Running Suite: Kubernetes e2e suite - /usr/local/bin ==================================================== Random Seed: 1712856832 - will randomize all specs Will run 70 of 7069 specs Running in parallel across 10 processes SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [13.093 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] test/e2e/common/node/runtime.go:371 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.030 seconds] [sig-node] SSH [BeforeEach] test/e2e/node/ssh.go:38 should SSH to all nodes and run commands test/e2e/node/ssh.go:47 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] SSH set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:34:05.632 Apr 11 17:34:05.632: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename ssh 04/11/24 17:34:05.633 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:34:05.644 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:34:05.648 [BeforeEach] [sig-node] SSH test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] SSH test/e2e/node/ssh.go:38 Apr 11 17:34:05.652: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] SSH test/e2e/framework/node/init/init.go:32 Apr 11 17:34:05.652: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] SSH test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] SSH dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] SSH tear down framework | framework.go:193 STEP: Destroying namespace "ssh-5404" for this suite. 04/11/24 17:34:05.657 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/ssh.go:44 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [20.303 seconds] [sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID test/e2e/common/node/security_context.go:410 ------------------------------ SSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [20.697 seconds] [sig-node] [Feature:Example] Secret should create a pod that reads a secret test/e2e/node/examples.go:118 ------------------------------ SSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [23.258 seconds] [sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace test/e2e/node/examples.go:138 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.070 seconds] [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] test/e2e/common/node/downwardapi.go:111 ------------------------------ SSSSSSSS ------------------------------ • [SLOW TEST] [13.089 seconds] [sig-node] Pods Extended Delete Grace Period should be submitted and removed test/e2e/node/pods.go:68 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.049 seconds] [sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:476 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.062 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:463 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.055 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:626 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.070 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] test/e2e/node/security_context.go:72 ------------------------------ SSSSSSSSSSS ------------------------------ • [SLOW TEST] [40.062 seconds] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process test/e2e/node/pre_stop.go:172 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [41.022 seconds] [sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s. test/e2e/node/kubelet.go:346 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.038 seconds] [sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] test/e2e/common/node/security_context.go:594 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [14.059 seconds] [sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done test/e2e/node/pods.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.067 seconds] [sig-node] Security Context when if the container's primary UID belongs to some groups in the image [LinuxOnly] should add pod.Spec.SecurityContext.SupplementalGroups to them [LinuxOnly] in resultant supplementary groups for the container processes test/e2e/node/security_context.go:81 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [52.042 seconds] [sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal test/e2e/node/pods.go:302 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.032 seconds] [sig-node] NodeProblemDetector [BeforeEach] test/e2e/node/node_problem_detector.go:54 should run without error test/e2e/node/node_problem_detector.go:62 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] NodeProblemDetector set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:34:44.664 Apr 11 17:34:44.664: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename node-problem-detector 04/11/24 17:34:44.666 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:34:44.677 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:34:44.681 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] NodeProblemDetector test/e2e/node/node_problem_detector.go:54 Apr 11 17:34:44.685: INFO: No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' [AfterEach] [sig-node] NodeProblemDetector test/e2e/framework/node/init/init.go:32 Apr 11 17:34:44.686: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] NodeProblemDetector test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] NodeProblemDetector dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] NodeProblemDetector tear down framework | framework.go:193 STEP: Destroying namespace "node-problem-detector-8764" for this suite. 04/11/24 17:34:44.691 << End Captured GinkgoWriter Output No SSH Key for provider local: 'error reading SSH key /home/xtesting/.ssh/id_rsa: 'open /home/xtesting/.ssh/id_rsa: no such file or directory'' In [BeforeEach] at: test/e2e/node/node_problem_detector.go:55 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [58.142 seconds] [sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:231 ------------------------------ SSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS• ------------------------------ • [SLOW TEST] [6.068 seconds] [sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly] test/e2e/node/security_context.go:195 ------------------------------ SSSSSSSSSS ------------------------------ • [SLOW TEST] [33.845 seconds] [sig-node] Mount propagation should propagate mounts within defined scopes test/e2e/node/mount_propagation.go:86 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.085 seconds] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running test/e2e/node/events.go:41 ------------------------------ SSS ------------------------------ S [SKIPPED] [0.026 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:35 can disable an AppArmor profile, using unconfined test/e2e/node/apparmor.go:50 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:35:05.901 Apr 11 17:35:05.902: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 04/11/24 17:35:05.903 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:35:05.912 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:35:05.916 [BeforeEach] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:31 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:35 Apr 11 17:35:05.919: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:39 [AfterEach] [sig-node] AppArmor test/e2e/framework/node/init/init.go:32 Apr 11 17:35:05.919: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] AppArmor dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] AppArmor tear down framework | framework.go:193 STEP: Destroying namespace "apparmor-7446" for this suite. 04/11/24 17:35:05.923 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [16.096 seconds] [sig-node] Pods should support pod readiness gates [NodeConformance] test/e2e/common/node/pods.go:771 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [80.053 seconds] [sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance] test/e2e/common/node/container_probe.go:248 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.025 seconds] [sig-node] RuntimeClass test/e2e/node/framework.go:23 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:130 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] RuntimeClass set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:35:12.652 Apr 11 17:35:12.652: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename runtimeclass 04/11/24 17:35:12.654 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:35:12.664 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:35:12.667 [BeforeEach] [sig-node] RuntimeClass test/e2e/framework/metrics/init/init.go:31 [It] should run a Pod requesting a RuntimeClass with scheduling without taints test/e2e/node/runtimeclass.go:130 Apr 11 17:35:12.670: INFO: Only supported for providers [gce] (not local) [AfterEach] [sig-node] RuntimeClass test/e2e/framework/node/init/init.go:32 Apr 11 17:35:12.670: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] RuntimeClass test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] RuntimeClass dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] RuntimeClass tear down framework | framework.go:193 STEP: Destroying namespace "runtimeclass-143" for this suite. 04/11/24 17:35:12.673 << End Captured GinkgoWriter Output Only supported for providers [gce] (not local) In [It] at: test/e2e/node/runtimeclass.go:133 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.053 seconds] [sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] test/e2e/common/node/security_context.go:541 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [42.061 seconds] [sig-node] Probing container should be ready immediately after startupProbe succeeds test/e2e/common/node/container_probe.go:408 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS•SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [80.209 seconds] [sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:547 ------------------------------ SSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [24.099 seconds] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] test/e2e/common/node/lifecycle_hook.go:189 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [10.057 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] test/e2e/common/node/sysctl.go:185 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.067 seconds] [sig-node] Security Context should support seccomp runtime/default [LinuxOnly] test/e2e/node/security_context.go:210 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [70.195 seconds] [sig-node] Probing container should be restarted by liveness probe after startup probe enables it test/e2e/common/node/container_probe.go:379 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.100 seconds] [sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance] test/e2e/common/node/runtime.go:387 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.047 seconds] [sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21] test/e2e/common/node/sysctl.go:159 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [6.064 seconds] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:143 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [24.606 seconds] [sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe test/e2e/common/node/container_probe.go:562 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.070 seconds] [sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod] test/e2e/common/node/container_probe.go:491 ------------------------------ SSSSSSS ------------------------------ S [SKIPPED] [0.032 seconds] [sig-node] crictl [BeforeEach] test/e2e/node/crictl.go:35 should be able to run crictl on the node test/e2e/node/crictl.go:40 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] crictl set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:36:19.999 Apr 11 17:36:19.999: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename crictl 04/11/24 17:36:20.001 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:36:20.012 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:36:20.016 [BeforeEach] [sig-node] crictl test/e2e/framework/metrics/init/init.go:31 [BeforeEach] [sig-node] crictl test/e2e/node/crictl.go:35 Apr 11 17:36:20.020: INFO: Only supported for providers [gce gke] (not local) [AfterEach] [sig-node] crictl test/e2e/framework/node/init/init.go:32 Apr 11 17:36:20.020: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] crictl test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] crictl dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] crictl tear down framework | framework.go:193 STEP: Destroying namespace "crictl-9577" for this suite. 04/11/24 17:36:20.025 << End Captured GinkgoWriter Output Only supported for providers [gce gke] (not local) In [BeforeEach] at: test/e2e/node/crictl.go:37 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [26.092 seconds] [sig-node] Probing container should be restarted with a local redirect http liveness probe test/e2e/common/node/container_probe.go:282 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.059 seconds] [sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly] test/e2e/node/security_context.go:203 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ S [SKIPPED] [0.037 seconds] [sig-node] AppArmor test/e2e/node/framework.go:23 load AppArmor profiles [BeforeEach] test/e2e/node/apparmor.go:35 should enforce an AppArmor profile test/e2e/node/apparmor.go:46 Begin Captured GinkgoWriter Output >> [BeforeEach] [sig-node] AppArmor set up framework | framework.go:178 STEP: Creating a kubernetes client 04/11/24 17:36:23.471 Apr 11 17:36:23.471: INFO: >>> kubeConfig: /home/xtesting/.kube/config STEP: Building a namespace api object, basename apparmor 04/11/24 17:36:23.473 STEP: Waiting for a default service account to be provisioned in namespace 04/11/24 17:36:23.483 STEP: Waiting for kube-root-ca.crt to be provisioned in namespace 04/11/24 17:36:23.487 [BeforeEach] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:31 [BeforeEach] load AppArmor profiles test/e2e/node/apparmor.go:35 Apr 11 17:36:23.491: INFO: Only supported for node OS distro [gci ubuntu] (not debian) [AfterEach] load AppArmor profiles test/e2e/node/apparmor.go:39 [AfterEach] [sig-node] AppArmor test/e2e/framework/node/init/init.go:32 Apr 11 17:36:23.492: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready [DeferCleanup (Each)] [sig-node] AppArmor test/e2e/framework/metrics/init/init.go:33 [DeferCleanup (Each)] [sig-node] AppArmor dump namespaces | framework.go:196 [DeferCleanup (Each)] [sig-node] AppArmor tear down framework | framework.go:193 STEP: Destroying namespace "apparmor-6388" for this suite. 04/11/24 17:36:23.498 << End Captured GinkgoWriter Output Only supported for node OS distro [gci ubuntu] (not debian) In [BeforeEach] at: test/e2e/framework/skipper/skipper.go:232 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [80.057 seconds] [sig-node] NodeLease NodeLease the kubelet should report node status infrequently test/e2e/common/node/node_lease.go:114 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [8.069 seconds] [sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly] test/e2e/node/security_context.go:217 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [75.203 seconds] [sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted test/e2e/node/examples.go:71 ------------------------------ SSSSSSSSSSSS ------------------------------ • [SLOW TEST] [94.173 seconds] [sig-node] Pods Extended Pod Container Status should never report success for a pending container test/e2e/node/pods.go:208 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [22.087 seconds] [sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] test/e2e/common/node/lifecycle_hook.go:234 ------------------------------ SSSSS ------------------------------ • [SLOW TEST] [8.068 seconds] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] test/e2e/node/security_context.go:111 ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [SLOW TEST] [66.178 seconds] [sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout test/e2e/common/node/container_probe.go:265 ------------------------------ • [SLOW TEST] [87.641 seconds] [sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating test/e2e/common/node/container_probe.go:626 ------------------------------ • [SLOW TEST] [69.700 seconds] [sig-node] Pods Extended Pod Container Status should never report container start when an init container fails test/e2e/node/pods.go:216 ------------------------------ • [SLOW TEST] [74.206 seconds] [sig-node] Probing container should be restarted startup probe fails test/e2e/common/node/container_probe.go:321 ------------------------------ • [SLOW TEST] [248.547 seconds] [sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] test/e2e/common/node/container_probe.go:524 ------------------------------ • [SLOW TEST] [246.550 seconds] [sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it test/e2e/common/node/container_probe.go:350 ------------------------------ • [SLOW TEST] [252.557 seconds] [sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe test/e2e/common/node/container_probe.go:297 ------------------------------ • [SLOW TEST] [414.071 seconds] [sig-node] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance] test/e2e/common/node/pods.go:676 ------------------------------ • [SLOW TEST] [1623.661 seconds] [sig-node] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance] test/e2e/common/node/pods.go:717 ------------------------------ Ran 64 of 7069 Specs in 1664.159 seconds SUCCESS! -- 64 Passed | 0 Failed | 0 Pending | 7005 Skipped Ginkgo ran 1 suite in 27m45.149650841s Test Suite Passed