{"msg":"Test Suite starting","completed":0,"skipped":0,"failed":0} Running Suite: Kubernetes e2e suite - /usr/local/bin ==================================================== Random Seed: 1683246892 - will randomize all specs Will run 67 of 7066 specs Running in parallel across 10 processes ------------------------------ [SynchronizedBeforeSuite] PASSED [0.050 seconds] [SynchronizedBeforeSuite] test/e2e/e2e.go:76 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite starting","completed":0,"skipped":0,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.018 seconds] [sig-node] SSH [BeforeEach] test/e2e/node/ssh.go:38 should SSH to all nodes and run commands test/e2e/node/ssh.go:47 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] SSH test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:34:53.416 May 5 00:34:53.416: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename ssh 05/05/23 00:34:53.417 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:34:53.423 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:34:53.426 [BeforeEach] [sig-node] SSH test/e2e/node/ssh.go:38 May 5 00:34:53.428: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] SSH test/e2e/framework/framework.go:187 May 5 00:34:53.429: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "ssh-809" for this suite. 05/05/23 00:34:53.432 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/ssh.go:44 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.035 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly] test/e2e/common/node/security_context.go:397 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]","completed":1,"skipped":51,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [5.058 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance] test/e2e/common/node/runtime.go:375 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]","completed":1,"skipped":105,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.053 seconds] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] test/e2e/common/node/downwardapi.go:110 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]","completed":1,"skipped":53,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.049 seconds] [sig-node] Security Context should support seccomp runtime/default [LinuxOnly] test/e2e/node/security_context.go:178 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp runtime/default [LinuxOnly]","completed":2,"skipped":228,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.050 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly] test/e2e/common/node/security_context.go:387 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]","completed":2,"skipped":134,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.031 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:34 can disable an AppArmor profile, using unconfined test/e2e/node/apparmor.go:49 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:35:02.624 May 5 00:35:02.624: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 05/05/23 00:35:02.626 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:35:02.637 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:35:02.641 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:34 May 5 00:35:02.645: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:38 [AfterEach] [sig-node] AppArmor test/e2e/framework/framework.go:187 May 5 00:35:02.646: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "apparmor-8123" for this suite. 05/05/23 00:35:02.65 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:311 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [11.348 seconds] [sig-node] [Feature:Example] Secret should create a pod that reads a secret test/e2e/node/examples.go:116 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Secret should create a pod that reads a secret","completed":1,"skipped":48,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.024 seconds] [sig-node] NodeProblemDetector [BeforeEach] test/e2e/node/node_problem_detector.go:54 should run without error test/e2e/node/node_problem_detector.go:62 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] NodeProblemDetector test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:35:04.759 May 5 00:35:04.759: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename node-problem-detector 05/05/23 00:35:04.761 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:35:04.769 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:35:04.773 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/node/node_problem_detector.go:54 May 5 00:35:04.776: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] NodeProblemDetector test/e2e/framework/framework.go:187 May 5 00:35:04.776: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-problem-detector-3917" for this suite. 05/05/23 00:35:04.779 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/node_problem_detector.go:55 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.025 seconds] [sig-node] crictl [BeforeEach] test/e2e/node/crictl.go:35 should be able to run crictl on the node test/e2e/node/crictl.go:40 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] crictl test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:35:04.812 May 5 00:35:04.812: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename crictl 05/05/23 00:35:04.814 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:35:04.822 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:35:04.826 [BeforeEach] [sig-node] crictl test/e2e/node/crictl.go:35 May 5 00:35:04.829: INFO: Only supported for providers [gce gke] (not local) [AfterEach] [sig-node] crictl test/e2e/framework/framework.go:187 May 5 00:35:04.830: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "crictl-167" for this suite. 05/05/23 00:35:04.833 << End Captured GinkgoWriter Output Only supported for providers [gce gke] (not local) In [BeforeEach] at: test/e2e/node/crictl.go:37 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.035 seconds] [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace test/e2e/common/node/node_lease.go:52 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace","completed":2,"skipped":321,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [12.049 seconds] [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done test/e2e/node/pods.go:232 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done","completed":1,"skipped":362,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.043 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:593 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]","completed":3,"skipped":466,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.063 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:79 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]","completed":3,"skipped":436,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [16.055 seconds] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe test/e2e/common/node/container_probe.go:558 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe","completed":1,"skipped":19,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.068 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] test/e2e/common/node/runtime.go:370 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]","completed":2,"skipped":409,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.052 seconds] [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly] test/e2e/node/security_context.go:171 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly]","completed":3,"skipped":519,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [30.747 seconds] [sig-node] Mount propagation should propagate mounts within defined scopes test/e2e/node/mount_propagation.go:85 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Mount propagation should propagate mounts within defined scopes","completed":1,"skipped":87,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.040 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID test/e2e/common/node/security_context.go:417 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID","completed":2,"skipped":253,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [19.090 seconds] [sig-node] Pods should support pod readiness gates [NodeConformance] test/e2e/common/node/pods.go:770 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should support pod readiness gates [NodeConformance]","completed":4,"skipped":567,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSS ------------------------------ • [SLOW TEST] [40.053 seconds] [sig-node] Probing container should be ready immediately after startupProbe succeeds test/e2e/common/node/container_probe.go:404 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be ready immediately after startupProbe succeeds","completed":3,"skipped":521,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [22.088 seconds] [sig-node] Probing container should be restarted with a local redirect http liveness probe test/e2e/common/node/container_probe.go:278 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a local redirect http liveness probe","completed":3,"skipped":293,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSS ------------------------------ • [SLOW TEST] [6.065 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] test/e2e/node/security_context.go:71 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]","completed":4,"skipped":600,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.047 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID test/e2e/common/node/security_context.go:409 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID","completed":5,"skipped":638,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [66.174 seconds] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout test/e2e/common/node/container_probe.go:261 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout","completed":1,"skipped":47,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [68.598 seconds] [sig-node] Pods Extended Pod Container Status should never report success for a pending container test/e2e/node/pods.go:208 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container Status should never report success for a pending container","completed":1,"skipped":64,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [64.166 seconds] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it test/e2e/common/node/container_probe.go:375 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted by liveness probe after startup probe enables it","completed":2,"skipped":142,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [3.076 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance] test/e2e/common/node/runtime.go:386 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]","completed":3,"skipped":353,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.069 seconds] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running test/e2e/node/events.go:41 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running ","completed":2,"skipped":202,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSS ------------------------------ • [4.051 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:625 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]","completed":4,"skipped":439,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSS ------------------------------ S [SKIPPED] [0.031 seconds] [sig-node] RuntimeClass test/e2e/node/framework.go:23 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:129 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] RuntimeClass test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:36:11.045 May 5 00:36:11.045: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename runtimeclass 05/05/23 00:36:11.047 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:36:11.058 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:36:11.062 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:129 May 5 00:36:11.066: INFO: Only supported for providers [gce] (not local) [AfterEach] [sig-node] RuntimeClass test/e2e/framework/framework.go:187 May 5 00:36:11.067: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "runtimeclass-9073" for this suite. 05/05/23 00:36:11.071 << End Captured GinkgoWriter Output Only supported for providers [gce] (not local) In [It] at: test/e2e/node/runtimeclass.go:132 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.819 seconds] [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace test/e2e/node/examples.go:136 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace","completed":3,"skipped":210,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [24.108 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:487 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod]","completed":6,"skipped":712,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.049 seconds] [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS test/e2e/common/node/pod_admission.go:39 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS","completed":7,"skipped":890,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [74.194 seconds] [sig-node] Probing container should be restarted startup probe fails test/e2e/common/node/container_probe.go:317 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted startup probe fails","completed":2,"skipped":175,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [80.045 seconds] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently test/e2e/common/node/node_lease.go:114 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease the kubelet should report node status infrequently","completed":4,"skipped":569,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ S ------------------------------ • [4.043 seconds] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:357 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]","completed":8,"skipped":1079,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSS ------------------------------ • [4.050 seconds] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] test/e2e/common/node/security_context.go:540 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]","completed":3,"skipped":198,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.058 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] test/e2e/common/node/sysctl.go:185 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23]","completed":4,"skipped":294,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [76.992 seconds] [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted test/e2e/node/examples.go:69 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted","completed":4,"skipped":546,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [68.184 seconds] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:543 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance]","completed":5,"skipped":575,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [56.156 seconds] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:227 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]","completed":4,"skipped":296,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.725 seconds] [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly] test/e2e/common/node/privileged.go:52 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]","completed":5,"skipped":581,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SS ------------------------------ • [2.042 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21] test/e2e/common/node/sysctl.go:159 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]","completed":6,"skipped":583,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.028 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:34 should enforce an AppArmor profile test/e2e/node/apparmor.go:45 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 05/05/23 00:36:47.653 May 5 00:36:47.654: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 05/05/23 00:36:47.655 STEP: Waiting for a default service account to be provisioned in namespace 05/05/23 00:36:47.665 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 05/05/23 00:36:47.669 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:34 May 5 00:36:47.673: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:38 [AfterEach] [sig-node] AppArmor test/e2e/framework/framework.go:187 May 5 00:36:47.674: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "apparmor-7319" for this suite. 05/05/23 00:36:47.677 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:311 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [14.069 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:459 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod]","completed":5,"skipped":512,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [12.051 seconds] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly] test/e2e/node/security_context.go:163 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]","completed":6,"skipped":592,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [5.079 seconds] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance] test/e2e/common/node/runtime.go:173 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]","completed":5,"skipped":383,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.034 seconds] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector test/e2e/node/runtimeclass.go:44 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector","completed":6,"skipped":428,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.034 seconds] [sig-node] NodeLease NodeLease should have OwnerReferences set test/e2e/common/node/node_lease.go:90 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease should have OwnerReferences set","completed":7,"skipped":465,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.062 seconds] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:111 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]","completed":7,"skipped":633,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [5.060 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance] test/e2e/common/node/runtime.go:381 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]","completed":6,"skipped":546,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.061 seconds] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly] test/e2e/node/security_context.go:185 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]","completed":8,"skipped":756,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.035 seconds] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:475 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]","completed":7,"skipped":816,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [54.049 seconds] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal test/e2e/node/pods.go:302 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal","completed":5,"skipped":576,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.041 seconds] [sig-node] ConfigMap should update ConfigMap successfully test/e2e/common/node/configmap.go:142 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] ConfigMap should update ConfigMap successfully","completed":6,"skipped":949,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [74.066 seconds] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating test/e2e/common/node/container_probe.go:623 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating","completed":4,"skipped":500,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [33.949 seconds] [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s. test/e2e/node/kubelet.go:344 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.","completed":9,"skipped":880,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":9,"skipped":933,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [30.067 seconds] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process test/e2e/node/pre_stop.go:172 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process","completed":7,"skipped":1001,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":7,"skipped":1001,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [9.083 seconds] [sig-node] Pods Extended Delete Grace Period should be submitted and removed test/e2e/node/pods.go:68 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Delete Grace Period should be submitted and removed","completed":5,"skipped":529,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":5,"skipped":529,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [79.081 seconds] [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails test/e2e/node/pods.go:216 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails","completed":5,"skipped":570,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":5,"skipped":570,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [64.063 seconds] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:244 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]","completed":7,"skipped":588,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":7,"skipped":588,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [244.552 seconds] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe test/e2e/common/node/container_probe.go:293 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe","completed":1,"skipped":544,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":1,"skipped":544,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [242.556 seconds] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:520 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance]","completed":9,"skipped":1095,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":9,"skipped":1095,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [250.590 seconds] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it test/e2e/common/node/container_probe.go:346 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it","completed":8,"skipped":857,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":8,"skipped":857,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [417.031 seconds] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance] test/e2e/common/node/pods.go:675 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]","completed":8,"skipped":679,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":8,"skipped":679,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [1607.351 seconds] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance] test/e2e/common/node/pods.go:716 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]","completed":2,"skipped":209,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.001 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":2,"skipped":209,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ Ran 61 of 7066 Specs in 1673.768 seconds SUCCESS! -- 61 Passed | 0 Failed | 0 Pending | 7005 Skipped Ginkgo ran 1 suite in 27m54.429303443s Test Suite Passed