+ export WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-windows2016-release + WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-windows2016-release + [[ windows2016-release =~ openshift-.* ]] + [[ windows2016-release =~ .*-1.9.3-.* ]] + export KUBEVIRT_PROVIDER=k8s-1.10.3 + KUBEVIRT_PROVIDER=k8s-1.10.3 + export KUBEVIRT_NUM_NODES=2 + KUBEVIRT_NUM_NODES=2 + export NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + export NAMESPACE=kube-system + NAMESPACE=kube-system + trap '{ make cluster-down; }' EXIT SIGINT SIGTERM SIGSTOP + make cluster-down ./cluster/down.sh + make cluster-up ./cluster/up.sh Downloading ....... Downloading ....... Downloading ....... 2018/07/15 07:46:44 Waiting for host: 192.168.66.101:22 2018/07/15 07:46:47 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/07/15 07:46:55 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/07/15 07:47:00 Connected to tcp://192.168.66.101:22 + kubeadm init --config /etc/kubernetes/kubeadm.conf [init] Using Kubernetes version: v1.10.3 [init] Using Authorization modes: [Node RBAC] [preflight] Running pre-flight checks. [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl Flag --admission-control has been deprecated, Use --enable-admission-plugins or --disable-admission-plugins instead. Will be removed in a future version. [certificates] Generated ca certificate and key. [certificates] Generated apiserver certificate and key. [certificates] apiserver serving cert is signed for DNS names [node01 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.66.101] [certificates] Generated apiserver-kubelet-client certificate and key. [certificates] Generated etcd/ca certificate and key. [certificates] Generated etcd/server certificate and key. [certificates] etcd/server serving cert is signed for DNS names [localhost] and IPs [127.0.0.1] [certificates] Generated etcd/peer certificate and key. [certificates] etcd/peer serving cert is signed for DNS names [node01] and IPs [192.168.66.101] [certificates] Generated etcd/healthcheck-client certificate and key. [certificates] Generated apiserver-etcd-client certificate and key. [certificates] Generated sa key and public key. [certificates] Generated front-proxy-ca certificate and key. [certificates] Generated front-proxy-client certificate and key. [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" [controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml" [controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml" [controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml" [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml" [init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests". [init] This might take a minute or longer if the control plane images have to be pulled. [apiclient] All control plane components are healthy after 26.506822 seconds [uploadconfig] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace [markmaster] Will mark node node01 as master by adding a label and a taint [markmaster] Master node01 tainted and labelled with key/value: node-role.kubernetes.io/master="" [bootstraptoken] Using token: abcdef.1234567890123456 [bootstraptoken] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials [bootstraptoken] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token [bootstraptoken] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster [bootstraptoken] Creating the "cluster-info" ConfigMap in the "kube-public" namespace [addons] Applied essential addon: kube-dns [addons] Applied essential addon: kube-proxy Your Kubernetes master has initialized successfully! To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config You should now deploy a pod network to the cluster. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/ You can now join any number of machines by running the following on each node as root: kubeadm join 192.168.66.101:6443 --token abcdef.1234567890123456 --discovery-token-ca-cert-hash sha256:b385dd110195860b7acf1d90b63b016cba61132b36b34bc0dd3eef176f31f295 + kubectl --kubeconfig=/etc/kubernetes/admin.conf apply -f https://raw.githubusercontent.com/coreos/flannel/v0.9.1/Documentation/kube-flannel.yml clusterrole.rbac.authorization.k8s.io "flannel" created clusterrolebinding.rbac.authorization.k8s.io "flannel" created serviceaccount "flannel" created configmap "kube-flannel-cfg" created daemonset.extensions "kube-flannel-ds" created + kubectl --kubeconfig=/etc/kubernetes/admin.conf taint nodes node01 node-role.kubernetes.io/master:NoSchedule- node "node01" untainted 2018/07/15 07:47:44 Waiting for host: 192.168.66.102:22 2018/07/15 07:47:47 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/07/15 07:47:55 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/07/15 07:48:00 Connected to tcp://192.168.66.102:22 + kubeadm join --token abcdef.1234567890123456 192.168.66.101:6443 --ignore-preflight-errors=all --discovery-token-unsafe-skip-ca-verification=true [preflight] Running pre-flight checks. [discovery] Trying to connect to API Server "192.168.66.101:6443" [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Failed to connect to API Server "192.168.66.101:6443": token id "abcdef" is invalid for this cluster or it has expired. Use "kubeadm token create" on the master node to creating a new valid token [discovery] Trying to connect to API Server "192.168.66.101:6443" [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Failed to connect to API Server "192.168.66.101:6443": token id "abcdef" is invalid for this cluster or it has expired. Use "kubeadm token create" on the master node to creating a new valid token [discovery] Trying to connect to API Server "192.168.66.101:6443" [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Failed to connect to API Server "192.168.66.101:6443": token id "abcdef" is invalid for this cluster or it has expired. Use "kubeadm token create" on the master node to creating a new valid token [discovery] Trying to connect to API Server "192.168.66.101:6443" [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Cluster info signature and contents are valid and no TLS pinning was specified, will use API Server "192.168.66.101:6443" [discovery] Successfully established connection with API Server "192.168.66.101:6443" This node has joined the cluster: * Certificate signing request was sent to master and a response was received. * The Kubelet was informed of the new secure connection details. Run 'kubectl get nodes' on the master to see this node join the cluster. Sending file modes: C0755 39588992 kubectl Sending file modes: C0600 5450 admin.conf Cluster "kubernetes" set. Cluster "kubernetes" set. + set +e + kubectl get nodes --no-headers + cluster/kubectl.sh get nodes --no-headers node01 Ready master 57s v1.10.3 node02 Ready 20s v1.10.3 + kubectl_rc=0 + '[' 0 -ne 0 ']' ++ kubectl get nodes --no-headers ++ cluster/kubectl.sh get nodes --no-headers ++ grep NotReady + '[' -n '' ']' + set -e + echo 'Nodes are ready:' Nodes are ready: + kubectl get nodes + cluster/kubectl.sh get nodes NAME STATUS ROLES AGE VERSION node01 Ready master 59s v1.10.3 node02 Ready 22s v1.10.3 + make cluster-sync ./cluster/build.sh Building ... Untagged: localhost:34000/kubevirt/virt-controller:devel Untagged: localhost:34000/kubevirt/virt-controller@sha256:f02b950bb9930839cf91d42701eeccc120763f23e1d1d54e96f305aae2918e1f Deleted: sha256:2eeaae8010a50c913b9c20a10ddac26aae8957595e12d3d971aa5aad5bb425f0 Deleted: sha256:0bbf092607d64a675eb1661a687179ba7274af4da4db2cbd64b2682af49282b2 Deleted: sha256:35b29fbea2727027eb3f0f1314664d85df3711bef344d87f1818388ae2809872 Deleted: sha256:00ecb81cdeb6f9208dc067c7928c58bc304142b20eba8c8fae6e72d038a5a40c Untagged: localhost:34000/kubevirt/virt-launcher:devel Untagged: localhost:34000/kubevirt/virt-launcher@sha256:1db5259f8ab83765f6f92b8d9efc7bfd23ea95084f6d90ae004628cc4600a365 Deleted: sha256:133dc8b4697a7ec43f075188d7f3f0d3cc99cd54f1f4b9a04774a751b50b5d45 Deleted: sha256:50759355cc7102272d9897b791fa4aea3169e6b601a501f7f367afca55fda80a Deleted: sha256:034006e59016581e6c59cac3fed607fbdd5eee69faabc970d014fef8bf9def93 Deleted: sha256:dede4cd688bd20f4291ba5a5757ff0fed61518da16c68ce0eaf1b8b85ddb2a89 Deleted: sha256:c15c4fe608a636cc27fe3d2d9c666124a7f6f910f715cec49cf2cb7ef9772988 Deleted: sha256:f30e284615e8ee859716d23ddff85092af8ef76672b601ade26f782833efb96d Deleted: sha256:307afd4ad81c1c100a6214a9c0bc3d5f81f56084e14ffd896edefbe79f52d263 Deleted: sha256:2c35fcb4dbfd1835b7853711401286ace9961456594ed26adcb4c433b0a9f9a5 Deleted: sha256:6f06562383b6f700d0b1521678df59b949529b855a968c18e718daa944ae15bb Deleted: sha256:075bc1e41e19adcd653120369c12d959c563a440df5b2377af0b0343bef92535 Deleted: sha256:34707108c1b8031dd912fc2c8ed3071671fdd487987a2d31a65e5ee77693172e Deleted: sha256:0d9453836d51d0931a74226cd71129f904c5fc2f33862379ce904a6d63cc5b38 Untagged: localhost:34000/kubevirt/virt-handler:devel Untagged: localhost:34000/kubevirt/virt-handler@sha256:6e0ee8ad932fb9ddc5b4720c942c00fdfea37a3e07a0f5242472b28ca486dac0 Deleted: sha256:dd0ba4b7383ece1b46d7d889d25a2022ed9a9e764c4dc86ff996f4dcafc43c3c Deleted: sha256:7fe0cfbac157ec8b20b7762dcde7a33d118e1cfed29a75c4b83f7be2a80c9b9e Deleted: sha256:10267ca5278fad164046b9714645a0078f5a259379d0f4b1124d044b09813c62 Deleted: sha256:c83015681bb5a70617bb93cb949391e2fc857348b945af8323f20eb13cbea438 Untagged: localhost:34000/kubevirt/virt-api:devel Untagged: localhost:34000/kubevirt/virt-api@sha256:9e4cdad4b32245d1a9ece0721fa94d3f91153e2e18a7d7d6442067f34eab7fcc Deleted: sha256:532fd52cfef32e865390af565d6e1c43b6650e9c2c94e9c47e2a1bd19f4d1d4a Deleted: sha256:71090d435d798af062aff7bece542c4a16d22f65168821070a25f98b8b7e565d Deleted: sha256:193ec98c6589462d8976d5fdb4c76861e884fae24f4352e786e2d49829fd064b Deleted: sha256:711b62c1c0aae98725f6b5f66293e43b0f7e67a3a5832d033964e12aa57b7235 Untagged: localhost:34000/kubevirt/subresource-access-test:devel Untagged: localhost:34000/kubevirt/subresource-access-test@sha256:40170f8ccf1d738a08d5b08cfd006f82260ce6b2924ebbfb0bd0ef8d350fed59 Deleted: sha256:281f93cb45d5accce65ff059e1ffcdbce727d180bc1d568e2a427bd998d04be0 Deleted: sha256:ccec3099bf68fc0bbb5697f5bdae7f08d8e937dd10d9919293dcb3b7286d8136 Deleted: sha256:91dfe8938d47bf6b24c7d8445e75e2f63a62984623c245277f2f8bf4a7e3c20c Deleted: sha256:e9aa50f1d1f4b31ddbe8aa22cb1249cdeb422fd8c34ec50e9051e60c09c818d9 Untagged: localhost:34000/kubevirt/example-hook-sidecar:devel Untagged: localhost:34000/kubevirt/example-hook-sidecar@sha256:23e40a3a5f091caa7babbe68dc3f6f460a990ddbc59dfb774787d4e00a792959 Deleted: sha256:728637b91857952c31a32b57f5ae9256bfaf32c57cdb9af6f739acd5b86667ff Deleted: sha256:de372eb6c13008c84024abfede8ee168d2f33e1ced4a092b93aa2f0668d2b5b8 Deleted: sha256:42cafa140e29173c22a66ee1a3b5d8e94ed5708c67e90d6aa1f3a073f5331d8d Deleted: sha256:79472d68c568f7ad8401c01aeaa0260fa2b47cf8b2fccb7731fbe42930e3246c hack/dockerized: line 17: 11737 Terminated docker build . -q -t ${BUILDER}