This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 806 failed / 150 succeeded
Started2022-11-24 02:52
Elapsed55m34s
Revision
Builderf5d4c719-6ba2-11ed-a6da-22215f11743a
control_plane_node_os_imagecos-97-16919-103-16
infra-commit0915cbf7b
job-versionv1.27.0-alpha.0.42+7530baa9a186a0
kubetest-versionv20221116-7c85504268
repogithub.com/containerd/containerd
repo-commitd06318622178a2209338d7f57eb8800b9f2e72fb
repos{u'github.com/containerd/containerd': u'main'}
revisionv1.27.0-alpha.0.42+7530baa9a186a0
worker_node_os_imagecos-97-16919-103-16

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness) 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAPI\spriority\sand\sfairness\sshould\sensure\sthat\srequests\scan\'t\sbe\sdrowned\sout\s\(fairness\)$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009bcf00)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority) 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAPI\spriority\sand\sfairness\sshould\sensure\sthat\srequests\scan\'t\sbe\sdrowned\sout\s\(priority\)$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000fbef00)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\slisting\smutating\swebhooks\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000999e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\slisting\svalidating\swebhooks\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000999e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000ecbe00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\svalidating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b7d950)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000919e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 2m35s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010cbe00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\spod\sand\sconfigmap\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057de00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] 1m21s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sdeny\scrd\screation\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:2041
k8s.io/kubernetes/test/e2e/apimachinery.registerValidatingWebhookForCRD(0xc0002efe00, {0xc003c47900, 0xb}, 0xc003b54dc0, 0x0?)
	test/e2e/apimachinery/webhook.go:2041 +0x792
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.12()
	test/e2e/apimachinery/webhook.go:309 +0x45
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\shonor\stimeout\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000e9fe00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\swebhook\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057de00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\sconfigmap\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000af9e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000999e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] 2m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\sdifferent\sstored\sversion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010e9e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\spod\sand\sapply\sdefaults\safter\smutation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000af9e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] 2m23s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\snot\sbe\sable\sto\smutate\sor\sprevent\sdeletion\sof\swebhook\sconfiguration\sobjects\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010e9e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sunconditionally\sreject\soperations\son\sfail\sclosed\swebhook\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00106be00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAggregator\sShould\sbe\sable\sto\ssupport\sthe\s1\.17\sSample\sAPI\sServer\susing\sthe\scurrent\sAggregator\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00127d4a0)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanTest({0x0, 0x0}, 0x5?, {0x0, 0x0})
  	test/e2e/apimachinery/aggregator.go:108 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func1.1()
  	test/e2e/apimachinery/aggregator.go:69 +0x36

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceConversionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sconvert\sa\snon\shomogeneous\slist\sof\sCRs\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b0e870)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanCRDWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/crd_conversion_webhook.go:214 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func5.2()
  	test/e2e/apimachinery/crd_conversion_webhook.go:140 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceConversionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sconvert\sfrom\sCR\sv1\sto\sCR\sv2\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010e8870)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanCRDWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/crd_conversion_webhook.go:214 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func5.2()
  	test/e2e/apimachinery/crd_conversion_webhook.go:140 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance] 2m7s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sWatch\s\[Privileged\:ClusterAdmin\]\sCustomResourceDefinition\sWatch\swatch\son\scustom\sresource\sdefinition\sobjects\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009bcb40)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\screating\/deleting\scustom\sresource\sdefinition\sobjects\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000258c30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] 2m9s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\sgetting\/updating\/patching\scustom\sresource\sdefinition\sstatus\ssub\-resource\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009bcc30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\slisting\scustom\sresource\sdefinition\sobjects\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00127dc20)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\scustom\sresource\sdefaulting\sfor\srequests\sand\sfrom\sstorage\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010a6c30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\scustom\sresource\sdefinition\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057cc30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sremoves\sdefinition\sfrom\sspec\swhen\sone\sversion\sgets\schanged\sto\snot\sbe\sserved\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000918960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\supdates\sthe\spublished\sspec\swhen\sone\sversion\sgets\srenamed\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010ce960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance] 2m5s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sat\sthe\sschema\sroot\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000998960)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 03:11:28.157: failed to list events in namespace "crd-publish-openapi-7222": Get "https://35.233.128.173/api/v1/namespaces/crd-publish-openapi-7222/events": dial tcp 35.233.128.173:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 03:11:28.197: Couldn't delete ns: "crd-publish-openapi-7222": Delete "https://35.233.128.173/api/v1/namespaces/crd-publish-openapi-7222": dial tcp 35.233.128.173:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.128.173/api/v1/namespaces/crd-publish-openapi-7222", Err:(*net.OpError)(0xc00363a5a0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sin\san\sembedded\sobject\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b7c4b0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\swith\svalidation\sschema\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f8960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\swithout\svalidation\sschema\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001194780)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\sdifferent\sgroups\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057c960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\ssame\sgroup\sand\sversion\sbut\sdifferent\skinds\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010a6960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\ssame\sgroup\sbut\sdifferent\sversions\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b7c4b0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sNOT\sfail\svalidation\sfor\screate\sof\sa\scustom\sresource\sthat\ssatisfies\sthe\sx\-kubernetes\-validations\srules$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010e8a50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that contains a syntax error 3m9s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\screate\sof\sa\scustom\sresource\sdefinition\sthat\scontains\san\sx\-kubernetes\-validations\srule\sthat\scontains\sa\ssyntax\serror$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000ecaa50)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 03:15:26.916: failed to list events in namespace "crd-validation-expressions-3210": Get "https://35.233.128.173/api/v1/namespaces/crd-validation-expressions-3210/events": dial tcp 35.233.128.173:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 03:15:26.956: Couldn't delete ns: "crd-validation-expressions-3210": Delete "https://35.233.128.173/api/v1/namespaces/crd-validation-expressions-3210": dial tcp 35.233.128.173:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.128.173/api/v1/namespaces/crd-validation-expressions-3210", Err:(*net.OpError)(0xc001c63720)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource that exceeds the runtime cost limit for x-kubernetes-validations rule execution 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\screate\sof\sa\scustom\sresource\sthat\sexceeds\sthe\sruntime\scost\slimit\sfor\sx\-kubernetes\-validations\srule\sexecution$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000e9ea50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail update of a custom resource that does not satisfy a x-kubernetes-validations transition rule 2m12s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\supdate\sof\sa\scustom\sresource\sthat\sdoes\snot\ssatisfy\sa\sx\-kubernetes\-validations\stransition\srule$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00106aa50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail validation for create of a custom resource that does not satisfy the x-kubernetes-validations rules 2m8s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\svalidation\sfor\screate\sof\sa\scustom\sresource\sthat\sdoes\snot\ssatisfy\sthe\sx\-kubernetes\-validations\srules$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f8a50)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 03:32:43.770: Couldn't delete ns: "crd-validation-expressions-2843": Delete "https://35.233.128.173/api/v1/namespaces/crd-validation-expressions-2843": dial tcp 35.233.128.173:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.128.173/api/v1/namespaces/crd-validation-expressions-2843", Err:(*net.OpError)(0xc0041460a0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Discovery Custom resource should have storage version hash 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sDiscovery\sCustom\sresource\sshould\shave\sstorage\sversion\shash$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000fbed20)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sdelete\sjobs\sand\spods\screated\sby\scronjob$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f8ff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sdelete\spods\screated\sby\src\swhen\snot\sorphaning\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000938ff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\skeep\sthe\src\saround\suntil\sall\sits\spods\sare\sdeleted\sif\sthe\sdeleteOptions\ssays\sso\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001194e10)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\snot\sdelete\sdependents\sthat\shave\sboth\svalid\sowner\sand\sowner\sthat\'s\swaiting\sfor\sdependents\sto\sbe\sdeleted\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057cff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] 2m47s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\sRS\screated\sby\sdeployment\swhen\sdeleteOptions\.PropagationPolicy\sis\sOrphan\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010e4ff0)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 03:35:29.742: failed to list events in namespace "gc-6503": Get "https://35.233.128.173/api/v1/namespaces/gc-6503/events": dial tcp 35.233.128.173:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 03:35:29.783: Couldn't delete ns: "gc-6503": Delete "https://35.233.128.173/api/v1/namespaces/gc-6503": dial tcp 35.233.128.173:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.128.173/api/v1/namespaces/gc-6503", Err:(*net.OpError)(0xc0028a4b90)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance] 2m13s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\spods\screated\sby\src\sif\sdelete\soptions\ssay\sso\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00107eff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\spods\screated\sby\src\sif\sdeleteOptions\.OrphanDependents\sis\snil$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010ceff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Garbage collector should support cascading deletion of custom resources 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\ssupport\scascading\sdeletion\sof\scustom\sresources$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000e9eff0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod 2m42s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGenerated\sclientset\sshould\screate\spods\,\sset\sthe\sdeletionTimestamp\sand\sdeletionGracePeriodSeconds\sof\sthe\spod$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009190e0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Generated clientset should create v1 cronJobs, delete cronJobs, watch cronJobs 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sGenerated\sclientset\sshould\screate\sv1\scronJobs\,\sdelete\scronJobs\,\swatch\scronJobs$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000e9f1d0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should apply changes to a resourcequota status [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\sapply\schanges\sto\sa\sresourcequota\sstatus\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00057d680)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\sbe\sable\sto\supdate\sand\sdelete\sResourceQuota\.\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0002ef680)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\screate\sa\sResourceQuota\sand\scapture\sthe\slife\sof\sa\sconfigMap\.\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00106b680)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource. 6.98s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\screate\sa\sResourceQuota\sand\scapture\sthe\slife\sof\sa\scustom\sresource\.$'
test/e2e/apimachinery/resource_quota.go:617
k8s.io/kubernetes/test/e2e/apimachinery.glob..func20.10()
	test/e2e/apimachinery/resource_quota.go:617 +0x370
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 03:04:48.325: failed to list events in namespace "resourcequota-8933": Get "https://35.233.128.173/api/v1/namespaces/resourcequota-8933/events": dial tcp 35.233.128.173:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 03:04:48.365: Couldn't delete ns: "resourcequota-8933": Delete "https://35.233.128.173/api/v1/namespaces/resourcequota-8933": dial tcp 35.233.128.173:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://35.233.128.173/api/v1/namespaces/resourcequota-8933", Err:(*net.OpError)(0xc002dfeff0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\screate\sa\sResourceQuota\sand\scapture\sthe\slife\sof\sa\spersistent\svolume\sclaim$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b0f680)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sResourceQuota\sshould\screate\sa\sResourceQuota\sand\scapture\sthe\slife\sof\sa\sreplica\sset\.\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000fbf680)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a r