Cloning into '/home/prow/go/src/github.com/google/licenseclassifier'... Docker in Docker enabled, initializing... ================================================================================ * Starting Docker: docker ...done. Waiting for docker to be ready, sleeping for 1 seconds. Cleaning up binfmt_misc ... ================================================================================ Done setting up docker in docker. Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] == Running ./runner.sh backward compatibility test runner === + [[ 12 -ne 0 ]] + case $1 in ++ cut -d = -f2 + gcloud auth activate-service-account --key-file=/etc/test-account/service-account.json Activated service account credentials for: [prow-account@tekton-releases.iam.gserviceaccount.com] + shift + [[ 11 -ne 0 ]] + case $1 in + shift + [[ -- == \-\- ]] + shift + break + /usr/local/bin/kind-e2e --k8s-version v1.28.x --nodes 3 --e2e-script ./test/e2e-tests.sh --e2e-env ./test/e2e-tests-kind-prow.env + K8S_VERSION=v1.28.x + REGISTRY_NAME=registry.local + REGISTRY_PORT=5000 + CLUSTER_SUFFIX=cluster.local + NODE_COUNT=1 + REGISTRY_AUTH=0 + ESTARGZ_SUPPORT=0 + E2E_SCRIPT=test/e2e-tests.sh + E2E_ENV= + [[ 8 -ne 0 ]] + parameter=--k8s-version + case "${parameter}" in + shift + K8S_VERSION=v1.28.x + shift + [[ 6 -ne 0 ]] + parameter=--nodes + case "${parameter}" in + shift + NODE_COUNT=3 + shift + [[ 4 -ne 0 ]] + parameter=--e2e-script + case "${parameter}" in + shift + E2E_SCRIPT=./test/e2e-tests.sh + shift + [[ 2 -ne 0 ]] + parameter=--e2e-env + case "${parameter}" in + shift + E2E_ENV=./test/e2e-tests-kind-prow.env + shift + [[ 0 -ne 0 ]] + [[ ./test/e2e-tests-kind-prow.env != '' ]] + [[ ! -f ./test/e2e-tests-kind-prow.env ]] + case ${K8S_VERSION} in + K8S_VERSION=1.28.9 + KIND_IMAGE_SHA=sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + KIND_IMAGE=kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0 + echo '--- Setup KinD Cluster' --- Setup KinD Cluster + cat ++ seq 1 1 3 + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + for i in $(seq 1 1 "${NODE_COUNT}") + cat + cat ++ containerd_config ++ [[ 0 = \1 ]] ++ cat + echo '--- kind.yaml' --- kind.yaml + cat kind.yaml apiVersion: kind.x-k8s.io/v1alpha4 kind: Cluster nodes: - role: control-plane image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" - role: worker image: "kindest/node:1.28.9@sha256:dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0" kubeadmConfigPatches: # This is needed in order to support projected volumes with service account tokens. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600268272383600 - | apiVersion: kubeadm.k8s.io/v1beta2 kind: ClusterConfiguration metadata: name: config apiServer: extraArgs: "service-account-issuer": "kubernetes.default.svc" "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" networking: dnsDomain: "cluster.local" # This is needed to avoid filling our disk. # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1603391142276400 - | kind: KubeletConfiguration metadata: name: config imageGCHighThresholdPercent: 90 containerdConfigPatches: - |- [plugins."io.containerd.grpc.v1.cri".containerd] # Support many layered images: https://kubernetes.slack.com/archives/CEKK1KTN2/p1602770111199000 disable_snapshot_annotations = true # Support a local registry [plugins."io.containerd.grpc.v1.cri".registry.mirrors."registry.local:5000"] endpoint = ["http://registry.local:5000"] + kind --version kind version 0.23.0 + docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES + kind create cluster --config kind.yaml Creating cluster "kind" ... â€ĸ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ ... ✓ Ensuring node image (kindest/node:1.28.9) đŸ–ŧ â€ĸ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ ... ✓ Preparing nodes đŸ“Ļ đŸ“Ļ đŸ“Ļ đŸ“Ļ â€ĸ Writing configuration 📜 ... ✓ Writing configuration 📜 â€ĸ Starting control-plane đŸ•šī¸ ... ✓ Starting control-plane đŸ•šī¸ â€ĸ Installing CNI 🔌 ... ✓ Installing CNI 🔌 â€ĸ Installing StorageClass 💾 ... ✓ Installing StorageClass 💾 â€ĸ Joining worker nodes 🚜 ... ✓ Joining worker nodes 🚜 Set kubectl context to "kind-kind" You can now use your cluster with: kubectl cluster-info --context kind-kind Have a nice day! 👋 + echo '--- Setup metallb' --- Setup metallb + kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.10/config/manifests/metallb-native.yaml namespace/metallb-system created customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created serviceaccount/controller created serviceaccount/speaker created role.rbac.authorization.k8s.io/controller created role.rbac.authorization.k8s.io/pod-lister created clusterrole.rbac.authorization.k8s.io/metallb-system:controller created clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created rolebinding.rbac.authorization.k8s.io/controller created rolebinding.rbac.authorization.k8s.io/pod-lister created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created configmap/metallb-excludel2 created secret/webhook-server-cert created service/webhook-service created deployment.apps/controller created daemonset.apps/speaker created validatingwebhookconfiguration.admissionregistration.k8s.io/metallb-webhook-configuration created ++ openssl rand -base64 128 + kubectl create secret generic -n metallb-system memberlist '--from-literal=secretkey=9FgJwa3dZQ9ixMPW07P1ISYhCwWDs2Tk/Vr106Xdk2HkVRn9idhdC2XtSMg5ppaH 3R4sKYWA2xyv6laeg8cFFZGy9Bda5mF8tntAwj1Pv6UF4MgBzhrQ1TU720wVFuoG BhjX3RsQR+I+3U2oQ+tp3LzWeDHA0asqmNX5xfWofW0=' secret/memberlist created ++ docker network inspect kind -f '{{(index .IPAM.Config 0).Subnet}}' ++ cut -d . -f1,2 + network=fc00:f853:ccd:e793::/64 + cat + kubectl apply -f - configmap/config created + echo '--- Setup container registry' --- Setup container registry + EXTRA_ARGS=() + [[ 0 == \1 ]] + docker run -d --restart=always -p 5000:5000 --name registry.local registry:2 Unable to find image 'registry:2' locally docker: Error response from daemon: toomanyrequests: You have reached your unauthenticated pull rate limit. https://www.docker.com/increase-rate-limit. See 'docker run --help'. + EXIT_VALUE=125 + set +o xtrace Cleaning up after docker in docker. ================================================================================ Cleaning up binfmt_misc ... ================================================================================ Done cleaning up after docker in docker.