~/src/github.com/openstack-k8s-operators/openstack-operator ~/ci-framework-data/artifacts mkdir -p /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin test -s /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize || { curl -Ss "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash -s -- 5.6.0 /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin; } v5.6.0 kustomize installed to /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize test -s /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq || ( cd /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin &&\ wget https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz -O - |\ tar xz && mv yq_linux_amd64 /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq ) --2026-02-23 14:24:59-- https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64.tar.gz Resolving github.com (github.com)... 140.82.112.4 Connecting to github.com (github.com)|140.82.112.4|:443... connected. HTTP request sent, awaiting response... 302 Found Location: https://github.com/mikefarah/yq/releases/download/v4.52.4/yq_linux_amd64.tar.gz [following] --2026-02-23 14:25:00-- https://github.com/mikefarah/yq/releases/download/v4.52.4/yq_linux_amd64.tar.gz Reusing existing connection to github.com:443. HTTP request sent, awaiting response... 302 Found Location: https://release-assets.githubusercontent.com/github-production-release-asset/43225113/225fb716-06c7-410d-8a01-dc842b53a42c?sp=r&sv=2018-11-09&sr=b&spr=https&se=2026-02-23T15%3A24%3A01Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2026-02-23T14%3A23%3A46Z&ske=2026-02-23T15%3A24%3A01Z&sks=b&skv=2018-11-09&sig=gmHAHeXypIXUAnRLaX8jClHgyCwBx%2BpTwklZjmOd3KQ%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc3MTg1Njk1OSwibmJmIjoxNzcxODU2NjU5LCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.h1WxwftSqy9gKaYcu2h4QEqvMG7XJTfgVyyuG0YH8hg&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream [following] --2026-02-23 14:25:00-- https://release-assets.githubusercontent.com/github-production-release-asset/43225113/225fb716-06c7-410d-8a01-dc842b53a42c?sp=r&sv=2018-11-09&sr=b&spr=https&se=2026-02-23T15%3A24%3A01Z&rscd=attachment%3B+filename%3Dyq_linux_amd64.tar.gz&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2026-02-23T14%3A23%3A46Z&ske=2026-02-23T15%3A24%3A01Z&sks=b&skv=2018-11-09&sig=gmHAHeXypIXUAnRLaX8jClHgyCwBx%2BpTwklZjmOd3KQ%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc3MTg1Njk1OSwibmJmIjoxNzcxODU2NjU5LCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.h1WxwftSqy9gKaYcu2h4QEqvMG7XJTfgVyyuG0YH8hg&response-content-disposition=attachment%3B%20filename%3Dyq_linux_amd64.tar.gz&response-content-type=application%2Foctet-stream Resolving release-assets.githubusercontent.com (release-assets.githubusercontent.com)... 185.199.110.133, 185.199.109.133, 185.199.111.133, ... Connecting to release-assets.githubusercontent.com (release-assets.githubusercontent.com)|185.199.110.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 5451675 (5.2M) [application/octet-stream] Saving to: ‘STDOUT’ 0K .......... .......... .......... .......... .......... 0% 36.0M 0s 50K .......... .......... .......... .......... .......... 1% 43.8M 0s 100K .......... .......... .......... .......... .......... 2% 234M 0s 150K .......... .......... .......... .......... .......... 3% 103M 0s 200K .......... .......... .......... .......... .......... 4% 51.7M 0s 250K .......... .......... .......... .......... .......... 5% 119M 0s 300K .......... .......... .......... .......... .......... 6% 85.5M 0s 350K .......... .......... .......... .......... .......... 7% 6.30M 0s 400K .......... .......... .......... .......... .......... 8% 82.0M 0s 450K .......... .......... .......... .......... .......... 9% 365M 0s 500K .......... .......... .......... .......... .......... 10% 496M 0s 550K .......... .......... .......... .......... .......... 11% 326M 0s 600K .......... .......... .......... .......... .......... 12% 9.69M 0s 650K .......... .......... .......... .......... .......... 13% 319M 0s 700K .......... .......... .......... .......... .......... 14% 404M 0s 750K .......... .......... .......... .......... .......... 15% 217M 0s 800K .......... .......... .......... .......... .......... 15% 278M 0s 850K .......... .......... .......... .......... .......... 16% 463M 0s 900K .......... .......... .......... .......... .......... 17% 9.30M 0s 950K .......... .......... .......... .......... .......... 18% 465M 0s 1000K .......... .......... .......... .......... .......... 19% 332M 0s 1050K .......... .......... .......... .......... .......... 20% 515M 0s 1100K .......... .......... .......... .......... .......... 21% 479M 0s 1150K .......... .......... .......... .......... .......... 22% 8.12M 0s 1200K .......... .......... .......... .......... .......... 23% 460M 0s 1250K .......... .......... .......... .......... .......... 24% 451M 0s 1300K .......... .......... .......... .......... .......... 25% 345M 0s 1350K .......... .......... .......... .......... .......... 26% 425M 0s 1400K .......... .......... .......... .......... .......... 27% 7.80M 0s 1450K .......... .......... .......... .......... .......... 28% 188M 0s 1500K .......... .......... .......... .......... .......... 29% 116M 0s 1550K .......... .......... .......... .......... .......... 30% 156M 0s 1600K .......... .......... .......... .......... .......... 30% 307M 0s 1650K .......... .......... .......... .......... .......... 31% 9.27M 0s 1700K .......... .......... .......... .......... .......... 32% 195M 0s 1750K .......... .......... .......... .......... .......... 33% 198M 0s 1800K .......... .......... .......... .......... .......... 34% 110M 0s 1850K .......... .......... .......... .......... .......... 35% 413M 0s 1900K .......... .......... .......... .......... .......... 36% 8.96M 0s 1950K .......... .......... .......... .......... .......... 37% 226M 0s 2000K .......... .......... .......... .......... .......... 38% 168M 0s 2050K .......... .......... .......... .......... .......... 39% 157M 0s 2100K .......... .......... .......... .......... .......... 40% 283M 0s 2150K .......... .......... .......... .......... .......... 41% 433M 0s 2200K .......... .......... .......... .......... .......... 42% 9.11M 0s 2250K .......... .......... .......... .......... .......... 43% 267M 0s 2300K .......... .......... .......... .......... .......... 44% 212M 0s 2350K .......... .......... .......... .......... .......... 45% 164M 0s 2400K .......... .......... .......... .......... .......... 46% 3.75M 0s 2450K .......... .......... .......... .......... .......... 46% 502M 0s 2500K .......... .......... .......... .......... .......... 47% 525M 0s 2550K .......... .......... .......... .......... .......... 48% 209M 0s 2600K .......... .......... .......... .......... .......... 49% 170M 0s 2650K .......... .......... .......... .......... .......... 50% 8.23M 0s 2700K .......... .......... .......... .......... .......... 51% 205M 0s 2750K .......... .......... .......... .......... .......... 52% 260M 0s 2800K .......... .......... .......... .......... .......... 53% 204M 0s 2850K .......... .......... .......... .......... .......... 54% 198M 0s 2900K .......... .......... .......... .......... .......... 55% 402M 0s 2950K .......... .......... .......... .......... .......... 56% 7.76M 0s 3000K .......... .......... .......... .......... .......... 57% 148M 0s 3050K .......... .......... .......... .......... .......... 58% 345M 0s 3100K .......... .......... .......... .......... .......... 59% 341M 0s 3150K .......... .......... .......... .......... .......... 60% 478M 0s 3200K .......... .......... .......... .......... .......... 61% 7.97M 0s 3250K .......... .......... .......... .......... .......... 61% 299M 0s 3300K .......... .......... .......... .......... .......... 62% 202M 0s 3350K .......... .......... .......... .......... .......... 63% 299M 0s 3400K .......... .......... .......... .......... .......... 64% 567M 0s 3450K .......... .......... .......... .......... .......... 65% 11.6M 0s 3500K .......... .......... .......... .......... .......... 66% 137M 0s 3550K .......... .......... .......... .......... .......... 67% 495M 0s 3600K .......... .......... .......... .......... .......... 68% 273M 0s 3650K .......... .......... .......... .......... .......... 69% 662M 0s 3700K .......... .......... .......... .......... .......... 70% 10.2M 0s 3750K .......... .......... .......... .......... .......... 71% 263M 0s 3800K .......... .......... .......... .......... .......... 72% 337M 0s 3850K .......... .......... .......... .......... .......... 73% 271M 0s 3900K .......... .......... .......... .......... .......... 74% 273M 0s 3950K .......... .......... .......... .......... .......... 75% 9.72M 0s 4000K .......... .......... .......... .......... .......... 76% 208M 0s 4050K .......... .......... .......... .......... .......... 77% 252M 0s 4100K .......... .......... .......... .......... .......... 77% 215M 0s 4150K .......... .......... .......... .......... .......... 78% 292M 0s 4200K .......... .......... .......... .......... .......... 79% 11.1M 0s 4250K .......... .......... .......... .......... .......... 80% 160M 0s 4300K .......... .......... .......... .......... .......... 81% 138M 0s 4350K .......... .......... .......... .......... .......... 82% 163M 0s 4400K .......... .......... .......... .......... .......... 83% 309M 0s 4450K .......... .......... .......... .......... .......... 84% 8.05M 0s 4500K .......... .......... .......... .......... .......... 85% 322M 0s 4550K .......... .......... .......... .......... .......... 86% 214M 0s 4600K .......... .......... .......... .......... .......... 87% 55.8M 0s 4650K .......... .......... .......... .......... .......... 88% 228M 0s 4700K .......... .......... .......... .......... .......... 89% 8.80M 0s 4750K .......... .......... .......... .......... .......... 90% 187M 0s 4800K .......... .......... .......... .......... .......... 91% 147M 0s 4850K .......... .......... .......... .......... .......... 92% 205M 0s 4900K .......... .......... .......... .......... .......... 92% 216M 0s 4950K .......... .......... .......... .......... .......... 93% 541M 0s 5000K .......... .......... .......... .......... .......... 94% 9.60M 0s 5050K .......... .......... .......... .......... .......... 95% 78.5M 0s 5100K .......... .......... .......... .......... .......... 96% 445M 0s 5150K .......... .......... .......... .......... .......... 97% 179M 0s 5200K .......... .......... .......... .......... .......... 98% 477M 0s 5250K .......... .......... .......... .......... .......... 99% 14.5M 0s 5300K .......... .......... ... 100% 233M=0.1s 2026-02-23 14:25:00 (37.6 MB/s) - written to stdout [5451675/5451675] mkdir -p bindata/crds bindata/rbac bindata/operator /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/crd > bindata/crds/crds.yaml /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/default > bindata/operator/operator.yaml sed -i bindata/operator/operator.yaml -e "s|replicas:.*|replicas: {{ .OpenStackOperator.Deployment.Replicas }}|" sed -i bindata/operator/operator.yaml -e "/envCustom/c\\{{- range .OpenStackOperator.Deployment.Manager.Env }}\n - name: '{{ .Name }}'\n value: '{{ .Value }}'\n{{- end }}" sed -i bindata/operator/operator.yaml -e "/customLimits/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Limits.Memory }}" sed -i bindata/operator/operator.yaml -e "/customRequests/c\\ cpu: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.CPU }}\n memory: {{ .OpenStackOperator.Deployment.Manager.Resources.Requests.Memory }}" sed -i bindata/operator/operator.yaml -e "/customTolerations/c\\ tolerations:\n{{- range .OpenStackOperator.Deployment.Tolerations }}\n - key: \"{{ .Key }}\"\n{{- if .Operator }}\n operator: \"{{ .Operator }}\"\n{{- end }}\n{{- if .Value }}\n value: \"{{ .Value }}\"\n{{- end }}\n{{- if .Effect }}\n effect: \"{{ .Effect }}\"\n{{- end }}\n{{- if .TolerationSeconds }}\n tolerationSeconds: {{ .TolerationSeconds }}\n{{- end }}\n{{- end }}" cp config/operator/managers.yaml bindata/operator/ cp config/operator/rabbit.yaml bindata/operator/ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/kustomize build config/rbac > bindata/rbac/rbac.yaml /bin/bash hack/sync-bindata.sh + BINDATA_GIT_ADD= + OUT_DATA=bindata + EXTRACT_DIR=tmp/bindata + LOCAL_BINARIES=/home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin + mkdir -p tmp/bindata + mkdir -p bindata/crds ++ hack/pin-bundle-images.sh ++ tr , ' ' + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/barbican-operator-bundle:acc8584f9761147bebd6ae3af00b8a7c876698e6 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:12d3d64677521cc5f25031a716da88f2e0b60c293269a47a56ba621527569e6b Copying config sha256:f65b03cbf91e35377af974963b3d790f90fc1093c523d30383ef26203dcdb364 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/12d3d64677521cc5f25031a716da88f2e0b60c293269a47a56ba621527569e6b tmp/bindata/tmp/f65b03cbf91e35377af974963b3d790f90fc1093c523d30383ef26203dcdb364 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/12d3d64677521cc5f25031a716da88f2e0b60c293269a47a56ba621527569e6b -C bindata// manifests/ manifests/barbican-operator-barbican-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/cinder-operator-bundle:f47bd738116552ba7ee476a674b511fb800c0b24 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:c6b4a650826e6e26ee6eab8b6dd63b389c7433789f9acac996b78e03bdb0ef1d Copying config sha256:aaf6ab76d14e625f44835851fa89a0140fda2bb8acfe05dfecf15819e3c7ae41 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/aaf6ab76d14e625f44835851fa89a0140fda2bb8acfe05dfecf15819e3c7ae41 tmp/bindata/tmp/c6b4a650826e6e26ee6eab8b6dd63b389c7433789f9acac996b78e03bdb0ef1d tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/c6b4a650826e6e26ee6eab8b6dd63b389c7433789f9acac996b78e03bdb0ef1d -C bindata// manifests/ manifests/cinder-operator-cinder-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cindervolumes.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/designate-operator-bundle:ed4aceb3d3d837d66ece9c340ee914ad3c62f6e8 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:185bb06053014a8f3fe807241ec3dd23319d66d3eea2ad611f9e3bac10f91415 Copying config sha256:78fb7644d5f44691630a4c67ca0d02e2e2d574a769869ddfda5780bfffac169a Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/185bb06053014a8f3fe807241ec3dd23319d66d3eea2ad611f9e3bac10f91415 tmp/bindata/tmp/78fb7644d5f44691630a4c67ca0d02e2e2d574a769869ddfda5780bfffac169a tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/185bb06053014a8f3fe807241ec3dd23319d66d3eea2ad611f9e3bac10f91415 -C bindata// manifests/ manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-designate-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/glance-operator-bundle:4568bec60b9a234ae9415f85d3c406125536906a dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:22335b53029ec333450d6799869bad510752aef86f7f7c305798ea8b7d85a653 Copying config sha256:8a92dfa0b7199c47bdec207830550b565614fe8d4895608fe7337e901a078c94 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/22335b53029ec333450d6799869bad510752aef86f7f7c305798ea8b7d85a653 tmp/bindata/tmp/8a92dfa0b7199c47bdec207830550b565614fe8d4895608fe7337e901a078c94 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/22335b53029ec333450d6799869bad510752aef86f7f7c305798ea8b7d85a653 -C bindata// manifests/ manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-glance-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/heat-operator-bundle:d035c0c262f78fbed34d0f3a2211fdf1744bd596 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:36eba4b699711859740250dbe1a73bec774e09d998cef499be7ea63e6bc0e1a9 Copying config sha256:5a8b4b44177a33792d4bbc5e1f7b683c4abbd444503db660233646db0409e242 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/36eba4b699711859740250dbe1a73bec774e09d998cef499be7ea63e6bc0e1a9 tmp/bindata/tmp/5a8b4b44177a33792d4bbc5e1f7b683c4abbd444503db660233646db0409e242 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/36eba4b699711859740250dbe1a73bec774e09d998cef499be7ea63e6bc0e1a9 -C bindata// manifests/ manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-heat-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/horizon-operator-bundle:0873344e2797e9410945f25f7fee0244e8abc97b dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:cf51bbe53e1fafbc43ba3263d98311689b348d8dc969064a4c121bbc70fb0df7 Copying config sha256:d9a66f5db45c2075a9efcbacca3e0c7d7c6c13323d5c1138baa4b720cc24818d Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/cf51bbe53e1fafbc43ba3263d98311689b348d8dc969064a4c121bbc70fb0df7 tmp/bindata/tmp/d9a66f5db45c2075a9efcbacca3e0c7d7c6c13323d5c1138baa4b720cc24818d tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/cf51bbe53e1fafbc43ba3263d98311689b348d8dc969064a4c121bbc70fb0df7 -C bindata// manifests/ manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-horizon-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon.openstack.org_horizons.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/infra-operator-bundle:847755eac6eab87a50d2ccfcefe7c8226957bb0f dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:4d908f8d89674f02feaf67446be1e5707dfa4f826a70851c85c1f0d29aa8cccb Copying config sha256:e20c13cfaaa293f260b20ddeb94d48f1051464b1720183296280c443a5e8d845 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/4d908f8d89674f02feaf67446be1e5707dfa4f826a70851c85c1f0d29aa8cccb tmp/bindata/tmp/e20c13cfaaa293f260b20ddeb94d48f1051464b1720183296280c443a5e8d845 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/4d908f8d89674f02feaf67446be1e5707dfa4f826a70851c85c1f0d29aa8cccb -C bindata// manifests/ manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-instanceha-instanceha-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/rabbitmq.openstack.org_rabbitmqpolicies.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_rabbitmqusers.yaml manifests/rabbitmq.openstack.org_rabbitmqvhosts.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/topology.openstack.org_topologies.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/ironic-operator-bundle:ab0b09a3525cc518a513c83f16427d52fbb462b4 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:f8e4e7557743dd097f70ed80cf50f2a13764ce091568aeceafa40349eacb22f3 Copying config sha256:52ebb5c2d229a3a2e38d032bd6d4c2b6f8dcc0ce95a9a93f6dd2185b74ae83cd Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/52ebb5c2d229a3a2e38d032bd6d4c2b6f8dcc0ce95a9a93f6dd2185b74ae83cd tmp/bindata/tmp/f8e4e7557743dd097f70ed80cf50f2a13764ce091568aeceafa40349eacb22f3 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/f8e4e7557743dd097f70ed80cf50f2a13764ce091568aeceafa40349eacb22f3 -C bindata// manifests/ manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-ironic-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/keystone-operator-bundle:4404dc5bb2c9750b1122035d11fae2e23b4579b9 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:0a20dc5f7698aa14f312dda57d0c09fc40e35f1ecf56aa45d7d2219be92de3cb Copying config sha256:fa695f1f39884604a5ebf4c5e2290d0c7bad5dedb7c1581109d9d38d64e0f74e Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/0a20dc5f7698aa14f312dda57d0c09fc40e35f1ecf56aa45d7d2219be92de3cb tmp/bindata/tmp/fa695f1f39884604a5ebf4c5e2290d0c7bad5dedb7c1581109d9d38d64e0f74e tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/0a20dc5f7698aa14f312dda57d0c09fc40e35f1ecf56aa45d7d2219be92de3cb -C bindata// manifests/ manifests/keystone-operator-controller-manager-metrics-service_v1_service.yaml manifests/keystone-operator-keystoneapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-webhook-service_v1_service.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/keystone.openstack.org_keystoneapis.yaml manifests/keystone.openstack.org_keystoneapplicationcredentials.yaml manifests/keystone.openstack.org_keystoneendpoints.yaml manifests/keystone.openstack.org_keystoneservices.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/manila-operator-bundle:54dcd155038a47e06cee4d035e79d6fd3b15591f dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:b588571b22cd84c1b3d5b727852ca854bc1edfe7cd26316541bb6c6db44bbb59 Copying config sha256:5252bfaa355eb16ebff3ba1d6e91333c57b62e7601c0494cfbf2fcb9430a0a52 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/5252bfaa355eb16ebff3ba1d6e91333c57b62e7601c0494cfbf2fcb9430a0a52 tmp/bindata/tmp/b588571b22cd84c1b3d5b727852ca854bc1edfe7cd26316541bb6c6db44bbb59 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/b588571b22cd84c1b3d5b727852ca854bc1edfe7cd26316541bb6c6db44bbb59 -C bindata// manifests/ manifests/manila-operator-controller-manager-metrics-service_v1_service.yaml manifests/manila-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/manila-operator-manila-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manila-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manila-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-webhook-service_v1_service.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/manila.openstack.org_manilaapis.yaml manifests/manila.openstack.org_manilas.yaml manifests/manila.openstack.org_manilaschedulers.yaml manifests/manila.openstack.org_manilashares.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/mariadb-operator-bundle:6c5c206adb513186b3db1f4f2e54da08b146236b dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:239a65073c66caec452b2e166353a5aac65d6d716c54bc97b1cd69289711c255 Copying config sha256:fe014ab7204e4174170d3e6d4c5a8f2b1ba105b378fbadae5f00031a4616e200 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/239a65073c66caec452b2e166353a5aac65d6d716c54bc97b1cd69289711c255 tmp/bindata/tmp/fe014ab7204e4174170d3e6d4c5a8f2b1ba105b378fbadae5f00031a4616e200 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/239a65073c66caec452b2e166353a5aac65d6d716c54bc97b1cd69289711c255 -C bindata// manifests/ manifests/mariadb-operator-controller-manager-metrics-service_v1_service.yaml manifests/mariadb-operator-galera-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galera-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galera-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-webhook-service_v1_service.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/mariadb.openstack.org_galerabackups.yaml manifests/mariadb.openstack.org_galerarestores.yaml manifests/mariadb.openstack.org_galeras.yaml manifests/mariadb.openstack.org_mariadbaccounts.yaml manifests/mariadb.openstack.org_mariadbdatabases.yaml manifests/neutrondb-secret_v1_secret.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/neutron-operator-bundle:114918b91ae9fe3e734cf21843cbb34ba9de57dd dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:578a3704a7ad2f45d90d1702f9bebede78fc135d6b3cd7a170a6ea6f3fa7f894 Copying config sha256:ea65d41dfb2c63ab385a9906b990dc35e5848bca0edc30d77a9fece86e38dd21 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/578a3704a7ad2f45d90d1702f9bebede78fc135d6b3cd7a170a6ea6f3fa7f894 tmp/bindata/tmp/ea65d41dfb2c63ab385a9906b990dc35e5848bca0edc30d77a9fece86e38dd21 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/578a3704a7ad2f45d90d1702f9bebede78fc135d6b3cd7a170a6ea6f3fa7f894 -C bindata// manifests/ manifests/neutron-operator-controller-manager-metrics-service_v1_service.yaml manifests/neutron-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-webhook-service_v1_service.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/neutron.openstack.org_neutronapis.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/nova-operator-bundle:3d9fd73712a12ae7a5506caf931e0e82ee915133 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:02404ed7c3bf47132cb5e1a5ea8d36ab689269a04c6d524e83742ef0e3f101d4 Copying config sha256:944940f458e8d96c14b3649f56880c4e5ee731bfc1c569c0269863948c5eee96 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/02404ed7c3bf47132cb5e1a5ea8d36ab689269a04c6d524e83742ef0e3f101d4 tmp/bindata/tmp/944940f458e8d96c14b3649f56880c4e5ee731bfc1c569c0269863948c5eee96 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/02404ed7c3bf47132cb5e1a5ea8d36ab689269a04c6d524e83742ef0e3f101d4 -C bindata// manifests/ manifests/nova-operator-controller-manager-metrics-service_v1_service.yaml manifests/nova-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-webhook-service_v1_service.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/nova.openstack.org_nova.yaml manifests/nova.openstack.org_novaapis.yaml manifests/nova.openstack.org_novacells.yaml manifests/nova.openstack.org_novacomputes.yaml manifests/nova.openstack.org_novaconductors.yaml manifests/nova.openstack.org_novametadata.yaml manifests/nova.openstack.org_novanovncproxies.yaml manifests/nova.openstack.org_novaschedulers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/octavia-operator-bundle:5a797e574b3234172a40792dc3b956ea27c7a9bb dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:863a7570bf1e8a73589eec4e67ab3a82b2a7281a5df282f2e20ea48f04a4417f Copying config sha256:ddc3a976e949e15171ca671549b6f4dffcbc3fbc9235e6ee6809b4861c571d4d Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/863a7570bf1e8a73589eec4e67ab3a82b2a7281a5df282f2e20ea48f04a4417f tmp/bindata/tmp/ddc3a976e949e15171ca671549b6f4dffcbc3fbc9235e6ee6809b4861c571d4d tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/863a7570bf1e8a73589eec4e67ab3a82b2a7281a5df282f2e20ea48f04a4417f -C bindata// manifests/ manifests/octavia-operator-controller-manager-metrics-service_v1_service.yaml manifests/octavia-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-webhook-service_v1_service.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/octavia.openstack.org_octaviaamphoracontrollers.yaml manifests/octavia.openstack.org_octaviaapis.yaml manifests/octavia.openstack.org_octaviarsyslogs.yaml manifests/octavia.openstack.org_octavias.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/openstack-baremetal-operator-bundle:02232137728082f4ac476142b688a90e64d9eca9 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:067cdf58ed5043115c2928b3a7cf1bf5ec178a7e2e1e9e55e0b24d8bfef52aa3 Copying config sha256:6e4141e4a30e84d4ca3740067129e9c2fa639388f49a33e22415ccbc7527c535 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/067cdf58ed5043115c2928b3a7cf1bf5ec178a7e2e1e9e55e0b24d8bfef52aa3 tmp/bindata/tmp/6e4141e4a30e84d4ca3740067129e9c2fa639388f49a33e22415ccbc7527c535 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/067cdf58ed5043115c2928b3a7cf1bf5ec178a7e2e1e9e55e0b24d8bfef52aa3 -C bindata// manifests/ manifests/baremetal.openstack.org_openstackbaremetalsets.yaml manifests/baremetal.openstack.org_openstackprovisionservers.yaml manifests/openstack-baremetal-operator-controller-manager-metrics-service_v1_service.yaml manifests/openstack-baremetal-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-webhook-service_v1_service.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/ovn-operator-bundle:63a3e158f6793ad8cd180a3365a2623d32e74d8a dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:c556f27caf8862fbc17d349a04a58faa5c32e0b2203329b276e396b837dcec04 Copying config sha256:f8724ceb3821a7ea86c23ad647a8021dc9805405d35d88f52c85825cc0fae39b Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/c556f27caf8862fbc17d349a04a58faa5c32e0b2203329b276e396b837dcec04 tmp/bindata/tmp/f8724ceb3821a7ea86c23ad647a8021dc9805405d35d88f52c85825cc0fae39b tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/c556f27caf8862fbc17d349a04a58faa5c32e0b2203329b276e396b837dcec04 -C bindata// manifests/ manifests/ovn-operator-controller-manager-metrics-service_v1_service.yaml manifests/ovn-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-webhook-service_v1_service.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/ovn.openstack.org_ovncontrollers.yaml manifests/ovn.openstack.org_ovndbclusters.yaml manifests/ovn.openstack.org_ovnnorthds.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/placement-operator-bundle:fcacc105b99cca578dc99bd39082800d36b28839 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:824e4a95aa6cd75c4eb93cf41615d15c4b1fa379b6f4e836cf6b1b1c62ead54c Copying config sha256:9a98a1306d59359b4861c3469e543ed47434d330814246126e7b8b8f02c543be Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/824e4a95aa6cd75c4eb93cf41615d15c4b1fa379b6f4e836cf6b1b1c62ead54c tmp/bindata/tmp/9a98a1306d59359b4861c3469e543ed47434d330814246126e7b8b8f02c543be tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/824e4a95aa6cd75c4eb93cf41615d15c4b1fa379b6f4e836cf6b1b1c62ead54c -C bindata// manifests/ manifests/placement-operator-controller-manager-metrics-service_v1_service.yaml manifests/placement-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-webhook-service_v1_service.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/placement.openstack.org_placementapis.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/swift-operator-bundle:532c0bdcbe528e8e8f3783d0dca56014da534744 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:5b91fdacd643768137a994bad43f24765acb8048b28b122ada3ad7ab164fc35d Copying config sha256:cf0fa61c13749f0f1edc73cca6252a94a5310cb12894dcc66d8a1163c3538d47 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/5b91fdacd643768137a994bad43f24765acb8048b28b122ada3ad7ab164fc35d tmp/bindata/tmp/cf0fa61c13749f0f1edc73cca6252a94a5310cb12894dcc66d8a1163c3538d47 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/5b91fdacd643768137a994bad43f24765acb8048b28b122ada3ad7ab164fc35d -C bindata// manifests/ manifests/swift-operator-controller-manager-metrics-service_v1_service.yaml manifests/swift-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-webhook-service_v1_service.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/swift.openstack.org_swiftproxies.yaml manifests/swift.openstack.org_swiftrings.yaml manifests/swift.openstack.org_swifts.yaml manifests/swift.openstack.org_swiftstorages.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://38.102.83.222:5001/openstack-k8s-operators/telemetry-operator-bundle:82f129b765136daa2b4772208bda9897d3262103 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:bba44e8d2d71b68d78b7eb5eae181e41aba8af0c6b367b7070859a1b19bde783 Copying blob sha256:a0444f7cff5950dc924ad350f5d5ed46dd7a637d41eaea164c1e3128c5d193bf Copying blob sha256:55920ce378b50a3b66531e25439e985c042e96a304387ea9890afac44faca7b4 Copying config sha256:7a67e6bc40e84fcfaf868951417318e005bb198356bc1a00ad4465819c5e1e58 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/55920ce378b50a3b66531e25439e985c042e96a304387ea9890afac44faca7b4 tmp/bindata/tmp/7a67e6bc40e84fcfaf868951417318e005bb198356bc1a00ad4465819c5e1e58 tmp/bindata/tmp/a0444f7cff5950dc924ad350f5d5ed46dd7a637d41eaea164c1e3128c5d193bf tmp/bindata/tmp/bba44e8d2d71b68d78b7eb5eae181e41aba8af0c6b367b7070859a1b19bde783 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : ++ grep gzip + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/55920ce378b50a3b66531e25439e985c042e96a304387ea9890afac44faca7b4 -C bindata// metadata/ metadata/annotations.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/a0444f7cff5950dc924ad350f5d5ed46dd7a637d41eaea164c1e3128c5d193bf -C bindata// manifests/ manifests/telemetry-operator-autoscaling-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-autoscaling-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-autoscaling-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-controller-manager-metrics-service_v1_service.yaml manifests/telemetry-operator-logging-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-logging-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-logging-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-webhook-service_v1_service.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/telemetry.openstack.org_autoscalings.yaml manifests/telemetry.openstack.org_ceilometers.yaml manifests/telemetry.openstack.org_cloudkitties.yaml manifests/telemetry.openstack.org_cloudkittyapis.yaml manifests/telemetry.openstack.org_cloudkittyprocs.yaml manifests/telemetry.openstack.org_loggings.yaml manifests/telemetry.openstack.org_metricstorages.yaml manifests/telemetry.openstack.org_telemetries.yaml + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/bba44e8d2d71b68d78b7eb5eae181e41aba8af0c6b367b7070859a1b19bde783 -C bindata// tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/test-operator-bundle:5736d9d510c0b63cda1b3fe3997d5e3fd33aef73 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:dafd71d9b5520f3ab4d0c838539b1630909cef3586bc2922cb984d40690f8ad6 Copying config sha256:b9ae011120b740464986cc8e2a28f513f13be3468d5f23d8f4e57cd386c3081d Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/b9ae011120b740464986cc8e2a28f513f13be3468d5f23d8f4e57cd386c3081d tmp/bindata/tmp/dafd71d9b5520f3ab4d0c838539b1630909cef3586bc2922cb984d40690f8ad6 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/dafd71d9b5520f3ab4d0c838539b1630909cef3586bc2922cb984d40690f8ad6 -C bindata// manifests/ manifests/test-operator-ansibletest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-ansibletest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-ansibletest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-controller-manager-metrics-service_v1_service.yaml manifests/test-operator-horizontest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-horizontest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-horizontest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-webhook-service_v1_service.yaml manifests/test-operator.clusterserviceversion.yaml manifests/test.openstack.org_ansibletests.yaml manifests/test.openstack.org_horizontests.yaml manifests/test.openstack.org_tempests.yaml manifests/test.openstack.org_tobikoes.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/watcher-operator-bundle:14f01c80f86eca029832a681bb21ffb15cfc89b7 dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:34e8881cc3f59d780c9ba1e02af810560a3a554ee22a94cd7825467599cc45f7 Copying config sha256:017494f7fb2a7fafad5a07bf36bcd294b7de78bdac20ee6cd3f0d27931badd99 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ file tmp/bindata/tmp/017494f7fb2a7fafad5a07bf36bcd294b7de78bdac20ee6cd3f0d27931badd99 tmp/bindata/tmp/34e8881cc3f59d780c9ba1e02af810560a3a554ee22a94cd7825467599cc45f7 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ grep gzip ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/34e8881cc3f59d780c9ba1e02af810560a3a554ee22a94cd7825467599cc45f7 -C bindata// manifests/ manifests/watcher-operator-controller-manager-metrics-service_v1_service.yaml manifests/watcher-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-webhook-service_v1_service.yaml manifests/watcher-operator.clusterserviceversion.yaml manifests/watcher.openstack.org_watcherapis.yaml manifests/watcher.openstack.org_watcherappliers.yaml manifests/watcher.openstack.org_watcherdecisionengines.yaml manifests/watcher.openstack.org_watchers.yaml metadata/ metadata/annotations.yaml tests/ tests/scorecard/ tests/scorecard/config.yaml + for BUNDLE in $(hack/pin-bundle-images.sh | tr "," " ") + set +e + n=0 + RC=1 + : + skopeo copy docker://quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-bundle@sha256:1612b82e274827281af1d64740a7d52e21745bc74c91d5149f111135d8e7779f dir:tmp/bindata/tmp Getting image source signatures Copying blob sha256:cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 Copying config sha256:baa066a30ba9ac2197a4cfa15a73324d1d8b45766ea3f20106a751a2713002a7 Writing manifest to image destination + RC=0 + '[' 0 -eq 0 -o 0 -ge 5 ']' + exit 0 + extract_bundle tmp/bindata/tmp bindata/ + local IN_DIR=tmp/bindata/tmp + local OUT_DIR=bindata/ ++ grep gzip ++ file tmp/bindata/tmp/baa066a30ba9ac2197a4cfa15a73324d1d8b45766ea3f20106a751a2713002a7 tmp/bindata/tmp/cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 tmp/bindata/tmp/manifest.json tmp/bindata/tmp/version ++ cut -f 1 -d : + for X in $(file ${IN_DIR}/* | grep gzip | cut -f 1 -d ':') + tar xvf tmp/bindata/tmp/cabbeee34c6851f8093cb7a34776ade6d032861a90eaeb94f0410a05efbbf683 -C bindata// manifests/ manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-service-binding-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/rabbitmq.com_rabbitmqclusters.yaml metadata/ metadata/annotations.yaml metadata/properties.yaml + cd bindata + xargs -I % sh -c 'cp % ./crds/' + grep -l CustomResourceDefinition manifests/barbican.openstack.org_barbicanapis.yaml manifests/barbican.openstack.org_barbicankeystonelisteners.yaml manifests/barbican.openstack.org_barbicans.yaml manifests/barbican.openstack.org_barbicanworkers.yaml manifests/barbican-operator-barbican-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicankeystonelistener-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbican-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-barbicanworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator.clusterserviceversion.yaml manifests/barbican-operator-controller-manager-metrics-service_v1_service.yaml manifests/barbican-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/barbican-operator-webhook-service_v1_service.yaml manifests/baremetal.openstack.org_openstackbaremetalsets.yaml manifests/baremetal.openstack.org_openstackprovisionservers.yaml manifests/cinder.openstack.org_cinderapis.yaml manifests/cinder.openstack.org_cinderbackups.yaml manifests/cinder.openstack.org_cinderschedulers.yaml manifests/cinder.openstack.org_cinders.yaml manifests/cinder.openstack.org_cindervolumes.yaml manifests/cinder-operator-cinder-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderbackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinderscheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cinder-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-cindervolume-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/cinder-operator-controller-manager-metrics-service_v1_service.yaml manifests/cinder-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/cinder-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/cinder-operator-webhook-service_v1_service.yaml manifests/designate.openstack.org_designateapis.yaml manifests/designate.openstack.org_designatebackendbind9s.yaml manifests/designate.openstack.org_designatecentrals.yaml manifests/designate.openstack.org_designatemdnses.yaml manifests/designate.openstack.org_designateproducers.yaml manifests/designate.openstack.org_designates.yaml manifests/designate.openstack.org_designateunbounds.yaml manifests/designate.openstack.org_designateworkers.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/designate-operator-controller-manager-metrics-service_v1_service.yaml manifests/designate-operator-designate-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatebackendbind9-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatecentral-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designatemdns-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateproducer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateunbound-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designate-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-designateworker-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/designate-operator-webhook-service_v1_service.yaml manifests/glance.openstack.org_glanceapis.yaml manifests/glance.openstack.org_glances.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/glance-operator-controller-manager-metrics-service_v1_service.yaml manifests/glance-operator-glance-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glanceapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-glance-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/glance-operator-webhook-service_v1_service.yaml manifests/heat.openstack.org_heatapis.yaml manifests/heat.openstack.org_heatcfnapis.yaml manifests/heat.openstack.org_heatengines.yaml manifests/heat.openstack.org_heats.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/heat-operator-controller-manager-metrics-service_v1_service.yaml manifests/heat-operator-heat-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatcfnapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heatengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-heat-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/heat-operator-webhook-service_v1_service.yaml manifests/horizon.openstack.org_horizons.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/horizon-operator-controller-manager-metrics-service_v1_service.yaml manifests/horizon-operator-horizon-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-horizon-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/horizon-operator-webhook-service_v1_service.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/infra-operator-controller-manager-metrics-service_v1_service.yaml manifests/infra-operator-instanceha-instanceha-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-instanceha-instanceha-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-memcached-memcached-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-bgpconfiguration-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsdata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-dnsmasq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-ipset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-netconfig-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-network-reservation-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-rabbitmq-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-rabbitmq-transporturl-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-redis-redis-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-topology-topology-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/infra-operator-webhook-service_v1_service.yaml manifests/instanceha.openstack.org_instancehas.yaml manifests/ironic.openstack.org_ironicapis.yaml manifests/ironic.openstack.org_ironicconductors.yaml manifests/ironic.openstack.org_ironicinspectors.yaml manifests/ironic.openstack.org_ironicneutronagents.yaml manifests/ironic.openstack.org_ironics.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/ironic-operator-controller-manager-metrics-service_v1_service.yaml manifests/ironic-operator-ironic-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicinspector-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironicneutronagent-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-ironic-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ironic-operator-webhook-service_v1_service.yaml manifests/keystone.openstack.org_keystoneapis.yaml manifests/keystone.openstack.org_keystoneapplicationcredentials.yaml manifests/keystone.openstack.org_keystoneendpoints.yaml manifests/keystone.openstack.org_keystoneservices.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/keystone-operator-controller-manager-metrics-service_v1_service.yaml manifests/keystone-operator-keystoneapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneendpoint-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-keystoneservice-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/keystone-operator-webhook-service_v1_service.yaml manifests/manila.openstack.org_manilaapis.yaml manifests/manila.openstack.org_manilaschedulers.yaml manifests/manila.openstack.org_manilashares.yaml manifests/manila.openstack.org_manilas.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/manila-operator-controller-manager-metrics-service_v1_service.yaml manifests/manila-operator-manager-role_rbac.authorization.k8s.io_v1_role.yaml manifests/manila-operator-manila-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manila-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilascheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manilashare-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-manila-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/manila-operator-webhook-service_v1_service.yaml manifests/mariadb.openstack.org_galerabackups.yaml manifests/mariadb.openstack.org_galerarestores.yaml manifests/mariadb.openstack.org_galeras.yaml manifests/mariadb.openstack.org_mariadbaccounts.yaml manifests/mariadb.openstack.org_mariadbdatabases.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/mariadb-operator-controller-manager-metrics-service_v1_service.yaml manifests/mariadb-operator-galera-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galerabackup-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galera-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-galera-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbaccount-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-mariadbdatabase-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/mariadb-operator-webhook-service_v1_service.yaml manifests/memcached.openstack.org_memcacheds.yaml manifests/network.openstack.org_bgpconfigurations.yaml manifests/network.openstack.org_dnsdata.yaml manifests/network.openstack.org_dnsmasqs.yaml manifests/network.openstack.org_ipsets.yaml manifests/network.openstack.org_netconfigs.yaml manifests/network.openstack.org_reservations.yaml manifests/neutrondb-secret_v1_secret.yaml manifests/neutron.openstack.org_neutronapis.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/neutron-operator-controller-manager-metrics-service_v1_service.yaml manifests/neutron-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-neutronapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/neutron-operator-webhook-service_v1_service.yaml manifests/nova.openstack.org_novaapis.yaml manifests/nova.openstack.org_novacells.yaml manifests/nova.openstack.org_novacomputes.yaml manifests/nova.openstack.org_novaconductors.yaml manifests/nova.openstack.org_novametadata.yaml manifests/nova.openstack.org_novanovncproxies.yaml manifests/nova.openstack.org_novaschedulers.yaml manifests/nova.openstack.org_nova.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/nova-operator-controller-manager-metrics-service_v1_service.yaml manifests/nova-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacell-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novacompute-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novaconductor-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novametadata-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novanovncproxy-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-novascheduler-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-nova-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/nova-operator-webhook-service_v1_service.yaml manifests/octavia.openstack.org_octaviaamphoracontrollers.yaml manifests/octavia.openstack.org_octaviaapis.yaml manifests/octavia.openstack.org_octaviarsyslogs.yaml manifests/octavia.openstack.org_octavias.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/octavia-operator-controller-manager-metrics-service_v1_service.yaml manifests/octavia-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaamphoracontroller-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviaapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octaviarsyslog-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-octavia-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/octavia-operator-webhook-service_v1_service.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator-controller-manager-metrics-service_v1_service.yaml manifests/openstack-baremetal-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackbaremetalset-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-openstackprovisionserver-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/openstack-baremetal-operator-webhook-service_v1_service.yaml manifests/ovn.openstack.org_ovncontrollers.yaml manifests/ovn.openstack.org_ovndbclusters.yaml manifests/ovn.openstack.org_ovnnorthds.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/ovn-operator-controller-manager-metrics-service_v1_service.yaml manifests/ovn-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovncontroller-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovndbcluster-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-ovnnorthd-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/ovn-operator-webhook-service_v1_service.yaml manifests/placement.openstack.org_placementapis.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/placement-operator-controller-manager-metrics-service_v1_service.yaml manifests/placement-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-placementapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/placement-operator-webhook-service_v1_service.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-service-binding-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/rabbitmq.com_rabbitmqclusters.yaml manifests/rabbitmq.openstack.org_rabbitmqpolicies.yaml manifests/rabbitmq.openstack.org_rabbitmqs.yaml manifests/rabbitmq.openstack.org_rabbitmqusers.yaml manifests/rabbitmq.openstack.org_rabbitmqvhosts.yaml manifests/rabbitmq.openstack.org_transporturls.yaml manifests/redis.openstack.org_redises.yaml manifests/swift.openstack.org_swiftproxies.yaml manifests/swift.openstack.org_swiftrings.yaml manifests/swift.openstack.org_swiftstorages.yaml manifests/swift.openstack.org_swifts.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/swift-operator-controller-manager-metrics-service_v1_service.yaml manifests/swift-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftproxy-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftring-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swiftstorage-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-swift-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/swift-operator-webhook-service_v1_service.yaml manifests/telemetry.openstack.org_autoscalings.yaml manifests/telemetry.openstack.org_ceilometers.yaml manifests/telemetry.openstack.org_cloudkitties.yaml manifests/telemetry.openstack.org_cloudkittyapis.yaml manifests/telemetry.openstack.org_cloudkittyprocs.yaml manifests/telemetry.openstack.org_loggings.yaml manifests/telemetry.openstack.org_metricstorages.yaml manifests/telemetry.openstack.org_telemetries.yaml manifests/telemetry-operator-autoscaling-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-autoscaling-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-autoscaling-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-ceilometer-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkittyproc-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-cloudkitty-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/telemetry-operator-controller-manager-metrics-service_v1_service.yaml manifests/telemetry-operator-logging-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-logging-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-logging-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-metricstorage-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-telemetry-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/telemetry-operator-webhook-service_v1_service.yaml manifests/test.openstack.org_ansibletests.yaml manifests/test.openstack.org_horizontests.yaml manifests/test.openstack.org_tempests.yaml manifests/test.openstack.org_tobikoes.yaml manifests/test-operator-ansibletest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-ansibletest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-ansibletest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator.clusterserviceversion.yaml manifests/test-operator-controller-manager-metrics-service_v1_service.yaml manifests/test-operator-horizontest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-horizontest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-horizontest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tempest-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-tobiko-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/test-operator-webhook-service_v1_service.yaml manifests/topology.openstack.org_topologies.yaml manifests/watcher.openstack.org_watcherapis.yaml manifests/watcher.openstack.org_watcherappliers.yaml manifests/watcher.openstack.org_watcherdecisionengines.yaml manifests/watcher.openstack.org_watchers.yaml manifests/watcher-operator.clusterserviceversion.yaml manifests/watcher-operator-controller-manager-metrics-service_v1_service.yaml manifests/watcher-operator-metrics-reader_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapi-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherapplier-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-admin-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcherdecisionengine-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-editor-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-watcher-viewer-role_rbac.authorization.k8s.io_v1_clusterrole.yaml manifests/watcher-operator-webhook-service_v1_service.yaml ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/test-operator.clusterserviceversion.yaml manifests/watcher-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=barbican-operator + echo barbican-operator barbican-operator ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis - barbicankeystonelisteners - barbicans - barbicanworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis/finalizers - barbicankeystonelisteners/finalizers - barbicans/finalizers - barbicanworkers/finalizers verbs: - patch - update - apiGroups: - barbican.openstack.org resources: - barbicanapis/status - barbicankeystonelisteners/status - barbicans/status - barbicanworkers/status verbs: - get - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ barbican-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ barbican-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/cinder-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=cinder-operator + echo cinder-operator cinder-operator ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis - cinderbackups - cinders - cinderschedulers - cindervolumes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinderapis/finalizers - cinderbackups/finalizers - cinders/finalizers - cinderschedulers/finalizers - cindervolumes/finalizers verbs: - patch - update - apiGroups: - cinder.openstack.org resources: - cinderapis/status - cinderbackups/status - cinders/status - cinderschedulers/status - cindervolumes/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ cinder-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ cinder-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=designate-operator + echo designate-operator designate-operator ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis - designatebackendbind9s - designatecentrals - designatemdnses - designateproducers - designates - designateunbounds - designateworkers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - designate.openstack.org resources: - designateapis/finalizers - designatebackendbind9s/finalizers - designatecentrals/finalizers - designatemdnses/finalizers - designateproducers/finalizers - designates/finalizers - designateunbounds/finalizers - designateworkers/finalizers verbs: - patch - update - apiGroups: - designate.openstack.org resources: - designateapis/status - designatebackendbind9s/status - designatecentrals/status - designatemdnses/status - designateproducers/status - designates/status - designateunbounds/status - designateworkers/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - operator.openshift.io resources: - networks verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ designate-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ designate-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=glance-operator + echo glance-operator glance-operator ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets/status verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cinder.openstack.org resources: - cinders verbs: - get - list - watch - apiGroups: - glance.openstack.org resources: - glanceapis - glances verbs: - create - delete - get - list - patch - update - watch - apiGroups: - glance.openstack.org resources: - glanceapis/finalizers - glances/finalizers verbs: - patch - update - apiGroups: - glance.openstack.org resources: - glanceapis/status - glances/status verbs: - get - patch - update - apiGroups: - horizon.openstack.org resources: - horizons verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ glance-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ glance-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=heat-operator + echo heat-operator heat-operator ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' ++ sed -e 's| ||' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis - heatcfnapis - heatengines - heats verbs: - create - delete - get - list - patch - update - watch - apiGroups: - heat.openstack.org resources: - heatapis/finalizers - heatcfnapis/finalizers - heatengines/finalizers - heats/finalizers verbs: - patch - update - apiGroups: - heat.openstack.org resources: - heatapis/status - heatcfnapis/status - heatengines/status - heats/status verbs: - get - patch - update - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ heat-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ heat-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=horizon-operator + echo horizon-operator horizon-operator ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons verbs: - create - delete - get - list - patch - update - watch - apiGroups: - horizon.openstack.org resources: - horizons/finalizers verbs: - patch - update - apiGroups: - horizon.openstack.org resources: - horizons/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis - keystoneendpoints - keystoneservices verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - hostmount-anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ horizon-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ horizon-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=infra-operator + echo infra-operator infra-operator ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org - cinder.openstack.org - designate.openstack.org - glance.openstack.org - heat.openstack.org - horizon.openstack.org - ironic.openstack.org - keystone.openstack.org - manila.openstack.org - neutron.openstack.org - nova.openstack.org - octavia.openstack.org - ovn.openstack.org - placement.openstack.org - swift.openstack.org - telemetry.openstack.org - watcher.openstack.org resources: - '\''*'\'' verbs: - get - list - apiGroups: - config.openshift.io resources: - networks verbs: - get - list - watch - apiGroups: - frrk8s.metallb.io resources: - frrconfigurations verbs: - create - delete - deletecollection - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas verbs: - create - delete - get - list - patch - update - watch - apiGroups: - instanceha.openstack.org resources: - instancehas/finalizers verbs: - patch - update - apiGroups: - instanceha.openstack.org resources: - instancehas/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - create - delete - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - bgpconfigurations - dnsdata - dnsdatas - dnsmasqs - ipsets - reservations - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - network.openstack.org resources: - bgpconfigurations/finalizers verbs: - update - apiGroups: - network.openstack.org resources: - bgpconfigurations/status - dnsdata/status - dnsmasqs/status - ipsets/status - services/status verbs: - get - patch - update - apiGroups: - network.openstack.org resources: - dnsdata/finalizers - dnsmasqs/finalizers - ipsets/finalizers - reservations/finalizers - services/finalizers verbs: - patch - update - apiGroups: - network.openstack.org resources: - netconfigs verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies - rabbitmqs - rabbitmqusers - rabbitmqvhosts - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies/finalizers - rabbitmqs/finalizers - rabbitmqusers/finalizers - rabbitmqvhosts/finalizers - transporturls/finalizers verbs: - update - apiGroups: - rabbitmq.openstack.org resources: - rabbitmqpolicies/status - rabbitmqs/status - rabbitmqusers/status - rabbitmqvhosts/status - transporturls/status verbs: - get - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises/finalizers verbs: - update - apiGroups: - redis.openstack.org resources: - redises/status verbs: - get - patch - update - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ infra-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + write_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator + local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml + local OPERATOR_NAME=infra-operator ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator MutatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=MutatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "MutatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + MUTATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: mdnsmasq-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: minstanceha-v1beta1.kb.io rules: - apiGroups: - instanceha.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-instanceha-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: mipset-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: mmemcached-v1beta1.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: mnetconfig-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmq-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqpolicy-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqpolicy.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmquser-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmquser.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqvhost-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: mrabbitmqvhost.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: mredis-v1beta1.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: mreservation-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-network-openstack-org-v1beta1-reservation' ++ extract_webhooks manifests/infra-operator.clusterserviceversion.yaml infra-operator ValidatingAdmissionWebhook ++ local CSV_FILENAME=manifests/infra-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=infra-operator ++ local TYPE=ValidatingAdmissionWebhook ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "ValidatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: infra-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + VALIDATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: vdnsmasq-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - dnsmasqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-dnsmasq - admissionReviewVersions: - v1 failurePolicy: Fail name: vinstanceha-v1beta1.kb.io rules: - apiGroups: - instanceha.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - instancehas sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-instanceha-openstack-org-v1beta1-instanceha - admissionReviewVersions: - v1 failurePolicy: Fail name: vipset-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - ipsets sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-ipset - admissionReviewVersions: - v1 failurePolicy: Fail name: vmemcached-v1beta1.kb.io rules: - apiGroups: - memcached.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - memcacheds sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-memcached-openstack-org-v1beta1-memcached - admissionReviewVersions: - v1 failurePolicy: Fail name: vnetconfig-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE - DELETE resources: - netconfigs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-netconfig - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmq-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqs sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmq - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqpolicy-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqpolicy.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqpolicies sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqpolicy - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmquser-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmquser.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqusers sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmquser - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqvhost-v1beta1.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: vrabbitmqvhost.kb.io rules: - apiGroups: - rabbitmq.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - rabbitmqvhosts sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-rabbitmq-openstack-org-v1beta1-rabbitmqvhost - admissionReviewVersions: - v1 failurePolicy: Fail name: vredis-v1beta1.kb.io rules: - apiGroups: - redis.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - redises sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-redis-openstack-org-v1beta1-redis - admissionReviewVersions: - v1 failurePolicy: Fail name: vreservation-v1beta1.kb.io rules: - apiGroups: - network.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - reservations sideEffects: None clientConfig: service: name: infra-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-network-openstack-org-v1beta1-reservation' + cat + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=ironic-operator + echo ironic-operator ironic-operator ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's| ||' ++ sed -e 's|- rules:|rules:|' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis - ironicconductors - ironicinspectors - ironicneutronagents - ironics verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ironic.openstack.org resources: - ironicapis/finalizers - ironicconductors/finalizers - ironicinspectors/finalizers - ironicneutronagents/finalizers - ironics/finalizers verbs: - patch - update - apiGroups: - ironic.openstack.org resources: - ironicapis/status - ironicconductors/status - ironicinspectors/status - ironicneutronagents/status - ironics/status verbs: - get - patch - update - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - operator.openshift.io resources: - ingresscontrollers verbs: - get - list - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ ironic-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ ironic-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/keystone-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=keystone-operator + echo keystone-operator keystone-operator ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - events verbs: - create - patch - apiGroups: - "" resources: - secrets/finalizers verbs: - create - delete - get - list - patch - update - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis - keystoneapplicationcredentials - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis/finalizers - keystoneapplicationcredentials/finalizers - keystoneendpoints/finalizers - keystoneservices/finalizers verbs: - patch - update - apiGroups: - keystone.openstack.org resources: - keystoneapis/status - keystoneapplicationcredentials/status - keystoneendpoints/status - keystoneservices/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ keystone-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ keystone-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/manila-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=manila-operator + echo manila-operator manila-operator ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - manila.openstack.org resources: - manilaapis - manilas - manilaschedulers - manilashares verbs: - create - delete - get - list - patch - update - watch - apiGroups: - manila.openstack.org resources: - manilaapis/finalizers - manilas/finalizers - manilaschedulers/finalizers - manilashares/finalizers verbs: - patch - update - apiGroups: - manila.openstack.org resources: - manilaapis/status - manilas/status - manilaschedulers/status - manilashares/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ manila-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ manila-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/mariadb-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=mariadb-operator + echo mariadb-operator mariadb-operator ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - cronjobs - endpoints - persistentvolumeclaims - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets/status verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galerabackups - galerarestores - galeras - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galerabackups/finalizers - galerarestores/finalizers verbs: - update - apiGroups: - mariadb.openstack.org resources: - galerabackups/status - galerarestores/status - mariadbaccounts/status - mariadbdatabases/status verbs: - get - patch - update - apiGroups: - mariadb.openstack.org resources: - galeras/finalizers - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - mariadb.openstack.org resources: - galeras/status verbs: - get - list - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ mariadb-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ mariadb-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/neutron-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=neutron-operator + echo neutron-operator neutron-operator ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - neutron.openstack.org resources: - neutronapis verbs: - create - delete - get - list - patch - update - watch - apiGroups: - neutron.openstack.org resources: - neutronapis/finalizers verbs: - patch - update - apiGroups: - neutron.openstack.org resources: - neutronapis/status verbs: - get - patch - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ neutron-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ neutron-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/nova-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=nova-operator + echo nova-operator nova-operator ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - nova.openstack.org resources: - nova - novaapis - novacells - novacomputes - novaconductors - novametadata - novanovncproxies - novaschedulers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - nova.openstack.org resources: - nova/finalizers - novaapis/finalizers - novacells/finalizers - novacomputes/finalizers - novaconductors/finalizers - novametadata/finalizers - novanovncproxies/finalizers - novaschedulers/finalizers verbs: - patch - update - apiGroups: - nova.openstack.org resources: - nova/status - novaapis/status - novacells/status - novacomputes/status - novaconductors/status - novametadata/status - novanovncproxies/status - novaschedulers/status verbs: - get - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ nova-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ nova-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/octavia-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=octavia-operator + echo octavia-operator octavia-operator ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - daemonsets - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers - octaviaapis - octaviarsyslogs - octavias verbs: - create - delete - get - list - patch - update - watch - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers/finalizers - octaviaapis/finalizers - octavias/finalizers verbs: - patch - update - apiGroups: - octavia.openstack.org resources: - octaviaamphoracontrollers/status - octaviaapis/status - octaviarsyslogs/status - octavias/status verbs: - get - patch - update - apiGroups: - octavia.openstack.org resources: - octaviarsyslogs/finalizers verbs: - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - redis.openstack.org resources: - redises verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - hostmount-anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ octavia-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ octavia-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=openstack-baremetal-operator + echo openstack-baremetal-operator openstack-baremetal-operator ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - configmaps/finalizers - pods - secrets - secrets/finalizers - volumes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets - openstackprovisionservers - openstackprovisionservers/finalizers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets/finalizers verbs: - patch - update - apiGroups: - baremetal.openstack.org resources: - openstackbaremetalsets/status verbs: - get - patch - update - apiGroups: - baremetal.openstack.org resources: - openstackprovisionservers/status verbs: - get - list - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - metal3.io resources: - baremetalhosts verbs: - get - list - patch - update - watch - apiGroups: - metal3.io resources: - baremetalhosts/status verbs: - get - apiGroups: - metal3.io resources: - provisionings verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - hostnetwork resources: - securitycontextconstraints verbs: - use - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ openstack-baremetal-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ openstack-baremetal-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + write_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator + local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml + local OPERATOR_NAME=openstack-baremetal-operator ++ extract_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator MutatingAdmissionWebhook ++ local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=openstack-baremetal-operator ++ local TYPE=MutatingAdmissionWebhook ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "MutatingAdmissionWebhook")' ++ sed -e '/^containerPort:/d' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: openstack-baremetal-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + MUTATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: mopenstackbaremetalset-v1beta1.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackbaremetalsets sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-baremetal-openstack-org-v1beta1-openstackbaremetalset - admissionReviewVersions: - v1 failurePolicy: Fail name: mopenstackprovisionserver-v1beta1.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackprovisionservers sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /mutate-baremetal-openstack-org-v1beta1-openstackprovisionserver' ++ extract_webhooks manifests/openstack-baremetal-operator.clusterserviceversion.yaml openstack-baremetal-operator ValidatingAdmissionWebhook ++ local CSV_FILENAME=manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ local OPERATOR_NAME=openstack-baremetal-operator ++ local TYPE=ValidatingAdmissionWebhook ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.webhookdefinitions.[] | select(.type == "ValidatingAdmissionWebhook")' ++ sed -e '/^deploymentName:/d' ++ sed -e '/^containerPort:/d' ++ sed -e '/^targetPort:/d' ++ sed -e '/^type:/d' ++ sed -e 's|^| |' ++ sed -e 's|.*admissionReviewVersions:|- admissionReviewVersions:|' ++ sed -e 's|.*generateName:| name:|' ++ sed -e 's| - v1| - v1|' ++ sed -e 's|.*webhookPath:| clientConfig:\n service:\n name: openstack-baremetal-operator-webhook-service\n namespace: '\''{{ .OperatorNamespace }}'\''\n path:|' + VALIDATING_WEBHOOKS='- admissionReviewVersions: - v1 failurePolicy: Fail name: vopenstackbaremetalset-v1beta1.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackbaremetalsets sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-baremetal-openstack-org-v1beta1-openstackbaremetalset - admissionReviewVersions: - v1 failurePolicy: Fail name: vopenstackprovisionserver-v1beta1.kb.io rules: - apiGroups: - baremetal.openstack.org apiVersions: - v1beta1 operations: - CREATE - UPDATE resources: - openstackprovisionservers sideEffects: None clientConfig: service: name: openstack-baremetal-operator-webhook-service namespace: '\''{{ .OperatorNamespace }}'\'' path: /validate-baremetal-openstack-org-v1beta1-openstackprovisionserver' + cat + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/ovn-operator.clusterserviceversion.yaml + OPERATOR_NAME=ovn-operator + echo ovn-operator ovn-operator ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - daemonsets - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - delete - get - list - patch - update - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - create - delete - get - list - patch - update - watch - apiGroups: - network.openstack.org resources: - dnsdata verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ovn.openstack.org resources: - ovncontroller verbs: - watch - apiGroups: - ovn.openstack.org resources: - ovncontrollers - ovndbclusters - ovnnorthds verbs: - create - delete - get - list - patch - update - watch - apiGroups: - ovn.openstack.org resources: - ovncontrollers/finalizers - ovndbclusters/finalizers - ovnnorthds/finalizers verbs: - patch - update - apiGroups: - ovn.openstack.org resources: - ovncontrollers/status - ovnnorthds/status verbs: - get - patch - update - apiGroups: - ovn.openstack.org resources: - ovndbclusters/status verbs: - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - restricted-v2 resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ ovn-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ ovn-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=placement-operator + echo placement-operator placement-operator ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - deployments verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - placement.openstack.org resources: - placementapis verbs: - create - delete - get - list - patch - update - watch - apiGroups: - placement.openstack.org resources: - placementapis/finalizers verbs: - patch - update - apiGroups: - placement.openstack.org resources: - placementapis/status verbs: - get - patch - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ placement-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ placement-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=rabbitmq-cluster-operator + echo rabbitmq-cluster-operator rabbitmq-cluster-operator ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.31.0 ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create' ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ sed -e 's|- rules:|rules:|' ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - secrets - serviceaccounts - services verbs: - create - get - list - update - watch - apiGroups: - "" resources: - endpoints verbs: - get - list - watch - apiGroups: - "" resources: - events verbs: - create - get - patch - apiGroups: - "" resources: - pods verbs: - get - list - update - watch - apiGroups: - "" resources: - pods/exec verbs: - create - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - create - get - list - update - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters/finalizers verbs: - update - apiGroups: - rabbitmq.com resources: - rabbitmqclusters/status verbs: - get - update - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - update - watch' + [[ rabbitmq-cluster-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ rabbitmq-cluster-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.31.0 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.31.0 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/swift-operator.clusterserviceversion.yaml + OPERATOR_NAME=swift-operator + echo swift-operator swift-operator ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - nodes verbs: - get - list - apiGroups: - "" resources: - persistentvolumeclaims - pods verbs: - get - list - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - '\''*'\'' resources: - configmaps verbs: - create - delete - get - list - patch - update - watch - apiGroups: - apps resources: - deployments - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - barbican.openstack.org resources: - barbicanapis verbs: - get - list - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - network.openstack.org resources: - dnsdata verbs: - create - delete - get - list - patch - update - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - nonroot-v2 resources: - securitycontextconstraints verbs: - use - apiGroups: - swift.openstack.org resources: - swiftproxies - swiftrings - swifts - swiftstorages verbs: - create - delete - get - list - patch - update - watch - apiGroups: - swift.openstack.org resources: - swiftproxies/finalizers - swiftrings/finalizers - swifts/finalizers - swiftstorages/finalizers verbs: - patch - update - apiGroups: - swift.openstack.org resources: - swiftproxies/status - swiftrings/status - swifts/status - swiftstorages/status verbs: - get - patch - update - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ swift-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ swift-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/telemetry-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=telemetry-operator + echo telemetry-operator telemetry-operator ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions verbs: - get - list - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cert-manager.io resources: - certificates verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cert-manager.io resources: - issuers verbs: - get - list - watch - apiGroups: - cloudkitty.openstack.org resources: - cloudkittyprocs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - cloudkitty.openstack.org resources: - cloudkittyprocs/finalizers verbs: - patch - update - apiGroups: - cloudkitty.openstack.org resources: - cloudkittyprocs/status verbs: - get - patch - update - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - get - list - watch - apiGroups: - heat.openstack.org resources: - heats verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - loki.grafana.com resources: - lokistacks verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - galeras verbs: - get - list - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers - mariadbdatabases/finalizers verbs: - patch - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - watch - apiGroups: - monitoring.rhobs resources: - alertmanagers - prometheuses verbs: - delete - get - list - patch - update - watch - apiGroups: - monitoring.rhobs resources: - monitoringstacks - prometheusrules - scrapeconfigs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - monitoring.rhobs resources: - servicemonitors verbs: - delete - get - list - apiGroups: - network.openstack.org resources: - ipsets verbs: - get - list - watch - apiGroups: - observability.openshift.io resources: - uiplugins verbs: - create - get - list - patch - watch - apiGroups: - ovn.openstack.org resources: - ovnnorthds verbs: - get - list - watch - apiGroups: - rabbitmq.com resources: - rabbitmqclusters verbs: - get - list - watch - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - security.openshift.io resourceNames: - anyuid - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - telemetry.openstack.org resources: - autoscalings - ceilometers - cloudkitties - cloudkittyapis - cloudkittyprocs - loggings - metricstorages - telemetries verbs: - create - delete - get - list - patch - update - watch - apiGroups: - telemetry.openstack.org resources: - autoscalings/finalizers - ceilometers/finalizers - cloudkitties/finalizers - loggings/finalizers - metricstorages/finalizers verbs: - delete - patch - update - apiGroups: - telemetry.openstack.org resources: - autoscalings/status - ceilometers/status - cloudkitties/status - cloudkittyapis/status - cloudkittyprocs/status - loggings/status - metricstorages/status - telemetries/status verbs: - get - patch - update - apiGroups: - telemetry.openstack.org resources: - cloudkittyapis/finalizers - cloudkittyprocs/finalizers - telemetries/finalizers verbs: - patch - update - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ telemetry-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ telemetry-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/test-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=test-operator + echo test-operator test-operator ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps - persistentvolumeclaims - pods verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - secrets verbs: - get - list - watch - apiGroups: - k8s.cni.cncf.io resources: - network-attachment-definitions verbs: - get - list - watch - apiGroups: - security.openshift.io resourceNames: - anyuid - nonroot - nonroot-v2 - privileged resources: - securitycontextconstraints verbs: - use - apiGroups: - test.openstack.org resources: - ansibletests - horizontests - tempests - tobikoes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - test.openstack.org resources: - ansibletests/finalizers - horizontests/finalizers - tempests/finalizers - tobikoes/finalizers verbs: - patch - update - apiGroups: - test.openstack.org resources: - ansibletests/status - horizontests/status - tempests/status - tobikoes/status verbs: - get - patch - update - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ test-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ test-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/watcher-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' + OPERATOR_NAME=watcher-operator + echo watcher-operator watcher-operator ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.metadata.annotations."operators.operatorframework.io/builder"' + OPERATOR_SDK_VERSION=operator-sdk-v1.41.1 ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.permissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + LEADER_ELECTION_ROLE_RULES='rules: - apiGroups: - "" resources: - configmaps verbs: - get - list - watch - create - update - patch - delete - apiGroups: - coordination.k8s.io resources: - leases verbs: - get - list - watch - create - update - patch - delete - apiGroups: - "" resources: - events verbs: - create - patch' ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r .spec.install.spec.clusterPermissions ++ sed -e 's|- rules:|rules:|' ++ sed -e 's| ||' ++ sed -e '/ serviceAccountName.*/d' + CLUSTER_ROLE_RULES='rules: - apiGroups: - "" resources: - pods - secrets - services verbs: - create - delete - get - list - patch - update - watch - apiGroups: - "" resources: - serviceaccounts verbs: - create - get - list - patch - update - watch - apiGroups: - apps resources: - statefulsets verbs: - create - delete - get - list - patch - update - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - get - list - patch - update - watch - apiGroups: - keystone.openstack.org resources: - keystoneapis verbs: - get - list - watch - apiGroups: - keystone.openstack.org resources: - keystoneendpoints - keystoneservices verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts - mariadbdatabases verbs: - create - delete - get - list - patch - update - watch - apiGroups: - mariadb.openstack.org resources: - mariadbaccounts/finalizers verbs: - update - apiGroups: - memcached.openstack.org resources: - memcacheds verbs: - get - list - patch - update - watch - apiGroups: - memcached.openstack.org resources: - memcacheds/finalizers verbs: - patch - update - apiGroups: - rabbitmq.openstack.org resources: - transporturls verbs: - create - delete - get - list - patch - update - watch - apiGroups: - rbac.authorization.k8s.io resources: - rolebindings - roles verbs: - create - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes verbs: - create - delete - get - list - patch - update - watch - apiGroups: - route.openshift.io resources: - routes/custom-host verbs: - create - patch - update - apiGroups: - security.openshift.io resourceNames: - anyuid resources: - securitycontextconstraints verbs: - use - apiGroups: - topology.openstack.org resources: - topologies verbs: - get - list - update - watch - apiGroups: - watcher.openstack.org resources: - watcherapis - watcherappliers - watcherdecisionengines - watchers verbs: - create - delete - get - list - patch - update - watch - apiGroups: - watcher.openstack.org resources: - watcherapis/finalizers - watcherappliers/finalizers - watcherdecisionengines/finalizers - watchers/finalizers verbs: - update - apiGroups: - watcher.openstack.org resources: - watcherapis/status - watcherappliers/status - watcherdecisionengines/status - watchers/status verbs: - get - patch - update - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create' + [[ watcher-operator == \i\n\f\r\a\-\o\p\e\r\a\t\o\r ]] + [[ watcher-operator == \o\p\e\n\s\t\a\c\k\-\b\a\r\e\m\e\t\a\l\-\o\p\e\r\a\t\o\r ]] + mkdir -p rbac + cat + [[ operator-sdk-v1.41.1 == \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + [[ operator-sdk-v1.41.1 != \o\p\e\r\a\t\o\r\-\s\d\k\-\v\1\.\3\1\.\0 ]] + cat + cat + cat ++ ls manifests/barbican-operator.clusterserviceversion.yaml manifests/cinder-operator.clusterserviceversion.yaml manifests/designate-operator.clusterserviceversion.yaml manifests/glance-operator.clusterserviceversion.yaml manifests/heat-operator.clusterserviceversion.yaml manifests/horizon-operator.clusterserviceversion.yaml manifests/infra-operator.clusterserviceversion.yaml manifests/ironic-operator.clusterserviceversion.yaml manifests/keystone-operator.clusterserviceversion.yaml manifests/manila-operator.clusterserviceversion.yaml manifests/mariadb-operator.clusterserviceversion.yaml manifests/neutron-operator.clusterserviceversion.yaml manifests/nova-operator.clusterserviceversion.yaml manifests/octavia-operator.clusterserviceversion.yaml manifests/openstack-baremetal-operator.clusterserviceversion.yaml manifests/ovn-operator.clusterserviceversion.yaml manifests/placement-operator.clusterserviceversion.yaml manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml manifests/swift-operator.clusterserviceversion.yaml manifests/telemetry-operator.clusterserviceversion.yaml manifests/test-operator.clusterserviceversion.yaml manifests/watcher-operator.clusterserviceversion.yaml + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/barbican-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=BARBICAN_OPERATOR + echo BARBICAN_OPERATOR BARBICAN_OPERATOR + [[ BARBICAN_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/barbican-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/barbican-operator@sha256:8cd526f97872e38fbe4ffd77547fc169586f072816c2762b402291b3ec004451 + echo quay.io/openstack-k8s-operators/barbican-operator@sha256:8cd526f97872e38fbe4ffd77547fc169586f072816c2762b402291b3ec004451 quay.io/openstack-k8s-operators/barbican-operator@sha256:8cd526f97872e38fbe4ffd77547fc169586f072816c2762b402291b3ec004451 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/cinder-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=CINDER_OPERATOR + echo CINDER_OPERATOR CINDER_OPERATOR + [[ CINDER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/cinder-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/cinder-operator@sha256:88d2227c383e6ca639e7289a904c4ad19923956ffb0f9ad2ab1dbce393c128dc + echo quay.io/openstack-k8s-operators/cinder-operator@sha256:88d2227c383e6ca639e7289a904c4ad19923956ffb0f9ad2ab1dbce393c128dc quay.io/openstack-k8s-operators/cinder-operator@sha256:88d2227c383e6ca639e7289a904c4ad19923956ffb0f9ad2ab1dbce393c128dc + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/designate-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=DESIGNATE_OPERATOR + echo DESIGNATE_OPERATOR DESIGNATE_OPERATOR + [[ DESIGNATE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/designate-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/designate-operator@sha256:5007f87a2869468db06d6257c17e389b587a095a087466c69c0c92328e699546 + echo quay.io/openstack-k8s-operators/designate-operator@sha256:5007f87a2869468db06d6257c17e389b587a095a087466c69c0c92328e699546 quay.io/openstack-k8s-operators/designate-operator@sha256:5007f87a2869468db06d6257c17e389b587a095a087466c69c0c92328e699546 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/glance-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=GLANCE_OPERATOR + echo GLANCE_OPERATOR GLANCE_OPERATOR + [[ GLANCE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/glance-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/glance-operator@sha256:bff5fd9d4a6b97d53632cd4d4c0bd1a2925b409be6a2bbcb088b53b21cc3a54a + echo quay.io/openstack-k8s-operators/glance-operator@sha256:bff5fd9d4a6b97d53632cd4d4c0bd1a2925b409be6a2bbcb088b53b21cc3a54a quay.io/openstack-k8s-operators/glance-operator@sha256:bff5fd9d4a6b97d53632cd4d4c0bd1a2925b409be6a2bbcb088b53b21cc3a54a + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/heat-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HEAT_OPERATOR + echo HEAT_OPERATOR HEAT_OPERATOR + [[ HEAT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/heat-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/heat-operator@sha256:afb68925f208ca401020ca8b7812de075a77dafe3dc30fae5c095dcbe5acbc8a + echo quay.io/openstack-k8s-operators/heat-operator@sha256:afb68925f208ca401020ca8b7812de075a77dafe3dc30fae5c095dcbe5acbc8a quay.io/openstack-k8s-operators/heat-operator@sha256:afb68925f208ca401020ca8b7812de075a77dafe3dc30fae5c095dcbe5acbc8a + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/horizon-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=HORIZON_OPERATOR + echo HORIZON_OPERATOR HORIZON_OPERATOR + [[ HORIZON_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/horizon-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/horizon-operator@sha256:00e0076b910b180d2ee76f7fa74f058fd1e2bee9e313f3a87c5f84bdd2600e2a + echo quay.io/openstack-k8s-operators/horizon-operator@sha256:00e0076b910b180d2ee76f7fa74f058fd1e2bee9e313f3a87c5f84bdd2600e2a quay.io/openstack-k8s-operators/horizon-operator@sha256:00e0076b910b180d2ee76f7fa74f058fd1e2bee9e313f3a87c5f84bdd2600e2a + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/infra-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=INFRA_OPERATOR + echo INFRA_OPERATOR INFRA_OPERATOR + [[ INFRA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/infra-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/infra-operator@sha256:fc76cfd501345b5e18ddf48006aa04bcb4cb4020acd83894ed7c4fc952c0232a + echo quay.io/openstack-k8s-operators/infra-operator@sha256:fc76cfd501345b5e18ddf48006aa04bcb4cb4020acd83894ed7c4fc952c0232a quay.io/openstack-k8s-operators/infra-operator@sha256:fc76cfd501345b5e18ddf48006aa04bcb4cb4020acd83894ed7c4fc952c0232a + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ironic-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=IRONIC_OPERATOR + echo IRONIC_OPERATOR IRONIC_OPERATOR + [[ IRONIC_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/ironic-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/ironic-operator@sha256:6859cc0cf730f0780b90700447d91238a618c05465420960d07aa894abaf05e4 + echo quay.io/openstack-k8s-operators/ironic-operator@sha256:6859cc0cf730f0780b90700447d91238a618c05465420960d07aa894abaf05e4 quay.io/openstack-k8s-operators/ironic-operator@sha256:6859cc0cf730f0780b90700447d91238a618c05465420960d07aa894abaf05e4 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/keystone-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=KEYSTONE_OPERATOR + echo KEYSTONE_OPERATOR KEYSTONE_OPERATOR + [[ KEYSTONE_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/keystone-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/keystone-operator@sha256:9cb0b42ba1836ba4320a0a4660bfdeddea8c0685be379c0000dafb16398f4469 + echo quay.io/openstack-k8s-operators/keystone-operator@sha256:9cb0b42ba1836ba4320a0a4660bfdeddea8c0685be379c0000dafb16398f4469 quay.io/openstack-k8s-operators/keystone-operator@sha256:9cb0b42ba1836ba4320a0a4660bfdeddea8c0685be379c0000dafb16398f4469 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/manila-operator.clusterserviceversion.yaml ++ sed -e 's|-|_|g' ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=MANILA_OPERATOR + echo MANILA_OPERATOR MANILA_OPERATOR + [[ MANILA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/manila-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/manila-operator@sha256:a5396a8d7e5ca6ddabfa92744f0d4adab9de0bbe712e8cdab1bf13576b7ac8c8 + echo quay.io/openstack-k8s-operators/manila-operator@sha256:a5396a8d7e5ca6ddabfa92744f0d4adab9de0bbe712e8cdab1bf13576b7ac8c8 quay.io/openstack-k8s-operators/manila-operator@sha256:a5396a8d7e5ca6ddabfa92744f0d4adab9de0bbe712e8cdab1bf13576b7ac8c8 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/mariadb-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=MARIADB_OPERATOR + echo MARIADB_OPERATOR MARIADB_OPERATOR + [[ MARIADB_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/mariadb-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/mariadb-operator@sha256:4739c84b458c57b2434ee17e8029bbf3c8daf2a9ee3253fb385bbb4925ee8acd + echo quay.io/openstack-k8s-operators/mariadb-operator@sha256:4739c84b458c57b2434ee17e8029bbf3c8daf2a9ee3253fb385bbb4925ee8acd quay.io/openstack-k8s-operators/mariadb-operator@sha256:4739c84b458c57b2434ee17e8029bbf3c8daf2a9ee3253fb385bbb4925ee8acd + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/neutron-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=NEUTRON_OPERATOR + echo NEUTRON_OPERATOR NEUTRON_OPERATOR + [[ NEUTRON_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/neutron-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/neutron-operator@sha256:8d65a2becf279bb8b6b1a09e273d9a2cb1ff41f85bc42ef2e4d573cbb8cbac89 + echo quay.io/openstack-k8s-operators/neutron-operator@sha256:8d65a2becf279bb8b6b1a09e273d9a2cb1ff41f85bc42ef2e4d573cbb8cbac89 quay.io/openstack-k8s-operators/neutron-operator@sha256:8d65a2becf279bb8b6b1a09e273d9a2cb1ff41f85bc42ef2e4d573cbb8cbac89 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/nova-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=NOVA_OPERATOR + echo NOVA_OPERATOR NOVA_OPERATOR + [[ NOVA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/nova-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/nova-operator@sha256:134ba6286a71d80b32e0acad212d905cbe6a87c8d7aebdca2dd4a7a9ce09e529 + echo quay.io/openstack-k8s-operators/nova-operator@sha256:134ba6286a71d80b32e0acad212d905cbe6a87c8d7aebdca2dd4a7a9ce09e529 quay.io/openstack-k8s-operators/nova-operator@sha256:134ba6286a71d80b32e0acad212d905cbe6a87c8d7aebdca2dd4a7a9ce09e529 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ echo manifests/octavia-operator.clusterserviceversion.yaml ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OCTAVIA_OPERATOR + echo OCTAVIA_OPERATOR OCTAVIA_OPERATOR + [[ OCTAVIA_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/octavia-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/octavia-operator@sha256:ba1d61d3e7f9410541fa1d04110d3859b22fe7de9f2a570e932be8d0e312d5fe + echo quay.io/openstack-k8s-operators/octavia-operator@sha256:ba1d61d3e7f9410541fa1d04110d3859b22fe7de9f2a570e932be8d0e312d5fe quay.io/openstack-k8s-operators/octavia-operator@sha256:ba1d61d3e7f9410541fa1d04110d3859b22fe7de9f2a570e932be8d0e312d5fe + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OPENSTACK_BAREMETAL_OPERATOR + echo OPENSTACK_BAREMETAL_OPERATOR OPENSTACK_BAREMETAL_OPERATOR + [[ OPENSTACK_BAREMETAL_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/openstack-baremetal-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:d8f38654cb385d3ff582419746c3d68d64c43cea412622f0e5dfcb32ee5ab47b + echo quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:d8f38654cb385d3ff582419746c3d68d64c43cea412622f0e5dfcb32ee5ab47b quay.io/openstack-k8s-operators/openstack-baremetal-operator@sha256:d8f38654cb385d3ff582419746c3d68d64c43cea412622f0e5dfcb32ee5ab47b + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/ovn-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=OVN_OPERATOR + echo OVN_OPERATOR OVN_OPERATOR + [[ OVN_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/ovn-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/ovn-operator@sha256:4d3b6d259005ea30eee9c134d5fdf3d67eaacad8568ed105a34674e510086816 + echo quay.io/openstack-k8s-operators/ovn-operator@sha256:4d3b6d259005ea30eee9c134d5fdf3d67eaacad8568ed105a34674e510086816 quay.io/openstack-k8s-operators/ovn-operator@sha256:4d3b6d259005ea30eee9c134d5fdf3d67eaacad8568ed105a34674e510086816 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/placement-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=PLACEMENT_OPERATOR + echo PLACEMENT_OPERATOR PLACEMENT_OPERATOR + [[ PLACEMENT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/placement-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/placement-operator@sha256:d800f1288d1517d84a45ddd475c3c0b4e8686fd900c9edf1e20b662b15218b89 + echo quay.io/openstack-k8s-operators/placement-operator@sha256:d800f1288d1517d84a45ddd475c3c0b4e8686fd900c9edf1e20b662b15218b89 quay.io/openstack-k8s-operators/placement-operator@sha256:d800f1288d1517d84a45ddd475c3c0b4e8686fd900c9edf1e20b662b15218b89 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=RABBITMQ_CLUSTER_OPERATOR + echo RABBITMQ_CLUSTER_OPERATOR RABBITMQ_CLUSTER_OPERATOR + [[ RABBITMQ_CLUSTER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/rabbitmq-cluster-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "operator") | .image' + IMAGE=quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 + echo quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 quay.io/openstack-k8s-operators/rabbitmq-cluster-operator@sha256:893e66303c1b0bc1d00a299a3f0380bad55c8dc813c8a1c6a4aab379f5aa12a2 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/swift-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=SWIFT_OPERATOR + echo SWIFT_OPERATOR SWIFT_OPERATOR + [[ SWIFT_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/swift-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/swift-operator@sha256:015f7f2d8b5afc85e51dd3b2e02a4cfb8294b543437315b291006d2416764db9 + echo quay.io/openstack-k8s-operators/swift-operator@sha256:015f7f2d8b5afc85e51dd3b2e02a4cfb8294b543437315b291006d2416764db9 quay.io/openstack-k8s-operators/swift-operator@sha256:015f7f2d8b5afc85e51dd3b2e02a4cfb8294b543437315b291006d2416764db9 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/telemetry-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=TELEMETRY_OPERATOR + echo TELEMETRY_OPERATOR TELEMETRY_OPERATOR + [[ TELEMETRY_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/telemetry-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=38.102.83.222:5001/openstack-k8s-operators/telemetry-operator:82f129b765136daa2b4772208bda9897d3262103 + echo 38.102.83.222:5001/openstack-k8s-operators/telemetry-operator:82f129b765136daa2b4772208bda9897d3262103 38.102.83.222:5001/openstack-k8s-operators/telemetry-operator:82f129b765136daa2b4772208bda9897d3262103 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/test-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=TEST_OPERATOR + echo TEST_OPERATOR TEST_OPERATOR + [[ TEST_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/test-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/test-operator@sha256:f9b2e00617c7f219932ea0d5e2bb795cc4361a335a72743077948d8108695c27 + echo quay.io/openstack-k8s-operators/test-operator@sha256:f9b2e00617c7f219932ea0d5e2bb795cc4361a335a72743077948d8108695c27 quay.io/openstack-k8s-operators/test-operator@sha256:f9b2e00617c7f219932ea0d5e2bb795cc4361a335a72743077948d8108695c27 + cat + cat + for X in $(ls manifests/*clusterserviceversion.yaml) ++ echo manifests/watcher-operator.clusterserviceversion.yaml ++ sed -e 's|manifests\/\([^\.]*\)\..*|\1|' ++ sed -e 's|-|_|g' ++ tr '[:lower:]' '[:upper:]' + OPERATOR_NAME=WATCHER_OPERATOR + echo WATCHER_OPERATOR WATCHER_OPERATOR + [[ WATCHER_OPERATOR == \R\A\B\B\I\T\M\Q\_\C\L\U\S\T\E\R\_\O\P\E\R\A\T\O\R ]] ++ cat manifests/watcher-operator.clusterserviceversion.yaml ++ /home/zuul-worker/src/github.com/openstack-k8s-operators/openstack-operator/bin/yq -r '.spec.install.spec.deployments[0].spec.template.spec.containers.[] | select(.name == "manager") | .image' + IMAGE=quay.io/openstack-k8s-operators/watcher-operator@sha256:f33fc1f2e53ff4baa4e16b41f37aaa7273dcea0ef4b5a3949411e2f105c73e5e + echo quay.io/openstack-k8s-operators/watcher-operator@sha256:f33fc1f2e53ff4baa4e16b41f37aaa7273dcea0ef4b5a3949411e2f105c73e5e quay.io/openstack-k8s-operators/watcher-operator@sha256:f33fc1f2e53ff4baa4e16b41f37aaa7273dcea0ef4b5a3949411e2f105c73e5e + cat + cat + cd .. + rm -Rf tmp/bindata + rm -Rf bindata/manifests + rm -Rf bindata/metadata + rm -Rf bindata/tests + [[ '' == \t\r\u\e ]] ~/ci-framework-data/artifacts