{"msg":"Test Suite starting","completed":0,"skipped":0,"failed":0} Running Suite: Kubernetes e2e suite - /usr/local/bin ==================================================== Random Seed: 1675384344 - will randomize all specs Will run 67 of 7066 specs Running in parallel across 10 processes ------------------------------ [SynchronizedBeforeSuite] PASSED [0.049 seconds] [SynchronizedBeforeSuite] test/e2e/e2e.go:76 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite starting","completed":0,"skipped":0,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.044 seconds] [sig-node] ConfigMap should update ConfigMap successfully test/e2e/common/node/configmap.go:142 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] ConfigMap should update ConfigMap successfully","completed":1,"skipped":5,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.022 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:34 can disable an AppArmor profile, using unconfined test/e2e/node/apparmor.go:49 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:32:24.85 Feb 3 00:32:24.850: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 02/03/23 00:32:24.851 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:32:24.86 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:32:24.862 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:34 Feb 3 00:32:24.865: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:38 [AfterEach] [sig-node] AppArmor test/e2e/framework/framework.go:187 Feb 3 00:32:24.865: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "apparmor-2439" for this suite. 02/03/23 00:32:24.868 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:311 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [3.051 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance] test/e2e/common/node/runtime.go:381 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]","completed":1,"skipped":52,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.035 seconds] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] test/e2e/common/node/security_context.go:540 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]","completed":1,"skipped":131,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.066 seconds] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] test/e2e/common/node/downwardapi.go:110 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]","completed":1,"skipped":12,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [6.061 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] test/e2e/common/node/sysctl.go:185 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23]","completed":1,"skipped":77,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.053 seconds] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:111 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]","completed":1,"skipped":72,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.053 seconds] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly] test/e2e/node/security_context.go:163 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]","completed":1,"skipped":588,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [3.060 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance] test/e2e/common/node/runtime.go:375 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]","completed":2,"skipped":144,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.044 seconds] [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done test/e2e/node/pods.go:232 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done","completed":2,"skipped":45,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.034 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly] test/e2e/common/node/security_context.go:397 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]","completed":3,"skipped":187,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.043 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21] test/e2e/common/node/sysctl.go:159 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]","completed":3,"skipped":88,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSS ------------------------------ • [4.048 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly] test/e2e/common/node/security_context.go:387 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]","completed":2,"skipped":200,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.038 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID test/e2e/common/node/security_context.go:417 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID","completed":4,"skipped":234,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.024 seconds] [sig-node] RuntimeClass test/e2e/node/framework.go:23 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:129 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] RuntimeClass test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:32:36.057 Feb 3 00:32:36.057: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename runtimeclass 02/03/23 00:32:36.058 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:32:36.067 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:32:36.07 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:129 Feb 3 00:32:36.073: INFO: Only supported for providers [gce] (not local) [AfterEach] [sig-node] RuntimeClass test/e2e/framework/framework.go:187 Feb 3 00:32:36.074: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "runtimeclass-9663" for this suite. 02/03/23 00:32:36.077 << End Captured GinkgoWriter Output Only supported for providers [gce] (not local) In [It] at: test/e2e/node/runtimeclass.go:132 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.025 seconds] [sig-node] crictl [BeforeEach] test/e2e/node/crictl.go:35 should be able to run crictl on the node test/e2e/node/crictl.go:40 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] crictl test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:32:36.144 Feb 3 00:32:36.144: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename crictl 02/03/23 00:32:36.146 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:32:36.155 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:32:36.158 [BeforeEach] [sig-node] crictl test/e2e/node/crictl.go:35 Feb 3 00:32:36.161: INFO: Only supported for providers [gce gke] (not local) [AfterEach] [sig-node] crictl test/e2e/framework/framework.go:187 Feb 3 00:32:36.162: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "crictl-273" for this suite. 02/03/23 00:32:36.165 << End Captured GinkgoWriter Output Only supported for providers [gce gke] (not local) In [BeforeEach] at: test/e2e/node/crictl.go:37 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [5.066 seconds] [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance] test/e2e/common/node/runtime.go:173 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]","completed":3,"skipped":244,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [5.235 seconds] [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace test/e2e/node/examples.go:136 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace","completed":4,"skipped":101,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.055 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:79 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]","completed":4,"skipped":318,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [24.079 seconds] [sig-node] Probing container should be restarted with a local redirect http liveness probe test/e2e/common/node/container_probe.go:278 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a local redirect http liveness probe","completed":1,"skipped":143,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSS ------------------------------ • [SLOW TEST] [22.063 seconds] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process test/e2e/node/pre_stop.go:172 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process","completed":5,"skipped":482,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [28.092 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:487 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod]","completed":2,"skipped":588,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.061 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] test/e2e/node/security_context.go:71 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]","completed":6,"skipped":506,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [14.066 seconds] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe test/e2e/common/node/container_probe.go:558 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe","completed":2,"skipped":149,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.058 seconds] [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly] test/e2e/node/security_context.go:171 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly]","completed":3,"skipped":213,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [62.171 seconds] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout test/e2e/common/node/container_probe.go:261 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout","completed":2,"skipped":277,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.036 seconds] [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector test/e2e/node/runtimeclass.go:44 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector","completed":3,"skipped":396,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.034 seconds] [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace test/e2e/common/node/node_lease.go:52 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace","completed":4,"skipped":504,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [36.060 seconds] [sig-node] Probing container should be ready immediately after startupProbe succeeds test/e2e/common/node/container_probe.go:404 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be ready immediately after startupProbe succeeds","completed":3,"skipped":801,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [74.181 seconds] [sig-node] Probing container should be restarted startup probe fails test/e2e/common/node/container_probe.go:317 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted startup probe fails","completed":1,"skipped":109,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [62.067 seconds] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:244 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]","completed":5,"skipped":790,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [80.048 seconds] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently test/e2e/common/node/node_lease.go:114 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease the kubelet should report node status infrequently","completed":2,"skipped":47,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSS ------------------------------ S [SKIPPED] [0.028 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:34 should enforce an AppArmor profile test/e2e/node/apparmor.go:45 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:33:50.841 Feb 3 00:33:50.841: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 02/03/23 00:33:50.843 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:33:50.853 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:33:50.857 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:34 Feb 3 00:33:50.861: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:38 [AfterEach] [sig-node] AppArmor test/e2e/framework/framework.go:187 Feb 3 00:33:50.861: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "apparmor-2103" for this suite. 02/03/23 00:33:50.865 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:311 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [14.081 seconds] [sig-node] Pods should support pod readiness gates [NodeConformance] test/e2e/common/node/pods.go:770 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should support pod readiness gates [NodeConformance]","completed":2,"skipped":325,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [74.066 seconds] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating test/e2e/common/node/container_probe.go:623 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating","completed":5,"skipped":299,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [52.153 seconds] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:227 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]","completed":7,"skipped":624,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.046 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:593 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]","completed":3,"skipped":218,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSS ------------------------------ • [2.455 seconds] [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly] test/e2e/common/node/privileged.go:52 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]","completed":4,"skipped":237,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSS ------------------------------ • [4.038 seconds] [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:357 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]","completed":6,"skipped":444,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [1.050 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] test/e2e/common/node/runtime.go:370 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]","completed":5,"skipped":243,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.026 seconds] [sig-node] NodeProblemDetector [BeforeEach] test/e2e/node/node_problem_detector.go:54 should run without error test/e2e/node/node_problem_detector.go:62 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] NodeProblemDetector test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:33:58.572 Feb 3 00:33:58.572: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename node-problem-detector 02/03/23 00:33:58.574 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:33:58.583 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:33:58.587 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/node/node_problem_detector.go:54 Feb 3 00:33:58.590: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] NodeProblemDetector test/e2e/framework/framework.go:187 Feb 3 00:33:58.591: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "node-problem-detector-3942" for this suite. 02/03/23 00:33:58.594 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/node_problem_detector.go:55 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [2.043 seconds] [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS test/e2e/common/node/pod_admission.go:39 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS","completed":7,"skipped":629,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSS ------------------------------ • [SLOW TEST] [6.050 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID test/e2e/common/node/security_context.go:409 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID","completed":8,"skipped":803,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.038 seconds] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:475 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]","completed":6,"skipped":251,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [18.405 seconds] [sig-node] Mount propagation should propagate mounts within defined scopes test/e2e/node/mount_propagation.go:85 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Mount propagation should propagate mounts within defined scopes","completed":3,"skipped":370,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [70.201 seconds] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:543 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance]","completed":4,"skipped":267,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [25.109 seconds] [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s. test/e2e/node/kubelet.go:344 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.","completed":9,"skipped":829,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.090 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance] test/e2e/common/node/runtime.go:386 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]","completed":5,"skipped":349,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.044 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:625 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]","completed":6,"skipped":542,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [50.049 seconds] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal test/e2e/node/pods.go:302 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal","completed":6,"skipped":827,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSS ------------------------------ • [SLOW TEST] [28.089 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:459 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod]","completed":7,"skipped":506,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [0.031 seconds] [sig-node] NodeLease NodeLease should have OwnerReferences set test/e2e/common/node/node_lease.go:90 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] NodeLease NodeLease should have OwnerReferences set","completed":8,"skipped":576,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [11.058 seconds] [sig-node] Pods Extended Delete Grace Period should be submitted and removed test/e2e/node/pods.go:68 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Delete Grace Period should be submitted and removed","completed":10,"skipped":986,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [4.061 seconds] [sig-node] Security Context should support seccomp runtime/default [LinuxOnly] test/e2e/node/security_context.go:178 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp runtime/default [LinuxOnly]","completed":9,"skipped":715,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.054 seconds] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly] test/e2e/node/security_context.go:185 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]","completed":7,"skipped":835,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.914 seconds] [sig-node] [Feature:Example] Secret should create a pod that reads a secret test/e2e/node/examples.go:116 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Secret should create a pod that reads a secret","completed":10,"skipped":894,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.024 seconds] [sig-node] SSH [BeforeEach] test/e2e/node/ssh.go:38 should SSH to all nodes and run commands test/e2e/node/ssh.go:47 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] SSH test/e2e/framework/framework.go:186 STEP: Creating a kubernetes client 02/03/23 00:34:48.376 Feb 3 00:34:48.376: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename ssh 02/03/23 00:34:48.377 STEP: Waiting for a default service account to be provisioned in namespace 02/03/23 00:34:48.387 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 02/03/23 00:34:48.39 [BeforeEach] [sig-node] SSH test/e2e/node/ssh.go:38 Feb 3 00:34:48.393: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] SSH test/e2e/framework/framework.go:187 Feb 3 00:34:48.393: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "ssh-2633" for this suite. 02/03/23 00:34:48.396 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/ssh.go:44 ------------------------------ SSSSSSSSS ------------------------------ • [SLOW TEST] [74.982 seconds] [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted test/e2e/node/examples.go:69 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted","completed":5,"skipped":736,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":5,"skipped":793,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [14.057 seconds] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running test/e2e/node/events.go:41 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running ","completed":7,"skipped":560,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":7,"skipped":560,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [82.277 seconds] [sig-node] Pods Extended Pod Container Status should never report success for a pending container test/e2e/node/pods.go:208 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container Status should never report success for a pending container","completed":4,"skipped":646,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":4,"skipped":646,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [72.967 seconds] [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails test/e2e/node/pods.go:216 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails","completed":11,"skipped":1005,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":11,"skipped":1005,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [64.158 seconds] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it test/e2e/common/node/container_probe.go:375 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should be restarted by liveness probe after startup probe enables it","completed":8,"skipped":860,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [246.519 seconds] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:520 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance]","completed":2,"skipped":93,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":2,"skipped":93,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [252.536 seconds] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe test/e2e/common/node/container_probe.go:293 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe","completed":8,"skipped":635,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":8,"skipped":635,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [244.534 seconds] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it test/e2e/common/node/container_probe.go:346 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it","completed":11,"skipped":1349,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":11,"skipped":1349,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [408.988 seconds] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance] test/e2e/common/node/pods.go:675 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]","completed":4,"skipped":978,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":4,"skipped":978,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ • [SLOW TEST] [1620.239 seconds] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance] test/e2e/common/node/pods.go:716 Begin Captured StdOut/StdErr Output >> {"msg":"PASSED [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]","completed":1,"skipped":86,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [0.000 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":1,"skipped":86,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ [SynchronizedAfterSuite] PASSED [1414.266 seconds] [SynchronizedAfterSuite] test/e2e/e2e.go:87 Begin Captured StdOut/StdErr Output >> {"msg":"Test Suite completed","completed":8,"skipped":860,"failed":0} << End Captured StdOut/StdErr Output ------------------------------ Ran 61 of 7066 Specs in 1620.505 seconds SUCCESS! -- 61 Passed | 0 Failed | 0 Pending | 7005 Skipped Ginkgo ran 1 suite in 27m1.1152079s Test Suite Passed