Created
July 27, 2020 16:50
-
-
Save dweomer/0e0e6cde39f1c9bcee6f2cc3c5ba3531 to your computer and use it in GitHub Desktop.
containerd-1.3.3-k3s2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
critest version: 1.18.0-89-gbaca4a1 | |
Running Suite: CRI validation | |
============================= | |
Random Seed: [1m123456789[0m - Will randomize all specs | |
Will run [1m90[0m of [1m97[0m specs | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing stopped container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing stopped container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:01.677: INFO: Created container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f | |
Jul 24 05:26:01.724: INFO: Started container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f | |
Jul 24 05:26:01.760: INFO: Stopped container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f" | |
[1mSTEP[0m: Get container status for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f | |
Jul 24 05:26:01.764: INFO: Removed container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f" | |
[1mSTEP[0m: List containers for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image with tag should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with tag should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Runtime info[0m [90mruntime should support returning runtime info[0m | |
[1mruntime should return runtime conditions [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return runtime conditions [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45 | |
[1mSTEP[0m: test runtime status | |
[AfterEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostNetwork is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:03.155: INFO: Created container "14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316 | |
Jul 24 05:26:03.224: INFO: Started container "14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:26:03.224: INFO: Open log file /tmp/podLogTest499138712/NamespaceOption-PodSandbox-d5ea3acd-cda8-11ea-8530-5254001ff4e5/container-with-HostNetwork-test-d6df9880-cda8-11ea-8530-5254001ff4e5.log | |
Jul 24 05:26:03.224: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should support an seccomp profile that blocks setting hostname with SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests354356503/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:03.526: INFO: Created container "5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa" | |
[1mSTEP[0m: Start container for containerID: 5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa | |
Jul 24 05:26:03.584: INFO: Started container "5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa" | |
[1mSTEP[0m: Get container status for containerID: 5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould work with just selinux level set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with just selinux level set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 4e9ea4e53a67898f96d2b2edd00115dc4b4dad6b4f9ad70f8693474873f22d9e | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image with digest should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with digest should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should return error if RunAsGroup is set without RunAsUser[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should return error if RunAsGroup is set without RunAsUser | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with invalid RunAsGroup | |
[1mSTEP[0m: create invalid RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsGroup without RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:26:05.243807 203237 remote_runtime.go:200] CreateContainer in sandbox "dcadd67174bb5f15c4dec95528895ff024beae1af9dc6e8ab3a46b5b546d2148" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support execSync with timeout [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync with timeout [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:05.533: INFO: Created container "af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7 | |
Jul 24 05:26:05.595: INFO: Started container "af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7" | |
[1mSTEP[0m: test execSync with timeout | |
E0724 05:26:06.626387 203237 remote_runtime.go:351] ExecSync af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded | |
[1mSTEP[0m: timeout exec process should be gone | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support exec with tty=false and stdin=false [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=false and stdin=false [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:06.928: INFO: Created container "1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b | |
Jul 24 05:26:06.977: INFO: Started container "1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b" | |
[1mSTEP[0m: exec given command in container: 1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b | |
Jul 24 05:26:06.977: INFO: Get exec url: http://127.0.0.1:10010/exec/ZnCyR-TQ | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:26:06.978: INFO: Parse url "http://127.0.0.1:10010/exec/ZnCyR-TQ" succeed | |
Jul 24 05:26:07.006: INFO: Check exec url "http://127.0.0.1:10010/exec/ZnCyR-TQ" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsGroup[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsGroup | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container for security context RunAsGroup | |
[1mSTEP[0m: create RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsUser and RunAsGroup | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:07.300: INFO: Created container "1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833 | |
Jul 24 05:26:07.353: INFO: Started container "1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833" | |
[1mSTEP[0m: Get container status for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833 | |
[1mSTEP[0m: Get container status for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833 | |
[1mSTEP[0m: verify RunAsGroup for container | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:26:11.354: INFO: Open log file /tmp/podLogTest118333322/PodSandbox-with-log-directory-d941de1c-cda8-11ea-8530-5254001ff4e5/container-with-RunAsGroup-test-d957d7ec-cda8-11ea-8530-5254001ff4e5.log | |
Jul 24 05:26:11.354: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support MaskedPaths[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support MaskedPaths | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with MaskedPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:11.609: INFO: Created container "1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1" | |
[1mSTEP[0m: Start container for containerID: 1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1 | |
Jul 24 05:26:11.672: INFO: Started container "1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1" | |
[1mSTEP[0m: Get container status for containerID: 1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support sysctls[0m | |
[1mshould support unsafe sysctls[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support unsafe sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:11.983: INFO: Created container "2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1 | |
Jul 24 05:26:12.035: INFO: Started container "2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1" | |
[1mSTEP[0m: check sysctls fs.mqueue.msg_max | |
[AfterEach] runtime should support sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsUserName[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUserName | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUserName container | |
[1mSTEP[0m: create a container with RunAsUserName | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:12.321: INFO: Created container "723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88 | |
Jul 24 05:26:12.382: INFO: Started container "723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88" | |
[1mSTEP[0m: Get container status for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88 | |
[1mSTEP[0m: verify RunAsUserName for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88 | |
Jul 24 05:26:12.405: INFO: Execsync succeed | |
Jul 24 05:26:12.405: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support portforward [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support portforward [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:26:12.677: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:26:12.690: INFO: Created container "a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c | |
Jul 24 05:26:12.763: INFO: Started container "a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c" | |
[1mSTEP[0m: port forward PodSandbox: 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d | |
Jul 24 05:26:12.763: INFO: Get port forward url: http://127.0.0.1:10010/portforward/Ga-tddBz | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:26:12.764: INFO: Parse url "http://127.0.0.1:10010/portforward/Ga-tddBz" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12001 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:26:12.764: INFO: the IP:port is http://127.0.0.1:12001 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12001 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12001 -> 80 | |
Forwarding from [::1]:12001 -> 80 | |
Handling connection for 12001 | |
E0724 05:26:13.771777 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:13 socat[205648] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:14.778664 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:14 socat[205649] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:15.786644 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:15 socat[205651] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:16.794705 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:16 socat[205652] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:17.802252 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:17 socat[205654] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:18.829421 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:18 socat[205656] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:19.836443 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:19 socat[205658] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:20.844321 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:20 socat[205660] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:21.869080 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:21 socat[205662] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:22.877326 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:22 socat[205664] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:23.885342 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:23 socat[205666] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:24.968069 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:24 socat[205668] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:26.008005 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:26 socat[205670] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:27.029935 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:27 socat[205672] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:28.037435 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:28 socat[205674] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:29.052463 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:29 socat[205676] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:30.092139 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:30 socat[205678] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:31.112106 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:31 socat[205680] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:32.130022 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:32 socat[205682] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:33.137425 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:33 socat[205684] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:34.184285 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:34 socat[205686] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:35.213966 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:35 socat[205688] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:36.232738 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:36 socat[205690] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:37.247896 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:37 socat[205692] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:38.255461 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:38 socat[205694] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:39.263344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:39 socat[205696] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:40.278609 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:40 socat[205698] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:41.289514 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:41 socat[205700] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:42.297163 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:42 socat[205702] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:43.304816 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:43 socat[205704] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:44.312824 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:44 socat[205706] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:45.329015 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:45 socat[205708] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:46.337362 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:46 socat[205710] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:47.384635 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:47 socat[205712] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:48.392140 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:48 socat[205714] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:49.400883 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:49 socat[205716] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:50.528874 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:50 socat[205718] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:51.537922 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:51 socat[205720] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:52.545344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:52 socat[205722] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:53.558220 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:53 socat[205724] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:54.566154 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:54 socat[205726] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:55.574203 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:55 socat[205728] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:56.583959 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:56 socat[205730] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:57.592082 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:57 socat[205732] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:58.599426 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:58 socat[205734] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:26:59.609344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:59 socat[205736] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:00.616989 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:00 socat[205738] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:01.628364 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:01 socat[205740] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:02.638014 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:02 socat[205742] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:03.647896 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:03 socat[205744] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:04.654605 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:04 socat[205746] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:05.662762 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:05 socat[205748] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:06.670034 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:06 socat[205750] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:07.684590 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:07 socat[205752] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:08.692331 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:08 socat[205754] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:09.700649 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:09 socat[205756] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:10.708904 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:10 socat[205758] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:11.717461 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:11 socat[205760] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:27:12.729875 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:12 socat[205762] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.382 seconds][0m | |
[k8s.io] Streaming | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
[91m[1mruntime should support portforward [Conformance] [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124[0m | |
[91mTimed out after 60.000s. | |
Expected | |
<*url.Error | 0xc00041d710>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12001", | |
Err: {s: "EOF"}, | |
} | |
to be nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostIpc is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIPC is true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:13.087: INFO: Created container "2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8 | |
Jul 24 05:27:13.138: INFO: Started container "2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8" | |
[1mSTEP[0m: Get container status for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8 | |
[1mSTEP[0m: check if the shared memory segment is included in the container | |
[1mSTEP[0m: execSync for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8 | |
Jul 24 05:27:13.179: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support stopping PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support stopping PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: test stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431 | |
Jul 24 05:27:13.560: INFO: Stopped PodSandbox "a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431" | |
[1mSTEP[0m: Get PodSandbox status for podID: a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431 | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support stopping container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support stopping container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:13.725: INFO: Created container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c | |
Jul 24 05:27:13.774: INFO: Started container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c | |
Jul 24 05:27:13.808: INFO: Stopped container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c" | |
[1mSTEP[0m: Get container status for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould create containers with the same process label[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should create containers with the same process label | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: fa0ad52818d53867c2229a4ba5a923646cf9a99fa94be22799472347bbe54911 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 9c2db5fe4ce1740c9d6353e0c7b76c4dd38ae1ec1637e0fc7e0532938dad5b41 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp unconfined on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp unconfined on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:14.539: INFO: Created container "45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e | |
Jul 24 05:27:14.598: INFO: Started container "45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e" | |
[1mSTEP[0m: Get container status for containerID: 45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould work with just selinux level set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with just selinux level set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: ad48919620247a8e4f3eeaa0c3d2528976cc050788d84b364ed759ea62f29114 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mimage status should support all kinds of references [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status should support all kinds of references [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing created container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing created container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:16.463: INFO: Created container "5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8 | |
Jul 24 05:27:16.467: INFO: Removed container "5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8" | |
[1mSTEP[0m: List containers for containerID: 5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support creating container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support creating container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83 | |
[1mSTEP[0m: test create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:16.761: INFO: Created container "1205813ee9f2270e817beb06ff6fbb16318f8bf5df7d06dd3554acaa9a4513d1" | |
[1mSTEP[0m: test list container | |
[1mSTEP[0m: List containers for containerID: 1205813ee9f2270e817beb06ff6fbb16318f8bf5df7d06dd3554acaa9a4513d1 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rshared' should support propagation from host to container and vice versa[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rshared' should support propagation from host to container and vice versa | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:17.113: INFO: Created container "0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38 | |
Jul 24 05:27:17.180: INFO: Started container "0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38" | |
[1mSTEP[0m: Get container status for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38 | |
Jul 24 05:27:17.209: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38 | |
Jul 24 05:27:17.235: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38 | |
Jul 24 05:27:17.262: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support PodPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support PodPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194 | |
[1mSTEP[0m: create podSandbox for sharing process namespace | |
Jul 24 05:27:17.407: INFO: Pid namespace is "POD" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:17.575: INFO: Created container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c | |
Jul 24 05:27:17.627: INFO: Started container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c" | |
[1mSTEP[0m: Get container status for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c | |
E0724 05:27:18.635256 203237 remote_runtime.go:351] ExecSync 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c 'cat /proc/1/cmdline' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
Jul 24 05:27:18.635: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [1.396 seconds][0m | |
[k8s.io] Security Context | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support PodPID [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194[0m | |
[91mfailed to execSync in container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c" | |
Unexpected error: | |
<*status.statusError | 0xc000ada0f0>: { | |
Code: 2, | |
Message: "failed to exec in container: container is in CONTAINER_EXITED state", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support DNS config [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support DNS config [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54 | |
[1mSTEP[0m: create a PodSandbox with DNS config | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:18.963: INFO: Created container "41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55 | |
Jul 24 05:27:19.012: INFO: Started container "41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55" | |
[1mSTEP[0m: check DNS config | |
[1mSTEP[0m: get the current dns config via execSync | |
Jul 24 05:27:19.035: INFO: check DNS config succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould error on create with wrong options[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should error on create with wrong options | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.285 seconds][0m | |
[k8s.io] SELinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is not privileged | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109[0m | |
[91m[1mshould error on create with wrong options [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[91mExpected an error to have occurred. Got: | |
<nil>: nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175 | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rprivate' should not support propagation[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rprivate' should not support propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:19.601: INFO: Created container "29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097 | |
Jul 24 05:27:19.651: INFO: Started container "29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097" | |
[1mSTEP[0m: Get container status for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097 | |
Jul 24 05:27:19.676: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097 | |
Jul 24 05:27:19.700: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097 | |
Jul 24 05:27:19.724: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support that ReadOnlyRootfs is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_true | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:20.028: INFO: Created container "b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b | |
Jul 24 05:27:20.074: INFO: Started container "b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b" | |
[1mSTEP[0m: Get container status for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b | |
[1mSTEP[0m: Get container status for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b | |
[1mSTEP[0m: Check whether rootfs is read-only | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:27:24.077: INFO: Open log file /tmp/podLogTest668565598/PodSandbox-with-log-directory-049fd2ca-cda9-11ea-8530-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-04b1e7e8-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:27:24.078: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support exec with tty=true and stdin=true [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=true and stdin=true [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:24.336: INFO: Created container "6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1 | |
Jul 24 05:27:24.387: INFO: Started container "6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1" | |
[1mSTEP[0m: exec given command in container: 6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1 | |
Jul 24 05:27:24.387: INFO: Get exec url: http://127.0.0.1:10010/exec/nkIy7KPv | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:27:24.387: INFO: Parse url "http://127.0.0.1:10010/exec/nkIy7KPv" succeed | |
Jul 24 05:27:24.412: INFO: Check exec url "http://127.0.0.1:10010/exec/nkIy7KPv" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support running PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support running PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51 | |
[1mSTEP[0m: test run a default PodSandbox | |
[1mSTEP[0m: Get PodSandbox status for podID: 3532fe9b3752846ff6c83b3b938985a1be708240475dc4e36736b5e686588438 | |
[1mSTEP[0m: test list PodSandbox | |
[1mSTEP[0m: List PodSandbox for podID: 3532fe9b3752846ff6c83b3b938985a1be708240475dc4e36736b5e686588438 | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:27:24.676: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support container log[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:27:24.934: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:24.953: INFO: Created container "9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5 | |
Jul 24 05:27:25.026: INFO: Started container "9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5" | |
[1mSTEP[0m: Get container status for containerID: 9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:27:25.048: INFO: Created container "37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6 | |
Jul 24 05:27:25.102: INFO: Started container "37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6" | |
[1mSTEP[0m: Get container status for containerID: 37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6 | |
[It] should support container log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82 | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.461 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support container log [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82[0m | |
[91mTimed out after 60.003s. | |
Expected | |
<bool>: false | |
to be true[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support setting Capability[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support setting Capability | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with security context Capability and test | |
[1mSTEP[0m: create Capability container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:25.411: INFO: Created container "a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe" | |
[1mSTEP[0m: Start container for containerID: a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe | |
Jul 24 05:28:25.467: INFO: Started container "a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe" | |
[1mSTEP[0m: Get container status for containerID: a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe | |
[1mSTEP[0m: create container without security context Capability and test | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:25.506: INFO: Created container "8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88" | |
[1mSTEP[0m: Start container for containerID: 8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88 | |
Jul 24 05:28:25.551: INFO: Started container "8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88" | |
[1mSTEP[0m: Get container status for containerID: 8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support adding volume and device[0m | |
[1mruntime should support starting container with volume [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:25.897: INFO: Created container "652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19 | |
Jul 24 05:28:25.948: INFO: Started container "652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19" | |
[1mSTEP[0m: Get container status for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19 | |
[1mSTEP[0m: check whether 'hostPath' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19 | |
Jul 24 05:28:25.971: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostIpc is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIpc is false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:26.242: INFO: Created container "5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628 | |
Jul 24 05:28:26.308: INFO: Started container "5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628" | |
[1mSTEP[0m: Get container status for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628 | |
[1mSTEP[0m: check if the shared memory segment is not included in the container | |
[1mSTEP[0m: execSync for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628 | |
Jul 24 05:28:26.335: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould work with selinux set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with selinux set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 83770f370b2c72f1bdd2936908c8d2e54de5a6ce5b48f69359f98c7e1580d3da | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mmount label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: e6bc05a0ff9fe8f3d18a5142c97f86eeb1ee6d85b37c7bb914db5dfc3f491b54 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should not block setting host name with unconfined seccomp and SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create unconfined Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:27.279: INFO: Created container "22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920" | |
[1mSTEP[0m: Start container for containerID: 22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920 | |
Jul 24 05:28:27.320: INFO: Started container "22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920" | |
[1mSTEP[0m: Get container status for containerID: 22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support set hostname [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support set hostname [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70 | |
[1mSTEP[0m: create a PodSandbox with hostname | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:27.608: INFO: Created container "9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe | |
Jul 24 05:28:27.656: INFO: Started container "9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe" | |
[1mSTEP[0m: check hostname | |
[1mSTEP[0m: get the current hostname via execSync | |
Jul 24 05:28:27.681: INFO: check hostname succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mruntime should block sethostname with docker/default seccomp profile and no extra caps[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:28.014: INFO: Created container "8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1" | |
[1mSTEP[0m: Start container for containerID: 8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1 | |
Jul 24 05:28:28.199: INFO: Started container "8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1" | |
[1mSTEP[0m: Get container status for containerID: 8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should not support a custom seccomp profile without using localhost/ as a prefix[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create /tmp/seccomp-tests687882025/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:28:28.607547 203237 remote_runtime.go:200] CreateContainer in sandbox "c3f6130d101dd5e4e5d82efcb023e9f35d0ed3ba2febfe9e92accc1e1a9fb7e0" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests687882025/block-host-name.json" | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mimage status get image fields should not have Uid|Username empty [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status get image fields should not have Uid|Username empty [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84 | |
Jul 24 05:28:28.725: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid | |
Jul 24 05:28:29.769: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username | |
Jul 24 05:28:30.580: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group | |
Jul 24 05:28:31.413: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid-group | |
[1mSTEP[0m: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username | |
[1mSTEP[0m: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid | |
[1mSTEP[0m: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp localhost/profile on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp localhost/profile on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:32.741: INFO: Created container "a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06 | |
Jul 24 05:28:32.803: INFO: Started container "a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06" | |
[1mSTEP[0m: Get container status for containerID: a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Runtime info[0m [90mruntime should support returning runtime info[0m | |
[1mruntime should return version info [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return version info [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41 | |
Jul 24 05:28:32.964: INFO: Get version info succeed | |
[AfterEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mruntime should support setting hostname with docker/default seccomp profile and SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:33.095: INFO: Created container "f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a" | |
[1mSTEP[0m: Start container for containerID: f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a | |
Jul 24 05:28:33.285: INFO: Started container "f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a" | |
[1mSTEP[0m: Get container status for containerID: f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support network[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:28:33.710: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:33.733: INFO: Created container "1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33 | |
Jul 24 05:28:33.795: INFO: Started container "1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33" | |
[1mSTEP[0m: Get container status for containerID: 1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:28:33.809: INFO: Created container "5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26 | |
Jul 24 05:28:33.871: INFO: Started container "5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26" | |
[1mSTEP[0m: Get container status for containerID: 5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26 | |
[It] should support network | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: b92d5e7ce69b8ac9718d0031474deaf3f8b4d17bae456afcb5ec774da9ae8d28 | |
Jul 24 05:28:33.872: INFO: the IP:port is http://10.42.0.202:80 | |
[1mSTEP[0m: check the content of http://10.42.0.202:80 | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.510 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support network [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78[0m | |
[91mTimed out after 60.001s. | |
Expected | |
<*url.Error | 0xc001098000>: { | |
Op: "Get", | |
URL: "http://10.42.0.202:80", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 42, 0, 202], | |
Port: 80, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mprocess label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 27b440e6c345bdc3080a19f64cc32f26fa0a92c18dd365298342350de5e62ed7 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mprocess label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 49353ae43bf41dc82eb52b5e955beb83e15e044fda6448eb6ba5cc9f8432d484 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mlistImage should get exactly 3 repoTags in the result image [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 repoTags in the result image [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNoNewPrivs[0m | |
[1mshould allow privilege escalation when false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should allow privilege escalation when false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761 | |
[1mSTEP[0m: create container alpine-nnp-false-565138cb-cda9-11ea-8530-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:36.991: INFO: Created container "27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd" | |
[1mSTEP[0m: Start container for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd | |
Jul 24 05:29:37.052: INFO: Started container "27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd" | |
[1mSTEP[0m: Get container status for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd | |
[1mSTEP[0m: Get container status for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:29:41.123: INFO: Open log file /tmp/podLogTest592664173/PodSandbox-with-log-directory-56170897-cda9-11ea-8530-5254001ff4e5/alpine-nnp-false-565138cb-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:29:41.123: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support log[0m | |
[1mruntime should support starting container with log [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support starting container with log [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:41.395: INFO: Created container "5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1 | |
Jul 24 05:29:41.438: INFO: Started container "5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1" | |
[1mSTEP[0m: Get container status for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1 | |
[1mSTEP[0m: Get container status for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1 | |
[1mSTEP[0m: check the log context | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:29:45.539: INFO: Open log file /tmp/podLogTest898183400/PodSandbox-with-log-directory-58e21403-cda9-11ea-8530-5254001ff4e5/container-with-log-test-58f4942a-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:29:45.539: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mprocess label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: e031904c2d09d20615785a632aca08f4bacd0b7e01d2821949b03fbd1522d7b6 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mprocess label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: a7c1d82634720db5a9262f626b489e683fc00d4948fd3dd8e5405085bb979211 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mlistImage should get exactly 3 image in the result list [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 image in the result list [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support container exec[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:29:49.399: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:49.416: INFO: Created container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae | |
Jul 24 05:29:49.484: INFO: Started container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae" | |
[1mSTEP[0m: Get container status for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:49.497: INFO: Created container "6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5 | |
Jul 24 05:29:49.560: INFO: Started container "6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5" | |
[1mSTEP[0m: Get container status for containerID: 6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5 | |
[It] should support container exec | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103 | |
[1mSTEP[0m: execSync for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae | |
E0724 05:29:49.589334 203237 remote_runtime.go:351] ExecSync f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae 'echo httpd' from runtime service failed: rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found | |
Jul 24 05:29:49.589: INFO: Unexpected error occurred: rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.480 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support container exec [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103[0m | |
[91mfailed to execSync in container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae" | |
Unexpected error: | |
<*status.statusError | 0xc0002721e0>: { | |
Code: 5, | |
Message: "failed to exec in container: failed to create exec \"aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e\": container not created: not found", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support listing container stats [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support listing container stats [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:49.860: INFO: Created container "aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232 | |
Jul 24 05:29:49.920: INFO: Started container "aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232" | |
[1mSTEP[0m: test container stats | |
[1mSTEP[0m: List container stats for containerID: aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould error on create with wrong options[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should error on create with wrong options | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.283 seconds][0m | |
[k8s.io] SELinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is privileged | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:121[0m | |
[91m[1mshould error on create with wrong options [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[91mExpected an error to have occurred. Got: | |
<nil>: nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175 | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould work with selinux set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with selinux set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 853419aff1d0b516db1bee3e6ada7142f1cb85437801898965c082f40e4c1232 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support port mapping with only container port [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with only container port [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:29:51.000: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:29:51.021: INFO: Created container "2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02 | |
Jul 24 05:29:51.075: INFO: Started container "2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02" | |
[1mSTEP[0m: check the port mapping with only container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: 62fedef3d495d8b1a4af241db086dfd6eda792f6c33fdf7aa32a516095217516 | |
Jul 24 05:29:51.075: INFO: the IP:port is http://10.42.0.213:80 | |
[1mSTEP[0m: check the content of http://10.42.0.213:80 | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.343 seconds][0m | |
[k8s.io] Networking | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support networking | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44[0m | |
[91m[1mruntime should support port mapping with only container port [Conformance] [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86[0m | |
[91mTimed out after 60.000s. | |
Expected | |
<*url.Error | 0xc000eb82d0>: { | |
Op: "Get", | |
URL: "http://10.42.0.213:80", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 42, 0, 213], | |
Port: 80, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support removing PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support removing PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e | |
Jul 24 05:30:51.458: INFO: Stopped PodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e" | |
[1mSTEP[0m: test remove PodSandbox | |
[1mSTEP[0m: Remove PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e | |
Jul 24 05:30:51.461: INFO: Removed PodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e" | |
[1mSTEP[0m: List PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:30:51.461: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 05:30:51.461744 203237 remote_runtime.go:128] StopPodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e": does not exist | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image without tag should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image without tag should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
Jul 24 05:30:51.462: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-latest:latest | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support log[0m | |
[1mruntime should support reopening container log [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support reopening container log [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:30:52.754: INFO: Created container "ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f | |
Jul 24 05:30:52.817: INFO: Started container "ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f" | |
Jul 24 05:30:52.817: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:30:52.817: INFO: Parse container log succeed | |
[1mSTEP[0m: rename container log | |
[1mSTEP[0m: reopen container log | |
Jul 24 05:30:52.817: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:30:52.817: INFO: Parse container log succeed | |
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:30:53.818: INFO: Parse container log succeed | |
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:53.818: INFO: Parse container log succeed | |
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:53.818: INFO: Parse container log succeed | |
Jul 24 05:30:54.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:54.818: INFO: Parse container log succeed | |
Jul 24 05:30:55.819: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:55.819: INFO: Parse container log succeed | |
Jul 24 05:30:56.819: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:56.819: INFO: Parse container log succeed | |
Jul 24 05:30:57.820: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new | |
Jul 24 05:30:57.820: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:6.411 seconds][0m | |
[k8s.io] Container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support reopening container log [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support Privileged is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:30:59.127: INFO: Created container "bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303 | |
Jul 24 05:30:59.197: INFO: Started container "bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303" | |
[1mSTEP[0m: Get container status for containerID: bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mshould support seccomp docker/default on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp docker/default on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:30:59.651: INFO: Created container "d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f | |
Jul 24 05:30:59.821: INFO: Started container "d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f" | |
[1mSTEP[0m: Get container status for containerID: d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should ignore a seccomp profile that blocks setting hostname when privileged[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665 | |
[1mSTEP[0m: create privileged pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create privileged container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests764138652/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:00.302: INFO: Created container "d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c" | |
[1mSTEP[0m: Start container for containerID: d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c | |
Jul 24 05:31:00.366: INFO: Started container "d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c" | |
[1mSTEP[0m: Get container status for containerID: d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen multiple pod sandboxes are not privileged[0m | |
[1mshould create containers with different process labels[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when multiple pod sandboxes are not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137 | |
[It] should create containers with different process labels | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 96f6ed82128e61bcb55cff6a88e77fff3e3db9876c3b0a29caac3f4055ab504c | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 95337dcd5a78d48065ee52e918fb198bc675094bf95d2020c381fe7cec61beac | |
[AfterEach] when multiple pod sandboxes are not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support attach [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support attach [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:01.418: INFO: Created container "4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6 | |
Jul 24 05:31:01.474: INFO: Started container "4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6" | |
[1mSTEP[0m: attach container: 4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6 | |
Jul 24 05:31:01.475: INFO: Get attach url: http://127.0.0.1:10010/attach/L5fg6YFS | |
[1mSTEP[0m: check the output of attach | |
Jul 24 05:31:01.475: INFO: Parse url "http://127.0.0.1:10010/attach/L5fg6YFS" succeed | |
Jul 24 05:31:06.507: INFO: Check attach url "http://127.0.0.1:10010/attach/L5fg6YFS" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:5.395 seconds][0m | |
[k8s.io] Streaming | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
runtime should support attach [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mmount label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 03283638b423aaf01d9742ccbc585191c3b0f8ebe59e92da90021a20b51088d3 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould create containers with the same process label[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should create containers with the same process label | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 19c8307084649319a245c94df2b1c3bc8d689c07374ff0d4c3a60ac43b172f15 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 764e9b232490f62a3b53147c932566113a33cdd3810eee6f9c6f97f2b3d5c111 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing running container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing running container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:07.824: INFO: Created container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88 | |
Jul 24 05:31:07.891: INFO: Started container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88 | |
E0724 05:31:07.891431 203237 remote_runtime.go:261] RemoveContainer "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88" from runtime service failed: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first | |
Jul 24 05:31:07.891: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.413 seconds][0m | |
[k8s.io] Container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support basic operations on container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68[0m | |
[91m[1mruntime should support removing running container [Conformance] [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121[0m | |
[91mfailed to remove container: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first | |
Unexpected error: | |
<*status.statusError | 0xc0011f2460>: { | |
Code: 2, | |
Message: "failed to set removing state for container \"30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88\": container is still running, to stop first", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support Privileged is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:08.209: INFO: Created container "e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288 | |
Jul 24 05:31:08.264: INFO: Started container "e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288" | |
[1mSTEP[0m: Get container status for containerID: e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsUser[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUser | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUser container | |
[1mSTEP[0m: create a container with RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:08.572: INFO: Created container "ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917 | |
Jul 24 05:31:08.628: INFO: Started container "ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917" | |
[1mSTEP[0m: Get container status for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917 | |
[1mSTEP[0m: verify RunAsUser for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917 | |
Jul 24 05:31:08.662: INFO: Execsync succeed | |
Jul 24 05:31:08.662: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support sysctls[0m | |
[1mshould support safe sysctls[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support safe sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:08.943: INFO: Created container "51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2 | |
Jul 24 05:31:08.995: INFO: Started container "51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2" | |
[1mSTEP[0m: check sysctls kernel.shm_rmid_forced | |
[AfterEach] runtime should support sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support port mapping with host port and container port [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with host port and container port [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106 | |
[1mSTEP[0m: create a PodSandbox with host port and container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:31:09.320: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:31:09.335: INFO: Created container "75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43 | |
Jul 24 05:31:09.401: INFO: Started container "75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43" | |
[1mSTEP[0m: check the port mapping with host port and container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:31:09.401: INFO: the IP:port is http://127.0.0.1:12000 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12000 | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.396 seconds][0m | |
[k8s.io] Networking | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support networking | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44[0m | |
[91m[1mruntime should support port mapping with host port and container port [Conformance] [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106[0m | |
[91mTimed out after 60.001s. | |
Expected | |
<*url.Error | 0xc0012f73e0>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12000", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 127, 0, 0, 1], | |
Port: 12000, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support ReadonlyPaths[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ReadonlyPaths | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with ReadonlyPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:09.693: INFO: Created container "01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745" | |
[1mSTEP[0m: Start container for containerID: 01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745 | |
Jul 24 05:32:09.741: INFO: Started container "01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745" | |
[1mSTEP[0m: Get container status for containerID: 01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support that ReadOnlyRootfs is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_false | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:10.044: INFO: Created container "a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b | |
Jul 24 05:32:10.105: INFO: Started container "a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b" | |
[1mSTEP[0m: Get container status for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b | |
[1mSTEP[0m: Get container status for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b | |
[1mSTEP[0m: Check whether rootfs is writable | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:32:14.106: INFO: Open log file /tmp/podLogTest317252427/PodSandbox-with-log-directory-b17b6897-cda9-11ea-8530-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-b18e5c0f-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:32:14.106: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mmount label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 918ccf2fd1436cc92600ac26a9712a94f00944eb79a51ed110b61b314f737e3f | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mmount label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 4cbcd5daca6c071540ec9616d013c3bb00978e1dca3f621ab8077d8ddbc2ee82 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNoNewPrivs[0m | |
[1mshould not allow privilege escalation when true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should not allow privilege escalation when true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755 | |
[1mSTEP[0m: create container alpine-nnp-true-b4aeb180-cda9-11ea-8530-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:15.294: INFO: Created container "dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5" | |
[1mSTEP[0m: Start container for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5 | |
Jul 24 05:32:15.355: INFO: Started container "dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5" | |
[1mSTEP[0m: Get container status for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5 | |
[1mSTEP[0m: Get container status for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5 | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:32:19.357: INFO: Open log file /tmp/podLogTest625479214/PodSandbox-with-log-directory-b49b46dc-cda9-11ea-8530-5254001ff4e5/alpine-nnp-true-b4aeb180-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:32:19.357: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rslave' should support propagation from host to container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rslave' should support propagation from host to container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:19.635: INFO: Created container "50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f | |
Jul 24 05:32:19.696: INFO: Started container "50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f" | |
[1mSTEP[0m: Get container status for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f | |
Jul 24 05:32:19.732: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f | |
Jul 24 05:32:19.758: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f | |
Jul 24 05:32:19.786: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support adding volume and device[0m | |
[1mruntime should support starting container with volume when host path is a symlink [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume when host path is a symlink [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create symlink | |
[1mSTEP[0m: create volume container with symlink host path | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:20.134: INFO: Created container "c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472" | |
[1mSTEP[0m: test start volume container with symlink host path | |
[1mSTEP[0m: Start container for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472 | |
Jul 24 05:32:20.209: INFO: Started container "c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472" | |
[1mSTEP[0m: Get container status for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472 | |
[1mSTEP[0m: check whether 'symlink' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472 | |
Jul 24 05:32:20.235: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support starting container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support starting container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:20.512: INFO: Created container "a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582" | |
[1mSTEP[0m: test start container | |
[1mSTEP[0m: Start container for containerID: a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582 | |
Jul 24 05:32:20.559: INFO: Started container "a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582" | |
[1mSTEP[0m: Get container status for containerID: a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76 | |
[1mSTEP[0m: create podSandbox for security context HostPID | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:21.098: INFO: Created container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e | |
Jul 24 05:32:21.165: INFO: Started container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e" | |
[1mSTEP[0m: Get container status for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e | |
Jul 24 05:32:21.211: INFO: Unexpected error occurred: command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [0.633 seconds][0m | |
[k8s.io] Security Context | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support HostPID [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76[0m | |
[91mfailed to execSync in container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e" | |
Unexpected error: | |
<exec.CodeExitError>: { | |
Err: { | |
s: "command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: ", | |
}, | |
Code: 137, | |
} | |
command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp default which is unconfined on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp default which is unconfined on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:21.458: INFO: Created container "458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa | |
Jul 24 05:32:21.512: INFO: Started container "458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa" | |
[1mSTEP[0m: Get container status for containerID: 458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support portforward in host network[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33 | |
[It] runtime should support portforward in host network | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping in host network | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:32:21.777: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:32:21.793: INFO: Created container "85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5 | |
Jul 24 05:32:21.852: INFO: Started container "85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5" | |
[1mSTEP[0m: port forward PodSandbox: 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63 | |
Jul 24 05:32:21.853: INFO: Get port forward url: http://127.0.0.1:10010/portforward/uRHcEFk2 | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:32:21.853: INFO: Parse url "http://127.0.0.1:10010/portforward/uRHcEFk2" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12002 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:32:21.853: INFO: the IP:port is http://127.0.0.1:12002 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12002 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12002 -> 12003 | |
Forwarding from [::1]:12002 -> 12003 | |
Handling connection for 12002 | |
E0724 05:32:22.865096 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:22 socat[219475] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:23.870100 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:23 socat[219476] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:24.879484 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:24 socat[219477] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:25.955462 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:25 socat[219478] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:26.963555 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:26 socat[219479] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:27.972830 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:27 socat[219480] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:28.980343 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:28 socat[219481] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:29.988657 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:29 socat[219482] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:30.997010 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:30 socat[219483] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:32.005548 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:32 socat[219484] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:33.027357 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:33 socat[219485] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:34.035021 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:34 socat[219486] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:35.042871 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:35 socat[219487] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:36.051034 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:36 socat[219488] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:37.104504 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:37 socat[219489] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:38.122917 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:38 socat[219490] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:39.197981 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:39 socat[219491] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:40.206149 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:40 socat[219492] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:41.214283 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:41 socat[219493] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:42.222005 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:42 socat[219494] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:43.228503 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:43 socat[219495] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:44.236298 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:44 socat[219496] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:45.244075 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:45 socat[219497] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:46.251788 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:46 socat[219500] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:47.258952 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:47 socat[219503] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:48.266866 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:48 socat[219508] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:49.274596 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:49 socat[219509] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:50.281592 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:50 socat[219512] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:51.289854 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:51 socat[219516] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:52.297656 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:52 socat[219517] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:53.305817 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:53 socat[219518] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:54.313853 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:54 socat[219519] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:55.321740 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:55 socat[219520] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:56.329760 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:56 socat[219521] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:57.336719 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:57 socat[219522] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:58.344805 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:58 socat[219523] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:32:59.353437 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:59 socat[219524] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:00.362091 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:00 socat[219525] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:01.370063 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:01 socat[219526] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:02.377882 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:02 socat[219527] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:03.385303 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:03 socat[219528] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:04.393059 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:04 socat[219529] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:05.400229 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:05 socat[219530] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:06.407905 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:06 socat[219531] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:07.415302 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:07 socat[219532] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:08.423649 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:08 socat[219533] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:09.431237 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:09 socat[219534] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:10.438294 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:10 socat[219535] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:11.446300 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:11 socat[219536] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:12.451751 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:12 socat[219537] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:13.459844 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:13 socat[219538] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:14.467833 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:14 socat[219539] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:15.475666 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:15 socat[219540] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:16.484341 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:16 socat[219541] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:17.491666 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:17 socat[219542] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:18.498670 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:18 socat[219543] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:19.506264 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:19 socat[219544] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:20.513801 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:20 socat[219545] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:33:21.521562 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:21 socat[219546] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [60.226 seconds][0m | |
[k8s.io] Streaming | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:38[0m | |
[91m[1mruntime should support portforward in host network [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48[0m | |
[91mTimed out after 60.001s. | |
Expected | |
<*url.Error | 0xc000d96390>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12002", | |
Err: {s: "EOF"}, | |
} | |
to be nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostNetwork is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:33:22.151: INFO: Created container "862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74 | |
Jul 24 05:33:22.208: INFO: Started container "862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:33:22.208: INFO: Open log file /tmp/podLogTest046958914/NamespaceOption-PodSandbox-d5ea3acd-cda8-11ea-8530-5254001ff4e5/container-with-HostNetwork-test-dc87aeed-cda9-11ea-8530-5254001ff4e5.log | |
Jul 24 05:33:22.208: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support execSync [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:33:22.499: INFO: Created container "35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87 | |
Jul 24 05:33:22.569: INFO: Started container "35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87" | |
[1mSTEP[0m: test execSync | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87 | |
Jul 24 05:33:22.593: INFO: Execsync succeed | |
Jul 24 05:33:22.593: INFO: verify Execsync output succeed | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support SupplementalGroups[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support SupplementalGroups | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context SupplementalGroups | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:33:22.870: INFO: Created container "eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2 | |
Jul 24 05:33:22.919: INFO: Started container "eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2" | |
[1mSTEP[0m: Get container status for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2 | |
[1mSTEP[0m: verify SupplementalGroups for container | |
[1mSTEP[0m: execSync for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2 | |
Jul 24 05:33:22.944: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support ContainerPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ContainerPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220 | |
[1mSTEP[0m: create podSandbox with PID set to container | |
Jul 24 05:33:23.093: INFO: Pid namespace is "CONTAINER" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:33:23.236: INFO: Created container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d | |
Jul 24 05:33:23.300: INFO: Started container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d" | |
[1mSTEP[0m: Get container status for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d | |
E0724 05:33:23.339961 203237 remote_runtime.go:351] ExecSync 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d 'sh -c while ! cat /proc/1/cmdline | grep "master process"; do sleep 1; done' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
Jul 24 05:33:23.339: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 05:33:23.351819 203237 remote_runtime.go:128] StopPodSandbox "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" from runtime service failed: rpc error: code = Unknown desc = failed to stop container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d": failed to kill container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d": context canceled: unknown | |
[1mSTEP[0m: delete PodSandbox | |
E0724 05:33:23.352221 203237 remote_runtime.go:145] RemovePodSandbox "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" from runtime service failed: rpc error: code = Unknown desc = sandbox container "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" is not fully stopped | |
[91m[1m• Failure [0.259 seconds][0m | |
[k8s.io] Security Context | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support ContainerPID [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220[0m | |
[91mfailed to execSync in container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d" | |
Unexpected error: | |
<*status.statusError | 0xc000a41f90>: { | |
Code: 2, | |
Message: "failed to exec in container: failed to start exec \"365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1\": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused \"process_linux.go:101: executing setns process caused \\\"exit status 1\\\"\": unknown", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[91m[1mSummarizing 13 Failures:[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Streaming [0m[0mruntime should support streaming interfaces [0m[91m[1m[It] runtime should support portforward [Conformance] [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support PodPID [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is not privileged [0m[91m[1m[It] should error on create with wrong options [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support container log [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support network [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support container exec [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is privileged [0m[91m[1m[It] should error on create with wrong options [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Networking [0m[0mruntime should support networking [0m[91m[1m[It] runtime should support port mapping with only container port [Conformance] [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Container [0m[0mruntime should support basic operations on container [0m[91m[1m[It] runtime should support removing running container [Conformance] [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Networking [0m[0mruntime should support networking [0m[91m[1m[It] runtime should support port mapping with host port and container port [Conformance] [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support HostPID [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Streaming [0m[0mruntime should support streaming interfaces [0m[91m[1m[It] runtime should support portforward in host network [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support ContainerPID [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[1m[91mRan 90 of 97 Specs in 441.815 seconds[0m | |
[1m[91mFAIL![0m -- [32m[1m77 Passed[0m | [91m[1m13 Failed[0m | [33m[1m0 Pending[0m | [36m[1m7 Skipped[0m | |
--- FAIL: TestCRISuite (441.82s) | |
FAIL |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
type=USER_END msg=audit(1595593283.524:4777): pid=185853 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595593283.524:4778): pid=185853 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595593305.126:4779): pid=185856 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595593305.126:4780): pid=185856 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/vagrant" cmd=63726974657374202D2D72756E74696D652D656E64706F696E743D756E69783A2F2F2F72756E2F6B33732F636F6E7461696E6572642F636F6E7461696E6572642E736F636B202D2D67696E6B676F2E736565643D313233343536373839 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595593305.126:4781): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595593305.129:4782): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=ANOM_PROMISCUOUS msg=audit(1595593305.166:4783): dev=vethf50dbefa prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593305.473:4784): dev=vethf50dbefa prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593306.645:4785): dev=veth21cf3c16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593306.962:4786): dev=veth21cf3c16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593306.997:4787): dev=veth29524147 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593307.325:4788): dev=veth29524147 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593307.367:4789): dev=veth1eb9f629 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593307.583:4790): avc: denied { search } for pid=186574 comm="top" name="1" dev="proc" ino=550537 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c595,c688 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593307.583:4790): avc: denied { read } for pid=186574 comm="top" name="stat" dev="proc" ino=550625 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c595,c688 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593307.725:4791): dev=veth1eb9f629 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593308.686:4792): dev=veth7cb7dceb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593308.974:4793): dev=veth7cb7dceb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593309.017:4794): dev=veth0097419d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593310.409:4795): dev=veth0097419d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593310.444:4796): dev=veth622ab97a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593310.768:4797): dev=veth622ab97a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593310.807:4798): dev=veth09c165a1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.081:4799): dev=veth09c165a1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.120:4800): dev=vetha09bdfe2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.440:4801): dev=vetha09bdfe2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.501:4802): dev=veth3dae89b1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.806:4803): dev=veth3dae89b1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593315.843:4804): dev=vetha7858760 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593316.162:4805): dev=vetha7858760 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593316.200:4806): dev=vethb70b6edd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593316.405:4807): avc: denied { open } for pid=188201 comm="nginx" path="pipe:[557127]" dev="pipefs" ino=557127 scontext=system_u:system_r:container_t:s0:c386,c524 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593317.545:4808): dev=vethb70b6edd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593317.587:4809): dev=vethcbd6e0c4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593317.903:4810): dev=vethcbd6e0c4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593317.944:4811): dev=veth5bb4ff22 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593318.165:4812): dev=veth5bb4ff22 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593318.251:4813): dev=vethb597858e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593318.546:4814): dev=vethb597858e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593318.581:4815): dev=veth9e4a86a4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593319.075:4816): dev=veth9e4a86a4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593319.143:4817): dev=veth765a2b05 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593319.448:4818): dev=veth765a2b05 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593319.515:4819): dev=vethea624e16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593319.819:4820): dev=vethea624e16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593320.925:4821): dev=vethd4618b32 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.135:4822): dev=vethd4618b32 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.176:4823): dev=vethb4cabd50 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.444:4824): dev=vethb4cabd50 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.481:4825): dev=veth5f39faf1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.923:4826): dev=veth5f39faf1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593321.963:4827): dev=veth28304afe prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593322.130:4828): avc: denied { open } for pid=190243 comm="nginx" path="pipe:[563646]" dev="pipefs" ino=563646 scontext=system_u:system_r:container_t:s0:c444,c598 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593323.300:4829): dev=veth28304afe prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593323.343:4830): dev=vethc7f9e496 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593323.711:4831): dev=vethc7f9e496 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593323.747:4832): dev=vethf156fec8 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593324.008:4833): dev=vethf156fec8 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593324.048:4834): dev=vethe69977fd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593324.462:4835): dev=vethe69977fd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593324.516:4836): dev=veth75608639 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593328.893:4837): dev=veth75608639 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593328.936:4838): dev=vethdc414206 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593329.262:4839): dev=vethdc414206 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593329.295:4840): dev=vethed6b1a00 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593329.583:4841): dev=vethed6b1a00 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593329.616:4842): dev=veth035901b1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593329.830:4843): avc: denied { open } for pid=191623 comm="httpd" path="pipe:[568094]" dev="pipefs" ino=568094 scontext=system_u:system_r:container_t:s0:c961,c1000 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.053:4844): dev=veth035901b1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.109:4845): dev=veth5cbac81f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.563:4846): dev=veth5cbac81f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.612:4847): dev=veth1c9c5df7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.960:4848): dev=veth1c9c5df7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593330.998:4849): dev=veth6d8e83da prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593331.298:4850): dev=veth6d8e83da prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593331.334:4851): dev=vethd3d0cef5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593331.523:4852): avc: denied { search } for pid=192672 comm="top" name="1" dev="proc" ino=571666 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c258 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593331.523:4852): avc: denied { read } for pid=192672 comm="top" name="stat" dev="proc" ino=571808 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c258 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593331.696:4853): dev=vethd3d0cef5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593331.738:4854): dev=veth73ca3e01 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.123:4855): dev=veth73ca3e01 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.167:4856): dev=vethd6a2a3d6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.469:4857): dev=vethd6a2a3d6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.510:4858): dev=vethcb10acd6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.809:4859): dev=vethcb10acd6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593332.852:4860): dev=veth96af5b78 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593333.403:4861): dev=veth96af5b78 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593333.443:4862): dev=veth00d9ebcb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593333.695:4863): dev=veth00d9ebcb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593337.319:4864): dev=veth51d2b381 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593337.635:4865): dev=veth51d2b381 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593337.674:4866): dev=veth31a9a533 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593338.311:4867): dev=veth31a9a533 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593338.354:4868): dev=veth33e00e03 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593338.620:4869): avc: denied { open } for pid=194296 comm="httpd" path="pipe:[576846]" dev="pipefs" ino=576846 scontext=system_u:system_r:container_t:s0:c648,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593338.847:4870): dev=veth33e00e03 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593338.888:4871): dev=veth468b862c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593339.213:4872): dev=veth468b862c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593339.261:4873): dev=veth3b509b2d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593339.543:4874): dev=veth3b509b2d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593341.180:4875): dev=vethb5bca19f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593345.524:4876): dev=vethb5bca19f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593345.569:4877): dev=veth1535eeb4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593349.868:4878): dev=veth1535eeb4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593349.923:4879): dev=veth69b65927 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593350.230:4880): dev=veth69b65927 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593350.268:4881): dev=veth779e4e10 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593350.590:4882): dev=veth779e4e10 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593353.543:4883): dev=vethbc7bbdcd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593353.728:4884): avc: denied { open } for pid=195877 comm="httpd" path="pipe:[582724]" dev="pipefs" ino=582724 scontext=system_u:system_r:container_t:s0:c261,c292 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.004:4885): dev=vethbc7bbdcd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.046:4886): dev=veth1b25b2c1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.378:4887): dev=veth1b25b2c1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.416:4888): dev=veth63dcc678 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.613:4889): dev=veth63dcc678 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.658:4890): dev=vethc1f154fc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593354.994:4891): dev=vethc1f154fc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593355.027:4892): dev=vethda5298a6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593355.210:4893): avc: denied { open } for pid=196798 comm="nginx" path="pipe:[585186]" dev="pipefs" ino=585186 scontext=system_u:system_r:container_t:s0:c290,c729 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593356.344:4894): dev=vethda5298a6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593356.406:4895): dev=vethe9d38e0e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593356.611:4896): dev=vethe9d38e0e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593357.719:4897): dev=veth734e107b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593363.975:4898): dev=veth734e107b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593364.017:4899): dev=veth54f2df4f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593364.358:4900): dev=veth54f2df4f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593364.399:4901): dev=veth4b890e01 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593364.983:4902): avc: denied { search } for pid=197582 comm="top" name="13" dev="proc" ino=587570 scontext=system_u:system_r:container_t:s0:c721,c962 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593364.983:4902): avc: denied { read } for pid=197582 comm="top" name="stat" dev="proc" ino=588187 scontext=system_u:system_r:container_t:s0:c721,c962 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593365.160:4903): dev=veth4b890e01 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593365.197:4904): dev=vetha956cf82 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593365.513:4905): dev=vetha956cf82 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593365.545:4906): dev=veth31ac0519 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593365.657:4907): dev=veth4b77fb86 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593366.116:4908): dev=veth31ac0519 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593366.256:4909): dev=veth4b77fb86 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593366.294:4910): dev=vethf4cc825c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593371.606:4911): dev=vethf4cc825c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593371.641:4912): dev=vethfaca2654 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593371.939:4913): dev=vethfaca2654 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593371.979:4914): dev=veth8f14c770 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593372.402:4915): dev=veth8f14c770 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593372.442:4916): dev=veth394902af prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593372.854:4917): dev=veth394902af prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593372.893:4918): dev=vethdae5e7d2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593373.284:4919): dev=vethdae5e7d2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593373.323:4920): dev=veth28e4fdc8 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593373.698:4921): dev=veth28e4fdc8 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593373.733:4922): dev=vethf23d13e5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593374.034:4923): dev=vethf23d13e5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593374.080:4924): dev=veth540fc314 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593374.300:4925): avc: denied { open } for pid=199965 comm="nginx" path="pipe:[595889]" dev="pipefs" ino=595889 scontext=system_u:system_r:container_t:s0:c722,c747 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593375.433:4926): dev=veth540fc314 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593375.472:4927): dev=veth2395e009 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593375.880:4928): dev=veth2395e009 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593375.920:4929): dev=veth3fbd9678 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593380.349:4930): dev=veth3fbd9678 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593380.388:4931): dev=vethaa2536e7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593380.719:4932): dev=vethaa2536e7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593380.759:4933): dev=veth699beb29 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593381.105:4934): dev=veth699beb29 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593381.157:4935): dev=veth59db34cf prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593385.504:4936): dev=veth59db34cf prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593385.541:4937): dev=vethffa7dad9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593385.943:4938): dev=vethffa7dad9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593385.981:4939): dev=vethc0f5133b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593386.377:4940): dev=vethc0f5133b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593386.413:4941): dev=vethb61e203b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593386.886:4942): dev=vethb61e203b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593386.923:4943): dev=vethf3e4f2c9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593387.114:4944): avc: denied { open } for pid=201842 comm="nginx" path="pipe:[602617]" dev="pipefs" ino=602617 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595593387.217:4945): avc: denied { search } for pid=201933 comm="pidof" name="1" dev="proc" ino=1333 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.217:4945): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.217:4945): avc: denied { open } for pid=201933 comm="pidof" path="/proc/1/stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.218:4946): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=1559 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.218:4947): avc: denied { search } for pid=201933 comm="pidof" name="2" dev="proc" ino=1395 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.218:4947): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.218:4947): avc: denied { open } for pid=201933 comm="pidof" path="/proc/2/stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.218:4948): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156012 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4949): avc: denied { search } for pid=201933 comm="pidof" name="546" dev="proc" ino=17537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4949): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4949): avc: denied { open } for pid=201933 comm="pidof" path="/proc/546/stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4950): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=14289 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4951): avc: denied { search } for pid=201933 comm="pidof" name="602" dev="proc" ino=18254 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4951): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4951): avc: denied { open } for pid=201933 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4952): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4953): avc: denied { search } for pid=201933 comm="pidof" name="605" dev="proc" ino=18311 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4953): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4953): avc: denied { open } for pid=201933 comm="pidof" path="/proc/605/stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4954): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=18712 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4955): avc: denied { search } for pid=201933 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4955): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4955): avc: denied { open } for pid=201933 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4956): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=19247 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4957): avc: denied { search } for pid=201933 comm="pidof" name="643" dev="proc" ino=19524 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4957): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4957): avc: denied { open } for pid=201933 comm="pidof" path="/proc/643/stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4958): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156081 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4959): avc: denied { search } for pid=201933 comm="pidof" name="656" dev="proc" ino=19536 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4959): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4959): avc: denied { open } for pid=201933 comm="pidof" path="/proc/656/stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4960): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21030 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.219:4961): avc: denied { search } for pid=201933 comm="pidof" name="657" dev="proc" ino=19539 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.219:4961): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4961): avc: denied { open } for pid=201933 comm="pidof" path="/proc/657/stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.219:4962): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20720 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4963): avc: denied { search } for pid=201933 comm="pidof" name="659" dev="proc" ino=19545 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4963): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4963): avc: denied { open } for pid=201933 comm="pidof" path="/proc/659/stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4964): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21020 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4965): avc: denied { search } for pid=201933 comm="pidof" name="666" dev="proc" ino=19851 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4965): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4965): avc: denied { open } for pid=201933 comm="pidof" path="/proc/666/stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4966): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156102 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4967): avc: denied { search } for pid=201933 comm="pidof" name="671" dev="proc" ino=20673 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4967): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4967): avc: denied { open } for pid=201933 comm="pidof" path="/proc/671/stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4968): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20675 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4969): avc: denied { search } for pid=201933 comm="pidof" name="683" dev="proc" ino=19883 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4969): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4969): avc: denied { open } for pid=201933 comm="pidof" path="/proc/683/stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4970): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20954 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4971): avc: denied { search } for pid=201933 comm="pidof" name="709" dev="proc" ino=20032 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4971): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4971): avc: denied { open } for pid=201933 comm="pidof" path="/proc/709/stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4972): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156103 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4973): avc: denied { search } for pid=201933 comm="pidof" name="751" dev="proc" ino=20306 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4973): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4973): avc: denied { open } for pid=201933 comm="pidof" path="/proc/751/stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4974): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21809 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.220:4975): avc: denied { search } for pid=201933 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.220:4975): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4975): avc: denied { open } for pid=201933 comm="pidof" path="/proc/754/stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.220:4976): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21334 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.221:4977): avc: denied { search } for pid=201933 comm="pidof" name="755" dev="proc" ino=20384 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.221:4977): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4977): avc: denied { open } for pid=201933 comm="pidof" path="/proc/755/stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4978): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156104 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.221:4979): avc: denied { search } for pid=201933 comm="pidof" name="830" dev="proc" ino=21910 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.221:4979): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=22781 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4980): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=22016 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.221:4981): avc: denied { search } for pid=201933 comm="pidof" name="50569" dev="proc" ino=59858 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.221:4981): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4981): avc: denied { open } for pid=201933 comm="pidof" path="/proc/50569/stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4982): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156109 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.221:4983): avc: denied { search } for pid=201933 comm="pidof" name="51924" dev="proc" ino=63902 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.221:4983): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4983): avc: denied { open } for pid=201933 comm="pidof" path="/proc/51924/stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4984): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=63909 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.221:4985): avc: denied { search } for pid=201933 comm="pidof" name="167899" dev="proc" ino=485502 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.221:4985): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=485503 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4985): avc: denied { open } for pid=201933 comm="pidof" path="/proc/167899/stat" dev="proc" ino=485503 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.221:4986): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=485523 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.222:4987): avc: denied { search } for pid=201933 comm="pidof" name="185834" dev="proc" ino=548321 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.222:4987): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=602911 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.222:4988): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=548329 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595593387.223:4989): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.223:4989): avc: denied { open } for pid=201933 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.223:4990): avc: denied { search } for pid=201933 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595593387.223:4990): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595593387.223:4990): avc: denied { open } for pid=201933 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593387.392:4991): dev=vethf3e4f2c9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593387.430:4992): dev=vethc967bcf7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593387.772:4993): dev=vethc967bcf7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593387.934:4994): avc: denied { open } for pid=202337 comm="nginx" path="pipe:[604533]" dev="pipefs" ino=604533 scontext=system_u:system_r:container_t:s0:c79,c293 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593389.320:4995): dev=vethb2ae938c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593389.638:4996): dev=vethb2ae938c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593389.677:4997): dev=veth6d162eed prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593390.145:4998): dev=veth6d162eed prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595593390.186:4999): dev=vethdcb0ff4e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595593390.503:5000): avc: denied { open } for pid=203042 comm="nginx" path="pipe:[606644]" dev="pipefs" ino=606644 scontext=system_u:system_r:container_t:s0:c367,c720 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595593390.643:5001): dev=vethdcb0ff4e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root" | |
type=USER_END msg=audit(1595593390.668:5002): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595593390.669:5003): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595593430.850:5004): pid=203200 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595593430.850:5005): pid=203200 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/vagrant" cmd=6370202D7666202F7661722F6C6F672F61756469742F61756469742E6C6F67202F746D702F746573742D6372692F7065726D6973736976652D61756469742E6C6F67 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595593430.852:5006): pid=203200 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595593430.854:5007): pid=203200 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
critest version: 1.18.0-89-gbaca4a1 | |
Running Suite: CRI validation | |
============================= | |
Random Seed: [1m123456789[0m - Will randomize all specs | |
Will run [1m90[0m of [1m97[0m specs | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing stopped container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing stopped container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:45.294: INFO: Created container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151 | |
Jul 24 05:21:45.361: INFO: Started container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151 | |
Jul 24 05:21:45.392: INFO: Stopped container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151" | |
[1mSTEP[0m: Get container status for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151 | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151 | |
Jul 24 05:21:45.395: INFO: Removed container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151" | |
[1mSTEP[0m: List containers for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image with tag should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with tag should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Runtime info[0m [90mruntime should support returning runtime info[0m | |
[1mruntime should return runtime conditions [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return runtime conditions [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45 | |
[1mSTEP[0m: test runtime status | |
[AfterEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostNetwork is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:46.790: INFO: Created container "96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba | |
Jul 24 05:21:46.852: INFO: Started container "96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:21:46.852: INFO: Open log file /tmp/podLogTest321519101/NamespaceOption-PodSandbox-3d181b7c-cda8-11ea-966e-5254001ff4e5/container-with-HostNetwork-test-3e0f126b-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:21:46.852: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should support an seccomp profile that blocks setting hostname with SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests195578168/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:47.111: INFO: Created container "e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0" | |
[1mSTEP[0m: Start container for containerID: e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0 | |
Jul 24 05:21:47.169: INFO: Started container "e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0" | |
[1mSTEP[0m: Get container status for containerID: e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould work with just selinux level set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with just selinux level set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: fd9117d634f62be9b171e0a4a170c87804d85068b2ed45af8f3bde51bb998907 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image with digest should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with digest should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should return error if RunAsGroup is set without RunAsUser[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should return error if RunAsGroup is set without RunAsUser | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with invalid RunAsGroup | |
[1mSTEP[0m: create invalid RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsGroup without RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:21:48.796474 185858 remote_runtime.go:200] CreateContainer in sandbox "b49a6e3700a10881c81538426ba6c41d36d8398b4178b68ff9ad44510720c9ef" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support execSync with timeout [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync with timeout [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:49.179: INFO: Created container "d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a | |
Jul 24 05:21:49.239: INFO: Started container "d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a" | |
[1mSTEP[0m: test execSync with timeout | |
E0724 05:21:50.266572 185858 remote_runtime.go:351] ExecSync d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded | |
[1mSTEP[0m: timeout exec process should be gone | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support exec with tty=false and stdin=false [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=false and stdin=false [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:50.558: INFO: Created container "fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f | |
Jul 24 05:21:50.614: INFO: Started container "fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f" | |
[1mSTEP[0m: exec given command in container: fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f | |
Jul 24 05:21:50.614: INFO: Get exec url: http://127.0.0.1:10010/exec/1rSjOntQ | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:21:50.615: INFO: Parse url "http://127.0.0.1:10010/exec/1rSjOntQ" succeed | |
Jul 24 05:21:50.645: INFO: Check exec url "http://127.0.0.1:10010/exec/1rSjOntQ" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsGroup[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsGroup | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container for security context RunAsGroup | |
[1mSTEP[0m: create RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsUser and RunAsGroup | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:50.924: INFO: Created container "c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f | |
Jul 24 05:21:50.969: INFO: Started container "c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f" | |
[1mSTEP[0m: Get container status for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f | |
[1mSTEP[0m: Get container status for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f | |
[1mSTEP[0m: verify RunAsGroup for container | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:21:54.979: INFO: Open log file /tmp/podLogTest336394039/PodSandbox-with-log-directory-4076968e-cda8-11ea-966e-5254001ff4e5/container-with-RunAsGroup-test-40887f54-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:21:54.979: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support MaskedPaths[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support MaskedPaths | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with MaskedPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:55.239: INFO: Created container "338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a" | |
[1mSTEP[0m: Start container for containerID: 338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a | |
Jul 24 05:21:55.290: INFO: Started container "338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a" | |
[1mSTEP[0m: Get container status for containerID: 338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support sysctls[0m | |
[1mshould support unsafe sysctls[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support unsafe sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:55.605: INFO: Created container "5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0 | |
Jul 24 05:21:55.659: INFO: Started container "5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0" | |
[1mSTEP[0m: check sysctls fs.mqueue.msg_max | |
[AfterEach] runtime should support sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsUserName[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUserName | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUserName container | |
[1mSTEP[0m: create a container with RunAsUserName | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:55.956: INFO: Created container "bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075 | |
Jul 24 05:21:56.002: INFO: Started container "bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075" | |
[1mSTEP[0m: Get container status for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075 | |
[1mSTEP[0m: verify RunAsUserName for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075 | |
Jul 24 05:21:56.023: INFO: Execsync succeed | |
Jul 24 05:21:56.023: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support portforward [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support portforward [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:21:56.297: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:56.329: INFO: Created container "7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f | |
Jul 24 05:21:56.393: INFO: Started container "7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f" | |
[1mSTEP[0m: port forward PodSandbox: 40b48e871a8775706d60331d7fd9fc95d1de2b35c6b6091520420282f1e3eb14 | |
Jul 24 05:21:56.394: INFO: Get port forward url: http://127.0.0.1:10010/portforward/vy7q6wdj | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:21:56.395: INFO: Parse url "http://127.0.0.1:10010/portforward/vy7q6wdj" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12001 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:21:56.395: INFO: the IP:port is http://127.0.0.1:12001 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12001 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12001 -> 80 | |
Forwarding from [::1]:12001 -> 80 | |
Handling connection for 12001 | |
Jul 24 05:21:57.410: INFO: check port mapping succeed | |
Jul 24 05:21:57.410: INFO: Check port forward url "http://127.0.0.1:10010/portforward/vy7q6wdj" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostIpc is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIPC is true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:57.718: INFO: Created container "2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950 | |
Jul 24 05:21:57.768: INFO: Started container "2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950" | |
[1mSTEP[0m: Get container status for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950 | |
[1mSTEP[0m: check if the shared memory segment is included in the container | |
[1mSTEP[0m: execSync for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950 | |
Jul 24 05:21:57.791: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support stopping PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support stopping PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: test stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3 | |
Jul 24 05:21:58.186: INFO: Stopped PodSandbox "b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3" | |
[1mSTEP[0m: Get PodSandbox status for podID: b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3 | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support stopping container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support stopping container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:58.377: INFO: Created container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057 | |
Jul 24 05:21:58.425: INFO: Started container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057 | |
Jul 24 05:21:58.462: INFO: Stopped container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057" | |
[1mSTEP[0m: Get container status for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould create containers with the same process label[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should create containers with the same process label | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f763c787674c321be40bbefee692377e6e9ae224324917454ca6a25e57f555a0 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: c26f777cf621f6ae2d3773eb0eba7ff6f68c039c87c878ad17fffca2a149ad48 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp unconfined on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp unconfined on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:21:59.251: INFO: Created container "432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87 | |
Jul 24 05:21:59.305: INFO: Started container "432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87" | |
[1mSTEP[0m: Get container status for containerID: 432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould work with just selinux level set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with just selinux level set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 62428921d3e86446c9a715c0a91e2a731c169d172b2f6358c49825e606b2ec95 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mimage status should support all kinds of references [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status should support all kinds of references [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing created container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing created container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:01.049: INFO: Created container "7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3 | |
Jul 24 05:22:01.052: INFO: Removed container "7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3" | |
[1mSTEP[0m: List containers for containerID: 7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support creating container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support creating container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83 | |
[1mSTEP[0m: test create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:01.294: INFO: Created container "a866057f7b00b477124e30490f81a87f147e915c707908d8afb2ff33569fe82b" | |
[1mSTEP[0m: test list container | |
[1mSTEP[0m: List containers for containerID: a866057f7b00b477124e30490f81a87f147e915c707908d8afb2ff33569fe82b | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rshared' should support propagation from host to container and vice versa[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rshared' should support propagation from host to container and vice versa | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:01.640: INFO: Created container "c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa | |
Jul 24 05:22:01.699: INFO: Started container "c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa" | |
[1mSTEP[0m: Get container status for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa | |
Jul 24 05:22:01.727: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa | |
Jul 24 05:22:01.750: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa | |
Jul 24 05:22:01.787: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support PodPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support PodPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194 | |
[1mSTEP[0m: create podSandbox for sharing process namespace | |
Jul 24 05:22:01.944: INFO: Pid namespace is "POD" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:02.070: INFO: Created container "2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97 | |
Jul 24 05:22:02.117: INFO: Started container "2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97" | |
[1mSTEP[0m: Get container status for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97 | |
Jul 24 05:22:03.167: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support DNS config [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support DNS config [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54 | |
[1mSTEP[0m: create a PodSandbox with DNS config | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:03.504: INFO: Created container "7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2 | |
Jul 24 05:22:03.572: INFO: Started container "7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2" | |
[1mSTEP[0m: check DNS config | |
[1mSTEP[0m: get the current dns config via execSync | |
Jul 24 05:22:03.598: INFO: check DNS config succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould error on create with wrong options[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should error on create with wrong options | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.300 seconds][0m | |
[k8s.io] SELinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is not privileged | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109[0m | |
[91m[1mshould error on create with wrong options [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[91mExpected an error to have occurred. Got: | |
<nil>: nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175 | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rprivate' should not support propagation[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rprivate' should not support propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:04.197: INFO: Created container "1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788 | |
Jul 24 05:22:04.249: INFO: Started container "1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788" | |
[1mSTEP[0m: Get container status for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788 | |
Jul 24 05:22:04.273: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788 | |
Jul 24 05:22:04.297: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788 | |
Jul 24 05:22:04.321: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support that ReadOnlyRootfs is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_true | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:04.722: INFO: Created container "f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee | |
Jul 24 05:22:04.777: INFO: Started container "f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee" | |
[1mSTEP[0m: Get container status for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee | |
[1mSTEP[0m: Get container status for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee | |
[1mSTEP[0m: Check whether rootfs is read-only | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:22:08.795: INFO: Open log file /tmp/podLogTest783981147/PodSandbox-with-log-directory-48a1e76a-cda8-11ea-966e-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-48c083d7-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:08.795: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support exec with tty=true and stdin=true [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=true and stdin=true [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:09.059: INFO: Created container "3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c | |
Jul 24 05:22:09.117: INFO: Started container "3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c" | |
[1mSTEP[0m: exec given command in container: 3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c | |
Jul 24 05:22:09.117: INFO: Get exec url: http://127.0.0.1:10010/exec/Crb4zWvB | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:22:09.117: INFO: Parse url "http://127.0.0.1:10010/exec/Crb4zWvB" succeed | |
Jul 24 05:22:09.144: INFO: Check exec url "http://127.0.0.1:10010/exec/Crb4zWvB" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support running PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support running PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51 | |
[1mSTEP[0m: test run a default PodSandbox | |
[1mSTEP[0m: Get PodSandbox status for podID: 6476b93d696de36e729dd1c06916bd6a180456b446a4f7b16a5f8c032d9852aa | |
[1mSTEP[0m: test list PodSandbox | |
[1mSTEP[0m: List PodSandbox for podID: 6476b93d696de36e729dd1c06916bd6a180456b446a4f7b16a5f8c032d9852aa | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:22:09.389: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support container log[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:22:09.724: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:09.750: INFO: Created container "64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f | |
Jul 24 05:22:09.828: INFO: Started container "64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f" | |
[1mSTEP[0m: Get container status for containerID: 64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:09.848: INFO: Created container "9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102 | |
Jul 24 05:22:09.906: INFO: Started container "9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102" | |
[1mSTEP[0m: Get container status for containerID: 9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102 | |
[It] should support container log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82 | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support setting Capability[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support setting Capability | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with security context Capability and test | |
[1mSTEP[0m: create Capability container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:10.261: INFO: Created container "3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67" | |
[1mSTEP[0m: Start container for containerID: 3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67 | |
Jul 24 05:22:10.315: INFO: Started container "3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67" | |
[1mSTEP[0m: Get container status for containerID: 3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67 | |
[1mSTEP[0m: create container without security context Capability and test | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:10.352: INFO: Created container "862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a" | |
[1mSTEP[0m: Start container for containerID: 862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a | |
Jul 24 05:22:10.400: INFO: Started container "862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a" | |
[1mSTEP[0m: Get container status for containerID: 862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support adding volume and device[0m | |
[1mruntime should support starting container with volume [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:10.760: INFO: Created container "bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba | |
Jul 24 05:22:10.820: INFO: Started container "bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba" | |
[1mSTEP[0m: Get container status for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba | |
[1mSTEP[0m: check whether 'hostPath' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba | |
Jul 24 05:22:10.841: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostIpc is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIpc is false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:11.117: INFO: Created container "144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8 | |
Jul 24 05:22:11.158: INFO: Started container "144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8" | |
[1mSTEP[0m: Get container status for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8 | |
[1mSTEP[0m: check if the shared memory segment is not included in the container | |
[1mSTEP[0m: execSync for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8 | |
Jul 24 05:22:11.193: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mshould work with selinux set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with selinux set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 019da15c58f61782e82ce72adba893b193bd5996c846d31362de4ce23ff293ce | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mmount label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: cf3d7af0803c50488adc616945136b2cfcbda407b0848a21ef2c83e4f3e80d44 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should not block setting host name with unconfined seccomp and SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create unconfined Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:12.287: INFO: Created container "342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea" | |
[1mSTEP[0m: Start container for containerID: 342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea | |
Jul 24 05:22:12.336: INFO: Started container "342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea" | |
[1mSTEP[0m: Get container status for containerID: 342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support set hostname [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support set hostname [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70 | |
[1mSTEP[0m: create a PodSandbox with hostname | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:12.617: INFO: Created container "1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d | |
Jul 24 05:22:12.661: INFO: Started container "1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d" | |
[1mSTEP[0m: check hostname | |
[1mSTEP[0m: get the current hostname via execSync | |
Jul 24 05:22:12.690: INFO: check hostname succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mruntime should block sethostname with docker/default seccomp profile and no extra caps[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:12.960: INFO: Created container "ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89" | |
[1mSTEP[0m: Start container for containerID: ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89 | |
Jul 24 05:22:13.131: INFO: Started container "ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89" | |
[1mSTEP[0m: Get container status for containerID: ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should not support a custom seccomp profile without using localhost/ as a prefix[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create /tmp/seccomp-tests517793810/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:22:13.579885 185858 remote_runtime.go:200] CreateContainer in sandbox "b0eaf4965341f1baa4374fee8f735dbee938fa80ec60dfcc8da087dab5d69aba" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests517793810/block-host-name.json" | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mimage status get image fields should not have Uid|Username empty [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status get image fields should not have Uid|Username empty [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84 | |
Jul 24 05:22:13.717: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid | |
Jul 24 05:22:14.694: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username | |
Jul 24 05:22:15.513: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group | |
Jul 24 05:22:16.380: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid-group | |
[1mSTEP[0m: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username | |
[1mSTEP[0m: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid | |
[1mSTEP[0m: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp localhost/profile on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp localhost/profile on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:17.465: INFO: Created container "6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da | |
Jul 24 05:22:17.506: INFO: Started container "6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da" | |
[1mSTEP[0m: Get container status for containerID: 6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Runtime info[0m [90mruntime should support returning runtime info[0m | |
[1mruntime should return version info [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return version info [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41 | |
Jul 24 05:22:17.660: INFO: Get version info succeed | |
[AfterEach] [k8s.io] Runtime info | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mruntime should support setting hostname with docker/default seccomp profile and SYS_ADMIN[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:17.815: INFO: Created container "71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678" | |
[1mSTEP[0m: Start container for containerID: 71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678 | |
Jul 24 05:22:18.009: INFO: Started container "71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678" | |
[1mSTEP[0m: Get container status for containerID: 71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support network[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:22:18.530: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:18.548: INFO: Created container "0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967 | |
Jul 24 05:22:18.618: INFO: Started container "0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967" | |
[1mSTEP[0m: Get container status for containerID: 0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:18.635: INFO: Created container "a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97 | |
Jul 24 05:22:18.690: INFO: Started container "a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97" | |
[1mSTEP[0m: Get container status for containerID: a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97 | |
[It] should support network | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: bc53078f68186579ea9f5ad85bd5858b736560f1a5610b454f0003892775adad | |
Jul 24 05:22:18.690: INFO: the IP:port is http://10.42.0.122:80 | |
[1mSTEP[0m: check the content of http://10.42.0.122:80 | |
Jul 24 05:22:18.691: INFO: check port mapping succeed | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mprocess label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 550a403ef1688b79024fb76189485720e75156e04b9c90eeace2dd39b3c2db43 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mprocess label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: a8b64e71f4fa111ea469ac85263bd94eebffaeb6b70dabab4236db02cd24e122 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mlistImage should get exactly 3 repoTags in the result image [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 repoTags in the result image [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNoNewPrivs[0m | |
[1mshould allow privilege escalation when false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should allow privilege escalation when false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761 | |
[1mSTEP[0m: create container alpine-nnp-false-52a04d70-cda8-11ea-966e-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:21.366: INFO: Created container "a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3" | |
[1mSTEP[0m: Start container for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3 | |
Jul 24 05:22:21.434: INFO: Started container "a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3" | |
[1mSTEP[0m: Get container status for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3 | |
[1mSTEP[0m: Get container status for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3 | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:22:25.436: INFO: Open log file /tmp/podLogTest069537638/PodSandbox-with-log-directory-5290b069-cda8-11ea-966e-5254001ff4e5/alpine-nnp-false-52a04d70-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:25.436: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support log[0m | |
[1mruntime should support starting container with log [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support starting container with log [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:25.672: INFO: Created container "88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305 | |
Jul 24 05:22:25.720: INFO: Started container "88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305" | |
[1mSTEP[0m: Get container status for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305 | |
[1mSTEP[0m: Get container status for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305 | |
[1mSTEP[0m: check the log context | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:22:29.723: INFO: Open log file /tmp/podLogTest285670797/PodSandbox-with-log-directory-552dcb06-cda8-11ea-966e-5254001ff4e5/container-with-log-test-553e9830-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:29.723: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mprocess label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 7d3b5d22e1ed2c5edd2d5a9e8398b350e0c1c9dba6c1e512bf17bccecb4e24e2 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mprocess label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 0b77428d43a30d73186cb7f16f30aaae99c7893fa3872eff9f8d542e27f7bf05 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mlistImage should get exactly 3 image in the result list [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 image in the result list [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579 | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Multiple Containers [Conformance][0m [90mwhen running multiple containers in a pod[0m | |
[1mshould support container exec[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:22:33.647: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:33.664: INFO: Created container "6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f | |
Jul 24 05:22:33.715: INFO: Started container "6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f" | |
[1mSTEP[0m: Get container status for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:33.738: INFO: Created container "a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20 | |
Jul 24 05:22:33.787: INFO: Started container "a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20" | |
[1mSTEP[0m: Get container status for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20 | |
[It] should support container exec | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103 | |
[1mSTEP[0m: execSync for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f | |
Jul 24 05:22:33.824: INFO: Execsync succeed | |
[1mSTEP[0m: execSync for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20 | |
Jul 24 05:22:33.848: INFO: Execsync succeed | |
[AfterEach] when running multiple containers in a pod | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support listing container stats [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support listing container stats [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:34.202: INFO: Created container "b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8 | |
Jul 24 05:22:34.265: INFO: Started container "b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8" | |
[1mSTEP[0m: test container stats | |
[1mSTEP[0m: List container stats for containerID: b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8 | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould error on create with wrong options[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should error on create with wrong options | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.235 seconds][0m | |
[k8s.io] SELinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is privileged | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:121[0m | |
[91m[1mshould error on create with wrong options [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69[0m | |
[91mExpected an error to have occurred. Got: | |
<nil>: nil[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175 | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould work with selinux set[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with selinux set | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 098e1e18c00b6a33b7b3559ceed93c523bc7566aaa911830af41c314312a7a1f | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support port mapping with only container port [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with only container port [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:22:35.131: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:35.145: INFO: Created container "838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65 | |
Jul 24 05:22:35.196: INFO: Started container "838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65" | |
[1mSTEP[0m: check the port mapping with only container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: efa503dae99bd7d3a0bbd9d5975dc5de2c36dc8c14503cc2d768a3f0ffdc0617 | |
Jul 24 05:22:35.197: INFO: the IP:port is http://10.42.0.133:80 | |
[1mSTEP[0m: check the content of http://10.42.0.133:80 | |
Jul 24 05:22:36.201: INFO: check port mapping succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support basic operations on PodSandbox[0m | |
[1mruntime should support removing PodSandbox [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support removing PodSandbox [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3 | |
Jul 24 05:22:36.630: INFO: Stopped PodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3" | |
[1mSTEP[0m: test remove PodSandbox | |
[1mSTEP[0m: Remove PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3 | |
Jul 24 05:22:36.632: INFO: Removed PodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3" | |
[1mSTEP[0m: List PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3 | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:22:36.633: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 05:22:36.634266 185858 remote_runtime.go:128] StopPodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3": does not exist | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Image Manager[0m | |
[1mpublic image without tag should be pulled and removed [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image without tag should be pulled and removed [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
Jul 24 05:22:36.635: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-latest:latest | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[AfterEach] [k8s.io] Image Manager | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support log[0m | |
[1mruntime should support reopening container log [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support reopening container log [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:37.812: INFO: Created container "d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463 | |
Jul 24 05:22:37.856: INFO: Started container "d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463" | |
Jul 24 05:22:37.856: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:37.856: INFO: Parse container log succeed | |
[1mSTEP[0m: rename container log | |
[1mSTEP[0m: reopen container log | |
Jul 24 05:22:37.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:37.857: INFO: Parse container log succeed | |
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:22:38.857: INFO: Parse container log succeed | |
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:38.857: INFO: Parse container log succeed | |
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:38.857: INFO: Parse container log succeed | |
Jul 24 05:22:39.858: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:39.858: INFO: Parse container log succeed | |
Jul 24 05:22:40.859: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:40.859: INFO: Parse container log succeed | |
Jul 24 05:22:41.859: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:41.859: INFO: Parse container log succeed | |
Jul 24 05:22:42.860: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new | |
Jul 24 05:22:42.860: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:6.299 seconds][0m | |
[k8s.io] Container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support reopening container log [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support Privileged is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:44.156: INFO: Created container "93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc | |
Jul 24 05:22:44.208: INFO: Started container "93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc" | |
[1mSTEP[0m: Get container status for containerID: 93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m [0mdocker/default[0m | |
[1mshould support seccomp docker/default on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp docker/default on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:44.707: INFO: Created container "e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0 | |
Jul 24 05:22:44.884: INFO: Started container "e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0" | |
[1mSTEP[0m: Get container status for containerID: e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mruntime should ignore a seccomp profile that blocks setting hostname when privileged[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665 | |
[1mSTEP[0m: create privileged pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create privileged container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests254268177/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:45.321: INFO: Created container "5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19" | |
[1mSTEP[0m: Start container for containerID: 5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19 | |
Jul 24 05:22:45.372: INFO: Started container "5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19" | |
[1mSTEP[0m: Get container status for containerID: 5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen multiple pod sandboxes are not privileged[0m | |
[1mshould create containers with different process labels[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when multiple pod sandboxes are not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137 | |
[It] should create containers with different process labels | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 8432664fb0ad86eefb9c821a87211866e244314ac6bf99352a8d16584048ecd0 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: ea2aad6b211420d82532f6493ce8bbc81a6f6d40b19b41391d20a7fc15776bfe | |
[AfterEach] when multiple pod sandboxes are not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support attach [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support attach [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:46.415: INFO: Created container "5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2 | |
Jul 24 05:22:46.458: INFO: Started container "5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2" | |
[1mSTEP[0m: attach container: 5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2 | |
Jul 24 05:22:46.459: INFO: Get attach url: http://127.0.0.1:10010/attach/Y3SBllPm | |
[1mSTEP[0m: check the output of attach | |
Jul 24 05:22:46.459: INFO: Parse url "http://127.0.0.1:10010/attach/Y3SBllPm" succeed | |
Jul 24 05:22:51.494: INFO: Check attach url "http://127.0.0.1:10010/attach/Y3SBllPm" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:5.350 seconds][0m | |
[k8s.io] Streaming | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
runtime should support attach [Conformance] | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mmount label should have correct role and type[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have correct role and type | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 8bc6d90f9ee6913ed86a0da038f3ccf1628a1057b8c9d5433db24088e8cb1dcc | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mshould create containers with the same process label[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should create containers with the same process label | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: b47ada662d95d58b0ce0addf8ebc8e08a4adbf9cd3ce6a3cef22828a45b6ddf6 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: c364d66183b29f69504263b0923a33c4fdb058a06817de5ac267dcf816f90a3f | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support removing running container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing running container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:52.673: INFO: Created container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56 | |
Jul 24 05:22:52.734: INFO: Started container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56 | |
E0724 05:22:52.734391 185858 remote_runtime.go:261] RemoveContainer "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56" from runtime service failed: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first | |
Jul 24 05:22:52.734: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [0.453 seconds][0m | |
[k8s.io] Container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support basic operations on container | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68[0m | |
[91m[1mruntime should support removing running container [Conformance] [It][0m | |
[90m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121[0m | |
[91mfailed to remove container: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first | |
Unexpected error: | |
<*status.statusError | 0xc0000abea0>: { | |
Code: 2, | |
Message: "failed to set removing state for container \"51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56\": container is still running, to stop first", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first | |
occurred[0m | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399 | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support Privileged is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:53.012: INFO: Created container "0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993 | |
Jul 24 05:22:53.078: INFO: Started container "0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993" | |
[1mSTEP[0m: Get container status for containerID: 0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support RunAsUser[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUser | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUser container | |
[1mSTEP[0m: create a container with RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:53.496: INFO: Created container "24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd | |
Jul 24 05:22:53.562: INFO: Started container "24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd" | |
[1mSTEP[0m: Get container status for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd | |
[1mSTEP[0m: verify RunAsUser for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd | |
Jul 24 05:22:53.586: INFO: Execsync succeed | |
Jul 24 05:22:53.586: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] PodSandbox[0m [90mruntime should support sysctls[0m | |
[1mshould support safe sysctls[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support safe sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:53.847: INFO: Created container "121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d | |
Jul 24 05:22:53.894: INFO: Started container "121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d" | |
[1mSTEP[0m: check sysctls kernel.shm_rmid_forced | |
[AfterEach] runtime should support sysctls | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Networking[0m [90mruntime should support networking[0m | |
[1mruntime should support port mapping with host port and container port [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106[0m | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with host port and container port [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106 | |
[1mSTEP[0m: create a PodSandbox with host port and container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:22:54.225: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:54.240: INFO: Created container "3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20 | |
Jul 24 05:22:54.290: INFO: Started container "3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20" | |
[1mSTEP[0m: check the port mapping with host port and container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:22:54.290: INFO: the IP:port is http://127.0.0.1:12000 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12000 | |
Jul 24 05:22:55.293: INFO: check port mapping succeed | |
[AfterEach] runtime should support networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support ReadonlyPaths[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ReadonlyPaths | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with ReadonlyPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:55.689: INFO: Created container "0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a" | |
[1mSTEP[0m: Start container for containerID: 0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a | |
Jul 24 05:22:55.740: INFO: Started container "0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a" | |
[1mSTEP[0m: Get container status for containerID: 0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support that ReadOnlyRootfs is false[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is false | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_false | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:22:56.161: INFO: Created container "bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489 | |
Jul 24 05:22:56.219: INFO: Started container "bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489" | |
[1mSTEP[0m: Get container status for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489 | |
[1mSTEP[0m: Get container status for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489 | |
[1mSTEP[0m: Check whether rootfs is writable | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:23:00.241: INFO: Open log file /tmp/podLogTest083942716/PodSandbox-with-log-directory-6745adfb-cda8-11ea-966e-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-6769ccd6-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:23:00.241: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is privileged[0m | |
[1mmount label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 6d9f6bb7726744f85bdf34284bdcbf2b5337242d0a0b8216d1f1deef64476ab6 | |
[AfterEach] when single pod sandbox is privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] SELinux[0m [90mruntime should support selinux[0m [0mwhen single pod sandbox is not privileged[0m | |
[1mmount label should have category[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85[0m | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have category | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: de19243bfdfe9df9174712562f150f91369b77325d949e56737e50de32156f97 | |
[AfterEach] when single pod sandbox is not privileged | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNoNewPrivs[0m | |
[1mshould not allow privilege escalation when true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should not allow privilege escalation when true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755 | |
[1mSTEP[0m: create container alpine-nnp-true-6a768d0e-cda8-11ea-966e-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:01.276: INFO: Created container "dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9" | |
[1mSTEP[0m: Start container for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9 | |
Jul 24 05:23:01.326: INFO: Started container "dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9" | |
[1mSTEP[0m: Get container status for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9 | |
[1mSTEP[0m: Get container status for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9 | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:23:05.327: INFO: Open log file /tmp/podLogTest261214571/PodSandbox-with-log-directory-6a639ade-cda8-11ea-966e-5254001ff4e5/alpine-nnp-true-6a768d0e-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:23:05.327: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container Mount Propagation[0m [90mruntime should support mount propagation[0m | |
[1mmount with 'rslave' should support propagation from host to container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rslave' should support propagation from host to container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:05.670: INFO: Created container "b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2 | |
Jul 24 05:23:05.722: INFO: Started container "b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2" | |
[1mSTEP[0m: Get container status for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2 | |
Jul 24 05:23:05.749: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2 | |
Jul 24 05:23:05.774: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2 | |
Jul 24 05:23:05.802: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support adding volume and device[0m | |
[1mruntime should support starting container with volume when host path is a symlink [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume when host path is a symlink [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create symlink | |
[1mSTEP[0m: create volume container with symlink host path | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:06.164: INFO: Created container "8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60" | |
[1mSTEP[0m: test start volume container with symlink host path | |
[1mSTEP[0m: Start container for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60 | |
Jul 24 05:23:06.229: INFO: Started container "8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60" | |
[1mSTEP[0m: Get container status for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60 | |
[1mSTEP[0m: check whether 'symlink' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60 | |
Jul 24 05:23:06.260: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support starting container [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support starting container [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:06.677: INFO: Created container "ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c" | |
[1mSTEP[0m: test start container | |
[1mSTEP[0m: Start container for containerID: ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c | |
Jul 24 05:23:06.759: INFO: Started container "ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c" | |
[1mSTEP[0m: Get container status for containerID: ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76 | |
[1mSTEP[0m: create podSandbox for security context HostPID | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:07.038: INFO: Created container "9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770 | |
Jul 24 05:23:07.098: INFO: Started container "9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770" | |
[1mSTEP[0m: Get container status for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770 | |
Jul 24 05:23:07.123: INFO: Execsync succeed | |
Jul 24 05:23:07.123: INFO: Nginx's pid is "" | |
[1mSTEP[0m: create busybox container with hostPID | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:07.138: INFO: Created container "de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a | |
Jul 24 05:23:07.195: INFO: Started container "de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a" | |
[1mSTEP[0m: Get container status for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a | |
[1mSTEP[0m: should show its pid in the hostPID namespace container | |
[1mSTEP[0m: execSync for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a | |
Jul 24 05:23:07.228: INFO: Execsync succeed | |
Jul 24 05:23:07.228: INFO: Got nginx's pid "201891 201842" from pod "nginx-container-6de58f0c-cda8-11ea-966e-5254001ff4e5" | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mSeccompProfilePath[0m | |
[1mshould support seccomp default which is unconfined on the container[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp default which is unconfined on the container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:07.571: INFO: Created container "1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104 | |
Jul 24 05:23:07.634: INFO: Started container "1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104" | |
[1mSTEP[0m: Get container status for containerID: 1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Streaming[0m [90mruntime should support streaming interfaces[0m | |
[1mruntime should support portforward in host network[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48[0m | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33 | |
[It] runtime should support portforward in host network | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping in host network | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:23:07.871: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:07.886: INFO: Created container "cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9 | |
Jul 24 05:23:07.958: INFO: Started container "cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9" | |
[1mSTEP[0m: port forward PodSandbox: a1e754d433e0d5df05b964316ce3897871a84d8e69fe08eb7c3837c474ec4b36 | |
Jul 24 05:23:07.959: INFO: Get port forward url: http://127.0.0.1:10010/portforward/pYZR1jVX | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:23:07.959: INFO: Parse url "http://127.0.0.1:10010/portforward/pYZR1jVX" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12002 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:23:07.959: INFO: the IP:port is http://127.0.0.1:12002 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12002 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12002 -> 12003 | |
Forwarding from [::1]:12002 -> 12003 | |
Handling connection for 12002 | |
Jul 24 05:23:08.975: INFO: check port mapping succeed | |
Jul 24 05:23:08.975: INFO: Check port forward url "http://127.0.0.1:10010/portforward/pYZR1jVX" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support HostNetwork is true[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is true | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:09.172: INFO: Created container "f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149 | |
Jul 24 05:23:09.226: INFO: Started container "f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:23:09.226: INFO: Open log file /tmp/podLogTest087919055/NamespaceOption-PodSandbox-3d181b7c-cda8-11ea-966e-5254001ff4e5/container-with-HostNetwork-test-6f2ab87b-cda8-11ea-966e-5254001ff4e5.log | |
Jul 24 05:23:09.226: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Container[0m [90mruntime should support basic operations on container[0m | |
[1mruntime should support execSync [Conformance][0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150[0m | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync [Conformance] | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:09.439: INFO: Created container "c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2 | |
Jul 24 05:23:09.491: INFO: Started container "c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2" | |
[1mSTEP[0m: test execSync | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2 | |
Jul 24 05:23:09.514: INFO: Execsync succeed | |
Jul 24 05:23:09.514: INFO: verify Execsync output succeed | |
[AfterEach] runtime should support basic operations on container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mbucket[0m | |
[1mruntime should support SupplementalGroups[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support SupplementalGroups | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context SupplementalGroups | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:09.941: INFO: Created container "5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2 | |
Jul 24 05:23:10.004: INFO: Started container "5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2" | |
[1mSTEP[0m: Get container status for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2 | |
[1mSTEP[0m: verify SupplementalGroups for container | |
[1mSTEP[0m: execSync for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2 | |
Jul 24 05:23:10.028: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[0m[k8s.io] Security Context[0m [90mNamespaceOption[0m | |
[1mruntime should support ContainerPID[0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220[0m | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ContainerPID | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220 | |
[1mSTEP[0m: create podSandbox with PID set to container | |
Jul 24 05:23:10.173: INFO: Pid namespace is "CONTAINER" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:23:10.410: INFO: Created container "cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67 | |
Jul 24 05:23:10.484: INFO: Started container "cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67" | |
[1mSTEP[0m: Get container status for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67 | |
Jul 24 05:23:10.514: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[91m[1mSummarizing 3 Failures:[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is not privileged [0m[91m[1m[It] should error on create with wrong options [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is privileged [0m[91m[1m[It] should error on create with wrong options [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Container [0m[0mruntime should support basic operations on container [0m[91m[1m[It] runtime should support removing running container [Conformance] [0m | |
[37m/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399[0m | |
[1m[91mRan 90 of 97 Specs in 85.521 seconds[0m | |
[1m[91mFAIL![0m -- [32m[1m87 Passed[0m | [91m[1m3 Failed[0m | [33m[1m0 Pending[0m | [36m[1m7 Skipped[0m | |
--- FAIL: TestCRISuite (85.52s) | |
FAIL |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment