Build failed in Jenkins: cloud-antrea-eks-conformance-net-policy #692

15 views
Skip to first unread message

antr...@gmail.com

unread,
Jun 7, 2024, 1:39:49 AM6/7/24
to projecta...@googlegroups.com
See <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/692/display/redirect?page=changes>

Changes:

[noreply] Add basic NetworkPolicy tests to antctl check (#6367)

[noreply] Handle unexpected error when the test is aborted (#5295)

[noreply] Fix antrea-agent crashing with proxyAll enabled in networkPolicyOnly mode (#6259)

[noreply] Fix AntreaProxy not deleting stale UDP conntrack entries for the virtual NodePort DNAT IP (#6379)

[noreply] antctl: minor improvements about error message and CI (#6413)

[noreply] antctl: improve Pod-To-Service connectivity check (#6411)

[noreply] Fix racy unit test TestIdAllocatorWorker (#6407)

[noreply] Bump the golang-org-x group with 5 updates (#6403)

[noreply] [e2e test] Increase robustness of TestL7NetworkPolicy/Logging (#6395)


------------------------------------------
[...truncated 45.46 KB...]

#10 [antrea-build 2/6] WORKDIR /antrea
#10 CACHED

#11 [antrea-build 5/6] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antctl-linux && mv bin/antctl-linux bin/antctl
#11 CACHED

#12 [antrea-build 6/6] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-agent antrea-cni
#12 0.365 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X antrea.io/antrea/pkg/version.Version=v2.1.0-dev -X antrea.io/antrea/pkg/version.GitSHA=39ecb3b5 -X antrea.io/antrea/pkg/version.GitTreeState=clean -X antrea.io/antrea/pkg/version.ReleaseStatus=unreleased' antrea.io/antrea/cmd/antrea-agent
#12 6.695 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X antrea.io/antrea/pkg/version.Version=v2.1.0-dev -X antrea.io/antrea/pkg/version.GitSHA=39ecb3b5 -X antrea.io/antrea/pkg/version.GitTreeState=clean -X antrea.io/antrea/pkg/version.ReleaseStatus=unreleased' antrea.io/antrea/cmd/antrea-cni
#12 DONE 7.8s

#13 [stage-1 4/5] COPY --from=antrea-build /antrea/bin/antrea-cni /usr/local/bin/
#13 CACHED

#14 [stage-1 2/5] COPY build/images/scripts/* /usr/local/bin/
#14 CACHED

#15 [stage-1 3/5] COPY --from=antrea-build /antrea/bin/antrea-agent /usr/local/bin/
#15 CACHED

#16 [stage-1 5/5] COPY --from=antrea-build /antrea/bin/antctl /usr/local/bin/
#16 CACHED

#17 exporting to image
#17 exporting layers done
#17 writing image sha256:ab9d1c87d6db51e3136b35ecbad4b3fbb8f0b47b0292bc6d6fb87dbbabaf52ed done
#17 naming to docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 0.0s done
#17 DONE 0.0s
docker tag antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 antrea/antrea-agent-ubuntu
+ [[ 0 -ne 0 ]]
+ echo '=== Loading the Antrea image to each Node ==='
=== Loading the Antrea image to each Node ===
+ antrea_images_tar=antrea-ubuntu.tar
+ DOCKER_IMG_VERSION=cloud-antrea-eks-conformance-net-policy-692
+ DOCKER_AGENT_IMG_NAME=antrea/antrea-agent-ubuntu
+ DOCKER_CONTROLLER_IMG_NAME=antrea/antrea-controller-ubuntu
+ docker save -o antrea-ubuntu.tar antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-692
+ awk '{print $7}'
+ kubectl get nodes -o wide --no-headers=true
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@35.91.248.87:~'
Warning: Permanently added '35.91.248.87' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@35.91.248.87 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-692 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-692 (sha256:6ac6c66575f461da0229a9b537cb739f89e2d7e563cf208ca6cadbd436398d4c)...done
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 (sha256:e339a455825c9602508f5d4ac5c55179c4d6bdea7f41801bb848ce4d2af2a616)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@35.94.244.249:~'
Warning: Permanently added '35.94.244.249' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n ec2-...@35.94.244.249 'sudo ctr -n=k8s.io images import ~/antrea-ubuntu.tar ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 docker.io/antrea/antrea-agent-ubuntu:latest --force ; sudo ctr -n=k8s.io images tag docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-692 docker.io/antrea/antrea-controller-ubuntu:latest --force'
unpacking docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-692 (sha256:6ac6c66575f461da0229a9b537cb739f89e2d7e563cf208ca6cadbd436398d4c)...done
unpacking docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-692 (sha256:e339a455825c9602508f5d4ac5c55179c4d6bdea7f41801bb848ce4d2af2a616)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ rm antrea-ubuntu.tar
+ echo '=== Configuring Antrea for cluster ==='
=== Configuring Antrea for cluster ===
+ kubectl apply -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml>
daemonset.apps/antrea-node-init created
+ kubectl apply -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml>
customresourcedefinition.apiextensions.k8s.io/antreaagentinfos.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/antreacontrollerinfos.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/clustergroups.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/clusternetworkpolicies.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/egresses.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalentities.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalippools.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/externalnodes.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/groups.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/ippools.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/networkpolicies.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/nodelatencymonitors.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/supportbundlecollections.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/tiers.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/traceflows.crd.antrea.io created
customresourcedefinition.apiextensions.k8s.io/trafficcontrols.crd.antrea.io created
serviceaccount/antrea-agent created
serviceaccount/antctl created
serviceaccount/antrea-controller created
secret/antrea-agent-service-account-token created
secret/antctl-service-account-token created
configmap/antrea-config created
clusterrole.rbac.authorization.k8s.io/antrea-agent created
clusterrole.rbac.authorization.k8s.io/antctl created
clusterrole.rbac.authorization.k8s.io/antrea-cluster-identity-reader created
clusterrole.rbac.authorization.k8s.io/antrea-controller created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-view created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-view created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-edit created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-view created
clusterrolebinding.rbac.authorization.k8s.io/antrea-agent created
clusterrolebinding.rbac.authorization.k8s.io/antctl created
clusterrolebinding.rbac.authorization.k8s.io/antrea-controller created
service/antrea created
daemonset.apps/antrea-agent created
deployment.apps/antrea-controller created
apiservice.apiregistration.k8s.io/v1beta2.controlplane.antrea.io created
apiservice.apiregistration.k8s.io/v1beta1.system.antrea.io created
apiservice.apiregistration.k8s.io/v1alpha1.stats.antrea.io created
mutatingwebhookconfiguration.admissionregistration.k8s.io/crdmutator.antrea.io created
validatingwebhookconfiguration.admissionregistration.k8s.io/crdvalidator.antrea.io created
+ kubectl rollout status --timeout=2m deployment.apps/antrea-controller -n kube-system
Waiting for deployment "antrea-controller" rollout to finish: 0 of 1 updated replicas are available...
deployment "antrea-controller" successfully rolled out
+ kubectl rollout status --timeout=2m daemonset/antrea-agent -n kube-system
Waiting for daemon set "antrea-agent" rollout to finish: 0 of 2 updated pods are available...
Waiting for daemon set "antrea-agent" rollout to finish: 1 of 2 updated pods are available...
daemon set "antrea-agent" successfully rolled out
+ echo '=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-692 ==='
=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-692 ===
+ run_conformance
+ echo '=== Running Antrea Conformance and Network Policy Tests ==='
=== Running Antrea Conformance and Network Policy Tests ===
+ skip_regex='\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort'
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-conformance --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-06-07T05:00:15Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-06-07T05:00:15Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-06-07T05:00:15Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Conformance\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Conformance\]' --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --image-pull-policy Always --sonobuoy-image antrea/sonobuoy:v0.56.16 --systemd-logs-image antrea/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-06-07T05:00:21Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-06-07T05:03:43Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-06-07T05:03:43Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-06-07T05:03:43Z" level=info msg="delete request issued" kind=clusterroles
+ <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh> --e2e-network-policy --e2e-skip NetworkPolicyLegacy --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-06-07T05:04:04Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-06-07T05:04:04Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-06-07T05:04:04Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Feature:NetworkPolicy\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Feature:NetworkPolicy\]' --e2e-skip NetworkPolicyLegacy --image-pull-policy Always --sonobuoy-image antrea/sonobuoy:v0.56.16 --systemd-logs-image antrea/systemd-logs:v0.4 --e2e-repo-config <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml>
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-06-07T05:04:10Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-06-07T05:38:33Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-06-07T05:38:33Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-06-07T05:38:33Z" level=info msg="delete request issued" kind=clusterroles
+ TEST_SCRIPT_RC=1
+ [[ 1 -eq 0 ]]
+ [[ 1 -eq 1 ]]
+ echo 'Failed test cases exist.'
Failed test cases exist.
+ echo '=== FAILURE !!! ==='
=== FAILURE !!! ===
+ echo '=== Cleanup Antrea Installation ==='
=== Cleanup Antrea Installation ===
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks-node-init.yml> --ignore-not-found=true
daemonset.apps "antrea-node-init" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks.yml> --ignore-not-found=true
customresourcedefinition.apiextensions.k8s.io "antreaagentinfos.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "antreacontrollerinfos.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "clustergroups.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "clusternetworkpolicies.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "egresses.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalentities.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalippools.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "externalnodes.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "groups.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "ippools.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "networkpolicies.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "nodelatencymonitors.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "supportbundlecollections.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "tiers.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "traceflows.crd.antrea.io" deleted
customresourcedefinition.apiextensions.k8s.io "trafficcontrols.crd.antrea.io" deleted
serviceaccount "antrea-agent" deleted
serviceaccount "antctl" deleted
serviceaccount "antrea-controller" deleted
configmap "antrea-config" deleted
clusterrole.rbac.authorization.k8s.io "antrea-agent" deleted
clusterrole.rbac.authorization.k8s.io "antctl" deleted
clusterrole.rbac.authorization.k8s.io "antrea-cluster-identity-reader" deleted
clusterrole.rbac.authorization.k8s.io "antrea-controller" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-policies-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-policies-view" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-traceflows-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-traceflows-view" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-clustergroups-edit" deleted
clusterrole.rbac.authorization.k8s.io "aggregate-antrea-clustergroups-view" deleted
clusterrolebinding.rbac.authorization.k8s.io "antrea-agent" deleted
clusterrolebinding.rbac.authorization.k8s.io "antctl" deleted
clusterrolebinding.rbac.authorization.k8s.io "antrea-controller" deleted
service "antrea" deleted
daemonset.apps "antrea-agent" deleted
deployment.apps "antrea-controller" deleted
apiservice.apiregistration.k8s.io "v1beta2.controlplane.antrea.io" deleted
apiservice.apiregistration.k8s.io "v1beta1.system.antrea.io" deleted
apiservice.apiregistration.k8s.io "v1alpha1.stats.antrea.io" deleted
mutatingwebhookconfiguration.admissionregistration.k8s.io "crdmutator.antrea.io" deleted
validatingwebhookconfiguration.admissionregistration.k8s.io "crdvalidator.antrea.io" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-crds.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke-node-init.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-ipsec.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-migrator.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus-rbac.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows-with-ovs.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea.yml> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/flow-aggregator.yml> --ignore-not-found=true
+ [[ false == true ]]
+ [[ false == true ]]
+ [[ false == false ]]
+ [[ 1 -ne 0 ]]
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts

antr...@gmail.com

unread,
Jun 9, 2024, 1:44:34 AM6/9/24
to projecta...@googlegroups.com
Reply all
Reply to author
Forward
0 new messages