Groups
Groups
Sign in
Groups
Groups
Project Antrea Developers
Conversations
About
Send feedback
Help
Build failed in Jenkins: cloud-antrea-eks-conformance-net-policy #680
0 views
Skip to first unread message
antr...@gmail.com
unread,
May 15, 2024, 1:40:11 AM
5/15/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to projecta...@googlegroups.com
See <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/680/display/redirect?page=changes
>
Changes:
[noreply] Set up Docker Buildx in workflows whenever building Antrea (#6320)
[noreply] Fix inaccuracy in Traceflow user guide (#6319)
[noreply] Fix trivy Github workflow (#6326)
[noreply] Bump
github.com/fatih/color
from 1.16.0 to 1.17.0 (#6328)
[noreply] Add E2E test for L7 NetworkPolicy Logging (#6275)
[noreply] Fix invalid flow in OVS pipeline document (#6322)
[noreply] Pre-installation testing framework (#6278)
------------------------------------------
[...truncated 47.21 KB...]
#9 CACHED
#10 [antrea-build 4/6] COPY . /antrea
#10 CACHED
#11 [antrea-build 5/6] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antctl-linux && mv bin/antctl-linux bin/antctl
#11 CACHED
#12 [antrea-build 6/6] RUN --mount=type=cache,target=/go/pkg/mod/ --mount=type=cache,target=/root/.cache/go-build/ make antrea-agent antrea-cni
#12 0.373 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X
antrea.io/antrea/pkg/version.Version=v2.1.0-dev
-X
antrea.io/antrea/pkg/version.GitSHA=3eb4d441
-X
antrea.io/antrea/pkg/version.GitTreeState=clean
-X
antrea.io/antrea/pkg/version.ReleaseStatus=unreleased
'
antrea.io/antrea/cmd/antrea-agent
#12 5.580 GOOS=linux go build -o /antrea/bin -trimpath -ldflags '-s -w -X
antrea.io/antrea/pkg/version.Version=v2.1.0-dev
-X
antrea.io/antrea/pkg/version.GitSHA=3eb4d441
-X
antrea.io/antrea/pkg/version.GitTreeState=clean
-X
antrea.io/antrea/pkg/version.ReleaseStatus=unreleased
'
antrea.io/antrea/cmd/antrea-cni
#12 DONE 6.6s
#13 [stage-1 2/5] COPY build/images/scripts/* /usr/local/bin/
#13 CACHED
#14 [stage-1 3/5] COPY --from=antrea-build /antrea/bin/antrea-agent /usr/local/bin/
#14 CACHED
#15 [stage-1 4/5] COPY --from=antrea-build /antrea/bin/antrea-cni /usr/local/bin/
#15 CACHED
#16 [stage-1 5/5] COPY --from=antrea-build /antrea/bin/antctl /usr/local/bin/
#16 CACHED
#17 exporting to image
#17 exporting layers done
#17 writing image sha256:f7d63e5b98db1f4f1ebd8caacd4425c396144e29665816157c4e067a728f8246 done
#17 naming to
docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680
0.0s done
#17 DONE 0.0s
docker tag antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680 antrea/antrea-agent-ubuntu
+ [[ 0 -ne 0 ]]
+ echo '=== Loading the Antrea image to each Node ==='
=== Loading the Antrea image to each Node ===
+ antrea_images_tar=antrea-ubuntu.tar
+ DOCKER_IMG_VERSION=cloud-antrea-eks-conformance-net-policy-680
+ DOCKER_AGENT_IMG_NAME=antrea/antrea-agent-ubuntu
+ DOCKER_CONTROLLER_IMG_NAME=antrea/antrea-controller-ubuntu
+ docker save -o antrea-ubuntu.tar antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680 antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-680
+ awk '{print $7}'
+ read IP
+ kubectl get nodes -o wide --no-headers=true
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@54.244.39.177:~'
Warning: Permanently added '54.244.39.177' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n
ec2-...@54.244.39.177
'sudo ctr -n=
k8s.io
images import ~/antrea-ubuntu.tar ; sudo ctr -n=
k8s.io
images tag
docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680
docker.io/antrea/antrea-agent-ubuntu:latest
--force ; sudo ctr -n=
k8s.io
images tag
docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-680
docker.io/antrea/antrea-controller-ubuntu:latest
--force'
unpacking
docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680
(sha256:f85a26882301588c82b71c2a3db9696a4244d264ec823401b955a03e33aaba24)...done
unpacking
docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-680
(sha256:eba627c8d390cf7d69e5522df7216a9eb888bdd9609f4d3f55e88a0f4d695c9f)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ scp -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa antrea-ubuntu.tar 'ec2-...@35.83.252.253:~'
Warning: Permanently added '35.83.252.253' (ECDSA) to the list of known hosts.
+ ssh -o StrictHostKeyChecking=no -i /home/ubuntu/.ssh/id_rsa -n
ec2-...@35.83.252.253
'sudo ctr -n=
k8s.io
images import ~/antrea-ubuntu.tar ; sudo ctr -n=
k8s.io
images tag
docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680
docker.io/antrea/antrea-agent-ubuntu:latest
--force ; sudo ctr -n=
k8s.io
images tag
docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-680
docker.io/antrea/antrea-controller-ubuntu:latest
--force'
unpacking
docker.io/antrea/antrea-agent-ubuntu:cloud-antrea-eks-conformance-net-policy-680
(sha256:f85a26882301588c82b71c2a3db9696a4244d264ec823401b955a03e33aaba24)...done
unpacking
docker.io/antrea/antrea-controller-ubuntu:cloud-antrea-eks-conformance-net-policy-680
(sha256:eba627c8d390cf7d69e5522df7216a9eb888bdd9609f4d3f55e88a0f4d695c9f)...done
docker.io/antrea/antrea-agent-ubuntu:latest
docker.io/antrea/antrea-controller-ubuntu:latest
+ read IP
+ rm antrea-ubuntu.tar
+ echo '=== Configuring Antrea for cluster ==='
=== Configuring Antrea for cluster ===
+ kubectl apply -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml
>
daemonset.apps/antrea-node-init created
+ kubectl apply -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml
>
customresourcedefinition.apiextensions.k8s.io/antreaagentinfos.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/antreacontrollerinfos.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/clustergroups.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/clusternetworkpolicies.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/egresses.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/externalentities.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/externalippools.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/externalnodes.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/groups.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/ippools.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/networkpolicies.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/supportbundlecollections.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/tiers.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/traceflows.crd.antrea.io
created
customresourcedefinition.apiextensions.k8s.io/trafficcontrols.crd.antrea.io
created
serviceaccount/antrea-agent created
serviceaccount/antctl created
serviceaccount/antrea-controller created
secret/antrea-agent-service-account-token created
secret/antctl-service-account-token created
configmap/antrea-config created
clusterrole.rbac.authorization.k8s.io/antrea-agent
created
clusterrole.rbac.authorization.k8s.io/antctl
created
clusterrole.rbac.authorization.k8s.io/antrea-cluster-identity-reader
created
clusterrole.rbac.authorization.k8s.io/antrea-controller
created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-edit
created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-policies-view
created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-edit
created
clusterrole.rbac.authorization.k8s.io/aggregate-traceflows-view
created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-edit
created
clusterrole.rbac.authorization.k8s.io/aggregate-antrea-clustergroups-view
created
clusterrolebinding.rbac.authorization.k8s.io/antrea-agent
created
clusterrolebinding.rbac.authorization.k8s.io/antctl
created
clusterrolebinding.rbac.authorization.k8s.io/antrea-controller
created
service/antrea created
daemonset.apps/antrea-agent created
deployment.apps/antrea-controller created
apiservice.apiregistration.k8s.io/v1beta2.controlplane.antrea.io
created
apiservice.apiregistration.k8s.io/v1beta1.system.antrea.io
created
apiservice.apiregistration.k8s.io/v1alpha1.stats.antrea.io
created
mutatingwebhookconfiguration.admissionregistration.k8s.io/crdmutator.antrea.io
created
validatingwebhookconfiguration.admissionregistration.k8s.io/crdvalidator.antrea.io
created
+ kubectl rollout status --timeout=2m deployment.apps/antrea-controller -n kube-system
Waiting for deployment "antrea-controller" rollout to finish: 0 of 1 updated replicas are available...
deployment "antrea-controller" successfully rolled out
+ kubectl rollout status --timeout=2m daemonset/antrea-agent -n kube-system
Waiting for daemon set "antrea-agent" rollout to finish: 0 of 2 updated pods are available...
Waiting for daemon set "antrea-agent" rollout to finish: 1 of 2 updated pods are available...
daemon set "antrea-agent" successfully rolled out
+ echo '=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-680 ==='
=== Antrea has been deployed for EKS cluster cloud-antrea-eks-conformance-net-policy-680 ===
+ run_conformance
+ echo '=== Running Antrea Conformance and Network Policy Tests ==='
=== Running Antrea Conformance and Network Policy Tests ===
+ skip_regex='\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort'
+ <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh
> --e2e-conformance --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-05-15T04:59:08Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-05-15T04:59:08Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-05-15T04:59:08Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Conformance\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Conformance\]' --e2e-skip '\[Slow\]|\[Serial\]|\[Disruptive\]|\[Flaky\]|\[Feature:.+\]|\[sig-cli\]|\[sig-storage\]|\[sig-auth\]|\[sig-api-machinery\]|\[sig-apps\]|\[sig-node\]|\[sig-instrumentation\]|NodePort' --image-pull-policy Always --sonobuoy-image antrea/sonobuoy:v0.56.16 --systemd-logs-image antrea/systemd-logs:v0.4 --e2e-repo-config <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml
>
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-05-15T04:59:14Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-05-15T05:02:36Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-05-15T05:02:36Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-05-15T05:02:36Z" level=info msg="delete request issued" kind=clusterroles
+ <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../ci/run-k8s-e2e-tests.sh
> --e2e-network-policy --e2e-skip NetworkPolicyLegacy --kubernetes-version auto --log-mode detail
Using this sonobuoy: /tmp/antrea/sonobuoy
time="2024-05-15T05:03:12Z" level=info msg="already deleted" kind=namespace namespace=sonobuoy
time="2024-05-15T05:03:12Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-05-15T05:03:12Z" level=info msg="delete request issued" kind=clusterroles
+ [[ \[Feature:NetworkPolicy\] == '' ]]
+ /tmp/antrea/sonobuoy run --wait --e2e-parallel=true --kubernetes-version auto --e2e-focus '\[Feature:NetworkPolicy\]' --e2e-skip NetworkPolicyLegacy --image-pull-policy Always --sonobuoy-image antrea/sonobuoy:v0.56.16 --systemd-logs-image antrea/systemd-logs:v0.4 --e2e-repo-config <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/conformance-image-config.yaml
>
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy namespace= resource=namespaces
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-serviceaccount namespace=sonobuoy resource=serviceaccounts
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterrolebindings
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-serviceaccount-sonobuoy namespace= resource=clusterroles
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-config-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-plugins-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=plugin-e2e-cm namespace=sonobuoy resource=configmaps
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy namespace=sonobuoy resource=pods
time="2024-05-15T05:03:18Z" level=info msg="create request issued" name=sonobuoy-aggregator namespace=sonobuoy resource=services
+ set +x
Deleting sonobuoy resources
time="2024-05-15T05:39:00Z" level=info msg="delete request issued" kind=namespace namespace=sonobuoy
time="2024-05-15T05:39:00Z" level=info msg="delete request issued" kind=clusterrolebindings
time="2024-05-15T05:39:00Z" level=info msg="delete request issued" kind=clusterroles
+ TEST_SCRIPT_RC=1
+ [[ 1 -eq 0 ]]
+ [[ 1 -eq 1 ]]
+ echo 'Failed test cases exist.'
Failed test cases exist.
+ echo '=== FAILURE !!! ==='
=== FAILURE !!! ===
+ echo '=== Cleanup Antrea Installation ==='
=== Cleanup Antrea Installation ===
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks-node-init.yml
> --ignore-not-found=true
daemonset.apps "antrea-node-init" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-aks.yml
> --ignore-not-found=true
customresourcedefinition.apiextensions.k8s.io
"
antreaagentinfos.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
antreacontrollerinfos.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
clustergroups.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
clusternetworkpolicies.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
egresses.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
externalentities.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
externalippools.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
externalnodes.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
groups.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
ippools.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
networkpolicies.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
supportbundlecollections.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
tiers.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
traceflows.crd.antrea.io
" deleted
customresourcedefinition.apiextensions.k8s.io
"
trafficcontrols.crd.antrea.io
" deleted
serviceaccount "antrea-agent" deleted
serviceaccount "antctl" deleted
serviceaccount "antrea-controller" deleted
secret "antctl-service-account-token" deleted
configmap "antrea-config" deleted
clusterrole.rbac.authorization.k8s.io
"antrea-agent" deleted
clusterrole.rbac.authorization.k8s.io
"antctl" deleted
clusterrole.rbac.authorization.k8s.io
"antrea-cluster-identity-reader" deleted
clusterrole.rbac.authorization.k8s.io
"antrea-controller" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-antrea-policies-edit" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-antrea-policies-view" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-traceflows-edit" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-traceflows-view" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-antrea-clustergroups-edit" deleted
clusterrole.rbac.authorization.k8s.io
"aggregate-antrea-clustergroups-view" deleted
clusterrolebinding.rbac.authorization.k8s.io
"antrea-agent" deleted
clusterrolebinding.rbac.authorization.k8s.io
"antctl" deleted
clusterrolebinding.rbac.authorization.k8s.io
"antrea-controller" deleted
service "antrea" deleted
daemonset.apps "antrea-agent" deleted
deployment.apps "antrea-controller" deleted
apiservice.apiregistration.k8s.io
"
v1beta2.controlplane.antrea.io
" deleted
apiservice.apiregistration.k8s.io
"
v1beta1.system.antrea.io
" deleted
apiservice.apiregistration.k8s.io
"
v1alpha1.stats.antrea.io
" deleted
mutatingwebhookconfiguration.admissionregistration.k8s.io
"
crdmutator.antrea.io
" deleted
validatingwebhookconfiguration.admissionregistration.k8s.io
"
crdvalidator.antrea.io
" deleted
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-crds.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks-node-init.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-eks.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke-node-init.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-gke.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-ipsec.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-migrator.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus-rbac.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-prometheus.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows-with-ovs.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea-windows.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/antrea.yml
> --ignore-not-found=true
+ for antrea_yml in ${GIT_CHECKOUT_DIR}/build/yamls/*.yml
+ kubectl delete -f <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/ws/ci/../build/yamls/flow-aggregator.yml
> --ignore-not-found=true
+ [[ false == true ]]
+ [[ false == true ]]
+ [[ false == false ]]
+ [[ 1 -ne 0 ]]
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
antr...@gmail.com
unread,
May 17, 2024, 1:43:37 AM
5/17/24
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to projecta...@googlegroups.com
See <
https://jenkins.antrea-ci.rocks/job/cloud-antrea-eks-conformance-net-policy/681/display/redirect?page=changes
>
Reply all
Reply to author
Forward
0 new messages