This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 586 failed / 235 succeeded
Started2022-11-26 23:05
Elapsed1h2m
Revision
Builderc08bffcd-6dde-11ed-a6da-22215f11743a
control_plane_node_os_imagecos-97-16919-103-16
infra-commitb02ce7741
job-versionv1.27.0-alpha.0.50+70617042976dc1
kubetest-versionv20221116-7c85504268
repogithub.com/containerd/containerd
repo-commitd06318622178a2209338d7f57eb8800b9f2e72fb
repos{u'github.com/containerd/containerd': u'main'}
revisionv1.27.0-alpha.0.50+70617042976dc1
worker_node_os_imagecos-97-16919-103-16

Test Failures


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance] 4m30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\slisting\smutating\swebhooks\sshould\swork\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000a0fe00, {0xc00174a900, 0x2c}, 0xc0032a47d0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 26 23:26:08.946: failed to list events in namespace "webhook-9834": Get "https://34.83.128.61/api/v1/namespaces/webhook-9834/events": dial tcp 34.83.128.61:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 26 23:26:09.026: Couldn't delete ns: "webhook-9834": Delete "https://34.83.128.61/api/v1/namespaces/webhook-9834": dial tcp 34.83.128.61:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.128.61/api/v1/namespaces/webhook-9834", Err:(*net.OpError)(0xc0032a48c0)}),Couldn't delete ns: "webhook-9834-markers": Delete "https://34.83.128.61/api/v1/namespaces/webhook-9834-markers": dial tcp 34.83.128.61:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.128.61/api/v1/namespaces/webhook-9834-markers", Err:(*net.OpError)(0xc00341afa0)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] 2m36s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\smutating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000b71e00)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\spatching\/updating\sa\svalidating\swebhook\sshould\swork\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc0010f5e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] 2m27s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc000b71e00, {0xc00193a450, 0x2c}, 0xc001c4b900, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] 1m26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc00103fe00, {0xc00515f260, 0x2c}, 0xc0032249b0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\spod\sand\sconfigmap\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000c71e00)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sdeny\scrd\screation\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001244e10)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] 2m24s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\shonor\stimeout\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc001275b30, {0xc0020176e0, 0x2c}, 0xc003a03900, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance] 1m10s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sinclude\swebhook\sresources\sin\sdiscovery\sdocuments\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc001059e00, {0xc002321b60, 0x2c}, 0xc002961bd0, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226
There were additional failures detected after the initial failure:
[FAILED]
Nov 26 23:43:10.556: failed to list events in namespace "webhook-1524": Get "https://34.83.128.61/api/v1/namespaces/webhook-1524/events": dial tcp 34.83.128.61:443: connect: connection refused
In [DeferCleanup (Each)] at: test/e2e/framework/debug/dump.go:44
----------
[FAILED]
Nov 26 23:43:10.636: Couldn't delete ns: "webhook-1524-markers": Delete "https://34.83.128.61/api/v1/namespaces/webhook-1524-markers": dial tcp 34.83.128.61:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.128.61/api/v1/namespaces/webhook-1524-markers", Err:(*net.OpError)(0xc003d559a0)}),Couldn't delete ns: "webhook-1524": Delete "https://34.83.128.61/api/v1/namespaces/webhook-1524": dial tcp 34.83.128.61:443: connect: connection refused (&url.Error{Op:"Delete", URL:"https://34.83.128.61/api/v1/namespaces/webhook-1524", Err:(*net.OpError)(0xc001a74e10)})
In [DeferCleanup (Each)] at: test/e2e/framework/framework.go:370

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] 3m34s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:1808
k8s.io/kubernetes/test/e2e/apimachinery.registerMutatingWebhookForCustomResource(0xc00103fe00, {0xc00121a0d0, 0xc}, 0xc002a631d0, 0xc00110c0e0, 0x2cd6a20?)
	test/e2e/apimachinery/webhook.go:1808 +0xd51
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.11()
	test/e2e/apimachinery/webhook.go:297 +0xad
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\sdifferent\sstored\sversion\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc001205ef0)
	test/e2e/framework/framework.go:241 +0x96f
There were additional failures detected after the initial failure:
[PANICKED]
Test Panicked
In [AfterEach] at: /usr/local/go/src/runtime/panic.go:260

runtime error: invalid memory address or nil pointer dereference

Full Stack Trace
  k8s.io/kubernetes/test/e2e/apimachinery.cleanWebhookTest({0x0, 0x0}, {0x0, 0x0})
  	test/e2e/apimachinery/webhook.go:1680 +0x46
  k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.2()
  	test/e2e/apimachinery/webhook.go:106 +0x2f

				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance] 30s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\spruning\s\[Conformance\]$'
test/e2e/framework/framework.go:241
k8s.io/kubernetes/test/e2e/framework.(*Framework).BeforeEach(0xc000a0fe00)
	test/e2e/framework/framework.go:241 +0x96f
				
				Click to see stdout/stderrfrom junit_01.xml

Filter through log files | View test history on testgrid


Kubernetes e2e suite [It] [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] 1m26s

go run hack/e2e.go -v --test --test_args='--ginkgo.focus=Kubernetes\se2e\ssuite\s\[It\]\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\snot\sbe\sable\sto\smutate\sor\sprevent\sdeletion\sof\swebhook\sconfiguration\sobjects\s\[Conformance\]$'
test/e2e/apimachinery/webhook.go:826
k8s.io/kubernetes/test/e2e/apimachinery.deployWebhookAndService(0xc0010e7e00, {0xc00495f590, 0x2c}, 0xc005045040, 0x20fb, 0x20fc)
	test/e2e/apimachinery/webhook.go:826 +0xed2
k8s.io/kubernetes/test/e2e/apimachinery.glob..func28.1()
	test/e2e/apimachinery/webhook.go:102 +0x226