Running Suite: Kubernetes e2e suite =================================== Random Seed: 1618444611 - Will randomize all specs Will run 4994 specs Running in parallel across 25 nodes Apr 14 23:56:53.049: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.056: INFO: Waiting up to 30m0s for all (but 0) nodes to be schedulable Apr 14 23:56:53.084: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready Apr 14 23:56:53.147: INFO: The status of Pod cmk-init-discover-node2-tqmv6 is Succeeded, skipping waiting Apr 14 23:56:53.147: INFO: 40 / 41 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) Apr 14 23:56:53.147: INFO: expected 8 pod replicas in namespace 'kube-system', 8 are Running and Ready. Apr 14 23:56:53.147: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start Apr 14 23:56:53.160: INFO: 2 / 2 pods ready in namespace 'kube-system' in daemonset 'cmk' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: 5 / 5 pods ready in namespace 'kube-system' in daemonset 'kube-flannel' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: 5 / 5 pods ready in namespace 'kube-system' in daemonset 'kube-multus-ds-amd64' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: 5 / 5 pods ready in namespace 'kube-system' in daemonset 'kube-proxy' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: 2 / 2 pods ready in namespace 'kube-system' in daemonset 'node-feature-discovery-worker' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: 2 / 2 pods ready in namespace 'kube-system' in daemonset 'sriov-net-dp-kube-sriov-device-plugin-amd64' (0 seconds elapsed) Apr 14 23:56:53.160: INFO: e2e test version: v1.18.17 Apr 14 23:56:53.161: INFO: kube-apiserver version: v1.18.8 Apr 14 23:56:53.162: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.167: INFO: Cluster IP family: ipv4 SSSSSSSSSSSS ------------------------------ Apr 14 23:56:53.167: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.189: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.165: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.190: INFO: Cluster IP family: ipv4 SSS ------------------------------ Apr 14 23:56:53.169: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.192: INFO: Cluster IP family: ipv4 S ------------------------------ Apr 14 23:56:53.173: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.194: INFO: Cluster IP family: ipv4 S ------------------------------ Apr 14 23:56:53.173: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.195: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ Apr 14 23:56:53.177: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.198: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.176: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.198: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ Apr 14 23:56:53.174: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.200: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSS ------------------------------ Apr 14 23:56:53.183: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.206: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.185: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.207: INFO: Cluster IP family: ipv4 SSSS ------------------------------ Apr 14 23:56:53.188: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.209: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.185: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.209: INFO: Cluster IP family: ipv4 S ------------------------------ Apr 14 23:56:53.191: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.210: INFO: Cluster IP family: ipv4 SSSSSSSSSS ------------------------------ Apr 14 23:56:53.191: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.215: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSS ------------------------------ Apr 14 23:56:53.199: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.222: INFO: Cluster IP family: ipv4 SSSSSSSS ------------------------------ Apr 14 23:56:53.202: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.224: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.201: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.224: INFO: Cluster IP family: ipv4 SSSSSSS ------------------------------ Apr 14 23:56:53.202: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.226: INFO: Cluster IP family: ipv4 S ------------------------------ Apr 14 23:56:53.204: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.228: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.205: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.228: INFO: Cluster IP family: ipv4 SSSSSS ------------------------------ Apr 14 23:56:53.207: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.230: INFO: Cluster IP family: ipv4 Apr 14 23:56:53.208: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.230: INFO: Cluster IP family: ipv4 SSSSSSSS ------------------------------ Apr 14 23:56:53.205: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.229: INFO: Cluster IP family: ipv4 SSSSS ------------------------------ Apr 14 23:56:53.213: INFO: >>> kubeConfig: /root/.kube/config Apr 14 23:56:53.235: INFO: Cluster IP family: ipv4 SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes SSSS ------------------------------ Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes S ------------------------------ Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.089: INFO: Running AfterSuite actions on all nodes S ------------------------------ Apr 14 23:56:54.089: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.089: INFO: Running AfterSuite actions on all nodes S ------------------------------ Apr 14 23:56:54.089: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes S ------------------------------ Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.089: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.090: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.088: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.090: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.091: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.090: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:178 STEP: Creating a kubernetes client Apr 14 23:56:53.530: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner Apr 14 23:56:53.549: INFO: Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled. Apr 14 23:56:53.563: INFO: Found ClusterRoles; assuming RBAC is enabled. STEP: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in bootstrap-token-cleaner-6131 STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should delete the token secret when the secret expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:51 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:179 Apr 14 23:56:55.676: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-6131" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the token secret when the secret expired","total":-1,"completed":1,"skipped":51,"failed":0} Apr 14 23:56:55.686: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:178 STEP: Creating a kubernetes client Apr 14 23:56:54.043: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer Apr 14 23:56:54.065: INFO: Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled. Apr 14 23:56:54.076: INFO: Found ClusterRoles; assuming RBAC is enabled. STEP: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in bootstrap-signer-8956 STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should sign the new added bootstrap tokens /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:55 STEP: create a new bootstrap token secret STEP: wait for the bootstrap token secret be signed [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:179 Apr 14 23:56:56.190: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-8956" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 STEP: delete the bootstrap token secret • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens","total":-1,"completed":1,"skipped":207,"failed":0} Apr 14 23:56:56.206: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:178 STEP: Creating a kubernetes client Apr 14 23:56:53.842: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-signer Apr 14 23:56:53.861: INFO: Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled. Apr 14 23:56:53.870: INFO: Found ClusterRoles; assuming RBAC is enabled. STEP: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in bootstrap-signer-6611 STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:51 [It] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:108 STEP: create a new bootstrap token secret STEP: wait for the bootstrap secret be signed STEP: delete the bootstrap token secret STEP: wait for the bootstrap token removed from cluster-info ConfigMap [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:179 Apr 14 23:56:57.991: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-signer-6611" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_signer.go:43 • ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted","total":-1,"completed":1,"skipped":131,"failed":0} Apr 14 23:56:58.000: INFO: Running AfterSuite actions on all nodes [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:178 STEP: Creating a kubernetes client Apr 14 23:56:53.747: INFO: >>> kubeConfig: /root/.kube/config STEP: Building a namespace api object, basename bootstrap-token-cleaner Apr 14 23:56:53.777: INFO: Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled. Apr 14 23:56:53.788: INFO: Found ClusterRoles; assuming RBAC is enabled. STEP: Binding the e2e-test-privileged-psp PodSecurityPolicy to the default service account in bootstrap-token-cleaner-4012 STEP: Waiting for a default service account to be provisioned in namespace [BeforeEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:39 [It] should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 STEP: create a new expired bootstrap token secret STEP: wait for the bootstrap token secret not be deleted [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/framework/framework.go:179 Apr 14 23:57:13.905: INFO: Waiting up to 3m0s for all (but 0) nodes to be ready STEP: Destroying namespace "bootstrap-token-cleaner-4012" for this suite. [AfterEach] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:43 STEP: delete the bootstrap token secret • [SLOW TEST:20.172 seconds] [sig-cluster-lifecycle] [Feature:BootstrapTokens] /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/framework.go:23 should not delete the token secret when the secret is not expired /workspace/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/lifecycle/bootstrap/bootstrap_token_cleaner.go:69 ------------------------------ {"msg":"PASSED [sig-cluster-lifecycle] [Feature:BootstrapTokens] should not delete the token secret when the secret is not expired","total":-1,"completed":1,"skipped":108,"failed":0} Apr 14 23:57:13.921: INFO: Running AfterSuite actions on all nodes Apr 14 23:56:54.087: INFO: Running AfterSuite actions on all nodes Apr 14 23:57:13.932: INFO: Running AfterSuite actions on node 1 Apr 14 23:57:13.932: INFO: Skipping dumping logs from cluster Ran 4 of 4994 Specs in 21.119 seconds SUCCESS! -- 4 Passed | 0 Failed | 0 Pending | 4990 Skipped Ginkgo ran 1 suite in 22.578238171s Test Suite Passed