~/src/github.com/openstack-k8s-operators/openstack-operator ~/ci-framework-data/artifacts test -s /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize || { curl -Ss "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash -s -- 5.5.0 /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin; } v5.5.0 kustomize installed to /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize test -s /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq || ( cd /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin &&\ wget https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz -O - |\ tar xz && mv yq_linux_amd64 /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq ) --2025-10-11 07:47:29-- https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz Resolving github.com (github.com)... 140.82.113.4 Connecting to github.com (github.com)|140.82.113.4|:443... connected. HTTP request sent, awaiting response... 302 Found Location: https://github.com/mikefarah/yq/releases/download/v4.47.2/yq_linux_amd64.tar.gz [following] --2025-10-11 07:47:30-- https://github.com/mikefarah/yq/releases/download/v4.47.2/yq_linux_amd64.tar.gz Reusing existing connection to github.com:443. HTTP request sent, awaiting response... 302 Found Location: https://release-assets.githubusercontent.com/github-production-release-asset/43225113/1006a3d5-4d5d-4783-8bf4-8ae26f6c4ed5?sp=r&sv=2018-11-09&sr=b&spr=https&se=2025-10-11T08%3A25%3A02Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2025-10-11T07%3A25%3A00Z&ske=2025-10-11T08%3A25%3A02Z&sks=b&skv=2018-11-09&sig=FPljt7E4I9n4dVR2QzLFdWjBEZR%2FLJHvxfKVcjPZmqo%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc2MDE2OTE1MCwibmJmIjoxNzYwMTY4ODUwLCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.HD42Nn7RevUxt3itmYetlY65zyD1mHqnWzYMGUE9PBc&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream [following] --2025-10-11 07:47:30-- https://release-assets.githubusercontent.com/github-production-release-asset/43225113/1006a3d5-4d5d-4783-8bf4-8ae26f6c4ed5?sp=r&sv=2018-11-09&sr=b&spr=https&se=2025-10-11T08%3A25%3A02Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2025-10-11T07%3A25%3A00Z&ske=2025-10-11T08%3A25%3A02Z&sks=b&skv=2018-11-09&sig=FPljt7E4I9n4dVR2QzLFdWjBEZR%2FLJHvxfKVcjPZmqo%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc2MDE2OTE1MCwibmJmIjoxNzYwMTY4ODUwLCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.HD42Nn7RevUxt3itmYetlY65zyD1mHqnWzYMGUE9PBc&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream Resolving release-assets.githubusercontent.com (release-assets.githubusercontent.com)... 185.199.108.133, 185.199.111.133, 185.199.109.133, ... Connecting to release-assets.githubusercontent.com (release-assets.githubusercontent.com)|185.199.108.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 4635001 (4.4M) [application/octet-stream] Saving to: ‘STDOUT’ 0K .......... .......... .......... .......... .......... 1% 30.5M 0s 50K .......... .......... .......... .......... .......... 2% 42.5M 0s 100K .......... .......... .......... .......... .......... 3% 412M 0s 150K .......... .......... .......... .......... .......... 4% 45.9M 0s 200K .......... .......... .......... .......... .......... 5% 148M 0s 250K .......... .......... .......... .......... .......... 6% 394M 0s 300K .......... .......... .......... .......... .......... 7% 52.0M 0s 350K .......... .......... .......... .......... .......... 8% 304M 0s 400K .......... .......... .......... .......... .......... 9% 7.14M 0s 450K .......... .......... .......... .......... .......... 11% 292M 0s 500K .......... .......... .......... .......... .......... 12% 228M 0s 550K .......... .......... .......... .......... .......... 13% 301M 0s 600K .......... .......... .......... .......... .......... 14% 10.3M 0s 650K .......... .......... .......... .......... .......... 15% 175M 0s 700K .......... .......... .......... .......... .......... 16% 176M 0s 750K .......... .......... .......... .......... .......... 17% 168M 0s 800K .......... .......... .......... .......... .......... 18% 176M 0s 850K .......... .......... .......... .......... .......... 19% 239M 0s 900K .......... .......... .......... .......... .......... 20% 9.84M 0s 950K .......... .......... .......... .......... .......... 22% 210M 0s 1000K .......... .......... .......... .......... .......... 23% 145M 0s 1050K .......... .......... .......... .......... .......... 24% 175M 0s 1100K .......... .......... .......... .......... .......... 25% 225M 0s 1150K .......... .......... .......... .......... .......... 26% 9.97M 0s 1200K .......... .......... .......... .......... .......... 27% 199M 0s 1250K .......... .......... .......... .......... .......... 28% 158M 0s 1300K .......... .......... .......... .......... .......... 29% 161M 0s 1350K .......... .......... .......... .......... .......... 30% 290M 0s 1400K .......... .......... .......... .......... .......... 32% 8.65M 0s 1450K .......... .......... .......... .......... .......... 33% 201M 0s 1500K .......... .......... .......... .......... .......... 34% 184M 0s 1550K .......... .......... .......... .......... .......... 35% 188M 0s 1600K .......... .......... .......... .......... .......... 36% 188M 0s 1650K .......... .......... .......... .......... .......... 37% 10.4M 0s 1700K .......... .......... .......... .......... .......... 38% 166M 0s 1750K .......... .......... .......... .......... .......... 39% 250M 0s 1800K .......... .......... .......... .......... .......... 40% 168M 0s 1850K .......... .......... .......... .......... .......... 41% 276M 0s 1900K .......... .......... .......... .......... .......... 43% 10.0M 0s 1950K .......... .......... .......... .......... .......... 44% 186M 0s 2000K .......... .......... .......... .......... .......... 45% 166M 0s 2050K .......... .......... .......... .......... .......... 46% 183M 0s 2100K .......... .......... .......... .......... .......... 47% 194M 0s 2150K .......... .......... .......... .......... .......... 48% 10.1M 0s 2200K .......... .......... .......... .......... .......... 49% 154M 0s 2250K .......... .......... .......... .......... .......... 50% 189M 0s 2300K .......... .......... .......... .......... .......... 51% 184M 0s 2350K .......... .......... .......... .......... .......... 53% 225M 0s 2400K .......... .......... .......... .......... .......... 54% 7.68M 0s 2450K .......... .......... .......... .......... .......... 55% 193M 0s 2500K .......... .......... .......... .......... .......... 56% 200M 0s 2550K .......... .......... .......... .......... .......... 57% 220M 0s 2600K .......... .......... .......... .......... .......... 58% 124M 0s 2650K .......... .......... .......... .......... .......... 59% 8.60M 0s 2700K .......... .......... .......... .......... .......... 60% 171M 0s 2750K .......... .......... .......... .......... .......... 61% 183M 0s 2800K .......... .......... .......... .......... .......... 62% 152M 0s 2850K .......... .......... .......... .......... .......... 64% 175M 0s 2900K .......... .......... .......... .......... .......... 65% 285M 0s 2950K .......... .......... .......... .......... .......... 66% 8.82M 0s 3000K .......... .......... .......... .......... .......... 67% 190M 0s 3050K .......... .......... .......... .......... .......... 68% 179M 0s 3100K .......... .......... .......... .......... .......... 69% 154M 0s 3150K .......... .......... .......... .......... .......... 70% 263M 0s 3200K .......... .......... .......... .......... .......... 71% 11.7M 0s 3250K .......... .......... .......... .......... .......... 72% 188M 0s 3300K .......... .......... .......... .......... .......... 74% 233M 0s 3350K .......... .......... .......... .......... .......... 75% 309M 0s 3400K .......... .......... .......... .......... .......... 76% 307M 0s 3450K .......... .......... .......... .......... .......... 77% 13.2M 0s 3500K .......... .......... .......... .......... .......... 78% 263M 0s 3550K .......... .......... .......... .......... .......... 79% 253M 0s 3600K .......... .......... .......... .......... .......... 80% 193M 0s 3650K .......... .......... .......... .......... .......... 81% 389M 0s 3700K .......... .......... .......... .......... .......... 82% 11.7M 0s 3750K .......... .......... .......... .......... .......... 83% 271M 0s 3800K .......... .......... .......... .......... .......... 85% 229M 0s 3850K .......... .......... .......... .......... .......... 86% 211M 0s 3900K .......... .......... .......... .......... .......... 87% 326M 0s 3950K .......... .......... .......... .......... .......... 88% 9.11M 0s 4000K .......... .......... .......... .......... .......... 89% 178M 0s 4050K .......... .......... .......... .......... .......... 90% 268M 0s 4100K .......... .......... .......... .......... .......... 91% 231M 0s 4150K .......... .......... .......... .......... .......... 92% 359M 0s 4200K .......... .......... .......... .......... .......... 93% 10.4M 0s 4250K .......... .......... .......... .......... .......... 94% 247M 0s 4300K .......... .......... .......... .......... .......... 96% 234M 0s 4350K .......... .......... .......... .......... .......... 97% 252M 0s 4400K .......... .......... .......... .......... .......... 98% 258M 0s 4450K .......... .......... .......... .......... .......... 99% 15.0M 0s 4500K .......... .......... ...... 100% 336M=0.1s 2025-10-11 07:47:30 (41.9 MB/s) - written to stdout [4635001/4635001] mkdir -p bindata/crds bindata/rbac bindata/operator /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/crd > bindata/crds/crds.yaml /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/default > bindata/operator/operator.yaml # Warning: 'vars' is deprecated. Please use 'replacements' instead. [EXPERIMENTAL] Run 'kustomize edit fix' to update your Kustomization automatically. sed -i bindata/operator/operator.yaml -e "s|replicas:.*|replicas: {{ .OpenStackOperator.Deployment.Replicas }}|" sed -i bindata/operator/operator.yaml -e "/envCustom/c\\{{- range .OpenStackOperator.Deployment.Manager.Env }}\n - name: '{{ .Name }}'\n value: '{{ .Value }}'\n{{- end }}" sed -i bindata/operator/operator.yaml -e "/customLimits/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.Memory }}" sed -i bindata/operator/operator.yaml -e "/customRequests/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.Memory }}" sed -i bindata/operator/operator.yaml -e "s|kube-rbac-proxy:replace_me.*|'{{ .OpenStackOperator.Deployment.KubeRbacProxy.Image }}'|" sed -i bindata/operator/operator.yaml -e "/customTolerations/c\\ tolerations:\n{{- range .OpenStackOperator.Deployment.Tolerations }}\n - key: \"{{ .Key }}\"\n{{- if .Operator }}\n operator: \"{{ .Operator }}\"\n{{- end }}\n{{- if .Value }}\n value: \"{{ .Value }}\"\n{{- end }}\n{{- if .Effect }}\n effect: \"{{ .Effect }}\"\n{{- end }}\n{{- if .TolerationSeconds }}\n tolerationSeconds: {{ .TolerationSeconds }}\n{{- end }}\n{{- end }}" cp config/operator/managers.yaml bindata/operator/ cp config/operator/rabbit.yaml bindata/operator/ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/rbac > bindata/rbac/rbac.yaml /bin/bash hack/sync-bindata.sh + BINDATA_GIT_ADD= + OUT_DATA=bindata + EXTRACT_DIR=tmp/bindata + LOCAL_BINARIES=/home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin + mkdir -p tmp/bindata + mkdir -p bindata/crds ++ hack/pin-bundle-images.sh ++ tr , ' ' + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/barbican-operator-bundle:f8d7a89585552e59e40b47fea910778fb261562f dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:6f892e71de6710b2ec752c11d8e5f0e1db7514fb402430f25cf7874047488b83 Copying config sha256:e344a8f0f36e518799f8d2e3586bfa0d8bf830dfe4df5ed0b01246e7a975b182 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/6f892e71de6710b2ec752c11d8e5f0e1db7514fb402430f25cf7874047488b83 tmp/bindata/tmp/e344a8f0f36e518799f8d2e3586bfa0d8bf830dfe4df5ed0b01246e7a975b182 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/6f892e71de6710b2ec752c11d8e5f0e1db7514fb402430f25cf7874047488b83 -C bindata// manifests/ manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/cinder-operator-bundle:4d22369cc19cfd54313d44c10e4adc69dc86620b dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:69b445222f4fddf3729d9dc46b43e2875e1cdee7bbb59c13c942c629063a76c0 Copying config sha256:be642ee55d6b2b4325d0b256196bf336d51d644c09df4f81aaf9320f17117c67 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/69b445222f4fddf3729d9dc46b43e2875e1cdee7bbb59c13c942c629063a76c0 tmp/bindata/tmp/be642ee55d6b2b4325d0b256196bf336d51d644c09df4f81aaf9320f17117c67 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/69b445222f4fddf3729d9dc46b43e2875e1cdee7bbb59c13c942c629063a76c0 -C bindata// manifests/ manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cindervolumes.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/designate-operator-bundle:933871ae527c43734b47983eb00969dbfd8704b0 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:9fdb9b9442bd7ecf9ed94b945f1b2f7bb8646e47d02cd7032f5c1951ed8dd78b Copying config sha256:018561eccfaeb44d36d07ba3457b9a7018575f5353627fae6a7e87b8cf10e29c Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/018561eccfaeb44d36d07ba3457b9a7018575f5353627fae6a7e87b8cf10e29c tmp/bindata/tmp/9fdb9b9442bd7ecf9ed94b945f1b2f7bb8646e47d02cd7032f5c1951ed8dd78b tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/9fdb9b9442bd7ecf9ed94b945f1b2f7bb8646e47d02cd7032f5c1951ed8dd78b -C bindata// manifests/ manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-manager-config_v1_configmap.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/glance-operator-bundle:5f00daf61ab6031212c628588eca629917d3c5cb dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:a18f63046c91e878ce4dd7ad9556d563ed8fa3da9e2e7d2114cff1456df05cd7 Copying config sha256:dfb22a18fc870b2c84e3b60ba269270ac6aba3cc92bf74b5c441775d5ce4293d Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/a18f63046c91e878ce4dd7ad9556d563ed8fa3da9e2e7d2114cff1456df05cd7 tmp/bindata/tmp/dfb22a18fc870b2c84e3b60ba269270ac6aba3cc92bf74b5c441775d5ce4293d tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/a18f63046c91e878ce4dd7ad9556d563ed8fa3da9e2e7d2114cff1456df05cd7 -C bindata// manifests/ manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-manager-config_v1_configmap.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/heat-operator-bundle:98abaabee512033b04be3ff6a08ac63aa3a4c99e dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:2e70382125e6bf3e32ecbacb257d0e09fdf5568c0cae641d8fe3b118993b7892 Copying config sha256:3d825c4c318e02f9d26a03169478f475ba935d0f7a97ca8ba150d8eaa0c9ccd7 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/2e70382125e6bf3e32ecbacb257d0e09fdf5568c0cae641d8fe3b118993b7892 tmp/bindata/tmp/3d825c4c318e02f9d26a03169478f475ba935d0f7a97ca8ba150d8eaa0c9ccd7 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/2e70382125e6bf3e32ecbacb257d0e09fdf5568c0cae641d8fe3b118993b7892 -C bindata// manifests/ manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-manager-config_v1_configmap.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/horizon-operator-bundle:d9c19d01a24472c5e7479a5cfd000e34d6e9ce80 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:e58fe088f2c8728c1a9143354dd35168138fb78b4c877c6bb36ba483e906e297 Copying config sha256:28a2dc6c2d94ab2bd9c8fdb3857331fa7563a47c223ac7c1f4fbc35df752be16 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/28a2dc6c2d94ab2bd9c8fdb3857331fa7563a47c223ac7c1f4fbc35df752be16 tmp/bindata/tmp/e58fe088f2c8728c1a9143354dd35168138fb78b4c877c6bb36ba483e906e297 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/e58fe088f2c8728c1a9143354dd35168138fb78b4c877c6bb36ba483e906e297 -C bindata// manifests/ manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon.openstack.org_horizons.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/infra-operator-bundle:63860ee1375c38462801e8341a7f18335169f94c dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:4d3beeef6cdac913af405d9d5f5159e8bb76df130b558f6d9e2a25ce95bfe153 Copying config sha256:d985bfe87ce70d40456a24ac6e7bc30bc8ddfb0850a333d8431a021b17b89099 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ cut -f 1 -d : ++ file tmp/bindata/tmp/4d3beeef6cdac913af405d9d5f5159e8bb76df130b558f6d9e2a25ce95bfe153 tmp/bindata/tmp/d985bfe87ce70d40456a24ac6e7bc30bc8ddfb0850a333d8431a021b17b89099 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/4d3beeef6cdac913af405d9d5f5159e8bb76df130b558f6d9e2a25ce95bfe153 -C bindata// manifests/ manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/topology.openstack.org_topologies.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/ironic-operator-bundle:5787f68763a8f2c9cb5fa5dd6f5f6543ecea7ff0 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:038cd6b4732cbbae4eb2baa26b6899869348111706dc4f5d571f0fef318c4312 Copying config sha256:5312cd7988f2a43ae515b419fbe7bcade5fa4e46df97a3b7b55541a9ecf103b9 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/038cd6b4732cbbae4eb2baa26b6899869348111706dc4f5d571f0fef318c4312 tmp/bindata/tmp/5312cd7988f2a43ae515b419fbe7bcade5fa4e46df97a3b7b55541a9ecf103b9 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/038cd6b4732cbbae4eb2baa26b6899869348111706dc4f5d571f0fef318c4312 -C bindata// manifests/ manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-manager-config_v1_configmap.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/keystone-operator-bundle:bb6ae13a35cf44e06877bdea64d87898b2d16954 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:a18ad8031b4a44791a74a19aa7e391f47e9588d5b8e5bcaa42bf337d0f52149b Copying config sha256:5ecf88e4a094443bd21ba8af1a6eb630b9cd9f71e25dcca0632990610b918fbc Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/5ecf88e4a094443bd21ba8af1a6eb630b9cd9f71e25dcca0632990610b918fbc tmp/bindata/tmp/a18ad8031b4a44791a74a19aa7e391f47e9588d5b8e5bcaa42bf337d0f52149b tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/a18ad8031b4a44791a74a19aa7e391f47e9588d5b8e5bcaa42bf337d0f52149b -C bindata// manifests/ manifests/keystone-operator-controller-manager-metrics-service_v1_service.yaml manifests/keystone-operator-manager-config_v1_configmap.yaml manifests/keystone-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-webhook-service_v1_service.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/keystone.openstack.org_keystoneapis.yaml manifests/keystone.openstack.org_keystoneendpoints.yaml manifests/keystone.openstack.org_keystoneservices.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/manila-operator-bundle:89ef3a955f0620c24812836ea14cd7890375e229 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:bbba45e0316e448abd2461d30ab3d4cc90efc7b42275fb07dca6860b0dcacaf2 Copying config sha256:499d833df0395fc8fdf02fe1a4d91130ebe224e5e5f661203fe9a62027dc95e2 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/499d833df0395fc8fdf02fe1a4d91130ebe224e5e5f661203fe9a62027dc95e2 tmp/bindata/tmp/bbba45e0316e448abd2461d30ab3d4cc90efc7b42275fb07dca6860b0dcacaf2 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/bbba45e0316e448abd2461d30ab3d4cc90efc7b42275fb07dca6860b0dcacaf2 -C bindata// manifests/ manifests/manila-operator-controller-manager-metrics-service_v1_service.yaml manifests/manila-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/manila-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-webhook-service_v1_service.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/manila.openstack.org_manilaapis.yaml manifests/manila.openstack.org_manilas.yaml manifests/manila.openstack.org_manilaschedulers.yaml manifests/manila.openstack.org_manilashares.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/mariadb-operator-bundle:372c660c067b21e7c23fdf24c29d5d5f82ec8007 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:33692d0e099d08b64d52b9771ee862a28b465e483ef65b4d00398732de945e2e Copying config sha256:3ad6d615241913bb88bde0f738b60194640739c3dd3495b06f9531691b5433e5 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/33692d0e099d08b64d52b9771ee862a28b465e483ef65b4d00398732de945e2e tmp/bindata/tmp/3ad6d615241913bb88bde0f738b60194640739c3dd3495b06f9531691b5433e5 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/33692d0e099d08b64d52b9771ee862a28b465e483ef65b4d00398732de945e2e -C bindata// manifests/ manifests/mariadb-operator-controller-manager-metrics-service_v1_service.yaml manifests/mariadb-operator-manager-config_v1_configmap.yaml manifests/mariadb-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-webhook-service_v1_service.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/mariadb.openstack.org_galerabackups.yaml manifests/mariadb.openstack.org_galeras.yaml manifests/mariadb.openstack.org_mariadbaccounts.yaml manifests/mariadb.openstack.org_mariadbdatabases.yaml manifests/neutrondb-secret_v1_secret.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/neutron-operator-bundle:7d72ab5e2ae4d2e0daec9c86bcf6d2d283f19ca0 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:c33fe35489d1435af218eca5c484d2fef4b43f111a1913f924593290f6416920 Copying config sha256:17a853d0115fb520f40a85830b51d68ef04dbb97fa54251e40ed4255aabfcdba Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/17a853d0115fb520f40a85830b51d68ef04dbb97fa54251e40ed4255aabfcdba tmp/bindata/tmp/c33fe35489d1435af218eca5c484d2fef4b43f111a1913f924593290f6416920 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/c33fe35489d1435af218eca5c484d2fef4b43f111a1913f924593290f6416920 -C bindata// manifests/ manifests/neutron-operator-controller-manager-metrics-service_v1_service.yaml manifests/neutron-operator-manager-config_v1_configmap.yaml manifests/neutron-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-webhook-service_v1_service.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/neutron.openstack.org_neutronapis.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/nova-operator-bundle:c0615f12de18358400f93160d231a9d1d3e39791 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:a69ce7bf938710b4a74b30dfb277915fddb69a1eee5ff9fb7c1d36a629bf937d Copying config sha256:ea1928e49ac3af76ea12d94c6dae07467a8ee18fa187d451607a74949bee96be Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/a69ce7bf938710b4a74b30dfb277915fddb69a1eee5ff9fb7c1d36a629bf937d tmp/bindata/tmp/ea1928e49ac3af76ea12d94c6dae07467a8ee18fa187d451607a74949bee96be tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/a69ce7bf938710b4a74b30dfb277915fddb69a1eee5ff9fb7c1d36a629bf937d -C bindata// manifests/ manifests/nova-operator-controller-manager-metrics-service_v1_service.yaml manifests/nova-operator-manager-config_v1_configmap.yaml manifests/nova-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-webhook-service_v1_service.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/nova.openstack.org_nova.yaml manifests/nova.openstack.org_novaapis.yaml manifests/nova.openstack.org_novacells.yaml manifests/nova.openstack.org_novacomputes.yaml manifests/nova.openstack.org_novaconductors.yaml manifests/nova.openstack.org_novametadata.yaml manifests/nova.openstack.org_novanovncproxies.yaml manifests/nova.openstack.org_novaschedulers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/octavia-operator-bundle:ebfa5abc85f932bbc8f682d8519614cdc0a0aab4 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:5998c8898dd262f4a624773d3352a490e75de807cfb24a5d3497eb8d88624de4 Copying config sha256:1502c628739e77876f00a45cb70d225bf477737792a25ab88ec2f36956a10ed3 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/1502c628739e77876f00a45cb70d225bf477737792a25ab88ec2f36956a10ed3 tmp/bindata/tmp/5998c8898dd262f4a624773d3352a490e75de807cfb24a5d3497eb8d88624de4 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/5998c8898dd262f4a624773d3352a490e75de807cfb24a5d3497eb8d88624de4 -C bindata// manifests/ manifests/octavia-operator-controller-manager-metrics-service_v1_service.yaml manifests/octavia-operator-manager-config_v1_configmap.yaml manifests/octavia-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-webhook-service_v1_service.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/octavia.openstack.org_octaviaamphoracontrollers.yaml manifests/octavia.openstack.org_octaviaapis.yaml manifests/octavia.openstack.org_octaviarsyslogs.yaml manifests/octavia.openstack.org_octavias.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/openstack-baremetal-operator-bundle:73411ba262221bf7c55117ca16717368be5dcfe1 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:4335412ac5ebe3775bb70d8fdad5d6895b200c6505d97316f87f3d12a7b6667e Copying config sha256:cf9c7d0311907844d5c18da337792b7b3e2532dede62f1ddf8b24e0e0156098f Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/4335412ac5ebe3775bb70d8fdad5d6895b200c6505d97316f87f3d12a7b6667e tmp/bindata/tmp/cf9c7d0311907844d5c18da337792b7b3e2532dede62f1ddf8b24e0e0156098f tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/4335412ac5ebe3775bb70d8fdad5d6895b200c6505d97316f87f3d12a7b6667e -C bindata// manifests/ manifests/baremetal.openstack.org_openstackbaremetalsets.yaml manifests/baremetal.openstack.org_openstackprovisionservers.yaml manifests/openstack-baremetal-operator-controller-manager-metrics-service_v1_service.yaml manifests/openstack-baremetal-operator-manager-config_v1_configmap.yaml manifests/openstack-baremetal-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-webhook-service_v1_service.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/ovn-operator-bundle:83a344ba973278edcb97165c45d0b18441747dc2 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:5655f2ce4b7453e652c0bb65aae0ba4f5b30e3b82b8839dfae6d90aee5384b9d Copying config sha256:9f449c2169e2ba3fb40718dcfb1ec80c8e451a13a861853dcd26bf697aa0d4f5 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/5655f2ce4b7453e652c0bb65aae0ba4f5b30e3b82b8839dfae6d90aee5384b9d tmp/bindata/tmp/9f449c2169e2ba3fb40718dcfb1ec80c8e451a13a861853dcd26bf697aa0d4f5 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/5655f2ce4b7453e652c0bb65aae0ba4f5b30e3b82b8839dfae6d90aee5384b9d -C bindata// manifests/ manifests/ovn-operator-controller-manager-metrics-service_v1_service.yaml manifests/ovn-operator-manager-config_v1_configmap.yaml manifests/ovn-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-webhook-service_v1_service.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/ovn.openstack.org_ovncontrollers.yaml manifests/ovn.openstack.org_ovndbclusters.yaml manifests/ovn.openstack.org_ovnnorthds.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/placement-operator-bundle:a0180c9d1d512481f57dbba74ffcd0cc8f92f78e dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:a75cc2697c5361279dbaaadc442f6b1d475304bccd5e9e7c1813ad2304cbb633 Copying config sha256:a62af494a8e2c6715b79eac04c3d6d8a5df3d4e56b4001919d73be0c223d0670 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/a62af494a8e2c6715b79eac04c3d6d8a5df3d4e56b4001919d73be0c223d0670 tmp/bindata/tmp/a75cc2697c5361279dbaaadc442f6b1d475304bccd5e9e7c1813ad2304cbb633 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/a75cc2697c5361279dbaaadc442f6b1d475304bccd5e9e7c1813ad2304cbb633 -C bindata// manifests/ manifests/placement-operator-controller-manager-metrics-service_v1_service.yaml manifests/placement-operator-manager-config_v1_configmap.yaml manifests/placement-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-webhook-service_v1_service.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/placement.openstack.org_placementapis.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/swift-operator-bundle:307e78eb9c16b5948ca02dc4a4d53a28abb32a8d dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:fea41bb7d7e8a3585649607edc454beb2ca96be14dc75b7dda5a3319d0f3ddb5 Copying config sha256:88ff2c938d550534a860bc7214eebc5701fbbf09c1cadf3f1a1fe59c9d5b1e22 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/88ff2c938d550534a860bc7214eebc5701fbbf09c1cadf3f1a1fe59c9d5b1e22 tmp/bindata/tmp/fea41bb7d7e8a3585649607edc454beb2ca96be14dc75b7dda5a3319d0f3ddb5 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/fea41bb7d7e8a3585649607edc454beb2ca96be14dc75b7dda5a3319d0f3ddb5 -C bindata// manifests/ manifests/swift-operator-controller-manager-metrics-service_v1_service.yaml manifests/swift-operator-manager-config_v1_configmap.yaml manifests/swift-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-role_rbac.authorization.k8s.io_v1_role.yaml manifests/swift-operator-swift-rolebinding_rbac.authorization.k8s.io_v1_rolebinding.yaml manifests/swift-operator-swift_v1_serviceaccount.yaml manifests/swift-operator-webhook-service_v1_service.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/swift.openstack.org_swiftproxies.yaml manifests/swift.openstack.org_swiftrings.yaml manifests/swift.openstack.org_swifts.yaml manifests/swift.openstack.org_swiftstorages.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/telemetry-operator-bundle:9443999b075b2cffb798f75e21c43085755895cc dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:be40b6929fe7d0d735ba947c10045a267ddde625c9beb3523991576ec960121f Copying config sha256:f70be552f5e0d4921b4759f69d327e5a623206daa4b787d52126307ffbe9c044 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/be40b6929fe7d0d735ba947c10045a267ddde625c9beb3523991576ec960121f tmp/bindata/tmp/f70be552f5e0d4921b4759f69d327e5a623206daa4b787d52126307ffbe9c044 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/be40b6929fe7d0d735ba947c10045a267ddde625c9beb3523991576ec960121f -C bindata// manifests/ manifests/telemetry-operator-controller-manager-metrics-service_v1_service.yaml manifests/telemetry-operator-manager-config_v1_configmap.yaml manifests/telemetry-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-webhook-service_v1_service.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/telemetry.openstack.org_autoscalings.yaml manifests/telemetry.openstack.org_ceilometers.yaml manifests/telemetry.openstack.org_loggings.yaml manifests/telemetry.openstack.org_metricstorages.yaml manifests/telemetry.openstack.org_telemetries.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/test-operator-bundle:3778b2fa97cfc3465c9a30a9800b687a38bec965 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:891dabc3edb45ae3e677066146ede3100a9f4431d389f92f4aa0258ce8181f1e Copying config sha256:00fcf418049e375770d1a76864eadf206068f9b54ade4b8dbb32ec91bb630bea Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/00fcf418049e375770d1a76864eadf206068f9b54ade4b8dbb32ec91bb630bea tmp/bindata/tmp/891dabc3edb45ae3e677066146ede3100a9f4431d389f92f4aa0258ce8181f1e tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/891dabc3edb45ae3e677066146ede3100a9f4431d389f92f4aa0258ce8181f1e -C bindata// manifests/ manifests/test-operator-controller-manager-metrics-service_v1_service.yaml manifests/test-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-webhook-service_v1_service.yaml manifests/test-operator.clusterserviceversion.yaml manifests/test.openstack.org_ansibletests.yaml manifests/test.openstack.org_horizontests.yaml manifests/test.openstack.org_tempests.yaml manifests/test.openstack.org_tobikoes.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://38.102.83.190:5001/openstack-k8s-operators/watcher-operator-bundle:4a08866b9ae580903972e7a05a777c7854b3ead8 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:542d3f26d1128840182272748ba410312e83a7612f81cf354f4b495145753ef8 Copying blob sha256:7272049fa10b183c5dc866a0881a2b52d914f8d83e411607efc831e3ba4931cd Copying blob sha256:0166e4cc477b720c02afd771bc76656c68a3283dc66cc9298fc4f9c59155c46f Copying config sha256:9bc7da0fadff7f2041dfdbf337fefcf7faf184d4a764f7d77f314bd1dcee925e Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/0166e4cc477b720c02afd771bc76656c68a3283dc66cc9298fc4f9c59155c46f tmp/bindata/tmp/542d3f26d1128840182272748ba410312e83a7612f81cf354f4b495145753ef8 tmp/bindata/tmp/7272049fa10b183c5dc866a0881a2b52d914f8d83e411607efc831e3ba4931cd tmp/bindata/tmp/9bc7da0fadff7f2041dfdbf337fefcf7faf184d4a764f7d77f314bd1dcee925e tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/0166e4cc477b720c02afd771bc76656c68a3283dc66cc9298fc4f9c59155c46f -C bindata// metadata/ metadata/annotations.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/542d3f26d1128840182272748ba410312e83a7612f81cf354f4b495145753ef8 -C bindata// tests/ tests/scorecard/ tests/scorecard/config.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/7272049fa10b183c5dc866a0881a2b52d914f8d83e411607efc831e3ba4931cd -C bindata// manifests/ manifests/watcher-operator-controller-manager-metrics-service_v1_service.yaml manifests/watcher-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-webhook-service_v1_service.yaml manifests/watcher-operator.clusterserviceversion.yaml manifests/watcher.openstack.org_watcherapis.yaml manifests/watcher.openstack.org_watcherappliers.yaml manifests/watcher.openstack.org_watcherdecisionengines.yaml manifests/watcher.openstack.org_watchers.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-bundle@sha256:1612b82e274827281af1d64740a7d52e21745bc74c91d5149f111135d8e7779f dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 Copying config sha256:baa066a30ba9ac2197a4cfa15a73324d1d8b45766ea3f20106a751a2713002a7 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/baa066a30ba9ac2197a4cfa15a73324d1d8b45766ea3f20106a751a2713002a7 tmp/bindata/tmp/cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 -C bindata// manifests/ manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-service-binding-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/rabbitmq.com_rabbitmqclusters.yaml metadata/ metadata/annotations.yaml metadata/properties.yaml + cd bindata + xargs -I % sh -c 'cp % ./crds/' + grep -l CustomResourceDefinition manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/baremetal.openstack.org_openstackbaremetalsets.yaml manifests/baremetal.openstack.org_openstackprovisionservers.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cindervolumes.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-manager-config_v1_configmap.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-manager-config_v1_configmap.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-manager-config_v1_configmap.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/horizon.openstack.org_horizons.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-manager-config_v1_configmap.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/keystone.openstack.org_keystoneapis.yaml manifests/keystone.openstack.org_keystoneendpoints.yaml manifests/keystone.openstack.org_keystoneservices.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/keystone-operator-controller-manager-metrics-service_v1_service.yaml manifests/keystone-operator-manager-config_v1_configmap.yaml manifests/keystone-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-webhook-service_v1_service.yaml manifests/manila.openstack.org_manilaapis.yaml manifests/manila.openstack.org_manilaschedulers.yaml manifests/manila.openstack.org_manilashares.yaml manifests/manila.openstack.org_manilas.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/manila-operator-controller-manager-metrics-service_v1_service.yaml manifests/manila-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/manila-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-webhook-service_v1_service.yaml manifests/mariadb.openstack.org_galerabackups.yaml manifests/mariadb.openstack.org_galeras.yaml manifests/mariadb.openstack.org_mariadbaccounts.yaml manifests/mariadb.openstack.org_mariadbdatabases.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/mariadb-operator-controller-manager-metrics-service_v1_service.yaml manifests/mariadb-operator-manager-config_v1_configmap.yaml manifests/mariadb-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-webhook-service_v1_service.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/neutrondb-secret_v1_secret.yaml manifests/neutron.openstack.org_neutronapis.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/neutron-operator-controller-manager-metrics-service_v1_service.yaml manifests/neutron-operator-manager-config_v1_configmap.yaml manifests/neutron-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-webhook-service_v1_service.yaml manifests/nova.openstack.org_novaapis.yaml manifests/nova.openstack.org_novacells.yaml manifests/nova.openstack.org_novacomputes.yaml manifests/nova.openstack.org_novaconductors.yaml manifests/nova.openstack.org_novametadata.yaml manifests/nova.openstack.org_novanovncproxies.yaml manifests/nova.openstack.org_novaschedulers.yaml manifests/nova.openstack.org_nova.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/nova-operator-controller-manager-metrics-service_v1_service.yaml manifests/nova-operator-manager-config_v1_configmap.yaml manifests/nova-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-webhook-service_v1_service.yaml manifests/octavia.openstack.org_octaviaamphoracontrollers.yaml manifests/octavia.openstack.org_octaviaapis.yaml manifests/octavia.openstack.org_octaviarsyslogs.yaml manifests/octavia.openstack.org_octavias.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/octavia-operator-controller-manager-metrics-service_v1_service.yaml manifests/octavia-operator-manager-config_v1_configmap.yaml manifests/octavia-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-webhook-service_v1_service.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator-controller-manager-metrics-service_v1_service.yaml manifests/openstack-baremetal-operator-manager-config_v1_configmap.yaml manifests/openstack-baremetal-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-webhook-service_v1_service.yaml manifests/ovn.openstack.org_ovncontrollers.yaml manifests/ovn.openstack.org_ovndbclusters.yaml manifests/ovn.openstack.org_ovnnorthds.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/ovn-operator-controller-manager-metrics-service_v1_service.yaml manifests/ovn-operator-manager-config_v1_configmap.yaml manifests/ovn-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-webhook-service_v1_service.yaml manifests/placement.openstack.org_placementapis.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/placement-operator-controller-manager-metrics-service_v1_service.yaml manifests/placement-operator-manager-config_v1_configmap.yaml manifests/placement-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-webhook-service_v1_service.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-service-binding-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/rabbitmq.com_rabbitmqclusters.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/swift.openstack.org_swiftproxies.yaml manifests/swift.openstack.org_swiftrings.yaml manifests/swift.openstack.org_swiftstorages.yaml manifests/swift.openstack.org_swifts.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/swift-operator-controller-manager-metrics-service_v1_service.yaml manifests/swift-operator-manager-config_v1_configmap.yaml manifests/swift-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-rolebinding_rbac.authorization.k8s.io_v1_rolebinding.yaml manifests/swift-operator-swift-role_rbac.authorization.k8s.io_v1_role.yaml manifests/swift-operator-swift_v1_serviceaccount.yaml manifests/swift-operator-webhook-service_v1_service.yaml manifests/telemetry.openstack.org_autoscalings.yaml manifests/telemetry.openstack.org_ceilometers.yaml manifests/telemetry.openstack.org_loggings.yaml manifests/telemetry.openstack.org_metricstorages.yaml manifests/telemetry.openstack.org_telemetries.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/telemetry-operator-controller-manager-metrics-service_v1_service.yaml manifests/telemetry-operator-manager-config_v1_configmap.yaml manifests/telemetry-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-webhook-service_v1_service.yaml manifests/test.openstack.org_ansibletests.yaml manifests/test.openstack.org_horizontests.yaml manifests/test.openstack.org_tempests.yaml manifests/test.openstack.org_tobikoes.yaml manifests/test-operator.clusterserviceversion.yaml manifests/test-operator-controller-manager-metrics-service_v1_service.yaml manifests/test-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-webhook-service_v1_service.yaml manifests/topology.openstack.org_topologies.yaml manifests/watcher.openstack.org_watcherapis.yaml manifests/watcher.openstack.org_watcherappliers.yaml manifests/watcher.openstack.org_watcherdecisionengines.yaml manifests/watcher.openstack.org_watchers.yaml manifests/watcher-operator.clusterserviceversion.yaml manifests/watcher-operator-controller-manager-metrics-service_v1_service.yaml manifests/watcher-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-webhook-service_v1_service.yaml ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/test-operator.clusterserviceversion.yaml manifests/watcher-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=barbican-operator + echo barbican-operator barbican-operator ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis - barbicankeystonelisteners - barbicans - barbicanworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis/finalizers - barbicankeystonelisteners/finalizers - barbicans/finalizers - barbicanworkers/finalizers verbs: - patch - update - apiGroups: - barbican.openstack.org resources: - barbicanapis/status - barbicankeystonelisteners/status - barbicans/status - barbicanworkers/status verbs: - get - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ barbican-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ barbican-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/cinder-operator.clusterserviceversion.yaml + OPERATOR_NAME=cinder-operator + echo cinder-operator cinder-operator ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis - cinderbackups - cinders - cinderschedulers - cindervolumes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis/finalizers - cinderbackups/finalizers - cinders/finalizers - cinderschedulers/finalizers - cindervolumes/finalizers verbs: - patch - update - apiGroups: - cinder.openstack.org resources: - cinderapis/status - cinderbackups/status - cinders/status - cinderschedulers/status - cindervolumes/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ cinder-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ cinder-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/designate-operator.clusterserviceversion.yaml + OPERATOR_NAME=designate-operator + echo designate-operator designate-operator ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis - designatebackendbind9s - designatecentrals - designatemdnses - designateproducers - designates - designateunbounds - designateworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis/finalizers - designatebackendbind9s/finalizers - designatecentrals/finalizers - designatemdnses/finalizers - designateproducers/finalizers - designates/finalizers - designateunbounds/finalizers - designateworkers/finalizers verbs: - patch - update - apiGroups: - designate.openstack.org resources: - designateapis/status - designatebackendbind9s/status - designatecentrals/status - designatemdnses/status - designateproducers/status - designates/status - designateunbounds/status - designateworkers/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ designate-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ designate-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=glance-operator + echo glance-operator glance-operator ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets/status verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinders verbs: - get - list - watch - apiGroups: - glance.openstack.org resources: - glanceapis - glances verbs: - create - delete - get - list - patch - update - watch - apiGroups: - glance.openstack.org resources: - glanceapis/finalizers - glances/finalizers verbs: - patch - update - apiGroups: - glance.openstack.org resources: - glanceapis/status - glances/status verbs: - get - patch - update - apiGroups: - horizon.openstack.org resources: - horizons verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ glance-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ glance-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=heat-operator + echo heat-operator heat-operator ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis - heatcfnapis - heatengines - heats verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis/finalizers - heatcfnapis/finalizers - heatengines/finalizers - heats/finalizers verbs: - patch - update - apiGroups: - heat.openstack.org resources: - heatapis/status - heatcfnapis/status - heatengines/status - heats/status verbs: - get - patch - update - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ heat-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ heat-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=horizon-operator + echo horizon-operator horizon-operator ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons/finalizers verbs: - patch - update - apiGroups: - horizon.openstack.org resources: - horizons/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis - keystoneendpoints - keystoneservices verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - hostmount-anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ horizon-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ horizon-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=infra-operator + echo infra-operator infra-operator ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - config.openshift.io resources: - networks verbs: - get - list - watch - apiGroups: - frrk8s.metallb.io resources: - frrconfigurations verbs: - create - delete - deletecollection - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas verbs: - create - delete - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas/finalizers verbs: - patch - update - apiGroups: - instanceha.openstack.org resources: - instancehas/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - create - delete - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - bgpconfigurations - dnsdata - dnsdatas - dnsmasqs - ipsets - reservations - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - network.openstack.org resources: - bgpconfigurations/finalizers verbs: - update - apiGroups: - network.openstack.org resources: - bgpconfigurations/status - dnsdata/status - dnsmasqs/status - ipsets/status - services/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - dnsdata/finalizers - dnsmasqs/finalizers - ipsets/finalizers - reservations/finalizers - services/finalizers verbs: - patch - update - apiGroups: - network.openstack.org resources: - netconfigs verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqs - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqs/finalizers - transporturls/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqs/status - transporturls/status verbs: - get - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises/finalizers verbs: - update - apiGroups: - redis.openstack.org resources: - redises/status verbs: - get - patch - update - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ infra-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + write_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator + local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml + local OPERATOR_NAME=infra-operator ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator MutatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=MutatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "MutatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' ++ sed -e 's|.*generateName:| name:|' + MUTATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: mdnsmasq.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: minstanceha.kb.io rules: - apiGroups: - client.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-client-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: mipset.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: mmemcached.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: mnetconfig.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmq.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: mredis.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: mreservation.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-reservation' ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator ValidatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=ValidatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "ValidatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' ++ sed -e 's| - v1| - v1|' + VALIDATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: vdnsmasq.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: vinstanceha.kb.io rules: - apiGroups: - client.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-client-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: vipset.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: vmemcached.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: vnetconfig.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE - DELETE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmq.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: vredis.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: vreservation.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-reservation' + cat + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=ironic-operator + echo ironic-operator ironic-operator ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis - ironicconductors - ironicinspectors - ironicneutronagents - ironics verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis/finalizers - ironicconductors/finalizers - ironicinspectors/finalizers - ironicneutronagents/finalizers - ironics/finalizers verbs: - patch - update - apiGroups: - ironic.openstack.org resources: - ironicapis/status - ironicconductors/status - ironicinspectors/status - ironicneutronagents/status - ironics/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - operator.openshift.io resources: - ingresscontrollers verbs: - get - list - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ ironic-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ ironic-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/keystone-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=keystone-operator + echo keystone-operator keystone-operator ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis/finalizers - keystoneendpoints/finalizers - keystoneservices/finalizers verbs: - patch - update - apiGroups: - keystone.openstack.org resources: - keystoneapis/status - keystoneendpoints/status - keystoneservices/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ keystone-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ keystone-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/manila-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=manila-operator + echo manila-operator manila-operator ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - manila.openstack.org resources: - manilaapis - manilas - manilaschedulers - manilashares verbs: - create - delete - get - list - patch - update - watch - apiGroups: - manila.openstack.org resources: - manilaapis/finalizers - manilas/finalizers - manilaschedulers/finalizers - manilashares/finalizers verbs: - patch - update - apiGroups: - manila.openstack.org resources: - manilaapis/status - manilas/status - manilaschedulers/status - manilashares/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ manila-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ manila-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/mariadb-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=mariadb-operator + echo mariadb-operator mariadb-operator ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - cronjobs - endpoints - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets/status verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galerabackups - galeras - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galerabackups/finalizers verbs: - update - apiGroups: - mariadb.openstack.org resources: - galerabackups/status - mariadbaccounts/status - mariadbdatabases/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - galeras/finalizers - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - mariadb.openstack.org resources: - galeras/status verbs: - get - list - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ mariadb-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ mariadb-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/neutron-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=neutron-operator + echo neutron-operator neutron-operator ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - neutron.openstack.org resources: - neutronapis verbs: - create - delete - get - list - patch - update - watch - apiGroups: - neutron.openstack.org resources: - neutronapis/finalizers verbs: - patch - update - apiGroups: - neutron.openstack.org resources: - neutronapis/status verbs: - get - patch - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ neutron-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ neutron-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/nova-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=nova-operator + echo nova-operator nova-operator ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - nova.openstack.org resources: - nova - novaapis - novacells - novacomputes - novaconductors - novametadata - novanovncproxies - novaschedulers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - nova.openstack.org resources: - nova/finalizers - novaapis/finalizers - novacells/finalizers - novacomputes/finalizers - novaconductors/finalizers - novametadata/finalizers - novanovncproxies/finalizers - novaschedulers/finalizers verbs: - patch - update - apiGroups: - nova.openstack.org resources: - nova/status - novaapis/status - novacells/status - novacomputes/status - novaconductors/status - novametadata/status - novanovncproxies/status - novaschedulers/status verbs: - get - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ nova-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ nova-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/octavia-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=octavia-operator + echo octavia-operator octavia-operator ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - daemonsets - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers - octaviaapis - octaviarsyslogs - octavias verbs: - create - delete - get - list - patch - update - watch - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers/finalizers - octaviaapis/finalizers - octavias/finalizers verbs: - patch - update - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers/status - octaviaapis/status - octaviarsyslogs/status - octavias/status verbs: - get - patch - update - apiGroups: - octavia.openstack.org resources: - octaviarsyslogs/finalizers verbs: - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - hostmount-anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ octavia-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ octavia-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=openstack-baremetal-operator + echo openstack-baremetal-operator openstack-baremetal-operator ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - configmaps/finalizers - pods - secrets - secrets/finalizers - volumes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets - openstackprovisionservers - openstackprovisionservers/finalizers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets/finalizers verbs: - patch - update - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets/status verbs: - get - patch - update - apiGroups: - baremetal.openstack.org resources: - openstackprovisionservers/status verbs: - get - list - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - metal3.io resources: - baremetalhosts verbs: - get - list - patch - update - watch - apiGroups: - metal3.io resources: - baremetalhosts/status verbs: - get - apiGroups: - metal3.io resources: - provisionings verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - hostnetwork resources: - securitycontextconstraints verbs: - use - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ openstack-baremetal-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ openstack-baremetal-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + write_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator + local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml + local OPERATOR_NAME=openstack-baremetal-operator ++ extract_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator MutatingAdmissionWebhook ++ local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=openstack-baremetal-operator ++ local TYPE=MutatingAdmissionWebhook ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "MutatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: openstack-baremetal-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + MUTATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: mopenstackprovisionserver.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackprovisionservers sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-baremetal-openstack-org-v1beta1-openstackprovisionserver' ++ extract_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator ValidatingAdmissionWebhook ++ local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=openstack-baremetal-operator ++ local TYPE=ValidatingAdmissionWebhook ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "ValidatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: openstack-baremetal-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + VALIDATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: vopenstackbaremetalset.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE - DELETE resources: - openstackbaremetalsets sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-baremetal-openstack-org-v1beta1-openstackbaremetalset - admissionReviewVersions: - v1 failurePolicy: Fail name: vopenstackprovisionserver.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackprovisionservers sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-baremetal-openstack-org-v1beta1-openstackprovisionserver' + cat + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ovn-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=ovn-operator + echo ovn-operator ovn-operator ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - daemonsets - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - delete - get - list - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - create - delete - get - list - patch - update - watch - apiGroups: - network.openstack.org resources: - dnsdata verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ovn.openstack.org resources: - ovncontroller verbs: - watch - apiGroups: - ovn.openstack.org resources: - ovncontrollers - ovndbclusters - ovnnorthds verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ovn.openstack.org resources: - ovncontrollers/finalizers - ovndbclusters/finalizers - ovnnorthds/finalizers verbs: - patch - update - apiGroups: - ovn.openstack.org resources: - ovncontrollers/status - ovnnorthds/status verbs: - get - patch - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters/status verbs: - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - restricted-v2 resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ ovn-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ ovn-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=placement-operator + echo placement-operator placement-operator ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - placement.openstack.org resources: - placementapis verbs: - create - delete - get - list - patch - update - watch - apiGroups: - placement.openstack.org resources: - placementapis/finalizers verbs: - patch - update - apiGroups: - placement.openstack.org resources: - placementapis/status verbs: - get - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ placement-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ placement-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=rabbitmq-cluster-operator + echo rabbitmq-cluster-operator rabbitmq-cluster-operator ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create' ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - secrets - serviceaccounts - services verbs: - create - get - list - update - watch - apiGroups: - "" resources: - endpoints verbs: - get - list - watch - apiGroups: - "" resources: - events verbs: - create - get - patch - apiGroups: - "" resources: - pods verbs: - get - list - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - create - get - list - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters/finalizers verbs: - update - apiGroups: - rabbitmq.com resources: - rabbitmqclusters/status verbs: - get - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - update - watch' + [[ rabbitmq-cluster-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ rabbitmq-cluster-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/swift-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=swift-operator + echo swift-operator swift-operator ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - apiGroups: - "" resources: - persistentvolumeclaims - pods verbs: - get - list - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - '\''*'\'' resources: - configmaps verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis verbs: - get - list - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - network.openstack.org resources: - dnsdata verbs: - create - delete - get - list - patch - update - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - nonroot-v2 resources: - securitycontextconstraints verbs: - use - apiGroups: - swift.openstack.org resources: - swiftproxies - swiftrings - swifts - swiftstorages verbs: - create - delete - get - list - patch - update - watch - apiGroups: - swift.openstack.org resources: - swiftproxies/finalizers - swiftrings/finalizers - swifts/finalizers - swiftstorages/finalizers verbs: - patch - update - apiGroups: - swift.openstack.org resources: - swiftproxies/status - swiftrings/status - swifts/status - swiftstorages/status verbs: - get - patch - update - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ swift-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ swift-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/telemetry-operator.clusterserviceversion.yaml + OPERATOR_NAME=telemetry-operator + echo telemetry-operator telemetry-operator ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions verbs: - get - list - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heats verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galeras verbs: - get - list - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - monitoring.rhobs resources: - alertmanagers - prometheuses verbs: - delete - get - list - patch - update - watch - apiGroups: - monitoring.rhobs resources: - monitoringstacks - prometheusrules - scrapeconfigs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - monitoring.rhobs resources: - servicemonitors verbs: - delete - get - list - apiGroups: - network.openstack.org resources: - ipsets verbs: - get - list - watch - apiGroups: - observability.openshift.io resources: - uiplugins verbs: - create - get - list - patch - watch - apiGroups: - ovn.openstack.org resources: - ovnnorthds verbs: - get - list - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - telemetry.openstack.org resources: - autoscalings - ceilometers - loggings - metricstorages - telemetries verbs: - create - delete - get - list - patch - update - watch - apiGroups: - telemetry.openstack.org resources: - autoscalings/finalizers - ceilometers/finalizers - loggings/finalizers - metricstorages/finalizers verbs: - delete - patch - update - apiGroups: - telemetry.openstack.org resources: - autoscalings/status - ceilometers/status - loggings/status - metricstorages/status - telemetries/status verbs: - get - patch - update - apiGroups: - telemetry.openstack.org resources: - telemetries/finalizers verbs: - patch - update - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ telemetry-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ telemetry-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/test-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=test-operator + echo test-operator test-operator ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - pods verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - secrets verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - nonroot - nonroot-v2 - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - test.openstack.org resources: - ansibletests - horizontests - tempests - tobikoes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - test.openstack.org resources: - ansibletests/finalizers - horizontests/finalizers - tempests/finalizers - tobikoes/finalizers verbs: - patch - update - apiGroups: - test.openstack.org resources: - ansibletests/status - horizontests/status - tempests/status - tobikoes/status verbs: - get - patch - update - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ test-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ test-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/watcher-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=watcher-operator + echo watcher-operator watcher-operator ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes/custom-host verbs: - create - patch - update - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - watcher.openstack.org resources: - watcherapis - watcherappliers - watcherdecisionengines - watchers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - watcher.openstack.org resources: - watcherapis/finalizers - watcherappliers/finalizers - watcherdecisionengines/finalizers - watchers/finalizers verbs: - update - apiGroups: - watcher.openstack.org resources: - watcherapis/status - watcherappliers/status - watcherdecisionengines/status - watchers/status verbs: - get - patch - update - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ watcher-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ watcher-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + cat + cat ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/test-operator.clusterserviceversion.yaml manifests/watcher-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=BARBICAN_OPERATOR + echo BARBICAN_OPERATOR BARBICAN_OPERATOR + [[ BARBICAN_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/barbican-operator@sha256:783f711b4cb179819cfcb81167c3591c70671440f4551bbe48b7a8730567f577 + echo quay.io/openstack-k8s-operators/barbican-operator@sha256:783f711b4cb179819cfcb81167c3591c70671440f4551bbe48b7a8730567f577 quay.io/openstack-k8s-operators/barbican-operator@sha256:783f711b4cb179819cfcb81167c3591c70671440f4551bbe48b7a8730567f577 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/cinder-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=CINDER_OPERATOR + echo CINDER_OPERATOR CINDER_OPERATOR + [[ CINDER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/cinder-operator@sha256:c487a793648e64af2d64df5f6efbda2d4fd586acd7aee6838d3ec2b3edd9efb9 + echo quay.io/openstack-k8s-operators/cinder-operator@sha256:c487a793648e64af2d64df5f6efbda2d4fd586acd7aee6838d3ec2b3edd9efb9 quay.io/openstack-k8s-operators/cinder-operator@sha256:c487a793648e64af2d64df5f6efbda2d4fd586acd7aee6838d3ec2b3edd9efb9 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=DESIGNATE_OPERATOR + echo DESIGNATE_OPERATOR DESIGNATE_OPERATOR + [[ DESIGNATE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/designate-operator@sha256:73736f216f886549901fbcfc823b072f73691c9a79ec79e59d100e992b9c1e34 + echo quay.io/openstack-k8s-operators/designate-operator@sha256:73736f216f886549901fbcfc823b072f73691c9a79ec79e59d100e992b9c1e34 quay.io/openstack-k8s-operators/designate-operator@sha256:73736f216f886549901fbcfc823b072f73691c9a79ec79e59d100e992b9c1e34 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=GLANCE_OPERATOR + echo GLANCE_OPERATOR GLANCE_OPERATOR + [[ GLANCE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/glance-operator@sha256:3cc6bba71197ddf88dd4ba1301542bacbc1fe12e6faab2b69e6960944b3d74a0 + echo quay.io/openstack-k8s-operators/glance-operator@sha256:3cc6bba71197ddf88dd4ba1301542bacbc1fe12e6faab2b69e6960944b3d74a0 quay.io/openstack-k8s-operators/glance-operator@sha256:3cc6bba71197ddf88dd4ba1301542bacbc1fe12e6faab2b69e6960944b3d74a0 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HEAT_OPERATOR + echo HEAT_OPERATOR HEAT_OPERATOR + [[ HEAT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/heat-operator@sha256:ec11cb8711bd1af22db3c84aa854349ee46191add3db45aecfabb1d8410c04d0 + echo quay.io/openstack-k8s-operators/heat-operator@sha256:ec11cb8711bd1af22db3c84aa854349ee46191add3db45aecfabb1d8410c04d0 quay.io/openstack-k8s-operators/heat-operator@sha256:ec11cb8711bd1af22db3c84aa854349ee46191add3db45aecfabb1d8410c04d0 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HORIZON_OPERATOR + echo HORIZON_OPERATOR HORIZON_OPERATOR + [[ HORIZON_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/horizon-operator@sha256:063a7e65b4ba98f0506f269ff7525b446eae06a5ed4a61c18ffa33a886500867 + echo quay.io/openstack-k8s-operators/horizon-operator@sha256:063a7e65b4ba98f0506f269ff7525b446eae06a5ed4a61c18ffa33a886500867 quay.io/openstack-k8s-operators/horizon-operator@sha256:063a7e65b4ba98f0506f269ff7525b446eae06a5ed4a61c18ffa33a886500867 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ tr '[:lower:]' '[:upper:]' ++ sed -e 's|-|_|g' + OPERATOR_NAME=INFRA_OPERATOR + echo INFRA_OPERATOR INFRA_OPERATOR + [[ INFRA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/infra-operator@sha256:5cfb2ae1092445950b39dd59caa9a8c9367f42fb8353a8c3848d3bc729f24492 + echo quay.io/openstack-k8s-operators/infra-operator@sha256:5cfb2ae1092445950b39dd59caa9a8c9367f42fb8353a8c3848d3bc729f24492 quay.io/openstack-k8s-operators/infra-operator@sha256:5cfb2ae1092445950b39dd59caa9a8c9367f42fb8353a8c3848d3bc729f24492 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=IRONIC_OPERATOR + echo IRONIC_OPERATOR IRONIC_OPERATOR + [[ IRONIC_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/ironic-operator@sha256:ee05f2b06405240a8fcdbd430a9e8983b4667f372548334307b68c154e389960 + echo quay.io/openstack-k8s-operators/ironic-operator@sha256:ee05f2b06405240a8fcdbd430a9e8983b4667f372548334307b68c154e389960 quay.io/openstack-k8s-operators/ironic-operator@sha256:ee05f2b06405240a8fcdbd430a9e8983b4667f372548334307b68c154e389960 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/keystone-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=KEYSTONE_OPERATOR + echo KEYSTONE_OPERATOR KEYSTONE_OPERATOR + [[ KEYSTONE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/keystone-operator@sha256:79b43a69884631c635d2164b95a2d4ec68f5cb33f96da14764f1c710880f3997 + echo quay.io/openstack-k8s-operators/keystone-operator@sha256:79b43a69884631c635d2164b95a2d4ec68f5cb33f96da14764f1c710880f3997 quay.io/openstack-k8s-operators/keystone-operator@sha256:79b43a69884631c635d2164b95a2d4ec68f5cb33f96da14764f1c710880f3997 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/manila-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=MANILA_OPERATOR + echo MANILA_OPERATOR MANILA_OPERATOR + [[ MANILA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/manila-operator@sha256:582f7b1e411961b69f2e3c6b346aa25759b89f7720ed3fade1d363bf5d2dffc8 + echo quay.io/openstack-k8s-operators/manila-operator@sha256:582f7b1e411961b69f2e3c6b346aa25759b89f7720ed3fade1d363bf5d2dffc8 quay.io/openstack-k8s-operators/manila-operator@sha256:582f7b1e411961b69f2e3c6b346aa25759b89f7720ed3fade1d363bf5d2dffc8 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/mariadb-operator.clusterserviceversion.yaml ++ sed -e 's|-|_|g' ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=MARIADB_OPERATOR + echo MARIADB_OPERATOR MARIADB_OPERATOR + [[ MARIADB_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/mariadb-operator@sha256:47278ed28e02df00892f941763aa0d69547327318e8a983e07f4577acd288167 + echo quay.io/openstack-k8s-operators/mariadb-operator@sha256:47278ed28e02df00892f941763aa0d69547327318e8a983e07f4577acd288167 quay.io/openstack-k8s-operators/mariadb-operator@sha256:47278ed28e02df00892f941763aa0d69547327318e8a983e07f4577acd288167 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/neutron-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=NEUTRON_OPERATOR + echo NEUTRON_OPERATOR NEUTRON_OPERATOR + [[ NEUTRON_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/neutron-operator@sha256:33652e75a03a058769019fe8d8c51585a6eeefef5e1ecb96f9965434117954f2 + echo quay.io/openstack-k8s-operators/neutron-operator@sha256:33652e75a03a058769019fe8d8c51585a6eeefef5e1ecb96f9965434117954f2 quay.io/openstack-k8s-operators/neutron-operator@sha256:33652e75a03a058769019fe8d8c51585a6eeefef5e1ecb96f9965434117954f2 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/nova-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=NOVA_OPERATOR + echo NOVA_OPERATOR NOVA_OPERATOR + [[ NOVA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/nova-operator@sha256:b2e9acf568a48c28cf2aed6012e432eeeb7d5f0eb11878fc91b62bc34cba10cd + echo quay.io/openstack-k8s-operators/nova-operator@sha256:b2e9acf568a48c28cf2aed6012e432eeeb7d5f0eb11878fc91b62bc34cba10cd quay.io/openstack-k8s-operators/nova-operator@sha256:b2e9acf568a48c28cf2aed6012e432eeeb7d5f0eb11878fc91b62bc34cba10cd + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/octavia-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OCTAVIA_OPERATOR + echo OCTAVIA_OPERATOR OCTAVIA_OPERATOR + [[ OCTAVIA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/octavia-operator@sha256:09deecf840d38ff6af3c924729cf0a9444bc985848bfbe7c918019b88a6bc4d7 + echo quay.io/openstack-k8s-operators/octavia-operator@sha256:09deecf840d38ff6af3c924729cf0a9444bc985848bfbe7c918019b88a6bc4d7 quay.io/openstack-k8s-operators/octavia-operator@sha256:09deecf840d38ff6af3c924729cf0a9444bc985848bfbe7c918019b88a6bc4d7 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OPENSTACK_BAREMETAL_OPERATOR + echo OPENSTACK_BAREMETAL_OPERATOR OPENSTACK_BAREMETAL_OPERATOR + [[ OPENSTACK_BAREMETAL_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:a17fc270857869fd1efe5020b2a1cb8c2abbd838f08de88f3a6a59e8754ec351 + echo quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:a17fc270857869fd1efe5020b2a1cb8c2abbd838f08de88f3a6a59e8754ec351 quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:a17fc270857869fd1efe5020b2a1cb8c2abbd838f08de88f3a6a59e8754ec351 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ovn-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OVN_OPERATOR + echo OVN_OPERATOR OVN_OPERATOR + [[ OVN_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' ++ cat manifests/ovn-operator.clusterserviceversion.yaml + IMAGE=quay.io/openstack-k8s-operators/ovn-operator@sha256:315e558023b41ac1aa215082096995a03810c5b42910a33b00427ffcac9c6a14 + echo quay.io/openstack-k8s-operators/ovn-operator@sha256:315e558023b41ac1aa215082096995a03810c5b42910a33b00427ffcac9c6a14 quay.io/openstack-k8s-operators/ovn-operator@sha256:315e558023b41ac1aa215082096995a03810c5b42910a33b00427ffcac9c6a14 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=PLACEMENT_OPERATOR + echo PLACEMENT_OPERATOR PLACEMENT_OPERATOR + [[ PLACEMENT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/placement-operator@sha256:d33c1f507e1f5b9a4bf226ad98917e92101ac66b36e19d35cbe04ae7014f6bff + echo quay.io/openstack-k8s-operators/placement-operator@sha256:d33c1f507e1f5b9a4bf226ad98917e92101ac66b36e19d35cbe04ae7014f6bff quay.io/openstack-k8s-operators/placement-operator@sha256:d33c1f507e1f5b9a4bf226ad98917e92101ac66b36e19d35cbe04ae7014f6bff + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=RABBITMQ_CLUSTER_OPERATOR + echo RABBITMQ_CLUSTER_OPERATOR RABBITMQ_CLUSTER_OPERATOR + [[ RABBITMQ_CLUSTER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "operator") | .image' + IMAGE=quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 + echo quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/swift-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=SWIFT_OPERATOR + echo SWIFT_OPERATOR SWIFT_OPERATOR + [[ SWIFT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/swift-operator@sha256:4b4a17fe08ce00e375afaaec6a28835f5c1784f03d11c4558376ac04130f3a9e + echo quay.io/openstack-k8s-operators/swift-operator@sha256:4b4a17fe08ce00e375afaaec6a28835f5c1784f03d11c4558376ac04130f3a9e quay.io/openstack-k8s-operators/swift-operator@sha256:4b4a17fe08ce00e375afaaec6a28835f5c1784f03d11c4558376ac04130f3a9e + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/telemetry-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=TELEMETRY_OPERATOR + echo TELEMETRY_OPERATOR TELEMETRY_OPERATOR + [[ TELEMETRY_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/telemetry-operator@sha256:abe978f8da75223de5043cca50278ad4e28c8dd309883f502fe1e7a9998733b0 + echo quay.io/openstack-k8s-operators/telemetry-operator@sha256:abe978f8da75223de5043cca50278ad4e28c8dd309883f502fe1e7a9998733b0 quay.io/openstack-k8s-operators/telemetry-operator@sha256:abe978f8da75223de5043cca50278ad4e28c8dd309883f502fe1e7a9998733b0 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/test-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=TEST_OPERATOR + echo TEST_OPERATOR TEST_OPERATOR + [[ TEST_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/test-operator@sha256:7e584b1c430441c8b6591dadeff32e065de8a185ad37ef90d2e08d37e59aab4a + echo quay.io/openstack-k8s-operators/test-operator@sha256:7e584b1c430441c8b6591dadeff32e065de8a185ad37ef90d2e08d37e59aab4a quay.io/openstack-k8s-operators/test-operator@sha256:7e584b1c430441c8b6591dadeff32e065de8a185ad37ef90d2e08d37e59aab4a + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/watcher-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=WATCHER_OPERATOR + echo WATCHER_OPERATOR WATCHER_OPERATOR + [[ WATCHER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=38.102.83.190:5001/openstack-k8s-operators/watcher-operator:4a08866b9ae580903972e7a05a777c7854b3ead8 + echo 38.102.83.190:5001/openstack-k8s-operators/watcher-operator:4a08866b9ae580903972e7a05a777c7854b3ead8 38.102.83.190:5001/openstack-k8s-operators/watcher-operator:4a08866b9ae580903972e7a05a777c7854b3ead8 + cat + cat + cd .. + rm -Rf tmp/bindata + rm -Rf bindata/manifests + rm -Rf bindata/metadata + rm -Rf bindata/tests + [[ '' == \t\r\u\e ]] ~/ci-framework-data/artifacts