Skip to content

Instantly share code, notes, and snippets.

@akutz
Created December 14, 2019 23:12
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save akutz/5643ad32ad92c28dc2ddd7272b9ea46f to your computer and use it in GitHub Desktop.
Save akutz/5643ad32ad92c28dc2ddd7272b9ea46f to your computer and use it in GitHub Desktop.
$ make e2e
kind delete cluster --name mgmt || true
Deleting cluster "mgmt" ...
docker pull gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
master: Pulling from k8s-staging-cluster-api/cluster-api-controller
Digest: sha256:5cc801d5ccd29ec8868f4f04ba425d5465a96ac342ac32536fe1df501efb5bde
Status: Image is up to date for gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
ginkgo test -v ./test/e2e
Running Suite: CAPV e2e Suite
=============================
Random Seed: 1576364822
Will run 1 of 2 specs
Loading image "akutz/capv-manager:latest" on to the management cluster
Loading image "gcr.io/k8s-staging-cluster-api/cluster-api-controller:master" on to the management cluster
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
namespace/cert-manager created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created
role.rbac.authorization.k8s.io/cert-manager:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
namespace/capi-system created
customresourcedefinition.apiextensions.k8s.io/clusters.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigs.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigtemplates.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmcontrolplanes.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinedeployments.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machines.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinesets.cluster.x-k8s.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/capi-mutating-webhook-configuration created
role.rbac.authorization.k8s.io/capi-leader-election-role created
clusterrole.rbac.authorization.k8s.io/capi-manager-role created
rolebinding.rbac.authorization.k8s.io/capi-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capi-manager-rolebinding created
service/capi-webhook-service created
deployment.apps/capi-controller-manager created
certificate.cert-manager.io/capi-serving-cert created
issuer.cert-manager.io/capi-selfsigned-issuer created
validatingwebhookconfiguration.admissionregistration.k8s.io/capi-validating-webhook-configuration created
namespace/capv-system created
customresourcedefinition.apiextensions.k8s.io/vsphereclusters.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachines.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachinetemplates.infrastructure.cluster.x-k8s.io created
role.rbac.authorization.k8s.io/capv-leader-election-role created
clusterrole.rbac.authorization.k8s.io/capv-manager-role created
clusterrole.rbac.authorization.k8s.io/capv-proxy-role created
rolebinding.rbac.authorization.k8s.io/capv-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-manager-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-proxy-rolebinding created
service/capv-controller-manager-metrics-service created
deployment.apps/capv-controller-manager created
secret/capv-manager-bootstrap-credentials created
• [SLOW TEST:180.281 seconds]
CAPV
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/e2e_test.go:40
Cluster Creation
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/e2e_test.go:41
One node cluster
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/e2e_test.go:49
should create a single node cluster
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/e2e_test.go:50
------------------------------
S
Ran 1 of 2 Specs in 292.963 seconds
SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 1 Skipped
PASS | FOCUSED
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment