Skip to content

Instantly share code, notes, and snippets.

@dweomer
Created July 27, 2020 16:50
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save dweomer/0e0e6cde39f1c9bcee6f2cc3c5ba3531 to your computer and use it in GitHub Desktop.
Save dweomer/0e0e6cde39f1c9bcee6f2cc3c5ba3531 to your computer and use it in GitHub Desktop.
containerd-1.3.3-k3s2
critest version: 1.18.0-89-gbaca4a1
Running Suite: CRI validation
=============================
Random Seed: 123456789 - Will randomize all specs
Will run 90 of 97 specs
[k8s.io] Container runtime should support basic operations on container
runtime should support removing stopped container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing stopped container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:01.677: INFO: Created container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f"
STEP: start container
STEP: Start container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f
Jul 24 05:26:01.724: INFO: Started container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f"
STEP: test stop container
STEP: Stop container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f
Jul 24 05:26:01.760: INFO: Stopped container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f"
STEP: Get container status for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f
STEP: test remove container
STEP: Remove container for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f
Jul 24 05:26:01.764: INFO: Removed container "5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f"
STEP: List containers for containerID: 5519b18bf573e5b653419e279ba96669da0502724f1857d98858f7ce3798eb5f
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image with tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Pull image : gcr.io/cri-tools/test-image-tag:test
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Runtime info runtime should support returning runtime info
runtime should return runtime conditions [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return runtime conditions [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
STEP: test runtime status
[AfterEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostNetwork is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
STEP: creating a podSandbox with hostNetwork false
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:03.155: INFO: Created container "14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316"
STEP: start container
STEP: Start container for containerID: 14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316
Jul 24 05:26:03.224: INFO: Started container "14d11bd0afabb63585a452d8855c6cca3b86b11390560d678eb11918b1336316"
STEP: checking host http service port in the container
Jul 24 05:26:03.224: INFO: Open log file /tmp/podLogTest499138712/NamespaceOption-PodSandbox-d5ea3acd-cda8-11ea-8530-5254001ff4e5/container-with-HostNetwork-test-d6df9880-cda8-11ea-8530-5254001ff4e5.log
Jul 24 05:26:03.224: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests354356503/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:03.526: INFO: Created container "5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa"
STEP: Start container for containerID: 5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa
Jul 24 05:26:03.584: INFO: Started container "5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa"
STEP: Get container status for containerID: 5ad7855ff4b719165385a06c1ba3e7b9690a2405ab40071149acfe1b1c1058fa
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 4e9ea4e53a67898f96d2b2edd00115dc4b4dad6b4f9ad70f8693474873f22d9e
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image with digest should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with digest should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should return error if RunAsGroup is set without RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should return error if RunAsGroup is set without RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
STEP: create pod
STEP: create container with invalid RunAsGroup
STEP: create invalid RunAsGroup container
STEP: create a container with RunAsGroup without RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:26:05.243807 203237 remote_runtime.go:200] CreateContainer in sandbox "dcadd67174bb5f15c4dec95528895ff024beae1af9dc6e8ab3a46b5b546d2148" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•SS
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support execSync with timeout [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync with timeout [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:05.533: INFO: Created container "af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7"
STEP: start container
STEP: Start container for containerID: af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7
Jul 24 05:26:05.595: INFO: Started container "af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7"
STEP: test execSync with timeout
E0724 05:26:06.626387 203237 remote_runtime.go:351] ExecSync af6bcebf181aa82a5956fa8d4bef459c6d01209ead9e4fc01a4fdce8901439c7 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded
STEP: timeout exec process should be gone
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support exec with tty=false and stdin=false [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=false and stdin=false [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:06.928: INFO: Created container "1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b"
STEP: start container
STEP: Start container for containerID: 1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b
Jul 24 05:26:06.977: INFO: Started container "1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b"
STEP: exec given command in container: 1751af8daac8e7dda2ca3bfa7624282061d2a1093ede851a821289bae042869b
Jul 24 05:26:06.977: INFO: Get exec url: http://127.0.0.1:10010/exec/ZnCyR-TQ
STEP: check the output of exec
Jul 24 05:26:06.978: INFO: Parse url "http://127.0.0.1:10010/exec/ZnCyR-TQ" succeed
Jul 24 05:26:07.006: INFO: Check exec url "http://127.0.0.1:10010/exec/ZnCyR-TQ" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsGroup
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsGroup
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
STEP: create pod
STEP: create a PodSandbox with log directory
STEP: create container for security context RunAsGroup
STEP: create RunAsGroup container
STEP: create a container with RunAsUser and RunAsGroup
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:07.300: INFO: Created container "1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833"
STEP: start container
STEP: Start container for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833
Jul 24 05:26:07.353: INFO: Started container "1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833"
STEP: Get container status for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833
STEP: Get container status for containerID: 1077585f5e499d2da55c6f6ca41bec49a4aae80ff2d5ea6586704db1f4668833
STEP: verify RunAsGroup for container
STEP: check container output
STEP: verify log contents
Jul 24 05:26:11.354: INFO: Open log file /tmp/podLogTest118333322/PodSandbox-with-log-directory-d941de1c-cda8-11ea-8530-5254001ff4e5/container-with-RunAsGroup-test-d957d7ec-cda8-11ea-8530-5254001ff4e5.log
Jul 24 05:26:11.354: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support MaskedPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support MaskedPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
STEP: create pod
STEP: create container with MaskedPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:11.609: INFO: Created container "1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1"
STEP: Start container for containerID: 1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1
Jul 24 05:26:11.672: INFO: Started container "1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1"
STEP: Get container status for containerID: 1d1071781aa5712757bb26b466b4d899dbd543188d78ecee21874f8acbf387e1
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support sysctls
should support unsafe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support unsafe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:11.983: INFO: Created container "2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1"
STEP: start container
STEP: Start container for containerID: 2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1
Jul 24 05:26:12.035: INFO: Started container "2aa2663b965f77449e6e0b344dfba0c2090e77e48863ec8b01ef921d3e9cc2a1"
STEP: check sysctls fs.mqueue.msg_max
[AfterEach] runtime should support sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsUserName
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUserName
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUserName container
STEP: create a container with RunAsUserName
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:26:12.321: INFO: Created container "723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88"
STEP: start container
STEP: Start container for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88
Jul 24 05:26:12.382: INFO: Started container "723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88"
STEP: Get container status for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88
STEP: verify RunAsUserName for container
STEP: verify execSync output
STEP: execSync for containerID: 723397cad23d081231a1e22e60efd33a35e91b331fe0c004b4c345d137499a88
Jul 24 05:26:12.405: INFO: Execsync succeed
Jul 24 05:26:12.405: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support portforward [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support portforward [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:26:12.677: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:26:12.690: INFO: Created container "a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c"
STEP: start the web server container
STEP: Start container for containerID: a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c
Jul 24 05:26:12.763: INFO: Started container "a5bd168e2b09d0223a0115b94f181350bd0c7ca95b9fa76cc4dbc8e46179643c"
STEP: port forward PodSandbox: 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d
Jul 24 05:26:12.763: INFO: Get port forward url: http://127.0.0.1:10010/portforward/Ga-tddBz
STEP: check the output of portforward
Jul 24 05:26:12.764: INFO: Parse url "http://127.0.0.1:10010/portforward/Ga-tddBz" succeed
STEP: check if we can get nginx main page via localhost:12001
STEP: get the IP:port needed to be checked
Jul 24 05:26:12.764: INFO: the IP:port is http://127.0.0.1:12001
STEP: check the content of http://127.0.0.1:12001
STEP: start port forward
Forwarding from 127.0.0.1:12001 -> 80
Forwarding from [::1]:12001 -> 80
Handling connection for 12001
E0724 05:26:13.771777 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:13 socat[205648] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:14.778664 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:14 socat[205649] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:15.786644 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:15 socat[205651] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:16.794705 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:16 socat[205652] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:17.802252 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:17 socat[205654] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:18.829421 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:18 socat[205656] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:19.836443 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:19 socat[205658] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:20.844321 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:20 socat[205660] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:21.869080 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:21 socat[205662] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:22.877326 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:22 socat[205664] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:23.885342 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:23 socat[205666] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:24.968069 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:24 socat[205668] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:26.008005 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:26 socat[205670] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:27.029935 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:27 socat[205672] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:28.037435 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:28 socat[205674] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:29.052463 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:29 socat[205676] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:30.092139 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:30 socat[205678] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:31.112106 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:31 socat[205680] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:32.130022 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:32 socat[205682] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:33.137425 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:33 socat[205684] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:34.184285 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:34 socat[205686] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:35.213966 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:35 socat[205688] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:36.232738 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:36 socat[205690] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:37.247896 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:37 socat[205692] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:38.255461 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:38 socat[205694] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:39.263344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:39 socat[205696] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:40.278609 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:40 socat[205698] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:41.289514 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:41 socat[205700] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:42.297163 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:42 socat[205702] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:43.304816 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:43 socat[205704] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:44.312824 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:44 socat[205706] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:45.329015 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:45 socat[205708] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:46.337362 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:46 socat[205710] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:47.384635 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:47 socat[205712] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:48.392140 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:48 socat[205714] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:49.400883 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:49 socat[205716] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:50.528874 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:50 socat[205718] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:51.537922 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:51 socat[205720] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:52.545344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:52 socat[205722] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:53.558220 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:53 socat[205724] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:54.566154 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:54 socat[205726] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:55.574203 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:55 socat[205728] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:56.583959 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:56 socat[205730] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:57.592082 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:57 socat[205732] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:58.599426 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:58 socat[205734] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:26:59.609344 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:26:59 socat[205736] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:00.616989 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:00 socat[205738] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:01.628364 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:01 socat[205740] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:02.638014 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:02 socat[205742] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:03.647896 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:03 socat[205744] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:04.654605 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:04 socat[205746] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:05.662762 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:05 socat[205748] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:06.670034 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:06 socat[205750] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:07.684590 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:07 socat[205752] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:08.692331 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:08 socat[205754] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:09.700649 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:09 socat[205756] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:10.708904 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:10 socat[205758] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:11.717461 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:11 socat[205760] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:27:12.729875 203237 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod 7c49328746e6ca1b7541a8a099b2e6e458f31bed3f0ab528cd65380dbd89b40d, uid : failed to execute portforward in network namespace "/var/run/netns/cni-4a660afd-81f6-e9d1-26a8-89e0a8655335": socat command returns error: exit status 1, stderr: "2020/07/24 05:27:12 socat[205762] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.382 seconds]
[k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support portforward [Conformance] [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
Timed out after 60.000s.
Expected
<*url.Error | 0xc00041d710>: {
Op: "Get",
URL: "http://127.0.0.1:12001",
Err: {s: "EOF"},
}
to be nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostIpc is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIPC is true
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:13.087: INFO: Created container "2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8"
STEP: start container
STEP: Start container for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8
Jul 24 05:27:13.138: INFO: Started container "2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8"
STEP: Get container status for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8
STEP: check if the shared memory segment is included in the container
STEP: execSync for containerID: 2f92c41419c218874542ab655376864d539f0d39b7cafa52369e64dcc7625fa8
Jul 24 05:27:13.179: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support stopping PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support stopping PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
STEP: run PodSandbox
STEP: test stop PodSandbox
STEP: Stop PodSandbox for podID: a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431
Jul 24 05:27:13.560: INFO: Stopped PodSandbox "a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431"
STEP: Get PodSandbox status for podID: a0c9a45858eba62065b9b8f9ce1d0ee25893ccf053934df7b1bec7fd0cfb5431
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support stopping container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support stopping container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:13.725: INFO: Created container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c"
STEP: start container
STEP: Start container for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c
Jul 24 05:27:13.774: INFO: Started container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c"
STEP: test stop container
STEP: Stop container for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c
Jul 24 05:27:13.808: INFO: Stopped container "7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c"
STEP: Get container status for containerID: 7dbc83e83952dd3432da9317f6d091e9602141ba3042f23bb1b48142e867bb6c
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: fa0ad52818d53867c2229a4ba5a923646cf9a99fa94be22799472347bbe54911
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 9c2db5fe4ce1740c9d6353e0c7b76c4dd38ae1ec1637e0fc7e0532938dad5b41
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:14.539: INFO: Created container "45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e"
STEP: start container
STEP: Start container for containerID: 45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e
Jul 24 05:27:14.598: INFO: Started container "45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e"
STEP: Get container status for containerID: 45cc07c0c4314a7c6f318d66e21b92b4a4405aa3c4c49c7919b0b73fa3b4525e
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: ad48919620247a8e4f3eeaa0c3d2528976cc050788d84b364ed759ea62f29114
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
image status should support all kinds of references [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status should support all kinds of references [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Pull image : gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support removing created container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing created container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:16.463: INFO: Created container "5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8"
STEP: test remove container
STEP: Remove container for containerID: 5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8
Jul 24 05:27:16.467: INFO: Removed container "5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8"
STEP: List containers for containerID: 5018c08775deb43e96b2f1a6521bacaca6fbb761b70e5b626b80f8a6f6d4ada8
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support creating container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support creating container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
STEP: test create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:16.761: INFO: Created container "1205813ee9f2270e817beb06ff6fbb16318f8bf5df7d06dd3554acaa9a4513d1"
STEP: test list container
STEP: List containers for containerID: 1205813ee9f2270e817beb06ff6fbb16318f8bf5df7d06dd3554acaa9a4513d1
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rshared' should support propagation from host to container and vice versa
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rshared' should support propagation from host to container and vice versa
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:17.113: INFO: Created container "0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38"
STEP: test start container with volume
STEP: Start container for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38
Jul 24 05:27:17.180: INFO: Started container "0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38"
STEP: Get container status for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38
Jul 24 05:27:17.209: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38
Jul 24 05:27:17.235: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 0f59a301a5023318aed79085e9d472a1b90880202b7f132c649cd2da28790f38
Jul 24 05:27:17.262: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support PodPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support PodPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
STEP: create podSandbox for sharing process namespace
Jul 24 05:27:17.407: INFO: Pid namespace is "POD"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:27:17.575: INFO: Created container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c"
STEP: start container
STEP: Start container for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c
Jul 24 05:27:17.627: INFO: Started container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c"
STEP: Get container status for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c
STEP: get nginx container pid
STEP: execSync for containerID: 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c
E0724 05:27:18.635256 203237 remote_runtime.go:351] ExecSync 23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c 'cat /proc/1/cmdline' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
Jul 24 05:27:18.635: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• Failure [1.396 seconds]
[k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support PodPID [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
failed to execSync in container "23333af49f6284fe9bfff5492f5189daee6a91fda40cb3ab2d786d6c4a07a88c"
Unexpected error:
<*status.statusError | 0xc000ada0f0>: {
Code: 2,
Message: "failed to exec in container: container is in CONTAINER_EXITED state",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support DNS config [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support DNS config [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
STEP: create a PodSandbox with DNS config
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:18.963: INFO: Created container "41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55"
STEP: start container
STEP: Start container for containerID: 41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55
Jul 24 05:27:19.012: INFO: Started container "41b0146a45205d6ee9a88d1da5f57b4aedd37dd12437fc0bfb70ea224d4dfa55"
STEP: check DNS config
STEP: get the current dns config via execSync
Jul 24 05:27:19.035: INFO: check DNS config succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.285 seconds]
[k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109
should error on create with wrong options [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
Expected an error to have occurred. Got:
<nil>: nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rprivate' should not support propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rprivate' should not support propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:19.601: INFO: Created container "29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097"
STEP: test start container with volume
STEP: Start container for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097
Jul 24 05:27:19.651: INFO: Started container "29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097"
STEP: Get container status for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097
Jul 24 05:27:19.676: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097
Jul 24 05:27:19.700: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 29b7c4e7561cf614b9d9b256fddf1814a8a9a80a747eacbb0d8f6b0ba26d6097
Jul 24 05:27:19.724: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support that ReadOnlyRootfs is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_true
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:20.028: INFO: Created container "b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b"
STEP: start container
STEP: Start container for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b
Jul 24 05:27:20.074: INFO: Started container "b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b"
STEP: Get container status for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b
STEP: Get container status for containerID: b1ef6a6725780fc2def877445947a39a742969508746faf45eb1bc18c8826f1b
STEP: Check whether rootfs is read-only
STEP: verify log contents
Jul 24 05:27:24.077: INFO: Open log file /tmp/podLogTest668565598/PodSandbox-with-log-directory-049fd2ca-cda9-11ea-8530-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-04b1e7e8-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:27:24.078: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support exec with tty=true and stdin=true [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=true and stdin=true [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:24.336: INFO: Created container "6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1"
STEP: start container
STEP: Start container for containerID: 6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1
Jul 24 05:27:24.387: INFO: Started container "6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1"
STEP: exec given command in container: 6f1560aeb5a1b222094d345926c048de5c5c699197dea9de6f9626bc3cbe92c1
Jul 24 05:27:24.387: INFO: Get exec url: http://127.0.0.1:10010/exec/nkIy7KPv
STEP: check the output of exec
Jul 24 05:27:24.387: INFO: Parse url "http://127.0.0.1:10010/exec/nkIy7KPv" succeed
Jul 24 05:27:24.412: INFO: Check exec url "http://127.0.0.1:10010/exec/nkIy7KPv" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support running PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support running PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
STEP: test run a default PodSandbox
STEP: Get PodSandbox status for podID: 3532fe9b3752846ff6c83b3b938985a1be708240475dc4e36736b5e686588438
STEP: test list PodSandbox
STEP: List PodSandbox for podID: 3532fe9b3752846ff6c83b3b938985a1be708240475dc4e36736b5e686588438
STEP: List PodSandbox.
Jul 24 05:27:24.676: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support container log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:27:24.934: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:27:24.953: INFO: Created container "9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5"
STEP: start the httpd container
STEP: Start container for containerID: 9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5
Jul 24 05:27:25.026: INFO: Started container "9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5"
STEP: Get container status for containerID: 9f19758388d81414b7705c0e21101d8eaaab791ba9d494a951f29d8a7560dff5
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:27:25.048: INFO: Created container "37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6"
STEP: start the busybox container
STEP: Start container for containerID: 37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6
Jul 24 05:27:25.102: INFO: Started container "37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6"
STEP: Get container status for containerID: 37cbf5b0325699f218938c6cdf457f82cfb295b4a54945a647f2fb57e67747c6
[It] should support container log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.461 seconds]
[k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support container log [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
Timed out after 60.003s.
Expected
<bool>: false
to be true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95
------------------------------
[k8s.io] Security Context bucket
runtime should support setting Capability
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support setting Capability
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
STEP: create pod
STEP: create container with security context Capability and test
STEP: create Capability container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:25.411: INFO: Created container "a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe"
STEP: Start container for containerID: a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe
Jul 24 05:28:25.467: INFO: Started container "a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe"
STEP: Get container status for containerID: a81438ceedebcc3e2dbf0a3542da4b35c3dbd0887660ae5b16d481724a93e9fe
STEP: create container without security context Capability and test
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:25.506: INFO: Created container "8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88"
STEP: Start container for containerID: 8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88
Jul 24 05:28:25.551: INFO: Started container "8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88"
STEP: Get container status for containerID: 8b8d2946299d4a35990d4a611df868308549135398e99826cba1a19885028b88
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container runtime should support adding volume and device
runtime should support starting container with volume [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:25.897: INFO: Created container "652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19"
STEP: test start container with volume
STEP: Start container for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19
Jul 24 05:28:25.948: INFO: Started container "652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19"
STEP: Get container status for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19
STEP: check whether 'hostPath' contains file or dir in container
STEP: execSync for containerID: 652041c94a745cae25a98bef158d942c448ef4acfd5da04d0bb15c853e7f2b19
Jul 24 05:28:25.971: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostIpc is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIpc is false
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:26.242: INFO: Created container "5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628"
STEP: start container
STEP: Start container for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628
Jul 24 05:28:26.308: INFO: Started container "5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628"
STEP: Get container status for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628
STEP: check if the shared memory segment is not included in the container
STEP: execSync for containerID: 5b06e9a3830817f04e7fc318ce5ff2e6c959a42f12dcd94d5bba6477d9e89628
Jul 24 05:28:26.335: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 83770f370b2c72f1bdd2936908c8d2e54de5a6ce5b48f69359f98c7e1580d3da
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: e6bc05a0ff9fe8f3d18a5142c97f86eeb1ee6d85b37c7bb914db5dfc3f491b54
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create unconfined Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:27.279: INFO: Created container "22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920"
STEP: Start container for containerID: 22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920
Jul 24 05:28:27.320: INFO: Started container "22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920"
STEP: Get container status for containerID: 22d962a051bd53c1ce92bf1ec22e817d801fae852290b8b920e0e5799887e920
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support set hostname [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support set hostname [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
STEP: create a PodSandbox with hostname
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:27.608: INFO: Created container "9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe"
STEP: start container
STEP: Start container for containerID: 9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe
Jul 24 05:28:27.656: INFO: Started container "9824d8097619d6264aae3127bcd5981366d918401d38539711cc5a31ccad4bbe"
STEP: check hostname
STEP: get the current hostname via execSync
Jul 24 05:28:27.681: INFO: check hostname succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
runtime should block sethostname with docker/default seccomp profile and no extra caps
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:28.014: INFO: Created container "8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1"
STEP: Start container for containerID: 8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1
Jul 24 05:28:28.199: INFO: Started container "8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1"
STEP: Get container status for containerID: 8789d43932aa0c9b01714fe65e411a0c440ec06c6f3eb8e430ce66f682d6e4b1
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should not support a custom seccomp profile without using localhost/ as a prefix
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create /tmp/seccomp-tests687882025/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:28:28.607547 203237 remote_runtime.go:200] CreateContainer in sandbox "c3f6130d101dd5e4e5d82efcb023e9f35d0ed3ba2febfe9e92accc1e1a9fb7e0" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests687882025/block-host-name.json"
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Image Manager
image status get image fields should not have Uid|Username empty [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status get image fields should not have Uid|Username empty [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
Jul 24 05:28:28.725: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid
Jul 24 05:28:29.769: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username
Jul 24 05:28:30.580: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group
Jul 24 05:28:31.413: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image : gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid-group
STEP: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665
STEP: Remove image : gcr.io/cri-tools/test-image-user-username
STEP: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid
STEP: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp localhost/profile on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp localhost/profile on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:32.741: INFO: Created container "a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06"
STEP: start container
STEP: Start container for containerID: a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06
Jul 24 05:28:32.803: INFO: Started container "a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06"
STEP: Get container status for containerID: a7c9ad4c467cd1d104a4e91b0a4bae4a9518a43268848c56a076893341ec8c06
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Runtime info runtime should support returning runtime info
runtime should return version info [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return version info [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
Jul 24 05:28:32.964: INFO: Get version info succeed
[AfterEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:33.095: INFO: Created container "f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a"
STEP: Start container for containerID: f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a
Jul 24 05:28:33.285: INFO: Started container "f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a"
STEP: Get container status for containerID: f603c454f9df0dc73f192d16b1678e5ded4541fe7990423f888e5326c01f322a
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:28:33.710: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:28:33.733: INFO: Created container "1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33"
STEP: start the httpd container
STEP: Start container for containerID: 1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33
Jul 24 05:28:33.795: INFO: Started container "1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33"
STEP: Get container status for containerID: 1cf74802259d4ead9b9bc765c9e07175cd68e70c4cbc06fc2a21f4bf0d5faa33
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:28:33.809: INFO: Created container "5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26"
STEP: start the busybox container
STEP: Start container for containerID: 5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26
Jul 24 05:28:33.871: INFO: Started container "5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26"
STEP: Get container status for containerID: 5a3ec1495abfaebf21d6ae92e52d7dc851bf6d34d03a646764fa8ac96fe78a26
[It] should support network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: b92d5e7ce69b8ac9718d0031474deaf3f8b4d17bae456afcb5ec774da9ae8d28
Jul 24 05:28:33.872: INFO: the IP:port is http://10.42.0.202:80
STEP: check the content of http://10.42.0.202:80
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.510 seconds]
[k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support network [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
Timed out after 60.001s.
Expected
<*url.Error | 0xc001098000>: {
Op: "Get",
URL: "http://10.42.0.202:80",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 42, 0, 202],
Port: 80,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 27b440e6c345bdc3080a19f64cc32f26fa0a92c18dd365298342350de5e62ed7
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 49353ae43bf41dc82eb52b5e955beb83e15e044fda6448eb6ba5cc9f8432d484
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
listImage should get exactly 3 repoTags in the result image [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 repoTags in the result image [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
STEP: Pull image : gcr.io/cri-tools/test-image-tags:1
STEP: Pull image : gcr.io/cri-tools/test-image-tags:2
STEP: Pull image : gcr.io/cri-tools/test-image-tags:3
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NoNewPrivs
should allow privilege escalation when false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should allow privilege escalation when false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
STEP: create container alpine-nnp-false-565138cb-cda9-11ea-8530-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:29:36.991: INFO: Created container "27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd"
STEP: Start container for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd
Jul 24 05:29:37.052: INFO: Started container "27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd"
STEP: Get container status for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd
STEP: Get container status for containerID: 27b31598466b2623ec871a5c302e5e5d2e54906ee16125e73aa4c362dcc271bd
STEP: check container output
STEP: verify log contents
Jul 24 05:29:41.123: INFO: Open log file /tmp/podLogTest592664173/PodSandbox-with-log-directory-56170897-cda9-11ea-8530-5254001ff4e5/alpine-nnp-false-565138cb-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:29:41.123: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container runtime should support log
runtime should support starting container with log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support starting container with log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:29:41.395: INFO: Created container "5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1"
STEP: start container with log
STEP: Start container for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1
Jul 24 05:29:41.438: INFO: Started container "5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1"
STEP: Get container status for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1
STEP: Get container status for containerID: 5a5f102df5605b00a3c7809342d70033368276b01d15caec1645c1612b9883d1
STEP: check the log context
STEP: verify log contents
Jul 24 05:29:45.539: INFO: Open log file /tmp/podLogTest898183400/PodSandbox-with-log-directory-58e21403-cda9-11ea-8530-5254001ff4e5/container-with-log-test-58f4942a-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:29:45.539: INFO: Parse container log succeed
[AfterEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: e031904c2d09d20615785a632aca08f4bacd0b7e01d2821949b03fbd1522d7b6
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: a7c1d82634720db5a9262f626b489e683fc00d4948fd3dd8e5405085bb979211
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[k8s.io] Image Manager
listImage should get exactly 3 image in the result list [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 image in the result list [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Pull image : gcr.io/cri-tools/test-image-1:latest
STEP: Pull image : gcr.io/cri-tools/test-image-2:latest
STEP: Pull image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support container exec
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:29:49.399: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:29:49.416: INFO: Created container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae"
STEP: start the httpd container
STEP: Start container for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae
Jul 24 05:29:49.484: INFO: Started container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae"
STEP: Get container status for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:29:49.497: INFO: Created container "6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5"
STEP: start the busybox container
STEP: Start container for containerID: 6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5
Jul 24 05:29:49.560: INFO: Started container "6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5"
STEP: Get container status for containerID: 6b44be7c6e33bdd340866a011f37e22aa8e5017d08294d8c7fa34488e099a3e5
[It] should support container exec
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
STEP: execSync for containerID: f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae
E0724 05:29:49.589334 203237 remote_runtime.go:351] ExecSync f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae 'echo httpd' from runtime service failed: rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found
Jul 24 05:29:49.589: INFO: Unexpected error occurred: rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.480 seconds]
[k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support container exec [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
failed to execSync in container "f08d62b9c9a8a6dc9f21245da69bcc622b82157141f738d8b7d40bddf02de3ae"
Unexpected error:
<*status.statusError | 0xc0002721e0>: {
Code: 5,
Message: "failed to exec in container: failed to create exec \"aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e\": container not created: not found",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = NotFound desc = failed to exec in container: failed to create exec "aed2128faeb110dc015fe0d75a59683f15747c297ca0287d1047846b4d44b87e": container not created: not found
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support listing container stats [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support listing container stats [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:29:49.860: INFO: Created container "aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232"
STEP: start container
STEP: Start container for containerID: aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232
Jul 24 05:29:49.920: INFO: Started container "aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232"
STEP: test container stats
STEP: List container stats for containerID: aef6b0095fb94112a840fae278d7ffac5f02334c7c5dbb5f4c852e7b692a6232
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.283 seconds]
[k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:121
should error on create with wrong options [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
Expected an error to have occurred. Got:
<nil>: nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 853419aff1d0b516db1bee3e6ada7142f1cb85437801898965c082f40e4c1232
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support port mapping with only container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with only container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:29:51.000: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:29:51.021: INFO: Created container "2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02"
STEP: start the web server container
STEP: Start container for containerID: 2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02
Jul 24 05:29:51.075: INFO: Started container "2c123ca88182811f8dd0e3ea67b7f2d4033b55af9781296e4242f18855a7bd02"
STEP: check the port mapping with only container port
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: 62fedef3d495d8b1a4af241db086dfd6eda792f6c33fdf7aa32a516095217516
Jul 24 05:29:51.075: INFO: the IP:port is http://10.42.0.213:80
STEP: check the content of http://10.42.0.213:80
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.343 seconds]
[k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44
runtime should support port mapping with only container port [Conformance] [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
Timed out after 60.000s.
Expected
<*url.Error | 0xc000eb82d0>: {
Op: "Get",
URL: "http://10.42.0.213:80",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 42, 0, 213],
Port: 80,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support removing PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support removing PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
STEP: run PodSandbox
STEP: stop PodSandbox
STEP: Stop PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e
Jul 24 05:30:51.458: INFO: Stopped PodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e"
STEP: test remove PodSandbox
STEP: Remove PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e
Jul 24 05:30:51.461: INFO: Removed PodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e"
STEP: List PodSandbox for podID: 539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e
STEP: List PodSandbox.
Jul 24 05:30:51.461: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
E0724 05:30:51.461744 203237 remote_runtime.go:128] StopPodSandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "539ea48297d00a001a06058d4af6be28c04738097510ad3ccd25844dafb6869e": does not exist
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image without tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image without tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
STEP: Remove image : gcr.io/cri-tools/test-image-latest
Jul 24 05:30:51.462: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-latest:latest
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support log
runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:30:52.754: INFO: Created container "ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f"
STEP: start container with log
STEP: Start container for containerID: ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f
Jul 24 05:30:52.817: INFO: Started container "ee5a2ced1e5aeb828bc91d5f1ffa3e056516b941c3173596501d946801fc020f"
Jul 24 05:30:52.817: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:30:52.817: INFO: Parse container log succeed
STEP: rename container log
STEP: reopen container log
Jul 24 05:30:52.817: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:30:52.817: INFO: Parse container log succeed
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:30:53.818: INFO: Parse container log succeed
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:53.818: INFO: Parse container log succeed
Jul 24 05:30:53.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:53.818: INFO: Parse container log succeed
Jul 24 05:30:54.818: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:54.818: INFO: Parse container log succeed
Jul 24 05:30:55.819: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:55.819: INFO: Parse container log succeed
Jul 24 05:30:56.819: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:56.819: INFO: Parse container log succeed
Jul 24 05:30:57.820: INFO: Open log file /tmp/podLogTest401811546/PodSandbox-with-log-directory-836587b6-cda9-11ea-8530-5254001ff4e5/container-reopen-log-test-837b9fad-cda9-11ea-8530-5254001ff4e5.log.new
Jul 24 05:30:57.820: INFO: Parse container log succeed
[AfterEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:6.411 seconds]
[k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
------------------------------
[k8s.io] Security Context bucket
runtime should support Privileged is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:30:59.127: INFO: Created container "bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303"
STEP: start container
STEP: Start container for containerID: bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303
Jul 24 05:30:59.197: INFO: Started container "bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303"
STEP: Get container status for containerID: bdb519d56f55ed46929475259c11cc32b66ba04e87e13487dbe115463e25c303
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
should support seccomp docker/default on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp docker/default on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:30:59.651: INFO: Created container "d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f"
STEP: start container
STEP: Start container for containerID: d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f
Jul 24 05:30:59.821: INFO: Started container "d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f"
STEP: Get container status for containerID: d41905c2b959d42370d92c3d6ad6fc6bb737a47ef87db0a51f15d7ebeedac75f
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should ignore a seccomp profile that blocks setting hostname when privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
STEP: create privileged pod
STEP: create Privileged podSandbox
STEP: create privileged container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests764138652/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:00.302: INFO: Created container "d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c"
STEP: Start container for containerID: d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c
Jul 24 05:31:00.366: INFO: Started container "d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c"
STEP: Get container status for containerID: d7ce45b108e9f7d3997bd840ec3cef693706e9ca5aa59c516aefae04f384262c
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when multiple pod sandboxes are not privileged
should create containers with different process labels
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when multiple pod sandboxes are not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137
[It] should create containers with different process labels
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 96f6ed82128e61bcb55cff6a88e77fff3e3db9876c3b0a29caac3f4055ab504c
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 95337dcd5a78d48065ee52e918fb198bc675094bf95d2020c381fe7cec61beac
[AfterEach] when multiple pod sandboxes are not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:01.418: INFO: Created container "4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6"
STEP: start container
STEP: Start container for containerID: 4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6
Jul 24 05:31:01.474: INFO: Started container "4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6"
STEP: attach container: 4b2f59c021ef7945b25519e35eb4627a5dc553bbd72a9a5b01939284a7ad1fa6
Jul 24 05:31:01.475: INFO: Get attach url: http://127.0.0.1:10010/attach/L5fg6YFS
STEP: check the output of attach
Jul 24 05:31:01.475: INFO: Parse url "http://127.0.0.1:10010/attach/L5fg6YFS" succeed
Jul 24 05:31:06.507: INFO: Check attach url "http://127.0.0.1:10010/attach/L5fg6YFS" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:5.395 seconds]
[k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 03283638b423aaf01d9742ccbc585191c3b0f8ebe59e92da90021a20b51088d3
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 19c8307084649319a245c94df2b1c3bc8d689c07374ff0d4c3a60ac43b172f15
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 764e9b232490f62a3b53147c932566113a33cdd3810eee6f9c6f97f2b3d5c111
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support removing running container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing running container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:07.824: INFO: Created container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88"
STEP: start container
STEP: Start container for containerID: 30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88
Jul 24 05:31:07.891: INFO: Started container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88"
STEP: test remove container
STEP: Remove container for containerID: 30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88
E0724 05:31:07.891431 203237 remote_runtime.go:261] RemoveContainer "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88" from runtime service failed: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first
Jul 24 05:31:07.891: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.413 seconds]
[k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68
runtime should support removing running container [Conformance] [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
failed to remove container: rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first
Unexpected error:
<*status.statusError | 0xc0011f2460>: {
Code: 2,
Message: "failed to set removing state for container \"30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88\": container is still running, to stop first",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to set removing state for container "30ade36afd65a5eb3c53d1eba079c8b28be0e40ed93e31ac2ef93e932d759d88": container is still running, to stop first
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399
------------------------------
[k8s.io] Security Context bucket
runtime should support Privileged is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:08.209: INFO: Created container "e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288"
STEP: start container
STEP: Start container for containerID: e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288
Jul 24 05:31:08.264: INFO: Started container "e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288"
STEP: Get container status for containerID: e4ae7892d82180f49e3b9f352f7fecc06fc6f918c71229c5a352b0df0b847288
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUser container
STEP: create a container with RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:08.572: INFO: Created container "ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917"
STEP: start container
STEP: Start container for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917
Jul 24 05:31:08.628: INFO: Started container "ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917"
STEP: Get container status for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917
STEP: verify RunAsUser for container
STEP: verify execSync output
STEP: execSync for containerID: ffde9eeb15c05eb0cb0755ef3e5b217af9be5709a109648ff42ec1ae9ab0b917
Jul 24 05:31:08.662: INFO: Execsync succeed
Jul 24 05:31:08.662: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support sysctls
should support safe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support safe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:31:08.943: INFO: Created container "51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2"
STEP: start container
STEP: Start container for containerID: 51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2
Jul 24 05:31:08.995: INFO: Started container "51fc1242805aaa9fa08d215af1e8fe560474660a744e22ddd42d72ac9cffe8d2"
STEP: check sysctls kernel.shm_rmid_forced
[AfterEach] runtime should support sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support port mapping with host port and container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with host port and container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
STEP: create a PodSandbox with host port and container port port mapping
STEP: create a web server container
Jul 24 05:31:09.320: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:31:09.335: INFO: Created container "75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43"
STEP: start the web server container
STEP: Start container for containerID: 75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43
Jul 24 05:31:09.401: INFO: Started container "75ae74934c7b6f664b398fe7c33bb455433133959ec5f96f018a61757fdd8b43"
STEP: check the port mapping with host port and container port
STEP: get the IP:port needed to be checked
Jul 24 05:31:09.401: INFO: the IP:port is http://127.0.0.1:12000
STEP: check the content of http://127.0.0.1:12000
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.396 seconds]
[k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44
runtime should support port mapping with host port and container port [Conformance] [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
Timed out after 60.001s.
Expected
<*url.Error | 0xc0012f73e0>: {
Op: "Get",
URL: "http://127.0.0.1:12000",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 127, 0, 0, 1],
Port: 12000,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[k8s.io] Security Context bucket
runtime should support ReadonlyPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ReadonlyPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
STEP: create pod
STEP: create container with ReadonlyPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:09.693: INFO: Created container "01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745"
STEP: Start container for containerID: 01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745
Jul 24 05:32:09.741: INFO: Started container "01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745"
STEP: Get container status for containerID: 01ca9a0ef7664d38668aad8f133630e388a48fb4221bd9d7c454b2e964da9745
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support that ReadOnlyRootfs is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_false
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:10.044: INFO: Created container "a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b"
STEP: start container
STEP: Start container for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b
Jul 24 05:32:10.105: INFO: Started container "a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b"
STEP: Get container status for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b
STEP: Get container status for containerID: a6663f7366a65754d93da369d06f970c543cfc2f36c5c387b6348d093643ed2b
STEP: Check whether rootfs is writable
STEP: verify log contents
Jul 24 05:32:14.106: INFO: Open log file /tmp/podLogTest317252427/PodSandbox-with-log-directory-b17b6897-cda9-11ea-8530-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-b18e5c0f-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:32:14.106: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 918ccf2fd1436cc92600ac26a9712a94f00944eb79a51ed110b61b314f737e3f
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 4cbcd5daca6c071540ec9616d013c3bb00978e1dca3f621ab8077d8ddbc2ee82
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NoNewPrivs
should not allow privilege escalation when true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should not allow privilege escalation when true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
STEP: create container alpine-nnp-true-b4aeb180-cda9-11ea-8530-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:32:15.294: INFO: Created container "dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5"
STEP: Start container for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5
Jul 24 05:32:15.355: INFO: Started container "dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5"
STEP: Get container status for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5
STEP: Get container status for containerID: dee15b08bcb28573b708f604788877facad8a107ced2b0f72ae3398435f867d5
STEP: check container output
STEP: verify log contents
Jul 24 05:32:19.357: INFO: Open log file /tmp/podLogTest625479214/PodSandbox-with-log-directory-b49b46dc-cda9-11ea-8530-5254001ff4e5/alpine-nnp-true-b4aeb180-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:32:19.357: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rslave' should support propagation from host to container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rslave' should support propagation from host to container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:19.635: INFO: Created container "50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f"
STEP: test start container with volume
STEP: Start container for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f
Jul 24 05:32:19.696: INFO: Started container "50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f"
STEP: Get container status for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f
Jul 24 05:32:19.732: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f
Jul 24 05:32:19.758: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 50b5434c4778e467b132d1dd8d6f3728df74b1122eb1da5e1cc376f2d9e00c2f
Jul 24 05:32:19.786: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support adding volume and device
runtime should support starting container with volume when host path is a symlink [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume when host path is a symlink [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
STEP: create host path and flag file
STEP: create symlink
STEP: create volume container with symlink host path
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:20.134: INFO: Created container "c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472"
STEP: test start volume container with symlink host path
STEP: Start container for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472
Jul 24 05:32:20.209: INFO: Started container "c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472"
STEP: Get container status for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472
STEP: check whether 'symlink' contains file or dir in container
STEP: execSync for containerID: c98cd75ecd477c7580fb0b2c50b0495e68ec7cf2bcd97a3f8e9d8cf029b6a472
Jul 24 05:32:20.235: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support starting container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support starting container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:20.512: INFO: Created container "a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582"
STEP: test start container
STEP: Start container for containerID: a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582
Jul 24 05:32:20.559: INFO: Started container "a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582"
STEP: Get container status for containerID: a739d636d224006d3631c0bbcba9a43f3418dc3737cf1d73767d80cc17619582
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
STEP: create podSandbox for security context HostPID
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:32:21.098: INFO: Created container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e"
STEP: start container
STEP: Start container for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e
Jul 24 05:32:21.165: INFO: Started container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e"
STEP: Get container status for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e
STEP: get nginx container pid
STEP: execSync for containerID: 42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e
Jul 24 05:32:21.211: INFO: Unexpected error occurred: command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137:
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• Failure [0.633 seconds]
[k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support HostPID [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
failed to execSync in container "42e8e81aa78763c3eae1927a96398241eef763f95b0c55e87bb58f3756856a1e"
Unexpected error:
<exec.CodeExitError>: {
Err: {
s: "command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: ",
},
Code: 137,
}
command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137:
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp default which is unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp default which is unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:32:21.458: INFO: Created container "458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa"
STEP: start container
STEP: Start container for containerID: 458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa
Jul 24 05:32:21.512: INFO: Started container "458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa"
STEP: Get container status for containerID: 458f9b84389f4c6feef177d51a1112b683da3448e9a1d117abdb6a5104b574fa
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support portforward in host network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33
[It] runtime should support portforward in host network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
STEP: create a PodSandbox with container port port mapping in host network
STEP: create a web server container
Jul 24 05:32:21.777: INFO: Use latest as default image tag.
STEP: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest
STEP: Create container.
Jul 24 05:32:21.793: INFO: Created container "85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5"
STEP: start the web server container
STEP: Start container for containerID: 85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5
Jul 24 05:32:21.852: INFO: Started container "85199ccff6b56194d8dc4e6a844b7d3795c9f39073fd8e0cfaee3a7a9814d0a5"
STEP: port forward PodSandbox: 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63
Jul 24 05:32:21.853: INFO: Get port forward url: http://127.0.0.1:10010/portforward/uRHcEFk2
STEP: check the output of portforward
Jul 24 05:32:21.853: INFO: Parse url "http://127.0.0.1:10010/portforward/uRHcEFk2" succeed
STEP: check if we can get nginx main page via localhost:12002
STEP: get the IP:port needed to be checked
Jul 24 05:32:21.853: INFO: the IP:port is http://127.0.0.1:12002
STEP: check the content of http://127.0.0.1:12002
STEP: start port forward
Forwarding from 127.0.0.1:12002 -> 12003
Forwarding from [::1]:12002 -> 12003
Handling connection for 12002
E0724 05:32:22.865096 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:22 socat[219475] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:23.870100 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:23 socat[219476] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:24.879484 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:24 socat[219477] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:25.955462 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:25 socat[219478] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:26.963555 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:26 socat[219479] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:27.972830 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:27 socat[219480] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:28.980343 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:28 socat[219481] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:29.988657 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:29 socat[219482] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:30.997010 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:30 socat[219483] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:32.005548 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:32 socat[219484] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:33.027357 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:33 socat[219485] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:34.035021 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:34 socat[219486] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:35.042871 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:35 socat[219487] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:36.051034 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:36 socat[219488] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:37.104504 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:37 socat[219489] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:38.122917 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:38 socat[219490] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:39.197981 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:39 socat[219491] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:40.206149 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:40 socat[219492] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:41.214283 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:41 socat[219493] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:42.222005 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:42 socat[219494] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:43.228503 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:43 socat[219495] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:44.236298 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:44 socat[219496] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:45.244075 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:45 socat[219497] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:46.251788 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:46 socat[219500] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:47.258952 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:47 socat[219503] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:48.266866 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:48 socat[219508] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:49.274596 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:49 socat[219509] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:50.281592 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:50 socat[219512] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:51.289854 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:51 socat[219516] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:52.297656 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:52 socat[219517] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:53.305817 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:53 socat[219518] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:54.313853 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:54 socat[219519] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:55.321740 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:55 socat[219520] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:56.329760 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:56 socat[219521] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:57.336719 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:57 socat[219522] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:58.344805 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:58 socat[219523] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:32:59.353437 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:32:59 socat[219524] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:00.362091 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:00 socat[219525] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:01.370063 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:01 socat[219526] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:02.377882 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:02 socat[219527] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:03.385303 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:03 socat[219528] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:04.393059 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:04 socat[219529] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:05.400229 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:05 socat[219530] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:06.407905 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:06 socat[219531] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:07.415302 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:07 socat[219532] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:08.423649 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:08 socat[219533] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:09.431237 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:09 socat[219534] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:10.438294 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:10 socat[219535] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:11.446300 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:11 socat[219536] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:12.451751 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:12 socat[219537] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:13.459844 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:13 socat[219538] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:14.467833 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:14 socat[219539] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:15.475666 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:15 socat[219540] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:16.484341 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:16 socat[219541] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:17.491666 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:17 socat[219542] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:18.498670 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:18 socat[219543] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:19.506264 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:19 socat[219544] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:20.513801 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:20 socat[219545] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:33:21.521562 203237 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 8218f7ca2184c0f69d14018fb52511c22b0410366996aadcfe8a99f01268de63, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:33:21 socat[219546] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [60.226 seconds]
[k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:38
runtime should support portforward in host network [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
Timed out after 60.001s.
Expected
<*url.Error | 0xc000d96390>: {
Op: "Get",
URL: "http://127.0.0.1:12002",
Err: {s: "EOF"},
}
to be nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostNetwork is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
STEP: creating a podSandbox with hostNetwork true
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:33:22.151: INFO: Created container "862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74"
STEP: start container
STEP: Start container for containerID: 862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74
Jul 24 05:33:22.208: INFO: Started container "862034820deb19108d4d7493398e47c6f1885e7e319ec04bc34bd19f85631a74"
STEP: checking host http service port in the container
Jul 24 05:33:22.208: INFO: Open log file /tmp/podLogTest046958914/NamespaceOption-PodSandbox-d5ea3acd-cda8-11ea-8530-5254001ff4e5/container-with-HostNetwork-test-dc87aeed-cda9-11ea-8530-5254001ff4e5.log
Jul 24 05:33:22.208: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support execSync [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:33:22.499: INFO: Created container "35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87"
STEP: start container
STEP: Start container for containerID: 35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87
Jul 24 05:33:22.569: INFO: Started container "35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87"
STEP: test execSync
STEP: verify execSync output
STEP: execSync for containerID: 35b2b941a9ce56761ccedcad6726204300c8ba75fea7148e13912b75031afd87
Jul 24 05:33:22.593: INFO: Execsync succeed
Jul 24 05:33:22.593: INFO: verify Execsync output succeed
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support SupplementalGroups
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support SupplementalGroups
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
STEP: create pod
STEP: create container for security context SupplementalGroups
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:33:22.870: INFO: Created container "eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2"
STEP: start container
STEP: Start container for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2
Jul 24 05:33:22.919: INFO: Started container "eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2"
STEP: Get container status for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2
STEP: verify SupplementalGroups for container
STEP: execSync for containerID: eac0a61bb3b17d8f7310e09e9785330b9edb833457495543037214382db9ccb2
Jul 24 05:33:22.944: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support ContainerPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ContainerPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
STEP: create podSandbox with PID set to container
Jul 24 05:33:23.093: INFO: Pid namespace is "CONTAINER"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:33:23.236: INFO: Created container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d"
STEP: start container
STEP: Start container for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d
Jul 24 05:33:23.300: INFO: Started container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d"
STEP: Get container status for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d
STEP: get nginx container pid
STEP: execSync for containerID: 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d
E0724 05:33:23.339961 203237 remote_runtime.go:351] ExecSync 3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d 'sh -c while ! cat /proc/1/cmdline | grep "master process"; do sleep 1; done' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
Jul 24 05:33:23.339: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
E0724 05:33:23.351819 203237 remote_runtime.go:128] StopPodSandbox "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" from runtime service failed: rpc error: code = Unknown desc = failed to stop container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d": failed to kill container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d": context canceled: unknown
STEP: delete PodSandbox
E0724 05:33:23.352221 203237 remote_runtime.go:145] RemovePodSandbox "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" from runtime service failed: rpc error: code = Unknown desc = sandbox container "462caff896f8c06bf315946e8395c13152b81182fd3a6adc4a3c2cc0a385b584" is not fully stopped
• Failure [0.259 seconds]
[k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support ContainerPID [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
failed to execSync in container "3a282a0c1db330b6609a57191bd50f961b82c706207c81fcf3e08e4a45a48c7d"
Unexpected error:
<*status.statusError | 0xc000a41f90>: {
Code: 2,
Message: "failed to exec in container: failed to start exec \"365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1\": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused \"process_linux.go:101: executing setns process caused \\\"exit status 1\\\"\": unknown",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to exec in container: failed to start exec "365f6cc9852b4c4112025438d59bd077a48aed67252111a54ddeab404afd3ef1": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
Summarizing 13 Failures:
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward [Conformance] 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support PodPID 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged [It] should error on create with wrong options 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support container log 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support network 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support container exec 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged [It] should error on create with wrong options 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with only container port [Conformance] 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Container runtime should support basic operations on container [It] runtime should support removing running container [Conformance] 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with host port and container port [Conformance] 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostPID 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward in host network 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support ContainerPID 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
Ran 90 of 97 Specs in 441.815 seconds
FAIL! -- 77 Passed | 13 Failed | 0 Pending | 7 Skipped
--- FAIL: TestCRISuite (441.82s)
FAIL
type=USER_END msg=audit(1595593283.524:4777): pid=185853 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595593283.524:4778): pid=185853 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595593305.126:4779): pid=185856 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595593305.126:4780): pid=185856 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/vagrant" cmd=63726974657374202D2D72756E74696D652D656E64706F696E743D756E69783A2F2F2F72756E2F6B33732F636F6E7461696E6572642F636F6E7461696E6572642E736F636B202D2D67696E6B676F2E736565643D313233343536373839 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595593305.126:4781): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595593305.129:4782): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=ANOM_PROMISCUOUS msg=audit(1595593305.166:4783): dev=vethf50dbefa prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593305.473:4784): dev=vethf50dbefa prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593306.645:4785): dev=veth21cf3c16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593306.962:4786): dev=veth21cf3c16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593306.997:4787): dev=veth29524147 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593307.325:4788): dev=veth29524147 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593307.367:4789): dev=veth1eb9f629 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593307.583:4790): avc: denied { search } for pid=186574 comm="top" name="1" dev="proc" ino=550537 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c595,c688 tclass=dir permissive=1
type=AVC msg=audit(1595593307.583:4790): avc: denied { read } for pid=186574 comm="top" name="stat" dev="proc" ino=550625 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c595,c688 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593307.725:4791): dev=veth1eb9f629 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593308.686:4792): dev=veth7cb7dceb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593308.974:4793): dev=veth7cb7dceb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593309.017:4794): dev=veth0097419d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593310.409:4795): dev=veth0097419d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593310.444:4796): dev=veth622ab97a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593310.768:4797): dev=veth622ab97a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593310.807:4798): dev=veth09c165a1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.081:4799): dev=veth09c165a1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.120:4800): dev=vetha09bdfe2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.440:4801): dev=vetha09bdfe2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.501:4802): dev=veth3dae89b1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.806:4803): dev=veth3dae89b1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593315.843:4804): dev=vetha7858760 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593316.162:4805): dev=vetha7858760 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593316.200:4806): dev=vethb70b6edd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593316.405:4807): avc: denied { open } for pid=188201 comm="nginx" path="pipe:[557127]" dev="pipefs" ino=557127 scontext=system_u:system_r:container_t:s0:c386,c524 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593317.545:4808): dev=vethb70b6edd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593317.587:4809): dev=vethcbd6e0c4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593317.903:4810): dev=vethcbd6e0c4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593317.944:4811): dev=veth5bb4ff22 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593318.165:4812): dev=veth5bb4ff22 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593318.251:4813): dev=vethb597858e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593318.546:4814): dev=vethb597858e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593318.581:4815): dev=veth9e4a86a4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593319.075:4816): dev=veth9e4a86a4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593319.143:4817): dev=veth765a2b05 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593319.448:4818): dev=veth765a2b05 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593319.515:4819): dev=vethea624e16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593319.819:4820): dev=vethea624e16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593320.925:4821): dev=vethd4618b32 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.135:4822): dev=vethd4618b32 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.176:4823): dev=vethb4cabd50 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.444:4824): dev=vethb4cabd50 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.481:4825): dev=veth5f39faf1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.923:4826): dev=veth5f39faf1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593321.963:4827): dev=veth28304afe prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593322.130:4828): avc: denied { open } for pid=190243 comm="nginx" path="pipe:[563646]" dev="pipefs" ino=563646 scontext=system_u:system_r:container_t:s0:c444,c598 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593323.300:4829): dev=veth28304afe prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593323.343:4830): dev=vethc7f9e496 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593323.711:4831): dev=vethc7f9e496 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593323.747:4832): dev=vethf156fec8 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593324.008:4833): dev=vethf156fec8 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593324.048:4834): dev=vethe69977fd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593324.462:4835): dev=vethe69977fd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593324.516:4836): dev=veth75608639 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593328.893:4837): dev=veth75608639 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593328.936:4838): dev=vethdc414206 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593329.262:4839): dev=vethdc414206 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593329.295:4840): dev=vethed6b1a00 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593329.583:4841): dev=vethed6b1a00 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593329.616:4842): dev=veth035901b1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593329.830:4843): avc: denied { open } for pid=191623 comm="httpd" path="pipe:[568094]" dev="pipefs" ino=568094 scontext=system_u:system_r:container_t:s0:c961,c1000 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593330.053:4844): dev=veth035901b1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593330.109:4845): dev=veth5cbac81f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593330.563:4846): dev=veth5cbac81f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593330.612:4847): dev=veth1c9c5df7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593330.960:4848): dev=veth1c9c5df7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593330.998:4849): dev=veth6d8e83da prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593331.298:4850): dev=veth6d8e83da prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593331.334:4851): dev=vethd3d0cef5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593331.523:4852): avc: denied { search } for pid=192672 comm="top" name="1" dev="proc" ino=571666 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c258 tclass=dir permissive=1
type=AVC msg=audit(1595593331.523:4852): avc: denied { read } for pid=192672 comm="top" name="stat" dev="proc" ino=571808 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c258 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593331.696:4853): dev=vethd3d0cef5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593331.738:4854): dev=veth73ca3e01 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.123:4855): dev=veth73ca3e01 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.167:4856): dev=vethd6a2a3d6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.469:4857): dev=vethd6a2a3d6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.510:4858): dev=vethcb10acd6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.809:4859): dev=vethcb10acd6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593332.852:4860): dev=veth96af5b78 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593333.403:4861): dev=veth96af5b78 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593333.443:4862): dev=veth00d9ebcb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593333.695:4863): dev=veth00d9ebcb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593337.319:4864): dev=veth51d2b381 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593337.635:4865): dev=veth51d2b381 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593337.674:4866): dev=veth31a9a533 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593338.311:4867): dev=veth31a9a533 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593338.354:4868): dev=veth33e00e03 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593338.620:4869): avc: denied { open } for pid=194296 comm="httpd" path="pipe:[576846]" dev="pipefs" ino=576846 scontext=system_u:system_r:container_t:s0:c648,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593338.847:4870): dev=veth33e00e03 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593338.888:4871): dev=veth468b862c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593339.213:4872): dev=veth468b862c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593339.261:4873): dev=veth3b509b2d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593339.543:4874): dev=veth3b509b2d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593341.180:4875): dev=vethb5bca19f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593345.524:4876): dev=vethb5bca19f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593345.569:4877): dev=veth1535eeb4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593349.868:4878): dev=veth1535eeb4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593349.923:4879): dev=veth69b65927 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593350.230:4880): dev=veth69b65927 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593350.268:4881): dev=veth779e4e10 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593350.590:4882): dev=veth779e4e10 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593353.543:4883): dev=vethbc7bbdcd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593353.728:4884): avc: denied { open } for pid=195877 comm="httpd" path="pipe:[582724]" dev="pipefs" ino=582724 scontext=system_u:system_r:container_t:s0:c261,c292 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593354.004:4885): dev=vethbc7bbdcd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.046:4886): dev=veth1b25b2c1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.378:4887): dev=veth1b25b2c1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.416:4888): dev=veth63dcc678 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.613:4889): dev=veth63dcc678 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.658:4890): dev=vethc1f154fc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593354.994:4891): dev=vethc1f154fc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593355.027:4892): dev=vethda5298a6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593355.210:4893): avc: denied { open } for pid=196798 comm="nginx" path="pipe:[585186]" dev="pipefs" ino=585186 scontext=system_u:system_r:container_t:s0:c290,c729 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593356.344:4894): dev=vethda5298a6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593356.406:4895): dev=vethe9d38e0e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593356.611:4896): dev=vethe9d38e0e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593357.719:4897): dev=veth734e107b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593363.975:4898): dev=veth734e107b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593364.017:4899): dev=veth54f2df4f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593364.358:4900): dev=veth54f2df4f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593364.399:4901): dev=veth4b890e01 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593364.983:4902): avc: denied { search } for pid=197582 comm="top" name="13" dev="proc" ino=587570 scontext=system_u:system_r:container_t:s0:c721,c962 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593364.983:4902): avc: denied { read } for pid=197582 comm="top" name="stat" dev="proc" ino=588187 scontext=system_u:system_r:container_t:s0:c721,c962 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593365.160:4903): dev=veth4b890e01 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593365.197:4904): dev=vetha956cf82 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593365.513:4905): dev=vetha956cf82 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593365.545:4906): dev=veth31ac0519 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593365.657:4907): dev=veth4b77fb86 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593366.116:4908): dev=veth31ac0519 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593366.256:4909): dev=veth4b77fb86 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593366.294:4910): dev=vethf4cc825c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593371.606:4911): dev=vethf4cc825c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593371.641:4912): dev=vethfaca2654 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593371.939:4913): dev=vethfaca2654 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593371.979:4914): dev=veth8f14c770 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593372.402:4915): dev=veth8f14c770 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593372.442:4916): dev=veth394902af prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593372.854:4917): dev=veth394902af prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593372.893:4918): dev=vethdae5e7d2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593373.284:4919): dev=vethdae5e7d2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593373.323:4920): dev=veth28e4fdc8 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593373.698:4921): dev=veth28e4fdc8 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593373.733:4922): dev=vethf23d13e5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593374.034:4923): dev=vethf23d13e5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593374.080:4924): dev=veth540fc314 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593374.300:4925): avc: denied { open } for pid=199965 comm="nginx" path="pipe:[595889]" dev="pipefs" ino=595889 scontext=system_u:system_r:container_t:s0:c722,c747 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593375.433:4926): dev=veth540fc314 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593375.472:4927): dev=veth2395e009 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593375.880:4928): dev=veth2395e009 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593375.920:4929): dev=veth3fbd9678 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593380.349:4930): dev=veth3fbd9678 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593380.388:4931): dev=vethaa2536e7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593380.719:4932): dev=vethaa2536e7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593380.759:4933): dev=veth699beb29 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593381.105:4934): dev=veth699beb29 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593381.157:4935): dev=veth59db34cf prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593385.504:4936): dev=veth59db34cf prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593385.541:4937): dev=vethffa7dad9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593385.943:4938): dev=vethffa7dad9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593385.981:4939): dev=vethc0f5133b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593386.377:4940): dev=vethc0f5133b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593386.413:4941): dev=vethb61e203b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593386.886:4942): dev=vethb61e203b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593386.923:4943): dev=vethf3e4f2c9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593387.114:4944): avc: denied { open } for pid=201842 comm="nginx" path="pipe:[602617]" dev="pipefs" ino=602617 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595593387.217:4945): avc: denied { search } for pid=201933 comm="pidof" name="1" dev="proc" ino=1333 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.217:4945): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.217:4945): avc: denied { open } for pid=201933 comm="pidof" path="/proc/1/stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.218:4946): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=1559 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:init_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.218:4947): avc: denied { search } for pid=201933 comm="pidof" name="2" dev="proc" ino=1395 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.218:4947): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.218:4947): avc: denied { open } for pid=201933 comm="pidof" path="/proc/2/stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.218:4948): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156012 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:kernel_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4949): avc: denied { search } for pid=201933 comm="pidof" name="546" dev="proc" ino=17537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4949): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4949): avc: denied { open } for pid=201933 comm="pidof" path="/proc/546/stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4950): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=14289 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:syslogd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4951): avc: denied { search } for pid=201933 comm="pidof" name="602" dev="proc" ino=18254 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4951): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4951): avc: denied { open } for pid=201933 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4952): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4953): avc: denied { search } for pid=201933 comm="pidof" name="605" dev="proc" ino=18311 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4953): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4953): avc: denied { open } for pid=201933 comm="pidof" path="/proc/605/stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4954): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=18712 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:auditd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4955): avc: denied { search } for pid=201933 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4955): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4955): avc: denied { open } for pid=201933 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4956): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=19247 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4957): avc: denied { search } for pid=201933 comm="pidof" name="643" dev="proc" ino=19524 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4957): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4957): avc: denied { open } for pid=201933 comm="pidof" path="/proc/643/stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4958): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156081 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:irqbalance_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4959): avc: denied { search } for pid=201933 comm="pidof" name="656" dev="proc" ino=19536 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4959): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4959): avc: denied { open } for pid=201933 comm="pidof" path="/proc/656/stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4960): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21030 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sssd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.219:4961): avc: denied { search } for pid=201933 comm="pidof" name="657" dev="proc" ino=19539 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.219:4961): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4961): avc: denied { open } for pid=201933 comm="pidof" path="/proc/657/stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.219:4962): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20720 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:policykit_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4963): avc: denied { search } for pid=201933 comm="pidof" name="659" dev="proc" ino=19545 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4963): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4963): avc: denied { open } for pid=201933 comm="pidof" path="/proc/659/stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4964): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21020 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4965): avc: denied { search } for pid=201933 comm="pidof" name="666" dev="proc" ino=19851 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4965): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4965): avc: denied { open } for pid=201933 comm="pidof" path="/proc/666/stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4966): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156102 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:gssproxy_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4967): avc: denied { search } for pid=201933 comm="pidof" name="671" dev="proc" ino=20673 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4967): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4967): avc: denied { open } for pid=201933 comm="pidof" path="/proc/671/stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4968): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20675 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:chronyd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4969): avc: denied { search } for pid=201933 comm="pidof" name="683" dev="proc" ino=19883 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4969): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4969): avc: denied { open } for pid=201933 comm="pidof" path="/proc/683/stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4970): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=20954 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rngd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4971): avc: denied { search } for pid=201933 comm="pidof" name="709" dev="proc" ino=20032 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4971): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4971): avc: denied { open } for pid=201933 comm="pidof" path="/proc/709/stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4972): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156103 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:tuned_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4973): avc: denied { search } for pid=201933 comm="pidof" name="751" dev="proc" ino=20306 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4973): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4973): avc: denied { open } for pid=201933 comm="pidof" path="/proc/751/stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4974): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21809 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.220:4975): avc: denied { search } for pid=201933 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.220:4975): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4975): avc: denied { open } for pid=201933 comm="pidof" path="/proc/754/stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.220:4976): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=21334 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.221:4977): avc: denied { search } for pid=201933 comm="pidof" name="755" dev="proc" ino=20384 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.221:4977): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4977): avc: denied { open } for pid=201933 comm="pidof" path="/proc/755/stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4978): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156104 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.221:4979): avc: denied { search } for pid=201933 comm="pidof" name="830" dev="proc" ino=21910 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.221:4979): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=22781 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4980): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=22016 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.221:4981): avc: denied { search } for pid=201933 comm="pidof" name="50569" dev="proc" ino=59858 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.221:4981): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4981): avc: denied { open } for pid=201933 comm="pidof" path="/proc/50569/stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4982): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=156109 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.221:4983): avc: denied { search } for pid=201933 comm="pidof" name="51924" dev="proc" ino=63902 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595593387.221:4983): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4983): avc: denied { open } for pid=201933 comm="pidof" path="/proc/51924/stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4984): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=63909 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.221:4985): avc: denied { search } for pid=201933 comm="pidof" name="167899" dev="proc" ino=485502 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.221:4985): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=485503 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4985): avc: denied { open } for pid=201933 comm="pidof" path="/proc/167899/stat" dev="proc" ino=485503 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.221:4986): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=485523 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.222:4987): avc: denied { search } for pid=201933 comm="pidof" name="185834" dev="proc" ino=548321 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.222:4987): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=602911 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.222:4988): avc: denied { read } for pid=201933 comm="pidof" name="exe" dev="proc" ino=548329 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595593387.223:4989): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.223:4989): avc: denied { open } for pid=201933 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595593387.223:4990): avc: denied { search } for pid=201933 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595593387.223:4990): avc: denied { read } for pid=201933 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595593387.223:4990): avc: denied { open } for pid=201933 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c130,c727 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593387.392:4991): dev=vethf3e4f2c9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593387.430:4992): dev=vethc967bcf7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593387.772:4993): dev=vethc967bcf7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593387.934:4994): avc: denied { open } for pid=202337 comm="nginx" path="pipe:[604533]" dev="pipefs" ino=604533 scontext=system_u:system_r:container_t:s0:c79,c293 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593389.320:4995): dev=vethb2ae938c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593389.638:4996): dev=vethb2ae938c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593389.677:4997): dev=veth6d162eed prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593390.145:4998): dev=veth6d162eed prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595593390.186:4999): dev=vethdcb0ff4e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595593390.503:5000): avc: denied { open } for pid=203042 comm="nginx" path="pipe:[606644]" dev="pipefs" ino=606644 scontext=system_u:system_r:container_t:s0:c367,c720 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595593390.643:5001): dev=vethdcb0ff4e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=10AUID="vagrant" UID="root" GID="root"
type=USER_END msg=audit(1595593390.668:5002): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595593390.669:5003): pid=185856 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595593430.850:5004): pid=203200 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595593430.850:5005): pid=203200 uid=1000 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/vagrant" cmd=6370202D7666202F7661722F6C6F672F61756469742F61756469742E6C6F67202F746D702F746573742D6372692F7065726D6973736976652D61756469742E6C6F67 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595593430.852:5006): pid=203200 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595593430.854:5007): pid=203200 uid=0 auid=1000 ses=10 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
critest version: 1.18.0-89-gbaca4a1
Running Suite: CRI validation
=============================
Random Seed: 123456789 - Will randomize all specs
Will run 90 of 97 specs
[k8s.io] Container runtime should support basic operations on container
runtime should support removing stopped container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing stopped container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:45.294: INFO: Created container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151"
STEP: start container
STEP: Start container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151
Jul 24 05:21:45.361: INFO: Started container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151"
STEP: test stop container
STEP: Stop container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151
Jul 24 05:21:45.392: INFO: Stopped container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151"
STEP: Get container status for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151
STEP: test remove container
STEP: Remove container for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151
Jul 24 05:21:45.395: INFO: Removed container "85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151"
STEP: List containers for containerID: 85a1c5801f550b6fb9b85be2edff6f1694d030743fb55887290842ac6c562151
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image with tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Pull image : gcr.io/cri-tools/test-image-tag:test
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Runtime info runtime should support returning runtime info
runtime should return runtime conditions [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return runtime conditions [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
STEP: test runtime status
[AfterEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostNetwork is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
STEP: creating a podSandbox with hostNetwork false
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:46.790: INFO: Created container "96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba"
STEP: start container
STEP: Start container for containerID: 96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba
Jul 24 05:21:46.852: INFO: Started container "96106442b5d0a4a8b5311f910be82e07318c22919d30a5d0e1dffa4c905929ba"
STEP: checking host http service port in the container
Jul 24 05:21:46.852: INFO: Open log file /tmp/podLogTest321519101/NamespaceOption-PodSandbox-3d181b7c-cda8-11ea-966e-5254001ff4e5/container-with-HostNetwork-test-3e0f126b-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:21:46.852: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests195578168/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:47.111: INFO: Created container "e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0"
STEP: Start container for containerID: e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0
Jul 24 05:21:47.169: INFO: Started container "e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0"
STEP: Get container status for containerID: e3aaecb627e4fbdebe09ce6e908c60de4ff57d72915c48d94b05d7e7b7d145e0
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: fd9117d634f62be9b171e0a4a170c87804d85068b2ed45af8f3bde51bb998907
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image with digest should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with digest should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should return error if RunAsGroup is set without RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should return error if RunAsGroup is set without RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
STEP: create pod
STEP: create container with invalid RunAsGroup
STEP: create invalid RunAsGroup container
STEP: create a container with RunAsGroup without RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:21:48.796474 185858 remote_runtime.go:200] CreateContainer in sandbox "b49a6e3700a10881c81538426ba6c41d36d8398b4178b68ff9ad44510720c9ef" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•SS
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support execSync with timeout [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync with timeout [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:49.179: INFO: Created container "d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a"
STEP: start container
STEP: Start container for containerID: d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a
Jul 24 05:21:49.239: INFO: Started container "d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a"
STEP: test execSync with timeout
E0724 05:21:50.266572 185858 remote_runtime.go:351] ExecSync d8cf9f990e871f34701fe73e0a9501b66ef7605e1eaaad0ad839f8b02d19473a 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded
STEP: timeout exec process should be gone
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support exec with tty=false and stdin=false [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=false and stdin=false [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:50.558: INFO: Created container "fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f"
STEP: start container
STEP: Start container for containerID: fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f
Jul 24 05:21:50.614: INFO: Started container "fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f"
STEP: exec given command in container: fdedadb211fcd2685558f83d9957f5f89d0ec9f0f3f06686774e158af488189f
Jul 24 05:21:50.614: INFO: Get exec url: http://127.0.0.1:10010/exec/1rSjOntQ
STEP: check the output of exec
Jul 24 05:21:50.615: INFO: Parse url "http://127.0.0.1:10010/exec/1rSjOntQ" succeed
Jul 24 05:21:50.645: INFO: Check exec url "http://127.0.0.1:10010/exec/1rSjOntQ" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsGroup
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsGroup
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
STEP: create pod
STEP: create a PodSandbox with log directory
STEP: create container for security context RunAsGroup
STEP: create RunAsGroup container
STEP: create a container with RunAsUser and RunAsGroup
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:50.924: INFO: Created container "c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f"
STEP: start container
STEP: Start container for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f
Jul 24 05:21:50.969: INFO: Started container "c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f"
STEP: Get container status for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f
STEP: Get container status for containerID: c3092f824b463b4eb39e618d96670dc34de5ed042faa04ab19a164bd92145e0f
STEP: verify RunAsGroup for container
STEP: check container output
STEP: verify log contents
Jul 24 05:21:54.979: INFO: Open log file /tmp/podLogTest336394039/PodSandbox-with-log-directory-4076968e-cda8-11ea-966e-5254001ff4e5/container-with-RunAsGroup-test-40887f54-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:21:54.979: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support MaskedPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support MaskedPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
STEP: create pod
STEP: create container with MaskedPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:55.239: INFO: Created container "338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a"
STEP: Start container for containerID: 338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a
Jul 24 05:21:55.290: INFO: Started container "338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a"
STEP: Get container status for containerID: 338ef3d3fd3a7ffb6f450b9895ad7792b7a2c65410232eb1c685319be775351a
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support sysctls
should support unsafe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support unsafe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:55.605: INFO: Created container "5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0"
STEP: start container
STEP: Start container for containerID: 5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0
Jul 24 05:21:55.659: INFO: Started container "5fd8ca8520e2bebc30fd5a3bdb24c90c64867d2f74e4a66b851387804a7dbbf0"
STEP: check sysctls fs.mqueue.msg_max
[AfterEach] runtime should support sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsUserName
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUserName
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUserName container
STEP: create a container with RunAsUserName
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:55.956: INFO: Created container "bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075"
STEP: start container
STEP: Start container for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075
Jul 24 05:21:56.002: INFO: Started container "bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075"
STEP: Get container status for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075
STEP: verify RunAsUserName for container
STEP: verify execSync output
STEP: execSync for containerID: bf8c70f73ed09b5aac058a68ab2520d4e7ad458637b42e333feeb5cff6e2b075
Jul 24 05:21:56.023: INFO: Execsync succeed
Jul 24 05:21:56.023: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support portforward [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support portforward [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:21:56.297: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:21:56.329: INFO: Created container "7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f"
STEP: start the web server container
STEP: Start container for containerID: 7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f
Jul 24 05:21:56.393: INFO: Started container "7a8e28fa3b4469e6a43aeed186ecd9acc001beaec5927a12ab026ca40fb6923f"
STEP: port forward PodSandbox: 40b48e871a8775706d60331d7fd9fc95d1de2b35c6b6091520420282f1e3eb14
Jul 24 05:21:56.394: INFO: Get port forward url: http://127.0.0.1:10010/portforward/vy7q6wdj
STEP: check the output of portforward
Jul 24 05:21:56.395: INFO: Parse url "http://127.0.0.1:10010/portforward/vy7q6wdj" succeed
STEP: check if we can get nginx main page via localhost:12001
STEP: get the IP:port needed to be checked
Jul 24 05:21:56.395: INFO: the IP:port is http://127.0.0.1:12001
STEP: check the content of http://127.0.0.1:12001
STEP: start port forward
Forwarding from 127.0.0.1:12001 -> 80
Forwarding from [::1]:12001 -> 80
Handling connection for 12001
Jul 24 05:21:57.410: INFO: check port mapping succeed
Jul 24 05:21:57.410: INFO: Check port forward url "http://127.0.0.1:10010/portforward/vy7q6wdj" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostIpc is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIPC is true
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:57.718: INFO: Created container "2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950"
STEP: start container
STEP: Start container for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950
Jul 24 05:21:57.768: INFO: Started container "2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950"
STEP: Get container status for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950
STEP: check if the shared memory segment is included in the container
STEP: execSync for containerID: 2a05274c671c27886b81873ac3ad6f61ec0852a80db1e4c568998b77455d3950
Jul 24 05:21:57.791: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support stopping PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support stopping PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
STEP: run PodSandbox
STEP: test stop PodSandbox
STEP: Stop PodSandbox for podID: b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3
Jul 24 05:21:58.186: INFO: Stopped PodSandbox "b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3"
STEP: Get PodSandbox status for podID: b01bc22988d7efedd41ed89048de3144cc63187f1c4692d8adb22452e9d51bd3
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support stopping container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support stopping container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:58.377: INFO: Created container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057"
STEP: start container
STEP: Start container for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057
Jul 24 05:21:58.425: INFO: Started container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057"
STEP: test stop container
STEP: Stop container for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057
Jul 24 05:21:58.462: INFO: Stopped container "4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057"
STEP: Get container status for containerID: 4b650e940e0087ae5ec1b1498037460bcbf38f04ff9f45e77c930c861addd057
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f763c787674c321be40bbefee692377e6e9ae224324917454ca6a25e57f555a0
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: c26f777cf621f6ae2d3773eb0eba7ff6f68c039c87c878ad17fffca2a149ad48
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:21:59.251: INFO: Created container "432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87"
STEP: start container
STEP: Start container for containerID: 432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87
Jul 24 05:21:59.305: INFO: Started container "432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87"
STEP: Get container status for containerID: 432608fc9a208add49e0532bc0019de18695f1ba96805b130c09bb7434e7ea87
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with just selinux level set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 62428921d3e86446c9a715c0a91e2a731c169d172b2f6358c49825e606b2ec95
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
image status should support all kinds of references [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status should support all kinds of references [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Pull image : gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support removing created container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing created container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:01.049: INFO: Created container "7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3"
STEP: test remove container
STEP: Remove container for containerID: 7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3
Jul 24 05:22:01.052: INFO: Removed container "7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3"
STEP: List containers for containerID: 7b57011de982a4284002efc399aade1e7bb5a7c5e9eeedf5512457df8e19e6c3
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support creating container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support creating container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
STEP: test create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:01.294: INFO: Created container "a866057f7b00b477124e30490f81a87f147e915c707908d8afb2ff33569fe82b"
STEP: test list container
STEP: List containers for containerID: a866057f7b00b477124e30490f81a87f147e915c707908d8afb2ff33569fe82b
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rshared' should support propagation from host to container and vice versa
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rshared' should support propagation from host to container and vice versa
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:01.640: INFO: Created container "c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa"
STEP: test start container with volume
STEP: Start container for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa
Jul 24 05:22:01.699: INFO: Started container "c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa"
STEP: Get container status for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa
Jul 24 05:22:01.727: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa
Jul 24 05:22:01.750: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: c80d88c78999297eb8556d8cd70f8884c8ffc6db2c6a7450dd01fef8734706aa
Jul 24 05:22:01.787: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support PodPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support PodPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
STEP: create podSandbox for sharing process namespace
Jul 24 05:22:01.944: INFO: Pid namespace is "POD"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:22:02.070: INFO: Created container "2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97"
STEP: start container
STEP: Start container for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97
Jul 24 05:22:02.117: INFO: Started container "2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97"
STEP: Get container status for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97
STEP: get nginx container pid
STEP: execSync for containerID: 2bb732aed3c6b51454771a64fa24fe39c6fac86226263151747d5d37aa03fe97
Jul 24 05:22:03.167: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support DNS config [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support DNS config [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
STEP: create a PodSandbox with DNS config
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:03.504: INFO: Created container "7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2"
STEP: start container
STEP: Start container for containerID: 7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2
Jul 24 05:22:03.572: INFO: Started container "7605089e7d832af9ec64cb4326cc77d347ef1d7105ac88e431bec06778ee38d2"
STEP: check DNS config
STEP: get the current dns config via execSync
Jul 24 05:22:03.598: INFO: check DNS config succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.300 seconds]
[k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109
should error on create with wrong options [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
Expected an error to have occurred. Got:
<nil>: nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rprivate' should not support propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rprivate' should not support propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:04.197: INFO: Created container "1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788"
STEP: test start container with volume
STEP: Start container for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788
Jul 24 05:22:04.249: INFO: Started container "1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788"
STEP: Get container status for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788
Jul 24 05:22:04.273: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788
Jul 24 05:22:04.297: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 1f232ad6ed1dd5d65e9741aeabf712b21f8338649e5d5cb4ddd16bda06645788
Jul 24 05:22:04.321: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support that ReadOnlyRootfs is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_true
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:04.722: INFO: Created container "f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee"
STEP: start container
STEP: Start container for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee
Jul 24 05:22:04.777: INFO: Started container "f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee"
STEP: Get container status for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee
STEP: Get container status for containerID: f78603f0571e5d8131460e30f8d8d8b503926207d7e87c296a77a35531fd27ee
STEP: Check whether rootfs is read-only
STEP: verify log contents
Jul 24 05:22:08.795: INFO: Open log file /tmp/podLogTest783981147/PodSandbox-with-log-directory-48a1e76a-cda8-11ea-966e-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-48c083d7-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:08.795: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support exec with tty=true and stdin=true [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=true and stdin=true [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:09.059: INFO: Created container "3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c"
STEP: start container
STEP: Start container for containerID: 3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c
Jul 24 05:22:09.117: INFO: Started container "3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c"
STEP: exec given command in container: 3481a189f8c1f0f4b4bc64fd1415a07d4656d76ea817d845e0ec7525e86af53c
Jul 24 05:22:09.117: INFO: Get exec url: http://127.0.0.1:10010/exec/Crb4zWvB
STEP: check the output of exec
Jul 24 05:22:09.117: INFO: Parse url "http://127.0.0.1:10010/exec/Crb4zWvB" succeed
Jul 24 05:22:09.144: INFO: Check exec url "http://127.0.0.1:10010/exec/Crb4zWvB" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support running PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support running PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
STEP: test run a default PodSandbox
STEP: Get PodSandbox status for podID: 6476b93d696de36e729dd1c06916bd6a180456b446a4f7b16a5f8c032d9852aa
STEP: test list PodSandbox
STEP: List PodSandbox for podID: 6476b93d696de36e729dd1c06916bd6a180456b446a4f7b16a5f8c032d9852aa
STEP: List PodSandbox.
Jul 24 05:22:09.389: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support container log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:22:09.724: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:22:09.750: INFO: Created container "64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f"
STEP: start the httpd container
STEP: Start container for containerID: 64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f
Jul 24 05:22:09.828: INFO: Started container "64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f"
STEP: Get container status for containerID: 64b19f309ae68e3cb4e2cecc9c5f3867809f623132fff7d089b8fb40bba90a3f
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:09.848: INFO: Created container "9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102"
STEP: start the busybox container
STEP: Start container for containerID: 9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102
Jul 24 05:22:09.906: INFO: Started container "9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102"
STEP: Get container status for containerID: 9bca77d9f7f408af70c48d4a0dcfc3b748605c3633707b7651fbce773fa24102
[It] should support container log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support setting Capability
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support setting Capability
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
STEP: create pod
STEP: create container with security context Capability and test
STEP: create Capability container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:10.261: INFO: Created container "3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67"
STEP: Start container for containerID: 3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67
Jul 24 05:22:10.315: INFO: Started container "3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67"
STEP: Get container status for containerID: 3cd3a2c06fd807c4c0ac0a6ace16d1a97a527784d81ded875c617c6b3e0e5d67
STEP: create container without security context Capability and test
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:10.352: INFO: Created container "862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a"
STEP: Start container for containerID: 862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a
Jul 24 05:22:10.400: INFO: Started container "862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a"
STEP: Get container status for containerID: 862ee2a7ed51fa5f0c215870eaa1cf8092ff7cb1ce2f9d2da2a438af0f22258a
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container runtime should support adding volume and device
runtime should support starting container with volume [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:10.760: INFO: Created container "bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba"
STEP: test start container with volume
STEP: Start container for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba
Jul 24 05:22:10.820: INFO: Started container "bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba"
STEP: Get container status for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba
STEP: check whether 'hostPath' contains file or dir in container
STEP: execSync for containerID: bbd5ba3ed824f5c61f96c7751eb07131f3e6668cdee0ea0b72cfc04f492db1ba
Jul 24 05:22:10.841: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostIpc is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIpc is false
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:11.117: INFO: Created container "144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8"
STEP: start container
STEP: Start container for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8
Jul 24 05:22:11.158: INFO: Started container "144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8"
STEP: Get container status for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8
STEP: check if the shared memory segment is not included in the container
STEP: execSync for containerID: 144cba6dd618058b84fcb6a66741f68ea97be79f6221ecf7ce12038045aedad8
Jul 24 05:22:11.193: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 019da15c58f61782e82ce72adba893b193bd5996c846d31362de4ce23ff293ce
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: cf3d7af0803c50488adc616945136b2cfcbda407b0848a21ef2c83e4f3e80d44
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create unconfined Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:12.287: INFO: Created container "342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea"
STEP: Start container for containerID: 342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea
Jul 24 05:22:12.336: INFO: Started container "342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea"
STEP: Get container status for containerID: 342cb56e816f486ae064b7a06085829a7c5418e2e4d30a61d6d657144ea094ea
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support set hostname [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support set hostname [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
STEP: create a PodSandbox with hostname
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:12.617: INFO: Created container "1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d"
STEP: start container
STEP: Start container for containerID: 1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d
Jul 24 05:22:12.661: INFO: Started container "1fd1dc540245522a5681d8b8e10bdf649ca371fd8dbbab3af4bcc22be5c6528d"
STEP: check hostname
STEP: get the current hostname via execSync
Jul 24 05:22:12.690: INFO: check hostname succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
runtime should block sethostname with docker/default seccomp profile and no extra caps
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:12.960: INFO: Created container "ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89"
STEP: Start container for containerID: ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89
Jul 24 05:22:13.131: INFO: Started container "ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89"
STEP: Get container status for containerID: ace60ab328866f98e8ca90d5532ec9339c61f4c58b0a4237e602030210fedd89
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should not support a custom seccomp profile without using localhost/ as a prefix
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create /tmp/seccomp-tests517793810/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:22:13.579885 185858 remote_runtime.go:200] CreateContainer in sandbox "b0eaf4965341f1baa4374fee8f735dbee938fa80ec60dfcc8da087dab5d69aba" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests517793810/block-host-name.json"
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Image Manager
image status get image fields should not have Uid|Username empty [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status get image fields should not have Uid|Username empty [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
Jul 24 05:22:13.717: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid
Jul 24 05:22:14.694: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username
Jul 24 05:22:15.513: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group
Jul 24 05:22:16.380: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image : gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid-group
STEP: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665
STEP: Remove image : gcr.io/cri-tools/test-image-user-username
STEP: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid
STEP: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp localhost/profile on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp localhost/profile on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:17.465: INFO: Created container "6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da"
STEP: start container
STEP: Start container for containerID: 6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da
Jul 24 05:22:17.506: INFO: Started container "6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da"
STEP: Get container status for containerID: 6ee9a9fec4da9a6c8445e268b8b56704c93b708232376c56685fe42cb37e83da
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Runtime info runtime should support returning runtime info
runtime should return version info [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return version info [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
Jul 24 05:22:17.660: INFO: Get version info succeed
[AfterEach] [k8s.io] Runtime info
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:17.815: INFO: Created container "71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678"
STEP: Start container for containerID: 71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678
Jul 24 05:22:18.009: INFO: Started container "71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678"
STEP: Get container status for containerID: 71916730528e5b56538768e6915606768dcc665441da2f7e6b74bb896b92a678
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:22:18.530: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:22:18.548: INFO: Created container "0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967"
STEP: start the httpd container
STEP: Start container for containerID: 0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967
Jul 24 05:22:18.618: INFO: Started container "0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967"
STEP: Get container status for containerID: 0fdd8d03f34a783ddc7359302a57af3c788369c2203c63e23b054fb49bf88967
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:18.635: INFO: Created container "a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97"
STEP: start the busybox container
STEP: Start container for containerID: a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97
Jul 24 05:22:18.690: INFO: Started container "a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97"
STEP: Get container status for containerID: a205a954ec7fe5a07401df5cc1b372a9b179846d1a8470b93be3add92c0b1d97
[It] should support network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: bc53078f68186579ea9f5ad85bd5858b736560f1a5610b454f0003892775adad
Jul 24 05:22:18.690: INFO: the IP:port is http://10.42.0.122:80
STEP: check the content of http://10.42.0.122:80
Jul 24 05:22:18.691: INFO: check port mapping succeed
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 550a403ef1688b79024fb76189485720e75156e04b9c90eeace2dd39b3c2db43
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: a8b64e71f4fa111ea469ac85263bd94eebffaeb6b70dabab4236db02cd24e122
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
listImage should get exactly 3 repoTags in the result image [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 repoTags in the result image [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
STEP: Pull image : gcr.io/cri-tools/test-image-tags:1
STEP: Pull image : gcr.io/cri-tools/test-image-tags:2
STEP: Pull image : gcr.io/cri-tools/test-image-tags:3
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NoNewPrivs
should allow privilege escalation when false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should allow privilege escalation when false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
STEP: create container alpine-nnp-false-52a04d70-cda8-11ea-966e-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:22:21.366: INFO: Created container "a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3"
STEP: Start container for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3
Jul 24 05:22:21.434: INFO: Started container "a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3"
STEP: Get container status for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3
STEP: Get container status for containerID: a1417ac62addef83930e03929ac52f945a55e85e57eb7a076dd52fc9d702a8a3
STEP: check container output
STEP: verify log contents
Jul 24 05:22:25.436: INFO: Open log file /tmp/podLogTest069537638/PodSandbox-with-log-directory-5290b069-cda8-11ea-966e-5254001ff4e5/alpine-nnp-false-52a04d70-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:25.436: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container runtime should support log
runtime should support starting container with log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support starting container with log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:25.672: INFO: Created container "88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305"
STEP: start container with log
STEP: Start container for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305
Jul 24 05:22:25.720: INFO: Started container "88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305"
STEP: Get container status for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305
STEP: Get container status for containerID: 88bc79b6a8647afd38d3a72a50551a01d7c46c5178c7402561bba340f24c4305
STEP: check the log context
STEP: verify log contents
Jul 24 05:22:29.723: INFO: Open log file /tmp/podLogTest285670797/PodSandbox-with-log-directory-552dcb06-cda8-11ea-966e-5254001ff4e5/container-with-log-test-553e9830-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:29.723: INFO: Parse container log succeed
[AfterEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 7d3b5d22e1ed2c5edd2d5a9e8398b350e0c1c9dba6c1e512bf17bccecb4e24e2
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 0b77428d43a30d73186cb7f16f30aaae99c7893fa3872eff9f8d542e27f7bf05
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[k8s.io] Image Manager
listImage should get exactly 3 image in the result list [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 image in the result list [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Pull image : gcr.io/cri-tools/test-image-1:latest
STEP: Pull image : gcr.io/cri-tools/test-image-2:latest
STEP: Pull image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod
should support container exec
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:22:33.647: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:22:33.664: INFO: Created container "6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f"
STEP: start the httpd container
STEP: Start container for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f
Jul 24 05:22:33.715: INFO: Started container "6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f"
STEP: Get container status for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:33.738: INFO: Created container "a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20"
STEP: start the busybox container
STEP: Start container for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20
Jul 24 05:22:33.787: INFO: Started container "a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20"
STEP: Get container status for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20
[It] should support container exec
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
STEP: execSync for containerID: 6c3b200981a26a1b36a87a811506e156eaa490265164895caf07feb53fd68b3f
Jul 24 05:22:33.824: INFO: Execsync succeed
STEP: execSync for containerID: a67aaadc526da6dd21e2fef960e8f49bdacee4aa62400a71e57f9285b728fc20
Jul 24 05:22:33.848: INFO: Execsync succeed
[AfterEach] when running multiple containers in a pod
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support listing container stats [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support listing container stats [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:34.202: INFO: Created container "b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8"
STEP: start container
STEP: Start container for containerID: b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8
Jul 24 05:22:34.265: INFO: Started container "b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8"
STEP: test container stats
STEP: List container stats for containerID: b979f9496a5ffb80b0377f7cb8ac24f90f82183856b64e15ea7c115abc84e1c8
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should error on create with wrong options
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.235 seconds]
[k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:121
should error on create with wrong options [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
Expected an error to have occurred. Got:
<nil>: nil
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with selinux set
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 098e1e18c00b6a33b7b3559ceed93c523bc7566aaa911830af41c314312a7a1f
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support port mapping with only container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with only container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:22:35.131: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:22:35.145: INFO: Created container "838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65"
STEP: start the web server container
STEP: Start container for containerID: 838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65
Jul 24 05:22:35.196: INFO: Started container "838f36aea6526c84d57ef1de45c85ac1c60363f952d0b65af73a839659d2fc65"
STEP: check the port mapping with only container port
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: efa503dae99bd7d3a0bbd9d5975dc5de2c36dc8c14503cc2d768a3f0ffdc0617
Jul 24 05:22:35.197: INFO: the IP:port is http://10.42.0.133:80
STEP: check the content of http://10.42.0.133:80
Jul 24 05:22:36.201: INFO: check port mapping succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] PodSandbox runtime should support basic operations on PodSandbox
runtime should support removing PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support removing PodSandbox [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
STEP: run PodSandbox
STEP: stop PodSandbox
STEP: Stop PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3
Jul 24 05:22:36.630: INFO: Stopped PodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3"
STEP: test remove PodSandbox
STEP: Remove PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3
Jul 24 05:22:36.632: INFO: Removed PodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3"
STEP: List PodSandbox for podID: 608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3
STEP: List PodSandbox.
Jul 24 05:22:36.633: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
E0724 05:22:36.634266 185858 remote_runtime.go:128] StopPodSandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "608340f5209ca5e1c8cdeaed818c752600c3cd396d9e3a292cac6362143947e3": does not exist
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Image Manager
public image without tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image without tag should be pulled and removed [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
STEP: Remove image : gcr.io/cri-tools/test-image-latest
Jul 24 05:22:36.635: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-latest:latest
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
[AfterEach] [k8s.io] Image Manager
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support log
runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:37.812: INFO: Created container "d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463"
STEP: start container with log
STEP: Start container for containerID: d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463
Jul 24 05:22:37.856: INFO: Started container "d9e0f921b6db0115a9d59f30939a75e51d97c67b648e7df9c00e2938eaffa463"
Jul 24 05:22:37.856: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:37.856: INFO: Parse container log succeed
STEP: rename container log
STEP: reopen container log
Jul 24 05:22:37.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:37.857: INFO: Parse container log succeed
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:22:38.857: INFO: Parse container log succeed
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:38.857: INFO: Parse container log succeed
Jul 24 05:22:38.857: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:38.857: INFO: Parse container log succeed
Jul 24 05:22:39.858: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:39.858: INFO: Parse container log succeed
Jul 24 05:22:40.859: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:40.859: INFO: Parse container log succeed
Jul 24 05:22:41.859: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:41.859: INFO: Parse container log succeed
Jul 24 05:22:42.860: INFO: Open log file /tmp/podLogTest506544455/PodSandbox-with-log-directory-5c6c0216-cda8-11ea-966e-5254001ff4e5/container-reopen-log-test-5c7b0f57-cda8-11ea-966e-5254001ff4e5.log.new
Jul 24 05:22:42.860: INFO: Parse container log succeed
[AfterEach] runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:6.299 seconds]
[k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support reopening container log [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
------------------------------
[k8s.io] Security Context bucket
runtime should support Privileged is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:44.156: INFO: Created container "93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc"
STEP: start container
STEP: Start container for containerID: 93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc
Jul 24 05:22:44.208: INFO: Started container "93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc"
STEP: Get container status for containerID: 93d7c7aa617b74eacbf380663a490ddbf16d8d41cc17e993f967720b38992afc
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath docker/default
should support seccomp docker/default on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp docker/default on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:44.707: INFO: Created container "e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0"
STEP: start container
STEP: Start container for containerID: e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0
Jul 24 05:22:44.884: INFO: Started container "e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0"
STEP: Get container status for containerID: e70caece9d01bd438e2c9fafa81497269f333fbfa9c9eebfc6ec3e2ca95afef0
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
runtime should ignore a seccomp profile that blocks setting hostname when privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
STEP: create privileged pod
STEP: create Privileged podSandbox
STEP: create privileged container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests254268177/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:45.321: INFO: Created container "5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19"
STEP: Start container for containerID: 5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19
Jul 24 05:22:45.372: INFO: Started container "5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19"
STEP: Get container status for containerID: 5ebb6858a1b9248bacacea8502295bcbf947208d8b5c8dc3b7d8f1f67c0f5d19
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when multiple pod sandboxes are not privileged
should create containers with different process labels
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when multiple pod sandboxes are not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137
[It] should create containers with different process labels
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 8432664fb0ad86eefb9c821a87211866e244314ac6bf99352a8d16584048ecd0
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: ea2aad6b211420d82532f6493ce8bbc81a6f6d40b19b41391d20a7fc15776bfe
[AfterEach] when multiple pod sandboxes are not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:46.415: INFO: Created container "5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2"
STEP: start container
STEP: Start container for containerID: 5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2
Jul 24 05:22:46.458: INFO: Started container "5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2"
STEP: attach container: 5303b4a0428b8f75e5b67d6a33a4ac9e7f6c0f52892a172bf012b91ef7699ce2
Jul 24 05:22:46.459: INFO: Get attach url: http://127.0.0.1:10010/attach/Y3SBllPm
STEP: check the output of attach
Jul 24 05:22:46.459: INFO: Parse url "http://127.0.0.1:10010/attach/Y3SBllPm" succeed
Jul 24 05:22:51.494: INFO: Check attach url "http://127.0.0.1:10010/attach/Y3SBllPm" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:5.350 seconds]
[k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support attach [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have correct role and type
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 8bc6d90f9ee6913ed86a0da038f3ccf1628a1057b8c9d5433db24088e8cb1dcc
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should create containers with the same process label
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: b47ada662d95d58b0ce0addf8ebc8e08a4adbf9cd3ce6a3cef22828a45b6ddf6
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: c364d66183b29f69504263b0923a33c4fdb058a06817de5ac267dcf816f90a3f
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support removing running container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing running container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:52.673: INFO: Created container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56"
STEP: start container
STEP: Start container for containerID: 51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56
Jul 24 05:22:52.734: INFO: Started container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56"
STEP: test remove container
STEP: Remove container for containerID: 51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56
E0724 05:22:52.734391 185858 remote_runtime.go:261] RemoveContainer "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56" from runtime service failed: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first
Jul 24 05:22:52.734: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [0.453 seconds]
[k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68
runtime should support removing running container [Conformance] [It]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
failed to remove container: rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first
Unexpected error:
<*status.statusError | 0xc0000abea0>: {
Code: 2,
Message: "failed to set removing state for container \"51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56\": container is still running, to stop first",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to set removing state for container "51e4a9330864c2d9b0b4ad568ec417342c8e73ea9d9eeb501ccded48c6e2dd56": container is still running, to stop first
occurred
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399
------------------------------
[k8s.io] Security Context bucket
runtime should support Privileged is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:53.012: INFO: Created container "0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993"
STEP: start container
STEP: Start container for containerID: 0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993
Jul 24 05:22:53.078: INFO: Started container "0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993"
STEP: Get container status for containerID: 0fafd3f9e0bdfa140aacb577b3925aad0feb57f7005216686cfb4065cb4e1993
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUser
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUser container
STEP: create a container with RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:53.496: INFO: Created container "24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd"
STEP: start container
STEP: Start container for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd
Jul 24 05:22:53.562: INFO: Started container "24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd"
STEP: Get container status for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd
STEP: verify RunAsUser for container
STEP: verify execSync output
STEP: execSync for containerID: 24bab45c7aabcfd0e38b65da2ea1187b6178e4d1afad659d67435ccd1c00eedd
Jul 24 05:22:53.586: INFO: Execsync succeed
Jul 24 05:22:53.586: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] PodSandbox runtime should support sysctls
should support safe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support safe sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:53.847: INFO: Created container "121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d"
STEP: start container
STEP: Start container for containerID: 121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d
Jul 24 05:22:53.894: INFO: Started container "121524ed2e324dc97b07e9a3e387fa371b2e9b71699a226d24449d37d9b4be9d"
STEP: check sysctls kernel.shm_rmid_forced
[AfterEach] runtime should support sysctls
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Networking runtime should support networking
runtime should support port mapping with host port and container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with host port and container port [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
STEP: create a PodSandbox with host port and container port port mapping
STEP: create a web server container
Jul 24 05:22:54.225: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:22:54.240: INFO: Created container "3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20"
STEP: start the web server container
STEP: Start container for containerID: 3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20
Jul 24 05:22:54.290: INFO: Started container "3125269bb1fe2edf88e7526e6037e64df615b9a1377e13644fe8cc9b3c693a20"
STEP: check the port mapping with host port and container port
STEP: get the IP:port needed to be checked
Jul 24 05:22:54.290: INFO: the IP:port is http://127.0.0.1:12000
STEP: check the content of http://127.0.0.1:12000
Jul 24 05:22:55.293: INFO: check port mapping succeed
[AfterEach] runtime should support networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support ReadonlyPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ReadonlyPaths
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
STEP: create pod
STEP: create container with ReadonlyPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:55.689: INFO: Created container "0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a"
STEP: Start container for containerID: 0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a
Jul 24 05:22:55.740: INFO: Started container "0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a"
STEP: Get container status for containerID: 0ddd06d00bef50ed0503e49637814577c92e080bce5083d0f76911548fb5c50a
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context bucket
runtime should support that ReadOnlyRootfs is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is false
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_false
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:22:56.161: INFO: Created container "bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489"
STEP: start container
STEP: Start container for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489
Jul 24 05:22:56.219: INFO: Started container "bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489"
STEP: Get container status for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489
STEP: Get container status for containerID: bee09d441364634e50b828071d8b86ab9ab8d285165981d1df9ae3e1697e7489
STEP: Check whether rootfs is writable
STEP: verify log contents
Jul 24 05:23:00.241: INFO: Open log file /tmp/podLogTest083942716/PodSandbox-with-log-directory-6745adfb-cda8-11ea-966e-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-6769ccd6-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:23:00.241: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged
mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 6d9f6bb7726744f85bdf34284bdcbf2b5337242d0a0b8216d1f1deef64476ab6
[AfterEach] when single pod sandbox is privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged
mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have category
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: de19243bfdfe9df9174712562f150f91369b77325d949e56737e50de32156f97
[AfterEach] when single pod sandbox is not privileged
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NoNewPrivs
should not allow privilege escalation when true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should not allow privilege escalation when true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
STEP: create container alpine-nnp-true-6a768d0e-cda8-11ea-966e-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:23:01.276: INFO: Created container "dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9"
STEP: Start container for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9
Jul 24 05:23:01.326: INFO: Started container "dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9"
STEP: Get container status for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9
STEP: Get container status for containerID: dce5d576c8f659ef8b8c153613a88b20f2922d9d838dd2b433dc872883c2b3d9
STEP: check container output
STEP: verify log contents
Jul 24 05:23:05.327: INFO: Open log file /tmp/podLogTest261214571/PodSandbox-with-log-directory-6a639ade-cda8-11ea-966e-5254001ff4e5/alpine-nnp-true-6a768d0e-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:23:05.327: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Container Mount Propagation runtime should support mount propagation
mount with 'rslave' should support propagation from host to container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rslave' should support propagation from host to container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:05.670: INFO: Created container "b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2"
STEP: test start container with volume
STEP: Start container for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2
Jul 24 05:23:05.722: INFO: Started container "b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2"
STEP: Get container status for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2
Jul 24 05:23:05.749: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2
Jul 24 05:23:05.774: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: b7b201ea57d1fd0b94277d6e5c1022ba2b389cd85672d3117ac9b20240148bf2
Jul 24 05:23:05.802: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support adding volume and device
runtime should support starting container with volume when host path is a symlink [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume when host path is a symlink [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
STEP: create host path and flag file
STEP: create symlink
STEP: create volume container with symlink host path
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:06.164: INFO: Created container "8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60"
STEP: test start volume container with symlink host path
STEP: Start container for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60
Jul 24 05:23:06.229: INFO: Started container "8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60"
STEP: Get container status for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60
STEP: check whether 'symlink' contains file or dir in container
STEP: execSync for containerID: 8cda215175a956a8ce7606fbee3042c2ec768240c004a960687aa7e009d49c60
Jul 24 05:23:06.260: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support starting container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support starting container [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:06.677: INFO: Created container "ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c"
STEP: test start container
STEP: Start container for containerID: ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c
Jul 24 05:23:06.759: INFO: Started container "ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c"
STEP: Get container status for containerID: ed1df7a950585f2c0c73a62c0f457619c821912c3c769190976cee816cf26b7c
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
STEP: create podSandbox for security context HostPID
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:23:07.038: INFO: Created container "9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770"
STEP: start container
STEP: Start container for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770
Jul 24 05:23:07.098: INFO: Started container "9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770"
STEP: Get container status for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770
STEP: get nginx container pid
STEP: execSync for containerID: 9cd5ae7c21da040759b7611b6bf54a933b30b1e780120ef70918cfbad6ca8770
Jul 24 05:23:07.123: INFO: Execsync succeed
Jul 24 05:23:07.123: INFO: Nginx's pid is ""
STEP: create busybox container with hostPID
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:07.138: INFO: Created container "de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a"
STEP: start container
STEP: Start container for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a
Jul 24 05:23:07.195: INFO: Started container "de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a"
STEP: Get container status for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a
STEP: should show its pid in the hostPID namespace container
STEP: execSync for containerID: de723f3bee958605d2785894462e397844fe75ab81128ad2603e4c1d8029e34a
Jul 24 05:23:07.228: INFO: Execsync succeed
Jul 24 05:23:07.228: INFO: Got nginx's pid "201891 201842" from pod "nginx-container-6de58f0c-cda8-11ea-966e-5254001ff4e5"
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context SeccompProfilePath
should support seccomp default which is unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp default which is unconfined on the container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:07.571: INFO: Created container "1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104"
STEP: start container
STEP: Start container for containerID: 1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104
Jul 24 05:23:07.634: INFO: Started container "1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104"
STEP: Get container status for containerID: 1dea5581924949a9106d220aaf7446da1bf32f30fa5059b8033cea2e36ed7104
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Streaming runtime should support streaming interfaces
runtime should support portforward in host network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33
[It] runtime should support portforward in host network
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
STEP: create a PodSandbox with container port port mapping in host network
STEP: create a web server container
Jul 24 05:23:07.871: INFO: Use latest as default image tag.
STEP: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest
STEP: Create container.
Jul 24 05:23:07.886: INFO: Created container "cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9"
STEP: start the web server container
STEP: Start container for containerID: cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9
Jul 24 05:23:07.958: INFO: Started container "cb73cb1e485baa4234a351fa47dd841fa45cd7e16c4e583715393c8bace13dc9"
STEP: port forward PodSandbox: a1e754d433e0d5df05b964316ce3897871a84d8e69fe08eb7c3837c474ec4b36
Jul 24 05:23:07.959: INFO: Get port forward url: http://127.0.0.1:10010/portforward/pYZR1jVX
STEP: check the output of portforward
Jul 24 05:23:07.959: INFO: Parse url "http://127.0.0.1:10010/portforward/pYZR1jVX" succeed
STEP: check if we can get nginx main page via localhost:12002
STEP: get the IP:port needed to be checked
Jul 24 05:23:07.959: INFO: the IP:port is http://127.0.0.1:12002
STEP: check the content of http://127.0.0.1:12002
STEP: start port forward
Forwarding from 127.0.0.1:12002 -> 12003
Forwarding from [::1]:12002 -> 12003
Handling connection for 12002
Jul 24 05:23:08.975: INFO: check port mapping succeed
Jul 24 05:23:08.975: INFO: Check port forward url "http://127.0.0.1:10010/portforward/pYZR1jVX" succeed
[AfterEach] runtime should support streaming interfaces
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support HostNetwork is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is true
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
STEP: creating a podSandbox with hostNetwork true
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:09.172: INFO: Created container "f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149"
STEP: start container
STEP: Start container for containerID: f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149
Jul 24 05:23:09.226: INFO: Started container "f37ed7aa801e71411dd865b0636d803ed5625264bc77a5297a1c0022812da149"
STEP: checking host http service port in the container
Jul 24 05:23:09.226: INFO: Open log file /tmp/podLogTest087919055/NamespaceOption-PodSandbox-3d181b7c-cda8-11ea-966e-5254001ff4e5/container-with-HostNetwork-test-6f2ab87b-cda8-11ea-966e-5254001ff4e5.log
Jul 24 05:23:09.226: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[k8s.io] Container runtime should support basic operations on container
runtime should support execSync [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync [Conformance]
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:09.439: INFO: Created container "c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2"
STEP: start container
STEP: Start container for containerID: c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2
Jul 24 05:23:09.491: INFO: Started container "c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2"
STEP: test execSync
STEP: verify execSync output
STEP: execSync for containerID: c9c73e6e2d5b3927dbb07035061d3ba911b298b3e0cd9b978577869338be85f2
Jul 24 05:23:09.514: INFO: Execsync succeed
Jul 24 05:23:09.514: INFO: verify Execsync output succeed
[AfterEach] runtime should support basic operations on container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[k8s.io] Security Context bucket
runtime should support SupplementalGroups
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support SupplementalGroups
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
STEP: create pod
STEP: create container for security context SupplementalGroups
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:23:09.941: INFO: Created container "5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2"
STEP: start container
STEP: Start container for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2
Jul 24 05:23:10.004: INFO: Started container "5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2"
STEP: Get container status for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2
STEP: verify SupplementalGroups for container
STEP: execSync for containerID: 5f071aab18b0107a5886634cf3eee27eec29451897f98238aa39c52e059239c2
Jul 24 05:23:10.028: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[k8s.io] Security Context NamespaceOption
runtime should support ContainerPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ContainerPID
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
STEP: create podSandbox with PID set to container
Jul 24 05:23:10.173: INFO: Pid namespace is "CONTAINER"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:23:10.410: INFO: Created container "cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67"
STEP: start container
STEP: Start container for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67
Jul 24 05:23:10.484: INFO: Started container "cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67"
STEP: Get container status for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67
STEP: get nginx container pid
STEP: execSync for containerID: cbfe87d6e0fd26b3028d448fb832948aefd76ebbe9b320f1b6c04d349ee3ec67
Jul 24 05:23:10.514: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
Summarizing 3 Failures:
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged [It] should error on create with wrong options 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is privileged [It] should error on create with wrong options 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:175
[Fail] [k8s.io] Container runtime should support basic operations on container [It] runtime should support removing running container [Conformance] 
/usr/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:399
Ran 90 of 97 Specs in 85.521 seconds
FAIL! -- 87 Passed | 3 Failed | 0 Pending | 7 Skipped
--- FAIL: TestCRISuite (85.52s)
FAIL
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment