Created
December 16, 2019 14:32
-
-
Save akutz/7aa6168d1636699925064c5bfd69cf01 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ make e2e | |
ginkgo -v ./test/e2e | |
Running Suite: CAPV e2e Suite | |
============================= | |
Random Seed: 1576506353 | |
Will run 1 of 1 specs | |
STEP: cleaning up previous kind cluster | |
STEP: initializing the vSphere session | |
STEP: parsing vSphere server URL | |
STEP: creating vSphere client | |
STEP: creating vSphere finder | |
STEP: configuring vSphere datacenter | |
STEP: initializing the runtime.Scheme | |
STEP: initializing the management cluster | |
STEP: pulling the core capi image | |
master: Pulling from k8s-staging-cluster-api/cluster-api-controller | |
Digest: sha256:5cc801d5ccd29ec8868f4f04ba425d5465a96ac342ac32536fe1df501efb5bde | |
Status: Image is up to date for gcr.io/k8s-staging-cluster-api/cluster-api-controller:master | |
gcr.io/k8s-staging-cluster-api/cluster-api-controller:master | |
STEP: pulling the infrastructure image | |
latest: Pulling from akutz/capv-manager | |
Digest: sha256:df3f6c61cc20698a60a6b182c226c6810386297f36dc6aadbfdfe7503f240185 | |
Status: Image is up to date for akutz/capv-manager:latest | |
docker.io/akutz/capv-manager:latest | |
STEP: creating the management cluster | |
Loading image "akutz/capv-manager:latest" on to the management cluster | |
Loading image "gcr.io/k8s-staging-cluster-api/cluster-api-controller:master" on to the management cluster | |
STEP: installing the certificate manager components | |
STEP: installing Cert Manager version v0.11.1 | |
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created | |
namespace/cert-manager created | |
serviceaccount/cert-manager-cainjector created | |
serviceaccount/cert-manager created | |
serviceaccount/cert-manager-webhook created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created | |
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created | |
role.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-view created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created | |
service/cert-manager created | |
service/cert-manager-webhook created | |
deployment.apps/cert-manager-cainjector created | |
deployment.apps/cert-manager created | |
deployment.apps/cert-manager-webhook created | |
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
STEP: waiting for the certificate manager service | |
STEP: waiting for api service "v1beta1.webhook.cert-manager.io" to be available | |
STEP: installing the remaining components | |
STEP: installing Cluster API version master | |
namespace/capi-system created | |
customresourcedefinition.apiextensions.k8s.io/clusters.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigs.bootstrap.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigtemplates.bootstrap.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmcontrolplanes.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machinedeployments.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machines.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machinesets.cluster.x-k8s.io created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/capi-mutating-webhook-configuration created | |
role.rbac.authorization.k8s.io/capi-leader-election-role created | |
clusterrole.rbac.authorization.k8s.io/capi-manager-role created | |
rolebinding.rbac.authorization.k8s.io/capi-leader-election-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capi-manager-rolebinding created | |
service/capi-webhook-service created | |
deployment.apps/capi-controller-manager created | |
certificate.cert-manager.io/capi-serving-cert created | |
issuer.cert-manager.io/capi-selfsigned-issuer created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/capi-validating-webhook-configuration created | |
STEP: installing Cluster API Provider vSphere version: Local files | |
namespace/capv-system created | |
customresourcedefinition.apiextensions.k8s.io/vsphereclusters.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vspheremachines.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vspheremachinetemplates.infrastructure.cluster.x-k8s.io created | |
role.rbac.authorization.k8s.io/capv-leader-election-role created | |
clusterrole.rbac.authorization.k8s.io/capv-manager-role created | |
clusterrole.rbac.authorization.k8s.io/capv-proxy-role created | |
rolebinding.rbac.authorization.k8s.io/capv-leader-election-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capv-manager-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capv-proxy-rolebinding created | |
service/capv-controller-manager-metrics-service created | |
deployment.apps/capv-controller-manager created | |
STEP: installing Cluster API Provider vSphere version: Bootstrap credentials | |
secret/capv-manager-bootstrap-credentials created | |
STEP: waiting for the pods to be ready | |
STEP: waiting for pods to be ready in namespace "capi-system" | |
STEP: waiting for pods to be ready in namespace "cert-manager" | |
STEP: waiting for pods to be ready in namespace "capv-system" | |
CAPV Cluster Creation Single-node control plane with one worker nodes | |
should create a single-node control plane with one worker nodes | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:79 | |
STEP: creating an InfrastructureCluster resource | |
STEP: creating a Cluster resource linked to the InfrastructureCluster resource | |
STEP: creating an InfrastructureMachine resource | |
STEP: creating a BootstrapConfig resource | |
STEP: creating a core Machine resource with a linked InfrastructureMachine and BootstrapConfig | |
STEP: creating a core MachineDeployment resource | |
STEP: creating a BootstrapConfigTemplate resource | |
STEP: creating an InfrastructureMachineTemplate resource | |
STEP: waiting for the workload nodes to exist | |
• [SLOW TEST:253.470 seconds] | |
CAPV | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:33 | |
Cluster Creation | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:34 | |
Single-node control plane with one worker nodes | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:48 | |
should create a single-node control plane with one worker nodes | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:79 | |
------------------------------ | |
STEP: tearing down the management cluster | |
Ran 1 of 1 Specs in 371.646 seconds | |
SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped | |
PASS | |
Ginkgo ran 1 suite in 6m22.534205857s | |
Test Suite Passed |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment