Running Suite: Kubernetes e2e suite =================================== Random Seed: 1621939892 - Will randomize all specs Will run 5771 specs Running in parallel across 10 nodes May 25 10:51:34.911: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:34.915: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable May 25 10:51:34.936: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready May 25 10:51:34.990: INFO: 21 / 21 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) May 25 10:51:34.990: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 25 10:51:34.990: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start May 25 10:51:34.999: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'create-loop-devs' (0 seconds elapsed) May 25 10:51:34.999: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kindnet' (0 seconds elapsed) May 25 10:51:34.999: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds' (0 seconds elapsed) May 25 10:51:34.999: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) May 25 10:51:34.999: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'tune-sysctls' (0 seconds elapsed) May 25 10:51:34.999: INFO: e2e test version: v1.21.1 May 25 10:51:35.001: INFO: kube-apiserver version: v1.21.1 May 25 10:51:35.001: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.007: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSS ------------------------------ May 25 10:51:35.006: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.031: INFO: Cluster IP family: ipv4 SSS ------------------------------ May 25 10:51:35.013: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.035: INFO: Cluster IP family: ipv4 May 25 10:51:35.011: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.036: INFO: Cluster IP family: ipv4 SSSS ------------------------------ May 25 10:51:35.011: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.037: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSS ------------------------------ May 25 10:51:35.024: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.044: INFO: Cluster IP family: ipv4 SSSSSSSSSSSS ------------------------------ May 25 10:51:35.025: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.047: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSS ------------------------------ May 25 10:51:35.028: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.053: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 25 10:51:35.041: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.062: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSS ------------------------------ May 25 10:51:35.050: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:35.067: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.176: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0525 10:51:35.214405 30 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.214: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.221: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.229: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:84 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.242: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-6088" for this suite. •SSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error","total":-1,"completed":1,"skipped":51,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.200: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0525 10:51:35.225380 28 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.225: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.228: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.242: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to create another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:167 STEP: Create node foo by user: system:node:v1.21-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.250: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-2124" for this suite. •SSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node","total":-1,"completed":1,"skipped":52,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.235: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0525 10:51:35.261927 22 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.262: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.264: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.272: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to delete another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:187 STEP: Create node foo by user: system:node:v1.21-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.276: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-1324" for this suite. •SSSSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node","total":-1,"completed":1,"skipped":81,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.334: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0525 10:51:35.358826 20 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.358: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.362: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.371: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing configmap should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:89 STEP: Create a configmap for testing [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.380: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-9851" for this suite. •SSSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error","total":-1,"completed":1,"skipped":140,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.602: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename metadata-concealment W0525 10:51:35.626758 26 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.626: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.630: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should run a check-metadata-concealment job to completion /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 May 25 10:51:35.633: INFO: Only supported for providers [gce] (not skeleton) [AfterEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.634: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "metadata-concealment-5410" for this suite. S [SKIPPING] [0.040 seconds] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should run a check-metadata-concealment job to completion [It] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 Only supported for providers [gce] (not skeleton) /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:35 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.758: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0525 10:51:35.788519 23 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.788: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.792: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.802: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:74 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.808: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-7349" for this suite. •SSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error","total":-1,"completed":1,"skipped":470,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.819: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.855: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing secret should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:79 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:35.858: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-9046" for this suite. •SSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error","total":-1,"completed":2,"skipped":489,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 25 10:51:36.456: INFO: Running AfterSuite actions on all nodes May 25 10:51:36.456: INFO: Running AfterSuite actions on all nodes S ------------------------------ May 25 10:51:36.457: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.903: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 25 10:51:35.940: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a secret for a workload the node has access to should succeed /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:106 STEP: Create a secret for testing STEP: Node should not get the secret STEP: Create a pod that use the secret STEP: The node should able to access the secret [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:37.958: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-5648" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed","total":-1,"completed":2,"skipped":545,"failed":0} May 25 10:51:37.970: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.962: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet's main port 10250 should reject requests with no credentials /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:59 May 25 10:51:36.008: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 25 10:51:38.016: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 25 10:51:40.013: INFO: The status of Pod agnhost-pod is Running (Ready = true) May 25 10:51:40.017: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.90:33295 --kubeconfig=/root/.kube/config --namespace=node-authn-420 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' https://172.18.0.3:10250/metrics' May 25 10:51:40.313: INFO: stderr: "+ curl -sIk -o /dev/null -w '%{http_code}' https://172.18.0.3:10250/metrics\n" May 25 10:51:40.313: INFO: stdout: "401" May 25 10:51:40.313: INFO: stdout: 401 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:40.313: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-420" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials","total":-1,"completed":1,"skipped":574,"failed":0} May 25 10:51:40.321: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.882: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet can delegate ServiceAccount tokens to the API server /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:68 STEP: create a new ServiceAccount for authentication May 25 10:51:35.929: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 25 10:51:37.934: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 25 10:51:39.934: INFO: The status of Pod agnhost-pod is Running (Ready = true) May 25 10:51:39.937: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.90:33295 --kubeconfig=/root/.kube/config --namespace=node-authn-3504 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' --header "Authorization: Bearer `cat /var/run/secrets/kubernetes.io/serviceaccount/token`" https://172.18.0.3:10250/metrics' May 25 10:51:40.327: INFO: stderr: "+ cat /var/run/secrets/kubernetes.io/serviceaccount/token\n+ curl -sIk -o /dev/null -w '%{http_code}' --header 'Authorization: Bearer eyJhbGciOiJSUzI1NiIsImtpZCI6Il9HWGF6azNVQlIwZHFMUGtrOXZMRUhWb3BGWDdmRzBzaGlaTG55QUxwbHcifQ.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.LJexPVPvbkquvfyEujX9tC0s8M1Y61eMNODwnRM6vbpTp0yZR7XF5bqmCy8Q8w_xT316TQ40o3fTCsgK3qO3LIdZK_g5i7HORTxvfrzywO_KKdU-jocSfs8PYYtdNI__nUmE1AM9kP3vPZmRXF6EMZyy5Q9Q-bSyTifsdhHJVXLep_v_BFTNBDq0hyJ_zRYNlbJRhlDv93xcRessMLo900N2RqSogRJ0KPuZ5V5eC3BIBHg3JX5onf8_smIbP6virMTvToxV6tASDcvrWi8DSZZie2_ZqrMfn8LBnbSvYslLea-XPXp-Y2AS_wMprUFjPtuMJMNpOK5nozGLWrLEGQ' https://172.18.0.3:10250/metrics\n" May 25 10:51:40.328: INFO: stdout: "403" May 25 10:51:40.328: INFO: stdout: 403 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:40.328: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-3504" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server","total":-1,"completed":2,"skipped":516,"failed":0} May 25 10:51:40.337: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:36.223: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts STEP: Waiting for a default service account to be provisioned in namespace [It] should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 STEP: waiting for a single token reference May 25 10:51:36.755: INFO: default service account has a single secret reference STEP: ensuring the single token reference persists STEP: deleting the service account token STEP: waiting for a new token reference May 25 10:51:39.268: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists STEP: deleting the reference to the service account token STEP: waiting for a new token to be created and added May 25 10:51:41.784: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:43.788: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-7081" for this suite. • [SLOW TEST:7.576 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should ensure a single API token exists","total":-1,"completed":2,"skipped":759,"failed":0} May 25 10:51:43.800: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.193: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename certificates W0525 10:51:35.217788 21 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.217: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.221: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 May 25 10:51:35.538: INFO: creating CSR May 25 10:51:35.542: INFO: approving CSR May 25 10:51:40.547: INFO: waiting for CSR to be signed May 25 10:51:45.550: INFO: testing the client May 25 10:51:45.551: INFO: >>> kubeConfig: /root/.kube/config May 25 10:51:45.552: INFO: creating CSR as new client [AfterEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:45.607: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "certificates-3699" for this suite. • [SLOW TEST:10.423 seconds] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 ------------------------------ {"msg":"PASSED [sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR","total":-1,"completed":1,"skipped":55,"failed":0} May 25 10:51:45.618: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.406: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts W0525 10:51:35.431970 34 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.432: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.435: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 STEP: Creating a pod to test service account token: May 25 10:51:35.445: INFO: Waiting up to 5m0s for pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" in namespace "svcaccounts-5218" to be "Succeeded or Failed" May 25 10:51:35.447: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 2.171924ms May 25 10:51:37.451: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.006440075s STEP: Saw pod success May 25 10:51:37.451: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" satisfied condition "Succeeded or Failed" May 25 10:51:37.455: INFO: Trying to get logs from node v1.21-worker pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d container agnhost-container: STEP: delete the pod May 25 10:51:37.866: INFO: Waiting for pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d to disappear May 25 10:51:37.869: INFO: Pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d no longer exists STEP: Creating a pod to test service account token: May 25 10:51:37.874: INFO: Waiting up to 5m0s for pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" in namespace "svcaccounts-5218" to be "Succeeded or Failed" May 25 10:51:37.877: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 2.921563ms May 25 10:51:39.882: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 2.007257204s May 25 10:51:41.886: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 4.011956752s May 25 10:51:43.890: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 6.015730629s May 25 10:51:45.896: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 8.021761037s May 25 10:51:47.901: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 10.026833767s May 25 10:51:49.905: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 12.031198682s May 25 10:51:51.911: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 14.036464403s May 25 10:51:53.915: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 16.040397957s STEP: Saw pod success May 25 10:51:53.915: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" satisfied condition "Succeeded or Failed" May 25 10:51:53.918: INFO: Trying to get logs from node v1.21-worker pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d container agnhost-container: STEP: delete the pod May 25 10:51:53.936: INFO: Waiting for pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d to disappear May 25 10:51:53.943: INFO: Pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d no longer exists STEP: Creating a pod to test service account token: May 25 10:51:53.948: INFO: Waiting up to 5m0s for pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" in namespace "svcaccounts-5218" to be "Succeeded or Failed" May 25 10:51:53.952: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 3.486777ms May 25 10:51:55.957: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.008594868s STEP: Saw pod success May 25 10:51:55.957: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" satisfied condition "Succeeded or Failed" May 25 10:51:55.960: INFO: Trying to get logs from node v1.21-worker2 pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d container agnhost-container: STEP: delete the pod May 25 10:51:55.992: INFO: Waiting for pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d to disappear May 25 10:51:55.995: INFO: Pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d no longer exists STEP: Creating a pod to test service account token: May 25 10:51:56.000: INFO: Waiting up to 5m0s for pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" in namespace "svcaccounts-5218" to be "Succeeded or Failed" May 25 10:51:56.003: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Pending", Reason="", readiness=false. Elapsed: 3.095611ms May 25 10:51:58.007: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.007074529s STEP: Saw pod success May 25 10:51:58.007: INFO: Pod "test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d" satisfied condition "Succeeded or Failed" May 25 10:51:58.011: INFO: Trying to get logs from node v1.21-worker2 pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d container agnhost-container: STEP: delete the pod May 25 10:51:58.027: INFO: Waiting for pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d to disappear May 25 10:51:58.032: INFO: Pod test-pod-6c7d4e0c-f17e-4ff9-8ec3-9143efb7dc6d no longer exists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 10:51:58.032: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-5218" for this suite. • [SLOW TEST:22.635 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]","total":-1,"completed":1,"skipped":187,"failed":0} May 25 10:51:58.043: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 25 10:51:35.557: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts W0525 10:51:35.583131 17 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 25 10:51:35.583: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 25 10:51:35.587: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 May 25 10:51:35.596: INFO: created pod May 25 10:51:35.596: INFO: Waiting up to 1m0s for 1 pods to be running and ready: [inclusterclient] May 25 10:51:35.596: INFO: Waiting up to 1m0s for pod "inclusterclient" in namespace "svcaccounts-1528" to be "running and ready" May 25 10:51:35.599: INFO: Pod "inclusterclient": Phase="Pending", Reason="", readiness=false. Elapsed: 2.722968ms May 25 10:51:37.603: INFO: Pod "inclusterclient": Phase="Pending", Reason="", readiness=false. Elapsed: 2.006790885s May 25 10:51:39.608: INFO: Pod "inclusterclient": Phase="Running", Reason="", readiness=true. Elapsed: 4.011734916s May 25 10:51:39.608: INFO: Pod "inclusterclient" satisfied condition "running and ready" May 25 10:51:39.608: INFO: Wanted all 1 pods to be running and ready. Result: true. Pods: [inclusterclient] May 25 10:51:39.608: INFO: pod is ready May 25 10:52:39.609: INFO: polling logs May 25 10:52:39.617: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:53:39.608: INFO: polling logs May 25 10:53:39.616: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:54:39.609: INFO: polling logs May 25 10:54:39.617: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:55:39.609: INFO: polling logs May 25 10:55:39.618: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:56:39.608: INFO: polling logs May 25 10:56:39.639: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:57:39.609: INFO: polling logs May 25 10:57:39.617: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:58:39.609: INFO: polling logs May 25 10:58:39.618: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 10:59:39.610: INFO: polling logs May 25 10:59:39.619: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 25 11:00:39.609: INFO: polling logs [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 25 11:00:39.618: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-1528" for this suite. • [SLOW TEST:544.072 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow]","total":-1,"completed":1,"skipped":344,"failed":0} May 25 11:00:39.631: INFO: Running AfterSuite actions on all nodes May 25 11:00:39.632: INFO: Running AfterSuite actions on node 1 May 25 11:00:39.632: INFO: Skipping dumping logs from cluster Ran 13 of 5771 Specs in 544.936 seconds SUCCESS! -- 13 Passed | 0 Failed | 0 Pending | 5758 Skipped Ginkgo ran 1 suite in 9m6.751751537s Test Suite Passed