Running Suite: Kubernetes e2e suite - /usr/local/bin ==================================================== Random Seed: 1713461313 - will randomize all specs Will run 70 of 7069 specs Running in parallel across 10 processes SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.057 seconds] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] test/e2e/common/node/downwardapi.go:111 ------------------------------ SSSSSSSSSS ------------------------------ • [SLOW TEST] [6.067 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] test/e2e/common/node/runtime.go:371 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.046 seconds] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] test/e2e/common/node/security_context.go:541 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.069 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance] test/e2e/common/node/runtime.go:382 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.051 seconds] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:143 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.067 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance] test/e2e/common/node/runtime.go:376 ------------------------------ SSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.062 seconds] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly] test/e2e/node/security_context.go:195 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [11.067 seconds] [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace test/e2e/node/examples.go:138 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.055 seconds] [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done test/e2e/node/pods.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.048 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:626 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [13.080 seconds] [sig-node] Pods Extended Delete Grace Period should be submitted and removed test/e2e/node/pods.go:68 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.030 seconds] [sig-node] SSH [BeforeEach] test/e2e/node/ssh.go:38 should SSH to all nodes and run commands test/e2e/node/ssh.go:47 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] SSH set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:28:55.625 Apr 18 17:28:55.625: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename ssh 04/18/24 17:28:55.627 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:28:55.638 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:28:55.643 [BeforeEach] [sig-node] SSH test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] SSH test/e2e/node/ssh.go:38 Apr 18 17:28:55.647: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] SSH test/e2e/framework/node/init/init.go:32 Apr 18 17:28:55.647: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] SSH test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] SSH dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] SSH tear down framework | framework.go:193 STEP: Destroying namespace "ssh-3968" for this suite. 04/18/24 17:28:55.651 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/ssh.go:44 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [7.090 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance] test/e2e/common/node/runtime.go:387 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [28.054 seconds] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process test/e2e/node/pre_stop.go:172 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.033 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:35 can disable an AppArmor profile, using unconfined test/e2e/node/apparmor.go:50 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:29:02.533 Apr 18 17:29:02.533: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 04/18/24 17:29:02.535 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:29:02.548 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:29:02.552 [BeforeEach] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:31 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:35 Apr 18 17:29:02.557: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:39 [AfterEach] [sig-node] AppArmor test/e2e/framework/node/init/init.go:32 Apr 18 17:29:02.557: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] AppArmor dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] AppArmor tear down framework | framework.go:193 STEP: Destroying namespace "apparmor-7132" for this suite. 04/18/24 17:29:02.562 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.052 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly] test/e2e/common/node/security_context.go:388 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.039 seconds] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:476 ------------------------------ SSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.027 seconds] [sig-node] crictl [BeforeEach] test/e2e/node/crictl.go:35 should be able to run crictl on the node test/e2e/node/crictl.go:40 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] crictl set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:29:14.131 Apr 18 17:29:14.131: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename crictl 04/18/24 17:29:14.132 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:29:14.143 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:29:14.146 [BeforeEach] [sig-node] crictl test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] crictl test/e2e/node/crictl.go:35 Apr 18 17:29:14.150: INFO: Only supported for providers [gce gke] (not local) [AfterEach] [sig-node] crictl test/e2e/framework/node/init/init.go:32 Apr 18 17:29:14.150: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] crictl test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] crictl dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] crictl tear down framework | framework.go:193 STEP: Destroying namespace "crictl-1662" for this suite. 04/18/24 17:29:14.154 << End Captured GinkgoWriter Output Only supported for providers [gce gke] (not local) In [BeforeEach] at: test/e2e/node/crictl.go:37 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [35.138 seconds] [sig-node] Mount propagation should propagate mounts within defined scopes test/e2e/node/mount_propagation.go:86 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSS ------------------------------ • [SLOW TEST] [14.373 seconds] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe test/e2e/common/node/container_probe.go:562 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [54.133 seconds] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:231 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.030 seconds] [sig-node] RuntimeClass test/e2e/node/framework.go:23 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:130 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] RuntimeClass set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:29:37.774 Apr 18 17:29:37.775: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename runtimeclass 04/18/24 17:29:37.776 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:29:37.787 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:29:37.791 [BeforeEach] [sig-node] RuntimeClass test/e2e/framework/metrics/init/init.go:31 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:130 Apr 18 17:29:37.795: INFO: Only supported for providers [gce] (not local) [AfterEach] [sig-node] RuntimeClass test/e2e/framework/node/init/init.go:32 Apr 18 17:29:37.795: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] RuntimeClass test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] RuntimeClass dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] RuntimeClass tear down framework | framework.go:193 STEP: Destroying namespace "runtimeclass-6584" for this suite. 04/18/24 17:29:37.8 << End Captured GinkgoWriter Output Only supported for providers [gce] (not local) In [It] at: test/e2e/node/runtimeclass.go:133 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [67.119 seconds] [sig-node] Pods Extended Pod Container Status should never report success for a pending container test/e2e/node/pods.go:208 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [62.156 seconds] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it test/e2e/common/node/container_probe.go:379 ------------------------------ SSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.053 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:594 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.024 seconds] [sig-node] NodeProblemDetector [BeforeEach] test/e2e/node/node_problem_detector.go:54 should run without error test/e2e/node/node_problem_detector.go:62 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] NodeProblemDetector set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:29:43.956 Apr 18 17:29:43.956: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename node-problem-detector 04/18/24 17:29:43.957 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:29:43.967 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:29:43.97 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/node/node_problem_detector.go:54 Apr 18 17:29:43.972: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] NodeProblemDetector test/e2e/framework/node/init/init.go:32 Apr 18 17:29:43.973: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] NodeProblemDetector test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] NodeProblemDetector dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] NodeProblemDetector tear down framework | framework.go:193 STEP: Destroying namespace "node-problem-detector-443" for this suite. 04/18/24 17:29:43.976 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/node_problem_detector.go:55 ------------------------------ SSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [28.109 seconds] [sig-node] Probing container should be restarted with a local redirect http liveness probe test/e2e/common/node/container_probe.go:282 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [42.051 seconds] [sig-node] Probing container should be ready immediately after startupProbe succeeds test/e2e/common/node/container_probe.go:408 ------------------------------ SSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [74.180 seconds] [sig-node] Probing container should be restarted startup probe fails test/e2e/common/node/container_probe.go:321 ------------------------------ S ------------------------------ • [SLOW TEST] [22.079 seconds] [sig-node] Pods should support pod readiness gates [NodeConformance] test/e2e/common/node/pods.go:771 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.054 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID test/e2e/common/node/security_context.go:410 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.090 seconds] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] test/e2e/common/node/lifecycle_hook.go:189 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.068 seconds] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly] test/e2e/node/security_context.go:217 ------------------------------ SSSS ------------------------------ • [SLOW TEST] [74.568 seconds] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating test/e2e/common/node/container_probe.go:626 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [81.066 seconds] [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted test/e2e/node/examples.go:71 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.047 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21] test/e2e/common/node/sysctl.go:159 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [14.044 seconds] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:358 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [34.763 seconds] [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s. test/e2e/node/kubelet.go:346 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.025 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:35 should enforce an AppArmor profile test/e2e/node/apparmor.go:46 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor set up framework | framework.go:178 STEP: Creating a kubernetes client 04/18/24 17:30:17.515 Apr 18 17:30:17.515: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 04/18/24 17:30:17.516 STEP: Waiting for a default service account to be provisioned in namespace 04/18/24 17:30:17.526 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/18/24 17:30:17.529 [BeforeEach] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:31 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:35 Apr 18 17:30:17.532: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:39 [AfterEach] [sig-node] AppArmor test/e2e/framework/node/init/init.go:32 Apr 18 17:30:17.533: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] AppArmor dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] AppArmor tear down framework | framework.go:193 STEP: Destroying namespace "apparmor-3550" for this suite. 04/18/24 17:30:17.536 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.053 seconds] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running test/e2e/node/events.go:41 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [7.027 seconds] [sig-node] [Feature:Example] Secret should create a pod that reads a secret test/e2e/node/examples.go:118 ------------------------------ SS ------------------------------ • [SLOW TEST] [68.197 seconds] [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails test/e2e/node/pods.go:216 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [78.211 seconds] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:547 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [54.055 seconds] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal test/e2e/node/pods.go:302 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [68.065 seconds] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:248 ------------------------------ • [SLOW TEST] [8.096 seconds] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] test/e2e/common/node/lifecycle_hook.go:234 ------------------------------ • [SLOW TEST] [64.177 seconds] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout test/e2e/common/node/container_probe.go:265 ------------------------------ • [SLOW TEST] [80.056 seconds] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently test/e2e/common/node/node_lease.go:114 ------------------------------ • [SLOW TEST] [250.544 seconds] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:524 ------------------------------ • [SLOW TEST] [248.595 seconds] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe test/e2e/common/node/container_probe.go:297 ------------------------------ • [SLOW TEST] [242.580 seconds] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it test/e2e/common/node/container_probe.go:350 ------------------------------ • [SLOW TEST] [387.946 seconds] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance] test/e2e/common/node/pods.go:676 ------------------------------ • [SLOW TEST] [1621.556 seconds] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance] test/e2e/common/node/pods.go:717 ------------------------------ Ran 64 of 7069 Specs in 1691.382 seconds SUCCESS! -- 64 Passed | 0 Failed | 0 Pending | 7005 Skipped Ginkgo ran 1 suite in 28m12.178164215s Test Suite Passed