Created
January 4, 2020 22:10
-
-
Save akutz/f89f8417e05e447489b1f8c0641af433 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ make e2e | |
docker build --tag="capv-manager:e2e" . | |
Sending build context to Docker daemon 7.739MB | |
Step 1/16 : ARG GOLANG_VERSION=golang:1.12.10 | |
Step 2/16 : FROM $GOLANG_VERSION as builder | |
---> f945ea07f224 | |
Step 3/16 : WORKDIR /workspace | |
---> Using cache | |
---> 03ea2598e8a1 | |
Step 4/16 : ARG goproxy=https://proxy.golang.org | |
---> Using cache | |
---> 76cef15c7106 | |
Step 5/16 : ENV GOPROXY=$goproxy | |
---> Using cache | |
---> 077ca5638645 | |
Step 6/16 : COPY go.mod go.mod | |
---> Using cache | |
---> 1d646dd311a8 | |
Step 7/16 : COPY go.sum go.sum | |
---> Using cache | |
---> fcca04bbebf3 | |
Step 8/16 : RUN go mod download | |
---> Using cache | |
---> 423e7c5cd8a7 | |
Step 9/16 : COPY ./ ./ | |
---> c1de13bbce66 | |
Step 10/16 : ARG ARCH=amd64 | |
---> Running in cdfa063431eb | |
Removing intermediate container cdfa063431eb | |
---> 395adcc8f871 | |
Step 11/16 : RUN CGO_ENABLED=0 GOOS=linux GOARCH=${ARCH} go build -a -ldflags '-extldflags "-static"' -o manager . | |
---> Running in 0c1f0cb41a2c | |
Removing intermediate container 0c1f0cb41a2c | |
---> 37d5b39aed00 | |
Step 12/16 : FROM gcr.io/distroless/static:latest | |
---> dbd9343fe273 | |
Step 13/16 : WORKDIR / | |
---> Using cache | |
---> 9ea53e773ae6 | |
Step 14/16 : COPY --from=builder /workspace/manager . | |
---> 95324540fa66 | |
Step 15/16 : USER nobody | |
---> Running in 2c96f719fecb | |
Removing intermediate container 2c96f719fecb | |
---> 20a1807b67e1 | |
Step 16/16 : ENTRYPOINT ["/manager"] | |
---> Running in 0b931944004d | |
Removing intermediate container 0b931944004d | |
---> 684f25738185 | |
Successfully built 684f25738185 | |
Successfully tagged capv-manager:e2e | |
time ginkgo -v ./test/e2e -- --e2e.infraImage="capv-manager:e2e" | |
Running Suite: CAPV e2e Suite | |
============================= | |
Random Seed: 1578174815 | |
Will run 2 of 2 specs | |
STEP: cleaning up previous kind cluster | |
STEP: initializing the vSphere session | |
STEP: parsing vSphere server URL | |
STEP: creating vSphere client | |
STEP: creating vSphere finder | |
STEP: configuring vSphere datacenter | |
STEP: initializing the runtime.Scheme | |
STEP: initializing the management cluster | |
STEP: pulling the core capi image | |
master: Pulling from k8s-staging-cluster-api/cluster-api-controller | |
Digest: sha256:e77607799e5a1d0743f51d033be260b0793013b82e1feb6cf9593787b8638fe7 | |
Status: Image is up to date for gcr.io/k8s-staging-cluster-api/cluster-api-controller:master | |
gcr.io/k8s-staging-cluster-api/cluster-api-controller:master | |
STEP: creating the management cluster | |
Loading image "capv-manager:e2e" on to the management cluster | |
Loading image "gcr.io/k8s-staging-cluster-api/cluster-api-controller:master" on to the management cluster | |
STEP: installing the certificate manager components | |
STEP: installing Cert Manager version v0.11.1 | |
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created | |
namespace/cert-manager created | |
serviceaccount/cert-manager-cainjector created | |
serviceaccount/cert-manager created | |
serviceaccount/cert-manager-webhook created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created | |
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created | |
role.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-view created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created | |
service/cert-manager created | |
service/cert-manager-webhook created | |
deployment.apps/cert-manager-cainjector created | |
deployment.apps/cert-manager created | |
deployment.apps/cert-manager-webhook created | |
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
STEP: waiting for the certificate manager service | |
STEP: waiting for api service "v1beta1.webhook.cert-manager.io" to be available | |
STEP: installing the remaining components | |
STEP: installing Cluster API version master | |
namespace/capi-system created | |
customresourcedefinition.apiextensions.k8s.io/clusters.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigs.bootstrap.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigtemplates.bootstrap.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/kubeadmcontrolplanes.controlplane.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machinedeployments.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machinepools.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machines.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/machinesets.cluster.x-k8s.io created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/capi-mutating-webhook-configuration created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/controlplane-mutating-webhook-configuration created | |
role.rbac.authorization.k8s.io/capi-leader-election-role created | |
clusterrole.rbac.authorization.k8s.io/bootstrap-manager-role created | |
clusterrole.rbac.authorization.k8s.io/capi-manager-role created | |
clusterrole.rbac.authorization.k8s.io/controlplane-manager-role created | |
rolebinding.rbac.authorization.k8s.io/capi-leader-election-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/bootstrap-manager-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capi-manager-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/controlplane-manager-rolebinding created | |
service/capi-webhook-service created | |
deployment.apps/capi-controller-manager created | |
certificate.cert-manager.io/capi-serving-cert created | |
issuer.cert-manager.io/capi-selfsigned-issuer created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/capi-validating-webhook-configuration created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/controlplane-validating-webhook-configuration created | |
STEP: installing Cluster API Provider vSphere version: Local files | |
namespace/capv-system created | |
customresourcedefinition.apiextensions.k8s.io/haproxyloadbalancers.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vsphereclusters.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vspheremachines.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vspheremachinetemplates.infrastructure.cluster.x-k8s.io created | |
customresourcedefinition.apiextensions.k8s.io/vspherevms.infrastructure.cluster.x-k8s.io created | |
role.rbac.authorization.k8s.io/capv-leader-election-role created | |
clusterrole.rbac.authorization.k8s.io/capv-manager-role created | |
clusterrole.rbac.authorization.k8s.io/capv-proxy-role created | |
rolebinding.rbac.authorization.k8s.io/capv-leader-election-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capv-manager-rolebinding created | |
clusterrolebinding.rbac.authorization.k8s.io/capv-proxy-rolebinding created | |
service/capv-controller-manager-metrics-service created | |
deployment.apps/capv-controller-manager created | |
STEP: installing Cluster API Provider vSphere version: Bootstrap credentials | |
secret/capv-manager-bootstrap-credentials created | |
STEP: waiting for the pods to be ready | |
STEP: waiting for pods to be ready in namespace "capi-system" | |
STEP: waiting for pods to be ready in namespace "cert-manager" | |
STEP: waiting for pods to be ready in namespace "capv-system" | |
CAPV Cluster Creation Single-node control plane with one worker node | |
should create a single-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:128 | |
STEP: creating related resources | |
STEP: creating an InfrastructureCluster resource | |
STEP: creating a Cluster resource linked to the InfrastructureCluster resource | |
STEP: creating an InfrastructureMachine resource | |
STEP: creating a BootstrapConfig resource | |
STEP: creating a core Machine resource with a linked InfrastructureMachine and BootstrapConfig | |
STEP: waiting for cluster's control plane to be initialized | |
STEP: creating a core MachineDeployment resource | |
STEP: creating a BootstrapConfigTemplate resource | |
STEP: creating an InfrastructureMachineTemplate resource | |
STEP: waiting for the workload nodes to exist | |
STEP: cleaning up e2e resources | |
STEP: asserting all VSphereVM resources related to this test are eventually removed | |
STEP: asserting all VSphereMachine resources related to this test are eventually removed | |
STEP: asserting all VSphereCluster resources related to this test are eventually removed | |
STEP: asserting all HAProxyLoadBalancer resources related to this test are eventually removed | |
• [SLOW TEST:271.791 seconds] | |
CAPV | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:37 | |
Cluster Creation | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:38 | |
Single-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:97 | |
should create a single-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:128 | |
------------------------------ | |
CAPV Cluster Creation Two-node control plane with one worker node | |
should create a two-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:178 | |
STEP: creating related resources | |
STEP: creating a/an infrastructure.cluster.x-k8s.io/v1alpha3, Kind=HAProxyLoadBalancer resource | |
STEP: creating an InfrastructureCluster resource | |
STEP: creating a Cluster resource linked to the InfrastructureCluster resource | |
STEP: creating the primary InfrastructureMachine resource | |
STEP: creating the primary BootstrapConfig resource | |
STEP: creating the primary core Machine resource with a linked InfrastructureMachine and BootstrapConfig | |
STEP: waiting for cluster's control plane to be initialized | |
STEP: creating additional InfrastructureMachine resource | |
STEP: creating additional BootstrapConfig resource | |
STEP: creating additional Machine resource with a linked InfrastructureMachine and BootstrapConfig | |
STEP: creating a core MachineDeployment resource | |
STEP: creating a BootstrapConfigTemplate resource | |
STEP: creating an InfrastructureMachineTemplate resource | |
STEP: waiting for the workload nodes to exist | |
STEP: cleaning up e2e resources | |
STEP: asserting all VSphereVM resources related to this test are eventually removed | |
STEP: asserting all VSphereMachine resources related to this test are eventually removed | |
STEP: asserting all VSphereCluster resources related to this test are eventually removed | |
STEP: asserting all HAProxyLoadBalancer resources related to this test are eventually removed | |
• [SLOW TEST:418.717 seconds] | |
CAPV | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:37 | |
Cluster Creation | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:38 | |
Two-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:133 | |
should create a two-node control plane with one worker node | |
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:178 | |
------------------------------ | |
STEP: tearing down the management cluster | |
Ran 2 of 2 Specs in 794.401 seconds | |
SUCCESS! -- 2 Passed | 0 Failed | 0 Pending | 0 Skipped | |
PASS | |
Ginkgo ran 1 suite in 13m25.027378009s | |
Test Suite Passed | |
real 13m25.094s | |
user 0m12.270s | |
sys 0m8.054s |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment