This job view page is being replaced by Spyglass soon. Check out the new job view.
PRjustinsb: bash script: don't assume nodeup filename
ResultFAILURE
Tests 5 failed / 65 succeeded
Started2019-08-22 05:01
Elapsed2m32s
Revision
Buildergke-prow-ssd-pool-1a225945-m2ml
Refs master:fcb02d19
7448:83b0b0ff
podc592cbeb-c499-11e9-a597-1651c8b74826
infra-commit42d4af367
podc592cbeb-c499-11e9-a597-1651c8b74826
repok8s.io/kops
repo-commitbb106c89b0d6d9d1c38196655b81808ad2be5827
repos{u'k8s.io/kops': u'master:fcb02d1931245b02cbcdb38756d0e7d5be4e52a8,7448:83b0b0ff8b08015e489775929861f6bfe96ec447'}

Test Failures


//cmd/kops/go_default_test:shard_1_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_1_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 05:03:15.907891    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:15.908044    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:15.908123    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:15.908178    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:15.908230    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:15.950832    1503 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:15.951375    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.008475    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.008887    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.008964    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.009015    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.009886    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.097141    1503 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:16.097630    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.106646    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.106759    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.106803    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.106874    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.106922    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.174697    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.175000    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.175957    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.176015    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.176084    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.176114    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.176573    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.184390    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.184501    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.184546    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.184592    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.184627    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.243294    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.243419    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.243606    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.243645    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.243695    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:16.243723    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:16.244069    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.252207    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.252396    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.252448    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.260614    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.828220    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.914696    1503 executor.go:103] Tasks: 0 done / 90 total; 37 can run
I0822 05:03:16.916678    1503 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:16.916701    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:16.916723    1503 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:16.927036    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:16.930355    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:16.942768    1503 executor.go:103] Tasks: 37 done / 90 total; 25 can run
W0822 05:03:16.944233    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:16.944602    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 05:03:16.961179    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:16.971784    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:16.976045    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:16.977206    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:16.978825    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:16.979759    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:16.980407    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:16.981325    1503 vfs_castore.go:729] Issuing new certificate: "kops"
W0822 05:03:16.984750    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:16.989766    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:16.984927    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:16.990183    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 05:03:16.994109    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:17.001816    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:17.038975    1503 executor.go:103] Tasks: 62 done / 90 total; 24 can run
I0822 05:03:17.042958    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.043150    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.042752    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.050073    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.054659    1503 executor.go:103] Tasks: 86 done / 90 total; 3 can run
I0822 05:03:17.055423    1503 executor.go:103] Tasks: 89 done / 90 total; 1 can run
I0822 05:03:17.055677    1503 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 05:03:17.139599    1503 target.go:312] Terraform output is in /tmp/test124734729/out
I0822 05:03:17.146162    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:17.147902    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:17.148017    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:17.223330    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.344200    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.574628    1503 executor.go:103] Tasks: 0 done / 90 total; 37 can run
I0822 05:03:17.578235    1503 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:17.578258    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:17.578279    1503 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:17.589693    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:17.593932    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:17.595705    1503 executor.go:103] Tasks: 37 done / 90 total; 25 can run
W0822 05:03:17.604556    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:17.635617    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:17.635966    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 05:03:17.644942    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
W0822 05:03:17.670077    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:17.670270    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 05:03:17.670360    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 05:03:17.672327    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:17.681894    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:17.684571    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:17.686938    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:17.691230    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:17.692988    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:17.697407    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:17.699589    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:17.709175    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:17.712274    1503 executor.go:103] Tasks: 62 done / 90 total; 24 can run
I0822 05:03:17.713416    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.713590    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.720819    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.721096    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.726093    1503 executor.go:103] Tasks: 86 done / 90 total; 3 can run
I0822 05:03:17.729976    1503 executor.go:103] Tasks: 89 done / 90 total; 1 can run
I0822 05:03:17.733030    1503 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 05:03:17.765921    1503 target.go:312] Terraform output is in /tmp/test738194467/out
I0822 05:03:17.777006    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:17.777115    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:17.777150    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:17.817251    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.867299    1503 zones.go:91] ListHostedZonesPages {

}
W0822 05:03:18.054692    1503 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 05:03:18.167774    1503 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 05:03:18.169283    1503 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:18.169305    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:18.169330    1503 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:18.227920    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:18.239681    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:18.271451    1503 executor.go:103] Tasks: 41 done / 110 total; 32 can run
W0822 05:03:18.285295    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.288725    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.288888    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.305290    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.305996    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.306106    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
I0822 05:03:18.308795    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:18.315242    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:18.318475    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:18.325635    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:18.335833    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:18.414559    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:18.446598    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:18.456966    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:18.514727    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:18.550576    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:18.613479    1503 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 05:03:18.615243    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.615384    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.615662    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.615778    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.617073    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.617167    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.619128    1503 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 05:03:18.619771    1503 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 05:03:18.620010    1503 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 05:03:18.663976    1503 target.go:312] Terraform output is in /tmp/test685541965/out
I0822 05:03:18.665627    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:18.665728    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:18.665779    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:18.675825    1503 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:18.793214    1503 zones.go:91] ListHostedZonesPages {

}
W0822 05:03:18.921132    1503 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 05:03:18.930599    1503 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 05:03:18.934988    1503 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:18.935012    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:18.935043    1503 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:18.949502    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:18.950408    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:18.953624    1503 executor.go:103] Tasks: 41 done / 110 total; 32 can run
I0822 05:03:18.972327    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:18.983356    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
W0822 05:03:18.986088    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.989891    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.990086    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.991402    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.991579    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 05:03:18.991678    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
I0822 05:03:19.012367    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:19.013296    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:19.014143    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:19.021324    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:19.023934    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.026748    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:19.031071    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:19.035256    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:19.037423    1503 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 05:03:19.039769    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.041912    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.040299    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.040396    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.042159    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.042227    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.046168    1503 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 05:03:19.046865    1503 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 05:03:19.047200    1503 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 05:03:19.083110    1503 target.go:312] Terraform output is in /tmp/test734605319/out
I0822 05:03:19.085890    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:19.085987    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:19.086019    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:19.101589    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:19.154200    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:19.327596    1503 executor.go:103] Tasks: 0 done / 90 total; 39 can run
I0822 05:03:19.343316    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:19.346801    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:19.348984    1503 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:19.349810    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:19.349916    1503 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:19.351013    1503 executor.go:103] Tasks: 39 done / 90 total; 27 can run
W0822 05:03:19.355231    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:19.355429    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:19.355519    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 05:03:19.380279    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:19.388797    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:19.394610    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:19.395713    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:19.413777    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
W0822 05:03:19.416562    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:19.417097    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:19.417303    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 05:03:19.421621    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:19.445436    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:19.448298    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:19.454294    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:19.578921    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.587649    1503 executor.go:103] Tasks: 66 done / 90 total; 20 can run
I0822 05:03:19.589639    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.589758    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.590121    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.590196    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.592341    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.592416    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.595564    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.595710    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.599007    1503 executor.go:103] Tasks: 86 done / 90 total; 4 can run
I0822 05:03:19.599476    1503 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 05:03:19.718044    1503 target.go:312] Terraform output is in /tmp/test666226129/out
I0822 05:03:19.724149    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:19.724262    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:19.724314    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:19.748213    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:19.803400    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.076750    1503 executor.go:103] Tasks: 0 done / 80 total; 35 can run
W0822 05:03:20.081306    1503 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:20.081350    1503 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.additionalcidr.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:20.081460    1503 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.additionalcidr.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:20.089936    1503 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:20.089985    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:20.090026    1503 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:20.112122    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:20.118750    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:20.129603    1503 executor.go:103] Tasks: 35 done / 80 total; 26 can run
W0822 05:03:20.130202    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:20.130458    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:20.132047    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 05:03:20.132237    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 05:03:20.144536    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:20.158250    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:20.162478    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:20.166057    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:20.167635    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:20.170520    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:20.170657    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:20.171772    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:20.177803    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:20.269728    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:20.286767    1503 executor.go:103] Tasks: 61 done / 80 total; 17 can run
I0822 05:03:20.287594    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.287709    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.303101    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.303232    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.314247    1503 executor.go:103] Tasks: 78 done / 80 total; 2 can run
I0822 05:03:20.314984    1503 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 05:03:20.319159    1503 target.go:171] Cloudformation output is in /tmp/test103264299/out
--- FAIL: TestAdditionalCIDR (1.24s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersadditionalcidrexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_cidr/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesadditionalcidrexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_cidr/cloudformation.json.extracted.yaml
I0822 05:03:20.329966    1503 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.330101    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.330157    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.337872    1503 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.7.16
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.7.16

*********************************************************************************

I0822 05:03:20.588010    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.673829    1503 executor.go:103] Tasks: 0 done / 75 total; 34 can run
I0822 05:03:20.674333    1503 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com"
}
I0822 05:03:20.690158    1503 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:20.690351    1503 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:20.690485    1503 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com"
}
I0822 05:03:20.674624    1503 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:20.690797    1503 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/etcd/events",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/sharedvpc.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-events.sharedvpc.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "sharedvpc.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 05:03:20.691082    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 05:03:20.691146    1503 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:20.691299    1503 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/etcd/main",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/sharedvpc.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-main.sharedvpc.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "sharedvpc.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 05:03:20.691384    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 05:03:20.691429    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:20.691463    1503 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.691482    1503 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.691518    1503 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:20.691655    1503 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:20.676633    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:20.695565    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:20.705029    1503 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:20.708134    1503 executor.go:103] Tasks: 34 done / 75 total; 23 can run
W0822 05:03:20.708386    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
W0822 05:03:20.773120    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 05:03:20.708572    1503 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:20.708947    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:Name",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:20.727877    1503 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:20.734231    1503 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:20.740208    1503 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:20.746313    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:20.760800    1503 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:20.757828    1503 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:20.764573    1503 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
W0822 05:03:20.773972    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 05:03:20.774109    1503 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:20.774214    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    },{
      Name: "tag:kubernetes.io/kops/role",
      Values: ["public"]
    }]
}
W0822 05:03:20.776264    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 05:03:20.776332    1503 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:20.776523    1503 routetable.go:107] CreateRouteTable: {
  VpcId: "vpc-12345678"
}
I0822 05:03:20.776540    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:20.777027    1503 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "172.20.32.0/19",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.777100    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["nodes.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.sharedvpc.example.com"]
    }
  ]
}
I0822 05:03:20.777318    1503 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:20.777420    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["masters.sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.sharedvpc.example.com"]
    }
  ]
}
I0822 05:03:20.777571    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-1"]
    }]
}
I0822 05:03:20.777626    1503 tags.go:48] CreateTags {
  Resources: ["rtb-1"],
  Tags: [
    {
      Key: "Name",
      Value: "sharedvpc.example.com"
    },
    {
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },
    {
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },
    {
      Key: "kubernetes.io/kops/role",
      Value: "public"
    }
  ]
}
I0822 05:03:20.777696    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-1"]
    }]
}
I0822 05:03:20.777737    1503 tags.go:48] CreateTags {
  Resources: ["subnet-1"],
  Tags: [
    {
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },
    {
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },
    {
      Key: "SubnetType",
      Value: "Public"
    },
    {
      Key: "kubernetes.io/role/elb",
      Value: "1"
    },
    {
      Key: "Name",
      Value: "us-test-1a.sharedvpc.example.com"
    }
  ]
}
I0822 05:03:20.777802    1503 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for nodes",
  GroupName: "nodes.sharedvpc.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.776821    1503 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"autoscaling:DescribeAutoScalingGroups\",\n        \"autoscaling:DescribeAutoScalingInstances\",\n        \"autoscaling:DescribeLaunchConfigurations\",\n        \"autoscaling:DescribeTags\",\n        \"autoscaling:SetDesiredCapacity\",\n        \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n        \"autoscaling:UpdateAutoScalingGroup\",\n        \"ec2:DescribeLaunchTemplateVersions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"iam:ListServerCertificates\",\n        \"iam:GetServerCertificate\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:20.778009    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:20.778083    1503 tags.go:48] CreateTags {
  Resources: ["sg-1"],
  Tags: [{
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },{
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "nodes.sharedvpc.example.com"
    }]
}
I0822 05:03:20.778167    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 05:03:20.778224    1503 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for masters",
  GroupName: "masters.sharedvpc.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.778268    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.778304    1503 tags.go:48] CreateTags {
  Resources: ["sg-2"],
  Tags: [{
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },{
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "masters.sharedvpc.example.com"
    }]
}
I0822 05:03:20.778354    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 05:03:20.779792    1503 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:20.782382    1503 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:20.817671    1503 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:20.820283    1503 executor.go:103] Tasks: 57 done / 75 total; 16 can run
I0822 05:03:20.820470    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.821794    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 05:03:20.821112    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.822097    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.824418    1503 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 64,
        VolumeType: "gp2"
      }
    },{
      DeviceName: "/dev/sdc",
      VirtualName: "ephemeral0"
    }],
  IamInstanceProfile: "masters.sharedvpc.example.com",
  ImageId: "ami-12345678",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "m3.medium",
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "master-us-test-1a.masters.sharedvpc.example.com-20190822050320",
  SecurityGroups: ["sg-2"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. args: name, sha, url1, url2...
download-or-bust() {
  local -r file="$1"
  local -r hash="$2"
  shift 2

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          break
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          break
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat nodeup.sha1)
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.12.6
encryptionConfig: null
etcdClusters:
  events:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
  main:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
kubeAPIServer:
  address: 127.0.0.1
  admissionControl:
  - Initializers
  - NamespaceLifecycle
  - LimitRanger
  - ServiceAccount
  - PersistentVolumeLabel
  - DefaultStorageClass
  - DefaultTolerationSeconds
  - NodeRestriction
  - ResourceQuota
  allowPrivileged: true
  anonymousAuth: false
  apiServerCount: 1
  authorizationMode: AlwaysAllow
  cloudProvider: aws
  etcdServers:
  - http://127.0.0.1:4001
  etcdServersOverrides:
  - /events#http://127.0.0.1:4002
  image: gcr.io/google_containers/kube-apiserver:v1.7.12
  insecurePort: 8080
  kubeletPreferredAddressTypes:
  - InternalIP
  - Hostname
  - ExternalIP
  logLevel: 2
  requestheaderAllowedNames:
  - aggregator
  requestheaderExtraHeaderPrefixes:
  - X-Remote-Extra-
  requestheaderGroupHeaders:
  - X-Remote-Group
  requestheaderUsernameHeaders:
  - X-Remote-User
  securePort: 443
  serviceClusterIPRange: 100.64.0.0/13
  storageBackend: etcd2
kubeControllerManager:
  allocateNodeCIDRs: true
  attachDetachReconcileSyncPeriod: 1m0s
  cloudProvider: aws
  clusterCIDR: 100.96.0.0/11
  clusterName: sharedvpc.example.com
  configureCloudRoutes: true
  image: gcr.io/google_containers/kube-controller-manager:v1.7.12
  leaderElection:
    leaderElect: true
  logLevel: 2
  useServiceAccountCredentials: true
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.7.12
  logLevel: 2
kubeScheduler:
  image: gcr.io/google_containers/kube-scheduler:v1.7.12
  leaderElection:
    leaderElect: true
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true
masterKubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  registerSchedulable: false
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 46df13bed113e2a157103e1d718c2518f9e76250@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubelet
- 385229d4189e4f7978de42f237d6c443c0534edd@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: sharedvpc.example.com
ConfigBase: memfs://clusters.example.com/sharedvpc.example.com
InstanceGroupName: master-us-test-1a
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/sharedvpc.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 05:03:20.821588    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.825106    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.826241    1503 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 128,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "nodes.sharedvpc.example.com",
  ImageId: "ami-12345678",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.medium",
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "nodes.sharedvpc.example.com-20190822050320",
  SecurityGroups: ["sg-1"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. args: name, sha, url1, url2...
download-or-bust() {
  local -r file="$1"
  local -r hash="$2"
  shift 2

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          break
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          break
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat nodeup.sha1)
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.12.6
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.7.12
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 46df13bed113e2a157103e1d718c2518f9e76250@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubelet
- 385229d4189e4f7978de42f237d6c443c0534edd@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: sharedvpc.example.com
ConfigBase: memfs://clusters.example.com/sharedvpc.example.com
InstanceGroupName: nodes
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/sharedvpc.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 05:03:20.821992    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.826972    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:20.827152    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.827292    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.827436    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:20.827572    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.827714    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:20.827872    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:20.828016    1503 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 05:03:20.828158    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.828317    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.828449    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:20.828585    1503 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 05:03:20.828693    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
I0822 05:03:20.828767    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:20.828826    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:20.828913    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:20.828978    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
I0822 05:03:20.829035    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:20.829146    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 05:03:20.829200    1503 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:20.829258    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "association.subnet-id",
      Values: ["subnet-1"]
    }]
}
I0822 05:03:20.829347    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
I0822 05:03:20.829402    1503 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:20.829453    1503 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:20.829509    1503 routetable.go:149] CreateRoute: {
  DestinationCidrBlock: "0.0.0.0/0",
  GatewayId: "igw-1",
  RouteTableId: "rtb-1"
}
I0822 05:03:20.829562    1503 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-1",
  SubnetId: "subnet-1"
}
I0822 05:03:20.829667    1503 executor.go:103] Tasks: 73 done / 75 total; 2 can run
I0822 05:03:20.829965    1503 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "master-us-test-1a.masters.sharedvpc.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 05:03:20.830151    1503 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "nodes.sharedvpc.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 05:03:20.830260    1503 executor.go:103] Tasks: 75 done / 75 total; 0 can run
I0822 05:03:20.830304    1503 dns.go:155] Pre-creating DNS records
I0822 05:03:20.830333    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.830372    1503 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:20.830430    1503 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:20.833496    1503 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.7.16
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.7.16

*********************************************************************************

I0822 05:03:20.885709    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:21.070197    1503 executor.go:103] Tasks: 0 done / 75 total; 34 can run
I0822 05:03:21.070558    1503 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:21.070595    1503 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 05:03:21.070611    1503 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 05:03:21.070748    1503 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:21.071005    1503 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:21.071092    1503 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.072099    1503 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.sharedvpc.example.com"]
    }]
}
I0822 05:03:21.073783    1503 executor.go:103] Tasks: 34 done / 75 total; 23 can run
I0822 05:03:21.075926    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["masters.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.sharedvpc.example.com"]
    }
  ]
}
I0822 05:03:21.076064    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
W0822 05:03:21.077803    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 05:03:21.077971    1503 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:21.078600    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:Name",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.078729    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:Name",
      Values: ["us-test-1a.sharedvpc.example.com"]
    }]
}
I0822 05:03:21.079944    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["nodes.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.sharedvpc.example.com"]
    }
  ]
}
I0822 05:03:21.080072    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
W0822 05:03:21.083878    1503 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 05:03:21.084116    1503 executor.go:103] Tasks: 57 done / 75 total; 16 can run
I0822 05:03:21.084229    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.084379    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.084917    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.084484    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.086204    1503 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.084785    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.088504    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.088627    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:21.088723    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.088816    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:21.088944    1503 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 05:03:21.089018    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.089114    1503 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 05:03:21.089181    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:21.089270    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:21.089358    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.089444    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.089529    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.089630    1503 executor.go:103] Tasks: 73 done / 75 total; 2 can run
I0822 05:03:21.089774    1503 executor.go:103] Tasks: 75 done / 75 total; 0 can run
I0822 05:03:21.090008    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-12345678"]
    }]
}
I0822 05:03:21.090078    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-15000000"]
    }]
}
I0822 05:03:21.090114    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-12345678"]
    }]
}
I0822 05:03:21.090150    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-b2345678"]
    }]
}
I0822 05:03:21.090185    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["igw-1"]
    }]
}
I0822 05:03:21.090218    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-a2345678"]
    }]
}
I0822 05:03:21.090252    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-b2345678"]
    }]
}
I0822 05:03:21.090295    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-1"]
    }]
}
I0822 05:03:21.090332    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-12345678"]
    }]
}
I0822 05:03:21.090377    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:21.090415    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:21.090450    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sshkey-kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
    }]
}
I0822 05:03:21.090486    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-1"]
    }]
}
I0822 05:03:21.090525    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 05:03:21.090576    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 05:03:21.090614    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-b2345678"]
    }]
}
I0822 05:03:21.090877    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 05:03:21.090950    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 05:03:21.090991    1503 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 05:03:21.091746    1503 instances.go:27] MockEc2::DescribeInstances is stub-implemented
I0822 05:03:21.092882    1503 keypairs.go:81] DescribeKeyPairs: {

}
I0822 05:03:21.092963    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093015    1503 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093064    1503 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093112    1503 dhcpoptions.go:33] DescribeDhcpOptions: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093164    1503 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093202    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093237    1503 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093277    1503 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093321    1503 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 05:03:21.093355    1503 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
W0822 05:03:21.093409    1503 api.go:53] PageSize not implemented
W0822 05:03:21.093436    1503 api.go:54] PageSize not implemented
W0822 05:03:21.093464    1503 api.go:103] PageSize not implemented
I0822 05:03:21.093491    1503 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:21.093524    1503 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:21.093912    1503 iaminstanceprofile.go:157] ListInstanceProfiles: {

}
I0822 05:03:21.093978    1503 iamrole.go:86] ListRoles: {

}
I0822 05:03:21.094040    1503 internetgateways.go:97] DescribeInternetGateways: {

}
I0822 05:03:21.094085    1503 routetable.go:54] DescribeRouteTables: {

}
I0822 05:03:21.094119    1503 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 05:03:21.094464    1503 keypairs.go:139] DeleteKeyPair: {
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"
}
keypair:kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57	ok
I0822 05:03:21.095968    1503 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-1"
}
I0822 05:03:21.096030    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 05:03:21.096090    1503 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [
    {
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    },
    {
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    },
    {
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    },
    {
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }
  ]
}
W0822 05:03:21.096271    1503 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:21.096296    1503 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-2"
}
I0822 05:03:21.096334    1503 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-2"
}
I0822 05:03:21.096372    1503 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 05:03:21.096417    1503 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    },{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
W0822 05:03:21.096500    1503 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:21.096522    1503 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-1"
}
I0822 05:03:21.094568    1503 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:21.096609    1503 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com"
}
I0822 05:03:21.094640    1503 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:21.094922    1503 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "master-us-test-1a.masters.sharedvpc.example.com",
  ForceDelete: true
}
I0822 05:03:21.096683    1503 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:21.096883    1503 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:21.096939    1503 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:21.096981    1503 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com"
}
I0822 05:03:21.097009    1503 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:21.097041    1503 iamrole.go:133] DeleteRole: {
  RoleName: "masters.sharedvpc.example.com"
}
I0822 05:03:21.097070    1503 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:21.097096    1503 iamrole.go:133] DeleteRole: {
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 05:03:21.096820    1503 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "nodes.sharedvpc.example.com",
  ForceDelete: true
}
volume:vol-1	ok
security-group:sg-2	ok
volume:vol-2	ok
security-group:sg-1	ok
iam-instance-profile:masters.sharedvpc.example.com	ok
route53-record:Z1AFAKE1ZON3YO/etcd-us-test-1a.internal.sharedvpc.example.com.	ok
autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com	ok
iam-instance-profile:nodes.sharedvpc.example.com	ok
iam-role:masters.sharedvpc.example.com	ok
iam-role:nodes.sharedvpc.example.com	ok
autoscaling-group:nodes.sharedvpc.example.com	ok
I0822 05:03:21.097533    1503 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "nodes.sharedvpc.example.com-20190822050320"
}
I0822 05:03:21.097604    1503 subnets.go:217] DeleteSubnet: {
  SubnetId: "subnet-1"
}
subnet:subnet-1	ok
autoscaling-config:nodes.sharedvpc.example.com-20190822050320	ok
I0822 05:03:21.097913    1503 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "master-us-test-1a.masters.sharedvpc.example.com-20190822050320"
}
autoscaling-config:master-us-test-1a.masters.sharedvpc.example.com-20190822050320	ok
I0822 05:03:21.098101    1503 routetable.go:185] DeleteRouteTable: {
  RouteTableId: "rtb-1"
}
route-table:rtb-1	ok
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_3_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_3_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 05:03:22.743522    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:22.743634    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:22.743696    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:22.743742    1869 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:22.743795    1869 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:22.812393    1869 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:22.812976    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:22.843710    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:22.843820    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:22.843898    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:22.844067    1869 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:22.844114    1869 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:22.990358    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:22.990892    1869 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:22.991042    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:22.991881    1869 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:22.992013    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:22.992050    1869 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:22.992105    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:22.992134    1869 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:22.992529    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:23.099116    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:23.099176    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:23.099204    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:23.122721    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:23.645366    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:23.820896    1869 executor.go:103] Tasks: 0 done / 77 total; 35 can run
W0822 05:03:23.822631    1869 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:23.822662    1869 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:23.822704    1869 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:23.829167    1869 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:23.829209    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:23.829240    1869 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:23.836044    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:23.842075    1869 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:23.843765    1869 executor.go:103] Tasks: 35 done / 77 total; 24 can run
I0822 05:03:23.852115    1869 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
W0822 05:03:23.855418    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:23.855915    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:23.874805    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
W0822 05:03:23.877013    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:23.877291    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:23.885756    1869 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:23.887670    1869 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:23.893536    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:23.921012    1869 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:23.925887    1869 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:23.927598    1869 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:23.930617    1869 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:23.938165    1869 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:23.940737    1869 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:23.944091    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:23.945912    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:23.944476    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:23.949987    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:23.955334    1869 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:23.956391    1869 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:23.958451    1869 target.go:171] Cloudformation output is in /tmp/test802806557/out
--- FAIL: TestMinimalCloudformation (0.88s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersminimalexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/minimal-cloudformation/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesminimalexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/minimal-cloudformation/cloudformation.json.extracted.yaml
I0822 05:03:23.972666    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:23.973207    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:23.973433    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:24.115862    1869 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:24.174593    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:24.332614    1869 executor.go:103] Tasks: 0 done / 116 total; 42 can run
I0822 05:03:24.338965    1869 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:24.338999    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:24.339030    1869 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:24.353783    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:24.355544    1869 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:24.357071    1869 executor.go:103] Tasks: 42 done / 116 total; 35 can run
W0822 05:03:24.357320    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 05:03:24.384120    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 05:03:24.386021    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 05:03:24.367401    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 05:03:24.387258    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 05:03:24.389020    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
I0822 05:03:24.389351    1869 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:24.410276    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:24.392532    1869 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:24.445188    1869 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:24.452976    1869 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:24.472336    1869 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:24.479072    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:24.483538    1869 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:24.484183    1869 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:24.492514    1869 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:24.494369    1869 executor.go:103] Tasks: 77 done / 116 total; 31 can run
I0822 05:03:24.495472    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.497890    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.496108    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.497719    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.499984    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.500093    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.502082    1869 executor.go:103] Tasks: 108 done / 116 total; 6 can run
I0822 05:03:24.503129    1869 executor.go:103] Tasks: 114 done / 116 total; 2 can run
I0822 05:03:24.503452    1869 executor.go:103] Tasks: 116 done / 116 total; 0 can run
I0822 05:03:24.535727    1869 target.go:312] Terraform output is in /tmp/test797854039/out
I0822 05:03:24.537372    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:24.537549    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:24.537602    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:24.545030    1869 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:24.583650    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:24.670050    1869 executor.go:103] Tasks: 0 done / 80 total; 35 can run
I0822 05:03:24.683400    1869 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:24.683431    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:24.683457    1869 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:24.685422    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:24.696255    1869 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:24.697996    1869 executor.go:103] Tasks: 35 done / 80 total; 24 can run
I0822 05:03:24.711741    1869 vfs_castore.go:729] Issuing new certificate: "kubecfg"
W0822 05:03:24.714459    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 05:03:24.714667    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 05:03:24.714784    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 05:03:24.716499    1869 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:24.735274    1869 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:24.739549    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
W0822 05:03:24.749207    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 05:03:24.750817    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 05:03:24.750152    1869 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:24.757736    1869 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:24.761114    1869 vfs_castore.go:729] Issuing new certificate: "kubelet"
W0822 05:03:24.763159    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 05:03:24.773991    1869 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:24.776385    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:24.788678    1869 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:24.791747    1869 executor.go:103] Tasks: 59 done / 80 total; 16 can run
I0822 05:03:24.793485    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.793614    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.799762    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.801120    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:24.807944    1869 executor.go:103] Tasks: 75 done / 80 total; 2 can run
I0822 05:03:24.808331    1869 executor.go:103] Tasks: 77 done / 80 total; 3 can run
I0822 05:03:24.809233    1869 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 05:03:24.844433    1869 target.go:312] Terraform output is in /tmp/test862733217/out
I0822 05:03:24.845836    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:24.845916    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:24.845949    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:24.860680    1869 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:24.905273    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:25.141873    1869 executor.go:103] Tasks: 0 done / 80 total; 35 can run
I0822 05:03:25.143592    1869 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:25.143680    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.143724    1869 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
W0822 05:03:25.144358    1869 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:25.144418    1869 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:25.144465    1869 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:25.150213    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:25.152068    1869 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:25.154225    1869 executor.go:103] Tasks: 35 done / 80 total; 24 can run
W0822 05:03:25.182086    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 05:03:25.184135    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 05:03:25.182495    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:25.189258    1869 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:25.192798    1869 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:25.198826    1869 vfs_castore.go:729] Issuing new certificate: "kubelet"
W0822 05:03:25.205945    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 05:03:25.208143    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 05:03:25.226922    1869 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:25.228821    1869 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:25.228588    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:25.236065    1869 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:25.273405    1869 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:25.286601    1869 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:25.299928    1869 executor.go:103] Tasks: 59 done / 80 total; 16 can run
I0822 05:03:25.300338    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.302920    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.300591    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.307014    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.309745    1869 executor.go:103] Tasks: 75 done / 80 total; 2 can run
I0822 05:03:25.311207    1869 executor.go:103] Tasks: 77 done / 80 total; 3 can run
I0822 05:03:25.311574    1869 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 05:03:25.319202    1869 target.go:171] Cloudformation output is in /tmp/test084738171/out
--- FAIL: TestExternalLoadBalancer (0.79s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersexternallbexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/externallb/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesexternallbexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/externallb/cloudformation.json.extracted.yaml
I0822 05:03:25.331007    1869 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:25.331131    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:25.331176    1869 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:25.340216    1869 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:25.378226    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:25.538812    1869 executor.go:103] Tasks: 0 done / 100 total; 41 can run
I0822 05:03:25.539240    1869 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.542948    1869 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.543155    1869 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/etcd/events",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-events.private-shared-subnet.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "private-shared-subnet.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 05:03:25.543241    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 05:03:25.543312    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.543342    1869 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.543502    1869 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "KubernetesCluster",
          Value: "private-shared-subnet.example.com"
        },
        {
          Key: "k8s.io/etcd/main",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-main.private-shared-subnet.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 05:03:25.543574    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 05:03:25.543724    1869 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.543768    1869 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.544032    1869 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.544073    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:25.544119    1869 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.544137    1869 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.544481    1869 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:25.544568    1869 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:25.545464    1869 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.545635    1869 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.556653    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:25.557360    1869 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:25.560674    1869 executor.go:103] Tasks: 41 done / 100 total; 29 can run
W0822 05:03:25.560922    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
W0822 05:03:25.582098    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 05:03:25.561166    1869 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.582317    1869 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
W0822 05:03:25.582436    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
W0822 05:03:25.582602    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 05:03:25.582723    1869 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"autoscaling:DescribeAutoScalingGroups\",\n        \"autoscaling:DescribeAutoScalingInstances\",\n        \"autoscaling:DescribeLaunchConfigurations\",\n        \"autoscaling:DescribeTags\",\n        \"autoscaling:SetDesiredCapacity\",\n        \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n        \"autoscaling:UpdateAutoScalingGroup\",\n        \"ec2:DescribeLaunchTemplateVersions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"iam:ListServerCertificates\",\n        \"iam:GetServerCertificate\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.562953    1869 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:25.582910    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.583106    1869 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for api ELB",
  GroupName: "api-elb.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.583150    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.583185    1869 tags.go:48] CreateTags {
  Resources: ["sg-1"],
  Tags: [{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "api-elb.private-shared-subnet.example.com"
    }]
}
I0822 05:03:25.583235    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 05:03:25.583279    1869 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-abcdef"]
}
I0822 05:03:25.583384    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 05:03:25.583442    1869 tags.go:48] CreateTags {
  Resources: ["subnet-abcdef"],
  Tags: [{
      Key: "SubnetType",
      Value: "Utility"
    },{
      Key: "kubernetes.io/role/elb",
      Value: "1"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "shared"
    }]
}
I0822 05:03:25.583481    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["bastion.private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.583605    1869 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for bastion",
  GroupName: "bastion.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.583635    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:25.583659    1869 tags.go:48] CreateTags {
  Resources: ["sg-2"],
  Tags: [{
      Key: "Name",
      Value: "bastion.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 05:03:25.583697    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 05:03:25.583718    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["masters.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.583825    1869 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for masters",
  GroupName: "masters.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.574354    1869 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:25.574729    1869 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:25.579102    1869 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:25.579436    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:25.584862    1869 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.584874    1869 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:25.584927    1869 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-12345678"]
}
I0822 05:03:25.600245    1869 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:25.602976    1869 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.609097    1869 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.607812    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.612153    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["nodes.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.612294    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.612334    1869 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for bastion ELB",
  GroupName: "bastion-elb.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.612372    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-4"]
    }]
}
I0822 05:03:25.612395    1869 tags.go:48] CreateTags {
  Resources: ["sg-4"],
  Tags: [{
      Key: "Name",
      Value: "bastion-elb.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 05:03:25.612450    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
I0822 05:03:25.612477    1869 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for nodes",
  GroupName: "nodes.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.612498    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.612526    1869 tags.go:48] CreateTags {
  Resources: ["sg-5"],
  Tags: [{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "nodes.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    }]
}
I0822 05:03:25.612564    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 05:03:25.612580    1869 tags.go:48] CreateTags {
  Resources: ["sg-3"],
  Tags: [{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "masters.private-shared-subnet.example.com"
    }]
}
I0822 05:03:25.612644    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
I0822 05:03:25.612967    1869 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:25.614560    1869 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:25.623036    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 05:03:25.623886    1869 tags.go:48] CreateTags {
  Resources: ["subnet-12345678"],
  Tags: [{
      Key: "kubernetes.io/role/internal-elb",
      Value: "1"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "shared"
    },{
      Key: "SubnetType",
      Value: "Private"
    }]
}
I0822 05:03:25.632365    1869 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:25.633170    1869 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:25.634917    1869 executor.go:103] Tasks: 70 done / 100 total; 24 can run
I0822 05:03:25.635071    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.635944    1869 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:25.637083    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.637240    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 05:03:25.636157    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
W0822 05:03:25.636244    1869 api.go:53] PageSize not implemented
I0822 05:03:25.636355    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.637320    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.637642    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.637773    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.637908    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.639119    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.637380    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.637475    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.637565    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.636500    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.639258    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.640080    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.640162    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.640242    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 05:03:25.640312    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.640381    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.640449    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.640528    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.640613    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:25.640683    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.640749    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 05:03:25.640816    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:25.640907    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 05:03:25.640958    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    }]
}
I0822 05:03:25.640987    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 3,
      IpProtocol: "icmp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 4
    }]
}
I0822 05:03:25.641018    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    }]
}
I0822 05:03:25.641053    1869 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-3",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:25.641085    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      ToPort: 443,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 05:03:25.641115    1869 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:25.641145    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 05:03:25.641175    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-4",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
I0822 05:03:25.641203    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 05:03:25.641232    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 05:03:25.641259    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
I0822 05:03:25.641289    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 05:03:25.641319    1869 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:25.641346    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 05:03:25.641380    1869 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-4",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 05:03:25.641408    1869 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-4"
        }]
    }]
}
I0822 05:03:25.639331    1869 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 32,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "bastions.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.micro",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "bastion.private-shared-subnet.example.com-20190822050325",
  SecurityGroups: ["sg-2"]
}
W0822 05:03:25.639437    1869 api.go:53] PageSize not implemented
I0822 05:03:25.641483    1869 tags.go:74] AddTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"],
  Tags: [{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "api.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    }]
}
I0822 05:03:25.641551    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.641674    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 05:03:25.641699    1869 tags.go:74] AddTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"],
  Tags: [{
      Key: "Name",
      Value: "bastion.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 05:03:25.641731    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 05:03:25.641754    1869 healthcheck.go:31] ConfigureHealthCheck: {
  HealthCheck: {
    HealthyThreshold: 2,
    Interval: 10,
    Target: "TCP:22",
    Timeout: 5,
    UnhealthyThreshold: 2
  },
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 05:03:25.641807    1869 attributes.go:31] ModifyLoadBalancerAttributes: {
  LoadBalancerAttributes: {
    AccessLog: {
      Enabled: false
    },
    ConnectionDraining: {
      Enabled: false,
      Timeout: 300
    },
    ConnectionSettings: {
      IdleTimeout: 300
    },
    CrossZoneLoadBalancing: {
      Enabled: false
    }
  },
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 05:03:25.641867    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.641894    1869 healthcheck.go:31] ConfigureHealthCheck: {
  HealthCheck: {
    HealthyThreshold: 2,
    Interval: 10,
    Target: "SSL:443",
    Timeout: 5,
    UnhealthyThreshold: 2
  },
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 05:03:25.641921    1869 attributes.go:31] ModifyLoadBalancerAttributes: {
  LoadBalancerAttributes: {
    AccessLog: {
      Enabled: false
    },
    ConnectionDraining: {
      Enabled: false,
      Timeout: 300
    },
    ConnectionSettings: {
      IdleTimeout: 300
    },
    CrossZoneLoadBalancing: {
      Enabled: false
    }
  },
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 05:03:25.639982    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.642791    1869 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: false,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 128,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "nodes.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.medium",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "nodes.private-shared-subnet.example.com-20190822050325",
  SecurityGroups: ["sg-5"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. args: name, sha, url1, url2...
download-or-bust() {
  local -r file="$1"
  local -r hash="$2"
  shift 2

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          break
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          break
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat nodeup.sha1)
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.13.1
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.8.2
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 2f6ec469e61125a837ad447cab012600ef08f0b2@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubelet
- 20f145a084a7afc80569f5852cc1bcd377e0e562@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: private-shared-subnet.example.com
ConfigBase: memfs://clusters.example.com/private-shared-subnet.example.com
InstanceGroupName: nodes
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/private-shared-subnet.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 05:03:25.645951    1869 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: false,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 64,
        VolumeType: "gp2"
      }
    },{
      DeviceName: "/dev/sdc",
      VirtualName: "ephemeral0"
    }],
  IamInstanceProfile: "masters.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "m3.medium",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "master-us-test-1a.masters.private-shared-subnet.example.com-20190822050325",
  SecurityGroups: ["sg-3"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. args: name, sha, url1, url2...
download-or-bust() {
  local -r file="$1"
  local -r hash="$2"
  shift 2

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          break
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          break
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat nodeup.sha1)
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.13.1
encryptionConfig: null
etcdClusters:
  events:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
  main:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
kubeAPIServer:
  address: 127.0.0.1
  admissionControl:
  - Initializers
  - NamespaceLifecycle
  - LimitRanger
  - ServiceAccount
  - PersistentVolumeLabel
  - DefaultStorageClass
  - DefaultTolerationSeconds
  - NodeRestriction
  - ResourceQuota
  allowPrivileged: true
  anonymousAuth: false
  apiServerCount: 1
  authorizationMode: AlwaysAllow
  cloudProvider: aws
  etcdServers:
  - http://127.0.0.1:4001
  etcdServersOverrides:
  - /events#http://127.0.0.1:4002
  image: gcr.io/google_containers/kube-apiserver:v1.8.2
  insecurePort: 8080
  kubeletPreferredAddressTypes:
  - InternalIP
  - Hostname
  - ExternalIP
  logLevel: 2
  requestheaderAllowedNames:
  - aggregator
  requestheaderExtraHeaderPrefixes:
  - X-Remote-Extra-
  requestheaderGroupHeaders:
  - X-Remote-Group
  requestheaderUsernameHeaders:
  - X-Remote-User
  securePort: 443
  serviceClusterIPRange: 100.64.0.0/13
  storageBackend: etcd2
kubeControllerManager:
  allocateNodeCIDRs: true
  attachDetachReconcileSyncPeriod: 1m0s
  cloudProvider: aws
  clusterCIDR: 100.96.0.0/11
  clusterName: private-shared-subnet.example.com
  configureCloudRoutes: false
  image: gcr.io/google_containers/kube-controller-manager:v1.8.2
  leaderElection:
    leaderElect: true
  logLevel: 2
  useServiceAccountCredentials: true
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.8.2
  logLevel: 2
kubeScheduler:
  image: gcr.io/google_containers/kube-scheduler:v1.8.2
  leaderElection:
    leaderElect: true
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true
masterKubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  registerSchedulable: false
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 2f6ec469e61125a837ad447cab012600ef08f0b2@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubelet
- 20f145a084a7afc80569f5852cc1bcd377e0e562@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: private-shared-subnet.example.com
ConfigBase: memfs://clusters.example.com/private-shared-subnet.example.com
InstanceGroupName: master-us-test-1a
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/private-shared-subnet.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 05:03:25.646531    1869 executor.go:103] Tasks: 94 done / 100 total; 4 can run
I0822 05:03:25.646736    1869 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 05:03:25.647957    1869 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "nodes.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 05:03:25.646918    1869 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.648219    1869 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [{
        Action: "UPSERT",
        ResourceRecordSet: {
          AliasTarget: {
            DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com",
            EvaluateTargetHealth: false,
            HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB"
          },
          Name: "api.private-shared-subnet.example.com",
          Type: "A"
        }
      }]
  },
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.648321    1869 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 05:03:25.648385    1869 executor.go:103] Tasks: 98 done / 100 total; 2 can run
I0822 05:03:25.648472    1869 attach.go:32] AttachLoadBalancers: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 05:03:25.648582    1869 attach.go:32] AttachLoadBalancers: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.648649    1869 executor.go:103] Tasks: 100 done / 100 total; 0 can run
I0822 05:03:25.648681    1869 dns.go:155] Pre-creating DNS records
I0822 05:03:25.648715    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:25.648742    1869 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:25.648779    1869 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:25.653213    1869 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:25.692879    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:25.807205    1869 executor.go:103] Tasks: 0 done / 100 total; 41 can run
I0822 05:03:25.807721    1869 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.809835    1869 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.812010    1869 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:25.812482    1869 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 05:03:25.812516    1869 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.812536    1869 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 05:03:25.813742    1869 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.823541    1869 executor.go:103] Tasks: 41 done / 100 total; 29 can run
I0822 05:03:25.823695    1869 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-abcdef"]
}
I0822 05:03:25.832060    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.832255    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
I0822 05:03:25.832958    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["nodes.private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.833138    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 05:03:25.833642    1869 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-12345678"]
}
I0822 05:03:25.833773    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["masters.private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.833939    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
W0822 05:03:25.834093    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 05:03:25.836668    1869 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 05:03:25.837120    1869 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 05:03:25.836817    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.838096    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 05:03:25.838142    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion.private-shared-subnet.example.com"]
    }
  ]
}
I0822 05:03:25.838250    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 05:03:25.840332    1869 executor.go:103] Tasks: 70 done / 100 total; 24 can run
I0822 05:03:25.840433    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.840550    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.840614    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.840673    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
W0822 05:03:25.842162    1869 api.go:53] PageSize not implemented
I0822 05:03:25.842250    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q","api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.842352    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 05:03:25.842397    1869 attributes.go:52] DescribeLoadBalancerAttributes: {
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 05:03:25.842605    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.842746    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.844985    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.845211    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.846872    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.847913    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.848030    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848115    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.848208    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848285    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848374    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 05:03:25.848451    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848535    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848607    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.848677    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.848748    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:25.848814    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.848908    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.848975    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
W0822 05:03:25.847636    1869 api.go:53] PageSize not implemented
I0822 05:03:25.849062    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"]
}
I0822 05:03:25.849135    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.849171    1869 attributes.go:52] DescribeLoadBalancerAttributes: {
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 05:03:25.847706    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.849281    1869 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:25.849367    1869 executor.go:103] Tasks: 94 done / 100 total; 4 can run
I0822 05:03:25.849598    1869 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 05:03:25.849655    1869 dnsname.go:111] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com"
I0822 05:03:25.849688    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 05:03:25.849742    1869 executor.go:103] Tasks: 98 done / 100 total; 2 can run
I0822 05:03:25.849834    1869 executor.go:103] Tasks: 100 done / 100 total; 0 can run
I0822 05:03:25.850109    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-12345678"]
    }]
}
I0822 05:03:25.850173    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-15000000"]
    }]
}
I0822 05:03:25.850206    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-12345678"]
    }]
}
I0822 05:03:25.850239    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-b2345678"]
    }]
}
I0822 05:03:25.850269    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["igw-1"]
    }]
}
I0822 05:03:25.850300    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-a2345678"]
    }]
}
I0822 05:03:25.850329    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-b2345678"]
    }]
}
I0822 05:03:25.850356    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-12345678"]
    }]
}
I0822 05:03:25.850384    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 05:03:25.850418    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 05:03:25.850452    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-3"]
    }]
}
I0822 05:03:25.850484    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-4"]
    }]
}
I0822 05:03:25.850517    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-5"]
    }]
}
I0822 05:03:25.850560    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sshkey-kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
    }]
}
I0822 05:03:25.850616    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 05:03:25.850658    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 05:03:25.850691    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-b2345678"]
    }]
}
I0822 05:03:25.850721    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 05:03:25.850753    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 05:03:25.850786    1869 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 05:03:25.851669    1869 instances.go:27] MockEc2::DescribeInstances is stub-implemented
I0822 05:03:25.851739    1869 keypairs.go:81] DescribeKeyPairs: {

}
I0822 05:03:25.851784    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.851859    1869 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.851925    1869 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.851980    1869 dhcpoptions.go:33] DescribeDhcpOptions: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852049    1869 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852088    1869 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852136    1869 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852177    1869 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852221    1869 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 05:03:25.852253    1869 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
W0822 05:03:25.852289    1869 api.go:53] PageSize not implemented
I0822 05:03:25.852312    1869 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"]
}
W0822 05:03:25.852365    1869 api.go:54] PageSize not implemented
W0822 05:03:25.852395    1869 api.go:103] PageSize not implemented
I0822 05:03:25.852422    1869 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:25.852457    1869 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:25.852509    1869 iaminstanceprofile.go:157] ListInstanceProfiles: {

}
I0822 05:03:25.852566    1869 iamrole.go:86] ListRoles: {

}
I0822 05:03:25.852629    1869 internetgateways.go:97] DescribeInternetGateways: {

}
I0822 05:03:25.852677    1869 routetable.go:54] DescribeRouteTables: {

}
I0822 05:03:25.853119    1869 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.853710    1869 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com"
}
iam-instance-profile:nodes.private-shared-subnet.example.com	ok
I0822 05:03:25.853253    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 05:03:25.853925    1869 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-4"
        }]
    }]
}
W0822 05:03:25.854087    1869 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:25.854135    1869 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-2"
}
I0822 05:03:25.854209    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 05:03:25.854284    1869 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    },{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
W0822 05:03:25.854412    1869 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:25.853347    1869 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "nodes.private-shared-subnet.example.com",
  ForceDelete: true
}
I0822 05:03:25.853426    1869 api.go:149] DeleteLoadBalancer: {
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 05:03:25.853500    1869 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          AliasTarget: {
            DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com",
            EvaluateTargetHealth: false,
            HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB"
          },
          Name: "api.private-shared-subnet.example.com",
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 05:03:25.853870    1869 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.854690    1869 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.854755    1869 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.854463    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
I0822 05:03:25.854915    1869 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-2"
}
I0822 05:03:25.855022    1869 keypairs.go:139] DeleteKeyPair: {
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"
}
I0822 05:03:25.854529    1869 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  ForceDelete: true
}
I0822 05:03:25.855081    1869 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-1"
}
I0822 05:03:25.855136    1869 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-5"
}
I0822 05:03:25.855136    1869 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  ForceDelete: true
}
I0822 05:03:25.854598    1869 api.go:149] DeleteLoadBalancer: {
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 05:03:25.855165    1869 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [
    {
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    },
    {
      FromPort: 443,
      IpProtocol: "tcp",
      ToPort: 443,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    },
    {
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }
  ]
}
W0822 05:03:25.855329    1869 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:25.855350    1869 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-3"
}
I0822 05:03:25.854835    1869 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.855440    1869 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.855491    1869 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.855576    1869 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.855623    1869 iamrole.go:133] DeleteRole: {
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 05:03:25.855883    1869 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.855937    1869 iamrole.go:133] DeleteRole: {
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 05:03:25.855968    1869 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.855999    1869 iamrole.go:133] DeleteRole: {
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 05:03:25.856024    1869 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com"
}
security-group:sg-2	ok
autoscaling-group:nodes.private-shared-subnet.example.com	ok
load-balancer:api-private-shared-subnet-n2f8ak	ok
route53-record:Z1AFAKE1ZON3YO/api.internal.private-shared-subnet.example.com.	ok
iam-instance-profile:masters.private-shared-subnet.example.com	ok
volume:vol-2	ok
keypair:kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57	ok
autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com	ok
volume:vol-1	ok
security-group:sg-5	ok
autoscaling-group:bastion.private-shared-subnet.example.com	ok
load-balancer:bastion-private-shared-su-5ol32q	ok
security-group:sg-3	ok
iam-role:nodes.private-shared-subnet.example.com	ok
iam-role:bastions.private-shared-subnet.example.com	ok
iam-role:masters.private-shared-subnet.example.com	ok
iam-instance-profile:bastions.private-shared-subnet.example.com	ok
I0822 05:03:25.856433    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
I0822 05:03:25.856496    1869 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-4",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
W0822 05:03:25.856608    1869 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:25.856637    1869 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-4"
}
security-group:sg-4	ok
I0822 05:03:25.856695    1869 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "master-us-test-1a.masters.private-shared-subnet.example.com-20190822050325"
}
autoscaling-config:master-us-test-1a.masters.private-shared-subnet.example.com-20190822050325	ok
I0822 05:03:25.856775    1869 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "nodes.private-shared-subnet.example.com-20190822050325"
}
autoscaling-config:nodes.private-shared-subnet.example.com-20190822050325	ok
I0822 05:03:25.856837    1869 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 05:03:25.856904    1869 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 3,
      IpProtocol: "icmp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 4
    },{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
W0822 05:03:25.856989    1869 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 05:03:25.857011    1869 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-1"
}
security-group:sg-1	ok
I0822 05:03:25.857064    1869 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "bastion.private-shared-subnet.example.com-20190822050325"
}
autoscaling-config:bastion.private-shared-subnet.example.com-20190822050325	ok
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_4_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_4_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 05:03:20.514515    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.514584    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.514618    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.514648    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.514685    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.543359    1747 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:20.543391    1747 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 05:03:20.543401    1747 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 05:03:20.543758    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.592234    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.592363    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.592418    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.592470    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.592509    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.621245    1747 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:20.621348    1747 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 05:03:20.621378    1747 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 05:03:20.621782    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.633095    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.633213    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.633264    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.633311    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.633346    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.725919    1747 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:20.726017    1747 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 05:03:20.726037    1747 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 05:03:20.726304    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.733618    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.733725    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.733760    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.733796    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.733824    1747 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:20.753674    1747 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:20.753752    1747 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 05:03:20.753782    1747 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 05:03:20.754090    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.762560    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.762652    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.762684    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.785630    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:21.459172    1747 zones.go:91] ListHostedZonesPages {

}
W0822 05:03:21.544449    1747 task.go:108] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.544706    1747 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","kubernetesVersion":"1.4.12","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"},{"name":"events","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"}],"docker":{"ipMasq":false,"ipTables":false,"logLevel":"warn","storage":"overlay,aufs","version":"1.11.2"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.4.12","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"master":"127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.4.12","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s"},"kubeScheduler":{"master":"http://127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.4.12","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.4.12","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"apiServers":"https://api.internal.minimal.example.com","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"reconcileCIDR":true,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"apiServers":"http://127.0.0.1:8080","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"podCIDR":"10.123.45.0/28","reconcileCIDR":true,"registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z1AFAKE1ZON3YO","Private":null,"PrivateVPC":null}}}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.545889    1747 task.go:108] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-master-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-master-role","Lifecycle":"Sync","ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.546022    1747 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.546139    1747 task.go:108] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.546217    1747 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","kubernetesVersion":"1.4.12","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"},{"name":"events","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"}],"docker":{"ipMasq":false,"ipTables":false,"logLevel":"warn","storage":"overlay,aufs","version":"1.11.2"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.4.12","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"master":"127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.4.12","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s"},"kubeScheduler":{"master":"http://127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.4.12","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.4.12","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"apiServers":"https://api.internal.minimal.example.com","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"reconcileCIDR":true,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"apiServers":"http://127.0.0.1:8080","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"podCIDR":"10.123.45.0/28","reconcileCIDR":true,"registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z1AFAKE1ZON3YO","Private":null,"PrivateVPC":null}}}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.546471    1747 task.go:108] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-node-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-node-role","Lifecycle":"Sync","ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}}, lifecycle ExistsAndWarnIfChanges
W0822 05:03:21.546512    1747 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}}, lifecycle ExistsAndWarnIfChanges
I0822 05:03:21.593405    1747 executor.go:103] Tasks: 0 done / 77 total; 35 can run
W0822 05:03:21.598627    1747 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:21.613896    1747 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:21.614069    1747 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:21.600179    1747 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:21.614286    1747 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:21.614328    1747 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:21.621294    1747 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:21.626991    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
W0822 05:03:21.632117    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 05:03:21.632876    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
I0822 05:03:21.632958    1747 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 05:03:21.640048    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:21.666004    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:21.675456    1747 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:21.682045    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:21.699929    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:21.708744    1747 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:21.716538    1747 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:21.733303    1747 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:21.759611    1747 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:21.763012    1747 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:21.777884    1747 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:21.778864    1747 vfs_castore.go:729] Issuing new certificate: "kops"
W0822 05:03:21.783151    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 05:03:21.783230    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 05:03:21.783539    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 05:03:21.783634    1747 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
I0822 05:03:21.783687    1747 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:21.785789    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.785996    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.787590    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.788253    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.807199    1747 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:21.807719    1747 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:21.833282    1747 target.go:171] Cloudformation output is in /tmp/test821700058/out
--- FAIL: TestExistingIAMCloudformation (1.12s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersminimalexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/existing_iam_cloudformation/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesminimalexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/existing_iam_cloudformation/cloudformation.json.extracted.yaml
I0822 05:03:21.880696    1747 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:21.881206    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:21.881882    1747 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:21.911539    1747 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:21.966258    1747 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:22.308557    1747 executor.go:103] Tasks: 0 done / 101 total; 41 can run
I0822 05:03:22.309962    1747 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:22.309988    1747 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:22.310011    1747 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:22.320955    1747 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:22.325617    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:22.327541    1747 executor.go:103] Tasks: 41 done / 101 total; 30 can run
W0822 05:03:22.350048    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 05:03:22.350435    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 05:03:22.350598    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
I0822 05:03:22.351434    1747 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:22.359599    1747 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
W0822 05:03:22.380281    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
I0822 05:03:22.396749    1747 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
W0822 05:03:22.397836    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 05:03:22.465347    1747 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
I0822 05:03:22.405661    1747 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:22.472183    1747 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:22.481428    1747 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:22.487125    1747 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:22.489801    1747 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:22.491604    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:22.496020    1747 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:22.498317    1747 executor.go:103] Tasks: 71 done / 101 total; 24 can run
I0822 05:03:22.499150    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.500410    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.499965    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.500537    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.500140    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.501353    1747 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:22.503648    1747 executor.go:103] Tasks: 95 done / 101 total; 4 can run
I0822 05:03:22.504297    1747 executor.go:103] Tasks: 99 done / 101 total; 2 can run
I0822 05:03:22.504592    1747 executor.go:103] Tasks: 101 done / 101 total; 0 can run
I0822 05:03:22.554819    1747 target.go:312] Terraform output is in /tmp/test008115228/out
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_6_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_6_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 05:03:16.364876    1553 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.365027    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.365087    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.365137    1553 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.365184    1553 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
W0822 05:03:16.479765    1553 create_cluster.go:720] Running with masters in the same AZs; redundancy will be reduced
I0822 05:03:16.480410    1553 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:16.480487    1553 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 05:03:16.481005    1553 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.514381    1553 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.514474    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.514514    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.519606    1553 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.917106    1553 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.100142    1553 executor.go:103] Tasks: 0 done / 77 total; 35 can run
W0822 05:03:17.104182    1553 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:17.104216    1553 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.additionaluserdata.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:17.104261    1553 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.additionaluserdata.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:17.113776    1553 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:17.116415    1553 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:17.116884    1553 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:17.117964    1553 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:17.203455    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:17.230105    1553 executor.go:103] Tasks: 35 done / 77 total; 24 can run
I0822 05:03:17.235830    1553 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:17.244606    1553 vfs_castore.go:729] Issuing new certificate: "kubelet"
W0822 05:03:17.245834    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
W0822 05:03:17.247469    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
W0822 05:03:17.252277    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
W0822 05:03:17.253073    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
I0822 05:03:17.265696    1553 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:17.274205    1553 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:17.284078    1553 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:17.287699    1553 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:17.290609    1553 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:17.295224    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:17.297695    1553 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:17.310110    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:17.322419    1553 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:17.387436    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.387680    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.387997    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.388125    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.395878    1553 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:17.402705    1553 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:17.405237    1553 target.go:171] Cloudformation output is in /tmp/test716479518/out
--- FAIL: TestAdditionalUserData (0.96s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesadditionaluserdataexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_user-data/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersadditionaluserdataexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_user-data/cloudformation.json.extracted.yaml
I0822 05:03:17.471703    1553 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:17.471871    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:17.471932    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:17.525448    1553 dns.go:94] Private DNS: skipping DNS validation
I0822 05:03:17.766528    1553 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 05:03:17.785584    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:17.787046    1553 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:17.808413    1553 executor.go:103] Tasks: 41 done / 110 total; 29 can run
I0822 05:03:17.813263    1553 dnszone.go:242] Check for existing route53 zone to re-use with name "internal.example.com"
I0822 05:03:17.813302    1553 zones.go:40] GetHostedZone {
  Id: "/hostedzone/Z2AFAKE1ZON3NO"
}
I0822 05:03:17.813325    1553 dnszone.go:249] Existing zone "internal.example.com." found; will configure TF to reuse
I0822 05:03:17.813503    1553 dnszone.go:272] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding
I0822 05:03:17.868607    1553 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:17.877528    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:17.883011    1553 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:17.887625    1553 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:17.909226    1553 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:17.910711    1553 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:17.915743    1553 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:17.945110    1553 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:17.951162    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:17.954974    1553 executor.go:103] Tasks: 70 done / 110 total; 31 can run
W0822 05:03:17.955476    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 05:03:17.957826    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 05:03:17.956356    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
I0822 05:03:17.957004    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.957354    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.956818    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.958562    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 05:03:17.958086    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 05:03:17.958275    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 05:03:17.959048    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
I0822 05:03:17.958391    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.958479    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:17.979378    1553 executor.go:103] Tasks: 101 done / 110 total; 6 can run
W0822 05:03:17.979564    1553 api.go:53] PageSize not implemented
W0822 05:03:17.980260    1553 keypair.go:140] Task did not have an address: *awstasks.LoadBalancer {"Name":"api.privatedns1.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns1-example-c-lq96ht","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns1.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"utility-us-test-1a.privatedns1.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns1.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns1.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api-elb.privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api.privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}}
I0822 05:03:17.993002    1553 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:17.994802    1553 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 05:03:17.995323    1553 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 05:03:18.010023    1553 target.go:312] Terraform output is in /tmp/test062632192/out
I0822 05:03:18.011651    1553 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:18.011796    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:18.011881    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:18.049356    1553 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 05:03:18.216187    1553 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:18.791800    1553 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 05:03:18.796469    1553 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:18.796491    1553 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:18.796507    1553 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:18.819100    1553 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 05:03:18.823546    1553 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 05:03:18.837301    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:18.843563    1553 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 05:03:18.844801    1553 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 05:03:18.844827    1553 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 05:03:18.878413    1553 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:18.879773    1553 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 05:03:18.888208    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:18.888248    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:18.888263    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:18.888448    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:18.888462    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:18.888472    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:18.888582    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:18.888595    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:18.888604    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:18.890924    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:18.891080    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:18.891160    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 05:03:18.901665    1553 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:18.908362    1553 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:18.910983    1553 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:18.914530    1553 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:18.948078    1553 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:18.953157    1553 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:18.953680    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:18.959451    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:18.972135    1553 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:18.989194    1553 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.000166    1553 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 05:03:19.000972    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.001005    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.001220    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.001772    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.001228    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.001123    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.004144    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.005551    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.009505    1553 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 05:03:19.010351    1553 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 05:03:19.031238    1553 target.go:312] Terraform output is in /tmp/test730809906/out
I0822 05:03:19.032692    1553 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:19.032802    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:19.032890    1553 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:19.045236    1553 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 05:03:19.086315    1553 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:19.458059    1553 executor.go:103] Tasks: 0 done / 98 total; 48 can run
W0822 05:03:19.460214    1553 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:19.460232    1553 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:19.460258    1553 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:19.464180    1553 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:19.464202    1553 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:19.464220    1553 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:19.494107    1553 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 05:03:19.498174    1553 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 05:03:19.500252    1553 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:19.511117    1553 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 05:03:19.517493    1553 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 05:03:19.520683    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:19.525004    1553 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 05:03:19.527258    1553 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 05:03:19.528056    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:19.562026    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:19.533066    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:19.562270    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:19.562292    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:19.562419    1553 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:19.562444    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:19.562463    1553 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 05:03:19.541962    1553 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:19.549278    1553 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.558322    1553 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:19.561306    1553 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:19.576127    1553 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:19.584776    1553 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:19.606124    1553 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:19.638284    1553 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:19.655592    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:19.668422    1553 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:19.672391    1553 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 05:03:19.675322    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.675724    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.697222    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.676202    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.676304    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.697552    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.697615    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.704781    1553 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.708202    1553 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 05:03:19.713310    1553 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 05:03:19.725123    1553 target.go:171] Cloudformation output is in /tmp/test295779892/out
--- FAIL: TestMixedInstancesASG (1.75s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1cmastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSEC2LaunchTemplatenodesmixedinstancesexamplecom.Properties.LaunchTemplateData.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_7_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_7_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 05:03:16.759165    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.759224    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.759251    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.759273    1609 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.759292    1609 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.800585    1609 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:16.800622    1609 subnets.go:198] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a
I0822 05:03:16.800929    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.800978    1609 utils.go:198] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public"
I0822 05:03:16.851202    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.851363    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.851417    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.851468    1609 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.851505    1609 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 05:03:16.911138    1609 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 05:03:16.911264    1609 subnets.go:198] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a
I0822 05:03:16.911597    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:16.911666    1609 utils.go:198] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public"
I0822 05:03:16.923074    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:16.923212    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:16.923249    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:16.952556    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.668719    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:17.836644    1609 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 05:03:17.862193    1609 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:17.862238    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:17.862267    1609 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:17.881307    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:17.890262    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:17.894984    1609 executor.go:103] Tasks: 35 done / 77 total; 24 can run
I0822 05:03:17.928986    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
W0822 05:03:17.944252    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:17.944905    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:17.945090    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:17.951224    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:17.951475    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:17.951597    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:18.007069    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:18.025094    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:18.041964    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:18.062448    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:18.067425    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:18.070927    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:18.075127    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:18.082547    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:18.093558    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:18.095282    1609 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:18.096694    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.096940    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.097588    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.097686    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.099787    1609 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:18.100638    1609 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:18.114475    1609 target.go:312] Terraform output is in /tmp/test228782155/out
I0822 05:03:18.116602    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:18.116774    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:18.116873    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:18.130007    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:18.176958    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:18.758546    1609 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 05:03:18.758804    1609 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:18.758825    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:18.758876    1609 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:18.773624    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:18.774559    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:18.777756    1609 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 05:03:18.777953    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:18.778190    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:18.781972    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:18.782173    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:18.782268    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:18.806103    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
W0822 05:03:18.813536    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:18.846034    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:18.849083    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:18.871428    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:18.872987    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:18.875710    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:18.849436    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:18.878355    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:18.880321    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:18.886552    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:18.888158    1609 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:18.888775    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.888973    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.888774    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.889930    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:18.892069    1609 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:18.892356    1609 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:18.908519    1609 target.go:312] Terraform output is in /tmp/test597933749/out
I0822 05:03:18.934063    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:18.938474    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:18.938888    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:18.995937    1609 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:19.056150    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:19.159793    1609 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 05:03:19.175332    1609 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:19.175365    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:19.175394    1609 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:19.182373    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:19.187947    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:19.189475    1609 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 05:03:19.193399    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:19.193687    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:19.193787    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:19.195950    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:19.196104    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 05:03:19.196175    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 05:03:19.200253    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:19.226940    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:19.327398    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.335254    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:19.337836    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:19.341523    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:19.342631    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:19.346441    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:19.344148    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:19.353587    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:19.355915    1609 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 05:03:19.356309    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.357273    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.356635    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.358964    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.360704    1609 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 05:03:19.361100    1609 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 05:03:19.386693    1609 target.go:312] Terraform output is in /tmp/test710182575/out
I0822 05:03:19.388012    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:19.388146    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:19.388200    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:19.397017    1609 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 05:03:19.440975    1609 zones.go:91] ListHostedZonesPages {

}
W0822 05:03:19.586509    1609 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 05:03:19.597934    1609 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 05:03:19.602585    1609 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:19.602612    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:19.602880    1609 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:19.615387    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:19.616261    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:19.619397    1609 executor.go:103] Tasks: 41 done / 110 total; 32 can run
W0822 05:03:19.625142    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 05:03:19.625712    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 05:03:19.629959    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 05:03:19.671404    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 05:03:19.671751    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
I0822 05:03:19.676542    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
W0822 05:03:19.678073    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
I0822 05:03:19.679145    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:19.684737    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:19.691428    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:19.693825    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:19.699540    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:19.713068    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:19.718987    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:19.725800    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:19.726689    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:19.729428    1609 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 05:03:19.730352    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.732587    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.731497    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.732265    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.733258    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.733020    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:19.737523    1609 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 05:03:19.738508    1609 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 05:03:19.739025    1609 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 05:03:19.780943    1609 target.go:312] Terraform output is in /tmp/test475703993/out
I0822 05:03:19.782838    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:19.783012    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:19.783103    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:19.836247    1609 dns.go:94] Private DNS: skipping DNS validation
I0822 05:03:20.349690    1609 executor.go:103] Tasks: 0 done / 108 total; 40 can run
I0822 05:03:20.354102    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:20.356763    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:20.366181    1609 executor.go:103] Tasks: 40 done / 108 total; 28 can run
I0822 05:03:20.371965    1609 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 05:03:20.378376    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:20.382030    1609 dnszone.go:242] Check for existing route53 zone to re-use with name "private.example.com"
I0822 05:03:20.382114    1609 zones.go:40] GetHostedZone {
  Id: "/hostedzone/Z3AFAKE1ZOMORE"
}
I0822 05:03:20.382139    1609 dnszone.go:249] Existing zone "private.example.com." found; will configure TF to reuse
I0822 05:03:20.382148    1609 dnszone.go:263] VPC "vpc-12345678" already associated with zone "private.example.com."
I0822 05:03:20.382964    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:20.399518    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:20.413204    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:20.415837    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:20.417407    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:20.435055    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:20.438924    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:20.439604    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:20.449608    1609 executor.go:103] Tasks: 68 done / 108 total; 31 can run
W0822 05:03:20.449781    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
I0822 05:03:20.450418    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.450597    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 05:03:20.453756    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 05:03:20.454322    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 05:03:20.454584    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 05:03:20.453968    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 05:03:20.454866    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
I0822 05:03:20.453976    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.455057    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.454094    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.455184    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:20.456199    1609 executor.go:103] Tasks: 99 done / 108 total; 6 can run
W0822 05:03:20.456637    1609 api.go:53] PageSize not implemented
W0822 05:03:20.456929    1609 keypair.go:140] Task did not have an address: *awstasks.LoadBalancer {"Name":"api.privatedns2.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns2-example-c-6jft30","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns2.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":true,"Tags":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"utility-us-test-1a.privatedns2.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns2.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns2.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":true,"Tags":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api-elb.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}
I0822 05:03:20.466059    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:20.467836    1609 executor.go:103] Tasks: 105 done / 108 total; 3 can run
I0822 05:03:20.468331    1609 executor.go:103] Tasks: 108 done / 108 total; 0 can run
I0822 05:03:20.480225    1609 target.go:312] Terraform output is in /tmp/test348636499/out
I0822 05:03:20.481673    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:20.481814    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:20.481902    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:20.512813    1609 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 05:03:20.554301    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:20.752800    1609 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 05:03:20.758409    1609 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 05:03:20.758439    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:20.758460    1609 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 05:03:20.792953    1609 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 05:03:20.799220    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:20.802402    1609 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 05:03:20.804112    1609 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 05:03:20.818453    1609 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 05:03:20.877798    1609 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 05:03:20.879221    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:20.886323    1609 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 05:03:20.887337    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.926120    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.926344    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.892999    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.926500    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:20.926526    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:20.926697    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.926732    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:20.926757    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 05:03:20.907371    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
W0822 05:03:20.931040    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:20.931160    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:20.931198    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 05:03:20.909913    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:20.914148    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:20.914477    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:20.923335    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:20.935481    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:20.936112    1609 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 05:03:20.942423    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:20.968525    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:20.986738    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:20.999494    1609 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 05:03:21.001137    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.001316    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.002438    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.003130    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.003217    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.006634    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.008259    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.008406    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.014490    1609 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 05:03:21.015942    1609 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 05:03:21.054622    1609 target.go:312] Terraform output is in /tmp/test167876349/out
I0822 05:03:21.063935    1609 internetgateways.go:66] CreateInternetGateway: {

}
I0822 05:03:21.064908    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 05:03:21.064980    1609 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 05:03:21.128026    1609 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 05:03:21.196128    1609 zones.go:91] ListHostedZonesPages {

}
I0822 05:03:21.420474    1609 executor.go:103] Tasks: 0 done / 98 total; 48 can run
W0822 05:03:21.423640    1609 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 05:03:21.423672    1609 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 05:03:21.423710    1609 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 05:03:21.425596    1609 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 05:03:21.426874    1609 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 05:03:21.426963    1609 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 05:03:21.428707    1609 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 05:03:21.430206    1609 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 05:03:21.437380    1609 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 05:03:21.443277    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 05:03:21.460441    1609 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 05:03:21.464606    1609 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 05:03:21.481794    1609 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 05:03:21.486334    1609 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 05:03:21.496418    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:21.496647    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 05:03:21.515382    1609 vfs_castore.go:729] Issuing new certificate: "kops"
W0822 05:03:21.518086    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:21.518192    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:21.518220    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 05:03:21.518448    1609 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 05:03:21.518494    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 05:03:21.518519    1609 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 05:03:21.527966    1609 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 05:03:21.539602    1609 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 05:03:21.543668    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 05:03:21.560883    1609 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 05:03:21.564444    1609 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 05:03:21.589057    1609 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 05:03:21.614622    1609 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 05:03:21.616368    1609 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 05:03:21.623299    1609 vfs_castore.go:729] Issuing new certificate: "master"
I0822 05:03:21.681776    1609 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 05:03:21.682166    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.683182    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.683269    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.684509    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.684667    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.684724    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.687833    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.688949    1609 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 05:03:21.691327    1609 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 05:03:21.691765    1609 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 05:03:21.695026    1609 target.go:171] Cloudformation output is in /tmp/test024998455/out
--- FAIL: TestMixedInstancesSpotASG (1.27s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1cmastersmixedinstancesexamplecom.Properties.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSEC2LaunchTemplatenodesmixedinstancesexamplecom.Properties.LaunchTemplateData.UserData:
        ...
          }
          
        - # Retry a download until we get it. Takes a hash and a set of URLs.
        - #
        - # $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
        + # Retry a download until we get it. args: name, sha, url1, url2...
        - # $2+ are the URLs to download.
          download-or-bust() {
        +   local -r file="$1"
        +   local -r hash="$2"
        -   local -r hash="$1"
        +   shift 2
        -   shift 1
          
            urls=( $* )
            while true; do
              for url in "${urls[@]}"; do
        -       local file="${url##*/}"
        - 
                if [[ -e "${file}" ]]; then
                  echo "== File exists for ${url} =="
        ...
          
            local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
        -   local -r nodeup_filename="${nodeup_urls[0]##*/}"
            if [[ -n "${NODEUP_HASH:-}" ]]; then
              local -r nodeup_hash="${NODEUP_HASH}"
        ...
            # TODO: Remove?
              echo "Downloading sha1 (not found in env)"
        +     download-or-bust nodeup.sha1 "" "${nodeup_urls[@]/%/.sha1}"
        -     download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
        +     local -r nodeup_hash=$(cat nodeup.sha1)
        -     local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
            fi
          
            echo "Downloading nodeup (${nodeup_urls[@]})"
        +   download-or-bust nodeup "${nodeup_hash}" "${nodeup_urls[@]}"
        -   download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"
          
            chmod +x nodeup
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


Show 65 Passed Tests