Running Suite: Kubernetes e2e suite =================================== Random Seed: 1623691505 - Will randomize all specs Will run 5668 specs Running in parallel across 10 nodes Jun 14 17:25:07.644: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.648: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable Jun 14 17:25:07.675: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready Jun 14 17:25:07.721: INFO: 21 / 21 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) Jun 14 17:25:07.721: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. Jun 14 17:25:07.721: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start Jun 14 17:25:07.734: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'create-loop-devs' (0 seconds elapsed) Jun 14 17:25:07.734: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kindnet' (0 seconds elapsed) Jun 14 17:25:07.734: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds' (0 seconds elapsed) Jun 14 17:25:07.734: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) Jun 14 17:25:07.734: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'tune-sysctls' (0 seconds elapsed) Jun 14 17:25:07.734: INFO: e2e test version: v1.20.7 Jun 14 17:25:07.735: INFO: kube-apiserver version: v1.20.7 Jun 14 17:25:07.738: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.746: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.745: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.767: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.753: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.772: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.752: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.772: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.786: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.802: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.786: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.806: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.785: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.806: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.785: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.807: INFO: Cluster IP family: ipv4 Jun 14 17:25:07.811: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.829: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:07.762: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:07.809: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:07.816: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:07.825: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to create another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:167 STEP: Create node foo by user: system:node:leguer-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:07.843: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-5216" for this suite. •SSSSSSSSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node","total":-1,"completed":1,"skipped":8,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ Jun 14 17:25:07.852: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:07.868: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.024: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:08.058: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.064: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:08.084: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:74 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:08.087: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-113" for this suite. •SSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error","total":-1,"completed":1,"skipped":145,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.079: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:08.101: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.104: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:08.112: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing configmap should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:89 STEP: Create a configmap for testing [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:08.120: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-4047" for this suite. •SSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error","total":-1,"completed":1,"skipped":214,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.253: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename metadata-concealment STEP: Waiting for a default service account to be provisioned in namespace [It] should run a check-metadata-concealment job to completion /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 Jun 14 17:25:08.277: INFO: Only supported for providers [gce] (not skeleton) [AfterEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:08.278: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "metadata-concealment-612" for this suite. S [SKIPPING] [0.034 seconds] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should run a check-metadata-concealment job to completion [It] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 Only supported for providers [gce] (not skeleton) /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:35 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.399: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:08.433: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.437: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:08.447: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:84 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:08.452: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-3359" for this suite. •SSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error","total":-1,"completed":1,"skipped":459,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.558: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:08.590: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to delete another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:180 STEP: Create node foo by user: system:node:leguer-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:08.594: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-4210" for this suite. •SSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node","total":-1,"completed":2,"skipped":531,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:09.534: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:09.565: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:09.570: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:09.581: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing secret should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:79 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:09.587: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-5394" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error","total":-1,"completed":1,"skipped":1316,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ Jun 14 17:25:09.751: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.938: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts STEP: Waiting for a default service account to be provisioned in namespace [It] should guarantee kube-root-ca.crt exist in any namespace /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:860 Jun 14 17:25:08.974: INFO: Got root ca configmap in namespace "svcaccounts-9988" Jun 14 17:25:08.978: INFO: Deleted root ca configmap in namespace "svcaccounts-9988" STEP: waiting for a new root ca configmap created Jun 14 17:25:09.482: INFO: Recreated root ca configmap in namespace "svcaccounts-9988" Jun 14 17:25:09.486: INFO: Updated root ca configmap in namespace "svcaccounts-9988" STEP: waiting for the root ca configmap reconciled Jun 14 17:25:09.990: INFO: Reconciled root ca configmap in namespace "svcaccounts-9988" [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:09.990: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-9988" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace","total":-1,"completed":2,"skipped":815,"failed":0} Jun 14 17:25:10.002: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.145: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz Jun 14 17:25:08.168: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.171: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node Jun 14 17:25:08.179: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a secret for a workload the node has access to should succeed /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:106 STEP: Create a secret for testing STEP: Node should not get the secret STEP: Create a pod that use the secret STEP: The node should able to access the secret [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:10.198: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-9172" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed","total":-1,"completed":1,"skipped":253,"failed":0} Jun 14 17:25:10.210: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.125: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn Jun 14 17:25:08.149: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.152: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet can delegate ServiceAccount tokens to the API server /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:68 STEP: create a new ServiceAccount for authentication Jun 14 17:25:10.176: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.89:44097 --kubeconfig=/root/.kube/config --namespace=node-authn-9490 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' --header "Authorization: Bearer `cat /var/run/secrets/kubernetes.io/serviceaccount/token`" https://172.18.0.6:10250/metrics' Jun 14 17:25:11.108: INFO: stderr: "+ cat /var/run/secrets/kubernetes.io/serviceaccount/token\n+ curl -sIk -o /dev/null -w %{http_code} --header Authorization: Bearer eyJhbGciOiJSUzI1NiIsImtpZCI6Ilk0UDF3RXVyYVlsM3pja0hCN0xrZUJYQVRxaFhmSHoza2hjQXQwYnZGZmsifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJub2RlLWF1dGhuLTk0OTAiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlY3JldC5uYW1lIjoiZGVmYXVsdC10b2tlbi12N3IyNCIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VydmljZS1hY2NvdW50Lm5hbWUiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiMDI0YjExZWItNzk0Mi00NDUwLTkxYTgtZDZkYjkyM2ZkMDk5Iiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50Om5vZGUtYXV0aG4tOTQ5MDpkZWZhdWx0In0.YiG1Ly9zy0Iuka58hKjty4Wikxn7KRRced8o-YTw_OmtboZJxjki4G7XtzzoDd1pq47o34mP-GRuZI3hR77L2blIADcbW_ogNd03qNTsiIN6RguhTFUlYoWTVyHKPQ2L2Az92Xf4SmLtFZhwqknaj4xSBTmvPHrt4yb5q8Q9O7A5bfu-TR6yje1o5PbIlPNCggqqP23cARL3q8WcSxDyursOLfooEretdjRDY2rgI4SegdTO6ykkpOTU1i0_p37-vnOy-CjZEuLik0UYxWDrHsSkkIaB_mi5zmC9vCMbY4fUUeD9cK8rq98ChuFPn_oTeWPNIEeC0NlXd4PMkDQtRg https://172.18.0.6:10250/metrics\n" Jun 14 17:25:11.108: INFO: stdout: "403" Jun 14 17:25:11.108: INFO: stdout: 403 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:11.108: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-9490" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server","total":-1,"completed":1,"skipped":196,"failed":0} Jun 14 17:25:11.121: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:07.877: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn Jun 14 17:25:07.904: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:07.907: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet's main port 10250 should reject requests with no credentials /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:59 Jun 14 17:25:11.933: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.89:44097 --kubeconfig=/root/.kube/config --namespace=node-authn-7336 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' https://172.18.0.6:10250/metrics' Jun 14 17:25:12.217: INFO: stderr: "+ curl -sIk -o /dev/null -w %{http_code} https://172.18.0.6:10250/metrics\n" Jun 14 17:25:12.217: INFO: stdout: "401" Jun 14 17:25:12.217: INFO: stdout: 401 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:12.217: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-7336" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials","total":-1,"completed":1,"skipped":41,"failed":0} Jun 14 17:25:12.229: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.142: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts Jun 14 17:25:08.164: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.168: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 STEP: waiting for a single token reference Jun 14 17:25:08.726: INFO: default service account has a single secret reference STEP: ensuring the single token reference persists STEP: deleting the service account token STEP: waiting for a new token reference Jun 14 17:25:11.240: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists STEP: deleting the reference to the service account token STEP: waiting for a new token to be created and added Jun 14 17:25:13.827: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:15.927: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-4026" for this suite. • [SLOW TEST:8.592 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should ensure a single API token exists","total":-1,"completed":1,"skipped":269,"failed":0} Jun 14 17:25:16.736: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:09.146: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename certificates STEP: Waiting for a default service account to be provisioned in namespace [It] should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 Jun 14 17:25:09.647: INFO: creating CSR Jun 14 17:25:09.650: INFO: approving CSR Jun 14 17:25:14.656: INFO: waiting for CSR to be signed Jun 14 17:25:19.660: INFO: testing the client Jun 14 17:25:19.660: INFO: >>> kubeConfig: /root/.kube/config Jun 14 17:25:19.662: INFO: creating CSR as new client [AfterEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:19.729: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "certificates-938" for this suite. • [SLOW TEST:10.595 seconds] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 ------------------------------ {"msg":"PASSED [sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR","total":-1,"completed":3,"skipped":918,"failed":0} Jun 14 17:25:19.742: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:09.595: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts STEP: Waiting for a default service account to be provisioned in namespace [It] should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 STEP: Creating a pod to test service account token: Jun 14 17:25:09.634: INFO: Waiting up to 5m0s for pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" in namespace "svcaccounts-6500" to be "Succeeded or Failed" Jun 14 17:25:09.637: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Pending", Reason="", readiness=false. Elapsed: 2.899869ms Jun 14 17:25:11.641: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Pending", Reason="", readiness=false. Elapsed: 2.006810075s Jun 14 17:25:13.644: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.009914901s STEP: Saw pod success Jun 14 17:25:13.644: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" satisfied condition "Succeeded or Failed" Jun 14 17:25:13.647: INFO: Trying to get logs from node leguer-worker pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 container agnhost-container: STEP: delete the pod Jun 14 17:25:13.677: INFO: Waiting for pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 to disappear Jun 14 17:25:13.680: INFO: Pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 no longer exists STEP: Creating a pod to test service account token: Jun 14 17:25:13.684: INFO: Waiting up to 5m0s for pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" in namespace "svcaccounts-6500" to be "Succeeded or Failed" Jun 14 17:25:13.686: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Pending", Reason="", readiness=false. Elapsed: 2.279305ms Jun 14 17:25:15.927: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Running", Reason="", readiness=true. Elapsed: 2.243050629s Jun 14 17:25:17.931: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.24711421s STEP: Saw pod success Jun 14 17:25:17.931: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" satisfied condition "Succeeded or Failed" Jun 14 17:25:17.935: INFO: Trying to get logs from node leguer-worker pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 container agnhost-container: STEP: delete the pod Jun 14 17:25:18.131: INFO: Waiting for pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 to disappear Jun 14 17:25:18.137: INFO: Pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 no longer exists STEP: Creating a pod to test service account token: Jun 14 17:25:18.142: INFO: Waiting up to 5m0s for pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" in namespace "svcaccounts-6500" to be "Succeeded or Failed" Jun 14 17:25:18.144: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Pending", Reason="", readiness=false. Elapsed: 2.409726ms Jun 14 17:25:20.151: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.009182034s STEP: Saw pod success Jun 14 17:25:20.151: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" satisfied condition "Succeeded or Failed" Jun 14 17:25:20.155: INFO: Trying to get logs from node leguer-worker pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 container agnhost-container: STEP: delete the pod Jun 14 17:25:20.230: INFO: Waiting for pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 to disappear Jun 14 17:25:20.232: INFO: Pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 no longer exists STEP: Creating a pod to test service account token: Jun 14 17:25:20.237: INFO: Waiting up to 5m0s for pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" in namespace "svcaccounts-6500" to be "Succeeded or Failed" Jun 14 17:25:20.241: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Pending", Reason="", readiness=false. Elapsed: 3.443788ms Jun 14 17:25:22.332: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.094625057s STEP: Saw pod success Jun 14 17:25:22.332: INFO: Pod "test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737" satisfied condition "Succeeded or Failed" Jun 14 17:25:22.336: INFO: Trying to get logs from node leguer-worker pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 container agnhost-container: STEP: delete the pod Jun 14 17:25:22.530: INFO: Waiting for pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 to disappear Jun 14 17:25:22.533: INFO: Pod test-pod-cec7c9b6-d59d-4da1-97c5-65efd8c7a737 no longer exists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:22.533: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-6500" for this suite. • [SLOW TEST:12.948 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]","total":-1,"completed":2,"skipped":1262,"failed":0} Jun 14 17:25:22.545: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.116: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts Jun 14 17:25:08.143: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled Jun 14 17:25:08.146: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should support OIDC discovery of service account issuer [Feature:ServiceAccountIssuerDiscovery] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:676 Jun 14 17:25:08.157: INFO: created pod Jun 14 17:25:08.157: INFO: Waiting up to 5m0s for pod "oidc-discovery-validator" in namespace "svcaccounts-6336" to be "Succeeded or Failed" Jun 14 17:25:08.159: INFO: Pod "oidc-discovery-validator": Phase="Pending", Reason="", readiness=false. Elapsed: 1.991714ms Jun 14 17:25:10.163: INFO: Pod "oidc-discovery-validator": Phase="Pending", Reason="", readiness=false. Elapsed: 2.005896604s Jun 14 17:25:12.167: INFO: Pod "oidc-discovery-validator": Phase="Succeeded", Reason="", readiness=false. Elapsed: 4.009791702s STEP: Saw pod success Jun 14 17:25:12.167: INFO: Pod "oidc-discovery-validator" satisfied condition "Succeeded or Failed" Jun 14 17:25:42.167: INFO: polling logs Jun 14 17:25:42.175: INFO: Pod logs: 2021/06/14 17:25:09 OK: Got token 2021/06/14 17:25:09 OK: got issuer https://kubernetes.default.svc.cluster.local 2021/06/14 17:25:09 Full, not-validated claims: openidmetadata.claims{Claims:jwt.Claims{Issuer:"https://kubernetes.default.svc.cluster.local", Subject:"system:serviceaccount:svcaccounts-6336:default", Audience:jwt.Audience{"oidc-discovery-test"}, Expiry:1623692108, NotBefore:1623691508, IssuedAt:1623691508, ID:""}, Kubernetes:openidmetadata.kubeClaims{Namespace:"svcaccounts-6336", ServiceAccount:openidmetadata.kubeName{Name:"default", UID:"64a5df44-1560-41c9-b290-9b13372332fc"}}} 2021/06/14 17:25:09 OK: Constructed OIDC provider for issuer https://kubernetes.default.svc.cluster.local 2021/06/14 17:25:09 OK: Validated signature on JWT 2021/06/14 17:25:09 OK: Got valid claims from token! 2021/06/14 17:25:09 Full, validated claims: &openidmetadata.claims{Claims:jwt.Claims{Issuer:"https://kubernetes.default.svc.cluster.local", Subject:"system:serviceaccount:svcaccounts-6336:default", Audience:jwt.Audience{"oidc-discovery-test"}, Expiry:1623692108, NotBefore:1623691508, IssuedAt:1623691508, ID:""}, Kubernetes:openidmetadata.kubeClaims{Namespace:"svcaccounts-6336", ServiceAccount:openidmetadata.kubeName{Name:"default", UID:"64a5df44-1560-41c9-b290-9b13372332fc"}}} Jun 14 17:25:42.175: INFO: completed pod [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:25:42.175: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-6336" for this suite. • [SLOW TEST:34.071 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support OIDC discovery of service account issuer [Feature:ServiceAccountIssuerDiscovery] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:676 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should support OIDC discovery of service account issuer [Feature:ServiceAccountIssuerDiscovery]","total":-1,"completed":1,"skipped":207,"failed":0} Jun 14 17:25:42.188: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client Jun 14 17:25:08.208: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts STEP: Waiting for a default service account to be provisioned in namespace [It] should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 Jun 14 17:25:08.241: INFO: created pod Jun 14 17:25:08.241: INFO: Waiting up to 1m0s for 1 pods to be running and ready: [inclusterclient] Jun 14 17:25:08.241: INFO: Waiting up to 1m0s for pod "inclusterclient" in namespace "svcaccounts-5692" to be "running and ready" Jun 14 17:25:08.243: INFO: Pod "inclusterclient": Phase="Pending", Reason="", readiness=false. Elapsed: 2.332726ms Jun 14 17:25:10.427: INFO: Pod "inclusterclient": Phase="Running", Reason="", readiness=true. Elapsed: 2.186385097s Jun 14 17:25:10.427: INFO: Pod "inclusterclient" satisfied condition "running and ready" Jun 14 17:25:10.427: INFO: Wanted all 1 pods to be running and ready. Result: true. Pods: [inclusterclient] Jun 14 17:25:10.427: INFO: pod is ready Jun 14 17:26:10.427: INFO: polling logs Jun 14 17:26:10.435: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:27:10.427: INFO: polling logs Jun 14 17:27:10.438: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:28:10.427: INFO: polling logs Jun 14 17:28:10.436: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:29:10.427: INFO: polling logs Jun 14 17:29:10.437: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:30:10.427: INFO: polling logs Jun 14 17:30:10.439: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:31:10.427: INFO: polling logs Jun 14 17:31:10.460: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:32:10.427: INFO: polling logs Jun 14 17:32:10.436: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:33:10.427: INFO: polling logs Jun 14 17:33:10.438: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:34:10.427: INFO: polling logs Jun 14 17:34:10.437: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 Jun 14 17:35:10.427: INFO: polling logs [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 Jun 14 17:35:10.438: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-5692" for this suite. • [SLOW TEST:602.243 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow]","total":-1,"completed":2,"skipped":285,"failed":0} Jun 14 17:35:10.454: INFO: Running AfterSuite actions on all nodes Jun 14 17:35:10.454: INFO: Running AfterSuite actions on node 1 Jun 14 17:35:10.454: INFO: Skipping dumping logs from cluster Ran 15 of 5668 Specs in 602.826 seconds SUCCESS! -- 15 Passed | 0 Failed | 0 Pending | 5653 Skipped Ginkgo ran 1 suite in 10m4.559304229s Test Suite Passed