Build failed in Jenkins: cloud-antrea-eks-conformance-net-policy #652

0 views
Skip to first unread message

antr...@gmail.com

unread,
Mar 21, 2024, 1:41:30 AM3/21/24
to projecta...@googlegroups.com
See <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/652/display/redirect?page=changes>

Changes:

[noreply] SameLabels support for ACNP peer Namespace selection (#4537)

[noreply] Bump github.com/onsi/ginkgo/v2 from 2.16.0 to 2.17.0 (#6118)

[noreply] Fix ci/test-e2e-kind.sh script on macOS (#6117)

[noreply] Bump github.com/onsi/gomega from 1.31.1 to 1.32.0 (#6119)

[noreply] Upgrade k8s libraries to v0.29.2 (#5843)

[noreply] [e2e test] Fix antctl coverage collection from CP Node on Kind (#6127)


------------------------------------------
[...truncated 174.06 KB...]
#9 [antrea-build 4/7] COPY . /antrea
#9 CACHED

#10 [antrea-build 5/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antctl-linux && mv bin/antctl-linux bin/antctl
#10 CACHED

#11 [antrea-build 2/7] WORKDIR /antrea
#11 CACHED

#12 [antrea-build 6/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-agent antrea-cni
#12 CACHED

#13 [antrea-build 7/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-controller
#13 0.393 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X antrea.io/antrea/pkg/version.Version=v2.0.0-dev -X antrea.io/antrea/pkg/version.GitSHA=58433874 -X antrea.io/antrea/pkg/version.GitTreeState=clean -X antrea.io/antrea/pkg/version.ReleaseStatus=unreleased' antrea.io/antrea/cmd/antrea-controller
#13 DONE 4.8s

#14 [stage-1 2/3] COPY build/images/scripts/* /usr/local/bin/
#14 CACHED

#15 [stage-1 3/3] COPY --from=antrea-build /antrea/bin/* /usr/local/bin/
#15 CACHED

#16 exporting to image
#16 exporting layers done
#16 writing image sha256:2a949b5c9a6f14e444b0a25d02317bee1c62cd84de0ace465269fbb6e6e17ecc done
#16 naming to docker.io/antrea/antrea-ubuntu:cloud-antrea-eks-conformance-net-policy-652 0.0s done
#16 DONE 0.0s
docker tag antrea/antrea-ubuntu:cloud-antrea-eks-conformance-net-policy-652 antrea/antrea-ubuntu
+ [[ 0 -ne 0 ]]
+ echo '=== Loading the Antrea image to each Node ==='
=== Loading the Antrea image to each Node ===
+ antrea_images_tar=antrea-ubuntu.tar
+ DOCKER_IMG_VERSION=cloud-antrea-eks-conformance-net-policy-652
+ DOCKER_AGENT_IMG_NAME=antrea/antrea-agent-ubuntu
+ DOCKER_CONTROLLER_IMG_NAME=antrea/antrea-controller-ubuntu
+ docker save -o antrea-ubuntu.tar antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-652 antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-652
+ kubectl get nodes -o wide --no-headers=true
+ awk '{print $7}'
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@34.210.82.225:~'
Warning: Permanently added '34.210.82.225' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@34.210.82.225 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-652 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-652 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-652 (sha256:f70bd2c782f9fd0f8fe9fa177c198fd5a8e6c94aa522fcf12a7926056b07b22d)...done
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-652 (sha256:820371762f002232f6586d2151e395a859ae50aeab67e8c9a1e5d26258880537)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@18.246.53.178:~'
Warning: Permanently added '18.246.53.178' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@18.246.53.178 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-652 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-652 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-652 (sha256:f70bd2c782f9fd0f8fe9fa177c198fd5a8e6c94aa522fcf12a7926056b07b22d)...done
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-652 (sha256:820371762f002232f6586d2151e395a859ae50aeab67e8c9a1e5d26258880537)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ rm antrea-ubuntu.tar
+ echo '=== Configuring Antrea for cluster ==='
=== Configuring Antrea for cluster ===
+ kubectl apply -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml>
daemonset.apps/antrea-node-init created
+ kubectl apply -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml>
customresourcedefinition.apiextensions.k8s.io/antreaagentinfos.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/antreacontrollerinfos.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/clustergroups.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/clusternetworkpolicies.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/egresses.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalentities.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalippools.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalnodes.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/groups.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/ippools.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/networkpolicies.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/supportbundlecollections.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/tiers.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/traceflows.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/trafficcontrols.crd.antrea.io created
serviceaccount/antrea-agent created
serviceaccount/antctl created
serviceaccount/antrea-controller created
secret/antrea-agent-service-account-token created
secret/antctl-service-account-token created
configmap/antrea-config created
clusterrole.rbac.authorization.k8s.io/antrea-agent created
clusterrole.rbac.authorization.k8s.io/antctl created
clusterrole.rbac.authorization.k8s.io/antrea-cluster-identity-reader created
clusterrole.rbac.authorization.k8s.io/antrea-controller created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-view created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-view created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-view created
clusterrolebinding.rbac.authorization.k8s.io/antrea-agent created
clusterrolebinding.rbac.authorization.k8s.io/antctl created
clusterrolebinding.rbac.authorization.k8s.io/antrea-controller created
service/antrea created
daemonset.apps/antrea-agent created
deployment.apps/antrea-controller created
apiservice.apiregistration.k8s.io/v1beta2.controlplane.antrea.io created
apiservice.apiregistration.k8s.io/v1beta1.system.antrea.io created
apiservice.apiregistration.k8s.io/v1alpha1.stats.antrea.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/crdmutator.antrea.io created
validatingwebhookconfiguration.admissionregistration.k8s.io/crdvalidator.antrea.io created
+ kubectl rollout status --timeout=2m deployment.apps/antrea-controller -n kube-system
Waiting for deployment "antrea-controller" rollout to finish: 0 of 1 updated replicas are available...
deployment "antrea-controller" successfully rolled out
+ kubectl rollout status --timeout=2m daemonset/antrea-agent -n kube-system
Waiting for daemon set "antrea-agent" rollout to finish: 0 of 2 updated pods are available...
Waiting for daemon set "antrea-agent" rollout to finish: 1 of 2 updated pods are available...
daemon set "antrea-agent" successfully rolled out
+ echo '=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-652 ==='
=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-652 ===
+ run_conformance
+ echo '=== Running Antrea Conformance and Network Policy Tests ==='
=== Running Antrea Conformance and Network Policy Tests ===
+ skip_regex='\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort'
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-conformance --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-03-21T05:00:41Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-03-21T05:00:41Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-21T05:00:41Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Conformance\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Conformance\]' --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --image-pull-policy Always --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:v0.56.16 --systemd-logs-image projects.registry.vmware.com/sonobuoy/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-03-21T05:00:47Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-03-21T05:04:29Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-03-21T05:04:29Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-21T05:04:29Z" level=info msg="delete request issued" kind=clusterroles
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-network-policy --e2e-skip NetworkPolicyLegacy --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-03-21T05:05:05Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-03-21T05:05:05Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-21T05:05:05Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Feature:NetworkPolicy\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Feature:NetworkPolicy\]' --e2e-skip NetworkPolicyLegacy --image-pull-policy Always --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:v0.56.16 --systemd-logs-image projects.registry.vmware.com/sonobuoy/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-03-21T05:05:11Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-03-21T05:40:14Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-03-21T05:40:14Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-21T05:40:14Z" level=info msg="delete request issued" kind=clusterroles
+ TEST_SCRIPT_RC=1
+ [[ 1 -eq 0 ]]
+ [[ 1 -eq 1 ]]
+ echo 'Failed test cases exist.'
Failed test cases exist.
+ echo '=== FAILURE !!! ==='
=== FAILURE !!! ===
+ echo '=== Cleanup Antrea Installation ==='
=== Cleanup Antrea Installation ===
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks-node-init.yml> --ignore-not-found=true
daemonset.apps "antrea-node-init" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks.yml> --ignore-not-found=true
customresourcedefinition.apiextensions.k8s.io "antreaagentinfos.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "antreacontrollerinfos.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "clustergroups.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "clusternetworkpolicies.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "egresses.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalentities.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalippools.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalnodes.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "groups.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "ippools.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "networkpolicies.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "supportbundlecollections.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "tiers.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "traceflows.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "trafficcontrols.crd.antrea.io" deleted
serviceaccount "antrea-agent" deleted
serviceaccount "antctl" deleted
serviceaccount "antrea-controller" deleted
secret "antrea-agent-service-account-token" deleted
secret "antctl-service-account-token" deleted
configmap "antrea-config" deleted
clusterrole.rbac.authorization.k8s.io "antrea-agent" deleted
clusterrole.rbac.authorization.k8s.io "antctl" deleted
clusterrole.rbac.authorization.k8s.io "antrea-cluster-identity-reader" deleted
clusterrole.rbac.authorization.k8s.io "antrea-controller" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-policies-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-policies-view" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-traceflows-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-traceflows-view" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-clustergroups-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-clustergroups-view" deleted
clusterrolebinding.rbac.authorization.k8s.io "antrea-agent" deleted
clusterrolebinding.rbac.authorization.k8s.io "antctl" deleted
clusterrolebinding.rbac.authorization.k8s.io "antrea-controller" deleted
service "antrea" deleted
daemonset.apps "antrea-agent" deleted
deployment.apps "antrea-controller" deleted
apiservice.apiregistration.k8s.io "v1beta2.controlplane.antrea.io" deleted
apiservice.apiregistration.k8s.io "v1beta1.system.antrea.io" deleted
apiservice.apiregistration.k8s.io "v1alpha1.stats.antrea.io" deleted
mutatingwebhookconfiguration.admissionregistration.k8s.io "crdmutator.antrea.io" deleted
validatingwebhookconfiguration.admissionregistration.k8s.io "crdvalidator.antrea.io" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-crds.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke-node-init.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-ipsec.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-migrator.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus-rbac.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows-containerd-with-ovs.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows-containerd.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/flow-aggregator.yml> --ignore-not-found=true
+ [[ false == true ]]
+ [[ false == true ]]
+ [[ false == false ]]
+ [[ 1 -ne 0 ]]
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts

antr...@gmail.com

unread,
Mar 23, 2024, 1:42:14 AM3/23/24
to projecta...@googlegroups.com
See <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/653/display/redirect?page=changes>

Changes:

[noreply] Remove unnecessary code from UBI Dockerfiles (#6128)

[noreply] Bump github.com/hashicorp/memberlist from 0.5.0 to 0.5.1 (#6124)

[noreply] Update Protobuf dependencies for code generation (#6130)


------------------------------------------
[...truncated 177.17 KB...]
#8 CACHED

#9 [antrea-build 3/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=bind,source=go.sum,target=go.sum --mount=type=bind,source=go.mod,target=go.mod go mod download
#9 CACHED

#10 [antrea-build 4/7] COPY . /antrea
#10 CACHED

#11 [antrea-build 5/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antctl-linux && mv bin/antctl-linux bin/antctl
#11 CACHED

#12 [antrea-build 6/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-agent antrea-cni
#12 CACHED

#13 [antrea-build 7/7] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-controller
#13 0.363 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X antrea.io/antrea/pkg/version.Version=v2.0.0-dev -X antrea.io/antrea/pkg/version.GitSHA=df82b766 -X antrea.io/antrea/pkg/version.GitTreeState=clean -X antrea.io/antrea/pkg/version.ReleaseStatus=unreleased' antrea.io/antrea/cmd/antrea-controller
#13 DONE 4.3s

#14 [stage-1 2/3] COPY build/images/scripts/* /usr/local/bin/
#14 CACHED

#15 [stage-1 3/3] COPY --from=antrea-build /antrea/bin/* /usr/local/bin/
#15 CACHED

#16 exporting to image
#16 exporting layers done
#16 writing image sha256:d06447cb13e8c2d72176f60cb8c95cbe3f77a307ba5c4df1643a428474f93cd9 done
#16 naming to docker.io/antrea/antrea-ubuntu:cloud-antrea-eks-conformance-net-policy-653 0.0s done
#16 DONE 0.0s
docker tag antrea/antrea-ubuntu:cloud-antrea-eks-conformance-net-policy-653 antrea/antrea-ubuntu
+ [[ 0 -ne 0 ]]
+ echo '=== Loading the Antrea image to each Node ==='
=== Loading the Antrea image to each Node ===
+ antrea_images_tar=antrea-ubuntu.tar
+ DOCKER_IMG_VERSION=cloud-antrea-eks-conformance-net-policy-653
+ DOCKER_AGENT_IMG_NAME=antrea/antrea-agent-ubuntu
+ DOCKER_CONTROLLER_IMG_NAME=antrea/antrea-controller-ubuntu
+ docker save -o antrea-ubuntu.tar antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-653 antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-653
+ kubectl get nodes -o wide --no-headers=true
+ awk '{print $7}'
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@35.90.232.8:~'
Warning: Permanently added '35.90.232.8' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@35.90.232.8 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-653 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-653 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-653 (sha256:784fb5f82c9d7d4b8e0607dda71634101842192a708cd4605273fdd645290ccd)...done
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-653 (sha256:01202bb7ea82d887560a254164d295067714d7621bd41872ef7f120e02f23cc1)...done
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@35.91.189.185:~'
Warning: Permanently added '35.91.189.185' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@35.91.189.185 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-653 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-653 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-653 (sha256:784fb5f82c9d7d4b8e0607dda71634101842192a708cd4605273fdd645290ccd)...done
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-653 (sha256:01202bb7ea82d887560a254164d295067714d7621bd41872ef7f120e02f23cc1)...done
+ echo '=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-653 ==='
=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-653 ===
+ run_conformance
+ echo '=== Running Antrea Conformance and Network Policy Tests ==='
=== Running Antrea Conformance and Network Policy Tests ===
+ skip_regex='\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort'
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-conformance --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-03-23T05:01:11Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-03-23T05:01:11Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-23T05:01:11Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Conformance\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Conformance\]' --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --image-pull-policy Always --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:v0.56.16 --systemd-logs-image projects.registry.vmware.com/sonobuoy/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:01:17Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-03-23T05:01:18Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-03-23T05:05:20Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-03-23T05:05:20Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-23T05:05:20Z" level=info msg="delete request issued" kind=clusterroles
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-network-policy --e2e-skip NetworkPolicyLegacy --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-03-23T05:05:36Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-03-23T05:05:36Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-23T05:05:36Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Feature:NetworkPolicy\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Feature:NetworkPolicy\]' --e2e-skip NetworkPolicyLegacy --image-pull-policy Always --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:v0.56.16 --systemd-logs-image projects.registry.vmware.com/sonobuoy/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-03-23T05:05:41Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-03-23T05:05:42Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-03-23T05:40:44Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-03-23T05:40:44Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-03-23T05:40:44Z" level=info msg="delete request issued" kind=clusterroles

antr...@gmail.com

unread,
Mar 25, 2024, 1:41:23 AM3/25/24
to projecta...@googlegroups.com
Reply all
Reply to author
Forward
0 new messages