+ export WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-k8s-1.10.3-release + WORKSPACE=/var/lib/swarm/workspace/kubevirt-functional-tests-k8s-1.10.3-release + [[ k8s-1.10.3-release =~ openshift-.* ]] + [[ k8s-1.10.3-release =~ .*-1.9.3-.* ]] + export KUBEVIRT_PROVIDER=k8s-1.10.3 + KUBEVIRT_PROVIDER=k8s-1.10.3 + export KUBEVIRT_NUM_NODES=2 + KUBEVIRT_NUM_NODES=2 + export NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + NFS_WINDOWS_DIR=/home/nfs/images/windows2016 + export NAMESPACE=kube-system + NAMESPACE=kube-system + trap '{ make cluster-down; }' EXIT SIGINT SIGTERM SIGSTOP + make cluster-down ./cluster/down.sh + make cluster-up ./cluster/up.sh Downloading ....... Downloading ....... 2018/06/28 11:47:31 Waiting for host: 192.168.66.101:22 2018/06/28 11:47:34 Problem with dial: dial tcp 192.168.66.101:22: getsockopt: no route to host. Sleeping 5s 2018/06/28 11:47:46 Connected to tcp://192.168.66.101:22 + kubeadm init --config /etc/kubernetes/kubeadm.conf [init] Using Kubernetes version: v1.10.3 [init] Using Authorization modes: [Node RBAC] [preflight] Running pre-flight checks. [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl Flag --admission-control has been deprecated, Use --enable-admission-plugins or --disable-admission-plugins instead. Will be removed in a future version. [certificates] Generated ca certificate and key. [certificates] Generated apiserver certificate and key. [certificates] apiserver serving cert is signed for DNS names [node01 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.66.101] [certificates] Generated apiserver-kubelet-client certificate and key. [certificates] Generated etcd/ca certificate and key. [certificates] Generated etcd/server certificate and key. [certificates] etcd/server serving cert is signed for DNS names [localhost] and IPs [127.0.0.1] [certificates] Generated etcd/peer certificate and key. [certificates] etcd/peer serving cert is signed for DNS names [node01] and IPs [192.168.66.101] [certificates] Generated etcd/healthcheck-client certificate and key. [certificates] Generated apiserver-etcd-client certificate and key. [certificates] Generated sa key and public key. [certificates] Generated front-proxy-ca certificate and key. [certificates] Generated front-proxy-client certificate and key. [certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" [controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml" [controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml" [controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml" [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml" [init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests". [init] This might take a minute or longer if the control plane images have to be pulled. [apiclient] All control plane components are healthy after 30.003717 seconds [uploadconfig] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace [markmaster] Will mark node node01 as master by adding a label and a taint [markmaster] Master node01 tainted and labelled with key/value: node-role.kubernetes.io/master="" [bootstraptoken] Using token: abcdef.1234567890123456 [bootstraptoken] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials [bootstraptoken] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token [bootstraptoken] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster [bootstraptoken] Creating the "cluster-info" ConfigMap in the "kube-public" namespace [addons] Applied essential addon: kube-dns [addons] Applied essential addon: kube-proxy Your Kubernetes master has initialized successfully! To start using your cluster, you need to run the following as a regular user: mkdir -p $HOME/.kube sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config sudo chown $(id -u):$(id -g) $HOME/.kube/config You should now deploy a pod network to the cluster. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at: https://kubernetes.io/docs/concepts/cluster-administration/addons/ You can now join any number of machines by running the following on each node as root: kubeadm join 192.168.66.101:6443 --token abcdef.1234567890123456 --discovery-token-ca-cert-hash sha256:c0a7f46e423f73f57fdbecdb283bc8881c7b127b021e91fc512d105c9b13a0af + kubectl --kubeconfig=/etc/kubernetes/admin.conf apply -f https://raw.githubusercontent.com/coreos/flannel/v0.9.1/Documentation/kube-flannel.yml clusterrole.rbac.authorization.k8s.io "flannel" created clusterrolebinding.rbac.authorization.k8s.io "flannel" created serviceaccount "flannel" created configmap "kube-flannel-cfg" created daemonset.extensions "kube-flannel-ds" created + kubectl --kubeconfig=/etc/kubernetes/admin.conf taint nodes node01 node-role.kubernetes.io/master:NoSchedule- node "node01" untainted 2018/06/28 11:48:29 Waiting for host: 192.168.66.102:22 2018/06/28 11:48:32 Problem with dial: dial tcp 192.168.66.102:22: getsockopt: no route to host. Sleeping 5s 2018/06/28 11:48:44 Connected to tcp://192.168.66.102:22 + kubeadm join --token abcdef.1234567890123456 192.168.66.101:6443 --ignore-preflight-errors=all --discovery-token-unsafe-skip-ca-verification=true [preflight] Running pre-flight checks. [discovery] Trying to connect to API Server "192.168.66.101:6443" [WARNING FileExisting-crictl]: crictl not found in system path Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl [discovery] Created cluster-info discovery client, requesting info from "https://192.168.66.101:6443" [discovery] Cluster info signature and contents are valid and no TLS pinning was specified, will use API Server "192.168.66.101:6443" [discovery] Successfully established connection with API Server "192.168.66.101:6443" This node has joined the cluster: * Certificate signing request was sent to master and a response was received. * The Kubelet was informed of the new secure connection details. Run 'kubectl get nodes' on the master to see this node join the cluster. Sending file modes: C0755 39588992 kubectl Sending file modes: C0600 5454 admin.conf Cluster "kubernetes" set. Cluster "kubernetes" set. + set +e + kubectl get nodes --no-headers + cluster/kubectl.sh get nodes --no-headers node01 Ready master 47s v1.10.3 node02 Ready 20s v1.10.3 + kubectl_rc=0 + '[' 0 -ne 0 ']' ++ kubectl get nodes --no-headers ++ grep NotReady ++ cluster/kubectl.sh get nodes --no-headers + '[' -n '' ']' + set -e + echo 'Nodes are ready:' Nodes are ready: + kubectl get nodes + cluster/kubectl.sh get nodes NAME STATUS ROLES AGE VERSION node01 Ready master 48s v1.10.3 node02 Ready 21s v1.10.3 + make cluster-sync ./cluster/build.sh Building ... Untagged: localhost:37686/kubevirt/virt-controller:devel Untagged: localhost:37686/kubevirt/virt-controller@sha256:3fbf3711e26992abe00ae8aaa1b626b496df5e847ae69cab08f594f0503a35dc Deleted: sha256:b1c1f026d911456cbe4477b40ba5cc5371d958c2fc8e4ba52574c4eef632acb9 Deleted: sha256:1a6328dace9fb7ceb76fe2f7db90d412ac96b67249a987c0af551780302e5f82 Deleted: sha256:dd2745ff3507fa3f6a472a577a5234208aba051a4d8f5c6158697b6fd9aaa066 Deleted: sha256:7d377b6be573f19dcaedc8ae8d8e717b0ace526b244e0005320b475c945a7841 Untagged: localhost:37686/kubevirt/virt-launcher:devel Untagged: localhost:37686/kubevirt/virt-launcher@sha256:991b326dc0deec72c6e4c77e470e398b2c0389f2fa254f5b37def194cc68579b Deleted: sha256:20570641f94b266c549fe3338b0540f34fa05f109aa1efe6345b162942d18ca8 Deleted: sha256:e1af25b9527699d6f0cccf7287cca17cd17c406722ab6c6d1ee9196804d2ff9e Deleted: sha256:dd478bc40b7a4f666a14a3cbab7b51e7cc14a880838d90d1aefbe769b99905ae Deleted: sha256:fbd6ae34b01a556260564053a2881bfcffa5e7ffbc3dc572ac7e74eb41a84562 Deleted: sha256:dcf837358f9d3fe3adc80a035c7a70e8fdfc0b3bc6d58a866eeec0c30647952f Deleted: sha256:2d2346f26b6ca21a098ddc35956cf290d5708564d033c7590cccee22a5aa8021 Deleted: sha256:ea5e08d2c73737e69f619fa6c0eb29919b598b26902f5ad9e2bc96af881817e2 Deleted: sha256:e60f3ed7b314e43571ce20a13833678e928fbd84c2d941077b21d0c226df2c90 Deleted: sha256:ff74b1df9a1501c372c9224b9532adb39f4994082d6f445183a27773eb10ec67 Deleted: sha256:1fc91e7f0f447c44a6a4c7263fdbcfb2e5294008207bc6b04fe32c1d70d10f81 Deleted: sha256:959a642a275f438a6edc1ec41f87f9cf2e5566d474c87ab302438e4a561ea6ca Deleted: sha256:4652968a825c8d382d92dd864ad9d0fe4cd833676b4cb8ee6a7c70e7896d57d0 Deleted: sha256:0586173ffbc7aa7725a5d2c6e9e9a30fb8a027ee7cfbc1488a9ab7ee86bfd242 Deleted: sha256:a4951c2d35bd4c2779ae5a02ab3c6a5262b3f65f59290a884ef1cb07a8c0aa6b Deleted: sha256:3e6987131eeacc8c1b9c27d10d3851924bb66ec8aa9321e1cf3a6ab511109fa7 Deleted: sha256:4405fbd86ea7ad7df9d69a1fe689ae390062de3aa5cff567e370af01dc7e806b Deleted: sha256:2ff9a184604bc67248e7586a8e45853861c7dab15a2450875b053a79fb1ec989 Deleted: sha256:3e4734f73726abfa645e64b41ea00b4e0bef8112456db507b20010da80800e75 Untagged: localhost:37686/kubevirt/virt-handler:devel Untagged: localhost:37686/kubevirt/virt-handler@sha256:1f28808e5f4753abc4a9ab2ee6a84648cef9499194c7ee09eeed6823d2581a8b Deleted: sha256:a47fb47d43bbe5475d24bbbea16d5423350b37021d7b8600d39cb90af450051a Deleted: sha256:e8e13c2eb94faacbc835091abd9a182a510acfe0cd9d7a43f4e3a98ea7541b7d Deleted: sha256:bbe190f334940586442620ac9aed81aa63593ce2e0310dc723a79a0bc60ed520 Deleted: sha256:4df0e3c6eb487399a638a57040dc70796ec77d80dfa6b6e92b51e16ae8eaab50 Untagged: localhost:37686/kubevirt/virt-api:devel Untagged: localhost:37686/kubevirt/virt-api@sha256:3b595d5dc4b36c3242a096087b7ffd451658e7e0535275ca3e15e5ee637284c7 Deleted: sha256:07523d5ddec46b5aeef74cef194244e41238756e46c5662ae581907c2cdc0425 Deleted: sha256:bd656bc8be951907e1f5534f693f087107c7b7c52933327b933de7eeed569b50 Deleted: sha256:7a4e20dc418572d103937be7a6fce52f9a8ba23747d102d4db19996d694402b4 Deleted: sha256:ad07ab362377232e18c119bba98c11c8380bfa2fec6fbd9768be714a295e9d1c Untagged: localhost:37686/kubevirt/subresource-access-test:devel Untagged: localhost:37686/kubevirt/subresource-access-test@sha256:bbf5a974c9d8feca5817f73a58cd2d5a70b91bc617177b04e7386fe45a1ca2d3 Deleted: sha256:c9cfa0cda16b70b6332f1d96d35e8a5fe888a664addfa46ccaf60d3f19397564 Deleted: sha256:b8f031ea1ce50783d4390794931808a54b3caabf20e4c8142aaa2d4536581370 Deleted: sha256:55f34ef98bb776f68e9340ed3f742a024365cde0e652f02dce58585312c031b7 Deleted: sha256:c19283da5e11ff1fed4c62f57c5d968cec42accc5d2137349e0d88de5703d22b sha256:6eacca7072242103a52e09bde728cf8c3c4134c37779287f25cbf1a1b93180b2 go version go1.10 linux/amd64 go version go1.10 linux/amd64 make[1]: Entering directory `/var/lib/swarm/workspace/kubevirt-functional-tests-k8s-1.10.3-release/go/src/kubevirt.io/kubevirt' hack/dockerized "./hack/check.sh && KUBEVIRT_VERSION= ./hack/build-go.sh install " && ./hack/build-copy-artifacts.sh sha256:6eacca7072242103a52e09bde728cf8c3c4134c37779287f25cbf1a1b93180b2 go version go1.10 linux/amd64 go version go1.10 linux/amd64 find: '/root/go/src/kubevirt.io/kubevirt/_out/cmd': No such file or directory