Running Suite: Kubernetes e2e suite =================================== Random Seed: 1621518500 - Will randomize all specs Will run 5771 specs Running in parallel across 10 nodes May 20 13:48:22.574: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.579: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable May 20 13:48:22.606: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready May 20 13:48:22.656: INFO: 21 / 21 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) May 20 13:48:22.656: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 20 13:48:22.656: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start May 20 13:48:22.671: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'create-loop-devs' (0 seconds elapsed) May 20 13:48:22.671: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kindnet' (0 seconds elapsed) May 20 13:48:22.671: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds' (0 seconds elapsed) May 20 13:48:22.671: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) May 20 13:48:22.671: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'tune-sysctls' (0 seconds elapsed) May 20 13:48:22.671: INFO: e2e test version: v1.21.1 May 20 13:48:22.672: INFO: kube-apiserver version: v1.21.0 May 20 13:48:22.672: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.678: INFO: Cluster IP family: ipv4 SSSSSSSSSSSS ------------------------------ May 20 13:48:22.680: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.700: INFO: Cluster IP family: ipv4 SSSSSSSSS ------------------------------ May 20 13:48:22.684: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.707: INFO: Cluster IP family: ipv4 SSSSSSSSSSSS ------------------------------ May 20 13:48:22.691: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.714: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ May 20 13:48:22.696: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.718: INFO: Cluster IP family: ipv4 SSS ------------------------------ May 20 13:48:22.698: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.719: INFO: Cluster IP family: ipv4 SSSSS ------------------------------ May 20 13:48:22.699: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.720: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 20 13:48:22.713: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.733: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ May 20 13:48:22.718: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.735: INFO: Cluster IP family: ipv4 SSSSSSS ------------------------------ May 20 13:48:22.717: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:22.737: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:22.912: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0520 13:48:22.939656 21 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:22.939: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:22.943: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:22.952: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:74 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:22.957: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-8231" for this suite. •SSSSSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error","total":-1,"completed":1,"skipped":89,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.206: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename metadata-concealment W0520 13:48:23.227485 31 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:23.227: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:23.230: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should run a check-metadata-concealment job to completion /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 May 20 13:48:23.233: INFO: Only supported for providers [gce] (not skeleton) [AfterEach] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:23.235: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "metadata-concealment-9258" for this suite. S [SKIPPING] [0.035 seconds] [sig-auth] Metadata Concealment /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should run a check-metadata-concealment job to completion [It] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:34 Only supported for providers [gce] (not skeleton) /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/metadata_concealment.go:35 ------------------------------ SSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.201: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:23.232: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing configmap should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:89 STEP: Create a configmap for testing [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:23.238: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-8501" for this suite. •SSSSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error","total":-1,"completed":2,"skipped":275,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.475: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0520 13:48:23.503284 22 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:23.503: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:23.507: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:23.517: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to delete another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:187 STEP: Create node foo by user: system:node:v1.21-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:23.521: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-659" for this suite. •SSS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node","total":-1,"completed":1,"skipped":563,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:24.103: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:24.139: INFO: >>> kubeConfig: /root/.kube/config [It] Getting an existing secret should exit with the Forbidden error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:79 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:24.143: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-2791" for this suite. •SS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error","total":-1,"completed":3,"skipped":884,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:24.209: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0520 13:48:24.239783 24 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:24.239: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:24.243: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:24.251: INFO: >>> kubeConfig: /root/.kube/config [It] A node shouldn't be able to create another node /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:167 STEP: Create node foo by user: system:node:v1.21-control-plane [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:24.261: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-6591" for this suite. •SS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node","total":-1,"completed":1,"skipped":1034,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:24.489: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:24.528: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:84 [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:24.531: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-4020" for this suite. •SS ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error","total":-1,"completed":4,"skipped":1115,"failed":0} SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 20 13:48:24.557: INFO: Running AfterSuite actions on all nodes May 20 13:48:24.558: INFO: Running AfterSuite actions on all nodes S ------------------------------ May 20 13:48:24.559: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:22.735: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authz W0520 13:48:22.767700 30 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:22.767: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:22.775: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:50 STEP: Creating a kubernetes client that impersonates a node May 20 13:48:22.784: INFO: >>> kubeConfig: /root/.kube/config [It] Getting a secret for a workload the node has access to should succeed /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authz.go:106 STEP: Create a secret for testing STEP: Node should not get the secret STEP: Create a pod that use the secret STEP: The node should able to access the secret [AfterEach] [sig-auth] [Feature:NodeAuthorizer] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:24.806: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authz-9036" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed","total":-1,"completed":1,"skipped":7,"failed":0} May 20 13:48:24.817: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.494: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn W0520 13:48:23.520282 18 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:23.520: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:23.524: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet's main port 10250 should reject requests with no credentials /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:59 May 20 13:48:23.541: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 20 13:48:25.545: INFO: The status of Pod agnhost-pod is Running (Ready = true) May 20 13:48:25.549: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.90:41563 --kubeconfig=/root/.kube/config --namespace=node-authn-5227 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' https://172.18.0.3:10250/metrics' May 20 13:48:25.906: INFO: stderr: "+ curl -sIk -o /dev/null -w '%{http_code}' https://172.18.0.3:10250/metrics\n" May 20 13:48:25.906: INFO: stdout: "401" May 20 13:48:25.906: INFO: stdout: 401 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:25.906: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-5227" for this suite. • ------------------------------ {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials","total":-1,"completed":1,"skipped":552,"failed":0} May 20 13:48:25.916: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.725: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename node-authn STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:39 [It] The kubelet can delegate ServiceAccount tokens to the API server /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/node_authn.go:68 STEP: create a new ServiceAccount for authentication May 20 13:48:23.772: INFO: The status of Pod agnhost-pod is Pending, waiting for it to be Running (with Ready = true) May 20 13:48:25.776: INFO: The status of Pod agnhost-pod is Running (Ready = true) May 20 13:48:25.780: INFO: Running '/usr/local/bin/kubectl --server=https://172.30.13.90:41563 --kubeconfig=/root/.kube/config --namespace=node-authn-8864 exec agnhost-pod -- /bin/sh -x -c curl -sIk -o /dev/null -w '%{http_code}' --header "Authorization: Bearer `cat /var/run/secrets/kubernetes.io/serviceaccount/token`" https://172.18.0.3:10250/metrics' May 20 13:48:26.088: INFO: stderr: "+ cat /var/run/secrets/kubernetes.io/serviceaccount/token\n+ curl -sIk -o /dev/null -w '%{http_code}' --header 'Authorization: Bearer eyJhbGciOiJSUzI1NiIsImtpZCI6IktJWlU3Z3JlNk9mdkJIVWF5Yl9HeHlKNUxCSGhrWlNzN2xvMllUc3NjdTAifQ.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.gxRusK63DgBiFd7B617RwrELRGm3_NaF16oz0ipAQkesQJvq7sNClWkc3La4gJWQInMK3kpMZsTnoU-ufQabq9fOHvg6DmAP9jBRgc6oq3_jiju_WAvgiFvEPk07N_ZnvSc5yhp3w7rn4lcn2LgNB1oC4YGh6NCbkNN4ktUh9FPKWnDLami2AJAp4FRgBoth55gBL5BBuobq8FXsiwtM-vIhc3gYRPcdgxWXWJ-DcU-hE43Gz_9DFZEWMqURMkE3WybtRhvTkXtvUYvc-mXjfL1Uz2vS4MczumPHmWabBjM2dGTaBsco1Djeb7xGFchlRvLs1bLrL4r4ZcGxUXr3jw' https://172.18.0.3:10250/metrics\n" May 20 13:48:26.088: INFO: stdout: "403" May 20 13:48:26.088: INFO: stdout: 403 [AfterEach] [sig-auth] [Feature:NodeAuthenticator] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:26.088: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-authn-8864" for this suite. • ------------------------------ [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.343: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts STEP: Waiting for a default service account to be provisioned in namespace [It] should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 STEP: waiting for a single token reference May 20 13:48:23.873: INFO: default service account has a single secret reference STEP: ensuring the single token reference persists STEP: deleting the service account token STEP: waiting for a new token reference May 20 13:48:26.392: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists STEP: deleting the reference to the service account token STEP: waiting for a new token to be created and added May 20 13:48:28.905: INFO: default service account has a new single secret reference STEP: ensuring the single token reference persists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:30.910: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-6004" for this suite. • [SLOW TEST:7.579 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should ensure a single API token exists /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:52 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should ensure a single API token exists","total":-1,"completed":1,"skipped":398,"failed":0} May 20 13:48:30.924: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:22.937: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts W0520 13:48:22.962151 27 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:22.962: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:22.966: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 STEP: Creating a pod to test service account token: May 20 13:48:22.975: INFO: Waiting up to 5m0s for pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" in namespace "svcaccounts-7248" to be "Succeeded or Failed" May 20 13:48:22.977: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Pending", Reason="", readiness=false. Elapsed: 2.421229ms May 20 13:48:24.981: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.006341329s STEP: Saw pod success May 20 13:48:24.981: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" satisfied condition "Succeeded or Failed" May 20 13:48:24.984: INFO: Trying to get logs from node v1.21-worker2 pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 container agnhost-container: STEP: delete the pod May 20 13:48:25.017: INFO: Waiting for pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 to disappear May 20 13:48:25.020: INFO: Pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 no longer exists STEP: Creating a pod to test service account token: May 20 13:48:25.024: INFO: Waiting up to 5m0s for pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" in namespace "svcaccounts-7248" to be "Succeeded or Failed" May 20 13:48:25.027: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Pending", Reason="", readiness=false. Elapsed: 3.104377ms May 20 13:48:27.033: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.00928114s STEP: Saw pod success May 20 13:48:27.033: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" satisfied condition "Succeeded or Failed" May 20 13:48:27.037: INFO: Trying to get logs from node v1.21-worker pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 container agnhost-container: STEP: delete the pod May 20 13:48:27.068: INFO: Waiting for pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 to disappear May 20 13:48:27.071: INFO: Pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 no longer exists STEP: Creating a pod to test service account token: May 20 13:48:27.075: INFO: Waiting up to 5m0s for pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" in namespace "svcaccounts-7248" to be "Succeeded or Failed" May 20 13:48:27.078: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Pending", Reason="", readiness=false. Elapsed: 2.996358ms May 20 13:48:29.084: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.008992808s STEP: Saw pod success May 20 13:48:29.085: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" satisfied condition "Succeeded or Failed" May 20 13:48:29.087: INFO: Trying to get logs from node v1.21-worker pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 container agnhost-container: STEP: delete the pod May 20 13:48:29.101: INFO: Waiting for pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 to disappear May 20 13:48:29.104: INFO: Pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 no longer exists STEP: Creating a pod to test service account token: May 20 13:48:29.109: INFO: Waiting up to 5m0s for pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" in namespace "svcaccounts-7248" to be "Succeeded or Failed" May 20 13:48:29.112: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Pending", Reason="", readiness=false. Elapsed: 2.81462ms May 20 13:48:31.116: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7": Phase="Succeeded", Reason="", readiness=false. Elapsed: 2.006695575s STEP: Saw pod success May 20 13:48:31.116: INFO: Pod "test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7" satisfied condition "Succeeded or Failed" May 20 13:48:31.119: INFO: Trying to get logs from node v1.21-worker2 pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 container agnhost-container: STEP: delete the pod May 20 13:48:31.132: INFO: Waiting for pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 to disappear May 20 13:48:31.135: INFO: Pod test-pod-94e57f94-0c68-44cd-82dd-2be2465beca7 no longer exists [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:31.135: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-7248" for this suite. • [SLOW TEST:8.204 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:488 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]","total":-1,"completed":1,"skipped":90,"failed":0} May 20 13:48:31.144: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:23.134: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename certificates W0520 13:48:23.160200 20 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:23.160: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:23.164: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 May 20 13:48:23.345: INFO: creating CSR May 20 13:48:23.349: INFO: approving CSR May 20 13:48:28.354: INFO: waiting for CSR to be signed May 20 13:48:33.359: INFO: testing the client May 20 13:48:33.359: INFO: >>> kubeConfig: /root/.kube/config May 20 13:48:33.361: INFO: creating CSR as new client [AfterEach] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:48:33.403: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "certificates-7958" for this suite. • [SLOW TEST:10.278 seconds] [sig-auth] Certificates API [Privileged:ClusterAdmin] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support building a client with a CSR /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/certificates.go:55 ------------------------------ {"msg":"PASSED [sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR","total":-1,"completed":1,"skipped":247,"failed":0} May 20 13:48:33.414: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:185 STEP: Creating a kubernetes client May 20 13:48:22.975: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename svcaccounts W0520 13:48:22.998356 25 warnings.go:70] policy/v1beta1 PodSecurityPolicy is deprecated in v1.21+, unavailable in v1.25+ May 20 13:48:22.998: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 20 13:48:23.001: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [It] should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 May 20 13:48:23.010: INFO: created pod May 20 13:48:23.010: INFO: Waiting up to 1m0s for 1 pods to be running and ready: [inclusterclient] May 20 13:48:23.010: INFO: Waiting up to 1m0s for pod "inclusterclient" in namespace "svcaccounts-7660" to be "running and ready" May 20 13:48:23.013: INFO: Pod "inclusterclient": Phase="Pending", Reason="", readiness=false. Elapsed: 2.661763ms May 20 13:48:25.017: INFO: Pod "inclusterclient": Phase="Running", Reason="", readiness=true. Elapsed: 2.006948399s May 20 13:48:25.017: INFO: Pod "inclusterclient" satisfied condition "running and ready" May 20 13:48:25.017: INFO: Wanted all 1 pods to be running and ready. Result: true. Pods: [inclusterclient] May 20 13:48:25.017: INFO: pod is ready May 20 13:49:25.020: INFO: polling logs May 20 13:49:25.027: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:50:25.018: INFO: polling logs May 20 13:50:25.382: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:51:25.020: INFO: polling logs May 20 13:51:25.027: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:52:25.019: INFO: polling logs May 20 13:52:25.027: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:53:25.020: INFO: polling logs May 20 13:53:25.037: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:54:25.020: INFO: polling logs May 20 13:54:25.028: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:55:25.020: INFO: polling logs May 20 13:55:25.028: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:56:25.019: INFO: polling logs May 20 13:56:25.028: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:57:25.018: INFO: polling logs May 20 13:57:25.027: INFO: Retrying. Still waiting to see more unique tokens: got=1, want=2 May 20 13:58:25.019: INFO: polling logs [AfterEach] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:186 May 20 13:58:25.027: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "svcaccounts-7660" for this suite. • [SLOW TEST:602.062 seconds] [sig-auth] ServiceAccounts /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/framework.go:23 should support InClusterConfig with token rotation [Slow] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/auth/service_accounts.go:584 ------------------------------ {"msg":"PASSED [sig-auth] ServiceAccounts should support InClusterConfig with token rotation [Slow]","total":-1,"completed":1,"skipped":134,"failed":0} May 20 13:58:25.040: INFO: Running AfterSuite actions on all nodes {"msg":"PASSED [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server","total":-1,"completed":2,"skipped":701,"failed":0} May 20 13:48:26.100: INFO: Running AfterSuite actions on all nodes May 20 13:58:25.071: INFO: Running AfterSuite actions on node 1 May 20 13:58:25.071: INFO: Skipping dumping logs from cluster Ran 13 of 5771 Specs in 602.747 seconds SUCCESS! -- 13 Passed | 0 Failed | 0 Pending | 5758 Skipped Ginkgo ran 1 suite in 10m4.507240475s Test Suite Passed