This job view page is being replaced by Spyglass soon. Check out the new job view.
ResultFAILURE
Tests 0 failed / 0 succeeded
Started2022-11-21 04:14
Elapsed7m57s
Revisionrelease-1.1

No Test Failures!


Error lines from build-log.txt

... skipping 335 lines ...

kubectl cluster-info --context kind-kind

Have a question, bug, or feature request? Let us know! https://kind.sigs.k8s.io/#community 🙂
make[1]: Leaving directory '/home/prow/go/src/sigs.k8s.io/secrets-store-csi-driver'
docker pull gcr.io/k8s-staging-csi-secrets-store/driver:v1.1.0-e2e-e19ab211 || make e2e-container
Error response from daemon: manifest for gcr.io/k8s-staging-csi-secrets-store/driver:v1.1.0-e2e-e19ab211 not found: manifest unknown: Failed to fetch "v1.1.0-e2e-e19ab211" from request "/v2/k8s-staging-csi-secrets-store/driver/manifests/v1.1.0-e2e-e19ab211".
make[1]: Entering directory '/home/prow/go/src/sigs.k8s.io/secrets-store-csi-driver'
make container
make[2]: Entering directory '/home/prow/go/src/sigs.k8s.io/secrets-store-csi-driver'
rm -rf _output/crds/*
mkdir -p _output/crds
cp -R manifest_staging/charts/secrets-store-csi-driver/crds/ _output/crds/
... skipping 364 lines ...
client.go:128: [debug] creating 1 resource(s)
client.go:540: [debug] Watching for changes to Job secrets-store-csi-driver-upgrade-crds with timeout of 5m0s
I1121 04:17:14.724688   13460 reflector.go:205] Reflector from k8s.io/client-go@v0.25.2/tools/cache/reflector.go:169 configured with expectedType of *unstructured.Unstructured with empty GroupVersionKind.
I1121 04:17:14.724750   13460 reflector.go:221] Starting reflector *unstructured.Unstructured (0s) from k8s.io/client-go@v0.25.2/tools/cache/reflector.go:169
I1121 04:17:14.724821   13460 reflector.go:257] Listing and watching *unstructured.Unstructured from k8s.io/client-go@v0.25.2/tools/cache/reflector.go:169
client.go:568: [debug] Add/Modify event for secrets-store-csi-driver-upgrade-crds: ADDED
client.go:607: [debug] secrets-store-csi-driver-upgrade-crds: Jobs active: 0, jobs failed: 0, jobs succeeded: 0
client.go:568: [debug] Add/Modify event for secrets-store-csi-driver-upgrade-crds: MODIFIED
client.go:607: [debug] secrets-store-csi-driver-upgrade-crds: Jobs active: 1, jobs failed: 0, jobs succeeded: 0
client.go:568: [debug] Add/Modify event for secrets-store-csi-driver-upgrade-crds: MODIFIED
I1121 04:17:19.724516   13460 reflector.go:227] Stopping reflector *unstructured.Unstructured (0s) from k8s.io/client-go@v0.25.2/tools/cache/reflector.go:169
client.go:310: [debug] Starting delete for "csi-secrets-store-secrets-store-csi-driver-upgrade-crds" ServiceAccount
client.go:310: [debug] Starting delete for "csi-secrets-store-secrets-store-csi-driver-upgrade-crds" ClusterRole
client.go:310: [debug] Starting delete for "csi-secrets-store-secrets-store-csi-driver-upgrade-crds" ClusterRoleBinding
client.go:310: [debug] Starting delete for "secrets-store-csi-driver-upgrade-crds" Job
... skipping 979 lines ...
Unpacking azure-cli (2.42.0-1~buster) ...
Setting up azure-cli (2.42.0-1~buster) ...
bats -t test/bats/azure.bats
1..21
not ok 1 install azure provider
# (in test file test/bats/azure.bats, line 54)
#   `kubectl wait --for=condition=Ready --timeout=120s pod -l app=csi-secrets-store-provider-azure --namespace $NAMESPACE' failed
# error: no matching resources found
ok 2 create azure k8s secret
ok 3 secretproviderclasses crd is established
ok 4 Test rbac roles and role bindings exist
ok 5 deploy azure secretproviderclass crd
ok 6 CSI inline volume test with pod portability
ok 7 CSI inline volume test with pod portability - read azure kv secret from pod
... skipping 2 lines ...
ok 10 Sync with K8s secrets - create deployment
ok 11 Sync with K8s secrets - read secret from pod, read K8s secret, read env var, check secret ownerReferences with multiple owners
ok 12 Sync with K8s secrets - delete deployment, check owner ref updated, check secret deleted
ok 13 Test Namespaced scope SecretProviderClass - create deployment
ok 14 Test Namespaced scope SecretProviderClass - Sync with K8s secrets - read secret from pod, read K8s secret, read env var, check secret ownerReferences
ok 15 Test Namespaced scope SecretProviderClass - Sync with K8s secrets - delete deployment, check secret deleted
ok 16 Test Namespaced scope SecretProviderClass - Should fail when no secret provider class in same namespace
ok 17 deploy multiple azure secretproviderclass crd
ok 18 deploy pod with multiple secret provider class
ok 19 CSI inline volume test with multiple secret provider class
ok 20 Test auto rotation of mount contents and K8s secrets - Create deployment
ok 21 Test auto rotation of mount contents and K8s secrets
make: *** [Makefile:474: e2e-azure] Error 1
+ EXIT_VALUE=2
+ set +o xtrace
Cleaning up after docker in docker.
================================================================================
Cleaning up after docker
d1026fb7d6fc
... skipping 4 lines ...