Running Suite: Kubernetes e2e suite =================================== Random Seed: 1621615345 - Will randomize all specs Will run 5484 specs Running in parallel across 10 nodes May 21 16:42:27.585: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:27.588: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable May 21 16:42:27.617: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready May 21 16:42:27.666: INFO: The status of Pod kube-multus-ds-f4mr9 is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 21 16:42:27.666: INFO: 20 / 21 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) May 21 16:42:27.666: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 21 16:42:27.666: INFO: POD NODE PHASE GRACE CONDITIONS May 21 16:42:27.666: INFO: kube-multus-ds-f4mr9 kali-worker Running 10s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 15:16:02 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:26 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:26 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 15:16:02 +0000 UTC }] May 21 16:42:27.666: INFO: May 21 16:42:29.700: INFO: The status of Pod kube-multus-ds-f4mr9 is Running (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 21 16:42:29.700: INFO: 20 / 21 pods in namespace 'kube-system' are running and ready (2 seconds elapsed) May 21 16:42:29.700: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 21 16:42:29.700: INFO: POD NODE PHASE GRACE CONDITIONS May 21 16:42:29.700: INFO: kube-multus-ds-f4mr9 kali-worker Running 10s [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 15:16:02 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:26 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:26 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 15:16:02 +0000 UTC }] May 21 16:42:29.700: INFO: May 21 16:42:31.699: INFO: The status of Pod kube-multus-ds-l25rh is Pending (Ready = false), waiting for it to be either Running (with Ready = true) or Failed May 21 16:42:31.699: INFO: 20 / 21 pods in namespace 'kube-system' are running and ready (4 seconds elapsed) May 21 16:42:31.699: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 21 16:42:31.699: INFO: POD NODE PHASE GRACE CONDITIONS May 21 16:42:31.699: INFO: kube-multus-ds-l25rh kali-worker Pending [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:30 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:30 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:30 +0000 UTC ContainersNotReady containers with unready status: [kube-multus]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2021-05-21 16:42:30 +0000 UTC }] May 21 16:42:31.699: INFO: May 21 16:42:33.698: INFO: 21 / 21 pods in namespace 'kube-system' are running and ready (6 seconds elapsed) May 21 16:42:33.698: INFO: expected 2 pod replicas in namespace 'kube-system', 2 are Running and Ready. May 21 16:42:33.698: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start May 21 16:42:33.714: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'create-loop-devs' (0 seconds elapsed) May 21 16:42:33.714: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kindnet' (0 seconds elapsed) May 21 16:42:33.714: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds' (0 seconds elapsed) May 21 16:42:33.714: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) May 21 16:42:33.715: INFO: 3 / 3 pods ready in namespace 'kube-system' in daemonset 'tune-sysctls' (0 seconds elapsed) May 21 16:42:33.715: INFO: e2e test version: v1.19.11 May 21 16:42:33.716: INFO: kube-apiserver version: v1.19.11 May 21 16:42:33.717: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.723: INFO: Cluster IP family: ipv4 SSSSSSSS ------------------------------ May 21 16:42:33.721: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.744: INFO: Cluster IP family: ipv4 SSS ------------------------------ May 21 16:42:33.724: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.747: INFO: Cluster IP family: ipv4 SS ------------------------------ May 21 16:42:33.729: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.750: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 21 16:42:33.739: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.761: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ May 21 16:42:33.739: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.763: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSS ------------------------------ May 21 16:42:33.749: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.768: INFO: Cluster IP family: ipv4 SSSSSSSSSSSS ------------------------------ May 21 16:42:33.751: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.772: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 21 16:42:33.756: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.779: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSS ------------------------------ May 21 16:42:33.766: INFO: >>> kubeConfig: /root/.kube/config May 21 16:42:33.783: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ May 21 16:42:34.840: INFO: Running AfterSuite actions on all nodes S ------------------------------ May 21 16:42:34.840: INFO: Running AfterSuite actions on all nodes May 21 16:42:34.841: INFO: Running AfterSuite actions on all nodes SS ------------------------------ May 21 16:42:34.841: INFO: Running AfterSuite actions on all nodes May 21 16:42:34.841: INFO: Running AfterSuite actions on all nodes May 21 16:42:34.841: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client May 21 16:42:34.514: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer May 21 16:42:34.546: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 21 16:42:34.549: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should sign the new added bootstrap tokens /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:55 STEP: create a new bootstrap token secret STEP: wait for the bootstrap token secret be signed [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 May 21 16:42:36.558: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-1201" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 STEP: delete the bootstrap token secret • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens","total":-1,"completed":1,"skipped":428,"failed":0} May 21 16:42:36.576: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client May 21 16:42:34.665: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner May 21 16:42:34.691: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 21 16:42:34.695: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should delete the token secret when the secret expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:51 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 May 21 16:42:36.706: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-5178" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the token secret when the secret expired","total":-1,"completed":1,"skipped":552,"failed":0} May 21 16:42:36.718: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client May 21 16:42:34.259: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer May 21 16:42:34.287: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 21 16:42:34.291: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:108 STEP: create a new bootstrap token secret STEP: wait for the bootstrap secret be signed STEP: delete the bootstrap token secret STEP: wait for the bootstrap token removed from cluster-info ConfigMap [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 May 21 16:42:38.312: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-5737" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 • ------------------------------ [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:174 STEP: Creating a kubernetes client May 21 16:42:34.169: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner May 21 16:42:34.234: INFO: Found PodSecurityPolicies; testing pod creation to see if PodSecurityPolicy is enabled May 21 16:42:34.239: INFO: No PSP annotation exists on dry run pod; assuming PodSecurityPolicy is disabled STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret not be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:175 May 21 16:42:54.253: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-5214" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 STEP: delete the bootstrap token secret • [SLOW TEST:20.100 seconds] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/framework.go:23 should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should not delete the token secret when the secret is not expired","total":-1,"completed":1,"skipped":212,"failed":0} May 21 16:42:54.270: INFO: Running AfterSuite actions on all nodes {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted","total":-1,"completed":1,"skipped":254,"failed":0} May 21 16:42:38.324: INFO: Running AfterSuite actions on all nodes May 21 16:42:54.333: INFO: Running AfterSuite actions on node 1 May 21 16:42:54.333: INFO: Skipping dumping logs from cluster Ran 4 of 5484 Specs in 26.822 seconds SUCCESS! -- 4 Passed | 0 Failed | 0 Pending | 5480 Skipped Ginkgo ran 1 suite in 28.455084167s Test Suite Passed