This job view page is being replaced by Spyglass soon. Check out the new job view.
PRheqg: Fix Spelling error about [errrors]
ResultFAILURE
Tests 0 failed / 81 succeeded
Started2021-01-14 00:15
Elapsed10m12s
Revision27dfaafe93cd39e156b0c1f869a9811345b04127
Refs 97709

No Test Failures!


Show 81 Passed Tests

Error lines from build-log.txt

... skipping 61 lines ...
Recording: record_command_canary
Running command: record_command_canary

+++ Running case: test-cmd.record_command_canary 
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: record_command_canary
/home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh: line 155: bogus-expected-to-fail: command not found
!!! [0114 00:20:12] Call tree:
!!! [0114 00:20:12]  1: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:47 record_command_canary(...)
!!! [0114 00:20:12]  2: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:112 eVal(...)
!!! [0114 00:20:12]  3: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:131 juLog(...)
!!! [0114 00:20:12]  4: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:159 record_command(...)
!!! [0114 00:20:12]  5: hack/make-rules/test-cmd.sh:35 source(...)
+++ exit code: 1
+++ error: 1
+++ [0114 00:20:12] Running kubeadm tests
+++ [0114 00:20:17] Building go targets for linux/amd64:
    cmd/kubeadm
+++ [0114 00:20:59] Running tests without code coverage
{"Time":"2021-01-14T00:22:24.986406873Z","Action":"output","Package":"k8s.io/kubernetes/cmd/kubeadm/test/cmd","Output":"ok  \tk8s.io/kubernetes/cmd/kubeadm/test/cmd\t49.814s\n"}
✓  cmd/kubeadm/test/cmd (49.817s)
... skipping 342 lines ...
+++ [0114 00:24:08] Building kube-controller-manager
+++ [0114 00:24:13] Building go targets for linux/amd64:
    cmd/kube-controller-manager
+++ [0114 00:24:39] Generate kubeconfig for controller-manager
+++ [0114 00:24:39] Starting controller-manager
I0114 00:24:39.903979   58665 serving.go:331] Generated self-signed cert in-memory
W0114 00:24:40.395963   58665 authentication.go:410] failed to read in-cluster kubeconfig for delegated authentication: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0114 00:24:40.396027   58665 authentication.go:307] No authentication-kubeconfig provided in order to lookup client-ca-file in configmap/extension-apiserver-authentication in kube-system, so client certificate authentication won't work.
W0114 00:24:40.396035   58665 authentication.go:331] No authentication-kubeconfig provided in order to lookup requestheader-client-ca-file in configmap/extension-apiserver-authentication in kube-system, so request-header client certificate authentication won't work.
W0114 00:24:40.396092   58665 authorization.go:208] failed to read in-cluster kubeconfig for delegated authorization: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0114 00:24:40.396109   58665 authorization.go:176] No authorization-kubeconfig provided, so SubjectAccessReview of authorization tokens won't work.
I0114 00:24:40.396128   58665 controllermanager.go:176] Version: v1.21.0-alpha.1.18+9cb06174b3556b
I0114 00:24:40.397557   58665 secure_serving.go:197] Serving securely on [::]:10257
I0114 00:24:40.397832   58665 tlsconfig.go:240] Starting DynamicServingCertificateController
I0114 00:24:40.398298   58665 deprecated_insecure_serving.go:53] Serving insecurely on [::]:10252
I0114 00:24:40.398367   58665 leaderelection.go:243] attempting to acquire leader lease kube-system/kube-controller-manager...
... skipping 14 lines ...
W0114 00:24:40.873381   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:40.873419   58665 controllermanager.go:554] Started "endpoint"
W0114 00:24:40.873435   58665 controllermanager.go:533] "bootstrapsigner" is disabled
I0114 00:24:40.873453   58665 endpoints_controller.go:184] Starting endpoint controller
I0114 00:24:40.873466   58665 shared_informer.go:240] Waiting for caches to sync for endpoint
I0114 00:24:40.873679   58665 node_lifecycle_controller.go:76] Sending events to api server
E0114 00:24:40.873717   58665 core.go:231] failed to start cloud node lifecycle controller: no cloud provider provided
W0114 00:24:40.873746   58665 controllermanager.go:546] Skipping "cloud-node-lifecycle"
W0114 00:24:40.874275   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0114 00:24:40.874303   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0114 00:24:40.874315   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
W0114 00:24:40.874324   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:40.874374   58665 controllermanager.go:554] Started "persistentvolume-binder"
... skipping 12 lines ...
I0114 00:24:40.875780   58665 certificate_controller.go:118] Starting certificate controller "csrapproving"
I0114 00:24:40.875802   58665 shared_informer.go:240] Waiting for caches to sync for certificate-csrapproving
W0114 00:24:40.875926   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:40.876017   58665 controllermanager.go:554] Started "clusterrole-aggregation"
I0114 00:24:40.876128   58665 clusterroleaggregation_controller.go:149] Starting ClusterRoleAggregator
I0114 00:24:40.876144   58665 shared_informer.go:240] Waiting for caches to sync for ClusterRoleAggregator
E0114 00:24:40.876312   58665 core.go:91] Failed to start service controller: WARNING: no cloud provider provided, services of type LoadBalancer will fail
W0114 00:24:40.876330   58665 controllermanager.go:546] Skipping "service"
W0114 00:24:40.879668   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:40.879799   58665 controllermanager.go:554] Started "replicationcontroller"
I0114 00:24:40.879926   58665 replica_set.go:182] Starting replicationcontroller controller
I0114 00:24:40.879948   58665 shared_informer.go:240] Waiting for caches to sync for ReplicationController
W0114 00:24:40.880282   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
... skipping 17 lines ...
W0114 00:24:40.882042   58665 controllermanager.go:546] Skipping "ttl-after-finished"
I0114 00:24:40.882120   58665 pvc_protection_controller.go:110] Starting PVC protection controller
I0114 00:24:40.882136   58665 shared_informer.go:240] Waiting for caches to sync for PVC protection
W0114 00:24:40.882311   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
Client Version: version.Info{Major:"1", Minor:"21+", GitVersion:"v1.21.0-alpha.1.18+9cb06174b3556b", GitCommit:"9cb06174b3556bc17877f813fc5775fb61971893", GitTreeState:"clean", BuildDate:"2021-01-13T23:19:03Z", GoVersion:"go1.15.5", Compiler:"gc", Platform:"linux/amd64"}
Server Version: version.Info{Major:"1", Minor:"21+", GitVersion:"v1.21.0-alpha.1.18+9cb06174b3556b", GitCommit:"9cb06174b3556bc17877f813fc5775fb61971893", GitTreeState:"clean", BuildDate:"2021-01-13T23:19:03Z", GoVersion:"go1.15.5", Compiler:"gc", Platform:"linux/amd64"}
The Service "kubernetes" is invalid: spec.clusterIPs: Invalid value: []string{"10.0.0.1"}: failed to allocated ip:10.0.0.1 with error:provided IP is already allocated
I0114 00:24:41.334066   58665 resource_quota_monitor.go:229] QuotaMonitor created object count evaluator for endpoints
W0114 00:24:41.334131   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:41.334167   58665 resource_quota_monitor.go:229] QuotaMonitor created object count evaluator for replicasets.apps
W0114 00:24:41.334190   58665 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0114 00:24:41.334208   58665 resource_quota_monitor.go:229] QuotaMonitor created object count evaluator for roles.rbac.authorization.k8s.io
I0114 00:24:41.334225   58665 resource_quota_monitor.go:229] QuotaMonitor created object count evaluator for deployments.apps
... skipping 81 lines ...
I0114 00:24:41.349815   58665 controllermanager.go:554] Started "statefulset"
I0114 00:24:41.349980   58665 stateful_set.go:146] Starting stateful set controller
I0114 00:24:41.350010   58665 shared_informer.go:240] Waiting for caches to sync for stateful set
I0114 00:24:41.350086   58665 controllermanager.go:554] Started "pv-protection"
I0114 00:24:41.350706   58665 pv_protection_controller.go:83] Starting PV protection controller
I0114 00:24:41.350719   58665 shared_informer.go:240] Waiting for caches to sync for PV protection
W0114 00:24:41.371211   58665 actual_state_of_world.go:534] Failed to update statusUpdateNeeded field in actual state of world: Failed to set statusUpdateNeeded to needed true, because nodeName="127.0.0.1" does not exist
NAME         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)   AGE
kubernetes   ClusterIP   10.0.0.1     <none>        443/TCP   34s
Recording: run_kubectl_version_tests
Running command: run_kubectl_version_tests
I0114 00:24:41.383668   58665 shared_informer.go:247] Caches are synced for TTL 

... skipping 23 lines ...
I0114 00:24:41.476229   58665 shared_informer.go:247] Caches are synced for ClusterRoleAggregator 
I0114 00:24:41.480104   58665 shared_informer.go:247] Caches are synced for ReplicationController 
I0114 00:24:41.480564   58665 shared_informer.go:247] Caches are synced for HPA 
I0114 00:24:41.481984   58665 shared_informer.go:247] Caches are synced for disruption 
I0114 00:24:41.482010   58665 disruption.go:338] Sending events to api server.
I0114 00:24:41.482263   58665 shared_informer.go:247] Caches are synced for PVC protection 
E0114 00:24:41.486256   58665 clusterroleaggregation_controller.go:181] edit failed with : Operation cannot be fulfilled on clusterroles.rbac.authorization.k8s.io "edit": the object has been modified; please apply your changes to the latest version and try again
E0114 00:24:41.486633   58665 clusterroleaggregation_controller.go:181] view failed with : Operation cannot be fulfilled on clusterroles.rbac.authorization.k8s.io "view": the object has been modified; please apply your changes to the latest version and try again
E0114 00:24:41.492851   58665 clusterroleaggregation_controller.go:181] admin failed with : Operation cannot be fulfilled on clusterroles.rbac.authorization.k8s.io "admin": the object has been modified; please apply your changes to the latest version and try again
{
  "major": "1",
  "minor": "21+",
  "gitVersion": "v1.21.0-alpha.1.18+9cb06174b3556b",
  "gitCommit": "9cb06174b3556bc17877f813fc5775fb61971893",
  "gitTreeState": "clean",
... skipping 114 lines ...
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: run_RESTMapper_evaluation_tests
+++ [0114 00:24:46] Creating namespace namespace-1610583886-11420
namespace/namespace-1610583886-11420 created
Context "test" modified.
+++ [0114 00:24:46] Testing RESTMapper
+++ [0114 00:24:46] "kubectl get unknownresourcetype" returns error as expected: error: the server doesn't have a resource type "unknownresourcetype"
+++ exit code: 0
NAME                              SHORTNAMES   APIVERSION                             NAMESPACED   KIND
bindings                                       v1                                     true         Binding
componentstatuses                 cs           v1                                     false        ComponentStatus
configmaps                        cm           v1                                     true         ConfigMap
endpoints                         ep           v1                                     true         Endpoints
... skipping 62 lines ...
namespace/namespace-1610583891-10826 created
Context "test" modified.
+++ [0114 00:24:51] Testing clusterroles
rbac.sh:29: Successful get clusterroles/cluster-admin {{.metadata.name}}: cluster-admin
(Brbac.sh:30: Successful get clusterrolebindings/cluster-admin {{.metadata.name}}: cluster-admin
(BSuccessful
message:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created (dry run)
clusterrole.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
message:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created
rbac.sh:42: Successful get clusterrole/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(BSuccessful
message:warning: deleting cluster-scoped resources, not scoped to the provided namespace
clusterrole.rbac.authorization.k8s.io "pod-admin" deleted
... skipping 18 lines ...
(Bclusterrole.rbac.authorization.k8s.io/url-reader created
rbac.sh:61: Successful get clusterrole/url-reader {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: get:
(Brbac.sh:62: Successful get clusterrole/url-reader {{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}: /logs/*:/healthz/*:
(Bclusterrole.rbac.authorization.k8s.io/aggregation-reader created
rbac.sh:64: Successful get clusterrole/aggregation-reader {{.metadata.name}}: aggregation-reader
(BSuccessful
message:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (server dry run)
Successful
message:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created
rbac.sh:77: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
(Bclusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (server dry run)
rbac.sh:80: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
... skipping 62 lines ...
rbac.sh:102: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:foo:test-all-user:
(Brbac.sh:103: Successful get clusterrolebinding/super-group {{range.subjects}}{{.name}}:{{end}}: the-group:foo:test-all-user:
(Brbac.sh:104: Successful get clusterrolebinding/super-sa {{range.subjects}}{{.name}}:{{end}}: sa-name:foo:test-all-user:
(Brolebinding.rbac.authorization.k8s.io/admin created (dry run)
rolebinding.rbac.authorization.k8s.io/admin created (server dry run)
Successful
message:Error from server (NotFound): rolebindings.rbac.authorization.k8s.io "admin" not found
has: not found
rolebinding.rbac.authorization.k8s.io/admin created
rbac.sh:113: Successful get rolebinding/admin {{.roleRef.kind}}: ClusterRole
(Brbac.sh:114: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:
(Brolebinding.rbac.authorization.k8s.io/admin subjects updated
rbac.sh:116: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:foo:
... skipping 29 lines ...
message:Warning: rbac.authorization.k8s.io/v1beta1 Role is deprecated in v1.17+, unavailable in v1.22+; use rbac.authorization.k8s.io/v1 Role
No resources found in namespace-1610583898-1182 namespace.
has:Role is deprecated
Successful
message:Warning: rbac.authorization.k8s.io/v1beta1 Role is deprecated in v1.17+, unavailable in v1.22+; use rbac.authorization.k8s.io/v1 Role
No resources found in namespace-1610583898-1182 namespace.
Error: 1 warning received
has:Role is deprecated
Successful
message:Warning: rbac.authorization.k8s.io/v1beta1 Role is deprecated in v1.17+, unavailable in v1.22+; use rbac.authorization.k8s.io/v1 Role
No resources found in namespace-1610583898-1182 namespace.
Error: 1 warning received
has:Error: 1 warning received
role.rbac.authorization.k8s.io/pod-admin created (dry run)
role.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
message:Error from server (NotFound): roles.rbac.authorization.k8s.io "pod-admin" not found
has: not found
role.rbac.authorization.k8s.io/pod-admin created
rbac.sh:163: Successful get role/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(Brbac.sh:164: Successful get role/pod-admin {{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}: pods:
(Brbac.sh:165: Successful get role/pod-admin {{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}: :
(BSuccessful
... skipping 460 lines ...
has:valid-pod
Successful
message:NAME        READY   STATUS    RESTARTS   AGE
valid-pod   0/1     Pending   0          1s
has:valid-pod
core.sh:190: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Berror: resource(s) were provided, but no name, label selector, or --all flag specified
core.sh:194: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Bcore.sh:198: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Berror: setting 'all' parameter but found a non empty selector. 
core.sh:202: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Bcore.sh:206: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Bwarning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely.
pod "valid-pod" force deleted
core.sh:210: Successful get pods -l'name in (valid-pod)' {{range.items}}{{.metadata.name}}:{{end}}: 
(Bcore.sh:215: Successful get namespaces {{range.items}}{{ if eq .metadata.name \"test-kubectl-describe-pod\" }}found{{end}}{{end}}:: :
... skipping 19 lines ...
(Bpoddisruptionbudget.policy/test-pdb-2 created
core.sh:259: Successful get pdb/test-pdb-2 --namespace=test-kubectl-describe-pod {{.spec.minAvailable}}: 50%
(Bpoddisruptionbudget.policy/test-pdb-3 created
core.sh:265: Successful get pdb/test-pdb-3 --namespace=test-kubectl-describe-pod {{.spec.maxUnavailable}}: 2
(Bpoddisruptionbudget.policy/test-pdb-4 created
core.sh:269: Successful get pdb/test-pdb-4 --namespace=test-kubectl-describe-pod {{.spec.maxUnavailable}}: 50%
(Berror: min-available and max-unavailable cannot be both specified
core.sh:275: Successful get pods --namespace=test-kubectl-describe-pod {{range.items}}{{.metadata.name}}:{{end}}: 
(Bpod/env-test-pod created
matched TEST_CMD_1
matched <set to the key 'key-1' in secret 'test-secret'>
matched TEST_CMD_2
matched <set to the key 'key-2' of config map 'test-configmap'>
... skipping 224 lines ...
core.sh:534: Successful get pods {{range.items}}{{(index .spec.containers 0).image}}:{{end}}: k8s.gcr.io/pause:3.2:
(BSuccessful
message:kubectl-create kubectl-patch
has:kubectl-patch
pod/valid-pod patched
core.sh:554: Successful get pods {{range.items}}{{(index .spec.containers 0).image}}:{{end}}: nginx:
(B+++ [0114 00:25:30] "kubectl patch with resourceVersion 587" returns error as expected: Error from server (Conflict): Operation cannot be fulfilled on pods "valid-pod": the object has been modified; please apply your changes to the latest version and try again
pod "valid-pod" deleted
pod/valid-pod replaced
core.sh:578: Successful get pod valid-pod {{(index .spec.containers 0).name}}: replaced-k8s-serve-hostname
(BSuccessful
message:kubectl-create kubectl-patch kubectl-replace
has:kubectl-replace
Successful
message:error: --grace-period must have --force specified
has:\-\-grace-period must have \-\-force specified
Successful
message:error: --timeout must have --force specified
has:\-\-timeout must have \-\-force specified
W0114 00:25:31.462273   58665 actual_state_of_world.go:534] Failed to update statusUpdateNeeded field in actual state of world: Failed to set statusUpdateNeeded to needed true, because nodeName="node-v1-test" does not exist
node/node-v1-test created
core.sh:606: Successful get node node-v1-test {{range.items}}{{if .metadata.annotations.a}}found{{end}}{{end}}:: :
(Bnode/node-v1-test replaced (server dry run)
node/node-v1-test replaced (dry run)
core.sh:631: Successful get node node-v1-test {{range.items}}{{if .metadata.annotations.a}}found{{end}}{{end}}:: :
(Bnode/node-v1-test replaced
... skipping 30 lines ...
spec:
  containers:
  - image: k8s.gcr.io/pause:2.0
    name: kubernetes-pause
has:localonlyvalue
core.sh:683: Successful get pod valid-pod {{.metadata.labels.name}}: valid-pod
(Berror: 'name' already has a value (valid-pod), and --overwrite is false
core.sh:687: Successful get pod valid-pod {{.metadata.labels.name}}: valid-pod
(Bcore.sh:691: Successful get pod valid-pod {{.metadata.labels.name}}: valid-pod
(Bpod/valid-pod labeled
core.sh:695: Successful get pod valid-pod {{.metadata.labels.name}}: valid-pod-super-sayan
(Bcore.sh:699: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: valid-pod:
(Bwarning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely.
... skipping 83 lines ...
+++ Running case: test-cmd.run_kubectl_create_error_tests 
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: run_kubectl_create_error_tests
+++ [0114 00:25:42] Creating namespace namespace-1610583942-21537
namespace/namespace-1610583942-21537 created
Context "test" modified.
+++ [0114 00:25:42] Testing kubectl create with error
Error: must specify one of -f and -k

Create a resource from a file or from stdin.

 JSON and YAML formats are accepted.

Examples:
... skipping 43 lines ...

Usage:
  kubectl create -f FILENAME [options]

Use "kubectl <command> --help" for more information about a given command.
Use "kubectl options" for a list of global command-line options (applies to all commands).
+++ [0114 00:25:42] "kubectl create with empty string list returns error as expected: error: error validating "hack/testdata/invalid-rc-with-empty-args.yaml": error validating data: ValidationError(ReplicationController.spec.template.spec.containers[0].args): unknown object type "nil" in ReplicationController.spec.template.spec.containers[0].args[0]; if you choose to ignore these errors, turn validation off with --validate=false
+++ exit code: 0
Recording: run_kubectl_apply_tests
Running command: run_kubectl_apply_tests

+++ Running case: test-cmd.run_kubectl_apply_tests 
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
... skipping 29 lines ...
I0114 00:25:46.024358   58665 event.go:291] "Event occurred" object="namespace-1610583943-12445/test-deployment-retainkeys-8695b756f8" kind="ReplicaSet" apiVersion="apps/v1" type="Normal" reason="SuccessfulCreate" message="Created pod: test-deployment-retainkeys-8695b756f8-52px5"
deployment.apps "test-deployment-retainkeys" deleted
apply.sh:88: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: 
(Bpod/selector-test-pod created
apply.sh:92: Successful get pods selector-test-pod {{.metadata.labels.name}}: selector-test-pod
(BSuccessful
message:Error from server (NotFound): pods "selector-test-pod-dont-apply" not found
has:pods "selector-test-pod-dont-apply" not found
pod "selector-test-pod" deleted
apply.sh:101: Successful get pods {{range.items}}{{.metadata.name}}:{{end}}: 
(BW0114 00:25:47.131556   67077 helpers.go:567] --dry-run=true is deprecated (boolean value) and can be replaced with --dry-run=client.
pod/test-pod created (dry run)
pod/test-pod created (dry run)
... skipping 34 lines ...
(Bpod/b created
apply.sh:196: Successful get pods a {{.metadata.name}}: a
(Bapply.sh:197: Successful get pods b -n nsb {{.metadata.name}}: b
(Bpod "a" deleted
pod "b" deleted
Successful
message:error: all resources selected for prune without explicitly passing --all. To prune all resources, pass the --all flag. If you did not mean to prune all resources, specify a label selector
has:all resources selected for prune without explicitly passing --all
pod/a created
pod/b created
service/prune-svc created
Warning: extensions/v1beta1 Ingress is deprecated in v1.14+, unavailable in v1.22+; use networking.k8s.io/v1 Ingress
I0114 00:25:56.811937   58665 horizontal.go:359] Horizontal Pod Autoscaler frontend has been deleted in namespace-1610583939-16807
apply.sh:209: Successful get pods a {{.metadata.name}}: a
(Bapply.sh:210: Successful get pods b -n nsb {{.metadata.name}}: b
(Bpod "a" deleted
pod "b" deleted
namespace "nsb" deleted
{"component":"entrypoint","file":"prow/entrypoint/run.go:169","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2021-01-14T00:25:59Z"}