This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 640 failed / 302 succeeded
Started2022-11-24 04:53
Elapsed1h1m
Revision
Builderdd15711c-6bb3-11ed-a6da-22215f11743a
control_plane_node_os_imagecos-97-16919-103-16
infra-commit0915cbf7b
job-versionv1.27.0-alpha.0.42+7530baa9a186a0
kubetest-versionv20221116-7c85504268
repogithub.com/containerd/containerd
repo-commitd06318622178a2209338d7f57eb8800b9f2e72fb
repos{u'github.com/containerd/containerd': u'main'}
revisionv1.27.0-alpha.0.42+7530baa9a186a0
worker_node_os_imagecos-97-16919-103-16

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness) 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAPI\spriority\sand\sfairness\sshould\sensure\sthat\srequests\scan\'t\sbe\sdrowned\sout\s\(fairness\)$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000f82f00)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority) 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAPI\spriority\sand\sfairness\sshould\sensure\sthat\srequests\scan\'t\sbe\sdrowned\sout\s\(priority\)$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f7ef0)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance] 49s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\slisting\smutating\swebhooks\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:683
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.19()
	test/e2e/apimachinery/webhook.go:683 +0x5a8
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 47s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:853
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc0003a3950, {0xc004992090, 0x2c}, 0xc0048bc0f0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:853 +0x13da
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 05:29:49.804: Couldn't delete ns: "webhook-2373": Delete "https://34.83.136.178/api/v1/namespaces/webhook-2373": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/webhook-2373", Err:(*net.OpError)(0xc002622690)}),Couldn't delete ns: "webhook-2373-markers": Delete "https://34.83.136.178/api/v1/namespaces/webhook-2373-markers": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/webhook-2373-markers", Err:(*net.OpError)(0xc00162d950)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance] 2m29s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\svalidating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:435
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.16()
	test/e2e/apimachinery/webhook.go:435 +0x454
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0012abef0)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0007a3e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\spod\sand\sconfigmap\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000e4de00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sdeny\scrd\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001195e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] 2m17s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\shonor\stimeout\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0003a3950)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance] 2m3s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\swebhook\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001131e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance] 2m43s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\sconfigmap\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001131e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f
----------
[FAILED]
Nov 24 05:21:59.898: failed to list events in namespace "webhook-4741": Get "https://34.83.136.178/api/v1/namespaces/webhook-4741/events": dial tcp 34.83.136.178:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 05:21:59.938: Couldn't delete ns: "webhook-4741": Delete "https://34.83.136.178/api/v1/namespaces/webhook-4741": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/webhook-4741", Err:(*net.OpError)(0xc0023c2550)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] 1m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:1808
k8s.io/kubernetes/test/e2e/apimachinery.registerMutatingWebhookForCustomResource(0xc000f83e00, {0xc002608620, 0xc}, 0xc00350a0f0, 0xc00135a380, 0x2742480?)
	test/e2e/apimachinery/webhook.go:1808 +0xd51
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.11()
	test/e2e/apimachinery/webhook.go:297 +0xad
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 05:29:49.833: Couldn't delete ns: "webhook-7812": Delete "https://34.83.136.178/api/v1/namespaces/webhook-7812": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/webhook-7812", Err:(*net.OpError)(0xc0054a25f0)}),Couldn't delete ns: "webhook-7812-markers": Delete "https://34.83.136.178/api/v1/namespaces/webhook-7812-markers": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/webhook-7812-markers", Err:(*net.OpError)(0xc00538c690)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] 2m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\sdifferent\sstored\sversion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00047be00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\spruning\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00093be00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\spod\sand\sapply\sdefaults\safter\smutation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0007a3e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\snot\sbe\sable\sto\smutate\sor\sprevent\sdeletion\sof\swebhook\sconfiguration\sobjects\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000651e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sunconditionally\sreject\soperations\son\sfail\sclosed\swebhook\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc00093fe00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sWatch\s\[Privileged\:ClusterAdmin\]\sCustomResourceDefinition\sWatch\swatch\son\scustom\sresource\sdefinition\sobjects\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001072b40)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\screating\/deleting\scustom\sresource\sdefinition\sobjects\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0012aad20)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\sgetting\/updating\/patching\scustom\sresource\sdefinition\sstatus\ssub\-resource\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000f82c30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] 2m58s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\slisting\scustom\sresource\sdefinition\sobjects\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010fec30)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 05:22:17.533: failed to list events in namespace "custom-resource-definition-7553": Get "https://34.83.136.178/api/v1/namespaces/custom-resource-definition-7553/events": dial tcp 34.83.136.178:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 05:22:17.573: Couldn't delete ns: "custom-resource-definition-7553": Delete "https://34.83.136.178/api/v1/namespaces/custom-resource-definition-7553": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/custom-resource-definition-7553", Err:(*net.OpError)(0xc001844af0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\scustom\sresource\sdefaulting\sfor\srequests\sand\sfrom\sstorage\sworks\s\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0011fbc20)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\scustom\sresource\sdefinition\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0008a8c30)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\supdates\sthe\spublished\sspec\swhen\sone\sversion\sgets\srenamed\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f7950)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] 2m57s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sin\san\sembedded\sobject\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0009fc960)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[FAILED]
Nov 24 05:22:08.068: failed to list events in namespace "crd-publish-openapi-4422": Get "https://34.83.136.178/api/v1/namespaces/crd-publish-openapi-4422/events": dial tcp 34.83.136.178:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 24 05:22:08.108: Couldn't delete ns: "crd-publish-openapi-4422": Delete "https://34.83.136.178/api/v1/namespaces/crd-publish-openapi-4422": dial tcp 34.83.136.178:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.136.178/api/v1/namespaces/crd-publish-openapi-4422", Err:(*net.OpError)(0xc0021502d0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance] 2m17s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\swith\svalidation\sschema\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0008a8960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\ssame\sgroup\sbut\sdifferent\sversions\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000f82960)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sNOT\sfail\svalidation\sfor\screate\sof\sa\scustom\sresource\sthat\ssatisfies\sthe\sx\-kubernetes\-validations\srules$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0011baa50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail validation for create of a custom resource that does not satisfy the x-kubernetes-validations rules 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sCustomResourceValidationRules\s\[Privileged\:ClusterAdmin\]\sMUST\sfail\svalidation\sfor\screate\sof\sa\scustom\sresource\sthat\sdoes\snot\ssatisfy\sthe\sx\-kubernetes\-validations\srules$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010fea50)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Discovery should accurately determine present and missing resources 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sDiscovery\sshould\saccurately\sdetermine\spresent\sand\smissing\sresources$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0011fbd10)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance] 2m23s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sDiscovery\sshould\svalidate\sPreferredVersion\sfor\seach\sAPIGroup\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001143d10)
	test/e2e/framework/framework.go:241 +0x96f