Created
January 21, 2016 14:48
-
-
Save stevekuznetsov/ad4dd51144558df8dce1 to your computer and use it in GitHub Desktop.
angle bracket in grep
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| FAILURE after 0.007s: hack/test-cmd.sh:195: executing 'cat /tmp/openshift-cmd/openshift.local.config/master/master-config.yaml' expecting success and not text '\<disabledFeatures\>': the output content test failed | |
| Standard output from the command: | |
| apiLevels: | |
| - v1 | |
| apiVersion: v1 | |
| assetConfig: | |
| extensionDevelopment: false | |
| extensionScripts: null | |
| extensionStylesheets: null | |
| extensions: null | |
| loggingPublicURL: "" | |
| logoutURL: "" | |
| masterPublicURL: https://127.0.0.1:28443 | |
| metricsPublicURL: "" | |
| publicURL: https://127.0.0.1:28443/console/ | |
| servingInfo: | |
| bindAddress: 127.0.0.1:28443 | |
| bindNetwork: tcp4 | |
| certFile: master.server.crt | |
| clientCA: "" | |
| keyFile: master.server.key | |
| maxRequestsInFlight: 0 | |
| namedCertificates: null | |
| requestTimeoutSeconds: 0 | |
| controllerLeaseTTL: 0 | |
| controllers: '*' | |
| corsAllowedOrigins: | |
| - 127.0.0.1 | |
| - 127.0.0.1:28443 | |
| - localhost | |
| disabledFeatures: null | |
| dnsConfig: | |
| bindAddress: 127.0.0.1:53 | |
| bindNetwork: tcp4 | |
| etcdClientInfo: | |
| ca: ca.crt | |
| certFile: master.etcd-client.crt | |
| keyFile: master.etcd-client.key | |
| urls: | |
| - https://127.0.0.1:24001 | |
| etcdConfig: | |
| address: 127.0.0.1:24001 | |
| peerAddress: 127.0.0.1:27001 | |
| peerServingInfo: | |
| bindAddress: 127.0.0.1:27001 | |
| bindNetwork: tcp4 | |
| certFile: etcd.server.crt | |
| clientCA: ca.crt | |
| keyFile: etcd.server.key | |
| namedCertificates: null | |
| servingInfo: | |
| bindAddress: 127.0.0.1:24001 | |
| bindNetwork: tcp4 | |
| certFile: etcd.server.crt | |
| clientCA: ca.crt | |
| keyFile: etcd.server.key | |
| namedCertificates: null | |
| storageDirectory: /tmp/openshift-cmd/etcd | |
| etcdStorageConfig: | |
| kubernetesStoragePrefix: kubernetes.io | |
| kubernetesStorageVersion: v1 | |
| openShiftStoragePrefix: openshift.io | |
| openShiftStorageVersion: v1 | |
| imageConfig: | |
| format: openshift/origin-${component}:latest | |
| latest: false | |
| kind: MasterConfig | |
| kubeletClientInfo: | |
| ca: ca.crt | |
| certFile: master.kubelet-client.crt | |
| keyFile: master.kubelet-client.key | |
| port: 10250 | |
| kubernetesMasterConfig: | |
| apiLevels: null | |
| apiServerArguments: null | |
| controllerArguments: null | |
| disabledAPIGroupVersions: {} | |
| masterCount: 1 | |
| masterIP: 127.0.0.1 | |
| podEvictionTimeout: 5m | |
| proxyClientInfo: | |
| certFile: master.proxy-client.crt | |
| keyFile: master.proxy-client.key | |
| schedulerConfigFile: "" | |
| servicesNodePortRange: 30000-32767 | |
| servicesSubnet: 172.30.0.0/16 | |
| staticNodeNames: null | |
| masterClients: | |
| externalKubernetesKubeConfig: "" | |
| openshiftLoopbackKubeConfig: openshift-master.kubeconfig | |
| masterPublicURL: https://127.0.0.1:28443 | |
| networkConfig: | |
| clusterNetworkCIDR: 10.1.0.0/16 | |
| hostSubnetLength: 8 | |
| networkPluginName: "" | |
| serviceNetworkCIDR: 172.30.0.0/16 | |
| oauthConfig: | |
| assetPublicURL: https://127.0.0.1:28443/console/ | |
| grantConfig: | |
| method: auto | |
| identityProviders: | |
| - challenge: true | |
| login: true | |
| mappingMethod: claim | |
| name: anypassword | |
| provider: | |
| apiVersion: v1 | |
| kind: AllowAllPasswordIdentityProvider | |
| masterCA: ca.crt | |
| masterPublicURL: https://127.0.0.1:28443 | |
| masterURL: https://127.0.0.1:28443 | |
| sessionConfig: | |
| sessionMaxAgeSeconds: 300 | |
| sessionName: ssn | |
| sessionSecretsFile: "" | |
| templates: null | |
| tokenConfig: | |
| accessTokenMaxAgeSeconds: 86400 | |
| authorizeTokenMaxAgeSeconds: 300 | |
| pauseControllers: false | |
| policyConfig: | |
| bootstrapPolicyFile: policy.json | |
| openshiftInfrastructureNamespace: openshift-infra | |
| openshiftSharedResourcesNamespace: openshift | |
| projectConfig: | |
| defaultNodeSelector: "" | |
| projectRequestMessage: "" | |
| projectRequestTemplate: "" | |
| securityAllocator: | |
| mcsAllocatorRange: s0:/2 | |
| mcsLabelsPerProject: 5 | |
| uidAllocatorRange: 1000000000-1999999999/10000 | |
| routingConfig: | |
| subdomain: router.default.svc.cluster.local | |
| serviceAccountConfig: | |
| limitSecretReferences: false | |
| managedNames: | |
| - default | |
| - builder | |
| - deployer | |
| masterCA: ca.crt | |
| privateKeyFile: serviceaccounts.private.key | |
| publicKeyFiles: | |
| - serviceaccounts.public.key | |
| servingInfo: | |
| bindAddress: 127.0.0.1:28443 | |
| bindNetwork: tcp4 | |
| certFile: master.server.crt | |
| clientCA: ca.crt | |
| keyFile: master.server.key | |
| maxRequestsInFlight: 500 | |
| namedCertificates: null | |
| requestTimeoutSeconds: 3600 | |
| There was no error output from the command. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment