config/libvirt/0000755000175000017500000000000015133753434021340 5ustar zuulzuulhome/zuul/zuul-output/logs/system-config/libvirt/libvirt-admin.conf0000644000175000000000000000070215133753434024716 0ustar zuulroot# # This can be used to setup URI aliases for frequently # used connection URIs. Aliases may contain only the # characters a-Z, 0-9, _, -. # # Following the '=' may be any valid libvirt admin connection # URI, including arbitrary parameters #uri_aliases = [ # "admin=libvirtd:///system", #] # This specifies the default location the client tries to connect to if no other # URI is provided by the application #uri_default = "libvirtd:///system" home/zuul/zuul-output/logs/system-config/libvirt/libvirt.conf0000644000175000000000000000104315133753434023627 0ustar zuulroot# # This can be used to setup URI aliases for frequently # used connection URIs. Aliases may contain only the # characters a-Z, 0-9, _, -. # # Following the '=' may be any valid libvirt connection # URI, including arbitrary parameters #uri_aliases = [ # "hail=qemu+ssh://root@hail.cloud.example.com/system", # "sleet=qemu+ssh://root@sleet.cloud.example.com/system", #] # # These can be used in cases when no URI is supplied by the application # (@uri_default also prevents probing of the hypervisor driver). # #uri_default = "qemu:///system" home/zuul/zuul-output/logs/registries.conf0000644000000000000000000000763515133753434020056 0ustar rootroot# For more information on this configuration file, see containers-registries.conf(5). # # NOTE: RISK OF USING UNQUALIFIED IMAGE NAMES # We recommend always using fully qualified image names including the registry # server (full dns name), namespace, image name, and tag # (e.g., registry.redhat.io/ubi8/ubi:latest). Pulling by digest (i.e., # quay.io/repository/name@digest) further eliminates the ambiguity of tags. # When using short names, there is always an inherent risk that the image being # pulled could be spoofed. For example, a user wants to pull an image named # `foobar` from a registry and expects it to come from myregistry.com. If # myregistry.com is not first in the search list, an attacker could place a # different `foobar` image at a registry earlier in the search list. The user # would accidentally pull and run the attacker's image and code rather than the # intended content. We recommend only adding registries which are completely # trusted (i.e., registries which don't allow unknown or anonymous users to # create accounts with arbitrary names). This will prevent an image from being # spoofed, squatted or otherwise made insecure. If it is necessary to use one # of these registries, it should be added at the end of the list. # # # An array of host[:port] registries to try when pulling an unqualified image, in order. unqualified-search-registries = ["registry.access.redhat.com", "registry.redhat.io", "docker.io"] # [[registry]] # # The "prefix" field is used to choose the relevant [[registry]] TOML table; # # (only) the TOML table with the longest match for the input image name # # (taking into account namespace/repo/tag/digest separators) is used. # # # # The prefix can also be of the form: *.example.com for wildcard subdomain # # matching. # # # # If the prefix field is missing, it defaults to be the same as the "location" field. # prefix = "example.com/foo" # # # If true, unencrypted HTTP as well as TLS connections with untrusted # # certificates are allowed. # insecure = false # # # If true, pulling images with matching names is forbidden. # blocked = false # # # The physical location of the "prefix"-rooted namespace. # # # # By default, this is equal to "prefix" (in which case "prefix" can be omitted # # and the [[registry]] TOML table can only specify "location"). # # # # Example: Given # # prefix = "example.com/foo" # # location = "internal-registry-for-example.net/bar" # # requests for the image example.com/foo/myimage:latest will actually work with the # # internal-registry-for-example.net/bar/myimage:latest image. # # # The location can be empty iff prefix is in a # # wildcarded format: "*.example.com". In this case, the input reference will # # be used as-is without any rewrite. # location = internal-registry-for-example.com/bar" # # # (Possibly-partial) mirrors for the "prefix"-rooted namespace. # # # # The mirrors are attempted in the specified order; the first one that can be # # contacted and contains the image will be used (and if none of the mirrors contains the image, # # the primary location specified by the "registry.location" field, or using the unmodified # # user-specified reference, is tried last). # # # # Each TOML table in the "mirror" array can contain the following fields, with the same semantics # # as if specified in the [[registry]] TOML table directly: # # - location # # - insecure # [[registry.mirror]] # location = "example-mirror-0.local/mirror-for-foo" # [[registry.mirror]] # location = "example-mirror-1.local/mirrors/foo" # insecure = true # # Given the above, a pull of example.com/foo/image:latest will try: # # 1. example-mirror-0.local/mirror-for-foo/image:latest # # 2. example-mirror-1.local/mirrors/foo/image:latest # # 3. internal-registry-for-example.net/bar/image:latest # # in order, and use the first one that exists. short-name-mode = "enforcing" # BEGIN ANSIBLE MANAGED BLOCK [[registry]] location = "38.102.83.51:5001" insecure = true # END ANSIBLE MANAGED BLOCK home/zuul/zuul-output/logs/registries.conf.d/0000755000175000000000000000000015133753434020373 5ustar zuulroothome/zuul/zuul-output/logs/registries.conf.d/000-shortnames.conf0000644000175000000000000001735515133753434023735 0ustar zuulroot[aliases] # almalinux "almalinux" = "docker.io/library/almalinux" "almalinux-minimal" = "docker.io/library/almalinux-minimal" # Amazon Linux "amazonlinux" = "public.ecr.aws/amazonlinux/amazonlinux" # Arch Linux "archlinux" = "docker.io/library/archlinux" # centos "centos" = "quay.io/centos/centos" # containers "skopeo" = "quay.io/skopeo/stable" "buildah" = "quay.io/buildah/stable" "podman" = "quay.io/podman/stable" "hello" = "quay.io/podman/hello" "hello-world" = "quay.io/podman/hello" # docker "alpine" = "docker.io/library/alpine" "docker" = "docker.io/library/docker" "registry" = "docker.io/library/registry" "swarm" = "docker.io/library/swarm" # Fedora "fedora-bootc" = "registry.fedoraproject.org/fedora-bootc" "fedora-minimal" = "registry.fedoraproject.org/fedora-minimal" "fedora" = "registry.fedoraproject.org/fedora" # Gentoo "gentoo" = "docker.io/gentoo/stage3" # openSUSE "opensuse/tumbleweed" = "registry.opensuse.org/opensuse/tumbleweed" "opensuse/tumbleweed-dnf" = "registry.opensuse.org/opensuse/tumbleweed-dnf" "opensuse/tumbleweed-microdnf" = "registry.opensuse.org/opensuse/tumbleweed-microdnf" "opensuse/leap" = "registry.opensuse.org/opensuse/leap" "opensuse/busybox" = "registry.opensuse.org/opensuse/busybox" "tumbleweed" = "registry.opensuse.org/opensuse/tumbleweed" "tumbleweed-dnf" = "registry.opensuse.org/opensuse/tumbleweed-dnf" "tumbleweed-microdnf" = "registry.opensuse.org/opensuse/tumbleweed-microdnf" "leap" = "registry.opensuse.org/opensuse/leap" "leap-dnf" = "registry.opensuse.org/opensuse/leap-dnf" "leap-microdnf" = "registry.opensuse.org/opensuse/leap-microdnf" "tw-busybox" = "registry.opensuse.org/opensuse/busybox" # OTel (Open Telemetry) - opentelemetry.io "otel/autoinstrumentation-go" = "docker.io/otel/autoinstrumentation-go" "otel/autoinstrumentation-nodejs" = "docker.io/otel/autoinstrumentation-nodejs" "otel/autoinstrumentation-python" = "docker.io/otel/autoinstrumentation-python" "otel/autoinstrumentation-java" = "docker.io/otel/autoinstrumentation-java" "otel/autoinstrumentation-dotnet" = "docker.io/otel/autoinstrumentation-dotnet" "otel/opentelemetry-collector" = "docker.io/otel/opentelemetry-collector" "otel/opentelemetry-collector-contrib" = "docker.io/otel/opentelemetry-collector-contrib" "otel/opentelemetry-collector-contrib-dev" = "docker.io/otel/opentelemetry-collector-contrib-dev" "otel/opentelemetry-collector-k8s" = "docker.io/otel/opentelemetry-collector-k8s" "otel/opentelemetry-operator" = "docker.io/otel/opentelemetry-operator" "otel/opentelemetry-operator-bundle" = "docker.io/otel/opentelemetry-operator-bundle" "otel/operator-opamp-bridge" = "docker.io/otel/operator-opamp-bridge" "otel/semconvgen" = "docker.io/otel/semconvgen" "otel/weaver" = "docker.io/otel/weaver" # SUSE "suse/sle15" = "registry.suse.com/suse/sle15" "suse/sles12sp5" = "registry.suse.com/suse/sles12sp5" "suse/sles12sp4" = "registry.suse.com/suse/sles12sp4" "suse/sles12sp3" = "registry.suse.com/suse/sles12sp3" "sle15" = "registry.suse.com/suse/sle15" "sles12sp5" = "registry.suse.com/suse/sles12sp5" "sles12sp4" = "registry.suse.com/suse/sles12sp4" "sles12sp3" = "registry.suse.com/suse/sles12sp3" "bci-base" = "registry.suse.com/bci/bci-base" "bci/bci-base" = "registry.suse.com/bci/bci-base" "bci-micro" = "registry.suse.com/bci/bci-micro" "bci/bci-micro" = "registry.suse.com/bci/bci-micro" "bci-minimal" = "registry.suse.com/bci/bci-minimal" "bci/bci-minimal" = "registry.suse.com/bci/bci-minimal" "bci-busybox" = "registry.suse.com/bci/bci-busybox" "bci/bci-busybox" = "registry.suse.com/bci/bci-busybox" # Red Hat Enterprise Linux "rhel" = "registry.access.redhat.com/rhel" "rhel6" = "registry.access.redhat.com/rhel6" "rhel7" = "registry.access.redhat.com/rhel7" "rhel7.9" = "registry.access.redhat.com/rhel7.9" "rhel-atomic" = "registry.access.redhat.com/rhel-atomic" "rhel9-bootc" = "registry.redhat.io/rhel9/rhel-bootc" "rhel-minimal" = "registry.access.redhat.com/rhel-minimal" "rhel-init" = "registry.access.redhat.com/rhel-init" "rhel7-atomic" = "registry.access.redhat.com/rhel7-atomic" "rhel7-minimal" = "registry.access.redhat.com/rhel7-minimal" "rhel7-init" = "registry.access.redhat.com/rhel7-init" "rhel7/rhel" = "registry.access.redhat.com/rhel7/rhel" "rhel7/rhel-atomic" = "registry.access.redhat.com/rhel7/rhel7/rhel-atomic" "ubi7/ubi" = "registry.access.redhat.com/ubi7/ubi" "ubi7/ubi-minimal" = "registry.access.redhat.com/ubi7-minimal" "ubi7/ubi-init" = "registry.access.redhat.com/ubi7-init" "ubi7" = "registry.access.redhat.com/ubi7" "ubi7-init" = "registry.access.redhat.com/ubi7-init" "ubi7-minimal" = "registry.access.redhat.com/ubi7-minimal" "rhel8" = "registry.access.redhat.com/ubi8" "rhel8-init" = "registry.access.redhat.com/ubi8-init" "rhel8-minimal" = "registry.access.redhat.com/ubi8-minimal" "rhel8-micro" = "registry.access.redhat.com/ubi8-micro" "ubi8" = "registry.access.redhat.com/ubi8" "ubi8-minimal" = "registry.access.redhat.com/ubi8-minimal" "ubi8-init" = "registry.access.redhat.com/ubi8-init" "ubi8-micro" = "registry.access.redhat.com/ubi8-micro" "ubi8/ubi" = "registry.access.redhat.com/ubi8/ubi" "ubi8/ubi-minimal" = "registry.access.redhat.com/ubi8-minimal" "ubi8/ubi-init" = "registry.access.redhat.com/ubi8-init" "ubi8/ubi-micro" = "registry.access.redhat.com/ubi8-micro" "ubi8/podman" = "registry.access.redhat.com/ubi8/podman" "ubi8/buildah" = "registry.access.redhat.com/ubi8/buildah" "ubi8/skopeo" = "registry.access.redhat.com/ubi8/skopeo" "rhel9" = "registry.access.redhat.com/ubi9" "rhel9-init" = "registry.access.redhat.com/ubi9-init" "rhel9-minimal" = "registry.access.redhat.com/ubi9-minimal" "rhel9-micro" = "registry.access.redhat.com/ubi9-micro" "ubi9" = "registry.access.redhat.com/ubi9" "ubi9-minimal" = "registry.access.redhat.com/ubi9-minimal" "ubi9-init" = "registry.access.redhat.com/ubi9-init" "ubi9-micro" = "registry.access.redhat.com/ubi9-micro" "ubi9/ubi" = "registry.access.redhat.com/ubi9/ubi" "ubi9/ubi-minimal" = "registry.access.redhat.com/ubi9-minimal" "ubi9/ubi-init" = "registry.access.redhat.com/ubi9-init" "ubi9/ubi-micro" = "registry.access.redhat.com/ubi9-micro" "ubi9/podman" = "registry.access.redhat.com/ubi9/podman" "ubi9/buildah" = "registry.access.redhat.com/ubi9/buildah" "ubi9/skopeo" = "registry.access.redhat.com/ubi9/skopeo" # Rocky Linux "rockylinux" = "quay.io/rockylinux/rockylinux" # Debian "debian" = "docker.io/library/debian" # Kali Linux "kali-bleeding-edge" = "docker.io/kalilinux/kali-bleeding-edge" "kali-dev" = "docker.io/kalilinux/kali-dev" "kali-experimental" = "docker.io/kalilinux/kali-experimental" "kali-last-release" = "docker.io/kalilinux/kali-last-release" "kali-rolling" = "docker.io/kalilinux/kali-rolling" # Ubuntu "ubuntu" = "docker.io/library/ubuntu" # Oracle Linux "oraclelinux" = "container-registry.oracle.com/os/oraclelinux" # busybox "busybox" = "docker.io/library/busybox" # golang "golang" = "docker.io/library/golang" # php "php" = "docker.io/library/php" # python "python" = "docker.io/library/python" # rust "rust" = "docker.io/library/rust" # node "node" = "docker.io/library/node" # Grafana Labs "grafana/agent" = "docker.io/grafana/agent" "grafana/grafana" = "docker.io/grafana/grafana" "grafana/k6" = "docker.io/grafana/k6" "grafana/loki" = "docker.io/grafana/loki" "grafana/mimir" = "docker.io/grafana/mimir" "grafana/oncall" = "docker.io/grafana/oncall" "grafana/pyroscope" = "docker.io/grafana/pyroscope" "grafana/tempo" = "docker.io/grafana/tempo" # curl "curl" = "quay.io/curl/curl" # nginx "nginx" = "docker.io/library/nginx" # QUBIP "qubip/pq-container" = "quay.io/qubip/pq-container" home/zuul/zuul-output/artifacts/0000755000175000017500000000000015133726346016114 5ustar zuulzuulhome/zuul/zuul-output/docs/0000755000175000017500000000000015133726347015065 5ustar zuulzuul