Skip to content

Instantly share code, notes, and snippets.

@akutz
Created December 16, 2019 14:32
Show Gist options
  • Save akutz/7aa6168d1636699925064c5bfd69cf01 to your computer and use it in GitHub Desktop.
Save akutz/7aa6168d1636699925064c5bfd69cf01 to your computer and use it in GitHub Desktop.
$ make e2e
ginkgo -v ./test/e2e
Running Suite: CAPV e2e Suite
=============================
Random Seed: 1576506353
Will run 1 of 1 specs
STEP: cleaning up previous kind cluster
STEP: initializing the vSphere session
STEP: parsing vSphere server URL
STEP: creating vSphere client
STEP: creating vSphere finder
STEP: configuring vSphere datacenter
STEP: initializing the runtime.Scheme
STEP: initializing the management cluster
STEP: pulling the core capi image
master: Pulling from k8s-staging-cluster-api/cluster-api-controller
Digest: sha256:5cc801d5ccd29ec8868f4f04ba425d5465a96ac342ac32536fe1df501efb5bde
Status: Image is up to date for gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
STEP: pulling the infrastructure image
latest: Pulling from akutz/capv-manager
Digest: sha256:df3f6c61cc20698a60a6b182c226c6810386297f36dc6aadbfdfe7503f240185
Status: Image is up to date for akutz/capv-manager:latest
docker.io/akutz/capv-manager:latest
STEP: creating the management cluster
Loading image "akutz/capv-manager:latest" on to the management cluster
Loading image "gcr.io/k8s-staging-cluster-api/cluster-api-controller:master" on to the management cluster
STEP: installing the certificate manager components
STEP: installing Cert Manager version v0.11.1
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
namespace/cert-manager created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created
role.rbac.authorization.k8s.io/cert-manager:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
STEP: waiting for the certificate manager service
STEP: waiting for api service "v1beta1.webhook.cert-manager.io" to be available
STEP: installing the remaining components
STEP: installing Cluster API version master
namespace/capi-system created
customresourcedefinition.apiextensions.k8s.io/clusters.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigs.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigtemplates.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmcontrolplanes.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinedeployments.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machines.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinesets.cluster.x-k8s.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/capi-mutating-webhook-configuration created
role.rbac.authorization.k8s.io/capi-leader-election-role created
clusterrole.rbac.authorization.k8s.io/capi-manager-role created
rolebinding.rbac.authorization.k8s.io/capi-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capi-manager-rolebinding created
service/capi-webhook-service created
deployment.apps/capi-controller-manager created
certificate.cert-manager.io/capi-serving-cert created
issuer.cert-manager.io/capi-selfsigned-issuer created
validatingwebhookconfiguration.admissionregistration.k8s.io/capi-validating-webhook-configuration created
STEP: installing Cluster API Provider vSphere version: Local files
namespace/capv-system created
customresourcedefinition.apiextensions.k8s.io/vsphereclusters.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachines.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachinetemplates.infrastructure.cluster.x-k8s.io created
role.rbac.authorization.k8s.io/capv-leader-election-role created
clusterrole.rbac.authorization.k8s.io/capv-manager-role created
clusterrole.rbac.authorization.k8s.io/capv-proxy-role created
rolebinding.rbac.authorization.k8s.io/capv-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-manager-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-proxy-rolebinding created
service/capv-controller-manager-metrics-service created
deployment.apps/capv-controller-manager created
STEP: installing Cluster API Provider vSphere version: Bootstrap credentials
secret/capv-manager-bootstrap-credentials created
STEP: waiting for the pods to be ready
STEP: waiting for pods to be ready in namespace "capi-system"
STEP: waiting for pods to be ready in namespace "cert-manager"
STEP: waiting for pods to be ready in namespace "capv-system"
CAPV Cluster Creation Single-node control plane with one worker nodes
should create a single-node control plane with one worker nodes
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:79
STEP: creating an InfrastructureCluster resource
STEP: creating a Cluster resource linked to the InfrastructureCluster resource
STEP: creating an InfrastructureMachine resource
STEP: creating a BootstrapConfig resource
STEP: creating a core Machine resource with a linked InfrastructureMachine and BootstrapConfig
STEP: creating a core MachineDeployment resource
STEP: creating a BootstrapConfigTemplate resource
STEP: creating an InfrastructureMachineTemplate resource
STEP: waiting for the workload nodes to exist
• [SLOW TEST:253.470 seconds]
CAPV
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:33
Cluster Creation
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:34
Single-node control plane with one worker nodes
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:48
should create a single-node control plane with one worker nodes
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:79
------------------------------
STEP: tearing down the management cluster
Ran 1 of 1 Specs in 371.646 seconds
SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped
PASS
Ginkgo ran 1 suite in 6m22.534205857s
Test Suite Passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment