+ export WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-windows2016-release + WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-windows2016-release + [[ windows2016-release =~ openshift-.* ]] + [[ windows2016-release =~ .*-1.9.3-.* ]] + export KUBEVIRT_PROVIDER=k8s-1.10.3 + KUBEVIRT_PROVIDER=k8s-1.10.3 + export KUBEVIRT_NUM_NODES=2 + KUBEVIRT_NUM_NODES=2 + export NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + export NAMESPACE=kube-system + NAMESPACE=kube-system + trap '{ make cluster-down; }' EXIT SIGINT SIGTERM SIGSTOP + make cluster-down ./cluster/down.sh + make cluster-up ./cluster/up.sh Downloading ....... Downloading ....... Downloading ....... 2018/07/12 08:58:40 Waiting for host: 192.168.66.101:22 2018/07/12 08:58:43 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/07/12 08:58:55 Connected to tcp://192.168.66.101:22 + kubeadm init --config /etc/kubernetes/kubeadm.conf [init] Using Kubernetes version: v1.10.3 [init] Using Authorization modes: [Node RBAC] [preflight] Running pre-flight checks. [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl Flag --admission-control has been deprecated, Use --enable-admission-plugins or --disable-admission-plugins instead. Will be removed in a future version. [certificates] Generated ca certificate and key. [certificates] Generated apiserver certificate and key. [certificates] apiserver serving cert is signed for DNS names [node01 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.66.101] [certificates] Generated apiserver-kubelet-client certificate and key. [certificates] Generated etcd/ca certificate and key. [certificates] Generated etcd/server certificate and key. [certificates] etcd/server serving cert is signed for DNS names [localhost] and IPs [127.0.0.1] [certificates] Generated etcd/peer certificate and key. [certificates] etcd/peer serving cert is signed for DNS names [node01] and IPs [192.168.66.101] [certificates] Generated etcd/healthcheck-client certificate and key. [certificates] Generated apiserver-etcd-client certificate and key. [certificates] Generated sa key and public key. [certificates] Generated front-proxy-ca certificate and key. [certificates] Generated front-proxy-client certificate and key. [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" [controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml" [controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml" [controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml" [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml" [init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests". [init] This might take a minute or longer if the control plane images have to be pulled. [apiclient] All control plane components are healthy after 29.511169 seconds [uploadconfig] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace [markmaster] Will mark node node01 as master by adding a label and a taint [markmaster] Master node01 tainted and labelled with key/value: node-role.kubernetes.io/master="" [bootstraptoken] Using token: abcdef.1234567890123456 [bootstraptoken] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials [bootstraptoken] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token [bootstraptoken] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster [bootstraptoken] Creating the "cluster-info" ConfigMap in the "kube-public" namespace [addons] Applied essential addon: kube-dns [addons] Applied essential addon: kube-proxy Your Kubernetes master has initialized successfully! To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config You should now deploy a pod network to the cluster. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/ You can now join any number of machines by running the following on each node as root: kubeadm join 192.168.66.101:6443 --token abcdef.1234567890123456 --discovery-token-ca-cert-hash sha256:175de276305d20bfb0fd11dabebee814c650bcc69b2acea35399947ccac8168d + kubectl --kubeconfig=/etc/kubernetes/admin.conf apply -f https://raw.githubusercontent.com/coreos/flannel/v0.9.1/Documentation/kube-flannel.yml clusterrole.rbac.authorization.k8s.io "flannel" created clusterrolebinding.rbac.authorization.k8s.io "flannel" created serviceaccount "flannel" created configmap "kube-flannel-cfg" created daemonset.extensions "kube-flannel-ds" created + kubectl --kubeconfig=/etc/kubernetes/admin.conf taint nodes node01 node-role.kubernetes.io/master:NoSchedule- node "node01" untainted 2018/07/12 08:59:39 Waiting for host: 192.168.66.102:22 2018/07/12 08:59:42 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/07/12 08:59:54 Connected to tcp://192.168.66.102:22 + kubeadm join --token abcdef.1234567890123456 192.168.66.101:6443 --ignore-preflight-errors=all --discovery-token-unsafe-skip-ca-verification=true [preflight] Running pre-flight checks. [discovery] Trying to connect to API Server "192.168.66.101:6443" [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl [discovery] Cluster info signature and contents are valid and no TLS pinning was specified, will use API Server "192.168.66.101:6443" [discovery] Successfully established connection with API Server "192.168.66.101:6443" This node has joined the cluster: * Certificate signing request was sent to master and a response was received. * The Kubelet was informed of the new secure connection details. Run 'kubectl get nodes' on the master to see this node join the cluster. Sending file modes: C0755 39588992 kubectl Sending file modes: C0600 5454 admin.conf Cluster "kubernetes" set. Cluster "kubernetes" set. + set +e + kubectl get nodes --no-headers + cluster/kubectl.sh get nodes --no-headers node01 Ready master 40s v1.10.3 node02 Ready 14s v1.10.3 + kubectl_rc=0 + '[' 0 -ne 0 ']' ++ kubectl get nodes --no-headers ++ cluster/kubectl.sh get nodes --no-headers ++ grep NotReady + '[' -n '' ']' + set -e + echo 'Nodes are ready:' Nodes are ready: + kubectl get nodes + cluster/kubectl.sh get nodes NAME STATUS ROLES AGE VERSION node01 Ready master 42s v1.10.3 node02 Ready 16s v1.10.3 + make cluster-sync ./cluster/build.sh Building ... Untagged: localhost:33848/kubevirt/virt-controller:devel Untagged: localhost:33848/kubevirt/virt-controller@sha256:044a25fe3e1e21437973211a6f81ed8f5d3c91fb1704824ed49932c61fb09423 Deleted: sha256:4486bc6c866ca8c938fe22b16d753628c8192d20a0f5929dd71bf3716d442941 Deleted: sha256:8bfd68416917aa5044f0f5434433da3dd0f4848e090bd7cbe06aa8235c740c2d Deleted: sha256:836ab7fab28868e0d7b4f653d4bb9383b128233fb9ceee9d2d061dfd87bdf718 Deleted: sha256:fe838b4cbbf578699e06fdd1d58abba37ffabe3c95d8a917b2a6587274ed503d Untagged: localhost:33848/kubevirt/virt-launcher:devel Untagged: localhost:33848/kubevirt/virt-launcher@sha256:9f02056f253a5cce30d66d41f080e3d8cfc893ce77febb9497fbc76595317573 Deleted: sha256:0e61ad5367f597f0bc27dc8625b229a57513b218fcb466027978ed50fb4abc59 Deleted: sha256:1dc72446deabc4da819d4840645a983181a3e3a55e06253932e91d6e04414646 Deleted: sha256:9e8b438859fef2cb61105363a3d909ce06a70ec0aff13bc0654fd2188da26fab Deleted: sha256:287fa8811284a0c6a252e3e0044008c91934d2061b253b52a3dc3a5bee45a7c2 Deleted: sha256:62719498c980486e11f6fdacffb2e62eabb8a7203b177762486f6bbd56d51b44 Deleted: sha256:41fa55552fb03af2109bab913965a124b50002497b5799a5319341e882776372 Deleted: sha256:27f95627769347904a810ad99b188d25dae171b727a73a73abdcd21916a976b0 Deleted: sha256:fecf1034e0888df09e3db53b950cd12ee227e9805de2ec13923a05e958005912 Deleted: sha256:14e1a5db023690b4c37fd6ae2a3ab65154a6332b68a20db75a2b0912015e9596 Deleted: sha256:b322d35cf7b608574a594c4fcf5c9eca216698f41f81bdf22ef16b3f37b1cf35 Deleted: sha256:88a3f546d9ae588df1079c75815b8734cd1352b34ab076d9b9f07fbcf6722731 Deleted: sha256:6ebcd5a4f884da7dab84a4fd4b4fe807ae4b135ff46683557b99c1d82208422a Untagged: localhost:33848/kubevirt/virt-handler:devel Untagged: localhost:33848/kubevirt/virt-handler@sha256:caf21b70ad085965d674d659276c09c978f7be165829e8a10802f87ddecc5326 Deleted: sha256:7ad5ef2bf920c8c3d26c0f7486f8e0ade4cd6bb97fb08722e055876b554b8f80 Deleted: sha256:f438771ebc55b1e75dca7d7a7c80f4dba54e237dab13c86e5df77b12b30033d9 Deleted: sha256:6c877c0d47558170921c1c6942661e4229fb07b09ab67a3e39f86258d4b6b488 Deleted: sha256:f5eca0695f623a108b2505734489c5356df0a50acaeb1dd8b808c185e378f95d Untagged: localhost:33848/kubevirt/virt-api:devel Untagged: localhost:33848/kubevirt/virt-api@sha256:9649a8d1e3ac430393b9e7cde7d17705cf710f4b163361e6a659b54d734cc390 Deleted: sha256:380a271fc8c8b6709757d4e2c849680bd6787ab1e270a266ce165fba1d14c56a Deleted: sha256:5f11a77ac5d7886f7fa4ed3de5b6466c460539ecf66f9844636381a2104e8676 Deleted: sha256:ceb68012d68cf588e0bd5224b8f9dc5acda6d914f55e55910004b10590320fc7 Deleted: sha256:e0896b11574d1ffc4f49d166b1a0823b3c7cc948620db92b03609018abdd2d66 Untagged: localhost:33848/kubevirt/subresource-access-test:devel Untagged: localhost:33848/kubevirt/subresource-access-test@sha256:7b2a8319d6d0ad06c02a33a8348c7cf568464dd19b796c7bfda7a53e12fe3650 Deleted: sha256:f38e8b6baaef760c2a719806df3adab075e6ba2f063553875b64abb960f5bef7 Deleted: sha256:3de532cfc842dd3d1db30d610b9029e2396b429adaed25f1abeb95e98c33ad0e Deleted: sha256:6019e108750dc29b1136d5c033d4fd9358537acc3c5e86682d0da5de5fda051d Deleted: sha256:4db908a411a28a3e621fc8ba453c64e60ac0866b96d6462d4d04d0d2a39bec45 Untagged: localhost:33848/kubevirt/example-hook-sidecar:devel Untagged: localhost:33848/kubevirt/example-hook-sidecar@sha256:846c5c5db5be376985edcdb61e8fb31b09f2ededf310530dedf6ec776bd4efb7 Deleted: sha256:73fc102faaf9076b2cfd5b25b034b45c339e6127c405ff5a316208454fbd10f4 Deleted: sha256:7a19f82964b9dc95d010975c5493864d479ff8bce420508096083daeb5ab91cb Deleted: sha256:2c9836643441a562261e640e843927d4adf1c98cc6b1add74e89279ff18844d1 Deleted: sha256:5b2cf2ec4454229036b63a7cae92f57df4d0e61f79177acb8546eea492ee70ff sha256:380a1cbdbe840bfd69bc431427e8cd6a0b9dd9815c87fb88c0d177c6886cc53b go version go1.10 linux/amd64 go version go1.10 linux/amd64 diff -r /root/go/src/kubevirt.io/kubevirt/_out/manifests/dev/virt-controller.yaml /tmp/tmp.bCiOg1vTn4//root/go/src/kubevirt.io/kubevirt/_out/templates/manifests/dev/virt-controller.yaml 74c74 < runAsNonRoot: true \ No newline at end of file --- > runAsNonRoot: true make: *** [cluster-build] Error 1 + make cluster-down ./cluster/down.sh