Skip to content

Instantly share code, notes, and snippets.

@dweomer
Created July 27, 2020 16:51
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save dweomer/899a34a0873c6bd4087c04a744bf64be to your computer and use it in GitHub Desktop.
Save dweomer/899a34a0873c6bd4087c04a744bf64be to your computer and use it in GitHub Desktop.
containerd-1.3.0-k3s-dev
🇩 binaries
🇩 test-cri
/go/bin/critest
'/go/src/github.com/containerd/cri/hack/../_output/containerd' -> '/usr/local/bin/containerd-test'
changing security context of '/usr/local/bin/containerd-test'
make[1]: Entering directory '/go/src/github.com/containerd/cri/test/selinux/policy'
rm -fR tmp
rm -f *.pp
/usr/share/selinux/devel/include/services/container.if:13: Error: duplicate definition of container_runtime_domtrans(). Original definition on 13.
/usr/share/selinux/devel/include/services/container.if:40: Error: duplicate definition of container_runtime_run(). Original definition on 40.
/usr/share/selinux/devel/include/services/container.if:60: Error: duplicate definition of container_runtime_exec(). Original definition on 60.
/usr/share/selinux/devel/include/services/container.if:79: Error: duplicate definition of container_read_state(). Original definition on 79.
/usr/share/selinux/devel/include/services/container.if:97: Error: duplicate definition of container_search_lib(). Original definition on 97.
/usr/share/selinux/devel/include/services/container.if:116: Error: duplicate definition of container_exec_lib(). Original definition on 116.
/usr/share/selinux/devel/include/services/container.if:135: Error: duplicate definition of container_read_lib_files(). Original definition on 135.
/usr/share/selinux/devel/include/services/container.if:154: Error: duplicate definition of container_read_share_files(). Original definition on 154.
/usr/share/selinux/devel/include/services/container.if:175: Error: duplicate definition of container_runtime_read_tmpfs_files(). Original definition on 175.
/usr/share/selinux/devel/include/services/container.if:196: Error: duplicate definition of container_manage_share_files(). Original definition on 196.
/usr/share/selinux/devel/include/services/container.if:217: Error: duplicate definition of container_manage_share_dirs(). Original definition on 217.
/usr/share/selinux/devel/include/services/container.if:237: Error: duplicate definition of container_exec_share_files(). Original definition on 237.
/usr/share/selinux/devel/include/services/container.if:255: Error: duplicate definition of container_manage_config_files(). Original definition on 255.
/usr/share/selinux/devel/include/services/container.if:274: Error: duplicate definition of container_manage_lib_files(). Original definition on 274.
/usr/share/selinux/devel/include/services/container.if:294: Error: duplicate definition of container_manage_files(). Original definition on 294.
/usr/share/selinux/devel/include/services/container.if:313: Error: duplicate definition of container_manage_dirs(). Original definition on 313.
/usr/share/selinux/devel/include/services/container.if:331: Error: duplicate definition of container_manage_lib_dirs(). Original definition on 331.
/usr/share/selinux/devel/include/services/container.if:367: Error: duplicate definition of container_lib_filetrans(). Original definition on 367.
/usr/share/selinux/devel/include/services/container.if:385: Error: duplicate definition of container_read_pid_files(). Original definition on 385.
/usr/share/selinux/devel/include/services/container.if:404: Error: duplicate definition of container_systemctl(). Original definition on 404.
/usr/share/selinux/devel/include/services/container.if:429: Error: duplicate definition of container_rw_sem(). Original definition on 429.
/usr/share/selinux/devel/include/services/container.if:448: Error: duplicate definition of container_append_file(). Original definition on 448.
/usr/share/selinux/devel/include/services/container.if:466: Error: duplicate definition of container_use_ptys(). Original definition on 466.
/usr/share/selinux/devel/include/services/container.if:484: Error: duplicate definition of container_filetrans_named_content(). Original definition on 484.
/usr/share/selinux/devel/include/services/container.if:537: Error: duplicate definition of container_stream_connect(). Original definition on 543.
/usr/share/selinux/devel/include/services/container.if:558: Error: duplicate definition of container_spc_stream_connect(). Original definition on 564.
/usr/share/selinux/devel/include/services/container.if:579: Error: duplicate definition of container_admin(). Original definition on 585.
/usr/share/selinux/devel/include/services/container.if:626: Error: duplicate definition of container_auth_domtrans(). Original definition on 632.
/usr/share/selinux/devel/include/services/container.if:645: Error: duplicate definition of container_auth_exec(). Original definition on 651.
/usr/share/selinux/devel/include/services/container.if:664: Error: duplicate definition of container_auth_stream_connect(). Original definition on 670.
/usr/share/selinux/devel/include/services/container.if:683: Error: duplicate definition of container_runtime_typebounds(). Original definition on 689.
/usr/share/selinux/devel/include/services/container.if:702: Error: duplicate definition of container_runtime_entrypoint(). Original definition on 708.
/usr/share/selinux/devel/include/services/container.if:709: Error: duplicate definition of docker_exec_lib(). Original definition on 715.
/usr/share/selinux/devel/include/services/container.if:713: Error: duplicate definition of docker_read_share_files(). Original definition on 719.
/usr/share/selinux/devel/include/services/container.if:717: Error: duplicate definition of docker_exec_share_files(). Original definition on 723.
/usr/share/selinux/devel/include/services/container.if:721: Error: duplicate definition of docker_manage_lib_files(). Original definition on 727.
/usr/share/selinux/devel/include/services/container.if:726: Error: duplicate definition of docker_manage_lib_dirs(). Original definition on 732.
/usr/share/selinux/devel/include/services/container.if:730: Error: duplicate definition of docker_lib_filetrans(). Original definition on 736.
/usr/share/selinux/devel/include/services/container.if:734: Error: duplicate definition of docker_read_pid_files(). Original definition on 740.
/usr/share/selinux/devel/include/services/container.if:738: Error: duplicate definition of docker_systemctl(). Original definition on 744.
/usr/share/selinux/devel/include/services/container.if:742: Error: duplicate definition of docker_use_ptys(). Original definition on 748.
/usr/share/selinux/devel/include/services/container.if:746: Error: duplicate definition of docker_stream_connect(). Original definition on 752.
/usr/share/selinux/devel/include/services/container.if:750: Error: duplicate definition of docker_spc_stream_connect(). Original definition on 756.
/usr/share/selinux/devel/include/services/container.if:764: Error: duplicate definition of container_spc_read_state(). Original definition on 770.
/usr/share/selinux/devel/include/services/container.if:783: Error: duplicate definition of container_runtime_domain_template(). Original definition on 789.
/usr/share/selinux/devel/include/services/container.if:819: Error: duplicate definition of container_domain_template(). Original definition on 825.
/usr/share/selinux/devel/include/services/container.if:847: Error: duplicate definition of container_spc_rw_pipes(). Original definition on 853.
Compiling targeted containerd-test module
Creating targeted containerd-test.pp policy package
rm tmp/containerd-test.mod tmp/containerd-test.mod.fc
make[1]: Leaving directory '/go/src/github.com/containerd/cri/test/selinux/policy'
mkdir: created directory '/var/lib/containerd-test'
mkdir: created directory '/run/containerd-test'
Relabeled /var/lib/containerd-test from unconfined_u:object_r:var_lib_t:s0 to unconfined_u:object_r:container_var_lib_t:s0
Relabeled /run/containerd-test from unconfined_u:object_r:var_run_t:s0 to unconfined_u:object_r:container_var_run_t:s0
critest version: 1.18.0-89-gbaca4a1
Running Suite: CRI validation
=============================
Random Seed: 123456789 - Will randomize all specs
Will run 97 specs
Running in parallel across 8 nodes
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return runtime conditions [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
STEP: test runtime status
[AfterEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•SS
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with digest should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:12.495 seconds]
[k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
public image with digest should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with tag should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Pull image : gcr.io/cri-tools/test-image-tag:test
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:12.813 seconds]
[k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
public image with tag should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should return error if RunAsGroup is set without RunAsUser
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
STEP: create pod
STEP: create container with invalid RunAsGroup
STEP: create invalid RunAsGroup container
STEP: create a container with RunAsGroup without RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
E0724 05:01:41.691111 148476 remote_runtime.go:200] CreateContainer in sandbox "e3f5a670100e8307ff7343fb8ec53b9e6f144e35ff063b6bdef1256de3cb0b44" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:31.370 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should return error if RunAsGroup is set without RunAsUser
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing stopped container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.809: INFO: Created container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7"
STEP: start container
STEP: Start container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7
Jul 24 05:01:42.034: INFO: Started container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7"
STEP: test stop container
STEP: Stop container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7
Jul 24 05:01:42.142: INFO: Stopped container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7"
STEP: Get container status for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7
STEP: test remove container
STEP: Remove container for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7
Jul 24 05:01:42.149: INFO: Removed container "7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7"
STEP: List containers for containerID: 7752e5f99363c15b96632b4a89f9d2b08309a228e6cec176e3abf5bfc16deab7
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:31.867 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68
runtime should support removing stopped container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests253375585/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.792: INFO: Created container "83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65"
STEP: Start container for containerID: 83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65
Jul 24 05:01:41.985: INFO: Started container "83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65"
STEP: Get container status for containerID: 83f00590cec125c7ec47524f1e3f6a54d396b0f84e21367d4e32d6e1504c9d65
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:31.933 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:542
runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
STEP: creating a podSandbox with hostNetwork false
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.843: INFO: Created container "2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca"
STEP: start container
STEP: Start container for containerID: 2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca
Jul 24 05:01:42.046: INFO: Started container "2fb262bcd785b78bad775891357f20c047804f410c5fc39c85aa25d757d43eca"
STEP: checking host http service port in the container
Jul 24 05:01:42.046: INFO: Open log file /tmp/podLogTest356303876/NamespaceOption-PodSandbox-5d3edeaf-cda5-11ea-be9e-5254001ff4e5/container-with-HostNetwork-test-65ae8ecc-cda5-11ea-be9e-5254001ff4e5.log
Jul 24 05:01:42.046: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:31.994 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support HostNetwork is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with just selinux level set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f337b4c1bb0bf5ce9907943a265d37ac8a16eb47e7585ca2ca35d33ea252346a
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [32.003 seconds]
[k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109
should work with just selinux level set [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
cmd [touch foo], stdout "", stderr "touch: foo: Permission denied\n"
Unexpected error:
<exec.CodeExitError>: {
Err: {
s: "command 'touch foo' exited with 1: touch: foo: Permission denied\n",
},
Code: 1,
}
command 'touch foo' exited with 1: touch: foo: Permission denied
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=false and stdin=false [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.858: INFO: Created container "5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046"
STEP: start container
STEP: Start container for containerID: 5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046
Jul 24 05:01:42.101: INFO: Started container "5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046"
STEP: exec given command in container: 5c05af67530c7439d9a8afc85e214f3fdd383eca93e5411c9af98895e95a4046
Jul 24 05:01:42.105: INFO: Get exec url: http://127.0.0.1:35803/exec/D4yRA2Rt
STEP: check the output of exec
Jul 24 05:01:42.110: INFO: Parse url "http://127.0.0.1:35803/exec/D4yRA2Rt" succeed
Jul 24 05:01:42.205: INFO: Check exec url "http://127.0.0.1:35803/exec/D4yRA2Rt" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:19.579 seconds]
[k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support exec with tty=false and stdin=false [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync with timeout [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.761: INFO: Created container "492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb"
STEP: start container
STEP: Start container for containerID: 492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb
Jul 24 05:01:41.866: INFO: Started container "492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb"
STEP: test execSync with timeout
E0724 05:01:42.987845 148484 remote_runtime.go:351] ExecSync 492092679187a79571ee78d1e4838186af3a463d9e1a64e7abaa9b949af6d0fb 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded
STEP: timeout exec process should be gone
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:32.570 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:68
runtime should support execSync with timeout [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support MaskedPaths
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
STEP: create pod
STEP: create container with MaskedPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:43.979: INFO: Created container "00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e"
STEP: Start container for containerID: 00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e
Jul 24 05:01:44.029: INFO: Started container "00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e"
STEP: Get container status for containerID: 00d689853dd85888fd18b371fbff9c7caa78089b7f411908988460cdfc8cdf4e
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support unsafe sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:44.509: INFO: Created container "dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d"
STEP: start container
STEP: Start container for containerID: dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d
Jul 24 05:01:44.566: INFO: Started container "dbb5443cad63abcda15f34b5cba35dae47567210c3bf05bd8b9257db1760c71d"
STEP: check sysctls fs.mqueue.msg_max
[AfterEach] runtime should support sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support stopping PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
STEP: run PodSandbox
STEP: test stop PodSandbox
STEP: Stop PodSandbox for podID: 2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e
Jul 24 05:01:45.128: INFO: Stopped PodSandbox "2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e"
STEP: Get PodSandbox status for podID: 2e7dde315059d7947815a5cc164884a3bc0b8db690b869cec7e285e81f5a114e
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIPC is true
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:44.696: INFO: Created container "5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1"
STEP: start container
STEP: Start container for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1
Jul 24 05:01:44.819: INFO: Started container "5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1"
STEP: Get container status for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1
STEP: check if the shared memory segment is included in the container
STEP: execSync for containerID: 5954c6018817b6dbdb97f2945387a819c113c1ce8f8889c2f7934c9c519fa5a1
Jul 24 05:01:44.887: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUserName
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUserName container
STEP: create a container with RunAsUserName
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:44.889: INFO: Created container "883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace"
STEP: start container
STEP: Start container for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace
Jul 24 05:01:44.975: INFO: Started container "883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace"
STEP: Get container status for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace
STEP: verify RunAsUserName for container
STEP: verify execSync output
STEP: execSync for containerID: 883f935a8bff9169dfa8aeadf81d126ef985b19be58f8712f97b704011b69ace
Jul 24 05:01:45.027: INFO: Execsync succeed
Jul 24 05:01:45.027: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support stopping container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:45.352: INFO: Created container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3"
STEP: start container
STEP: Start container for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3
Jul 24 05:01:45.415: INFO: Started container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3"
STEP: test stop container
STEP: Stop container for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3
Jul 24 05:01:45.450: INFO: Stopped container "1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3"
STEP: Get container status for containerID: 1247667c530f6e4a41858ec0223797737863722d1b7b6f87f543199027ae04e3
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status should support all kinds of references [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Pull image : gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsGroup
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
STEP: create pod
STEP: create a PodSandbox with log directory
STEP: create container for security context RunAsGroup
STEP: create RunAsGroup container
STEP: create a container with RunAsUser and RunAsGroup
STEP: Get image status for image: busybox:1.28
STEP: Pull image : docker.io/library/busybox:1.28
STEP: Create container.
Jul 24 05:01:41.832: INFO: Created container "2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c"
STEP: start container
STEP: Start container for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c
Jul 24 05:01:42.091: INFO: Started container "2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c"
STEP: Get container status for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c
STEP: Get container status for containerID: 2054b5e32fbb020a9512ba6b014306c43245cb77672af76913334cee3b93266c
STEP: verify RunAsGroup for container
STEP: check container output
STEP: verify log contents
Jul 24 05:01:46.093: INFO: Open log file /tmp/podLogTest047319475/PodSandbox-with-log-directory-64e4d9a2-cda5-11ea-a2c4-5254001ff4e5/container-with-RunAsGroup-test-661b5a93-cda5-11ea-a2c4-5254001ff4e5.log
Jul 24 05:01:46.093: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:22.957 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support RunAsGroup
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should create containers with the same process label
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: ccb4f592df4273324f2f1f014f15d1c1a5ff2f9f5d5687e8d328ac0f9b618f56
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 59b40ec6c2b5aa668e32f67bafe63797425b9e1f56f3affdae2f745b3a4f581f
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp unconfined on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:47.154: INFO: Created container "f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0"
STEP: start container
STEP: Start container for containerID: f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0
Jul 24 05:01:47.217: INFO: Started container "f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0"
STEP: Get container status for containerID: f6921ae3a2a021e126da2d4385ccf14dfe5d5c20861b7aef2721a3f23d344ed0
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing created container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:47.628: INFO: Created container "4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109"
STEP: test remove container
STEP: Remove container for containerID: 4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109
Jul 24 05:01:47.634: INFO: Removed container "4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109"
STEP: List containers for containerID: 4041514088bcc807d28d739c36ed223da4ef0aecb46acc63f96e098734465109
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support creating container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
STEP: test create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:47.843: INFO: Created container "61dce613c8975006694fd432d3ed2ca0f26a87eab966c694d20d5f6b78e12824"
STEP: test list container
STEP: List containers for containerID: 61dce613c8975006694fd432d3ed2ca0f26a87eab966c694d20d5f6b78e12824
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with just selinux level set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: dff55aa8521dac138b73f99f4ff578a699a2184ff31e36c579484e08dd2c2a67
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support DNS config [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
STEP: create a PodSandbox with DNS config
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:48.832: INFO: Created container "586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c"
STEP: start container
STEP: Start container for containerID: 586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c
Jul 24 05:01:48.934: INFO: Started container "586910234bb05b702c07e0d996a7dd1b216df183896f995876be62a9584f383c"
STEP: check DNS config
STEP: get the current dns config via execSync
Jul 24 05:01:49.004: INFO: check DNS config succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rshared' should support propagation from host to container and vice versa
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:48.832: INFO: Created container "7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4"
STEP: test start container with volume
STEP: Start container for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4
Jul 24 05:01:48.934: INFO: Started container "7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4"
STEP: Get container status for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4
Jul 24 05:01:48.992: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4
Jul 24 05:01:49.040: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 7071c4946894e31b860896ab55bf9ed53a41ec6b9eb3a8e940ad009c5695b0c4
Jul 24 05:01:49.075: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should error on create with wrong options
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:01:50.117496 148433 remote_runtime.go:200] CreateContainer in sandbox "2ef11485c268a09f7ca35fc3905d27ba050bc719988760fd7ecb8a16838fd2ce" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "934e1013af04282a6adc9c4bb481b9b68812de235ae2d337669febee4eed5f99" spec: the format of 'level' "s0,c4,c5" is not correct
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=true and stdin=true [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:50.281: INFO: Created container "6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe"
STEP: start container
STEP: Start container for containerID: 6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe
Jul 24 05:01:50.455: INFO: Started container "6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe"
STEP: exec given command in container: 6cdeff03ffdb79620d57cadd83ccba0462aefca277828f54db8e22a75429e9fe
Jul 24 05:01:50.455: INFO: Get exec url: http://127.0.0.1:35803/exec/JT-ACn6e
STEP: check the output of exec
Jul 24 05:01:50.456: INFO: Parse url "http://127.0.0.1:35803/exec/JT-ACn6e" succeed
Jul 24 05:01:50.564: INFO: Check exec url "http://127.0.0.1:35803/exec/JT-ACn6e" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rprivate' should not support propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:50.294: INFO: Created container "85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c"
STEP: test start container with volume
STEP: Start container for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c
Jul 24 05:01:50.481: INFO: Started container "85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c"
STEP: Get container status for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c
Jul 24 05:01:50.601: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c
Jul 24 05:01:50.664: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 85581826e119faa1a4ba0ac175990495031ff0056a58bccbbc34007accd3289c
Jul 24 05:01:50.716: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support running PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
STEP: test run a default PodSandbox
STEP: Get PodSandbox status for podID: 2be641bb12309355b82e0cbfe8b5eff5d1350437c241ae55e2ae3f5f72f13a73
STEP: test list PodSandbox
STEP: List PodSandbox for podID: 2be641bb12309355b82e0cbfe8b5eff5d1350437c241ae55e2ae3f5f72f13a73
STEP: List PodSandbox.
Jul 24 05:01:51.786: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support PodPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
STEP: create podSandbox for sharing process namespace
Jul 24 05:01:46.383: INFO: Pid namespace is "POD"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Pull image : docker.io/library/nginx:1.18
STEP: Create container.
Jul 24 05:01:51.631: INFO: Created container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849"
STEP: start container
STEP: Start container for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849
Jul 24 05:01:51.719: INFO: Started container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849"
STEP: Get container status for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849
STEP: get nginx container pid
STEP: execSync for containerID: 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849
E0724 05:01:52.722130 148434 remote_runtime.go:351] ExecSync 9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849 'cat /proc/1/cmdline' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
Jul 24 05:01:52.722: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• Failure [6.522 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support PodPID [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
failed to execSync in container "9ae16d5cada88d45e8eeb9e5d6a3294754cc1213be70ecc7daaa3ee68e912849"
Unexpected error:
<*status.statusError | 0xc00051da90>: {
Code: 2,
Message: "failed to exec in container: container is in CONTAINER_EXITED state",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support setting Capability
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
STEP: create pod
STEP: create container with security context Capability and test
STEP: create Capability container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:52.766: INFO: Created container "33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084"
STEP: Start container for containerID: 33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084
Jul 24 05:01:52.837: INFO: Started container "33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084"
STEP: Get container status for containerID: 33bc6b7dab478013bf6ceacf95d0d2c4f43a553def0c0f4143b135e71f416084
STEP: create container without security context Capability and test
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:52.886: INFO: Created container "be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76"
STEP: Start container for containerID: be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76
Jul 24 05:01:52.953: INFO: Started container "be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76"
STEP: Get container status for containerID: be0b5bc77b1db805c3047399f92e9722d0476748ef36f5b6ad3253491a7f6d76
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:53.098: INFO: Created container "584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd"
STEP: test start container with volume
STEP: Start container for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd
Jul 24 05:01:53.171: INFO: Started container "584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd"
STEP: Get container status for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd
STEP: check whether 'hostPath' contains file or dir in container
STEP: execSync for containerID: 584c23697dbf664c50268abcc37683aa75f1a644fc773adc0e44ec15b23826cd
Jul 24 05:01:53.204: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIpc is false
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:53.406: INFO: Created container "5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee"
STEP: start container
STEP: Start container for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee
Jul 24 05:01:53.479: INFO: Started container "5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee"
STEP: Get container status for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee
STEP: check if the shared memory segment is not included in the container
STEP: execSync for containerID: 5c6023691106073dba799fb40fa10e7283c8c226dd846a93cbf6609f803fa6ee
Jul 24 05:01:53.536: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with selinux set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: cdb7feaac9f1340e565256ef0e5a7b2d8e55021ba29947740e7064d3a1dcd7a6
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [2.474 seconds]
[k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support selinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:45
when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:109
should work with selinux set [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
cmd [touch foo], stdout "", stderr "touch: foo: Permission denied\n"
Unexpected error:
<exec.CodeExitError>: {
Err: {
s: "command 'touch foo' exited with 1: touch: foo: Permission denied\n",
},
Code: 1,
}
command 'touch foo' exited with 1: touch: foo: Permission denied
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_true
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:50.249: INFO: Created container "e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066"
STEP: start container
STEP: Start container for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066
Jul 24 05:01:50.568: INFO: Started container "e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066"
STEP: Get container status for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066
STEP: Get container status for containerID: e9f46ecbf89ef5e56aaf0369958ab339b61b22cee33cab504a879cf8d5163066
STEP: Check whether rootfs is read-only
STEP: verify log contents
Jul 24 05:01:54.572: INFO: Open log file /tmp/podLogTest078226481/PodSandbox-with-log-directory-73a24db7-cda5-11ea-9a18-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-74dd9e75-cda5-11ea-9a18-5254001ff4e5.log
Jul 24 05:01:54.572: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:6.791 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support that ReadOnlyRootfs is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
------------------------------
S
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 74de3f108125f614ef7601e51e732f45716fe2cbf62f62f3c569806802e2d77a
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create unconfined Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:55.299: INFO: Created container "4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871"
STEP: Start container for containerID: 4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871
Jul 24 05:01:55.419: INFO: Started container "4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871"
STEP: Get container status for containerID: 4432acb6a6932d595ce651770ecd373b8539557c26dd651cd98ece7381270871
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return version info [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
Jul 24 05:01:55.916: INFO: Get version info succeed
[AfterEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support set hostname [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
STEP: create a PodSandbox with hostname
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:55.541: INFO: Created container "a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729"
STEP: start container
STEP: Start container for containerID: a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729
Jul 24 05:01:55.732: INFO: Started container "a6f79f66727919caa96e7ea25231f896540807d3ed32b98fd41b7ea03111a729"
STEP: check hostname
STEP: get the current hostname via execSync
Jul 24 05:01:55.829: INFO: check hostname succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create /tmp/seccomp-tests669110237/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:01:56.279597 148476 remote_runtime.go:200] CreateContainer in sandbox "4cb48570f6d67d01d883b5193daf69ac3cc7f337561c0dca4ddba21f94deca0c" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests669110237/block-host-name.json"
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:55.698: INFO: Created container "8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491"
STEP: Start container for containerID: 8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491
Jul 24 05:01:56.050: INFO: Started container "8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491"
STEP: Get container status for containerID: 8c0e0ba8a24660ef2045fbe1c86f1356b501d54371769bb95f896abd1239a491
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp localhost/profile on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:57.712: INFO: Created container "1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc"
STEP: start container
STEP: Start container for containerID: 1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc
Jul 24 05:01:57.781: INFO: Started container "1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc"
STEP: Get container status for containerID: 1df3abfb294ea9535d2bc9e220b5b99e7bf1c9eb859e20b5abd63c316ddaf0bc
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status get image fields should not have Uid|Username empty [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
Jul 24 05:01:54.946: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid
Jul 24 05:01:55.881: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username
Jul 24 05:01:56.589: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group
Jul 24 05:01:57.392: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image : gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid-group
STEP: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665
STEP: Remove image : gcr.io/cri-tools/test-image-user-username
STEP: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid
STEP: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:57.505: INFO: Created container "26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14"
STEP: Start container for containerID: 26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14
Jul 24 05:01:57.716: INFO: Started container "26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14"
STEP: Get container status for containerID: 26323f27e8a9328b852f9d97b58979cdc314afe5f09ea86c03e7c4bc0f513e14
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 8bc38916956dc4c2a7f819dde47630f06f8c35dd0c6d682195bfa8289b8dc117
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 464a81762ba11334f563ae40ed4a0393be40236f795a333e30f33349bca4ee7e
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 repoTags in the result image [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
STEP: Pull image : gcr.io/cri-tools/test-image-tags:1
STEP: Pull image : gcr.io/cri-tools/test-image-tags:2
STEP: Pull image : gcr.io/cri-tools/test-image-tags:3
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 44d96927da87bfa04f98e44ed8d797f0ba7420a5f60876fdc268903ecdcdbb45
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f25678a2591af9c214070b1556abc3def468d0b9297e83f60eb18182bb87ff7b
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 image in the result list [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Pull image : gcr.io/cri-tools/test-image-1:latest
STEP: Pull image : gcr.io/cri-tools/test-image-2:latest
STEP: Pull image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support listing container stats [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:02.624: INFO: Created container "a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee"
STEP: start container
STEP: Start container for containerID: a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee
Jul 24 05:02:02.689: INFO: Started container "a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee"
STEP: test container stats
STEP: List container stats for containerID: a69a61806b2d165303d2120108dc21001de2da2d3537e9d95f02fdaf91e295ee
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:02:02.594: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:02:02.617: INFO: Created container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b"
STEP: start the httpd container
STEP: Start container for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b
Jul 24 05:02:02.716: INFO: Started container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b"
STEP: Get container status for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:02.730: INFO: Created container "ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1"
STEP: start the busybox container
STEP: Start container for containerID: ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1
Jul 24 05:02:02.815: INFO: Started container "ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1"
STEP: Get container status for containerID: ccf1f39ff5065137b549df53e198a5ae5f62af1211cddf820e5f0ebc550833c1
[It] should support container exec
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
STEP: execSync for containerID: 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b
E0724 05:02:02.815910 148450 remote_runtime.go:351] ExecSync 7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b 'echo httpd' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
Jul 24 05:02:02.815: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [2.294 seconds]
[k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support container exec [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
failed to execSync in container "7ff7395737bd0b03ac0bebbc1b78a324213dc149bfdfbe9041698b3e4a04330b"
Unexpected error:
<*status.statusError | 0xc00022e410>: {
Code: 2,
Message: "failed to exec in container: container is in CONTAINER_EXITED state",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to exec in container: container is in CONTAINER_EXITED state
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should error on create with wrong options
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 05:02:04.033861 148434 remote_runtime.go:200] CreateContainer in sandbox "5306aa816f706ee12b1bd7ffdd310da8f7ae6c4bfc6bf4a1d5d7dcf4c3cd6e05" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "84d211c9592b24a26d6a3ef204a48f63e40447d5d2366eb4341f9f1e5518c073" spec: the format of 'level' "s0,c4,c5" is not correct
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support starting container with log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:00.564: INFO: Created container "69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb"
STEP: start container with log
STEP: Start container for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb
Jul 24 05:02:00.688: INFO: Started container "69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb"
STEP: Get container status for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb
STEP: Get container status for containerID: 69d4e3778035e6eefc6fc8e6e074878306b01e35da77a4938d73b94f174ddbdb
STEP: check the log context
STEP: verify log contents
Jul 24 05:02:04.692: INFO: Open log file /tmp/podLogTest329027389/PodSandbox-with-log-directory-79a9c1d6-cda5-11ea-b6c2-5254001ff4e5/container-with-log-test-7b05ae85-cda5-11ea-b6c2-5254001ff4e5.log
Jul 24 05:02:04.692: INFO: Parse container log succeed
[AfterEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:6.604 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support starting container with log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with selinux set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 36a9e6782cdf4258a7b675efbeedd5e4e24d759dd472574e27f4034615d1e055
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image without tag should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
STEP: Remove image : gcr.io/cri-tools/test-image-latest
Jul 24 05:02:04.874: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-latest:latest
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should allow privilege escalation when false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
STEP: create container alpine-nnp-false-7af5db26-cda5-11ea-9a18-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Pull image : gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:02:01.766: INFO: Created container "55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea"
STEP: Start container for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea
Jul 24 05:02:01.829: INFO: Started container "55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea"
STEP: Get container status for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea
STEP: Get container status for containerID: 55438b1ea9f7c416c2e46792ed42b26478528b73f91875550a63caf3c1db20ea
STEP: check container output
STEP: verify log contents
Jul 24 05:02:05.830: INFO: Open log file /tmp/podLogTest673013749/PodSandbox-with-log-directory-79a68c33-cda5-11ea-9a18-5254001ff4e5/alpine-nnp-false-7af5db26-cda5-11ea-9a18-5254001ff4e5.log
Jul 24 05:02:05.830: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:7.803 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725
should allow privilege escalation when false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support removing PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
STEP: run PodSandbox
STEP: stop PodSandbox
STEP: Stop PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea
Jul 24 05:02:06.369: INFO: Stopped PodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea"
STEP: test remove PodSandbox
STEP: Remove PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea
Jul 24 05:02:06.378: INFO: Removed PodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea"
STEP: List PodSandbox for podID: 77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea
STEP: List PodSandbox.
Jul 24 05:02:06.378: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
E0724 05:02:06.379184 148434 remote_runtime.go:128] StopPodSandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "77dabcf44bfb9d0dcf8ebf618d4da10c224d3804d542d57b94fcb0bb683c2dea": does not exist
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:07.744: INFO: Created container "35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5"
STEP: start container
STEP: Start container for containerID: 35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5
Jul 24 05:02:07.812: INFO: Started container "35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5"
STEP: Get container status for containerID: 35bd3600c3ff3823b4d9489cdcaab1076289b3743c27c78b847ad421e21fe3b5
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp docker/default on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:08.044: INFO: Created container "9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5"
STEP: start container
STEP: Start container for containerID: 9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5
Jul 24 05:02:08.233: INFO: Started container "9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5"
STEP: Get container status for containerID: 9bb966c02a1f987da982427da4cc72abebfe73fe65075e5d5f068f02e7adf1a5
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
STEP: create privileged pod
STEP: create Privileged podSandbox
STEP: create privileged container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests550062367/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:08.430: INFO: Created container "5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b"
STEP: Start container for containerID: 5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b
Jul 24 05:02:08.496: INFO: Started container "5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b"
STEP: Get container status for containerID: 5d143cabc8b3db40ba13d2d5e28398878efce594798dc516a0d4fde63b58470b
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f71ba897bd6882efce4c7e3eec30af1e366f50151f7e8802535bef30184d80fb
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when multiple pod sandboxes are not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137
[It] should create containers with different process labels
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: a71d682b7da785bab0fd45f1ad9471a3421e23841d1efc2c7676629a8e91ea75
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: eaeab879d380a5a9b46eb2759d2d36a77577a211db21b9e7a3abd9a4cdd883b3
[AfterEach] when multiple pod sandboxes are not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should create containers with the same process label
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 034346d7446ab1f9d3e0ba340e86aae337c505d6ed83c8c6b7e505551bd82890
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 286bf91221be4246202f87e27bd2b74e6947a336fe475f16be5ed7b43c3cd9af
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support reopening container log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:07.214: INFO: Created container "cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f"
STEP: start container with log
STEP: Start container for containerID: cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f
Jul 24 05:02:07.270: INFO: Started container "cb442dac435cd2a860d2caa1210f2d674464e6b1e0ec8e99524430581e0d783f"
Jul 24 05:02:07.270: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log
Jul 24 05:02:07.270: INFO: Parse container log succeed
STEP: rename container log
STEP: reopen container log
Jul 24 05:02:07.271: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log
Jul 24 05:02:07.271: INFO: Parse container log succeed
Jul 24 05:02:08.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log
Jul 24 05:02:08.287: INFO: Parse container log succeed
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log
Jul 24 05:02:09.287: INFO: Parse container log succeed
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:09.287: INFO: Parse container log succeed
Jul 24 05:02:09.287: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:09.287: INFO: Parse container log succeed
Jul 24 05:02:10.426: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:10.427: INFO: Parse container log succeed
Jul 24 05:02:11.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:11.428: INFO: Parse container log succeed
Jul 24 05:02:12.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:12.428: INFO: Parse container log succeed
Jul 24 05:02:13.428: INFO: Open log file /tmp/podLogTest824232251/PodSandbox-with-log-directory-7dc7cff9-cda5-11ea-b954-5254001ff4e5/container-reopen-log-test-7efc7ec8-cda5-11ea-b954-5254001ff4e5.log.new
Jul 24 05:02:13.428: INFO: Parse container log succeed
[AfterEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:9.393 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support reopening container log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing running container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:14.462: INFO: Created container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22"
STEP: start container
STEP: Start container for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22
Jul 24 05:02:14.519: INFO: Started container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22"
STEP: test remove container
STEP: Remove container for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22
Jul 24 05:02:14.571: INFO: Removed container "3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22"
STEP: List containers for containerID: 3420835d821665be2cd7fd48e5f60718d109cee917ccfb54d46854ff35233f22
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support attach [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:10.573: INFO: Created container "7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708"
STEP: start container
STEP: Start container for containerID: 7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708
Jul 24 05:02:10.629: INFO: Started container "7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708"
STEP: attach container: 7c535cb01c6aa6676072c68287976a4ab9991dd8a45976ce27a6b8419c9b2708
Jul 24 05:02:10.629: INFO: Get attach url: http://127.0.0.1:35803/attach/UELW_58i
STEP: check the output of attach
Jul 24 05:02:10.629: INFO: Parse url "http://127.0.0.1:35803/attach/UELW_58i" succeed
Jul 24 05:02:15.647: INFO: Check attach url "http://127.0.0.1:35803/attach/UELW_58i" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:7.178 seconds]
[k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support attach [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:15.923: INFO: Created container "349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8"
STEP: start container
STEP: Start container for containerID: 349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8
Jul 24 05:02:15.971: INFO: Started container "349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8"
STEP: Get container status for containerID: 349bc3c2346d468f7591d384fa42dbcef615dc2a69acaccfcc0772dbe0fc90d8
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUser
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUser container
STEP: create a container with RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:16.404: INFO: Created container "0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51"
STEP: start container
STEP: Start container for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51
Jul 24 05:02:16.486: INFO: Started container "0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51"
STEP: Get container status for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51
STEP: verify RunAsUser for container
STEP: verify execSync output
STEP: execSync for containerID: 0733db2ef62af091c2566649adad0739d956de2803e4f08e510cfde964b72c51
Jul 24 05:02:16.519: INFO: Execsync succeed
Jul 24 05:02:16.519: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support safe sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:16.520: INFO: Created container "109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681"
STEP: start container
STEP: Start container for containerID: 109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681
Jul 24 05:02:16.592: INFO: Started container "109560806c08b9ff6b0d56aa19dd99b1227bf1fe13fd44af071100f8b6641681"
STEP: check sysctls kernel.shm_rmid_forced
[AfterEach] runtime should support sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ReadonlyPaths
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
STEP: create pod
STEP: create container with ReadonlyPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:18.414: INFO: Created container "b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b"
STEP: Start container for containerID: b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b
Jul 24 05:02:18.470: INFO: Started container "b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b"
STEP: Get container status for containerID: b46a185993dd56892d9a3360fd690957216c124ccbc850255ccc83453546e98b
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 08b4406898621b79ba8cdc1a1e011f096c6bcab8a0564c2e2e4b084668d41921
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 20102c0168ac893bafed0af17d28b192031beaf0421d2b4f66edb1840a67b91f
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_false
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:18.959: INFO: Created container "c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9"
STEP: start container
STEP: Start container for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9
Jul 24 05:02:19.021: INFO: Started container "c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9"
STEP: Get container status for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9
STEP: Get container status for containerID: c5dc5ccb3dc5dd2e32fe9eaae7916b80e4d9ff1fbc42f14a51697fe5f7c769f9
STEP: Check whether rootfs is writable
STEP: verify log contents
Jul 24 05:02:23.022: INFO: Open log file /tmp/podLogTest754358848/PodSandbox-with-log-directory-84b020fb-cda5-11ea-b954-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-85fc4c22-cda5-11ea-b954-5254001ff4e5.log
Jul 24 05:02:23.022: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• Failure [6.417 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support that ReadOnlyRootfs is false [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
expected log "Found\n" (stream="stdout") not found in logs [{timestamp:{wall:18349520 ext:63731188939 loc:0x1b40960} stream:stderr log:touch: test.go: Permission denied
}]
Expected
<bool>: false
to be true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:594
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rslave' should support propagation from host to container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:23.283: INFO: Created container "ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad"
STEP: test start container with volume
STEP: Start container for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad
Jul 24 05:02:23.362: INFO: Started container "ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad"
STEP: Get container status for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad
Jul 24 05:02:23.390: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad
Jul 24 05:02:23.413: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: ccfa6bda56b82c7f02248cae2054670181f866dfa79f4ccbf9ec866c8874b8ad
Jul 24 05:02:23.437: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should not allow privilege escalation when true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
STEP: create container alpine-nnp-true-870da5aa-cda5-11ea-b6c2-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 05:02:20.761: INFO: Created container "4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776"
STEP: Start container for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776
Jul 24 05:02:20.826: INFO: Started container "4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776"
STEP: Get container status for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776
STEP: Get container status for containerID: 4bd4faa2f5a602d2e5307cac80d16e4918e4e5e96108a409422a4ff690ac0776
STEP: check container output
STEP: verify log contents
Jul 24 05:02:24.829: INFO: Open log file /tmp/podLogTest647293573/PodSandbox-with-log-directory-8620015d-cda5-11ea-b6c2-5254001ff4e5/alpine-nnp-true-870da5aa-cda5-11ea-b6c2-5254001ff4e5.log
Jul 24 05:02:24.829: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:5.851 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725
should not allow privilege escalation when true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume when host path is a symlink [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
STEP: create host path and flag file
STEP: create symlink
STEP: create volume container with symlink host path
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:24.817: INFO: Created container "33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8"
STEP: test start volume container with symlink host path
STEP: Start container for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8
Jul 24 05:02:24.876: INFO: Started container "33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8"
STEP: Get container status for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8
STEP: check whether 'symlink' contains file or dir in container
STEP: execSync for containerID: 33871b77563922409b316a10783439f49c960a1a621cf74906d9c39faf0b68f8
Jul 24 05:02:24.908: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support starting container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:25.304: INFO: Created container "6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5"
STEP: test start container
STEP: Start container for containerID: 6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5
Jul 24 05:02:25.354: INFO: Started container "6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5"
STEP: Get container status for containerID: 6eb84d3a03fd144f1dcbe2463e8d0753d7647d4dae684af0b3414e235676bfe5
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
STEP: create podSandbox for security context HostPID
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:02:27.061: INFO: Created container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2"
STEP: start container
STEP: Start container for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2
Jul 24 05:02:27.155: INFO: Started container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2"
STEP: Get container status for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2
STEP: get nginx container pid
STEP: execSync for containerID: cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2
Jul 24 05:02:27.263: INFO: Unexpected error occurred: command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137:
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
E0724 05:02:27.311789 148433 remote_runtime.go:128] StopPodSandbox "8ce6213885ef2d9bc5c6dfbeda62e22b7a0160a77ce6c05bd4e0b062650996c9" from runtime service failed: rpc error: code = Unknown desc = failed to stop container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2": failed to kill container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2": ttrpc: closed: unknown
STEP: delete PodSandbox
• Failure [2.577 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support HostPID [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
failed to execSync in container "cbf726b16a0024d9bb262566ebfd8f43428e816ed22e15e1803ac5ee20b5dbf2"
Unexpected error:
<exec.CodeExitError>: {
Err: {
s: "command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137: ",
},
Code: 137,
}
command 'sh -c while [ ! -f /var/run/nginx.pid ]; do sleep 1; done && cat /var/run/nginx.pid' exited with 137:
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp default which is unconfined on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:27.386: INFO: Created container "700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7"
STEP: start container
STEP: Start container for containerID: 700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7
Jul 24 05:02:27.478: INFO: Started container "700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7"
STEP: Get container status for containerID: 700434676560abb220461e709cf12a1248cdc146111ce1c1bbfb559ecc117fa7
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
STEP: creating a podSandbox with hostNetwork true
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:27.777: INFO: Created container "6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa"
STEP: start container
STEP: Start container for containerID: 6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa
Jul 24 05:02:27.871: INFO: Started container "6e54a953145b2c59e29c1ce134ae32b9bf62260b7c093eeb842e15d21d3881fa"
STEP: checking host http service port in the container
Jul 24 05:02:27.871: INFO: Open log file /tmp/podLogTest801065554/NamespaceOption-PodSandbox-5d3b9a3d-cda5-11ea-b6c2-5254001ff4e5/container-with-HostNetwork-test-8b388b2d-cda5-11ea-b6c2-5254001ff4e5.log
Jul 24 05:02:27.872: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:29.934: INFO: Created container "14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f"
STEP: start container
STEP: Start container for containerID: 14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f
Jul 24 05:02:30.015: INFO: Started container "14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f"
STEP: test execSync
STEP: verify execSync output
STEP: execSync for containerID: 14a154797d9b1d16b6fe3738aa858557fcfc669ffb577dff041776f5f809373f
Jul 24 05:02:30.044: INFO: Execsync succeed
Jul 24 05:02:30.044: INFO: verify Execsync output succeed
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support SupplementalGroups
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
STEP: create pod
STEP: create container for security context SupplementalGroups
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:02:29.937: INFO: Created container "bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757"
STEP: start container
STEP: Start container for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757
Jul 24 05:02:30.009: INFO: Started container "bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757"
STEP: Get container status for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757
STEP: verify SupplementalGroups for container
STEP: execSync for containerID: bd4ca9110451ea41077773cf680a6c0d091403689418008c2aacca253508b757
Jul 24 05:02:30.052: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ContainerPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
STEP: create podSandbox with PID set to container
Jul 24 05:02:30.260: INFO: Pid namespace is "CONTAINER"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 05:02:32.425: INFO: Created container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09"
STEP: start container
STEP: Start container for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09
Jul 24 05:02:32.482: INFO: Started container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09"
STEP: Get container status for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09
STEP: get nginx container pid
STEP: execSync for containerID: 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09
E0724 05:02:32.533546 148476 remote_runtime.go:351] ExecSync 1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09 'sh -c while ! cat /proc/1/cmdline | grep "master process"; do sleep 1; done' from runtime service failed: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
Jul 24 05:02:32.533: INFO: Unexpected error occurred: rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• Failure [2.436 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NamespaceOption
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:73
runtime should support ContainerPID [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
failed to execSync in container "1ccad89621e28df96653ae464154900829f9d6d6b5da6b23864e6ba29c8cea09"
Unexpected error:
<*status.statusError | 0xc0003f0870>: {
Code: 2,
Message: "failed to exec in container: failed to start exec \"70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3\": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused \"process_linux.go:101: executing setns process caused \\\"exit status 1\\\"\": unknown",
Details: nil,
XXX_NoUnkeyedLiteral: {},
XXX_unrecognized: nil,
XXX_sizecache: 0,
}
rpc error: code = Unknown desc = failed to exec in container: failed to start exec "70dd8172021072c226e6c5f9bb8f7850e09092a004c32c98555eeb6180be15f3": OCI runtime exec failed: exec failed: container_linux.go:349: starting container process caused "process_linux.go:101: executing setns process caused \"exit status 1\"": unknown
occurred
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support portforward [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:01:44.541: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Pull image : docker.io/library/nginx:latest
STEP: Create container.
Jul 24 05:01:49.889: INFO: Created container "dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06"
STEP: start the web server container
STEP: Start container for containerID: dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06
Jul 24 05:01:49.966: INFO: Started container "dd3973f1bbd8167047682779b131e31d061bb464140c57b7d881d434c2919f06"
STEP: port forward PodSandbox: eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266
Jul 24 05:01:49.966: INFO: Get port forward url: http://127.0.0.1:35803/portforward/HuXU_jeX
STEP: check the output of portforward
Jul 24 05:01:49.967: INFO: Parse url "http://127.0.0.1:35803/portforward/HuXU_jeX" succeed
STEP: check if we can get nginx main page via localhost:12001
STEP: get the IP:port needed to be checked
Jul 24 05:01:49.967: INFO: the IP:port is http://127.0.0.1:12001
STEP: check the content of http://127.0.0.1:12001
STEP: start port forward
Forwarding from 127.0.0.1:12001 -> 80
Forwarding from [::1]:12001 -> 80
Handling connection for 12001
E0724 05:01:50.980847 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:50 socat[154192] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:51.986569 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:51 socat[154526] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:52.991003 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:52 socat[154830] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:54.036579 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:54 socat[155508] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:55.045791 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:55 socat[155786] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:56.051454 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:56 socat[156515] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:57.060090 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:57 socat[156843] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:58.069708 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:58 socat[157300] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:01:59.075140 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:01:59 socat[157899] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:00.078951 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:00 socat[157905] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:01.084073 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:01 socat[158513] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:02.088374 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:02 socat[158617] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:03.098095 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:03 socat[159121] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:04.102882 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:04 socat[159221] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:05.109226 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:05 socat[159667] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:06.114385 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:06 socat[159840] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:07.118985 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:07 socat[160004] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:08.127182 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:08 socat[160375] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:09.135212 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:09 socat[160765] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:10.140972 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:10 socat[160790] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:11.144809 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:11 socat[161130] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:12.152218 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:12 socat[161445] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:13.162304 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:13 socat[161558] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:14.176060 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:14 socat[161861] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:15.187285 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:15 socat[162185] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:16.197096 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:16 socat[162504] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:17.205357 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:17 socat[162975] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:18.218033 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:18 socat[163145] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:19.223911 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:19 socat[163719] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:20.231453 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:20 socat[163720] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:21.238777 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:21 socat[164061] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:22.246589 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:22 socat[164062] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:23.251116 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:23 socat[164203] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:24.260409 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:24 socat[164409] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:25.264017 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:25 socat[164774] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:26.274968 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:26 socat[164955] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:27.282574 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:27 socat[165124] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:28.287016 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:28 socat[165538] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:29.292022 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:29 socat[165552] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:30.297510 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:30 socat[166040] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:31.306843 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:31 socat[166042] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:32.311764 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:32 socat[166060] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:33.320090 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:33 socat[166252] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:34.327194 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:34 socat[166254] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:35.333898 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:35 socat[166256] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:36.345335 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:36 socat[166258] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:37.352923 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:37 socat[166260] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:38.363988 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:38 socat[166263] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:39.380991 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:39 socat[166266] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:40.390709 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:40 socat[166269] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:41.432205 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:41 socat[166273] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:42.448125 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:42 socat[166275] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:43.480257 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:43 socat[166278] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:44.527732 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:44 socat[166281] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:45.566063 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:45 socat[166284] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:46.577360 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:46 socat[166287] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:47.587660 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:47 socat[166290] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:48.595874 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:48 socat[166293] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
Handling connection for 12001
E0724 05:02:49.621688 148469 portforward.go:400] an error occurred forwarding 12001 -> 80: error forwarding port 80 to pod eed800fbb891952d22e159939a4214545db7b25304781939bfbc3931bda6a266, uid : failed to execute portforward in network namespace "/var/run/netns/cni-118bcf0c-c4ef-16ef-bb17-5ddc408bc519": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:49 socat[166296] E connect(5, AF=2 127.0.0.1:80, 16): Connection refused\n"
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [67.565 seconds]
[k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support portforward [Conformance] [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
Timed out after 60.028s.
Expected
<*url.Error | 0xc0004abc80>: {
Op: "Get",
URL: "http://127.0.0.1:12001",
Err: {s: "EOF"},
}
to be nil
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:01:51.689: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Pull image : docker.io/library/httpd:latest
STEP: Create container.
Jul 24 05:01:55.610: INFO: Created container "6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c"
STEP: start the httpd container
STEP: Start container for containerID: 6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c
Jul 24 05:01:55.762: INFO: Started container "6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c"
STEP: Get container status for containerID: 6388c728e2e15838d4f422ba6a1c5bd938d201fc79d8e2e61c5233ee20bd0f2c
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:55.801: INFO: Created container "9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede"
STEP: start the busybox container
STEP: Start container for containerID: 9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede
Jul 24 05:01:55.969: INFO: Started container "9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede"
STEP: Get container status for containerID: 9bcfe825fb1014d5c7c09e7ee91673cb9fe3c7c7e7036dcdd00d5e59f95f3ede
[It] should support container log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [66.615 seconds]
[k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support container log [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
Timed out after 60.001s.
Expected
<bool>: false
to be true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 05:01:57.786: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 05:01:57.834: INFO: Created container "0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89"
STEP: start the httpd container
STEP: Start container for containerID: 0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89
Jul 24 05:01:57.933: INFO: Started container "0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89"
STEP: Get container status for containerID: 0bd0562bc922dccf405b4c3494f997168135e7e826747a030210af1f87d2ac89
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 05:01:57.983: INFO: Created container "623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82"
STEP: start the busybox container
STEP: Start container for containerID: 623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82
Jul 24 05:01:58.061: INFO: Started container "623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82"
STEP: Get container status for containerID: 623ac30a44a98569c66f0dd6c82bdd3ae08acd82463729c235915e87e9d6ca82
[It] should support network
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: 5ee6b91f395f40620eb63630985c49eb8ea891aea7ba223f4d3f25dbe985d813
Jul 24 05:01:58.064: INFO: the IP:port is http://10.88.1.106:80
STEP: check the content of http://10.88.1.106:80
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [62.048 seconds]
[k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:50
should support network [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
Timed out after 60.000s.
Expected
<*url.Error | 0xc0001a6180>: {
Op: "Get",
URL: "http://10.88.1.106:80",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 88, 1, 106],
Port: 80,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with only container port [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 05:02:04.597: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:02:04.625: INFO: Created container "eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6"
STEP: start the web server container
STEP: Start container for containerID: eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6
Jul 24 05:02:04.684: INFO: Started container "eff0e3c880ffb2a7bda992650d84a253c0ed133275dac48221fa86c9344bfcb6"
STEP: check the port mapping with only container port
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: 910089ec358bf3a5c107554a745b21cf780a4860264111df9947f33f2715fb27
Jul 24 05:02:04.685: INFO: the IP:port is http://10.88.1.117:80
STEP: check the content of http://10.88.1.117:80
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [61.796 seconds]
[k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44
runtime should support port mapping with only container port [Conformance] [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
Timed out after 60.001s.
Expected
<*url.Error | 0xc000466f60>: {
Op: "Get",
URL: "http://10.88.1.117:80",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 10, 88, 1, 117],
Port: 80,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with host port and container port [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
STEP: create a PodSandbox with host port and container port port mapping
STEP: create a web server container
Jul 24 05:02:17.688: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 05:02:17.703: INFO: Created container "29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f"
STEP: start the web server container
STEP: Start container for containerID: 29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f
Jul 24 05:02:17.753: INFO: Started container "29d4281b02ff044cc7ac2812e0215d22bbf77e970c8644a6c5efed10d438958f"
STEP: check the port mapping with host port and container port
STEP: get the IP:port needed to be checked
Jul 24 05:02:17.753: INFO: the IP:port is http://127.0.0.1:12000
STEP: check the content of http://127.0.0.1:12000
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [62.179 seconds]
[k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:44
runtime should support port mapping with host port and container port [Conformance] [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
Timed out after 60.003s.
Expected
<*url.Error | 0xc0002a5830>: {
Op: "Get",
URL: "http://127.0.0.1:12000",
Err: {
Op: "dial",
Net: "tcp",
Source: nil,
Addr: {
IP: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255, 127, 0, 0, 1],
Port: 12000,
Zone: "",
},
Err: {Syscall: "connect", Err: 0x6f},
},
}
to be nil
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33
[It] runtime should support portforward in host network
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
STEP: create a PodSandbox with container port port mapping in host network
STEP: create a web server container
Jul 24 05:02:25.676: INFO: Use latest as default image tag.
STEP: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest
STEP: Pull image : gcr.io/cri-tools/hostnet-nginx-amd64:latest
STEP: Create container.
Jul 24 05:02:29.538: INFO: Created container "bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075"
STEP: start the web server container
STEP: Start container for containerID: bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075
Jul 24 05:02:29.598: INFO: Started container "bccf8a1de924bfa8888503f414be23f87b0b05e848572edd9df108c935a8e075"
STEP: port forward PodSandbox: 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433
Jul 24 05:02:29.598: INFO: Get port forward url: http://127.0.0.1:35803/portforward/2RjZV8Cv
STEP: check the output of portforward
Jul 24 05:02:29.598: INFO: Parse url "http://127.0.0.1:35803/portforward/2RjZV8Cv" succeed
STEP: check if we can get nginx main page via localhost:12002
STEP: get the IP:port needed to be checked
Jul 24 05:02:29.599: INFO: the IP:port is http://127.0.0.1:12002
STEP: check the content of http://127.0.0.1:12002
STEP: start port forward
Forwarding from 127.0.0.1:12002 -> 12003
Forwarding from [::1]:12002 -> 12003
Handling connection for 12002
E0724 05:02:30.608801 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:30 socat[166041] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:31.633284 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:31 socat[166043] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:32.637422 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:32 socat[166227] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:33.646836 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:33 socat[166253] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:34.653785 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:34 socat[166255] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:35.660993 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:35 socat[166257] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:36.668111 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:36 socat[166259] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:37.675162 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:37 socat[166262] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:38.682545 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:38 socat[166265] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:39.695444 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:39 socat[166268] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:40.714924 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:40 socat[166271] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:41.744440 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:41 socat[166274] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:42.751806 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:42 socat[166277] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:43.769076 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:43 socat[166280] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:44.776670 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:44 socat[166283] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:45.784895 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:45 socat[166286] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:46.792974 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:46 socat[166289] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:47.799261 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:47 socat[166292] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:48.806836 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:48 socat[166295] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:49.832493 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:49 socat[166298] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:50.839834 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:50 socat[166366] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:51.846801 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:51 socat[166367] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:52.854123 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:52 socat[166368] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:53.862284 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:53 socat[166369] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:54.870155 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:54 socat[166370] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:55.919422 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:55 socat[166371] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:56.932179 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:56 socat[166462] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:57.943481 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:57 socat[166463] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:58.950738 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:58 socat[166554] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:02:59.961509 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:02:59 socat[166555] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:00.970342 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:00 socat[166556] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:02.041883 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:02 socat[166557] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:03.068089 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:03 socat[166558] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:04.075981 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:04 socat[166559] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:05.083973 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:05 socat[166628] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:06.116487 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:06 socat[166629] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:07.123743 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:07 socat[166631] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:08.131580 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:08 socat[166632] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:09.199809 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:09 socat[166633] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:10.219733 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:10 socat[166634] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:11.288857 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:11 socat[166635] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:12.306454 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:12 socat[166636] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:13.376862 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:13 socat[166637] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:14.383982 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:14 socat[166638] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:15.408241 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:15 socat[166639] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:16.419973 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:16 socat[166640] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:17.428348 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:17 socat[166641] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:18.444076 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:18 socat[166712] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:19.454116 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:19 socat[166713] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:20.462154 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:20 socat[166714] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:21.504817 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:21 socat[166715] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:22.511395 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:22 socat[166716] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:23.519909 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:23 socat[166717] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:24.567967 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:24 socat[166718] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:25.575107 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:25 socat[166719] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:26.582475 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:26 socat[166720] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:27.589780 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:27 socat[166721] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:28.597498 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:28 socat[166722] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
Handling connection for 12002
E0724 05:03:29.604456 148434 portforward.go:400] an error occurred forwarding 12002 -> 12003: error forwarding port 12003 to pod 28062e29450768123b68fc7b609ea20209dff6ff9912500e493ee625b8468433, uid : failed to execute portforward in network namespace "host": socat command returns error: exit status 1, stderr: "2020/07/24 05:03:29 socat[166723] E connect(5, AF=2 127.0.0.1:12003, 16): Connection refused\n"
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• Failure [64.082 seconds]
[k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:38
runtime should support portforward in host network [It]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
Timed out after 60.006s.
Expected
<*url.Error | 0xc00037ef60>: {
Op: "Get",
URL: "http://127.0.0.1:12002",
Err: {s: "EOF"},
}
to be nil
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
------------------------------
Summarizing 13 Failures:
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged [It] should work with just selinux level set 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support PodPID 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] SELinux runtime should support selinux when single pod sandbox is not privileged [It] should work with selinux set 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:212
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support container exec 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] Security Context bucket [It] runtime should support that ReadOnlyRootfs is false 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:594
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostPID 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support ContainerPID 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:418
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward [Conformance] 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support container log 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:95
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [It] should support network 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with only container port [Conformance] 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with host port and container port [Conformance] 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward in host network 
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:253
Ran 90 of 97 Specs in 139.078 seconds
FAIL! -- 77 Passed | 13 Failed | 0 Pending | 7 Skipped
Ginkgo ran 1 suite in 2m19.10534743s
Test Suite Failed
--- FAIL: TestCRISuite (139.11s)
cri_test.go:126: critest path: /go/bin/critest
cri_test.go:161: Failed to run tests in parallel: exit status 1
FAIL
./hack/test-utils.sh: line 107: 148384 Terminated keepalive "sudo PATH=${PATH} ${GOBIN%/}/${CONTAINERD_BIN} ${CONTAINERD_FLAGS}" ${RESTART_WAIT_PERIOD} &> ${report_dir}/containerd.log
make: *** [Makefile:108: test-cri] Error 1
type=USER_END msg=audit(1595591903.926:3471): pid=129587 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591903.926:3472): pid=129587 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.479:3473): pid=129685 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.479:3474): pid=129685 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6D6B646972202D7670202F7573722F6C6F63616C2F62696E exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.480:3475): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.481:3476): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591910.482:3477): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591910.482:3478): pid=129685 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.491:3479): pid=129688 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.491:3480): pid=129688 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6370202D7666202F676F2F7372632F6769746875622E636F6D2F636F6E7461696E6572642F6372692F6861636B2F2E2E2F5F6F75747075742F636F6E7461696E657264202F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.492:3481): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.493:3482): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591910.612:3483): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591910.612:3484): pid=129688 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.621:3485): pid=129691 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.621:3486): pid=129691 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6368636F6E202D76202D7420636F6E7461696E65725F72756E74696D655F657865635F74202F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.621:3487): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.622:3488): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591910.624:3489): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591910.624:3490): pid=129691 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.635:3491): pid=129698 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.638:3492): pid=129698 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F6C6F63616C2F62696E2F636F6E7461696E6572642D74657374202D2D6C6F672D6C6576656C3D6465627567202D2D636F6E666967202F746D702F636F6E7461696E6572642D636F6E6669672D73656C696E75782E746F6D6C202D2D61646472657373202F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B202D2D7374617465202F72756E2F636F6E7461696E6572642D74657374202D2D726F6F74202F7661722F6C69622F636F6E7461696E6572642D74657374 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.638:3493): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.640:3494): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.641:3495): pid=129702 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.641:3496): pid=129702 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F6C6F63616C2F62696E2F637472202D2D61646472657373202F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B2076657273696F6E exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.644:3497): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.645:3498): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591910.687:3499): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591910.687:3500): pid=129702 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.701:3501): pid=129720 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.701:3502): pid=129720 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=2F7573722F62696E2F63726963746C202D2D72756E74696D652D656E64706F696E743D756E69783A2F2F2F72756E2F636F6E7461696E6572642D746573742F636F6E7461696E6572642E736F636B20696E666F exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.701:3503): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.703:3504): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591910.710:3505): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591910.710:3506): pid=129720 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591910.719:3507): pid=129731 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591910.719:3508): pid=129731 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd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exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591910.720:3509): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591910.722:3510): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=ANOM_PROMISCUOUS msg=audit(1595591910.855:3511): dev=veth730c7398 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591910.898:3512): dev=veth80b4d492 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591910.911:3513): dev=veth36ae0f24 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591910.935:3514): dev=veth5cddde14 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591910.937:3515): dev=vetha6f9dd28 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591910.937:3516): dev=vethbbf9ac8f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591912.115:3517): dev=veth3d06a546 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591912.162:3518): dev=veth496f0a00 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591912.472:3519): avc: denied { search } for pid=130124 comm="top" name="1" dev="proc" ino=335395 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c533,c877 tclass=dir permissive=1
type=AVC msg=audit(1595591912.472:3519): avc: denied { read } for pid=130124 comm="top" name="stat" dev="proc" ino=336574 scontext=system_u:system_r:container_t:s0 tcontext=system_u:system_r:container_t:s0:c533,c877 tclass=file permissive=1
type=AVC msg=audit(1595591912.497:3520): avc: denied { write } for pid=130146 comm="touch" name="/" dev="overlay" ino=335431 scontext=system_u:system_r:container_t:s0 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591912.497:3520): avc: denied { add_name } for pid=130146 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591912.497:3520): avc: denied { create } for pid=130146 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591912.497:3520): avc: denied { write } for pid=130146 comm="touch" path="/foo" dev="overlay" ino=336615 scontext=system_u:system_r:container_t:s0 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591912.643:3521): dev=vethbbf9ac8f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591912.759:3522): dev=vethc7c2ff37 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.019:3523): dev=veth5cddde14 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.203:3524): dev=veth730c7398 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.216:3525): dev=veth0c8f0fba prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.358:3526): dev=veth61b30630 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.391:3527): dev=veth80b4d492 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.478:3528): dev=veth36ae0f24 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.487:3529): dev=veth23c8d0c6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591913.566:3530): dev=vethb9116ebc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591914.465:3531): dev=veth3d06a546 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591914.562:3532): dev=vethb4ac86a0 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591914.575:3533): dev=vetha6f9dd28 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591914.687:3534): dev=vethe91aeb2e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591914.965:3535): dev=vethc7c2ff37 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591915.049:3536): dev=vethf730d08c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591915.066:3537): dev=veth0c8f0fba prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591915.160:3538): dev=veth3f3ac7fb prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591915.355:3539): avc: denied { write } for pid=132319 comm="touch" name="default.conf" dev="overlay" ino=344600 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.367:3540): avc: denied { write } for pid=132334 comm="sed" name="conf.d" dev="overlay" ino=344599 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591915.367:3540): avc: denied { add_name } for pid=132334 comm="sed" name="sed15MfJv" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591915.367:3540): avc: denied { create } for pid=132334 comm="sed" name="sed15MfJv" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.367:3540): avc: denied { write } for pid=132334 comm="sed" path="/etc/nginx/conf.d/sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.367:3541): avc: denied { setattr } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.367:3542): avc: denied { remove_name } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591915.367:3542): avc: denied { rename } for pid=132334 comm="sed" name="sed15MfJv" dev="overlay" ino=343985 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.367:3542): avc: denied { unlink } for pid=132334 comm="sed" name="default.conf" dev="overlay" ino=344600 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591915.372:3543): avc: denied { open } for pid=132286 comm="nginx" path="pipe:[344498]" dev="pipefs" ino=344498 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591915.372:3544): avc: denied { create } for pid=132286 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591915.372:3545): avc: denied { setattr } for pid=132286 comm="nginx" name="client_temp" dev="overlay" ino=344023 scontext=system_u:system_r:container_t:s0:c223,c1001 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591915.500:3546): dev=veth61b30630 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591915.603:3547): dev=vethf744804a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591915.941:3548): dev=vethb9116ebc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.320:3549): dev=vethb4ac86a0 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.498:3550): dev=vetha8c1e923 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.574:3551): dev=veth23c8d0c6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.596:3552): dev=vethe91aeb2e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.660:3553): dev=vethe7852011 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591916.695:3554): dev=vethb4c7da78 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591917.283:3555): dev=vetha40335ef prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591917.384:3556): dev=veth3f3ac7fb prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591917.477:3557): dev=veth070e63a4 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591917.627:3558): dev=vethf730d08c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591917.723:3559): dev=vethf0007434 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.006:3560): dev=vethf744804a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.101:3561): dev=veth588933d6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.407:3562): dev=vethe7852011 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.512:3563): dev=veth6da82891 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.558:3564): dev=veth496f0a00 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.658:3565): dev=vethb4c7da78 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.672:3566): dev=veth01d23883 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.689:3567): dev=vetha8c1e923 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.777:3568): dev=veth83a73b9e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591918.778:3569): dev=vethe77e4ccc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591919.080:3570): avc: denied { write } for pid=134711 comm="touch" name="default.conf" dev="overlay" ino=353740 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.086:3571): avc: denied { write } for pid=134719 comm="sed" name="conf.d" dev="overlay" ino=353739 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591919.086:3571): avc: denied { add_name } for pid=134719 comm="sed" name="sedoaF37l" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591919.086:3571): avc: denied { create } for pid=134719 comm="sed" name="sedoaF37l" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.086:3571): avc: denied { write } for pid=134719 comm="sed" path="/etc/nginx/conf.d/sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.087:3572): avc: denied { setattr } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.087:3573): avc: denied { remove_name } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591919.087:3573): avc: denied { rename } for pid=134719 comm="sed" name="sedoaF37l" dev="overlay" ino=353763 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.087:3573): avc: denied { unlink } for pid=134719 comm="sed" name="default.conf" dev="overlay" ino=353740 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591919.092:3574): avc: denied { open } for pid=134692 comm="nginx" path="pipe:[352251]" dev="pipefs" ino=352251 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591919.093:3575): avc: denied { create } for pid=134692 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591919.093:3576): avc: denied { setattr } for pid=134692 comm="nginx" name="client_temp" dev="overlay" ino=354416 scontext=system_u:system_r:container_t:s0:c276,c718 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591919.595:3577): dev=veth070e63a4 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591919.693:3578): dev=veth871762a3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591919.921:3579): dev=veth588933d6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591919.940:3580): dev=vethf0007434 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.008:3581): dev=vethc8d91954 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.038:3582): dev=veth638ae6c6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.285:3583): dev=vetha40335ef prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.393:3584): dev=veth6064174e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.394:3585): dev=veth83a73b9e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591920.472:3586): dev=veth717cc721 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591920.892:3587): avc: denied { open } for pid=135934 comm="httpd" path="pipe:[358146]" dev="pipefs" ino=358146 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591920.893:3588): avc: denied { write } for pid=135934 comm="httpd" name="logs" dev="overlay" ino=358279 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591920.893:3588): avc: denied { add_name } for pid=135934 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591920.893:3588): avc: denied { create } for pid=135934 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591920.893:3588): avc: denied { write } for pid=135934 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=359000 scontext=system_u:system_r:container_t:s0:c490,c773 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591921.069:3589): dev=veth01d23883 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591921.154:3590): dev=veth393a052a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591921.191:3591): dev=vethe77e4ccc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591921.265:3592): dev=veth5b9065a7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591921.977:3593): avc: denied { search } for pid=136546 comm="top" name="16" dev="proc" ino=360427 scontext=system_u:system_r:container_t:s0:c682,c1015 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591921.977:3593): avc: denied { read } for pid=136546 comm="top" name="stat" dev="proc" ino=360428 scontext=system_u:system_r:container_t:s0:c682,c1015 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591922.042:3594): dev=veth638ae6c6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.171:3595): dev=veth4075371f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591922.344:3596): avc: denied { search } for pid=136961 comm="top" name="1" dev="proc" ino=361853 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c325 tclass=dir permissive=1
type=AVC msg=audit(1595591922.344:3596): avc: denied { read } for pid=136961 comm="top" name="stat" dev="proc" ino=362182 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:system_r:container_t:s0:c26,c325 tclass=file permissive=1
type=AVC msg=audit(1595591922.399:3597): avc: denied { write } for pid=137089 comm="touch" name="/" dev="overlay" ino=361935 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591922.399:3597): avc: denied { add_name } for pid=137089 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591922.399:3597): avc: denied { create } for pid=137089 comm="touch" name="foo" scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591922.399:3597): avc: denied { write } for pid=137089 comm="touch" path="/foo" dev="overlay" ino=362336 scontext=system_u:system_r:container_t:s0:c4,c5 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591922.405:3598): dev=veth871762a3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.568:3599): dev=veth865cbd7c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.616:3600): dev=vethc8d91954 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.676:3601): dev=veth6064174e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.770:3602): dev=veth2265fd46 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.783:3603): dev=veth717cc721 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591922.861:3604): dev=veth8f776ac3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591923.188:3605): dev=veth5b9065a7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591923.304:3606): dev=veth4dbd8dc7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591923.421:3607): dev=veth393a052a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591923.498:3608): dev=veth17553bdf prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591924.420:3609): dev=veth4075371f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591924.470:3610): dev=veth865cbd7c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591924.518:3611): dev=veth7f1d8f9f prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591924.728:3612): dev=veth6da82891 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591924.834:3613): dev=vethc669adfd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.098:3614): dev=veth2265fd46 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591925.151:3615): avc: denied { open } for pid=138771 comm="httpd" path="pipe:[368407]" dev="pipefs" ino=368407 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591925.153:3616): avc: denied { write } for pid=138771 comm="httpd" name="logs" dev="overlay" ino=368622 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591925.153:3616): avc: denied { add_name } for pid=138771 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591925.153:3616): avc: denied { create } for pid=138771 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591925.153:3616): avc: denied { write } for pid=138771 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=369733 scontext=system_u:system_r:container_t:s0:c114,c723 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591925.290:3617): dev=veth4b87710c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.649:3618): dev=veth4dbd8dc7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.721:3619): dev=veth8f776ac3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.772:3620): dev=vethe388ec8d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.802:3621): dev=veth17553bdf prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591925.865:3622): dev=veth7b8cb41e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591926.127:3623): dev=veth21c531ba prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591926.183:3624): dev=veth7f1d8f9f prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591926.301:3625): dev=veth5aaabe16 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591926.527:3626): dev=veth6071731a prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591927.500:3627): dev=vethe388ec8d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591927.596:3628): dev=veth9613a5c5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591927.795:3629): dev=veth7b8cb41e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591927.877:3630): dev=vethc30ca0dc prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591928.310:3631): avc: denied { open } for pid=140468 comm="httpd" path="pipe:[375595]" dev="pipefs" ino=375595 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591928.314:3632): avc: denied { write } for pid=140468 comm="httpd" name="logs" dev="overlay" ino=376098 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591928.314:3632): avc: denied { add_name } for pid=140468 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591928.314:3632): avc: denied { create } for pid=140468 comm="httpd" name="httpd.pid" scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591928.314:3632): avc: denied { write } for pid=140468 comm="httpd" path="/usr/local/apache2/logs/httpd.pid" dev="overlay" ino=376153 scontext=system_u:system_r:container_t:s0:c13,c895 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591928.721:3633): dev=veth6071731a prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591928.745:3634): dev=veth5aaabe16 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591928.779:3635): dev=veth21c531ba prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591928.846:3636): dev=veth8fffd774 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591928.891:3637): dev=vethedfce014 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591929.027:3638): dev=veth203194f9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591929.990:3639): dev=vethc5e74c9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591930.164:3640): avc: denied { write } for pid=141428 comm="touch" name="default.conf" dev="overlay" ino=380007 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591930.175:3641): avc: denied { write } for pid=141443 comm="sed" name="conf.d" dev="overlay" ino=380006 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591930.175:3641): avc: denied { add_name } for pid=141443 comm="sed" name="sedieN0v6" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591930.175:3641): avc: denied { create } for pid=141443 comm="sed" name="sedieN0v6" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591930.175:3641): avc: denied { write } for pid=141443 comm="sed" path="/etc/nginx/conf.d/sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591930.175:3642): avc: denied { setattr } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591930.175:3643): avc: denied { remove_name } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591930.175:3643): avc: denied { rename } for pid=141443 comm="sed" name="sedieN0v6" dev="overlay" ino=380040 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591930.175:3643): avc: denied { unlink } for pid=141443 comm="sed" name="default.conf" dev="overlay" ino=380007 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591930.178:3644): dev=veth9613a5c5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591930.183:3645): avc: denied { open } for pid=141398 comm="nginx" path="pipe:[379412]" dev="pipefs" ino=379412 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591930.185:3646): avc: denied { create } for pid=141398 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591930.185:3647): avc: denied { setattr } for pid=141398 comm="nginx" name="client_temp" dev="overlay" ino=380087 scontext=system_u:system_r:container_t:s0:c183,c758 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591930.277:3648): dev=veth8e203931 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591930.704:3649): dev=vethc669adfd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591930.794:3650): dev=veth0022ad47 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591930.833:3651): dev=veth8fffd774 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591930.907:3652): dev=veth292bfa56 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.318:3653): dev=veth4b87710c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.375:3654): dev=veth203194f9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.417:3655): dev=vethd408939b prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.431:3656): dev=vethc30ca0dc prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.478:3657): dev=veth5a592b0c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591931.525:3658): dev=vethe0cc37d2 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591932.315:3659): avc: denied { search } for pid=142349 comm="top" name="11" dev="proc" ino=382928 scontext=system_u:system_r:container_t:s0:c422,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591932.315:3659): avc: denied { read } for pid=142349 comm="top" name="stat" dev="proc" ino=382958 scontext=system_u:system_r:container_t:s0:c422,c670 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591932.531:3660): dev=vethc5e74c9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591932.614:3661): dev=veth8e203931 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591932.625:3662): dev=veth467d663d prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591932.705:3663): dev=vethf119ea63 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591933.010:3664): dev=veth18e582f6 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591933.560:3665): dev=vethe0cc37d2 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591933.679:3666): dev=vethe30a3ad7 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591933.966:3667): dev=vethd408939b prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.063:3668): dev=veth24f24658 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.230:3669): dev=veth5a592b0c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.356:3670): dev=veth934a8bbd prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.512:3671): dev=veth467d663d prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.599:3672): dev=veth90f93cd3 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.704:3673): dev=vethf119ea63 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591934.778:3674): dev=vethb0064260 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.185:3675): dev=veth0022ad47 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.426:3676): dev=veth18e582f6 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.535:3677): dev=vetheabfdb22 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.705:3678): dev=vethe30a3ad7 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.805:3679): dev=vethb8ccfba9 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.877:3680): dev=veth934a8bbd prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591935.954:3681): dev=vethae8aac9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591936.389:3682): avc: denied { write } for pid=145109 comm="touch" name="default.conf" dev="overlay" ino=394478 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.398:3683): avc: denied { write } for pid=145117 comm="sed" name="conf.d" dev="overlay" ino=394477 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.398:3683): avc: denied { add_name } for pid=145117 comm="sed" name="sed05w3eH" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.398:3683): avc: denied { create } for pid=145117 comm="sed" name="sed05w3eH" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.398:3683): avc: denied { write } for pid=145117 comm="sed" path="/etc/nginx/conf.d/sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.398:3684): avc: denied { setattr } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.398:3685): avc: denied { remove_name } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.398:3685): avc: denied { rename } for pid=145117 comm="sed" name="sed05w3eH" dev="overlay" ino=395360 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.398:3685): avc: denied { unlink } for pid=145117 comm="sed" name="default.conf" dev="overlay" ino=394478 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.402:3686): avc: denied { open } for pid=145068 comm="nginx" path="pipe:[394332]" dev="pipefs" ino=394332 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591936.405:3687): avc: denied { create } for pid=145068 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.405:3688): avc: denied { setattr } for pid=145068 comm="nginx" name="client_temp" dev="overlay" ino=395400 scontext=system_u:system_r:container_t:s0:c14,c578 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591936.667:3689): dev=vethb0064260 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591936.768:3690): dev=veth7e290a9c prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591936.809:3691): avc: denied { write } for pid=145395 comm="touch" name="/" dev="overlay" ino=394977 scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.809:3691): avc: denied { add_name } for pid=145395 comm="touch" name="test.go" scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591936.809:3691): avc: denied { create } for pid=145395 comm="touch" name="test.go" scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591936.809:3691): avc: denied { write } for pid=145395 comm="touch" path="/test.go" dev="overlay" ino=396085 scontext=system_u:system_r:container_t:s0:c72,c567 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591937.431:3692): dev=vethedfce014 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591937.560:3693): dev=veth9d061b99 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591937.652:3694): dev=veth24f24658 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591937.822:3695): dev=vethc531296e prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591938.071:3696): dev=vethae8aac9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591938.177:3697): dev=vetheabfdb22 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591938.189:3698): dev=vethcb7a3c80 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591938.198:3699): dev=veth292bfa56 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591938.434:3700): avc: denied { write } for pid=146404 comm="nginx" name="nginx" dev="overlay" ino=399279 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591938.434:3700): avc: denied { add_name } for pid=146404 comm="nginx" name="error.log" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591938.434:3700): avc: denied { create } for pid=146404 comm="nginx" name="error.log" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591938.434:3700): avc: denied { open } for pid=146404 comm="nginx" path="pipe:[399195]" dev="pipefs" ino=399195 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591938.437:3701): avc: denied { create } for pid=146404 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591938.437:3702): avc: denied { setattr } for pid=146404 comm="nginx" name="client_temp" dev="overlay" ino=399304 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591938.438:3703): avc: denied { write } for pid=146404 comm="nginx" path="/run/nginx.pid" dev="overlay" ino=399317 scontext=system_u:system_r:container_t:s0:c164,c368 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591938.611:3704): dev=veth7999e1c1 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591939.201:3705): dev=veth7e290a9c prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591939.273:3706): dev=vethe67e31a5 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591939.592:3707): dev=vethdaa8cc04 prom=256 old_prom=0 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591939.651:3708): dev=veth9d061b99 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591939.849:3709): avc: denied { write } for pid=147161 comm="touch" name="default.conf" dev="overlay" ino=402311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.866:3710): avc: denied { write } for pid=147193 comm="sed" name="conf.d" dev="overlay" ino=402310 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591939.866:3710): avc: denied { add_name } for pid=147193 comm="sed" name="sedlY6ahq" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591939.866:3710): avc: denied { create } for pid=147193 comm="sed" name="sedlY6ahq" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.866:3710): avc: denied { write } for pid=147193 comm="sed" path="/etc/nginx/conf.d/sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.866:3711): avc: denied { setattr } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.866:3712): avc: denied { remove_name } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591939.866:3712): avc: denied { rename } for pid=147193 comm="sed" name="sedlY6ahq" dev="overlay" ino=402347 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.866:3712): avc: denied { unlink } for pid=147193 comm="sed" name="default.conf" dev="overlay" ino=402311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591939.870:3713): avc: denied { open } for pid=147133 comm="nginx" path="pipe:[402161]" dev="pipefs" ino=402161 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591939.870:3714): avc: denied { create } for pid=147133 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591939.870:3715): avc: denied { setattr } for pid=147133 comm="nginx" name="client_temp" dev="overlay" ino=402385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.029:3716): avc: denied { search } for pid=147313 comm="pidof" name="1" dev="proc" ino=1333 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.029:3716): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.029:3716): avc: denied { open } for pid=147313 comm="pidof" path="/proc/1/stat" dev="proc" ino=1366 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3717): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=1559 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:init_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3718): avc: denied { search } for pid=147313 comm="pidof" name="2" dev="proc" ino=1395 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3718): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3718): avc: denied { open } for pid=147313 comm="pidof" path="/proc/2/stat" dev="proc" ino=1396 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3719): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156012 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:kernel_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3720): avc: denied { search } for pid=147313 comm="pidof" name="546" dev="proc" ino=17537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3720): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3720): avc: denied { open } for pid=147313 comm="pidof" path="/proc/546/stat" dev="proc" ino=17538 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3721): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=14289 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:syslogd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3722): avc: denied { search } for pid=147313 comm="pidof" name="602" dev="proc" ino=18254 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3722): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3722): avc: denied { open } for pid=147313 comm="pidof" path="/proc/602/stat" dev="proc" ino=18255 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3723): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3724): avc: denied { search } for pid=147313 comm="pidof" name="605" dev="proc" ino=18311 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3724): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3724): avc: denied { open } for pid=147313 comm="pidof" path="/proc/605/stat" dev="proc" ino=18319 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3725): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=18712 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:auditd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3726): avc: denied { search } for pid=147313 comm="pidof" name="610" dev="proc" ino=18382 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3726): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3726): avc: denied { open } for pid=147313 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3727): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=19247 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3728): avc: denied { search } for pid=147313 comm="pidof" name="643" dev="proc" ino=19524 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3728): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3728): avc: denied { open } for pid=147313 comm="pidof" path="/proc/643/stat" dev="proc" ino=19525 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3729): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156081 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:irqbalance_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3730): avc: denied { search } for pid=147313 comm="pidof" name="656" dev="proc" ino=19536 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3730): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3730): avc: denied { open } for pid=147313 comm="pidof" path="/proc/656/stat" dev="proc" ino=19537 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3731): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21030 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sssd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3732): avc: denied { search } for pid=147313 comm="pidof" name="657" dev="proc" ino=19539 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3732): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3732): avc: denied { open } for pid=147313 comm="pidof" path="/proc/657/stat" dev="proc" ino=19540 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3733): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20720 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:policykit_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3734): avc: denied { search } for pid=147313 comm="pidof" name="659" dev="proc" ino=19545 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3734): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3734): avc: denied { open } for pid=147313 comm="pidof" path="/proc/659/stat" dev="proc" ino=19546 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3735): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21020 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3736): avc: denied { search } for pid=147313 comm="pidof" name="666" dev="proc" ino=19851 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3736): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3736): avc: denied { open } for pid=147313 comm="pidof" path="/proc/666/stat" dev="proc" ino=19876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3737): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156102 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:gssproxy_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3738): avc: denied { search } for pid=147313 comm="pidof" name="671" dev="proc" ino=20673 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3738): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3738): avc: denied { open } for pid=147313 comm="pidof" path="/proc/671/stat" dev="proc" ino=19895 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3739): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20675 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:chronyd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3740): avc: denied { search } for pid=147313 comm="pidof" name="683" dev="proc" ino=19883 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3740): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3740): avc: denied { open } for pid=147313 comm="pidof" path="/proc/683/stat" dev="proc" ino=19884 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3741): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=20954 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rngd_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3742): avc: denied { search } for pid=147313 comm="pidof" name="709" dev="proc" ino=20032 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3742): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3742): avc: denied { open } for pid=147313 comm="pidof" path="/proc/709/stat" dev="proc" ino=20033 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3743): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156103 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:tuned_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3744): avc: denied { search } for pid=147313 comm="pidof" name="751" dev="proc" ino=20306 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3744): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3744): avc: denied { open } for pid=147313 comm="pidof" path="/proc/751/stat" dev="proc" ino=20307 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3745): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21809 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3746): avc: denied { search } for pid=147313 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3746): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3746): avc: denied { open } for pid=147313 comm="pidof" path="/proc/754/stat" dev="proc" ino=20381 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3747): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=21334 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3748): avc: denied { search } for pid=147313 comm="pidof" name="755" dev="proc" ino=20384 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3748): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3748): avc: denied { open } for pid=147313 comm="pidof" path="/proc/755/stat" dev="proc" ino=20385 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3749): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156104 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:getty_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3750): avc: denied { search } for pid=147313 comm="pidof" name="830" dev="proc" ino=21910 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3750): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=22781 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3751): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=22016 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3752): avc: denied { search } for pid=147313 comm="pidof" name="50569" dev="proc" ino=59858 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3752): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3752): avc: denied { open } for pid=147313 comm="pidof" path="/proc/50569/stat" dev="proc" ino=88743 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3753): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156109 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3754): avc: denied { search } for pid=147313 comm="pidof" name="51924" dev="proc" ino=63902 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3754): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3754): avc: denied { open } for pid=147313 comm="pidof" path="/proc/51924/stat" dev="proc" ino=63903 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3755): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=63909 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3756): avc: denied { search } for pid=147313 comm="pidof" name="64048" dev="proc" ino=81551 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3756): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=81552 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3756): avc: denied { open } for pid=147313 comm="pidof" path="/proc/64048/stat" dev="proc" ino=81552 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3757): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=81644 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3758): avc: denied { search } for pid=147313 comm="pidof" name="129703" dev="proc" ino=333405 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3758): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=403717 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3759): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=333413 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3760): avc: denied { search } for pid=147313 comm="pidof" name="145312" dev="proc" ino=395865 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3760): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=395876 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3761): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=394860 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c72,c567 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.030:3762): avc: denied { search } for pid=147313 comm="pidof" name="145647" dev="proc" ino=396413 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=dir permissive=1
type=AVC msg=audit(1595591940.030:3762): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=397615 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=file permissive=1
type=AVC msg=audit(1595591940.030:3763): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=396419 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:container_t:s0:c176,c271 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.036:3764): avc: denied { read } for pid=147313 comm="pidof" name="exe" dev="proc" ino=156077 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:rpcbind_t:s0 tclass=lnk_file permissive=1
type=AVC msg=audit(1595591940.036:3765): avc: denied { read } for pid=147313 comm="pidof" name="stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.036:3765): avc: denied { open } for pid=147313 comm="pidof" path="/proc/610/stat" dev="proc" ino=18383 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file permissive=1
type=AVC msg=audit(1595591940.036:3766): avc: denied { search } for pid=147313 comm="pidof" name="754" dev="proc" ino=20380 scontext=system_u:system_r:container_t:s0:c129,c233 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591940.123:3767): dev=vethcb7a3c80 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591940.338:3768): dev=vethc531296e prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591940.456:3769): dev=veth7999e1c1 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591940.937:3770): dev=veth90f93cd3 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=AVC msg=audit(1595591941.372:3771): avc: denied { write } for pid=147979 comm="touch" name="default.conf" dev="overlay" ino=404954 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.382:3772): avc: denied { write } for pid=147997 comm="sed" name="conf.d" dev="overlay" ino=404953 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591941.382:3772): avc: denied { add_name } for pid=147997 comm="sed" name="sed0ii5qU" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591941.382:3772): avc: denied { create } for pid=147997 comm="sed" name="sed0ii5qU" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.382:3772): avc: denied { write } for pid=147997 comm="sed" path="/etc/nginx/conf.d/sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.382:3773): avc: denied { setattr } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.382:3774): avc: denied { remove_name } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591941.382:3774): avc: denied { rename } for pid=147997 comm="sed" name="sed0ii5qU" dev="overlay" ino=406068 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.382:3774): avc: denied { unlink } for pid=147997 comm="sed" name="default.conf" dev="overlay" ino=404954 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:object_r:container_ro_file_t:s0 tclass=file permissive=1
type=AVC msg=audit(1595591941.389:3775): avc: denied { open } for pid=147949 comm="nginx" path="pipe:[405911]" dev="pipefs" ino=405911 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=unconfined_u:system_r:container_runtime_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1
type=AVC msg=audit(1595591941.392:3776): avc: denied { create } for pid=147949 comm="nginx" name="client_temp" scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=AVC msg=audit(1595591941.393:3777): avc: denied { setattr } for pid=147949 comm="nginx" name="client_temp" dev="overlay" ino=405044 scontext=system_u:system_r:container_t:s0:c31,c286 tcontext=system_u:object_r:container_ro_file_t:s0 tclass=dir permissive=1
type=ANOM_PROMISCUOUS msg=audit(1595591941.536:3778): dev=vethe67e31a5 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591941.577:3779): dev=vethdaa8cc04 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=ANOM_PROMISCUOUS msg=audit(1595591941.852:3780): dev=vethb8ccfba9 prom=0 old_prom=256 auid=1000 uid=0 gid=0 ses=6AUID="vagrant" UID="root" GID="root"
type=USER_END msg=audit(1595591941.917:3781): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591941.917:3782): pid=129731 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591941.930:3783): pid=148259 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591941.930:3784): pid=148259 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=706B696C6C202D6720313239363936 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591941.931:3785): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591941.934:3786): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591941.942:3787): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591941.942:3788): pid=148259 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_END msg=audit(1595591941.946:3789): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=CRED_DISP msg=audit(1595591941.946:3790): pid=129698 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_ACCT msg=audit(1595591941.956:3791): pid=148262 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:accounting grantors=pam_unix acct="vagrant" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="vagrant" AUID="vagrant"
type=USER_CMD msg=audit(1595591941.957:3792): pid=148262 uid=1000 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/go/src/github.com/containerd/cri" cmd=6370202D7666202F7661722F6C6F672F61756469742F61756469742E6C6F67202F746D702F746573742D6372692F7065726D6973736976652D61756469742E6C6F67 exe="/usr/bin/sudo" terminal=pts/0 res=success'UID="vagrant" AUID="vagrant"
type=CRED_REFR msg=audit(1595591941.957:3793): pid=148262 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
type=USER_START msg=audit(1595591941.959:3794): pid=148262 uid=0 auid=1000 ses=6 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'UID="root" AUID="vagrant"
🇩 _output/containerd
go build -o _output/containerd \
-tags 'seccomp apparmor selinux no_btrfs' \
-ldflags '-X github.com/containerd/cri/vendor/github.com/containerd/containerd/version.Version=f3b0a52d-TEST' \
-gcflags '' \
github.com/containerd/cri/cmd/containerd
🇩 binaries
🇩 test-cri
/go/bin/critest
'/go/src/github.com/containerd/cri/hack/../_output/containerd' -> '/usr/local/bin/containerd-test'
changing security context of '/usr/local/bin/containerd-test'
critest version: 1.18.0-89-gbaca4a1
Running Suite: CRI validation
=============================
Random Seed: 123456789 - Will randomize all specs
Will run 97 specs
Running in parallel across 8 nodes
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return runtime conditions [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:45
STEP: test runtime status
[AfterEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•SS
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with digest should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:53
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Pull image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image : gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
STEP: Remove image by ID : sha256:268449409a783c0b51b294340457a2603fec06d259f51ab996463b5115de19f6
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-digest@sha256:9179135b4b4cc5a8721e09379244807553c318d92fa3111a65133241551ca343
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image with tag should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:41
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Pull image : gcr.io/cri-tools/test-image-tag:test
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-tag:test
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image : gcr.io/cri-tools/test-image-tag:test
STEP: Remove image by ID : sha256:4bd50f4efcffaa1046da7381bb768edc06a5e73f2e34e48a6241ef999859db6b
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:test
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with just selinux level set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 90a5a5caf579b73484d7998f70a283ffa5fbe97991cc3da34b361a88985a1200
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should return error if RunAsGroup is set without RunAsUser
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:375
STEP: create pod
STEP: create container with invalid RunAsGroup
STEP: create invalid RunAsGroup container
STEP: create a container with RunAsGroup without RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 04:58:32.851311 129763 remote_runtime.go:200] CreateContainer in sandbox "413e18af856afc30e0c5de3208cfd64ff0b4026ef53aa4902e97c51c02cb54b1" from runtime service failed: rpc error: code = Unknown desc = failed to generate user string: user group "1002" is specified without user
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing stopped container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:134
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:32.708: INFO: Created container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c"
STEP: start container
STEP: Start container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c
Jul 24 04:58:32.868: INFO: Started container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c"
STEP: test stop container
STEP: Stop container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c
Jul 24 04:58:32.966: INFO: Stopped container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c"
STEP: Get container status for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c
STEP: test remove container
STEP: Remove container for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c
Jul 24 04:58:32.975: INFO: Removed container "0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c"
STEP: List containers for containerID: 0942a7ed5306dea2fc32b692e1c12a9547c8b1420acdc2e9c3e1d1918afdc25c
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:265
STEP: creating a podSandbox with hostNetwork false
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:33.011: INFO: Created container "1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451"
STEP: start container
STEP: Start container for containerID: 1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451
Jul 24 04:58:33.118: INFO: Started container "1c1c28dcb53198e6632791f9261aa6c85e1cfd4c7afbb3b936b4847bc0793451"
STEP: checking host http service port in the container
Jul 24 04:58:33.119: INFO: Open log file /tmp/podLogTest521854257/NamespaceOption-PodSandbox-fdffcf9c-cda4-11ea-991e-5254001ff4e5/container-with-HostNetwork-test-ff4b7fbb-cda4-11ea-991e-5254001ff4e5.log
Jul 24 04:58:33.119: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:638
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests720366365/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:33.024: INFO: Created container "35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e"
STEP: Start container for containerID: 35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e
Jul 24 04:58:33.186: INFO: Started container "35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e"
STEP: Get container status for containerID: 35186932d7e7c4c17789a307395e7e8a2a5ea451745b16b79eeac985210ca76e
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=false and stdin=false [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:66
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:34.174: INFO: Created container "49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077"
STEP: start container
STEP: Start container for containerID: 49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077
Jul 24 04:58:34.236: INFO: Started container "49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077"
STEP: exec given command in container: 49fad4f4bd0eff5011bd5af1e4d5045b687696a5c563bd8d52ebf6bb10d41077
Jul 24 04:58:34.236: INFO: Get exec url: http://127.0.0.1:46467/exec/a9SVO1KJ
STEP: check the output of exec
Jul 24 04:58:34.236: INFO: Parse url "http://127.0.0.1:46467/exec/a9SVO1KJ" succeed
Jul 24 04:58:34.274: INFO: Check exec url "http://127.0.0.1:46467/exec/a9SVO1KJ" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync with timeout [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:161
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:33.203: INFO: Created container "37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d"
STEP: start container
STEP: Start container for containerID: 37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d
Jul 24 04:58:33.321: INFO: Started container "37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d"
STEP: test execSync with timeout
E0724 04:58:34.389979 129758 remote_runtime.go:351] ExecSync 37e385ebe5470e0c37f216c605455d0e5e06d86b970eaab788a7f82ae43eae0d 'sleep 4321' from runtime service failed: rpc error: code = DeadlineExceeded desc = failed to exec in container: timeout 1s exceeded: context deadline exceeded
STEP: timeout exec process should be gone
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support MaskedPaths
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:481
STEP: create pod
STEP: create container with MaskedPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:34.675: INFO: Created container "9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1"
STEP: Start container for containerID: 9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1
Jul 24 04:58:34.755: INFO: Started container "9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1"
STEP: Get container status for containerID: 9b64aeacef98db25e14128ed37015be4d5b7ea34f435c742c8555ab5ac2257b1
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support unsafe sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:68
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:34.823: INFO: Created container "3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d"
STEP: start container
STEP: Start container for containerID: 3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d
Jul 24 04:58:34.877: INFO: Started container "3539f72a3cf74487e0812d575046f5011fcc88ec7496fb4eb2129129d9e08e4d"
STEP: check sysctls fs.mqueue.msg_max
[AfterEach] runtime should support sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUserName
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:339
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUserName container
STEP: create a container with RunAsUserName
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:35.260: INFO: Created container "8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7"
STEP: start container
STEP: Start container for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7
Jul 24 04:58:35.338: INFO: Started container "8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7"
STEP: Get container status for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7
STEP: verify RunAsUserName for container
STEP: verify execSync output
STEP: execSync for containerID: 8e2eda138e1e36925115a93a1880ae6d817250198ad47d620811f4deb4d0a7a7
Jul 24 04:58:35.371: INFO: Execsync succeed
Jul 24 04:58:35.371: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:130
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIPC is true
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:35.759: INFO: Created container "895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04"
STEP: start container
STEP: Start container for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04
Jul 24 04:58:35.815: INFO: Started container "895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04"
STEP: Get container status for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04
STEP: check if the shared memory segment is included in the container
STEP: execSync for containerID: 895ae477e0021718d35739c0b1f64e3a322741c05a66b244049d4bc7dd955d04
Jul 24 04:58:35.839: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support stopping PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:60
STEP: run PodSandbox
STEP: test stop PodSandbox
STEP: Stop PodSandbox for podID: 89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed
Jul 24 04:58:36.390: INFO: Stopped PodSandbox "89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed"
STEP: Get PodSandbox status for podID: 89b2a28a8981f208c3c474d5aaa9d10a313519e91b393bf21a89eefd884d15ed
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support portforward [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:124
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 04:58:35.266: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 04:58:35.283: INFO: Created container "059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0"
STEP: start the web server container
STEP: Start container for containerID: 059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0
Jul 24 04:58:35.360: INFO: Started container "059c888a0142d05f18329b78522a83ee8fd826a044b968db4ea70d686ecaa4d0"
STEP: port forward PodSandbox: f34d3ce1be7f91073c08282e239aa60460f0eaa689b3aec0f9d085b82920dd03
Jul 24 04:58:35.361: INFO: Get port forward url: http://127.0.0.1:46467/portforward/3mnvWUDA
STEP: check the output of portforward
Jul 24 04:58:35.361: INFO: Parse url "http://127.0.0.1:46467/portforward/3mnvWUDA" succeed
STEP: check if we can get nginx main page via localhost:12001
STEP: get the IP:port needed to be checked
Jul 24 04:58:35.361: INFO: the IP:port is http://127.0.0.1:12001
STEP: check the content of http://127.0.0.1:12001
STEP: start port forward
Forwarding from 127.0.0.1:12001 -> 80
Forwarding from [::1]:12001 -> 80
Handling connection for 12001
Jul 24 04:58:36.367: INFO: check port mapping succeed
Jul 24 04:58:36.367: INFO: Check port forward url "http://127.0.0.1:46467/portforward/3mnvWUDA" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support stopping container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:100
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:36.348: INFO: Created container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9"
STEP: start container
STEP: Start container for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9
Jul 24 04:58:36.419: INFO: Started container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9"
STEP: test stop container
STEP: Stop container for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9
Jul 24 04:58:36.474: INFO: Stopped container "d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9"
STEP: Get container status for containerID: d2e774dbd91c3e0b6a59872e8982883c62f5651c579e293d971743c64ce486c9
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status should support all kinds of references [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:60
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Pull image : gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag@sha256:e10179315117cd3d9ef6902d464b4f3efb3c45f61079e0de81e215ea5ef6e5ce
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image : gcr.io/cri-tools/test-image-tag:all
STEP: Remove image by ID : sha256:2d4bd5735ff286d2879cfb24a6f284a174c470f10e5d21adc4427c6bbc2c2c36
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-tag:all
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp unconfined on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:588
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:37.068: INFO: Created container "e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8"
STEP: start container
STEP: Start container for containerID: e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8
Jul 24 04:58:37.154: INFO: Started container "e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8"
STEP: Get container status for containerID: e949d0db2e48a3b61a9b9974c9d10ecab17e54e17546e43176b260cfead7d5c8
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should create containers with the same process label
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 583f65d956281ff2b5c1638dc491a22a1fb6a3315ab543a035e9a4a8fe693f8e
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f7cf258e05770eb305d6333ccbf9d0f77c00814b24c29eddc22aa72ec659cc8a
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with just selinux level set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:50
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 027c7273ec390ffb429bb06a2f7425a29ad063588e65955f6d7eaa87eb3089c7
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support creating container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:83
STEP: test create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:38.279: INFO: Created container "e59f4f9e978af606e1003a5e53b1e88accc35bc6309c5b339a5fd30cf70c2f9b"
STEP: test list container
STEP: List containers for containerID: e59f4f9e978af606e1003a5e53b1e88accc35bc6309c5b339a5fd30cf70c2f9b
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsGroup
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
STEP: create pod
STEP: create a PodSandbox with log directory
STEP: create container for security context RunAsGroup
STEP: create RunAsGroup container
STEP: create a container with RunAsUser and RunAsGroup
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:34.282: INFO: Created container "49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24"
STEP: start container
STEP: Start container for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24
Jul 24 04:58:34.350: INFO: Started container "49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24"
STEP: Get container status for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24
STEP: Get container status for containerID: 49700f41dd89ceb095e9dee6ced2efa2f969119d4d9bf26e636355d470736e24
STEP: verify RunAsGroup for container
STEP: check container output
STEP: verify log contents
Jul 24 04:58:38.352: INFO: Open log file /tmp/podLogTest728702824/PodSandbox-with-log-directory-fecea4ba-cda4-11ea-ab99-5254001ff4e5/container-with-RunAsGroup-test-001007c0-cda5-11ea-ab99-5254001ff4e5.log
Jul 24 04:58:38.352: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:6.491 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support RunAsGroup
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:357
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rshared' should support propagation from host to container and vice versa
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:94
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:38.138: INFO: Created container "588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18"
STEP: test start container with volume
STEP: Start container for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18
Jul 24 04:58:38.228: INFO: Started container "588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18"
STEP: Get container status for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18
Jul 24 04:58:38.271: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18
Jul 24 04:58:38.303: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 588edcb683c647abcb07baed7661760794e028780922e4aadccc2d750561eb18
Jul 24 04:58:38.348: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing created container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:111
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:38.556: INFO: Created container "4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013"
STEP: test remove container
STEP: Remove container for containerID: 4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013
Jul 24 04:58:38.570: INFO: Removed container "4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013"
STEP: List containers for containerID: 4faa96ff32a430996f7121a8d5cbb17d5a7bbc4ac9cfd649edca60cc0f02b013
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support DNS config [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:54
STEP: create a PodSandbox with DNS config
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:39.348: INFO: Created container "2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd"
STEP: start container
STEP: Start container for containerID: 2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd
Jul 24 04:58:39.402: INFO: Started container "2218295014437daa5153cb609ddd0691937db396954b6b3819a046cc595d7dbd"
STEP: check DNS config
STEP: get the current dns config via execSync
Jul 24 04:58:39.435: INFO: check DNS config succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rprivate' should not support propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:60
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:39.564: INFO: Created container "8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168"
STEP: test start container with volume
STEP: Start container for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168
Jul 24 04:58:39.617: INFO: Started container "8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168"
STEP: Get container status for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168
Jul 24 04:58:39.652: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168
Jul 24 04:58:39.689: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: 8b547dd8640fa4a35c23a1fc8667164ae61fffdddefd63ad1986f3b16b338168
Jul 24 04:58:39.732: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should error on create with wrong options
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 04:58:39.844456 129792 remote_runtime.go:200] CreateContainer in sandbox "f1d9811153c1de4fe6356abe7a409802b528c684a988acaf29f18d2f49bfe60a" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "06443ac67277decc62705d9177384548a9c29a58f979e4428b74792ca709508f" spec: the format of 'level' "s0,c4,c5" is not correct
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support PodPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:194
STEP: create podSandbox for sharing process namespace
Jul 24 04:58:37.255: INFO: Pid namespace is "POD"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 04:58:39.028: INFO: Created container "664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974"
STEP: start container
STEP: Start container for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974
Jul 24 04:58:39.080: INFO: Started container "664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974"
STEP: Get container status for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974
STEP: get nginx container pid
STEP: execSync for containerID: 664ded5732999403698fbdc1560e1cce4cd5aa89777547aee4e335247762b974
Jul 24 04:58:40.106: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support running PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:51
STEP: test run a default PodSandbox
STEP: Get PodSandbox status for podID: c936916414369e9a758a44f34f5f01a528b6f7fa3930a00c517324bf06a63df3
STEP: test list PodSandbox
STEP: List PodSandbox for podID: c936916414369e9a758a44f34f5f01a528b6f7fa3930a00c517324bf06a63df3
STEP: List PodSandbox.
Jul 24 04:58:40.298: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support exec with tty=true and stdin=true [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:87
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:40.799: INFO: Created container "9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa"
STEP: start container
STEP: Start container for containerID: 9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa
Jul 24 04:58:40.865: INFO: Started container "9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa"
STEP: exec given command in container: 9c4b0c6beda0051e926b0bef240f67f38ba5a9b8a2ed5a1caa107bbd298ef3fa
Jul 24 04:58:40.866: INFO: Get exec url: http://127.0.0.1:46467/exec/NvSRRczF
STEP: check the output of exec
Jul 24 04:58:40.868: INFO: Parse url "http://127.0.0.1:46467/exec/NvSRRczF" succeed
Jul 24 04:58:40.917: INFO: Check exec url "http://127.0.0.1:46467/exec/NvSRRczF" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 04:58:40.782: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 04:58:40.801: INFO: Created container "5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6"
STEP: start the httpd container
STEP: Start container for containerID: 5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6
Jul 24 04:58:40.896: INFO: Started container "5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6"
STEP: Get container status for containerID: 5f8c7d10a09e7064089b3168f27a9e1c4016d4f8d7296ff002dd84cacad335c6
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:40.918: INFO: Created container "09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5"
STEP: start the busybox container
STEP: Start container for containerID: 09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5
Jul 24 04:58:40.978: INFO: Started container "09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5"
STEP: Get container status for containerID: 09f3e5d7acb86ac743686df6b604d5445fb6b7ee6fff380dbfef6d27ea53e0e5
[It] should support container log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:82
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostIpc is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:162
STEP: create shared memory segment on the host
STEP: create podSandbox for security context HostIpc is false
STEP: create NamespaceOption podSandbox
STEP: create a default container with namespace
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:41.734: INFO: Created container "67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66"
STEP: start container
STEP: Start container for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66
Jul 24 04:58:41.799: INFO: Started container "67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66"
STEP: Get container status for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66
STEP: check if the shared memory segment is not included in the container
STEP: execSync for containerID: 67f562efa3c3f7f29d1bf8af8f59aa2a8f4307f15f4c2b7b125ca89d0cb11e66
Jul 24 04:58:41.830: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support setting Capability
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:456
STEP: create pod
STEP: create container with security context Capability and test
STEP: create Capability container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:41.812: INFO: Created container "5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692"
STEP: Start container for containerID: 5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692
Jul 24 04:58:41.881: INFO: Started container "5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692"
STEP: Get container status for containerID: 5b513184d5584b91efea1beffc8b3dd286b52496b620bcf0f864870666f38692
STEP: create container without security context Capability and test
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:41.930: INFO: Created container "376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f"
STEP: Start container for containerID: 376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f
Jul 24 04:58:41.996: INFO: Started container "376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f"
STEP: Get container status for containerID: 376b3a39be00ef51029bc8579a642df0d098e7df933a4dcdc703f4a0cdd22e5f
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:211
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:42.228: INFO: Created container "759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39"
STEP: test start container with volume
STEP: Start container for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39
Jul 24 04:58:42.313: INFO: Started container "759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39"
STEP: Get container status for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39
STEP: check whether 'hostPath' contains file or dir in container
STEP: execSync for containerID: 759e8c47e66e24ef39dc96fa43adeb863bf0a76df214628e658cb7f5dc8cbb39
Jul 24 04:58:42.371: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] should work with selinux set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: cfe560c88759ecf32f79771b101306e55be21333d9619624283782a2037d808c
STEP: get container status
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 630355d6e88352d6823505ba4304985c0a629b76033a6bc6a514b8f98bf25d27
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:37
[It] runtime should return version info [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/runtime_info.go:41
Jul 24 04:58:42.842: INFO: Get version info succeed
[AfterEach] [k8s.io] Runtime info
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support set hostname [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:70
STEP: create a PodSandbox with hostname
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:42.949: INFO: Created container "0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51"
STEP: start container
STEP: Start container for containerID: 0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51
Jul 24 04:58:43.002: INFO: Started container "0cceefcb25a646df3e9febe766fbf632fc11d949b650f44b33335a0057d2aa51"
STEP: check hostname
STEP: get the current hostname via execSync
Jul 24 04:58:43.028: INFO: check hostname succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:621
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create unconfined Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:43.194: INFO: Created container "4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e"
STEP: Start container for containerID: 4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e
Jul 24 04:58:43.253: INFO: Started container "4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e"
STEP: Get container status for containerID: 4535d0792e24d304166f9cbbd8bef229a7b86149595d0f94ea5e9c3babbf1d5e
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should block sethostname with docker/default seccomp profile and no extra caps
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:708
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:43.940: INFO: Created container "76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018"
STEP: Start container for containerID: 76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018
Jul 24 04:58:44.114: INFO: Started container "76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018"
STEP: Get container status for containerID: 76d722dbbf20296ea8b8abf4f62e7c044edb6e3c4e32f866b6d780b13c41e018
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should not support a custom seccomp profile without using localhost/ as a prefix
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:654
STEP: create pod
STEP: create container with seccompBlockHostNameProfile and test
STEP: create /tmp/seccomp-tests888906465/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 04:58:44.345718 129763 remote_runtime.go:200] CreateContainer in sandbox "d695bcf701398b52f740d1290effcdb574f807c5895e44fea245abfc90a431a0" from runtime service failed: rpc error: code = Unknown desc = failed to generate seccomp spec opts: invalid seccomp profile "/tmp/seccomp-tests888906465/block-host-name.json"
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_true
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:40.574: INFO: Created container "b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c"
STEP: start container
STEP: Start container for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c
Jul 24 04:58:40.627: INFO: Started container "b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c"
STEP: Get container status for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c
STEP: Get container status for containerID: b56ff71161d9e98073c8a9580f00dab5912d5feeb7c72d45103988fd7357dd3c
STEP: Check whether rootfs is read-only
STEP: verify log contents
Jul 24 04:58:44.628: INFO: Open log file /tmp/podLogTest648024821/PodSandbox-with-log-directory-02953e54-cda5-11ea-991e-5254001ff4e5/container-with-ReadOnlyRootfs-true-test-03d09482-cda5-11ea-991e-5254001ff4e5.log
Jul 24 04:58:44.628: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:6.313 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support that ReadOnlyRootfs is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:402
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp localhost/profile on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:599
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:44.700: INFO: Created container "0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05"
STEP: start container
STEP: Start container for containerID: 0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05
Jul 24 04:58:44.764: INFO: Started container "0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05"
STEP: Get container status for containerID: 0babf3706da56d4753808b2be20f527afee0f3395a7d92c9f6eef47de1d5cc05
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 04:58:44.994: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 04:58:45.030: INFO: Created container "e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77"
STEP: start the httpd container
STEP: Start container for containerID: e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77
Jul 24 04:58:45.159: INFO: Started container "e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77"
STEP: Get container status for containerID: e8f3149c80aa4116a4eeb67759cc68b6a129984dea924b6137da2cb39a000d77
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:45.250: INFO: Created container "c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86"
STEP: start the busybox container
STEP: Start container for containerID: c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86
Jul 24 04:58:45.352: INFO: Started container "c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86"
STEP: Get container status for containerID: c7db65a519beaf539a91b002f2e4ec5491d6417eca431123ac1d967ade341a86
[It] should support network
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:78
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: 65ec7a10a110b30f1eb7dfb83617fc48b7666a14e7b3853d6fe2d37e06d07437
Jul 24 04:58:45.352: INFO: the IP:port is http://10.88.1.26:80
STEP: check the content of http://10.88.1.26:80
Jul 24 04:58:45.355: INFO: check port mapping succeed
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:693
STEP: create pod
STEP: create container with docker/default seccomp profile and test
STEP: create docker/default Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:44.994: INFO: Created container "3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a"
STEP: Start container for containerID: 3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a
Jul 24 04:58:45.275: INFO: Started container "3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a"
STEP: Get container status for containerID: 3a244721846f7bbc22509875717648d2c892e37cca6d4e2bd801fcee1390831a
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: dd91a854c68d874081795ab058cb18a64187ef9616a1369c7617f81d563b573c
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•S
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 repoTags in the result image [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:148
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
STEP: Pull image : gcr.io/cri-tools/test-image-tags:1
STEP: Pull image : gcr.io/cri-tools/test-image-tags:2
STEP: Pull image : gcr.io/cri-tools/test-image-tags:3
STEP: Remove image : gcr.io/cri-tools/test-image-tags:1
STEP: Remove image by ID : sha256:0e64e9ed908ed85297adef4b4a17894e98c22412af400fb4460cc3dbb0c31248
STEP: Remove image : gcr.io/cri-tools/test-image-tags:2
STEP: Remove image : gcr.io/cri-tools/test-image-tags:3
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:90
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 676d0600f9cd8f578c567cabb04d73c63ad1d643d6df2c73bbb610121723a466
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] image status get image fields should not have Uid|Username empty [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:84
Jul 24 04:58:42.707: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid
Jul 24 04:58:43.864: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username
Jul 24 04:58:44.708: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-uid-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-uid-group
Jul 24 04:58:45.620: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-user-username-group:latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image : gcr.io/cri-tools/test-image-user-username-group
STEP: Remove image by ID : sha256:1cc15385ed98cb0d06136918ebb45fa2e796d250240fe558bb8ddcfac3f5149e
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid-group
STEP: Remove image by ID : sha256:e65a2dfd1afc697086ed1b7d5050efec8983899512c3b1089de3ba2898f24665
STEP: Remove image : gcr.io/cri-tools/test-image-user-username
STEP: Remove image by ID : sha256:9372c06109c0dbe22dc32580caf650f2a972ff0ab279d675b4a3d29a9c86e9cf
STEP: Remove image : gcr.io/cri-tools/test-image-user-uid
STEP: Remove image by ID : sha256:89a192dd06da1227184921679d6d31bb8659ac5eec995f2a0b89c7649938d41f
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] process label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 6373cb8ab6a5ead76d35ec29599531adf332f4f04ae2247e662c9fb279f5e3bb
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] process label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:95
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 03501e5da4d2aa388586f0b418e1259a0a620f5dd97f06a6bbf5bde19f98241f
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should error on create with wrong options
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:69
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
E0724 04:58:48.577029 129745 remote_runtime.go:200] CreateContainer in sandbox "1c9bb24af3864aa1f9077dc008d220bd91debb3f7e88a72c41d5ade1c792ad64" from runtime service failed: rpc error: code = Unknown desc = failed to generate container "679e0938f3cc093c4b32b850d3dcbd1b022154be642a85c94eed639755539ac9" spec: the format of 'level' "s0,c4,c5" is not correct
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support listing container stats [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:180
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:48.463: INFO: Created container "0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b"
STEP: start container
STEP: Start container for containerID: 0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b
Jul 24 04:58:48.541: INFO: Started container "0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b"
STEP: test container stats
STEP: List container stats for containerID: 0acc945359ff944c72e8512db6c7bd0cdc2389ef5bb498d952ef01b9768b3f2b
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:45
[BeforeEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:54
STEP: create a PodSandbox
STEP: create a httpd container
Jul 24 04:58:48.222: INFO: Use latest as default image tag.
STEP: Get image status for image: httpd:latest
STEP: Create container.
Jul 24 04:58:48.237: INFO: Created container "a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066"
STEP: start the httpd container
STEP: Start container for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066
Jul 24 04:58:48.316: INFO: Started container "a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066"
STEP: Get container status for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066
STEP: create a busybox container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:48.342: INFO: Created container "369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed"
STEP: start the busybox container
STEP: Start container for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed
Jul 24 04:58:48.409: INFO: Started container "369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed"
STEP: Get container status for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed
[It] should support container exec
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:103
STEP: execSync for containerID: a26195860aa9015c7a332a559273763969774d13a493ff10e6026416302d0066
Jul 24 04:58:48.456: INFO: Execsync succeed
STEP: execSync for containerID: 369182a0def0762336e285fc38aa37b5bdfac5657abd5e063152700a29cbc1ed
Jul 24 04:58:48.502: INFO: Execsync succeed
[AfterEach] when running multiple containers in a pod
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/multi_container_linux.go:69
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: cleanup log path
[AfterEach] [k8s.io] Multiple Containers [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] listImage should get exactly 3 image in the result list [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:126
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Pull image : gcr.io/cri-tools/test-image-1:latest
STEP: Pull image : gcr.io/cri-tools/test-image-2:latest
STEP: Pull image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image : gcr.io/cri-tools/test-image-1:latest
STEP: Remove image by ID : sha256:6e7cd506a324a5bcc6cf92d6e5d902d44b55bf34864eb530ab87468d0941bbdc
STEP: Remove image : gcr.io/cri-tools/test-image-2:latest
STEP: Remove image by ID : sha256:393af497be6667b8953fe5909d97afc9f65d1eef10f89abe3fac412c859e4bcf
STEP: Remove image : gcr.io/cri-tools/test-image-3:latest
STEP: Remove image by ID : sha256:139f6b5051cbce8782b74253e8ca8ceebd8116fdb8ad88d4168fefe61cac2579
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:37
[It] public image without tag should be pulled and removed [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/image.go:47
STEP: Remove image : gcr.io/cri-tools/test-image-latest
Jul 24 04:58:48.852: INFO: Use latest as default image tag.
STEP: Pull image : gcr.io/cri-tools/test-image-latest:latest
STEP: Check image list to make sure pulling image success : gcr.io/cri-tools/test-image-latest
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image : gcr.io/cri-tools/test-image-latest
STEP: Remove image by ID : sha256:b27d5581bd963403f460bf7fbcbc016c08f988bd2ea94956ebe0c7ae60f05cb7
STEP: Check image list empty
STEP: Get image status for image: gcr.io/cri-tools/test-image-latest
[AfterEach] [k8s.io] Image Manager
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should work with selinux set
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:58
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f1ac802088b96ce1837b4ee8db208147cc6e6790c054a84cb7c7492da0bbc918
STEP: get container status
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should allow privilege escalation when false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
STEP: create container alpine-nnp-false-075832bd-cda5-11ea-991e-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 04:58:46.497: INFO: Created container "213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d"
STEP: Start container for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d
Jul 24 04:58:46.577: INFO: Started container "213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d"
STEP: Get container status for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d
STEP: Get container status for containerID: 213c5410a61244b09ae170072583b5da997f08c7ae92a0e677fa0078c3d4673d
STEP: check container output
STEP: verify log contents
Jul 24 04:58:50.578: INFO: Open log file /tmp/podLogTest388173551/PodSandbox-with-log-directory-0659443f-cda5-11ea-991e-5254001ff4e5/alpine-nnp-false-075832bd-cda5-11ea-991e-5254001ff4e5.log
Jul 24 04:58:50.578: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:5.973 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725
should allow privilege escalation when false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:761
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:37
[It] runtime should support removing PodSandbox [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:68
STEP: run PodSandbox
STEP: stop PodSandbox
STEP: Stop PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74
Jul 24 04:58:50.884: INFO: Stopped PodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74"
STEP: test remove PodSandbox
STEP: Remove PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74
Jul 24 04:58:50.888: INFO: Removed PodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74"
STEP: List PodSandbox for podID: dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74
STEP: List PodSandbox.
Jul 24 04:58:50.889: INFO: List PodSandbox succeed
[AfterEach] runtime should support basic operations on PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod.go:44
STEP: stop PodSandbox
E0724 04:58:50.889193 129745 remote_runtime.go:128] StopPodSandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74" from runtime service failed: rpc error: code = Unknown desc = an error occurred when try to find sandbox "dd5b34c5966288bbe9559da492ac463ae38c1d5dbb70d9b151538fe807010b74": does not exist
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support starting container with log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:47.109: INFO: Created container "0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372"
STEP: start container with log
STEP: Start container for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372
Jul 24 04:58:47.164: INFO: Started container "0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372"
STEP: Get container status for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372
STEP: Get container status for containerID: 0ac3dadfa1a682dd1ee9d6a7def337eb26baedde2b853ad80c7008248254f372
STEP: check the log context
STEP: verify log contents
Jul 24 04:58:51.166: INFO: Open log file /tmp/podLogTest002541696/PodSandbox-with-log-directory-069cfe95-cda5-11ea-a543-5254001ff4e5/container-with-log-test-07b69824-cda5-11ea-a543-5254001ff4e5.log
Jul 24 04:58:51.166: INFO: Parse container log succeed
[AfterEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:6.151 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support starting container with log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:269
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:438
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:51.028: INFO: Created container "f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034"
STEP: start container
STEP: Start container for containerID: f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034
Jul 24 04:58:51.099: INFO: Started container "f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034"
STEP: Get container status for containerID: f0e464d251cf7a84be91423876c75b1cd0e7a81f3a67714319f24c39d7985034
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with only container port [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:86
STEP: create a PodSandbox with container port port mapping
STEP: create a web server container
Jul 24 04:58:50.090: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 04:58:50.108: INFO: Created container "38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198"
STEP: start the web server container
STEP: Start container for containerID: 38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198
Jul 24 04:58:50.162: INFO: Started container "38bdd86b61c0785ef624636c52c8147d665c656e1860c64f4cdab7a2f6217198"
STEP: check the port mapping with only container port
STEP: get the IP:port needed to be checked
STEP: Get PodSandbox status for podID: 775d9efc810e39a2f0334c5a16f735fad3de471eea38fb27c1611125c093a6fd
Jul 24 04:58:50.163: INFO: the IP:port is http://10.88.1.37:80
STEP: check the content of http://10.88.1.37:80
Jul 24 04:58:51.164: INFO: check port mapping succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp docker/default on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:682
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:52.026: INFO: Created container "e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55"
STEP: start container
STEP: Start container for containerID: e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55
Jul 24 04:58:52.218: INFO: Started container "e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55"
STEP: Get container status for containerID: e29405e1e634a86c240f785a1ac6976086460d172ac286d4c6ad72c016c27c55
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] runtime should ignore a seccomp profile that blocks setting hostname when privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:665
STEP: create privileged pod
STEP: create Privileged podSandbox
STEP: create privileged container with seccompBlockHostNameProfile and test
STEP: create localhost//tmp/seccomp-tests999093587/block-host-name.json Seccomp container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:52.296: INFO: Created container "3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2"
STEP: Start container for containerID: 3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2
Jul 24 04:58:52.394: INFO: Started container "3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2"
STEP: Get container status for containerID: 3d707c2a2bcbe6b170670efee2218075f56c869932344d02f041afd69cda44e2
STEP: set hostname in container to determine whether sethostname is blocked
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support removing running container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:121
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:53.351: INFO: Created container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06"
STEP: start container
STEP: Start container for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06
Jul 24 04:58:53.404: INFO: Started container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06"
STEP: test remove container
STEP: Remove container for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06
Jul 24 04:58:53.444: INFO: Removed container "4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06"
STEP: List containers for containerID: 4f14f89547d09ba58e45ed06ab41fc43f41b63124f97bb2a54e0d0877bda7c06
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have correct role and type
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:80
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: b13761f1c5398678009ac5f17350ef490db5286e05d12979b55a33c426b0ccf7
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] should create containers with the same process label
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:100
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: c090a812af228bc3c3b166ee95ef4bd3c46d378a7cf5e28a33a27d7c2fbfdb0a
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 4db50f9edcc785a3048db32565f9634314031b87aa640a084678e3fe77d3ce3c
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support Privileged is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:420
STEP: create pod
STEP: create Privileged podSandbox
STEP: create container for security context Privileged is true
STEP: create Privileged container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:54.206: INFO: Created container "cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0"
STEP: start container
STEP: Start container for containerID: cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0
Jul 24 04:58:54.263: INFO: Started container "cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0"
STEP: Get container status for containerID: cd25692d928ee0e808b8ddb75eef6346ee2b5ff0693acff6db498238835b5fe0
STEP: check the Privileged container
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support RunAsUser
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:321
STEP: create pod
STEP: create container for security context RunAsUser
STEP: create RunAsUser container
STEP: create a container with RunAsUser
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:54.455: INFO: Created container "490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986"
STEP: start container
STEP: Start container for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986
Jul 24 04:58:54.521: INFO: Started container "490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986"
STEP: Get container status for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986
STEP: verify RunAsUser for container
STEP: verify execSync output
STEP: execSync for containerID: 490986a25989914d7cbe34e8b10b8af7167e9501a82793d1b0a0d9637b47f986
Jul 24 04:58:54.556: INFO: Execsync succeed
Jul 24 04:58:54.556: INFO: verify Execsync output succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when multiple pod sandboxes are not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:137
[It] should create containers with different process labels
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:147
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: f522d25c1a97af5d40a020529f4015e266efac848b3a6e8cb9b3cd2e0f8eb4f1
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 99efc4a7ebb2582aac45530f9a2a09ed52872b58b3a0697b28e643b05e9d6292
[AfterEach] when multiple pod sandboxes are not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:142
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:37
[It] should support safe sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:53
STEP: create a PodSandbox with sysctls
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:55.423: INFO: Created container "ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d"
STEP: start container
STEP: Start container for containerID: ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d
Jul 24 04:58:55.485: INFO: Started container "ec1647c1a575c2688673f677c1c8edda17af771288e420c490449ce2adcb5d4d"
STEP: check sysctls kernel.shm_rmid_forced
[AfterEach] runtime should support sysctls
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/pod_linux.go:46
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] PodSandbox
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ReadonlyPaths
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:510
STEP: create pod
STEP: create container with ReadonlyPaths
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:55.662: INFO: Created container "98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53"
STEP: Start container for containerID: 98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53
Jul 24 04:58:55.723: INFO: Started container "98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53"
STEP: Get container status for containerID: 98bca861650263577112426c8921df9f00deb719f204b4522a4b50a64fc48c53
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:122
STEP: create Privileged podSandbox
[It] mount label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 5af4c25bfe275c16146f4fe5b37702e24003900a65d378fe28e8cab6e5558485
[AfterEach] when single pod sandbox is privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:126
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:256
STEP: create a PodSandbox with log directory
[It] runtime should support reopening container log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
STEP: create container with log
STEP: create a container with log and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:51.181: INFO: Created container "6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8"
STEP: start container with log
STEP: Start container for containerID: 6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8
Jul 24 04:58:51.271: INFO: Started container "6ad0a3dc7a11028838a62f290e56d9852784d33519032e965b0a84b74fc6c2d8"
Jul 24 04:58:51.272: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log
Jul 24 04:58:51.272: INFO: Parse container log succeed
STEP: rename container log
STEP: reopen container log
Jul 24 04:58:51.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log
Jul 24 04:58:51.273: INFO: Parse container log succeed
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log
Jul 24 04:58:52.273: INFO: Parse container log succeed
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:52.273: INFO: Parse container log succeed
Jul 24 04:58:52.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:52.273: INFO: Parse container log succeed
Jul 24 04:58:53.273: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:53.273: INFO: Parse container log succeed
Jul 24 04:58:54.274: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:54.275: INFO: Parse container log succeed
Jul 24 04:58:55.276: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:55.276: INFO: Parse container log succeed
Jul 24 04:58:56.276: INFO: Open log file /tmp/podLogTest655099072/PodSandbox-with-log-directory-08c73967-cda5-11ea-b482-5254001ff4e5/container-reopen-log-test-0a237f2a-cda5-11ea-b482-5254001ff4e5.log.new
Jul 24 04:58:56.276: INFO: Parse container log succeed
[AfterEach] runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:260
STEP: stop PodSandbox
STEP: delete PodSandbox
STEP: clean up the TempDir
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:8.652 seconds]
[k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support log
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:252
runtime should support reopening container log [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:285
------------------------------
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:39
[It] runtime should support port mapping with host port and container port [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:106
STEP: create a PodSandbox with host port and container port port mapping
STEP: create a web server container
Jul 24 04:58:56.294: INFO: Use latest as default image tag.
STEP: Get image status for image: nginx:latest
STEP: Create container.
Jul 24 04:58:56.310: INFO: Created container "5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08"
STEP: start the web server container
STEP: Start container for containerID: 5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08
Jul 24 04:58:56.387: INFO: Started container "5089acbe8b4809773424b20664fab908ec62a83cb5a629786c59d78da9e63f08"
STEP: check the port mapping with host port and container port
STEP: get the IP:port needed to be checked
Jul 24 04:58:56.387: INFO: the IP:port is http://127.0.0.1:12000
STEP: check the content of http://127.0.0.1:12000
Jul 24 04:58:57.388: INFO: check port mapping succeed
[AfterEach] runtime should support networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/networking.go:47
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Networking
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:40
[BeforeEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:49
STEP: create Privileged podSandbox
[It] mount with 'rslave' should support propagation from host to container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:128
STEP: create host path and flag file
STEP: create container with volume
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:57.641: INFO: Created container "e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4"
STEP: test start container with volume
STEP: Start container for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4
Jul 24 04:58:57.741: INFO: Started container "e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4"
STEP: Get container status for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4
STEP: create a propatation mount point in host
STEP: check whether propagationMntPoint contains file or dir in container
STEP: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4
Jul 24 04:58:57.798: INFO: Execsync succeed
STEP: create a directory named containerMntPoint as a mount point in container
STEP: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4
Jul 24 04:58:57.847: INFO: Execsync succeed
STEP: mount /etc to the mount point in container
STEP: execSync for containerID: e4e6f026425ad1168972a72a001557b67d2480ef5afe00dbe9f0a2bd5bffe7d4
Jul 24 04:58:57.884: INFO: Execsync succeed
STEP: check whether containerMntPoint contains file or dir in host
STEP: clean up the TempDir
[AfterEach] runtime should support mount propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:53
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container Mount Propagation
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:40
[BeforeEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:110
[It] mount label should have category
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:85
STEP: create a container with selinux
STEP: Get image status for image: busybox:1.28
STEP: Create container.
STEP: start container with selinux
STEP: Get container status for containerID: 9bc5e1259252006e208b949cbce0232bd9edb163c5d649cbb2fc3c8aec64dda9
[AfterEach] when single pod sandbox is not privileged
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/selinux_linux.go:114
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] SELinux
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:50
[It] runtime should support attach [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
STEP: create a default container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:52.927: INFO: Created container "049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a"
STEP: start container
STEP: Start container for containerID: 049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a
Jul 24 04:58:52.985: INFO: Started container "049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a"
STEP: attach container: 049cfd8c6155a9ec0cc783edb129b4a7f9230e8b5b9b3a86aa0ef439a7d3e49a
Jul 24 04:58:52.985: INFO: Get attach url: http://127.0.0.1:46467/attach/Bh5B5vt0
STEP: check the output of attach
Jul 24 04:58:52.986: INFO: Parse url "http://127.0.0.1:46467/attach/Bh5B5vt0" succeed
Jul 24 04:58:57.992: INFO: Check attach url "http://127.0.0.1:46467/attach/Bh5B5vt0" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:59
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
• [SLOW TEST:7.386 seconds]
[k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:55
runtime should support attach [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming.go:109
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostNetwork is true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:244
STEP: creating a podSandbox with hostNetwork true
STEP: create NamespaceOption podSandbox
STEP: create a container in the sandbox
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:58.404: INFO: Created container "3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9"
STEP: start container
STEP: Start container for containerID: 3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9
Jul 24 04:58:58.462: INFO: Started container "3152bb7e00d6decc45d078c437c2e5273371521ce8c715318bcf0c9f8dacccc9"
STEP: checking host http service port in the container
Jul 24 04:58:58.462: INFO: Open log file /tmp/podLogTest053066886/NamespaceOption-PodSandbox-fdfb3de7-cda4-11ea-a3b7-5254001ff4e5/container-with-HostNetwork-test-0e6ff893-cda5-11ea-a3b7-5254001ff4e5.log
Jul 24 04:58:58.462: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•S
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:200
[It] runtime should support starting container with volume when host path is a symlink [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:228
STEP: create host path and flag file
STEP: create symlink
STEP: create volume container with symlink host path
STEP: create a container with volume and name
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:58.998: INFO: Created container "7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2"
STEP: test start volume container with symlink host path
STEP: Start container for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2
Jul 24 04:58:59.054: INFO: Started container "7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2"
STEP: Get container status for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2
STEP: check whether 'symlink' contains file or dir in container
STEP: execSync for containerID: 7500b1791f6805ec3d71b66b313a7e847a0033b55cc81e91d5ba474c1aed8ea2
Jul 24 04:58:59.082: INFO: Execsync succeed
[AfterEach] runtime should support adding volume and device
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:204
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:33
[It] runtime should support portforward in host network
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:48
STEP: create a PodSandbox with container port port mapping in host network
STEP: create a web server container
Jul 24 04:58:58.350: INFO: Use latest as default image tag.
STEP: Get image status for image: gcr.io/cri-tools/hostnet-nginx-amd64:latest
STEP: Create container.
Jul 24 04:58:58.371: INFO: Created container "b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d"
STEP: start the web server container
STEP: Start container for containerID: b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d
Jul 24 04:58:58.442: INFO: Started container "b8e9861ce626b5141a27d13953506e0cca2f15d6f40cd20d4318ef47bbab1f2d"
STEP: port forward PodSandbox: c55ea5a97294085df285bacf0c34a5e7516c4ff5f12ebcaa0d6d25c6770662b1
Jul 24 04:58:58.442: INFO: Get port forward url: http://127.0.0.1:46467/portforward/HIx406wE
STEP: check the output of portforward
Jul 24 04:58:58.444: INFO: Parse url "http://127.0.0.1:46467/portforward/HIx406wE" succeed
STEP: check if we can get nginx main page via localhost:12002
STEP: get the IP:port needed to be checked
Jul 24 04:58:58.444: INFO: the IP:port is http://127.0.0.1:12002
STEP: check the content of http://127.0.0.1:12002
STEP: start port forward
Forwarding from 127.0.0.1:12002 -> 12003
Forwarding from [::1]:12002 -> 12003
Handling connection for 12002
Jul 24 04:58:59.452: INFO: check port mapping succeed
Jul 24 04:58:59.452: INFO: Check port forward url "http://127.0.0.1:46467/portforward/HIx406wE" succeed
[AfterEach] runtime should support streaming interfaces
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/streaming_linux.go:41
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Streaming
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support starting container [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:92
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:59.414: INFO: Created container "c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029"
STEP: test start container
STEP: Start container for containerID: c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029
Jul 24 04:58:59.478: INFO: Started container "c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029"
STEP: Get container status for containerID: c14c3e09b09dd2e237d95794ceeef7a1eb5a2a123bfffdaca3513d8947d47029
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] SeccompProfilePath
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:569
[It] should support seccomp default which is unconfined on the container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:609
STEP: create seccomp sandbox and container
STEP: create seccomp sandbox
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:59.850: INFO: Created container "5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb"
STEP: start container
STEP: Start container for containerID: 5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb
Jul 24 04:58:59.921: INFO: Started container "5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb"
STEP: Get container status for containerID: 5a5bf25befad18c8377c3ebb1a38842e9a468f9e7bbd77d25180f7cd42f2f2fb
STEP: verify seccomp profile
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support HostPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:76
STEP: create podSandbox for security context HostPID
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 04:58:59.776: INFO: Created container "9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f"
STEP: start container
STEP: Start container for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f
Jul 24 04:58:59.843: INFO: Started container "9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f"
STEP: Get container status for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f
STEP: get nginx container pid
STEP: execSync for containerID: 9fa8a800db04d18d19c58e7a6337633c8b2add587425019ca216f6904c6ec51f
Jul 24 04:58:59.910: INFO: Execsync succeed
Jul 24 04:58:59.910: INFO: Nginx's pid is ""
STEP: create busybox container with hostPID
STEP: create NamespaceOption container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:59.933: INFO: Created container "6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d"
STEP: start container
STEP: Start container for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d
Jul 24 04:59:00.007: INFO: Started container "6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d"
STEP: Get container status for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d
STEP: should show its pid in the hostPID namespace container
STEP: execSync for containerID: 6373c2345494dad852dcaa05a3eb5875515420faa7e1610cfd4a842b91f87b2d
Jul 24 04:59:00.044: INFO: Execsync succeed
Jul 24 04:59:00.044: INFO: Got nginx's pid "147201 147133" from pod "nginx-container-0f41d74a-cda5-11ea-a543-5254001ff4e5"
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:63
[BeforeEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:72
[It] runtime should support execSync [Conformance]
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:150
STEP: create container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:59:00.255: INFO: Created container "d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1"
STEP: start container
STEP: Start container for containerID: d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1
Jul 24 04:59:00.319: INFO: Started container "d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1"
STEP: test execSync
STEP: verify execSync output
STEP: execSync for containerID: d7aad8564aee8040655c7c58d054fedeec4bf059b2a68dfa4d961a26e49105d1
Jul 24 04:59:00.346: INFO: Execsync succeed
Jul 24 04:59:00.346: INFO: verify Execsync output succeed
[AfterEach] runtime should support basic operations on container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:76
STEP: stop PodSandbox
STEP: delete PodSandbox
[AfterEach] [k8s.io] Container
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support that ReadOnlyRootfs is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
STEP: create pod with log
STEP: create a PodSandbox with log directory
STEP: create container with ReadOnlyRootfs_false
STEP: create ReadOnlyRootfs container
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:58:56.755: INFO: Created container "7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7"
STEP: start container
STEP: Start container for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7
Jul 24 04:58:56.812: INFO: Started container "7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7"
STEP: Get container status for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7
STEP: Get container status for containerID: 7c3a2944a2fa13cf166b8a1a8dc0d42dd2973f15366d41a577bf6b62de34a1d7
STEP: Check whether rootfs is writable
STEP: verify log contents
Jul 24 04:59:00.822: INFO: Open log file /tmp/podLogTest292950821/PodSandbox-with-log-directory-0c2dba0b-cda5-11ea-887e-5254001ff4e5/container-with-ReadOnlyRootfs-false-test-0d74d333-cda5-11ea-887e-5254001ff4e5.log
Jul 24 04:59:00.822: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:6.415 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
bucket
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:287
runtime should support that ReadOnlyRootfs is false
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:384
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support SupplementalGroups
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:288
STEP: create pod
STEP: create container for security context SupplementalGroups
STEP: Get image status for image: busybox:1.28
STEP: Create container.
Jul 24 04:59:01.275: INFO: Created container "a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47"
STEP: start container
STEP: Start container for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47
Jul 24 04:59:01.351: INFO: Started container "a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47"
STEP: Get container status for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47
STEP: verify SupplementalGroups for container
STEP: execSync for containerID: a48c5aac67fe2f5de335843764b7425f9a0a91bbb6bc29f483fc6f0e65369d47
Jul 24 04:59:01.387: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[It] runtime should support ContainerPID
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:220
STEP: create podSandbox with PID set to container
Jul 24 04:58:59.570: INFO: Pid namespace is "CONTAINER"
STEP: create NamespaceOption podSandbox
STEP: create nginx container
STEP: create NamespaceOption container
STEP: Get image status for image: nginx:1.18
STEP: Create container.
Jul 24 04:59:01.314: INFO: Created container "1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615"
STEP: start container
STEP: Start container for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615
Jul 24 04:59:01.371: INFO: Started container "1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615"
STEP: Get container status for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615
STEP: get nginx container pid
STEP: execSync for containerID: 1ed5517f53274f068d971c93469eabebb78cef3b485c64278da8baaea28ea615
Jul 24 04:59:01.411: INFO: Execsync succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
•
------------------------------
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:50
[BeforeEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:53
[BeforeEach] NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:726
STEP: create a PodSandbox with log directory
[It] should not allow privilege escalation when true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
STEP: create container alpine-nnp-true-0df9726f-cda5-11ea-a38f-5254001ff4e5
STEP: Get image status for image: gcr.io/kubernetes-e2e-test-images/nonewprivs:1.1
STEP: Create container.
Jul 24 04:58:57.641: INFO: Created container "a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9"
STEP: Start container for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9
Jul 24 04:58:57.741: INFO: Started container "a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9"
STEP: Get container status for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9
STEP: Get container status for containerID: a1ec8e2b05eb68a2a4cf79cfd17ae36e1db4d373c436496017ecf9b3d20005c9
STEP: check container output
STEP: verify log contents
Jul 24 04:59:01.742: INFO: Open log file /tmp/podLogTest692783919/PodSandbox-with-log-directory-0ce48ca5-cda5-11ea-a38f-5254001ff4e5/alpine-nnp-true-0df9726f-cda5-11ea-a38f-5254001ff4e5.log
Jul 24 04:59:01.742: INFO: Parse container log succeed
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:51
[AfterEach] [k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:58
STEP: stop PodSandbox
STEP: delete PodSandbox
• [SLOW TEST:6.132 seconds]
[k8s.io] Security Context
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/framework.go:72
NoNewPrivs
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:725
should not allow privilege escalation when true
/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:755
------------------------------
Ran 90 of 97 Specs in 31.143 seconds
SUCCESS! -- 90 Passed | 0 Failed | 0 Pending | 7 Skipped
Ginkgo ran 1 suite in 31.175024916s
Test Suite Passed
PASS
./hack/test-utils.sh: line 107: 129696 Terminated keepalive "sudo PATH=${PATH} ${GOBIN%/}/${CONTAINERD_BIN} ${CONTAINERD_FLAGS}" ${RESTART_WAIT_PERIOD} &> ${report_dir}/containerd.log
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment