Skip to content

Instantly share code, notes, and snippets.

@akutz
Created January 4, 2020 22:10
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save akutz/f89f8417e05e447489b1f8c0641af433 to your computer and use it in GitHub Desktop.
Save akutz/f89f8417e05e447489b1f8c0641af433 to your computer and use it in GitHub Desktop.
$ make e2e
docker build --tag="capv-manager:e2e" .
Sending build context to Docker daemon 7.739MB
Step 1/16 : ARG GOLANG_VERSION=golang:1.12.10
Step 2/16 : FROM $GOLANG_VERSION as builder
---> f945ea07f224
Step 3/16 : WORKDIR /workspace
---> Using cache
---> 03ea2598e8a1
Step 4/16 : ARG goproxy=https://proxy.golang.org
---> Using cache
---> 76cef15c7106
Step 5/16 : ENV GOPROXY=$goproxy
---> Using cache
---> 077ca5638645
Step 6/16 : COPY go.mod go.mod
---> Using cache
---> 1d646dd311a8
Step 7/16 : COPY go.sum go.sum
---> Using cache
---> fcca04bbebf3
Step 8/16 : RUN go mod download
---> Using cache
---> 423e7c5cd8a7
Step 9/16 : COPY ./ ./
---> c1de13bbce66
Step 10/16 : ARG ARCH=amd64
---> Running in cdfa063431eb
Removing intermediate container cdfa063431eb
---> 395adcc8f871
Step 11/16 : RUN CGO_ENABLED=0 GOOS=linux GOARCH=${ARCH} go build -a -ldflags '-extldflags "-static"' -o manager .
---> Running in 0c1f0cb41a2c
Removing intermediate container 0c1f0cb41a2c
---> 37d5b39aed00
Step 12/16 : FROM gcr.io/distroless/static:latest
---> dbd9343fe273
Step 13/16 : WORKDIR /
---> Using cache
---> 9ea53e773ae6
Step 14/16 : COPY --from=builder /workspace/manager .
---> 95324540fa66
Step 15/16 : USER nobody
---> Running in 2c96f719fecb
Removing intermediate container 2c96f719fecb
---> 20a1807b67e1
Step 16/16 : ENTRYPOINT ["/manager"]
---> Running in 0b931944004d
Removing intermediate container 0b931944004d
---> 684f25738185
Successfully built 684f25738185
Successfully tagged capv-manager:e2e
time ginkgo -v ./test/e2e -- --e2e.infraImage="capv-manager:e2e"
Running Suite: CAPV e2e Suite
=============================
Random Seed: 1578174815
Will run 2 of 2 specs
STEP: cleaning up previous kind cluster
STEP: initializing the vSphere session
STEP: parsing vSphere server URL
STEP: creating vSphere client
STEP: creating vSphere finder
STEP: configuring vSphere datacenter
STEP: initializing the runtime.Scheme
STEP: initializing the management cluster
STEP: pulling the core capi image
master: Pulling from k8s-staging-cluster-api/cluster-api-controller
Digest: sha256:e77607799e5a1d0743f51d033be260b0793013b82e1feb6cf9593787b8638fe7
Status: Image is up to date for gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
gcr.io/k8s-staging-cluster-api/cluster-api-controller:master
STEP: creating the management cluster
Loading image "capv-manager:e2e" on to the management cluster
Loading image "gcr.io/k8s-staging-cluster-api/cluster-api-controller:master" on to the management cluster
STEP: installing the certificate manager components
STEP: installing Cert Manager version v0.11.1
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
namespace/cert-manager created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created
role.rbac.authorization.k8s.io/cert-manager:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
STEP: waiting for the certificate manager service
STEP: waiting for api service "v1beta1.webhook.cert-manager.io" to be available
STEP: installing the remaining components
STEP: installing Cluster API version master
namespace/capi-system created
customresourcedefinition.apiextensions.k8s.io/clusters.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigs.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmconfigtemplates.bootstrap.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/kubeadmcontrolplanes.controlplane.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinedeployments.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinepools.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machines.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/machinesets.cluster.x-k8s.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/capi-mutating-webhook-configuration created
mutatingwebhookconfiguration.admissionregistration.k8s.io/controlplane-mutating-webhook-configuration created
role.rbac.authorization.k8s.io/capi-leader-election-role created
clusterrole.rbac.authorization.k8s.io/bootstrap-manager-role created
clusterrole.rbac.authorization.k8s.io/capi-manager-role created
clusterrole.rbac.authorization.k8s.io/controlplane-manager-role created
rolebinding.rbac.authorization.k8s.io/capi-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/bootstrap-manager-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capi-manager-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/controlplane-manager-rolebinding created
service/capi-webhook-service created
deployment.apps/capi-controller-manager created
certificate.cert-manager.io/capi-serving-cert created
issuer.cert-manager.io/capi-selfsigned-issuer created
validatingwebhookconfiguration.admissionregistration.k8s.io/capi-validating-webhook-configuration created
validatingwebhookconfiguration.admissionregistration.k8s.io/controlplane-validating-webhook-configuration created
STEP: installing Cluster API Provider vSphere version: Local files
namespace/capv-system created
customresourcedefinition.apiextensions.k8s.io/haproxyloadbalancers.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vsphereclusters.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachines.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspheremachinetemplates.infrastructure.cluster.x-k8s.io created
customresourcedefinition.apiextensions.k8s.io/vspherevms.infrastructure.cluster.x-k8s.io created
role.rbac.authorization.k8s.io/capv-leader-election-role created
clusterrole.rbac.authorization.k8s.io/capv-manager-role created
clusterrole.rbac.authorization.k8s.io/capv-proxy-role created
rolebinding.rbac.authorization.k8s.io/capv-leader-election-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-manager-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/capv-proxy-rolebinding created
service/capv-controller-manager-metrics-service created
deployment.apps/capv-controller-manager created
STEP: installing Cluster API Provider vSphere version: Bootstrap credentials
secret/capv-manager-bootstrap-credentials created
STEP: waiting for the pods to be ready
STEP: waiting for pods to be ready in namespace "capi-system"
STEP: waiting for pods to be ready in namespace "cert-manager"
STEP: waiting for pods to be ready in namespace "capv-system"
CAPV Cluster Creation Single-node control plane with one worker node
should create a single-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:128
STEP: creating related resources
STEP: creating an InfrastructureCluster resource
STEP: creating a Cluster resource linked to the InfrastructureCluster resource
STEP: creating an InfrastructureMachine resource
STEP: creating a BootstrapConfig resource
STEP: creating a core Machine resource with a linked InfrastructureMachine and BootstrapConfig
STEP: waiting for cluster's control plane to be initialized
STEP: creating a core MachineDeployment resource
STEP: creating a BootstrapConfigTemplate resource
STEP: creating an InfrastructureMachineTemplate resource
STEP: waiting for the workload nodes to exist
STEP: cleaning up e2e resources
STEP: asserting all VSphereVM resources related to this test are eventually removed
STEP: asserting all VSphereMachine resources related to this test are eventually removed
STEP: asserting all VSphereCluster resources related to this test are eventually removed
STEP: asserting all HAProxyLoadBalancer resources related to this test are eventually removed
• [SLOW TEST:271.791 seconds]
CAPV
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:37
Cluster Creation
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:38
Single-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:97
should create a single-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:128
------------------------------
CAPV Cluster Creation Two-node control plane with one worker node
should create a two-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:178
STEP: creating related resources
STEP: creating a/an infrastructure.cluster.x-k8s.io/v1alpha3, Kind=HAProxyLoadBalancer resource
STEP: creating an InfrastructureCluster resource
STEP: creating a Cluster resource linked to the InfrastructureCluster resource
STEP: creating the primary InfrastructureMachine resource
STEP: creating the primary BootstrapConfig resource
STEP: creating the primary core Machine resource with a linked InfrastructureMachine and BootstrapConfig
STEP: waiting for cluster's control plane to be initialized
STEP: creating additional InfrastructureMachine resource
STEP: creating additional BootstrapConfig resource
STEP: creating additional Machine resource with a linked InfrastructureMachine and BootstrapConfig
STEP: creating a core MachineDeployment resource
STEP: creating a BootstrapConfigTemplate resource
STEP: creating an InfrastructureMachineTemplate resource
STEP: waiting for the workload nodes to exist
STEP: cleaning up e2e resources
STEP: asserting all VSphereVM resources related to this test are eventually removed
STEP: asserting all VSphereMachine resources related to this test are eventually removed
STEP: asserting all VSphereCluster resources related to this test are eventually removed
STEP: asserting all HAProxyLoadBalancer resources related to this test are eventually removed
• [SLOW TEST:418.717 seconds]
CAPV
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:37
Cluster Creation
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:38
Two-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:133
should create a two-node control plane with one worker node
/Users/akutz/Projects/go/src/sigs.k8s.io/cluster-api-provider-vsphere/test/e2e/capv_test.go:178
------------------------------
STEP: tearing down the management cluster
Ran 2 of 2 Specs in 794.401 seconds
SUCCESS! -- 2 Passed | 0 Failed | 0 Pending | 0 Skipped
PASS
Ginkgo ran 1 suite in 13m25.027378009s
Test Suite Passed
real 13m25.094s
user 0m12.270s
sys 0m8.054s
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment