Created
July 27, 2020 16:51
-
-
Save dweomer/899a34a0873c6bd4087c04a744bf64be to your computer and use it in GitHub Desktop.
containerd-1.3.0-k3s-dev
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🇩 binaries | |
🇩 test-cri | |
/go/bin/critest | |
'/go/src/github.com/containerd/cri/hack/../_output/containerd' -> '/usr/local/bin/containerd-test' | |
changing security context of '/usr/local/bin/containerd-test' | |
make[1]: Entering directory '/go/src/github.com/containerd/cri/test/selinux/policy' | |
rm -fR tmp | |
rm -f *.pp | |
/usr/share/selinux/devel/include/services/container.if:13: Error: duplicate definition of container_runtime_domtrans(). Original definition on 13. | |
/usr/share/selinux/devel/include/services/container.if:40: Error: duplicate definition of container_runtime_run(). Original definition on 40. | |
/usr/share/selinux/devel/include/services/container.if:60: Error: duplicate definition of container_runtime_exec(). Original definition on 60. | |
/usr/share/selinux/devel/include/services/container.if:79: Error: duplicate definition of container_read_state(). Original definition on 79. | |
/usr/share/selinux/devel/include/services/container.if:97: Error: duplicate definition of container_search_lib(). Original definition on 97. | |
/usr/share/selinux/devel/include/services/container.if:116: Error: duplicate definition of container_exec_lib(). Original definition on 116. | |
/usr/share/selinux/devel/include/services/container.if:135: Error: duplicate definition of container_read_lib_files(). Original definition on 135. | |
/usr/share/selinux/devel/include/services/container.if:154: Error: duplicate definition of container_read_share_files(). Original definition on 154. | |
/usr/share/selinux/devel/include/services/container.if:175: Error: duplicate definition of container_runtime_read_tmpfs_files(). Original definition on 175. | |
/usr/share/selinux/devel/include/services/container.if:196: Error: duplicate definition of container_manage_share_files(). Original definition on 196. | |
/usr/share/selinux/devel/include/services/container.if:217: Error: duplicate definition of container_manage_share_dirs(). Original definition on 217. | |
/usr/share/selinux/devel/include/services/container.if:237: Error: duplicate definition of container_exec_share_files(). Original definition on 237. | |
/usr/share/selinux/devel/include/services/container.if:255: Error: duplicate definition of container_manage_config_files(). Original definition on 255. | |
/usr/share/selinux/devel/include/services/container.if:274: Error: duplicate definition of container_manage_lib_files(). Original definition on 274. | |
/usr/share/selinux/devel/include/services/container.if:294: Error: duplicate definition of container_manage_files(). Original definition on 294. | |
/usr/share/selinux/devel/include/services/container.if:313: Error: duplicate definition of container_manage_dirs(). Original definition on 313. | |
/usr/share/selinux/devel/include/services/container.if:331: Error: duplicate definition of container_manage_lib_dirs(). Original definition on 331. | |
/usr/share/selinux/devel/include/services/container.if:367: Error: duplicate definition of container_lib_filetrans(). Original definition on 367. | |
/usr/share/selinux/devel/include/services/container.if:385: Error: duplicate definition of container_read_pid_files(). Original definition on 385. | |
/usr/share/selinux/devel/include/services/container.if:404: Error: duplicate definition of container_systemctl(). Original definition on 404. | |
/usr/share/selinux/devel/include/services/container.if:429: Error: duplicate definition of container_rw_sem(). Original definition on 429. | |
/usr/share/selinux/devel/include/services/container.if:448: Error: duplicate definition of container_append_file(). Original definition on 448. | |
/usr/share/selinux/devel/include/services/container.if:466: Error: duplicate definition of container_use_ptys(). Original definition on 466. | |
/usr/share/selinux/devel/include/services/container.if:484: Error: duplicate definition of container_filetrans_named_content(). Original definition on 484. | |
/usr/share/selinux/devel/include/services/container.if:537: Error: duplicate definition of container_stream_connect(). Original definition on 543. | |
/usr/share/selinux/devel/include/services/container.if:558: Error: duplicate definition of container_spc_stream_connect(). Original definition on 564. | |
/usr/share/selinux/devel/include/services/container.if:579: Error: duplicate definition of container_admin(). Original definition on 585. | |
/usr/share/selinux/devel/include/services/container.if:626: Error: duplicate definition of container_auth_domtrans(). Original definition on 632. | |
/usr/share/selinux/devel/include/services/container.if:645: Error: duplicate definition of container_auth_exec(). Original definition on 651. | |
/usr/share/selinux/devel/include/services/container.if:664: Error: duplicate definition of container_auth_stream_connect(). Original definition on 670. | |
/usr/share/selinux/devel/include/services/container.if:683: Error: duplicate definition of container_runtime_typebounds(). Original definition on 689. | |
/usr/share/selinux/devel/include/services/container.if:702: Error: duplicate definition of container_runtime_entrypoint(). Original definition on 708. | |
/usr/share/selinux/devel/include/services/container.if:709: Error: duplicate definition of docker_exec_lib(). Original definition on 715. | |
/usr/share/selinux/devel/include/services/container.if:713: Error: duplicate definition of docker_read_share_files(). Original definition on 719. | |
/usr/share/selinux/devel/include/services/container.if:717: Error: duplicate definition of docker_exec_share_files(). Original definition on 723. | |
/usr/share/selinux/devel/include/services/container.if:721: Error: duplicate definition of docker_manage_lib_files(). Original definition on 727. | |
/usr/share/selinux/devel/include/services/container.if:726: Error: duplicate definition of docker_manage_lib_dirs(). Original definition on 732. | |
/usr/share/selinux/devel/include/services/container.if:730: Error: duplicate definition of docker_lib_filetrans(). Original definition on 736. | |
/usr/share/selinux/devel/include/services/container.if:734: Error: duplicate definition of docker_read_pid_files(). Original definition on 740. | |
/usr/share/selinux/devel/include/services/container.if:738: Error: duplicate definition of docker_systemctl(). Original definition on 744. | |
/usr/share/selinux/devel/include/services/container.if:742: Error: duplicate definition of docker_use_ptys(). Original definition on 748. | |
/usr/share/selinux/devel/include/services/container.if:746: Error: duplicate definition of docker_stream_connect(). Original definition on 752. | |
/usr/share/selinux/devel/include/services/container.if:750: Error: duplicate definition of docker_spc_stream_connect(). Original definition on 756. | |
/usr/share/selinux/devel/include/services/container.if:764: Error: duplicate definition of container_spc_read_state(). Original definition on 770. | |
/usr/share/selinux/devel/include/services/container.if:783: Error: duplicate definition of container_runtime_domain_template(). Original definition on 789. | |
/usr/share/selinux/devel/include/services/container.if:819: Error: duplicate definition of container_domain_template(). Original definition on 825. | |
/usr/share/selinux/devel/include/services/container.if:847: Error: duplicate definition of container_spc_rw_pipes(). Original definition on 853. | |
Compiling targeted containerd-test module | |
Creating targeted containerd-test.pp policy package | |
rm tmp/containerd-test.mod tmp/containerd-test.mod.fc | |
make[1]: Leaving directory '/go/src/github.com/containerd/cri/test/selinux/policy' | |
mkdir: created directory '/var/lib/containerd-test' | |
mkdir: created directory '/run/containerd-test' | |
Relabeled /var/lib/containerd-test from unconfined_u:object_r:var_lib_t:s0 to unconfined_u:object_r:container_var_lib_t:s0 | |
Relabeled /run/containerd-test from unconfined_u:object_r:var_run_t:s0 to unconfined_u:object_r:container_var_run_t:s0 | |
critest version: 1.18.0-89-gbaca4a1 | |
Running Suite: CRI validation | |
============================= | |
Random Seed: [1m123456789[0m - Will randomize all specs | |
Will run [1m97[0m specs | |
Running in parallel across [1m8[0m nodes | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return runtime conditions [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45 | |
[1mSTEP[0m: test runtime status | |
[AfterEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with digest should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:12.495 seconds][0m | |
[k8s.io] Image Manager | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
public image with digest should be pulled and removed [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with tag should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:12.813 seconds][0m | |
[k8s.io] Image Manager | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
public image with tag should be pulled and removed [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should return error if RunAsGroup is set without RunAsUser | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with invalid RunAsGroup | |
[1mSTEP[0m: create invalid RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsGroup without RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:01:41.691111 148476 remote_runtime.go:200] CreateContainer in sandbox "e3f5a670100e8307ff7343fb8ec53b9e6f144e35ff063b6bdef1256de3cb0b44" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:31.370 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should return error if RunAsGroup is set without RunAsUser | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing stopped container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.809: INFO: Created container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7 | |
Jul 24 05:01:42.034: INFO: Started container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7 | |
Jul 24 05:01:42.142: INFO: Stopped container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7" | |
[1mSTEP[0m: Get container status for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7 | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7 | |
Jul 24 05:01:42.149: INFO: Removed container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7" | |
[1mSTEP[0m: List containers for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:31.867 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support basic operations on container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68[0m | |
runtime should support removing stopped container [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests253375585/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.792: INFO: Created container "83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65" | |
[1mSTEP[0m: Start container for containerID: 83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65 | |
Jul 24 05:01:41.985: INFO: Started container "83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65" | |
[1mSTEP[0m: Get container status for containerID: 83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:31.933 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
SeccompProfilePath | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:542[0m | |
runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.843: INFO: Created container "2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca | |
Jul 24 05:01:42.046: INFO: Started container "2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:01:42.046: INFO: Open log file /tmp/podLogTest356303876/NamespaceOption-PodSandbox-5d3edeaf-cda5-11ea-be9e-5254001ff4e5/container-with-HostNetwork-test-65ae8ecc-cda5-11ea-be9e-5254001ff4e5.log | |
Jul 24 05:01:42.046: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:31.994 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
runtime should support HostNetwork is false | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with just selinux level set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f337b4c1bb0bf5ce9907943a265d37ac8a16eb47e7585ca2ca35d33ea252346a | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [32.003 seconds][0m | |
[k8s.io] SELinux | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is not privileged | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109[0m | |
[91m[1mshould work with just selinux level set [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50[0m | |
[91mcmd [touch foo], stdout "", stderr "touch: foo: Permission denied\n" | |
Unexpected error: | |
<exec.CodeExitError>: { | |
Err: { | |
s: "command 'touch foo' exited with 1: touch: foo: Permission denied\n", | |
}, | |
Code: 1, | |
} | |
command 'touch foo' exited with 1: touch: foo: Permission denied | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=false and stdin=false [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.858: INFO: Created container "5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046 | |
Jul 24 05:01:42.101: INFO: Started container "5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046" | |
[1mSTEP[0m: exec given command in container: 5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046 | |
Jul 24 05:01:42.105: INFO: Get exec url: http://127.0.0.1:35803/exec/D4yRA2Rt | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:01:42.110: INFO: Parse url "http://127.0.0.1:35803/exec/D4yRA2Rt" succeed | |
Jul 24 05:01:42.205: INFO: Check exec url "http://127.0.0.1:35803/exec/D4yRA2Rt" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:19.579 seconds][0m | |
[k8s.io] Streaming | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
runtime should support exec with tty=false and stdin=false [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync with timeout [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.761: INFO: Created container "492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb | |
Jul 24 05:01:41.866: INFO: Started container "492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb" | |
[1mSTEP[0m: test execSync with timeout | |
E0724 05:01:42.987845 148484 remote_runtime.go:351] ExecSync 492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded | |
[1mSTEP[0m: timeout exec process should be gone | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:32.570 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support basic operations on container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68[0m | |
runtime should support execSync with timeout [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support MaskedPaths | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with MaskedPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:43.979: INFO: Created container "00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e" | |
[1mSTEP[0m: Start container for containerID: 00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e | |
Jul 24 05:01:44.029: INFO: Started container "00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e" | |
[1mSTEP[0m: Get container status for containerID: 00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support unsafe sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:44.509: INFO: Created container "dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d | |
Jul 24 05:01:44.566: INFO: Started container "dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d" | |
[1mSTEP[0m: check sysctls fs.mqueue.msg_max | |
[AfterEach] runtime should support sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support stopping PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: test stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: 2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e | |
Jul 24 05:01:45.128: INFO: Stopped PodSandbox "2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e" | |
[1mSTEP[0m: Get PodSandbox status for podID: 2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIPC is true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:44.696: INFO: Created container "5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1 | |
Jul 24 05:01:44.819: INFO: Started container "5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1" | |
[1mSTEP[0m: Get container status for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1 | |
[1mSTEP[0m: check if the shared memory segment is included in the container | |
[1mSTEP[0m: execSync for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1 | |
Jul 24 05:01:44.887: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUserName | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUserName container | |
[1mSTEP[0m: create a container with RunAsUserName | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:44.889: INFO: Created container "883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace | |
Jul 24 05:01:44.975: INFO: Started container "883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace" | |
[1mSTEP[0m: Get container status for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace | |
[1mSTEP[0m: verify RunAsUserName for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace | |
Jul 24 05:01:45.027: INFO: Execsync succeed | |
Jul 24 05:01:45.027: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support stopping container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:45.352: INFO: Created container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3 | |
Jul 24 05:01:45.415: INFO: Started container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3 | |
Jul 24 05:01:45.450: INFO: Stopped container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3" | |
[1mSTEP[0m: Get container status for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status should support all kinds of references [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsGroup | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container for security context RunAsGroup | |
[1mSTEP[0m: create RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsUser and RunAsGroup | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Pull image : docker.io/library/busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:41.832: INFO: Created container "2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c | |
Jul 24 05:01:42.091: INFO: Started container "2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c" | |
[1mSTEP[0m: Get container status for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c | |
[1mSTEP[0m: Get container status for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c | |
[1mSTEP[0m: verify RunAsGroup for container | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:01:46.093: INFO: Open log file /tmp/podLogTest047319475/PodSandbox-with-log-directory-64e4d9a2-cda5-11ea-a2c4-5254001ff4e5/container-with-RunAsGroup-test-661b5a93-cda5-11ea-a2c4-5254001ff4e5.log | |
Jul 24 05:01:46.093: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:22.957 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should support RunAsGroup | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should create containers with the same process label | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: ccb4f592df4273324f2f1f014f15d1c1a5ff2f9f5d5687e8d328ac0f9b618f56 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 59b40ec6c2b5aa668e32f67bafe63797425b9e1f56f3affdae2f745b3a4f581f | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp unconfined on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:47.154: INFO: Created container "f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0 | |
Jul 24 05:01:47.217: INFO: Started container "f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0" | |
[1mSTEP[0m: Get container status for containerID: f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing created container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:47.628: INFO: Created container "4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109 | |
Jul 24 05:01:47.634: INFO: Removed container "4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109" | |
[1mSTEP[0m: List containers for containerID: 4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support creating container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83 | |
[1mSTEP[0m: test create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:47.843: INFO: Created container "61dce613c8975006694fd432d3ed2ca0f26a87eab966c694d20d5f6b78e12824" | |
[1mSTEP[0m: test list container | |
[1mSTEP[0m: List containers for containerID: 61dce613c8975006694fd432d3ed2ca0f26a87eab966c694d20d5f6b78e12824 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with just selinux level set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: dff55aa8521dac138b73f99f4ff578a699a2184ff31e36c579484e08dd2c2a67 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support DNS config [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54 | |
[1mSTEP[0m: create a PodSandbox with DNS config | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:48.832: INFO: Created container "586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c | |
Jul 24 05:01:48.934: INFO: Started container "586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c" | |
[1mSTEP[0m: check DNS config | |
[1mSTEP[0m: get the current dns config via execSync | |
Jul 24 05:01:49.004: INFO: check DNS config succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rshared' should support propagation from host to container and vice versa | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:48.832: INFO: Created container "7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4 | |
Jul 24 05:01:48.934: INFO: Started container "7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4" | |
[1mSTEP[0m: Get container status for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4 | |
Jul 24 05:01:48.992: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4 | |
Jul 24 05:01:49.040: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4 | |
Jul 24 05:01:49.075: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should error on create with wrong options | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:01:50.117496 148433 remote_runtime.go:200] CreateContainer in sandbox "2ef11485c268a09f7ca35fc3905d27ba050bc719988760fd7ecb8a16838fd2ce" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "934e1013af04282a6adc9c4bb481b9b68812de235ae2d337669febee4eed5f99" spec: the format of 'level' "s0,c4,c5" is not correct | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=true and stdin=true [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:50.281: INFO: Created container "6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe | |
Jul 24 05:01:50.455: INFO: Started container "6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe" | |
[1mSTEP[0m: exec given command in container: 6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe | |
Jul 24 05:01:50.455: INFO: Get exec url: http://127.0.0.1:35803/exec/JT-ACn6e | |
[1mSTEP[0m: check the output of exec | |
Jul 24 05:01:50.456: INFO: Parse url "http://127.0.0.1:35803/exec/JT-ACn6e" succeed | |
Jul 24 05:01:50.564: INFO: Check exec url "http://127.0.0.1:35803/exec/JT-ACn6e" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rprivate' should not support propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:50.294: INFO: Created container "85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c | |
Jul 24 05:01:50.481: INFO: Started container "85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c" | |
[1mSTEP[0m: Get container status for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c | |
Jul 24 05:01:50.601: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c | |
Jul 24 05:01:50.664: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c | |
Jul 24 05:01:50.716: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support running PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51 | |
[1mSTEP[0m: test run a default PodSandbox | |
[1mSTEP[0m: Get PodSandbox status for podID: 2be641bb12309355b82e0cbfe8b5eff5d1350437c241ae55e2ae3f5f72f13a73 | |
[1mSTEP[0m: test list PodSandbox | |
[1mSTEP[0m: List PodSandbox for podID: 2be641bb12309355b82e0cbfe8b5eff5d1350437c241ae55e2ae3f5f72f13a73 | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:01:51.786: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support PodPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194 | |
[1mSTEP[0m: create podSandbox for sharing process namespace | |
Jul 24 05:01:46.383: INFO: Pid namespace is "POD" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Pull image : docker.io/library/nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:51.631: INFO: Created container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849 | |
Jul 24 05:01:51.719: INFO: Started container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849" | |
[1mSTEP[0m: Get container status for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849 | |
E0724 05:01:52.722130 148434 remote_runtime.go:351] ExecSync 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849 'cat /proc/1/cmdline' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
Jul 24 05:01:52.722: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [6.522 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support PodPID [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194[0m | |
[91mfailed to execSync in container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849" | |
Unexpected error: | |
<*status.statusError | 0xc00051da90>: { | |
Code: 2, | |
Message: "failed to exec in container: container is in CONTAINER_EXITED state", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support setting Capability | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with security context Capability and test | |
[1mSTEP[0m: create Capability container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:52.766: INFO: Created container "33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084" | |
[1mSTEP[0m: Start container for containerID: 33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084 | |
Jul 24 05:01:52.837: INFO: Started container "33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084" | |
[1mSTEP[0m: Get container status for containerID: 33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084 | |
[1mSTEP[0m: create container without security context Capability and test | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:52.886: INFO: Created container "be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76" | |
[1mSTEP[0m: Start container for containerID: be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76 | |
Jul 24 05:01:52.953: INFO: Started container "be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76" | |
[1mSTEP[0m: Get container status for containerID: be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:53.098: INFO: Created container "584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd | |
Jul 24 05:01:53.171: INFO: Started container "584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd" | |
[1mSTEP[0m: Get container status for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd | |
[1mSTEP[0m: check whether 'hostPath' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd | |
Jul 24 05:01:53.204: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIpc is false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:53.406: INFO: Created container "5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee | |
Jul 24 05:01:53.479: INFO: Started container "5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee" | |
[1mSTEP[0m: Get container status for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee | |
[1mSTEP[0m: check if the shared memory segment is not included in the container | |
[1mSTEP[0m: execSync for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee | |
Jul 24 05:01:53.536: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with selinux set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: cdb7feaac9f1340e565256ef0e5a7b2d8e55021ba29947740e7064d3a1dcd7a6 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [2.474 seconds][0m | |
[k8s.io] SELinux | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support selinux | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45[0m | |
when single pod sandbox is not privileged | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109[0m | |
[91m[1mshould work with selinux set [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58[0m | |
[91mcmd [touch foo], stdout "", stderr "touch: foo: Permission denied\n" | |
Unexpected error: | |
<exec.CodeExitError>: { | |
Err: { | |
s: "command 'touch foo' exited with 1: touch: foo: Permission denied\n", | |
}, | |
Code: 1, | |
} | |
command 'touch foo' exited with 1: touch: foo: Permission denied | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_true | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:50.249: INFO: Created container "e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066 | |
Jul 24 05:01:50.568: INFO: Started container "e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066" | |
[1mSTEP[0m: Get container status for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066 | |
[1mSTEP[0m: Get container status for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066 | |
[1mSTEP[0m: Check whether rootfs is read-only | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:01:54.572: INFO: Open log file /tmp/podLogTest078226481/PodSandbox-with-log-directory-73a24db7-cda5-11ea-9a18-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-74dd9e75-cda5-11ea-9a18-5254001ff4e5.log | |
Jul 24 05:01:54.572: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:6.791 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should support that ReadOnlyRootfs is true | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402[0m | |
[90m------------------------------[0m | |
[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 74de3f108125f614ef7601e51e732f45716fe2cbf62f62f3c569806802e2d77a | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create unconfined Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:55.299: INFO: Created container "4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871" | |
[1mSTEP[0m: Start container for containerID: 4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871 | |
Jul 24 05:01:55.419: INFO: Started container "4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871" | |
[1mSTEP[0m: Get container status for containerID: 4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return version info [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41 | |
Jul 24 05:01:55.916: INFO: Get version info succeed | |
[AfterEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support set hostname [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70 | |
[1mSTEP[0m: create a PodSandbox with hostname | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:55.541: INFO: Created container "a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729 | |
Jul 24 05:01:55.732: INFO: Started container "a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729" | |
[1mSTEP[0m: check hostname | |
[1mSTEP[0m: get the current hostname via execSync | |
Jul 24 05:01:55.829: INFO: check hostname succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create /tmp/seccomp-tests669110237/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:01:56.279597 148476 remote_runtime.go:200] CreateContainer in sandbox "4cb48570f6d67d01d883b5193daf69ac3cc7f337561c0dca4ddba21f94deca0c" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests669110237/block-host-name.json" | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:55.698: INFO: Created container "8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491" | |
[1mSTEP[0m: Start container for containerID: 8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491 | |
Jul 24 05:01:56.050: INFO: Started container "8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491" | |
[1mSTEP[0m: Get container status for containerID: 8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp localhost/profile on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:57.712: INFO: Created container "1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc | |
Jul 24 05:01:57.781: INFO: Started container "1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc" | |
[1mSTEP[0m: Get container status for containerID: 1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status get image fields should not have Uid|Username empty [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84 | |
Jul 24 05:01:54.946: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid | |
Jul 24 05:01:55.881: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username | |
Jul 24 05:01:56.589: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group | |
Jul 24 05:01:57.392: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid-group | |
[1mSTEP[0m: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username | |
[1mSTEP[0m: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid | |
[1mSTEP[0m: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:57.505: INFO: Created container "26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14" | |
[1mSTEP[0m: Start container for containerID: 26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14 | |
Jul 24 05:01:57.716: INFO: Started container "26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14" | |
[1mSTEP[0m: Get container status for containerID: 26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 8bc38916956dc4c2a7f819dde47630f06f8c35dd0c6d682195bfa8289b8dc117 | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 464a81762ba11334f563ae40ed4a0393be40236f795a333e30f33349bca4ee7e | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 repoTags in the result image [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 44d96927da87bfa04f98e44ed8d797f0ba7420a5f60876fdc268903ecdcdbb45 | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f25678a2591af9c214070b1556abc3def468d0b9297e83f60eb18182bb87ff7b | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 image in the result list [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support listing container stats [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:02.624: INFO: Created container "a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee | |
Jul 24 05:02:02.689: INFO: Started container "a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee" | |
[1mSTEP[0m: test container stats | |
[1mSTEP[0m: List container stats for containerID: a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:02:02.594: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:02.617: INFO: Created container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b | |
Jul 24 05:02:02.716: INFO: Started container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b" | |
[1mSTEP[0m: Get container status for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:02.730: INFO: Created container "ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1 | |
Jul 24 05:02:02.815: INFO: Started container "ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1" | |
[1mSTEP[0m: Get container status for containerID: ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1 | |
[It] should support container exec | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103 | |
[1mSTEP[0m: execSync for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b | |
E0724 05:02:02.815910 148450 remote_runtime.go:351] ExecSync 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b 'echo httpd' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
Jul 24 05:02:02.815: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [2.294 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support container exec [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103[0m | |
[91mfailed to execSync in container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b" | |
Unexpected error: | |
<*status.statusError | 0xc00022e410>: { | |
Code: 2, | |
Message: "failed to exec in container: container is in CONTAINER_EXITED state", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should error on create with wrong options | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 05:02:04.033861 148434 remote_runtime.go:200] CreateContainer in sandbox "5306aa816f706ee12b1bd7ffdd310da8f7ae6c4bfc6bf4a1d5d7dcf4c3cd6e05" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "84d211c9592b24a26d6a3ef204a48f63e40447d5d2366eb4341f9f1e5518c073" spec: the format of 'level' "s0,c4,c5" is not correct | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support starting container with log [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:00.564: INFO: Created container "69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb | |
Jul 24 05:02:00.688: INFO: Started container "69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb" | |
[1mSTEP[0m: Get container status for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb | |
[1mSTEP[0m: Get container status for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb | |
[1mSTEP[0m: check the log context | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:02:04.692: INFO: Open log file /tmp/podLogTest329027389/PodSandbox-with-log-directory-79a9c1d6-cda5-11ea-b6c2-5254001ff4e5/container-with-log-test-7b05ae85-cda5-11ea-b6c2-5254001ff4e5.log | |
Jul 24 05:02:04.692: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:6.604 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support starting container with log [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with selinux set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 36a9e6782cdf4258a7b675efbeedd5e4e24d759dd472574e27f4034615d1e055 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image without tag should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
Jul 24 05:02:04.874: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-latest:latest | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should allow privilege escalation when false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761 | |
[1mSTEP[0m: create container alpine-nnp-false-7af5db26-cda5-11ea-9a18-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Pull image : gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:01.766: INFO: Created container "55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea" | |
[1mSTEP[0m: Start container for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea | |
Jul 24 05:02:01.829: INFO: Started container "55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea" | |
[1mSTEP[0m: Get container status for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea | |
[1mSTEP[0m: Get container status for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:02:05.830: INFO: Open log file /tmp/podLogTest673013749/PodSandbox-with-log-directory-79a68c33-cda5-11ea-9a18-5254001ff4e5/alpine-nnp-false-7af5db26-cda5-11ea-9a18-5254001ff4e5.log | |
Jul 24 05:02:05.830: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:7.803 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NoNewPrivs | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725[0m | |
should allow privilege escalation when false | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support removing PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea | |
Jul 24 05:02:06.369: INFO: Stopped PodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea" | |
[1mSTEP[0m: test remove PodSandbox | |
[1mSTEP[0m: Remove PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea | |
Jul 24 05:02:06.378: INFO: Removed PodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea" | |
[1mSTEP[0m: List PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 05:02:06.378: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 05:02:06.379184 148434 remote_runtime.go:128] StopPodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea": does not exist | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:07.744: INFO: Created container "35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5 | |
Jul 24 05:02:07.812: INFO: Started container "35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5" | |
[1mSTEP[0m: Get container status for containerID: 35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp docker/default on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:08.044: INFO: Created container "9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5 | |
Jul 24 05:02:08.233: INFO: Started container "9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5" | |
[1mSTEP[0m: Get container status for containerID: 9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665 | |
[1mSTEP[0m: create privileged pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create privileged container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests550062367/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:08.430: INFO: Created container "5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b" | |
[1mSTEP[0m: Start container for containerID: 5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b | |
Jul 24 05:02:08.496: INFO: Started container "5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b" | |
[1mSTEP[0m: Get container status for containerID: 5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f71ba897bd6882efce4c7e3eec30af1e366f50151f7e8802535bef30184d80fb | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when multiple pod sandboxes are not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137 | |
[It] should create containers with different process labels | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: a71d682b7da785bab0fd45f1ad9471a3421e23841d1efc2c7676629a8e91ea75 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: eaeab879d380a5a9b46eb2759d2d36a77577a211db21b9e7a3abd9a4cdd883b3 | |
[AfterEach] when multiple pod sandboxes are not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should create containers with the same process label | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 034346d7446ab1f9d3e0ba340e86aae337c505d6ed83c8c6b7e505551bd82890 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 286bf91221be4246202f87e27bd2b74e6947a336fe475f16be5ed7b43c3cd9af | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support reopening container log [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:07.214: INFO: Created container "cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f | |
Jul 24 05:02:07.270: INFO: Started container "cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f" | |
Jul 24 05:02:07.270: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log | |
Jul 24 05:02:07.270: INFO: Parse container log succeed | |
[1mSTEP[0m: rename container log | |
[1mSTEP[0m: reopen container log | |
Jul 24 05:02:07.271: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log | |
Jul 24 05:02:07.271: INFO: Parse container log succeed | |
Jul 24 05:02:08.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log | |
Jul 24 05:02:08.287: INFO: Parse container log succeed | |
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log | |
Jul 24 05:02:09.287: INFO: Parse container log succeed | |
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:09.287: INFO: Parse container log succeed | |
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:09.287: INFO: Parse container log succeed | |
Jul 24 05:02:10.426: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:10.427: INFO: Parse container log succeed | |
Jul 24 05:02:11.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:11.428: INFO: Parse container log succeed | |
Jul 24 05:02:12.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:12.428: INFO: Parse container log succeed | |
Jul 24 05:02:13.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new | |
Jul 24 05:02:13.428: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:9.393 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support reopening container log [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing running container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:14.462: INFO: Created container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22 | |
Jul 24 05:02:14.519: INFO: Started container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22 | |
Jul 24 05:02:14.571: INFO: Removed container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22" | |
[1mSTEP[0m: List containers for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support attach [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:10.573: INFO: Created container "7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708 | |
Jul 24 05:02:10.629: INFO: Started container "7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708" | |
[1mSTEP[0m: attach container: 7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708 | |
Jul 24 05:02:10.629: INFO: Get attach url: http://127.0.0.1:35803/attach/UELW_58i | |
[1mSTEP[0m: check the output of attach | |
Jul 24 05:02:10.629: INFO: Parse url "http://127.0.0.1:35803/attach/UELW_58i" succeed | |
Jul 24 05:02:15.647: INFO: Check attach url "http://127.0.0.1:35803/attach/UELW_58i" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:7.178 seconds][0m | |
[k8s.io] Streaming | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
runtime should support attach [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:15.923: INFO: Created container "349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8 | |
Jul 24 05:02:15.971: INFO: Started container "349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8" | |
[1mSTEP[0m: Get container status for containerID: 349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUser | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUser container | |
[1mSTEP[0m: create a container with RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:16.404: INFO: Created container "0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51 | |
Jul 24 05:02:16.486: INFO: Started container "0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51" | |
[1mSTEP[0m: Get container status for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51 | |
[1mSTEP[0m: verify RunAsUser for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51 | |
Jul 24 05:02:16.519: INFO: Execsync succeed | |
Jul 24 05:02:16.519: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support safe sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:16.520: INFO: Created container "109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681 | |
Jul 24 05:02:16.592: INFO: Started container "109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681" | |
[1mSTEP[0m: check sysctls kernel.shm_rmid_forced | |
[AfterEach] runtime should support sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ReadonlyPaths | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with ReadonlyPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:18.414: INFO: Created container "b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b" | |
[1mSTEP[0m: Start container for containerID: b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b | |
Jul 24 05:02:18.470: INFO: Started container "b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b" | |
[1mSTEP[0m: Get container status for containerID: b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 08b4406898621b79ba8cdc1a1e011f096c6bcab8a0564c2e2e4b084668d41921 | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 20102c0168ac893bafed0af17d28b192031beaf0421d2b4f66edb1840a67b91f | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_false | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:18.959: INFO: Created container "c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9 | |
Jul 24 05:02:19.021: INFO: Started container "c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9" | |
[1mSTEP[0m: Get container status for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9 | |
[1mSTEP[0m: Get container status for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9 | |
[1mSTEP[0m: Check whether rootfs is writable | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:02:23.022: INFO: Open log file /tmp/podLogTest754358848/PodSandbox-with-log-directory-84b020fb-cda5-11ea-b954-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-85fc4c22-cda5-11ea-b954-5254001ff4e5.log | |
Jul 24 05:02:23.022: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [6.417 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
[91m[1mruntime should support that ReadOnlyRootfs is false [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384[0m | |
[91mexpected log "Found\n" (stream="stdout") not found in logs [{timestamp:{wall:18349520 ext:63731188939 loc:0x1b40960} stream:stderr log:touch: test.go: Permission denied | |
}] | |
Expected | |
<bool>: false | |
to be true[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:594 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rslave' should support propagation from host to container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:23.283: INFO: Created container "ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad | |
Jul 24 05:02:23.362: INFO: Started container "ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad" | |
[1mSTEP[0m: Get container status for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad | |
Jul 24 05:02:23.390: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad | |
Jul 24 05:02:23.413: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad | |
Jul 24 05:02:23.437: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should not allow privilege escalation when true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755 | |
[1mSTEP[0m: create container alpine-nnp-true-870da5aa-cda5-11ea-b6c2-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:20.761: INFO: Created container "4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776" | |
[1mSTEP[0m: Start container for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776 | |
Jul 24 05:02:20.826: INFO: Started container "4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776" | |
[1mSTEP[0m: Get container status for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776 | |
[1mSTEP[0m: Get container status for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776 | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 05:02:24.829: INFO: Open log file /tmp/podLogTest647293573/PodSandbox-with-log-directory-8620015d-cda5-11ea-b6c2-5254001ff4e5/alpine-nnp-true-870da5aa-cda5-11ea-b6c2-5254001ff4e5.log | |
Jul 24 05:02:24.829: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:5.851 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NoNewPrivs | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725[0m | |
should not allow privilege escalation when true | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume when host path is a symlink [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create symlink | |
[1mSTEP[0m: create volume container with symlink host path | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:24.817: INFO: Created container "33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8" | |
[1mSTEP[0m: test start volume container with symlink host path | |
[1mSTEP[0m: Start container for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8 | |
Jul 24 05:02:24.876: INFO: Started container "33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8" | |
[1mSTEP[0m: Get container status for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8 | |
[1mSTEP[0m: check whether 'symlink' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8 | |
Jul 24 05:02:24.908: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support starting container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:25.304: INFO: Created container "6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5" | |
[1mSTEP[0m: test start container | |
[1mSTEP[0m: Start container for containerID: 6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5 | |
Jul 24 05:02:25.354: INFO: Started container "6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5" | |
[1mSTEP[0m: Get container status for containerID: 6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76 | |
[1mSTEP[0m: create podSandbox for security context HostPID | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:27.061: INFO: Created container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2 | |
Jul 24 05:02:27.155: INFO: Started container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2" | |
[1mSTEP[0m: Get container status for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2 | |
Jul 24 05:02:27.263: INFO: Unexpected error occurred: command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 05:02:27.311789 148433 remote_runtime.go:128] StopPodSandbox "8ce6213885ef2d9bc5c6dfbeda62e22b7a0160a77ce6c05bd4e0b062650996c9" from runtime service failed: rpc error: code = Unknown desc = failed to stop container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2": failed to kill container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2": ttrpc: closed: unknown | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [2.577 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support HostPID [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76[0m | |
[91mfailed to execSync in container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2" | |
Unexpected error: | |
<exec.CodeExitError>: { | |
Err: { | |
s: "command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: ", | |
}, | |
Code: 137, | |
} | |
command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp default which is unconfined on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:27.386: INFO: Created container "700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7 | |
Jul 24 05:02:27.478: INFO: Started container "700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7" | |
[1mSTEP[0m: Get container status for containerID: 700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:27.777: INFO: Created container "6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa | |
Jul 24 05:02:27.871: INFO: Started container "6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 05:02:27.871: INFO: Open log file /tmp/podLogTest801065554/NamespaceOption-PodSandbox-5d3b9a3d-cda5-11ea-b6c2-5254001ff4e5/container-with-HostNetwork-test-8b388b2d-cda5-11ea-b6c2-5254001ff4e5.log | |
Jul 24 05:02:27.872: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:29.934: INFO: Created container "14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f | |
Jul 24 05:02:30.015: INFO: Started container "14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f" | |
[1mSTEP[0m: test execSync | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f | |
Jul 24 05:02:30.044: INFO: Execsync succeed | |
Jul 24 05:02:30.044: INFO: verify Execsync output succeed | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support SupplementalGroups | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context SupplementalGroups | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:29.937: INFO: Created container "bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757 | |
Jul 24 05:02:30.009: INFO: Started container "bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757" | |
[1mSTEP[0m: Get container status for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757 | |
[1mSTEP[0m: verify SupplementalGroups for container | |
[1mSTEP[0m: execSync for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757 | |
Jul 24 05:02:30.052: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ContainerPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220 | |
[1mSTEP[0m: create podSandbox with PID set to container | |
Jul 24 05:02:30.260: INFO: Pid namespace is "CONTAINER" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:32.425: INFO: Created container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09 | |
Jul 24 05:02:32.482: INFO: Started container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09" | |
[1mSTEP[0m: Get container status for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09 | |
E0724 05:02:32.533546 148476 remote_runtime.go:351] ExecSync 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09 'sh -c while ! cat /proc/1/cmdline | grep "master process"; do sleep 1; done' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
Jul 24 05:02:32.533: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[91m[1m• Failure [2.436 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NamespaceOption | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73[0m | |
[91m[1mruntime should support ContainerPID [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220[0m | |
[91mfailed to execSync in container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09" | |
Unexpected error: | |
<*status.statusError | 0xc0003f0870>: { | |
Code: 2, | |
Message: "failed to exec in container: failed to start exec \"70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3\": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused \"process_linux.go:101: executing setns process caused \\\"exit status 1\\\"\": unknown", | |
Details: nil, | |
XXX_NoUnkeyedLiteral: {}, | |
XXX_unrecognized: nil, | |
XXX_sizecache: 0, | |
} | |
rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown | |
occurred[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support portforward [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:01:44.541: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Pull image : docker.io/library/nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:49.889: INFO: Created container "dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06 | |
Jul 24 05:01:49.966: INFO: Started container "dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06" | |
[1mSTEP[0m: port forward PodSandbox: eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266 | |
Jul 24 05:01:49.966: INFO: Get port forward url: http://127.0.0.1:35803/portforward/HuXU_jeX | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:01:49.967: INFO: Parse url "http://127.0.0.1:35803/portforward/HuXU_jeX" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12001 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:01:49.967: INFO: the IP:port is http://127.0.0.1:12001 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12001 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12001 -> 80 | |
Forwarding from [::1]:12001 -> 80 | |
Handling connection for 12001 | |
E0724 05:01:50.980847 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:50 socat[154192] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:51.986569 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:51 socat[154526] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:52.991003 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:52 socat[154830] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:54.036579 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:54 socat[155508] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:55.045791 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:55 socat[155786] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:56.051454 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:56 socat[156515] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:57.060090 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:57 socat[156843] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:58.069708 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:58 socat[157300] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:01:59.075140 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:59 socat[157899] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:00.078951 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:00 socat[157905] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:01.084073 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:01 socat[158513] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:02.088374 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:02 socat[158617] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:03.098095 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:03 socat[159121] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:04.102882 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:04 socat[159221] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:05.109226 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:05 socat[159667] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:06.114385 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:06 socat[159840] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:07.118985 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:07 socat[160004] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:08.127182 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:08 socat[160375] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:09.135212 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:09 socat[160765] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:10.140972 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:10 socat[160790] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:11.144809 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:11 socat[161130] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:12.152218 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:12 socat[161445] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:13.162304 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:13 socat[161558] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:14.176060 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:14 socat[161861] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:15.187285 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:15 socat[162185] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:16.197096 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:16 socat[162504] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:17.205357 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:17 socat[162975] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:18.218033 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:18 socat[163145] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:19.223911 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:19 socat[163719] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:20.231453 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:20 socat[163720] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:21.238777 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:21 socat[164061] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:22.246589 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:22 socat[164062] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:23.251116 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:23 socat[164203] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:24.260409 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:24 socat[164409] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:25.264017 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:25 socat[164774] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:26.274968 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:26 socat[164955] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:27.282574 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:27 socat[165124] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:28.287016 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:28 socat[165538] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:29.292022 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:29 socat[165552] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:30.297510 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:30 socat[166040] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:31.306843 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:31 socat[166042] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:32.311764 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:32 socat[166060] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:33.320090 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:33 socat[166252] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:34.327194 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:34 socat[166254] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:35.333898 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:35 socat[166256] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:36.345335 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:36 socat[166258] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:37.352923 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:37 socat[166260] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:38.363988 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:38 socat[166263] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:39.380991 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:39 socat[166266] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:40.390709 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:40 socat[166269] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:41.432205 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:41 socat[166273] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:42.448125 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:42 socat[166275] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:43.480257 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:43 socat[166278] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:44.527732 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:44 socat[166281] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:45.566063 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:45 socat[166284] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:46.577360 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:46 socat[166287] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:47.587660 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:47 socat[166290] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:48.595874 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:48 socat[166293] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
Handling connection for 12001 | |
E0724 05:02:49.621688 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:49 socat[166296] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n" | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [67.565 seconds][0m | |
[k8s.io] Streaming | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
[91m[1mruntime should support portforward [Conformance] [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124[0m | |
[91mTimed out after 60.028s. | |
Expected | |
<*url.Error | 0xc0004abc80>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12001", | |
Err: {s: "EOF"}, | |
} | |
to be nil[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:01:51.689: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Pull image : docker.io/library/httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:55.610: INFO: Created container "6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c | |
Jul 24 05:01:55.762: INFO: Started container "6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c" | |
[1mSTEP[0m: Get container status for containerID: 6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:55.801: INFO: Created container "9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede | |
Jul 24 05:01:55.969: INFO: Started container "9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede" | |
[1mSTEP[0m: Get container status for containerID: 9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede | |
[It] should support container log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82 | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [66.615 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support container log [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82[0m | |
[91mTimed out after 60.001s. | |
Expected | |
<bool>: false | |
to be true[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 05:01:57.786: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:57.834: INFO: Created container "0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89 | |
Jul 24 05:01:57.933: INFO: Started container "0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89" | |
[1mSTEP[0m: Get container status for containerID: 0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 05:01:57.983: INFO: Created container "623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82 | |
Jul 24 05:01:58.061: INFO: Started container "623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82" | |
[1mSTEP[0m: Get container status for containerID: 623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82 | |
[It] should support network | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: 5ee6b91f395f40620eb63630985c49eb8ea891aea7ba223f4d3f25dbe985d813 | |
Jul 24 05:01:58.064: INFO: the IP:port is http://10.88.1.106:80 | |
[1mSTEP[0m: check the content of http://10.88.1.106:80 | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [62.048 seconds][0m | |
[k8s.io] Multiple Containers [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
when running multiple containers in a pod | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50[0m | |
[91m[1mshould support network [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78[0m | |
[91mTimed out after 60.000s. | |
Expected | |
<*url.Error | 0xc0001a6180>: { | |
Op: "Get", | |
URL: "http://10.88.1.106:80", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 88, 1, 106], | |
Port: 80, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with only container port [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:02:04.597: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:04.625: INFO: Created container "eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6 | |
Jul 24 05:02:04.684: INFO: Started container "eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6" | |
[1mSTEP[0m: check the port mapping with only container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: 910089ec358bf3a5c107554a745b21cf780a4860264111df9947f33f2715fb27 | |
Jul 24 05:02:04.685: INFO: the IP:port is http://10.88.1.117:80 | |
[1mSTEP[0m: check the content of http://10.88.1.117:80 | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [61.796 seconds][0m | |
[k8s.io] Networking | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support networking | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44[0m | |
[91m[1mruntime should support port mapping with only container port [Conformance] [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86[0m | |
[91mTimed out after 60.001s. | |
Expected | |
<*url.Error | 0xc000466f60>: { | |
Op: "Get", | |
URL: "http://10.88.1.117:80", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 88, 1, 117], | |
Port: 80, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with host port and container port [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106 | |
[1mSTEP[0m: create a PodSandbox with host port and container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:02:17.688: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:17.703: INFO: Created container "29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f | |
Jul 24 05:02:17.753: INFO: Started container "29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f" | |
[1mSTEP[0m: check the port mapping with host port and container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:02:17.753: INFO: the IP:port is http://127.0.0.1:12000 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12000 | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [62.179 seconds][0m | |
[k8s.io] Networking | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support networking | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44[0m | |
[91m[1mruntime should support port mapping with host port and container port [Conformance] [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106[0m | |
[91mTimed out after 60.003s. | |
Expected | |
<*url.Error | 0xc0002a5830>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12000", | |
Err: { | |
Op: "dial", | |
Net: "tcp", | |
Source: nil, | |
Addr: { | |
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 127, 0, 0, 1], | |
Port: 12000, | |
Zone: "", | |
}, | |
Err: {Syscall: "connect", Err: 0x6f}, | |
}, | |
} | |
to be nil[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33 | |
[It] runtime should support portforward in host network | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping in host network | |
[1mSTEP[0m: create a web server container | |
Jul 24 05:02:25.676: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/hostnet-nginx-amd64:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 05:02:29.538: INFO: Created container "bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075 | |
Jul 24 05:02:29.598: INFO: Started container "bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075" | |
[1mSTEP[0m: port forward PodSandbox: 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433 | |
Jul 24 05:02:29.598: INFO: Get port forward url: http://127.0.0.1:35803/portforward/2RjZV8Cv | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 05:02:29.598: INFO: Parse url "http://127.0.0.1:35803/portforward/2RjZV8Cv" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12002 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 05:02:29.599: INFO: the IP:port is http://127.0.0.1:12002 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12002 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12002 -> 12003 | |
Forwarding from [::1]:12002 -> 12003 | |
Handling connection for 12002 | |
E0724 05:02:30.608801 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:30 socat[166041] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:31.633284 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:31 socat[166043] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:32.637422 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:32 socat[166227] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:33.646836 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:33 socat[166253] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:34.653785 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:34 socat[166255] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:35.660993 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:35 socat[166257] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:36.668111 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:36 socat[166259] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:37.675162 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:37 socat[166262] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:38.682545 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:38 socat[166265] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:39.695444 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:39 socat[166268] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:40.714924 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:40 socat[166271] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:41.744440 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:41 socat[166274] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:42.751806 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:42 socat[166277] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:43.769076 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:43 socat[166280] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:44.776670 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:44 socat[166283] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:45.784895 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:45 socat[166286] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:46.792974 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:46 socat[166289] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:47.799261 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:47 socat[166292] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:48.806836 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:48 socat[166295] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:49.832493 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:49 socat[166298] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:50.839834 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:50 socat[166366] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:51.846801 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:51 socat[166367] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:52.854123 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:52 socat[166368] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:53.862284 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:53 socat[166369] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:54.870155 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:54 socat[166370] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:55.919422 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:55 socat[166371] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:56.932179 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:56 socat[166462] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:57.943481 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:57 socat[166463] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:58.950738 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:58 socat[166554] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:02:59.961509 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:59 socat[166555] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:00.970342 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:00 socat[166556] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:02.041883 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:02 socat[166557] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:03.068089 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:03 socat[166558] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:04.075981 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:04 socat[166559] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:05.083973 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:05 socat[166628] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:06.116487 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:06 socat[166629] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:07.123743 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:07 socat[166631] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:08.131580 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:08 socat[166632] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:09.199809 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:09 socat[166633] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:10.219733 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:10 socat[166634] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:11.288857 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:11 socat[166635] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:12.306454 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:12 socat[166636] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:13.376862 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:13 socat[166637] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:14.383982 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:14 socat[166638] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:15.408241 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:15 socat[166639] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:16.419973 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:16 socat[166640] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:17.428348 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:17 socat[166641] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:18.444076 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:18 socat[166712] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:19.454116 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:19 socat[166713] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:20.462154 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:20 socat[166714] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:21.504817 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:21 socat[166715] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:22.511395 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:22 socat[166716] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:23.519909 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:23 socat[166717] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:24.567967 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:24 socat[166718] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:25.575107 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:25 socat[166719] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:26.582475 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:26 socat[166720] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:27.589780 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:27 socat[166721] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:28.597498 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:28 socat[166722] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
Handling connection for 12002 | |
E0724 05:03:29.604456 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:29 socat[166723] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n" | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[91m[1m• Failure [64.082 seconds][0m | |
[k8s.io] Streaming | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:38[0m | |
[91m[1mruntime should support portforward in host network [It][0m | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48[0m | |
[91mTimed out after 60.006s. | |
Expected | |
<*url.Error | 0xc00037ef60>: { | |
Op: "Get", | |
URL: "http://127.0.0.1:12002", | |
Err: {s: "EOF"}, | |
} | |
to be nil[0m | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253 | |
[90m------------------------------[0m | |
[91m[1mSummarizing 13 Failures:[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is not privileged [0m[91m[1m[It] should work with just selinux level set [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support PodPID [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] SELinux [0m[0mruntime should support selinux [0m[90mwhen single pod sandbox is not privileged [0m[91m[1m[It] should work with selinux set [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support container exec [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mbucket [0m[91m[1m[It] runtime should support that ReadOnlyRootfs is false [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:594[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support HostPID [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Security Context [0m[0mNamespaceOption [0m[91m[1m[It] runtime should support ContainerPID [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Streaming [0m[0mruntime should support streaming interfaces [0m[91m[1m[It] runtime should support portforward [Conformance] [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support container log [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Multiple Containers [Conformance] [0m[0mwhen running multiple containers in a pod [0m[91m[1m[It] should support network [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Networking [0m[0mruntime should support networking [0m[91m[1m[It] runtime should support port mapping with only container port [Conformance] [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Networking [0m[0mruntime should support networking [0m[91m[1m[It] runtime should support port mapping with host port and container port [Conformance] [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[91m[1m[Fail] [0m[90m[k8s.io] Streaming [0m[0mruntime should support streaming interfaces [0m[91m[1m[It] runtime should support portforward in host network [0m | |
[37m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253[0m | |
[1m[91mRan 90 of 97 Specs in 139.078 seconds[0m | |
[1m[91mFAIL![0m -- [32m[1m77 Passed[0m | [91m[1m13 Failed[0m | [33m[1m0 Pending[0m | [36m[1m7 Skipped[0m | |
Ginkgo ran 1 suite in 2m19.10534743s | |
Test Suite Failed | |
--- FAIL: TestCRISuite (139.11s) | |
cri_test.go:126: critest path: /go/bin/critest | |
cri_test.go:161: Failed to run tests in parallel: exit status 1 | |
FAIL | |
./hack/test-utils.sh: line 107: 148384 Terminated keepalive "sudo PATH=${PATH} ${GOBIN%/}/${CONTAINERD_BIN} ${CONTAINERD_FLAGS}" ${RESTART_WAIT_PERIOD} &> ${report_dir}/containerd.log | |
make: *** [Makefile:108: test-cri] Error 1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
type=USER_END msg=audit(1595591903.926:3471): pid=129587 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591903.926:3472): pid=129587 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.479:3473): pid=129685 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.479:3474): pid=129685 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6D6B646972202D7670202F7573722F6C6F63616C2F62696E exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.480:3475): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.481:3476): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591910.482:3477): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591910.482:3478): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.491:3479): pid=129688 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.491:3480): pid=129688 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6370202D7666202F676F2F7372632F6769746875622E636F6D2F636F6E7461696E6572642F6372692F6861636B2F2E2E2F5F6F75747075742F636F6E7461696E657264202F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.492:3481): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.493:3482): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591910.612:3483): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591910.612:3484): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.621:3485): pid=129691 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.621:3486): pid=129691 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6368636F6E202D76202D7420636F6E7461696E65725F72756E74696D655F657865635F74202F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.621:3487): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.622:3488): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591910.624:3489): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591910.624:3490): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.635:3491): pid=129698 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.638:3492): pid=129698 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374202D2D6C6F672D6C6576656C3D6465627567202D2D636F6E666967202F746D702F636F6E7461696E6572642D636F6E6669672D73656C696E75782E746F6D6C202D2D61646472657373202F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B202D2D7374617465202F72756E2F636F6E7461696E6572642D74657374202D2D726F6F74202F7661722F6C69622F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.638:3493): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.640:3494): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.641:3495): pid=129702 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.641:3496): pid=129702 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F6C6F63616C2F62696E2F637472202D2D61646472657373202F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B2076657273696F6E exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.644:3497): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.645:3498): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591910.687:3499): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591910.687:3500): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.701:3501): pid=129720 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.701:3502): pid=129720 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F62696E2F63726963746C202D2D72756E74696D652D656E64706F696E743D756E69783A2F2F2F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B20696E666F exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.701:3503): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.703:3504): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591910.710:3505): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591910.710:3506): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591910.719:3507): pid=129731 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591910.719:3508): pid=129731 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd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exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591910.720:3509): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591910.722:3510): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.855:3511): dev=veth730c7398 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.898:3512): dev=veth80b4d492 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.911:3513): dev=veth36ae0f24 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.935:3514): dev=veth5cddde14 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.937:3515): dev=vetha6f9dd28 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591910.937:3516): dev=vethbbf9ac8f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591912.115:3517): dev=veth3d06a546 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591912.162:3518): dev=veth496f0a00 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591912.472:3519): avc: denied { search } for pid=130124 comm="top" name="1" dev="proc" ino=335395 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c533,c877 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591912.472:3519): avc: denied { read } for pid=130124 comm="top" name="stat" dev="proc" ino=336574 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c533,c877 tclass=file permissive=1 | |
type=AVC msg=audit(1595591912.497:3520): avc: denied { write } for pid=130146 comm="touch" name="/" dev="overlay" ino=335431 scontext=system_u:system_r:container_t:s0 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591912.497:3520): avc: denied { add_name } for pid=130146 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591912.497:3520): avc: denied { create } for pid=130146 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591912.497:3520): avc: denied { write } for pid=130146 comm="touch" path="/foo" dev="overlay" ino=336615 scontext=system_u:system_r:container_t:s0 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591912.643:3521): dev=vethbbf9ac8f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591912.759:3522): dev=vethc7c2ff37 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.019:3523): dev=veth5cddde14 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.203:3524): dev=veth730c7398 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.216:3525): dev=veth0c8f0fba prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.358:3526): dev=veth61b30630 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.391:3527): dev=veth80b4d492 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.478:3528): dev=veth36ae0f24 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.487:3529): dev=veth23c8d0c6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591913.566:3530): dev=vethb9116ebc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591914.465:3531): dev=veth3d06a546 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591914.562:3532): dev=vethb4ac86a0 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591914.575:3533): dev=vetha6f9dd28 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591914.687:3534): dev=vethe91aeb2e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591914.965:3535): dev=vethc7c2ff37 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.049:3536): dev=vethf730d08c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.066:3537): dev=veth0c8f0fba prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.160:3538): dev=veth3f3ac7fb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591915.355:3539): avc: denied { write } for pid=132319 comm="touch" name="default.conf" dev="overlay" ino=344600 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.367:3540): avc: denied { write } for pid=132334 comm="sed" name="conf.d" dev="overlay" ino=344599 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591915.367:3540): avc: denied { add_name } for pid=132334 comm="sed" name="sed15MfJv" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591915.367:3540): avc: denied { create } for pid=132334 comm="sed" name="sed15MfJv" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.367:3540): avc: denied { write } for pid=132334 comm="sed" path="/etc/nginx/conf.d/sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.367:3541): avc: denied { setattr } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.367:3542): avc: denied { remove_name } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591915.367:3542): avc: denied { rename } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.367:3542): avc: denied { unlink } for pid=132334 comm="sed" name="default.conf" dev="overlay" ino=344600 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591915.372:3543): avc: denied { open } for pid=132286 comm="nginx" path="pipe:[344498]" dev="pipefs" ino=344498 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591915.372:3544): avc: denied { create } for pid=132286 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591915.372:3545): avc: denied { setattr } for pid=132286 comm="nginx" name="client_temp" dev="overlay" ino=344023 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.500:3546): dev=veth61b30630 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.603:3547): dev=vethf744804a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591915.941:3548): dev=vethb9116ebc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.320:3549): dev=vethb4ac86a0 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.498:3550): dev=vetha8c1e923 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.574:3551): dev=veth23c8d0c6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.596:3552): dev=vethe91aeb2e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.660:3553): dev=vethe7852011 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591916.695:3554): dev=vethb4c7da78 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591917.283:3555): dev=vetha40335ef prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591917.384:3556): dev=veth3f3ac7fb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591917.477:3557): dev=veth070e63a4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591917.627:3558): dev=vethf730d08c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591917.723:3559): dev=vethf0007434 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.006:3560): dev=vethf744804a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.101:3561): dev=veth588933d6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.407:3562): dev=vethe7852011 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.512:3563): dev=veth6da82891 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.558:3564): dev=veth496f0a00 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.658:3565): dev=vethb4c7da78 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.672:3566): dev=veth01d23883 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.689:3567): dev=vetha8c1e923 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.777:3568): dev=veth83a73b9e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591918.778:3569): dev=vethe77e4ccc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591919.080:3570): avc: denied { write } for pid=134711 comm="touch" name="default.conf" dev="overlay" ino=353740 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.086:3571): avc: denied { write } for pid=134719 comm="sed" name="conf.d" dev="overlay" ino=353739 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591919.086:3571): avc: denied { add_name } for pid=134719 comm="sed" name="sedoaF37l" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591919.086:3571): avc: denied { create } for pid=134719 comm="sed" name="sedoaF37l" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.086:3571): avc: denied { write } for pid=134719 comm="sed" path="/etc/nginx/conf.d/sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.087:3572): avc: denied { setattr } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.087:3573): avc: denied { remove_name } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591919.087:3573): avc: denied { rename } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.087:3573): avc: denied { unlink } for pid=134719 comm="sed" name="default.conf" dev="overlay" ino=353740 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591919.092:3574): avc: denied { open } for pid=134692 comm="nginx" path="pipe:[352251]" dev="pipefs" ino=352251 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591919.093:3575): avc: denied { create } for pid=134692 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591919.093:3576): avc: denied { setattr } for pid=134692 comm="nginx" name="client_temp" dev="overlay" ino=354416 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591919.595:3577): dev=veth070e63a4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591919.693:3578): dev=veth871762a3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591919.921:3579): dev=veth588933d6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591919.940:3580): dev=vethf0007434 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.008:3581): dev=vethc8d91954 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.038:3582): dev=veth638ae6c6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.285:3583): dev=vetha40335ef prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.393:3584): dev=veth6064174e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.394:3585): dev=veth83a73b9e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591920.472:3586): dev=veth717cc721 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591920.892:3587): avc: denied { open } for pid=135934 comm="httpd" path="pipe:[358146]" dev="pipefs" ino=358146 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591920.893:3588): avc: denied { write } for pid=135934 comm="httpd" name="logs" dev="overlay" ino=358279 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591920.893:3588): avc: denied { add_name } for pid=135934 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591920.893:3588): avc: denied { create } for pid=135934 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591920.893:3588): avc: denied { write } for pid=135934 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=359000 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591921.069:3589): dev=veth01d23883 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591921.154:3590): dev=veth393a052a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591921.191:3591): dev=vethe77e4ccc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591921.265:3592): dev=veth5b9065a7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591921.977:3593): avc: denied { search } for pid=136546 comm="top" name="16" dev="proc" ino=360427 scontext=system_u:system_r:container_t:s0:c682,c1015 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591921.977:3593): avc: denied { read } for pid=136546 comm="top" name="stat" dev="proc" ino=360428 scontext=system_u:system_r:container_t:s0:c682,c1015 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.042:3594): dev=veth638ae6c6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.171:3595): dev=veth4075371f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591922.344:3596): avc: denied { search } for pid=136961 comm="top" name="1" dev="proc" ino=361853 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c325 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591922.344:3596): avc: denied { read } for pid=136961 comm="top" name="stat" dev="proc" ino=362182 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c325 tclass=file permissive=1 | |
type=AVC msg=audit(1595591922.399:3597): avc: denied { write } for pid=137089 comm="touch" name="/" dev="overlay" ino=361935 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591922.399:3597): avc: denied { add_name } for pid=137089 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591922.399:3597): avc: denied { create } for pid=137089 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591922.399:3597): avc: denied { write } for pid=137089 comm="touch" path="/foo" dev="overlay" ino=362336 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.405:3598): dev=veth871762a3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.568:3599): dev=veth865cbd7c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.616:3600): dev=vethc8d91954 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.676:3601): dev=veth6064174e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.770:3602): dev=veth2265fd46 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.783:3603): dev=veth717cc721 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591922.861:3604): dev=veth8f776ac3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591923.188:3605): dev=veth5b9065a7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591923.304:3606): dev=veth4dbd8dc7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591923.421:3607): dev=veth393a052a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591923.498:3608): dev=veth17553bdf prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591924.420:3609): dev=veth4075371f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591924.470:3610): dev=veth865cbd7c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591924.518:3611): dev=veth7f1d8f9f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591924.728:3612): dev=veth6da82891 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591924.834:3613): dev=vethc669adfd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.098:3614): dev=veth2265fd46 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591925.151:3615): avc: denied { open } for pid=138771 comm="httpd" path="pipe:[368407]" dev="pipefs" ino=368407 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591925.153:3616): avc: denied { write } for pid=138771 comm="httpd" name="logs" dev="overlay" ino=368622 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591925.153:3616): avc: denied { add_name } for pid=138771 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591925.153:3616): avc: denied { create } for pid=138771 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591925.153:3616): avc: denied { write } for pid=138771 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=369733 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.290:3617): dev=veth4b87710c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.649:3618): dev=veth4dbd8dc7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.721:3619): dev=veth8f776ac3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.772:3620): dev=vethe388ec8d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.802:3621): dev=veth17553bdf prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591925.865:3622): dev=veth7b8cb41e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591926.127:3623): dev=veth21c531ba prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591926.183:3624): dev=veth7f1d8f9f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591926.301:3625): dev=veth5aaabe16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591926.527:3626): dev=veth6071731a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591927.500:3627): dev=vethe388ec8d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591927.596:3628): dev=veth9613a5c5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591927.795:3629): dev=veth7b8cb41e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591927.877:3630): dev=vethc30ca0dc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591928.310:3631): avc: denied { open } for pid=140468 comm="httpd" path="pipe:[375595]" dev="pipefs" ino=375595 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591928.314:3632): avc: denied { write } for pid=140468 comm="httpd" name="logs" dev="overlay" ino=376098 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591928.314:3632): avc: denied { add_name } for pid=140468 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591928.314:3632): avc: denied { create } for pid=140468 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591928.314:3632): avc: denied { write } for pid=140468 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=376153 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591928.721:3633): dev=veth6071731a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591928.745:3634): dev=veth5aaabe16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591928.779:3635): dev=veth21c531ba prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591928.846:3636): dev=veth8fffd774 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591928.891:3637): dev=vethedfce014 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591929.027:3638): dev=veth203194f9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591929.990:3639): dev=vethc5e74c9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591930.164:3640): avc: denied { write } for pid=141428 comm="touch" name="default.conf" dev="overlay" ino=380007 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591930.175:3641): avc: denied { write } for pid=141443 comm="sed" name="conf.d" dev="overlay" ino=380006 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591930.175:3641): avc: denied { add_name } for pid=141443 comm="sed" name="sedieN0v6" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591930.175:3641): avc: denied { create } for pid=141443 comm="sed" name="sedieN0v6" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591930.175:3641): avc: denied { write } for pid=141443 comm="sed" path="/etc/nginx/conf.d/sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591930.175:3642): avc: denied { setattr } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591930.175:3643): avc: denied { remove_name } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591930.175:3643): avc: denied { rename } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591930.175:3643): avc: denied { unlink } for pid=141443 comm="sed" name="default.conf" dev="overlay" ino=380007 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.178:3644): dev=veth9613a5c5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591930.183:3645): avc: denied { open } for pid=141398 comm="nginx" path="pipe:[379412]" dev="pipefs" ino=379412 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591930.185:3646): avc: denied { create } for pid=141398 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591930.185:3647): avc: denied { setattr } for pid=141398 comm="nginx" name="client_temp" dev="overlay" ino=380087 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.277:3648): dev=veth8e203931 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.704:3649): dev=vethc669adfd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.794:3650): dev=veth0022ad47 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.833:3651): dev=veth8fffd774 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591930.907:3652): dev=veth292bfa56 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.318:3653): dev=veth4b87710c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.375:3654): dev=veth203194f9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.417:3655): dev=vethd408939b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.431:3656): dev=vethc30ca0dc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.478:3657): dev=veth5a592b0c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591931.525:3658): dev=vethe0cc37d2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591932.315:3659): avc: denied { search } for pid=142349 comm="top" name="11" dev="proc" ino=382928 scontext=system_u:system_r:container_t:s0:c422,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591932.315:3659): avc: denied { read } for pid=142349 comm="top" name="stat" dev="proc" ino=382958 scontext=system_u:system_r:container_t:s0:c422,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591932.531:3660): dev=vethc5e74c9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591932.614:3661): dev=veth8e203931 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591932.625:3662): dev=veth467d663d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591932.705:3663): dev=vethf119ea63 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591933.010:3664): dev=veth18e582f6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591933.560:3665): dev=vethe0cc37d2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591933.679:3666): dev=vethe30a3ad7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591933.966:3667): dev=vethd408939b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.063:3668): dev=veth24f24658 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.230:3669): dev=veth5a592b0c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.356:3670): dev=veth934a8bbd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.512:3671): dev=veth467d663d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.599:3672): dev=veth90f93cd3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.704:3673): dev=vethf119ea63 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591934.778:3674): dev=vethb0064260 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.185:3675): dev=veth0022ad47 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.426:3676): dev=veth18e582f6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.535:3677): dev=vetheabfdb22 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.705:3678): dev=vethe30a3ad7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.805:3679): dev=vethb8ccfba9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.877:3680): dev=veth934a8bbd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591935.954:3681): dev=vethae8aac9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591936.389:3682): avc: denied { write } for pid=145109 comm="touch" name="default.conf" dev="overlay" ino=394478 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.398:3683): avc: denied { write } for pid=145117 comm="sed" name="conf.d" dev="overlay" ino=394477 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.398:3683): avc: denied { add_name } for pid=145117 comm="sed" name="sed05w3eH" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.398:3683): avc: denied { create } for pid=145117 comm="sed" name="sed05w3eH" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.398:3683): avc: denied { write } for pid=145117 comm="sed" path="/etc/nginx/conf.d/sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.398:3684): avc: denied { setattr } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.398:3685): avc: denied { remove_name } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.398:3685): avc: denied { rename } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.398:3685): avc: denied { unlink } for pid=145117 comm="sed" name="default.conf" dev="overlay" ino=394478 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.402:3686): avc: denied { open } for pid=145068 comm="nginx" path="pipe:[394332]" dev="pipefs" ino=394332 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591936.405:3687): avc: denied { create } for pid=145068 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.405:3688): avc: denied { setattr } for pid=145068 comm="nginx" name="client_temp" dev="overlay" ino=395400 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591936.667:3689): dev=vethb0064260 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591936.768:3690): dev=veth7e290a9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591936.809:3691): avc: denied { write } for pid=145395 comm="touch" name="/" dev="overlay" ino=394977 scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.809:3691): avc: denied { add_name } for pid=145395 comm="touch" name="test.go" scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591936.809:3691): avc: denied { create } for pid=145395 comm="touch" name="test.go" scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591936.809:3691): avc: denied { write } for pid=145395 comm="touch" path="/test.go" dev="overlay" ino=396085 scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591937.431:3692): dev=vethedfce014 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591937.560:3693): dev=veth9d061b99 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591937.652:3694): dev=veth24f24658 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591937.822:3695): dev=vethc531296e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591938.071:3696): dev=vethae8aac9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591938.177:3697): dev=vetheabfdb22 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591938.189:3698): dev=vethcb7a3c80 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591938.198:3699): dev=veth292bfa56 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591938.434:3700): avc: denied { write } for pid=146404 comm="nginx" name="nginx" dev="overlay" ino=399279 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591938.434:3700): avc: denied { add_name } for pid=146404 comm="nginx" name="error.log" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591938.434:3700): avc: denied { create } for pid=146404 comm="nginx" name="error.log" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591938.434:3700): avc: denied { open } for pid=146404 comm="nginx" path="pipe:[399195]" dev="pipefs" ino=399195 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591938.437:3701): avc: denied { create } for pid=146404 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591938.437:3702): avc: denied { setattr } for pid=146404 comm="nginx" name="client_temp" dev="overlay" ino=399304 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591938.438:3703): avc: denied { write } for pid=146404 comm="nginx" path="/run/nginx.pid" dev="overlay" ino=399317 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591938.611:3704): dev=veth7999e1c1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591939.201:3705): dev=veth7e290a9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591939.273:3706): dev=vethe67e31a5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591939.592:3707): dev=vethdaa8cc04 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591939.651:3708): dev=veth9d061b99 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591939.849:3709): avc: denied { write } for pid=147161 comm="touch" name="default.conf" dev="overlay" ino=402311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.866:3710): avc: denied { write } for pid=147193 comm="sed" name="conf.d" dev="overlay" ino=402310 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591939.866:3710): avc: denied { add_name } for pid=147193 comm="sed" name="sedlY6ahq" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591939.866:3710): avc: denied { create } for pid=147193 comm="sed" name="sedlY6ahq" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.866:3710): avc: denied { write } for pid=147193 comm="sed" path="/etc/nginx/conf.d/sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.866:3711): avc: denied { setattr } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.866:3712): avc: denied { remove_name } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591939.866:3712): avc: denied { rename } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.866:3712): avc: denied { unlink } for pid=147193 comm="sed" name="default.conf" dev="overlay" ino=402311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591939.870:3713): avc: denied { open } for pid=147133 comm="nginx" path="pipe:[402161]" dev="pipefs" ino=402161 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591939.870:3714): avc: denied { create } for pid=147133 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591939.870:3715): avc: denied { setattr } for pid=147133 comm="nginx" name="client_temp" dev="overlay" ino=402385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.029:3716): avc: denied { search } for pid=147313 comm="pidof" name="1" dev="proc" ino=1333 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.029:3716): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.029:3716): avc: denied { open } for pid=147313 comm="pidof" path="/proc/1/stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3717): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=1559 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3718): avc: denied { search } for pid=147313 comm="pidof" name="2" dev="proc" ino=1395 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3718): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3718): avc: denied { open } for pid=147313 comm="pidof" path="/proc/2/stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3719): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156012 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3720): avc: denied { search } for pid=147313 comm="pidof" name="546" dev="proc" ino=17537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3720): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3720): avc: denied { open } for pid=147313 comm="pidof" path="/proc/546/stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3721): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=14289 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3722): avc: denied { search } for pid=147313 comm="pidof" name="602" dev="proc" ino=18254 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3722): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3722): avc: denied { open } for pid=147313 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3723): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3724): avc: denied { search } for pid=147313 comm="pidof" name="605" dev="proc" ino=18311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3724): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3724): avc: denied { open } for pid=147313 comm="pidof" path="/proc/605/stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3725): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=18712 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3726): avc: denied { search } for pid=147313 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3726): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3726): avc: denied { open } for pid=147313 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3727): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=19247 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3728): avc: denied { search } for pid=147313 comm="pidof" name="643" dev="proc" ino=19524 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3728): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3728): avc: denied { open } for pid=147313 comm="pidof" path="/proc/643/stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3729): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156081 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3730): avc: denied { search } for pid=147313 comm="pidof" name="656" dev="proc" ino=19536 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3730): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3730): avc: denied { open } for pid=147313 comm="pidof" path="/proc/656/stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3731): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21030 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3732): avc: denied { search } for pid=147313 comm="pidof" name="657" dev="proc" ino=19539 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3732): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3732): avc: denied { open } for pid=147313 comm="pidof" path="/proc/657/stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3733): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20720 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3734): avc: denied { search } for pid=147313 comm="pidof" name="659" dev="proc" ino=19545 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3734): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3734): avc: denied { open } for pid=147313 comm="pidof" path="/proc/659/stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3735): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21020 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3736): avc: denied { search } for pid=147313 comm="pidof" name="666" dev="proc" ino=19851 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3736): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3736): avc: denied { open } for pid=147313 comm="pidof" path="/proc/666/stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3737): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156102 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3738): avc: denied { search } for pid=147313 comm="pidof" name="671" dev="proc" ino=20673 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3738): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3738): avc: denied { open } for pid=147313 comm="pidof" path="/proc/671/stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3739): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20675 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3740): avc: denied { search } for pid=147313 comm="pidof" name="683" dev="proc" ino=19883 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3740): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3740): avc: denied { open } for pid=147313 comm="pidof" path="/proc/683/stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3741): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20954 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3742): avc: denied { search } for pid=147313 comm="pidof" name="709" dev="proc" ino=20032 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3742): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3742): avc: denied { open } for pid=147313 comm="pidof" path="/proc/709/stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3743): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156103 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3744): avc: denied { search } for pid=147313 comm="pidof" name="751" dev="proc" ino=20306 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3744): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3744): avc: denied { open } for pid=147313 comm="pidof" path="/proc/751/stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3745): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21809 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3746): avc: denied { search } for pid=147313 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3746): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3746): avc: denied { open } for pid=147313 comm="pidof" path="/proc/754/stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3747): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21334 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3748): avc: denied { search } for pid=147313 comm="pidof" name="755" dev="proc" ino=20384 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3748): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3748): avc: denied { open } for pid=147313 comm="pidof" path="/proc/755/stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3749): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156104 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3750): avc: denied { search } for pid=147313 comm="pidof" name="830" dev="proc" ino=21910 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3750): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=22781 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3751): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=22016 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3752): avc: denied { search } for pid=147313 comm="pidof" name="50569" dev="proc" ino=59858 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3752): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3752): avc: denied { open } for pid=147313 comm="pidof" path="/proc/50569/stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3753): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156109 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3754): avc: denied { search } for pid=147313 comm="pidof" name="51924" dev="proc" ino=63902 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3754): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3754): avc: denied { open } for pid=147313 comm="pidof" path="/proc/51924/stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3755): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=63909 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3756): avc: denied { search } for pid=147313 comm="pidof" name="64048" dev="proc" ino=81551 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3756): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=81552 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3756): avc: denied { open } for pid=147313 comm="pidof" path="/proc/64048/stat" dev="proc" ino=81552 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3757): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=81644 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3758): avc: denied { search } for pid=147313 comm="pidof" name="129703" dev="proc" ino=333405 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3758): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=403717 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3759): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=333413 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3760): avc: denied { search } for pid=147313 comm="pidof" name="145312" dev="proc" ino=395865 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3760): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=395876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3761): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=394860 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.030:3762): avc: denied { search } for pid=147313 comm="pidof" name="145647" dev="proc" ino=396413 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591940.030:3762): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=397615 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.030:3763): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=396419 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.036:3764): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1 | |
type=AVC msg=audit(1595591940.036:3765): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.036:3765): avc: denied { open } for pid=147313 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1 | |
type=AVC msg=audit(1595591940.036:3766): avc: denied { search } for pid=147313 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591940.123:3767): dev=vethcb7a3c80 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591940.338:3768): dev=vethc531296e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591940.456:3769): dev=veth7999e1c1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591940.937:3770): dev=veth90f93cd3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=AVC msg=audit(1595591941.372:3771): avc: denied { write } for pid=147979 comm="touch" name="default.conf" dev="overlay" ino=404954 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.382:3772): avc: denied { write } for pid=147997 comm="sed" name="conf.d" dev="overlay" ino=404953 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591941.382:3772): avc: denied { add_name } for pid=147997 comm="sed" name="sed0ii5qU" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591941.382:3772): avc: denied { create } for pid=147997 comm="sed" name="sed0ii5qU" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.382:3772): avc: denied { write } for pid=147997 comm="sed" path="/etc/nginx/conf.d/sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.382:3773): avc: denied { setattr } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.382:3774): avc: denied { remove_name } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591941.382:3774): avc: denied { rename } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.382:3774): avc: denied { unlink } for pid=147997 comm="sed" name="default.conf" dev="overlay" ino=404954 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1 | |
type=AVC msg=audit(1595591941.389:3775): avc: denied { open } for pid=147949 comm="nginx" path="pipe:[405911]" dev="pipefs" ino=405911 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 | |
type=AVC msg=audit(1595591941.392:3776): avc: denied { create } for pid=147949 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=AVC msg=audit(1595591941.393:3777): avc: denied { setattr } for pid=147949 comm="nginx" name="client_temp" dev="overlay" ino=405044 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1 | |
type=ANOM_PROMISCUOUS msg=audit(1595591941.536:3778): dev=vethe67e31a5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591941.577:3779): dev=vethdaa8cc04 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=ANOM_PROMISCUOUS msg=audit(1595591941.852:3780): dev=vethb8ccfba9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root" | |
type=USER_END msg=audit(1595591941.917:3781): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591941.917:3782): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591941.930:3783): pid=148259 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591941.930:3784): pid=148259 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=706B696C6C202D6720313239363936 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591941.931:3785): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591941.934:3786): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591941.942:3787): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591941.942:3788): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_END msg=audit(1595591941.946:3789): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=CRED_DISP msg=audit(1595591941.946:3790): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_ACCT msg=audit(1595591941.956:3791): pid=148262 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=USER_CMD msg=audit(1595591941.957:3792): pid=148262 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6370202D7666202F7661722F6C6F672F61756469742F61756469742E6C6F67202F746D702F746573742D6372692F7065726D6973736976652D61756469742E6C6F67 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant" | |
type=CRED_REFR msg=audit(1595591941.957:3793): pid=148262 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" | |
type=USER_START msg=audit(1595591941.959:3794): pid=148262 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🇩 _output/containerd | |
go build -o _output/containerd \ | |
-tags 'seccomp apparmor selinux no_btrfs' \ | |
-ldflags '-X github.com/containerd/cri/vendor/github.com/containerd/containerd/version.Version=f3b0a52d-TEST' \ | |
-gcflags '' \ | |
github.com/containerd/cri/cmd/containerd | |
🇩 binaries | |
🇩 test-cri | |
/go/bin/critest | |
'/go/src/github.com/containerd/cri/hack/../_output/containerd' -> '/usr/local/bin/containerd-test' | |
changing security context of '/usr/local/bin/containerd-test' | |
critest version: 1.18.0-89-gbaca4a1 | |
Running Suite: CRI validation | |
============================= | |
Random Seed: [1m123456789[0m - Will randomize all specs | |
Will run [1m97[0m specs | |
Running in parallel across [1m8[0m nodes | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return runtime conditions [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45 | |
[1mSTEP[0m: test runtime status | |
[AfterEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with digest should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[1mSTEP[0m: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image with tag should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:test | |
[1mSTEP[0m: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:test | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with just selinux level set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 90a5a5caf579b73484d7998f70a283ffa5fbe97991cc3da34b361a88985a1200 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should return error if RunAsGroup is set without RunAsUser | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with invalid RunAsGroup | |
[1mSTEP[0m: create invalid RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsGroup without RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 04:58:32.851311 129763 remote_runtime.go:200] CreateContainer in sandbox "413e18af856afc30e0c5de3208cfd64ff0b4026ef53aa4902e97c51c02cb54b1" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing stopped container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:32.708: INFO: Created container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c | |
Jul 24 04:58:32.868: INFO: Started container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c | |
Jul 24 04:58:32.966: INFO: Stopped container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c" | |
[1mSTEP[0m: Get container status for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c | |
Jul 24 04:58:32.975: INFO: Removed container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c" | |
[1mSTEP[0m: List containers for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:33.011: INFO: Created container "1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451 | |
Jul 24 04:58:33.118: INFO: Started container "1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 04:58:33.119: INFO: Open log file /tmp/podLogTest521854257/NamespaceOption-PodSandbox-fdffcf9c-cda4-11ea-991e-5254001ff4e5/container-with-HostNetwork-test-ff4b7fbb-cda4-11ea-991e-5254001ff4e5.log | |
Jul 24 04:58:33.119: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests720366365/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:33.024: INFO: Created container "35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e" | |
[1mSTEP[0m: Start container for containerID: 35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e | |
Jul 24 04:58:33.186: INFO: Started container "35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e" | |
[1mSTEP[0m: Get container status for containerID: 35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=false and stdin=false [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:34.174: INFO: Created container "49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077 | |
Jul 24 04:58:34.236: INFO: Started container "49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077" | |
[1mSTEP[0m: exec given command in container: 49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077 | |
Jul 24 04:58:34.236: INFO: Get exec url: http://127.0.0.1:46467/exec/a9SVO1KJ | |
[1mSTEP[0m: check the output of exec | |
Jul 24 04:58:34.236: INFO: Parse url "http://127.0.0.1:46467/exec/a9SVO1KJ" succeed | |
Jul 24 04:58:34.274: INFO: Check exec url "http://127.0.0.1:46467/exec/a9SVO1KJ" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync with timeout [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:33.203: INFO: Created container "37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d | |
Jul 24 04:58:33.321: INFO: Started container "37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d" | |
[1mSTEP[0m: test execSync with timeout | |
E0724 04:58:34.389979 129758 remote_runtime.go:351] ExecSync 37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded | |
[1mSTEP[0m: timeout exec process should be gone | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support MaskedPaths | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with MaskedPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:34.675: INFO: Created container "9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1" | |
[1mSTEP[0m: Start container for containerID: 9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1 | |
Jul 24 04:58:34.755: INFO: Started container "9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1" | |
[1mSTEP[0m: Get container status for containerID: 9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support unsafe sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:34.823: INFO: Created container "3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d | |
Jul 24 04:58:34.877: INFO: Started container "3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d" | |
[1mSTEP[0m: check sysctls fs.mqueue.msg_max | |
[AfterEach] runtime should support sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUserName | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUserName container | |
[1mSTEP[0m: create a container with RunAsUserName | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:35.260: INFO: Created container "8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7 | |
Jul 24 04:58:35.338: INFO: Started container "8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7" | |
[1mSTEP[0m: Get container status for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7 | |
[1mSTEP[0m: verify RunAsUserName for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7 | |
Jul 24 04:58:35.371: INFO: Execsync succeed | |
Jul 24 04:58:35.371: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIPC is true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:35.759: INFO: Created container "895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04 | |
Jul 24 04:58:35.815: INFO: Started container "895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04" | |
[1mSTEP[0m: Get container status for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04 | |
[1mSTEP[0m: check if the shared memory segment is included in the container | |
[1mSTEP[0m: execSync for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04 | |
Jul 24 04:58:35.839: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support stopping PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: test stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: 89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed | |
Jul 24 04:58:36.390: INFO: Stopped PodSandbox "89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed" | |
[1mSTEP[0m: Get PodSandbox status for podID: 89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support portforward [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 04:58:35.266: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:35.283: INFO: Created container "059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0 | |
Jul 24 04:58:35.360: INFO: Started container "059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0" | |
[1mSTEP[0m: port forward PodSandbox: f34d3ce1be7f91073c08282e239aa60460f0eaa689b3aec0f9d085b82920dd03 | |
Jul 24 04:58:35.361: INFO: Get port forward url: http://127.0.0.1:46467/portforward/3mnvWUDA | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 04:58:35.361: INFO: Parse url "http://127.0.0.1:46467/portforward/3mnvWUDA" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12001 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 04:58:35.361: INFO: the IP:port is http://127.0.0.1:12001 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12001 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12001 -> 80 | |
Forwarding from [::1]:12001 -> 80 | |
Handling connection for 12001 | |
Jul 24 04:58:36.367: INFO: check port mapping succeed | |
Jul 24 04:58:36.367: INFO: Check port forward url "http://127.0.0.1:46467/portforward/3mnvWUDA" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support stopping container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:36.348: INFO: Created container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9 | |
Jul 24 04:58:36.419: INFO: Started container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9" | |
[1mSTEP[0m: test stop container | |
[1mSTEP[0m: Stop container for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9 | |
Jul 24 04:58:36.474: INFO: Stopped container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9" | |
[1mSTEP[0m: Get container status for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status should support all kinds of references [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tag:all | |
[1mSTEP[0m: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-tag:all | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp unconfined on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:37.068: INFO: Created container "e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8 | |
Jul 24 04:58:37.154: INFO: Started container "e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8" | |
[1mSTEP[0m: Get container status for containerID: e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should create containers with the same process label | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 583f65d956281ff2b5c1638dc491a22a1fb6a3315ab543a035e9a4a8fe693f8e | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f7cf258e05770eb305d6333ccbf9d0f77c00814b24c29eddc22aa72ec659cc8a | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with just selinux level set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 027c7273ec390ffb429bb06a2f7425a29ad063588e65955f6d7eaa87eb3089c7 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support creating container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83 | |
[1mSTEP[0m: test create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:38.279: INFO: Created container "e59f4f9e978af606e1003a5e53b1e88accc35bc6309c5b339a5fd30cf70c2f9b" | |
[1mSTEP[0m: test list container | |
[1mSTEP[0m: List containers for containerID: e59f4f9e978af606e1003a5e53b1e88accc35bc6309c5b339a5fd30cf70c2f9b | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsGroup | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container for security context RunAsGroup | |
[1mSTEP[0m: create RunAsGroup container | |
[1mSTEP[0m: create a container with RunAsUser and RunAsGroup | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:34.282: INFO: Created container "49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24 | |
Jul 24 04:58:34.350: INFO: Started container "49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24" | |
[1mSTEP[0m: Get container status for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24 | |
[1mSTEP[0m: Get container status for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24 | |
[1mSTEP[0m: verify RunAsGroup for container | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:58:38.352: INFO: Open log file /tmp/podLogTest728702824/PodSandbox-with-log-directory-fecea4ba-cda4-11ea-ab99-5254001ff4e5/container-with-RunAsGroup-test-001007c0-cda5-11ea-ab99-5254001ff4e5.log | |
Jul 24 04:58:38.352: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:6.491 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should support RunAsGroup | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rshared' should support propagation from host to container and vice versa | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:38.138: INFO: Created container "588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18 | |
Jul 24 04:58:38.228: INFO: Started container "588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18" | |
[1mSTEP[0m: Get container status for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18 | |
Jul 24 04:58:38.271: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18 | |
Jul 24 04:58:38.303: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18 | |
Jul 24 04:58:38.348: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing created container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:38.556: INFO: Created container "4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013 | |
Jul 24 04:58:38.570: INFO: Removed container "4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013" | |
[1mSTEP[0m: List containers for containerID: 4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support DNS config [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54 | |
[1mSTEP[0m: create a PodSandbox with DNS config | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:39.348: INFO: Created container "2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd | |
Jul 24 04:58:39.402: INFO: Started container "2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd" | |
[1mSTEP[0m: check DNS config | |
[1mSTEP[0m: get the current dns config via execSync | |
Jul 24 04:58:39.435: INFO: check DNS config succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rprivate' should not support propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:39.564: INFO: Created container "8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168 | |
Jul 24 04:58:39.617: INFO: Started container "8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168" | |
[1mSTEP[0m: Get container status for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168 | |
Jul 24 04:58:39.652: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168 | |
Jul 24 04:58:39.689: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168 | |
Jul 24 04:58:39.732: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should error on create with wrong options | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 04:58:39.844456 129792 remote_runtime.go:200] CreateContainer in sandbox "f1d9811153c1de4fe6356abe7a409802b528c684a988acaf29f18d2f49bfe60a" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "06443ac67277decc62705d9177384548a9c29a58f979e4428b74792ca709508f" spec: the format of 'level' "s0,c4,c5" is not correct | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support PodPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194 | |
[1mSTEP[0m: create podSandbox for sharing process namespace | |
Jul 24 04:58:37.255: INFO: Pid namespace is "POD" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:39.028: INFO: Created container "664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974 | |
Jul 24 04:58:39.080: INFO: Started container "664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974" | |
[1mSTEP[0m: Get container status for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974 | |
Jul 24 04:58:40.106: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support running PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51 | |
[1mSTEP[0m: test run a default PodSandbox | |
[1mSTEP[0m: Get PodSandbox status for podID: c936916414369e9a758a44f34f5f01a528b6f7fa3930a00c517324bf06a63df3 | |
[1mSTEP[0m: test list PodSandbox | |
[1mSTEP[0m: List PodSandbox for podID: c936916414369e9a758a44f34f5f01a528b6f7fa3930a00c517324bf06a63df3 | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 04:58:40.298: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support exec with tty=true and stdin=true [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:40.799: INFO: Created container "9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa | |
Jul 24 04:58:40.865: INFO: Started container "9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa" | |
[1mSTEP[0m: exec given command in container: 9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa | |
Jul 24 04:58:40.866: INFO: Get exec url: http://127.0.0.1:46467/exec/NvSRRczF | |
[1mSTEP[0m: check the output of exec | |
Jul 24 04:58:40.868: INFO: Parse url "http://127.0.0.1:46467/exec/NvSRRczF" succeed | |
Jul 24 04:58:40.917: INFO: Check exec url "http://127.0.0.1:46467/exec/NvSRRczF" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 04:58:40.782: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:40.801: INFO: Created container "5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: 5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6 | |
Jul 24 04:58:40.896: INFO: Started container "5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6" | |
[1mSTEP[0m: Get container status for containerID: 5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:40.918: INFO: Created container "09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5 | |
Jul 24 04:58:40.978: INFO: Started container "09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5" | |
[1mSTEP[0m: Get container status for containerID: 09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5 | |
[It] should support container log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82 | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostIpc is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162 | |
[1mSTEP[0m: create shared memory segment on the host | |
[1mSTEP[0m: create podSandbox for security context HostIpc is false | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a default container with namespace | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:41.734: INFO: Created container "67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66 | |
Jul 24 04:58:41.799: INFO: Started container "67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66" | |
[1mSTEP[0m: Get container status for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66 | |
[1mSTEP[0m: check if the shared memory segment is not included in the container | |
[1mSTEP[0m: execSync for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66 | |
Jul 24 04:58:41.830: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support setting Capability | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with security context Capability and test | |
[1mSTEP[0m: create Capability container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:41.812: INFO: Created container "5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692" | |
[1mSTEP[0m: Start container for containerID: 5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692 | |
Jul 24 04:58:41.881: INFO: Started container "5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692" | |
[1mSTEP[0m: Get container status for containerID: 5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692 | |
[1mSTEP[0m: create container without security context Capability and test | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:41.930: INFO: Created container "376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f" | |
[1mSTEP[0m: Start container for containerID: 376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f | |
Jul 24 04:58:41.996: INFO: Started container "376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f" | |
[1mSTEP[0m: Get container status for containerID: 376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:42.228: INFO: Created container "759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39 | |
Jul 24 04:58:42.313: INFO: Started container "759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39" | |
[1mSTEP[0m: Get container status for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39 | |
[1mSTEP[0m: check whether 'hostPath' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39 | |
Jul 24 04:58:42.371: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] should work with selinux set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: cfe560c88759ecf32f79771b101306e55be21333d9619624283782a2037d808c | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 630355d6e88352d6823505ba4304985c0a629b76033a6bc6a514b8f98bf25d27 | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37 | |
[It] runtime should return version info [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41 | |
Jul 24 04:58:42.842: INFO: Get version info succeed | |
[AfterEach] [k8s.io] Runtime info | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support set hostname [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70 | |
[1mSTEP[0m: create a PodSandbox with hostname | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:42.949: INFO: Created container "0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51 | |
Jul 24 04:58:43.002: INFO: Started container "0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51" | |
[1mSTEP[0m: check hostname | |
[1mSTEP[0m: get the current hostname via execSync | |
Jul 24 04:58:43.028: INFO: check hostname succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create unconfined Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:43.194: INFO: Created container "4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e" | |
[1mSTEP[0m: Start container for containerID: 4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e | |
Jul 24 04:58:43.253: INFO: Started container "4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e" | |
[1mSTEP[0m: Get container status for containerID: 4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:43.940: INFO: Created container "76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018" | |
[1mSTEP[0m: Start container for containerID: 76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018 | |
Jul 24 04:58:44.114: INFO: Started container "76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018" | |
[1mSTEP[0m: Get container status for containerID: 76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create /tmp/seccomp-tests888906465/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 04:58:44.345718 129763 remote_runtime.go:200] CreateContainer in sandbox "d695bcf701398b52f740d1290effcdb574f807c5895e44fea245abfc90a431a0" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests888906465/block-host-name.json" | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_true | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:40.574: INFO: Created container "b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c | |
Jul 24 04:58:40.627: INFO: Started container "b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c" | |
[1mSTEP[0m: Get container status for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c | |
[1mSTEP[0m: Get container status for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c | |
[1mSTEP[0m: Check whether rootfs is read-only | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:58:44.628: INFO: Open log file /tmp/podLogTest648024821/PodSandbox-with-log-directory-02953e54-cda5-11ea-991e-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-03d09482-cda5-11ea-991e-5254001ff4e5.log | |
Jul 24 04:58:44.628: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:6.313 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should support that ReadOnlyRootfs is true | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp localhost/profile on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:44.700: INFO: Created container "0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05 | |
Jul 24 04:58:44.764: INFO: Started container "0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05" | |
[1mSTEP[0m: Get container status for containerID: 0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 04:58:44.994: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:45.030: INFO: Created container "e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77 | |
Jul 24 04:58:45.159: INFO: Started container "e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77" | |
[1mSTEP[0m: Get container status for containerID: e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:45.250: INFO: Created container "c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86 | |
Jul 24 04:58:45.352: INFO: Started container "c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86" | |
[1mSTEP[0m: Get container status for containerID: c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86 | |
[It] should support network | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: 65ec7a10a110b30f1eb7dfb83617fc48b7666a14e7b3853d6fe2d37e06d07437 | |
Jul 24 04:58:45.352: INFO: the IP:port is http://10.88.1.26:80 | |
[1mSTEP[0m: check the content of http://10.88.1.26:80 | |
Jul 24 04:58:45.355: INFO: check port mapping succeed | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with docker/default seccomp profile and test | |
[1mSTEP[0m: create docker/default Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:44.994: INFO: Created container "3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a" | |
[1mSTEP[0m: Start container for containerID: 3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a | |
Jul 24 04:58:45.275: INFO: Started container "3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a" | |
[1mSTEP[0m: Get container status for containerID: 3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: dd91a854c68d874081795ab058cb18a64187ef9616a1369c7617f81d563b573c | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 repoTags in the result image [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-tags:3 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:1 | |
[1mSTEP[0m: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:2 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-tags:3 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 676d0600f9cd8f578c567cabb04d73c63ad1d643d6df2c73bbb610121723a466 | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] image status get image fields should not have Uid|Username empty [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84 | |
Jul 24 04:58:42.707: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid | |
Jul 24 04:58:43.864: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username | |
Jul 24 04:58:44.708: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group | |
Jul 24 04:58:45.620: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username-group | |
[1mSTEP[0m: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid-group | |
[1mSTEP[0m: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-username | |
[1mSTEP[0m: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-user-uid | |
[1mSTEP[0m: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] process label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 6373cb8ab6a5ead76d35ec29599531adf332f4f04ae2247e662c9fb279f5e3bb | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] process label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 03501e5da4d2aa388586f0b418e1259a0a620f5dd97f06a6bbf5bde19f98241f | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should error on create with wrong options | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
E0724 04:58:48.577029 129745 remote_runtime.go:200] CreateContainer in sandbox "1c9bb24af3864aa1f9077dc008d220bd91debb3f7e88a72c41d5ade1c792ad64" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "679e0938f3cc093c4b32b850d3dcbd1b022154be642a85c94eed639755539ac9" spec: the format of 'level' "s0,c4,c5" is not correct | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support listing container stats [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:48.463: INFO: Created container "0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b | |
Jul 24 04:58:48.541: INFO: Started container "0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b" | |
[1mSTEP[0m: test container stats | |
[1mSTEP[0m: List container stats for containerID: 0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45 | |
[BeforeEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54 | |
[1mSTEP[0m: create a PodSandbox | |
[1mSTEP[0m: create a httpd container | |
Jul 24 04:58:48.222: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: httpd:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:48.237: INFO: Created container "a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066" | |
[1mSTEP[0m: start the httpd container | |
[1mSTEP[0m: Start container for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066 | |
Jul 24 04:58:48.316: INFO: Started container "a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066" | |
[1mSTEP[0m: Get container status for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066 | |
[1mSTEP[0m: create a busybox container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:48.342: INFO: Created container "369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed" | |
[1mSTEP[0m: start the busybox container | |
[1mSTEP[0m: Start container for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed | |
Jul 24 04:58:48.409: INFO: Started container "369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed" | |
[1mSTEP[0m: Get container status for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed | |
[It] should support container exec | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103 | |
[1mSTEP[0m: execSync for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066 | |
Jul 24 04:58:48.456: INFO: Execsync succeed | |
[1mSTEP[0m: execSync for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed | |
Jul 24 04:58:48.502: INFO: Execsync succeed | |
[AfterEach] when running multiple containers in a pod | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: cleanup log path | |
[AfterEach] [k8s.io] Multiple Containers [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] listImage should get exactly 3 image in the result list [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-1:latest | |
[1mSTEP[0m: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-2:latest | |
[1mSTEP[0m: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-3:latest | |
[1mSTEP[0m: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579 | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37 | |
[It] public image without tag should be pulled and removed [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47 | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
Jul 24 04:58:48.852: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Pull image : gcr.io/cri-tools/test-image-latest:latest | |
[1mSTEP[0m: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image : gcr.io/cri-tools/test-image-latest | |
[1mSTEP[0m: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7 | |
[1mSTEP[0m: Check image list empty | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/test-image-latest | |
[AfterEach] [k8s.io] Image Manager | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should work with selinux set | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f1ac802088b96ce1837b4ee8db208147cc6e6790c054a84cb7c7492da0bbc918 | |
[1mSTEP[0m: get container status | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should allow privilege escalation when false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761 | |
[1mSTEP[0m: create container alpine-nnp-false-075832bd-cda5-11ea-991e-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:46.497: INFO: Created container "213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d" | |
[1mSTEP[0m: Start container for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d | |
Jul 24 04:58:46.577: INFO: Started container "213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d" | |
[1mSTEP[0m: Get container status for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d | |
[1mSTEP[0m: Get container status for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:58:50.578: INFO: Open log file /tmp/podLogTest388173551/PodSandbox-with-log-directory-0659443f-cda5-11ea-991e-5254001ff4e5/alpine-nnp-false-075832bd-cda5-11ea-991e-5254001ff4e5.log | |
Jul 24 04:58:50.578: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:5.973 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NoNewPrivs | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725[0m | |
should allow privilege escalation when false | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37 | |
[It] runtime should support removing PodSandbox [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68 | |
[1mSTEP[0m: run PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: Stop PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74 | |
Jul 24 04:58:50.884: INFO: Stopped PodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74" | |
[1mSTEP[0m: test remove PodSandbox | |
[1mSTEP[0m: Remove PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74 | |
Jul 24 04:58:50.888: INFO: Removed PodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74" | |
[1mSTEP[0m: List PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74 | |
[1mSTEP[0m: List PodSandbox. | |
Jul 24 04:58:50.889: INFO: List PodSandbox succeed | |
[AfterEach] runtime should support basic operations on PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44 | |
[1mSTEP[0m: stop PodSandbox | |
E0724 04:58:50.889193 129745 remote_runtime.go:128] StopPodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74": does not exist | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support starting container with log [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:47.109: INFO: Created container "0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372 | |
Jul 24 04:58:47.164: INFO: Started container "0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372" | |
[1mSTEP[0m: Get container status for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372 | |
[1mSTEP[0m: Get container status for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372 | |
[1mSTEP[0m: check the log context | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:58:51.166: INFO: Open log file /tmp/podLogTest002541696/PodSandbox-with-log-directory-069cfe95-cda5-11ea-a543-5254001ff4e5/container-with-log-test-07b69824-cda5-11ea-a543-5254001ff4e5.log | |
Jul 24 04:58:51.166: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:6.151 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support starting container with log [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:51.028: INFO: Created container "f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034 | |
Jul 24 04:58:51.099: INFO: Started container "f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034" | |
[1mSTEP[0m: Get container status for containerID: f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with only container port [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 04:58:50.090: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:50.108: INFO: Created container "38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198 | |
Jul 24 04:58:50.162: INFO: Started container "38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198" | |
[1mSTEP[0m: check the port mapping with only container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
[1mSTEP[0m: Get PodSandbox status for podID: 775d9efc810e39a2f0334c5a16f735fad3de471eea38fb27c1611125c093a6fd | |
Jul 24 04:58:50.163: INFO: the IP:port is http://10.88.1.37:80 | |
[1mSTEP[0m: check the content of http://10.88.1.37:80 | |
Jul 24 04:58:51.164: INFO: check port mapping succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp docker/default on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:52.026: INFO: Created container "e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55 | |
Jul 24 04:58:52.218: INFO: Started container "e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55" | |
[1mSTEP[0m: Get container status for containerID: e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55 | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665 | |
[1mSTEP[0m: create privileged pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create privileged container with seccompBlockHostNameProfile and test | |
[1mSTEP[0m: create localhost//tmp/seccomp-tests999093587/block-host-name.json Seccomp container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:52.296: INFO: Created container "3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2" | |
[1mSTEP[0m: Start container for containerID: 3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2 | |
Jul 24 04:58:52.394: INFO: Started container "3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2" | |
[1mSTEP[0m: Get container status for containerID: 3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2 | |
[1mSTEP[0m: set hostname in container to determine whether sethostname is blocked | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support removing running container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:53.351: INFO: Created container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06 | |
Jul 24 04:58:53.404: INFO: Started container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06" | |
[1mSTEP[0m: test remove container | |
[1mSTEP[0m: Remove container for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06 | |
Jul 24 04:58:53.444: INFO: Removed container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06" | |
[1mSTEP[0m: List containers for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have correct role and type | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: b13761f1c5398678009ac5f17350ef490db5286e05d12979b55a33c426b0ccf7 | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] should create containers with the same process label | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: c090a812af228bc3c3b166ee95ef4bd3c46d378a7cf5e28a33a27d7c2fbfdb0a | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 4db50f9edcc785a3048db32565f9634314031b87aa640a084678e3fe77d3ce3c | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support Privileged is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create Privileged podSandbox | |
[1mSTEP[0m: create container for security context Privileged is true | |
[1mSTEP[0m: create Privileged container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:54.206: INFO: Created container "cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0 | |
Jul 24 04:58:54.263: INFO: Started container "cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0" | |
[1mSTEP[0m: Get container status for containerID: cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0 | |
[1mSTEP[0m: check the Privileged container | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support RunAsUser | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context RunAsUser | |
[1mSTEP[0m: create RunAsUser container | |
[1mSTEP[0m: create a container with RunAsUser | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:54.455: INFO: Created container "490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986 | |
Jul 24 04:58:54.521: INFO: Started container "490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986" | |
[1mSTEP[0m: Get container status for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986 | |
[1mSTEP[0m: verify RunAsUser for container | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986 | |
Jul 24 04:58:54.556: INFO: Execsync succeed | |
Jul 24 04:58:54.556: INFO: verify Execsync output succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when multiple pod sandboxes are not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137 | |
[It] should create containers with different process labels | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: f522d25c1a97af5d40a020529f4015e266efac848b3a6e8cb9b3cd2e0f8eb4f1 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 99efc4a7ebb2582aac45530f9a2a09ed52872b58b3a0697b28e643b05e9d6292 | |
[AfterEach] when multiple pod sandboxes are not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37 | |
[It] should support safe sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53 | |
[1mSTEP[0m: create a PodSandbox with sysctls | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:55.423: INFO: Created container "ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d | |
Jul 24 04:58:55.485: INFO: Started container "ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d" | |
[1mSTEP[0m: check sysctls kernel.shm_rmid_forced | |
[AfterEach] runtime should support sysctls | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] PodSandbox | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ReadonlyPaths | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container with ReadonlyPaths | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:55.662: INFO: Created container "98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53" | |
[1mSTEP[0m: Start container for containerID: 98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53 | |
Jul 24 04:58:55.723: INFO: Started container "98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53" | |
[1mSTEP[0m: Get container status for containerID: 98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 5af4c25bfe275c16146f4fe5b37702e24003900a65d378fe28e8cab6e5558485 | |
[AfterEach] when single pod sandbox is privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] runtime should support reopening container log [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285 | |
[1mSTEP[0m: create container with log | |
[1mSTEP[0m: create a container with log and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:51.181: INFO: Created container "6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8" | |
[1mSTEP[0m: start container with log | |
[1mSTEP[0m: Start container for containerID: 6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8 | |
Jul 24 04:58:51.271: INFO: Started container "6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8" | |
Jul 24 04:58:51.272: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log | |
Jul 24 04:58:51.272: INFO: Parse container log succeed | |
[1mSTEP[0m: rename container log | |
[1mSTEP[0m: reopen container log | |
Jul 24 04:58:51.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log | |
Jul 24 04:58:51.273: INFO: Parse container log succeed | |
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log | |
Jul 24 04:58:52.273: INFO: Parse container log succeed | |
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:52.273: INFO: Parse container log succeed | |
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:52.273: INFO: Parse container log succeed | |
Jul 24 04:58:53.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:53.273: INFO: Parse container log succeed | |
Jul 24 04:58:54.274: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:54.275: INFO: Parse container log succeed | |
Jul 24 04:58:55.276: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:55.276: INFO: Parse container log succeed | |
Jul 24 04:58:56.276: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new | |
Jul 24 04:58:56.276: INFO: Parse container log succeed | |
[AfterEach] runtime should support log | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:8.652 seconds][0m | |
[k8s.io] Container | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support log | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252[0m | |
runtime should support reopening container log [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39 | |
[It] runtime should support port mapping with host port and container port [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106 | |
[1mSTEP[0m: create a PodSandbox with host port and container port port mapping | |
[1mSTEP[0m: create a web server container | |
Jul 24 04:58:56.294: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: nginx:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:56.310: INFO: Created container "5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: 5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08 | |
Jul 24 04:58:56.387: INFO: Started container "5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08" | |
[1mSTEP[0m: check the port mapping with host port and container port | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 04:58:56.387: INFO: the IP:port is http://127.0.0.1:12000 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12000 | |
Jul 24 04:58:57.388: INFO: check port mapping succeed | |
[AfterEach] runtime should support networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Networking | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40 | |
[BeforeEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49 | |
[1mSTEP[0m: create Privileged podSandbox | |
[It] mount with 'rslave' should support propagation from host to container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create container with volume | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:57.641: INFO: Created container "e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4" | |
[1mSTEP[0m: test start container with volume | |
[1mSTEP[0m: Start container for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4 | |
Jul 24 04:58:57.741: INFO: Started container "e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4" | |
[1mSTEP[0m: Get container status for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4 | |
[1mSTEP[0m: create a propatation mount point in host | |
[1mSTEP[0m: check whether propagationMntPoint contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4 | |
Jul 24 04:58:57.798: INFO: Execsync succeed | |
[1mSTEP[0m: create a directory named containerMntPoint as a mount point in container | |
[1mSTEP[0m: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4 | |
Jul 24 04:58:57.847: INFO: Execsync succeed | |
[1mSTEP[0m: mount /etc to the mount point in container | |
[1mSTEP[0m: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4 | |
Jul 24 04:58:57.884: INFO: Execsync succeed | |
[1mSTEP[0m: check whether containerMntPoint contains file or dir in host | |
[1mSTEP[0m: clean up the TempDir | |
[AfterEach] runtime should support mount propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container Mount Propagation | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40 | |
[BeforeEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110 | |
[It] mount label should have category | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85 | |
[1mSTEP[0m: create a container with selinux | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
[1mSTEP[0m: start container with selinux | |
[1mSTEP[0m: Get container status for containerID: 9bc5e1259252006e208b949cbce0232bd9edb163c5d649cbb2fc3c8aec64dda9 | |
[AfterEach] when single pod sandbox is not privileged | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] SELinux | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50 | |
[It] runtime should support attach [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109 | |
[1mSTEP[0m: create a default container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:52.927: INFO: Created container "049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a | |
Jul 24 04:58:52.985: INFO: Started container "049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a" | |
[1mSTEP[0m: attach container: 049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a | |
Jul 24 04:58:52.985: INFO: Get attach url: http://127.0.0.1:46467/attach/Bh5B5vt0 | |
[1mSTEP[0m: check the output of attach | |
Jul 24 04:58:52.986: INFO: Parse url "http://127.0.0.1:46467/attach/Bh5B5vt0" succeed | |
Jul 24 04:58:57.992: INFO: Check attach url "http://127.0.0.1:46467/attach/Bh5B5vt0" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m• [SLOW TEST:7.386 seconds][0m | |
[k8s.io] Streaming | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
runtime should support streaming interfaces | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55[0m | |
runtime should support attach [Conformance] | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostNetwork is true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244 | |
[1mSTEP[0m: creating a podSandbox with hostNetwork true | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create a container in the sandbox | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:58.404: INFO: Created container "3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9 | |
Jul 24 04:58:58.462: INFO: Started container "3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9" | |
[1mSTEP[0m: checking host http service port in the container | |
Jul 24 04:58:58.462: INFO: Open log file /tmp/podLogTest053066886/NamespaceOption-PodSandbox-fdfb3de7-cda4-11ea-a3b7-5254001ff4e5/container-with-HostNetwork-test-0e6ff893-cda5-11ea-a3b7-5254001ff4e5.log | |
Jul 24 04:58:58.462: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m[36mS[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200 | |
[It] runtime should support starting container with volume when host path is a symlink [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228 | |
[1mSTEP[0m: create host path and flag file | |
[1mSTEP[0m: create symlink | |
[1mSTEP[0m: create volume container with symlink host path | |
[1mSTEP[0m: create a container with volume and name | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:58.998: INFO: Created container "7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2" | |
[1mSTEP[0m: test start volume container with symlink host path | |
[1mSTEP[0m: Start container for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2 | |
Jul 24 04:58:59.054: INFO: Started container "7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2" | |
[1mSTEP[0m: Get container status for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2 | |
[1mSTEP[0m: check whether 'symlink' contains file or dir in container | |
[1mSTEP[0m: execSync for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2 | |
Jul 24 04:58:59.082: INFO: Execsync succeed | |
[AfterEach] runtime should support adding volume and device | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33 | |
[It] runtime should support portforward in host network | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48 | |
[1mSTEP[0m: create a PodSandbox with container port port mapping in host network | |
[1mSTEP[0m: create a web server container | |
Jul 24 04:58:58.350: INFO: Use latest as default image tag. | |
[1mSTEP[0m: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:58.371: INFO: Created container "b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d" | |
[1mSTEP[0m: start the web server container | |
[1mSTEP[0m: Start container for containerID: b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d | |
Jul 24 04:58:58.442: INFO: Started container "b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d" | |
[1mSTEP[0m: port forward PodSandbox: c55ea5a97294085df285bacf0c34a5e7516c4ff5f12ebcaa0d6d25c6770662b1 | |
Jul 24 04:58:58.442: INFO: Get port forward url: http://127.0.0.1:46467/portforward/HIx406wE | |
[1mSTEP[0m: check the output of portforward | |
Jul 24 04:58:58.444: INFO: Parse url "http://127.0.0.1:46467/portforward/HIx406wE" succeed | |
[1mSTEP[0m: check if we can get nginx main page via localhost:12002 | |
[1mSTEP[0m: get the IP:port needed to be checked | |
Jul 24 04:58:58.444: INFO: the IP:port is http://127.0.0.1:12002 | |
[1mSTEP[0m: check the content of http://127.0.0.1:12002 | |
[1mSTEP[0m: start port forward | |
Forwarding from 127.0.0.1:12002 -> 12003 | |
Forwarding from [::1]:12002 -> 12003 | |
Handling connection for 12002 | |
Jul 24 04:58:59.452: INFO: check port mapping succeed | |
Jul 24 04:58:59.452: INFO: Check port forward url "http://127.0.0.1:46467/portforward/HIx406wE" succeed | |
[AfterEach] runtime should support streaming interfaces | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Streaming | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support starting container [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:59.414: INFO: Created container "c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029" | |
[1mSTEP[0m: test start container | |
[1mSTEP[0m: Start container for containerID: c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029 | |
Jul 24 04:58:59.478: INFO: Started container "c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029" | |
[1mSTEP[0m: Get container status for containerID: c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029 | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] SeccompProfilePath | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569 | |
[It] should support seccomp default which is unconfined on the container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609 | |
[1mSTEP[0m: create seccomp sandbox and container | |
[1mSTEP[0m: create seccomp sandbox | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:59.850: INFO: Created container "5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb | |
Jul 24 04:58:59.921: INFO: Started container "5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb" | |
[1mSTEP[0m: Get container status for containerID: 5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb | |
[1mSTEP[0m: verify seccomp profile | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support HostPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76 | |
[1mSTEP[0m: create podSandbox for security context HostPID | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:59.776: INFO: Created container "9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f | |
Jul 24 04:58:59.843: INFO: Started container "9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f" | |
[1mSTEP[0m: Get container status for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f | |
Jul 24 04:58:59.910: INFO: Execsync succeed | |
Jul 24 04:58:59.910: INFO: Nginx's pid is "" | |
[1mSTEP[0m: create busybox container with hostPID | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:59.933: INFO: Created container "6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d | |
Jul 24 04:59:00.007: INFO: Started container "6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d" | |
[1mSTEP[0m: Get container status for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d | |
[1mSTEP[0m: should show its pid in the hostPID namespace container | |
[1mSTEP[0m: execSync for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d | |
Jul 24 04:59:00.044: INFO: Execsync succeed | |
Jul 24 04:59:00.044: INFO: Got nginx's pid "147201 147133" from pod "nginx-container-0f41d74a-cda5-11ea-a543-5254001ff4e5" | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63 | |
[BeforeEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72 | |
[It] runtime should support execSync [Conformance] | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150 | |
[1mSTEP[0m: create container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:59:00.255: INFO: Created container "d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1 | |
Jul 24 04:59:00.319: INFO: Started container "d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1" | |
[1mSTEP[0m: test execSync | |
[1mSTEP[0m: verify execSync output | |
[1mSTEP[0m: execSync for containerID: d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1 | |
Jul 24 04:59:00.346: INFO: Execsync succeed | |
Jul 24 04:59:00.346: INFO: verify Execsync output succeed | |
[AfterEach] runtime should support basic operations on container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[AfterEach] [k8s.io] Container | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support that ReadOnlyRootfs is false | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384 | |
[1mSTEP[0m: create pod with log | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[1mSTEP[0m: create container with ReadOnlyRootfs_false | |
[1mSTEP[0m: create ReadOnlyRootfs container | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:56.755: INFO: Created container "7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7 | |
Jul 24 04:58:56.812: INFO: Started container "7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7" | |
[1mSTEP[0m: Get container status for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7 | |
[1mSTEP[0m: Get container status for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7 | |
[1mSTEP[0m: Check whether rootfs is writable | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:59:00.822: INFO: Open log file /tmp/podLogTest292950821/PodSandbox-with-log-directory-0c2dba0b-cda5-11ea-887e-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-0d74d333-cda5-11ea-887e-5254001ff4e5.log | |
Jul 24 04:59:00.822: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:6.415 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
bucket | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287[0m | |
runtime should support that ReadOnlyRootfs is false | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support SupplementalGroups | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288 | |
[1mSTEP[0m: create pod | |
[1mSTEP[0m: create container for security context SupplementalGroups | |
[1mSTEP[0m: Get image status for image: busybox:1.28 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:59:01.275: INFO: Created container "a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47 | |
Jul 24 04:59:01.351: INFO: Started container "a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47" | |
[1mSTEP[0m: Get container status for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47 | |
[1mSTEP[0m: verify SupplementalGroups for container | |
[1mSTEP[0m: execSync for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47 | |
Jul 24 04:59:01.387: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[It] runtime should support ContainerPID | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220 | |
[1mSTEP[0m: create podSandbox with PID set to container | |
Jul 24 04:58:59.570: INFO: Pid namespace is "CONTAINER" | |
[1mSTEP[0m: create NamespaceOption podSandbox | |
[1mSTEP[0m: create nginx container | |
[1mSTEP[0m: create NamespaceOption container | |
[1mSTEP[0m: Get image status for image: nginx:1.18 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:59:01.314: INFO: Created container "1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615" | |
[1mSTEP[0m: start container | |
[1mSTEP[0m: Start container for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615 | |
Jul 24 04:59:01.371: INFO: Started container "1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615" | |
[1mSTEP[0m: Get container status for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615 | |
[1mSTEP[0m: get nginx container pid | |
[1mSTEP[0m: execSync for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615 | |
Jul 24 04:59:01.411: INFO: Execsync succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m•[0m | |
[90m------------------------------[0m | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50 | |
[BeforeEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53 | |
[BeforeEach] NoNewPrivs | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726 | |
[1mSTEP[0m: create a PodSandbox with log directory | |
[It] should not allow privilege escalation when true | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755 | |
[1mSTEP[0m: create container alpine-nnp-true-0df9726f-cda5-11ea-a38f-5254001ff4e5 | |
[1mSTEP[0m: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1 | |
[1mSTEP[0m: Create container. | |
Jul 24 04:58:57.641: INFO: Created container "a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9" | |
[1mSTEP[0m: Start container for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9 | |
Jul 24 04:58:57.741: INFO: Started container "a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9" | |
[1mSTEP[0m: Get container status for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9 | |
[1mSTEP[0m: Get container status for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9 | |
[1mSTEP[0m: check container output | |
[1mSTEP[0m: verify log contents | |
Jul 24 04:59:01.742: INFO: Open log file /tmp/podLogTest692783919/PodSandbox-with-log-directory-0ce48ca5-cda5-11ea-a38f-5254001ff4e5/alpine-nnp-true-0df9726f-cda5-11ea-a38f-5254001ff4e5.log | |
Jul 24 04:59:01.742: INFO: Parse container log succeed | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51 | |
[AfterEach] [k8s.io] Security Context | |
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58 | |
[1mSTEP[0m: stop PodSandbox | |
[1mSTEP[0m: delete PodSandbox | |
[32m• [SLOW TEST:6.132 seconds][0m | |
[k8s.io] Security Context | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72[0m | |
NoNewPrivs | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725[0m | |
should not allow privilege escalation when true | |
[90m/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755[0m | |
[90m------------------------------[0m | |
[1m[32mRan 90 of 97 Specs in 31.143 seconds[0m | |
[1m[32mSUCCESS![0m -- [32m[1m90 Passed[0m | [91m[1m0 Failed[0m | [33m[1m0 Pending[0m | [36m[1m7 Skipped[0m | |
Ginkgo ran 1 suite in 31.175024916s | |
Test Suite Passed | |
PASS | |
./hack/test-utils.sh: line 107: 129696 Terminated keepalive "sudo PATH=${PATH} ${GOBIN%/}/${CONTAINERD_BIN} ${CONTAINERD_FLAGS}" ${RESTART_WAIT_PERIOD} &> ${report_dir}/containerd.log |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment