ResultFAILURE
Tests 464 failed / 646 succeeded
Started2020-03-25 19:38
Elapsed1h37m
Work namespaceci-op-86kdzxgx
Refs master:24d4772d
458:2cfb0348
pod29d8ccb1-6ed0-11ea-b076-0a58ac104f72
repoopenshift/cluster-image-registry-operator
revision1

Test Failures


openshift-tests Monitor cluster while tests execute 24m27s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\sMonitor\scluster\swhile\stests\sexecute$'
3 error level events were detected during this test run:

Mar 25 20:45:21.137 E ns/openshift-console pod/console-64c678bf77-zqsmp node/control-plane-1 container=console container exited with code 2 (Error): 2020-03-25T20:40:48Z cmd/main: cookies are secure!\n2020-03-25T20:40:48Z auth: error contacting auth provider (retrying in 10s): discovery through endpoint https://kubernetes.default.svc/.well-known/oauth-authorization-server failed: 404 Not Found\n2020-03-25T20:40:58Z auth: error contacting auth provider (retrying in 10s): discovery through endpoint https://kubernetes.default.svc/.well-known/oauth-authorization-server failed: 404 Not Found\n2020-03-25T20:41:09Z cmd/main: Binding to [::]:8443...\n2020-03-25T20:41:09Z cmd/main: using TLS\n
Mar 25 20:49:08.061 E ns/openshift-marketplace pod/opsrctestlabel-79b89f967-6d2nc node/compute-1 container=opsrctestlabel container exited with code 2 (Error): 
Mar 25 21:07:08.599 E ns/default pod/recycler-for-nfs-krhhg node/compute-1 pod failed (DeadlineExceeded): Pod was active on the node longer than the specified deadline

				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Find failed mentions in log files


openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sContainer\sRuntime\sblackbox\stest\swhen\srunning\sa\scontainer\swith\sa\snew\simage\sshould\sbe\sable\sto\spull\simage\s\[NodeConformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sInitContainer\s\[NodeConformance\]\sshould\sinvoke\sinit\scontainers\son\sa\sRestartAlways\spod\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.60s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sKubelet\swhen\sscheduling\sa\sbusybox\scommand\sthat\salways\sfails\sin\sa\spod\sshould\sbe\spossible\sto\sdelete\s\[NodeConformance\]\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sKubelet\swhen\sscheduling\sa\sbusybox\scommand\sthat\salways\sfails\sin\sa\spod\sshould\shave\san\sterminated\sreason\s\[NodeConformance\]\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 16s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sKubeletManagedEtcHosts\sshould\stest\skubelet\smanaged\s\/etc\/hosts\sfile\s\[LinuxOnly\]\s\[NodeConformance\]\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/framework/exec_util.go:101]: failed to execute command in pod test-pod, container busybox-2: error sending request: Post https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/namespaces/e2e-kubelet-etc-hosts-9532/pods/test-pod/exec?command=cat&command=%2Fetc%2Fhosts-original&container=busybox-2&container=busybox-2&stderr=true&stdout=true: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
Unexpected error:
    <*errors.errorString | 0xc00131dae0>: {
        s: "error sending request: Post https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/namespaces/e2e-kubelet-etc-hosts-9532/pods/test-pod/exec?command=cat&command=%2Fetc%2Fhosts-original&container=busybox-2&container=busybox-2&stderr=true&stdout=true: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
    }
    error sending request: Post https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/namespaces/e2e-kubelet-etc-hosts-9532/pods/test-pod/exec?command=cat&command=%2Fetc%2Fhosts-original&container=busybox-2&container=busybox-2&stderr=true&stdout=true: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Find test-pod, mentions in log files


openshift-tests [k8s.io] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly] [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s] 6.30s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sPrivilegedPod\s\[NodeConformance\]\sshould\senable\sprivileged\scommands\s\[LinuxOnly\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/common/privileged.go:71]: cmd [ip link add dummy1 type dummy], stdout "", stderr ""
Unexpected error:
    <*errors.errorString | 0xc00130c680>: {
        s: "error sending request: Post https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/namespaces/e2e-privileged-pod-5831/pods/privileged-pod/exec?command=ip&command=link&command=add&command=dummy1&command=type&command=dummy&container=privileged-container&container=privileged-container&stderr=true&stdout=true: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
    }
    error sending request: Post https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/namespaces/e2e-privileged-pod-5831/pods/privileged-pod/exec?command=ip&command=link&command=add&command=dummy1&command=type&command=dummy&container=privileged-container&container=privileged-container&stderr=true&stdout=true: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.60s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sProbing\scontainer\sshould\s\*not\*\sbe\srestarted\swith\sa\sexec\s\"cat\s\/tmp\/health\"\sliveness\sprobe\s\[NodeConformance\]\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance] [sig-node] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\sSecurity\sContext\swhen\screating\scontainers\swith\sAllowPrivilegeEscalation\sshould\snot\sallow\sprivilege\sescalation\swhen\sfalse\s\[LinuxOnly\]\s\[NodeConformance\]\s\[Conformance\]\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] [Feature:Example] [k8s.io] Liveness liveness pods should be automatically restarted [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s] 3.00s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\s\[Feature\:Example\]\s\[k8s\.io\]\sLiveness\sliveness\spods\sshould\sbe\sautomatically\srestarted\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/framework/util.go:766]: Unexpected error:
    <exec.CodeExitError>: {
        Err: {
            s: "error running /usr/bin/kubectl --server=https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443 --kubeconfig=/tmp/admin.kubeconfig create -f - --namespace=e2e-examples-5903:\nCommand stdout:\n\nstderr:\nUnable to connect to the server: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com\n\nerror:\nexit status 1",
        },
        Code: 1,
    }
    error running /usr/bin/kubectl --server=https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443 --kubeconfig=/tmp/admin.kubeconfig create -f - --namespace=e2e-examples-5903:
    Command stdout:
    
    stderr:
    Unable to connect to the server: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
    
    error:
    exit status 1
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] [Feature:Example] [k8s.io] Secret should create a pod that reads a secret [sig-node] [Suite:openshift/conformance/parallel] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\s\[Feature\:Example\]\s\[k8s\.io\]\sSecret\sshould\screate\sa\spod\sthat\sreads\sa\ssecret\s\[sig\-node\]\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] [sig-node] Mount propagation should propagate mounts to the host [Suite:openshift/conformance/parallel] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\s\[sig\-node\]\sMount\spropagation\sshould\spropagate\smounts\sto\sthe\shost\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] [sig-node] Pods Extended [k8s.io] Delete Grace Period should be submitted and removed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\s\[sig\-node\]\sPods\sExtended\s\[k8s\.io\]\sDelete\sGrace\sPeriod\sshould\sbe\ssubmitted\sand\sremoved\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [k8s.io] [sig-node] Pods Extended [k8s.io] Pod Container Status should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[k8s\.io\]\s\[sig\-node\]\sPods\sExtended\s\[k8s\.io\]\sPod\sContainer\sStatus\sshould\snever\sreport\ssuccess\sfor\sa\spending\scontainer\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\sattaching\spod\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\sbe\sable\sto\sdeny\scustom\sresource\screation\,\supdate\sand\sdeletion\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sAdmissionWebhook\s\[Privileged\:ClusterAdmin\]\sshould\smutate\scustom\sresource\swith\sdifferent\sstored\sversion\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourceDefinition\sresources\s\[Privileged\:ClusterAdmin\]\sSimple\sCustomResourceDefinition\slisting\scustom\sresource\sdefinition\sobjects\sworks\s\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 10s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sremoves\sdefinition\sfrom\sspec\swhen\sone\sversion\sgets\schanged\sto\snot\sbe\sserved\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/apimachinery/crd_publish_openapi.go:435]: Mar 25 20:59:33.608: failed to wait for definition "com.example.crd-publish-openapi-test-multi-to-single-ver.v5.E2e-test-crd-publish-openapi-5778-crd" to be served with the right OpenAPI schema: failed to wait for OpenAPI spec validating condition: Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/openapi/v2: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com; lastMsg:
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 26s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\supdates\sthe\spublished\sspec\swhen\sone\sversion\sgets\srenamed\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/apimachinery/crd_publish_openapi.go:405]: Mar 25 21:06:21.418: failed to wait for definition "com.example.crd-publish-openapi-test-multi-ver.v4.E2e-test-crd-publish-openapi-2745-crd" to be served with the right OpenAPI schema: failed to wait for OpenAPI spec validating condition: Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/openapi/v2: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com; lastMsg:
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 14s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sat\sthe\sschema\sroot\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/apimachinery/crd_publish_openapi.go:209]: Mar 25 21:05:10.220: failed to explain e2e-test-crd-publish-openapi-5204-crds: error running /usr/bin/kubectl --server=https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443 --kubeconfig=/tmp/admin.kubeconfig explain e2e-test-crd-publish-openapi-5204-crds:
Command stdout:

stderr:
Unable to connect to the server: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com

error:
exit status 1
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 11s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\spreserving\sunknown\sfields\sin\san\sembedded\sobject\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/apimachinery/crd_publish_openapi.go:228]: Mar 25 21:04:56.017: failed to wait for definition "com.example.crd-publish-openapi-test-unknown-in-nested.v1.E2e-test-crd-publish-openapi-3500-crd" to be served with the right OpenAPI schema: failed to wait for OpenAPI spec validating condition: Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/openapi/v2: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com; lastMsg:
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 22s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\sCRD\swith\svalidation\sschema\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
fail [k8s.io/kubernetes/test/e2e/apimachinery/crd_publish_openapi.go:127]: Mar 25 21:02:39.402: unexpected no error when explaining property that doesn't exist: error running /usr/bin/kubectl --server=https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443 --kubeconfig=/tmp/admin.kubeconfig explain e2e-test-crd-publish-openapi-5178-crds.spec.bars2:
Command stdout:

stderr:
Unable to connect to the server: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com

error:
exit status 1
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sCustomResourcePublishOpenAPI\s\[Privileged\:ClusterAdmin\]\sworks\sfor\smultiple\sCRDs\sof\ssame\sgroup\sbut\sdifferent\sversions\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 2.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\skeep\sthe\src\saround\suntil\sall\sits\spods\sare\sdeleted\sif\sthe\sdeleteOptions\ssays\sso\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sGarbage\scollector\sshould\sorphan\sRS\screated\sby\sdeployment\swhen\sdeleteOptions\.PropagationPolicy\sis\sOrphan\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sResourceQuota\s\[Feature\:PodPriority\]\sshould\sverify\sResourceQuota\'s\spriority\sclass\sscope\s\(cpu\,\smemory\squota\sset\)\sagainst\sa\spod\swith\ssame\spriority\sclass\.\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sResourceQuota\sshould\sbe\sable\sto\supdate\sand\sdelete\sResourceQuota\.\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage] [Suite:openshift/conformance/parallel] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sResourceQuota\sshould\screate\sa\sResourceQuota\sand\scapture\sthe\slife\sof\sa\spersistent\svolume\sclaim\swith\sa\sstorage\sclass\.\s\[sig\-storage\]\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sWatchers\sshould\sbe\sable\sto\srestart\swatching\sfrom\sthe\slast\sresource\sversion\sobserved\sby\sthe\sprevious\swatch\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sWatchers\sshould\sbe\sable\sto\sstart\swatching\sfrom\sa\sspecific\sresource\sversion\s\[Conformance\]\s\[Suite\:openshift\/conformance\/parallel\/minimal\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/json,application/vnd.kubernetes.protobuf" [Suite:openshift/conformance/parallel] [Suite:k8s] 0.60s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sclient\-go\sshould\snegotiate\swatch\sand\sreport\serrors\swith\saccept\s\"application\/json\,application\/vnd\.kubernetes\.protobuf\"\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-api-machinery] client-go should negotiate watch and report errors with accept "application/vnd.kubernetes.protobuf,application/json" [Suite:openshift/conformance/parallel] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-api\-machinery\]\sclient\-go\sshould\snegotiate\swatch\sand\sreport\serrors\swith\saccept\s\"application\/vnd\.kubernetes\.protobuf\,application\/json\"\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-apps] CronJob should not emit unexpected warnings [Suite:openshift/conformance/parallel] [Suite:k8s] 0.50s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-apps\]\sCronJob\sshould\snot\semit\sunexpected\swarnings\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred
				
				Click to see stdout/stderrfrom junit_e2e_20200325-210854.xml

Filter through log files


openshift-tests [sig-apps] Job should remove pods when job is deleted [Suite:openshift/conformance/parallel] [Suite:k8s] 0.40s

go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[sig\-apps\]\sJob\sshould\sremove\spods\swhen\sjob\sis\sdeleted\s\[Suite\:openshift\/conformance\/parallel\]\s\[Suite\:k8s\]$'
{Type: [2, 5, 4, 11], Value: "openshift"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "kube-apiserver-service-network-signer",
                        },
                    ],
                    ExtraNames: nil,
                },
                Subject: {
                    Country: nil,
                    Organization: ["kube-master"],
                    OrganizationalUnit: nil,
                    Locality: nil,
                    Province: nil,
                    StreetAddress: nil,
                    PostalCode: nil,
                    SerialNumber: "",
                    CommonName: "system:kube-apiserver",
                    Names: [
                        {Type: [2, 5, 4, 10], Value: "kube-master"},
                        {
                            Type: [2, 5, 4, 3],
                            Value: "system:kube-apiserver",
                        },
                    ],
                    ExtraNames: nil,
                },
                NotBefore: 2020-03-25T20:53:54Z,
                NotAfter: 2020-03-26T20:53:59Z,
                KeyUsage: 5,
                Extensions: [
                    {
                        Id: [2, 5, 29, 15],
                        Critical: true,
                        Value: [3, 2, 5, 160],
                    },
                    {
                        Id: [2, 5, 29, 37],
                        Critical: false,
                        Value: [48, 10, 6, 8, 43, 6, 1, 5, 5, 7, 3, 1],
                    },
                    {Id: [2, 5, 29, 19], Critical: true, Value: [48, 0]},
                    {
                        Id: [2, 5, 29, 14],
                        Critical: false,
                        Value: [4, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 35],
                        Critical: false,
                        Value: [48, 22, 128, 20, 183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                    },
                    {
                        Id: [2, 5, 29, 17],
                        Critical: false,
                        Value: [48, 129, 190, 130, 10, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 130, 18, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 130, 22, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 36, 107, 117, 98, 101, 114, 110, 101, 116, 101, 115, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 130, 9, 111, 112, 101, 110, 115, 104, 105, 102, 116, 130, 17, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 130, 21, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 130, 35, 111, 112, 101, 110, 115, 104, 105, 102, 116, 46, 100, 101, 102, 97, 117, 108, 116, 46, 115, 118, 99, 46, 99, 108, 117, 115, 116, 101, 114, 46, 108, 111, 99, 97, 108, 135, 4, 172, 30, 0, 1],
                    },
                ],
                ExtraExtensions: nil,
                UnhandledCriticalExtensions: nil,
                ExtKeyUsage: [1],
                UnknownExtKeyUsage: nil,
                BasicConstraintsValid: true,
                IsCA: false,
                MaxPathLen: -1,
                MaxPathLenZero: false,
                SubjectKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                AuthorityKeyId: [183, 178, 36, 131, 181, 144, 42, 227, 158, 85, 198, 184, 255, 52, 123, 19, 101, 241, 89, 239],
                OCSPServer: nil,
                IssuingCertificateURL: nil,
                DNSNames: [
                    "kubernetes",
                    "kubernetes.default",
                    "kubernetes.default.svc",
                    "kubernetes.default.svc.cluster.local",
                    "openshift",
                    "openshift.default",
                    "openshift.default.svc",
                    "openshift.default.svc.cluster.local",
                ],
                EmailAddresses: nil,
                IPAddresses: [[172, 30, 0, 1]],
                URIs: nil,
                PermittedDNSDomainsCritical: false,
                PermittedDNSDomains: nil,
                ExcludedDNSDomains: nil,
                PermittedIPRanges: nil,
                ExcludedIPRanges: nil,
                PermittedEmailAddresses: nil,
                ExcludedEmailAddresses: nil,
                PermittedURIDomains: nil,
                ExcludedURIDomains: nil,
                CRLDistributionPoints: nil,
                PolicyIdentifiers: nil,
            },
            Host: "api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com",
        },
    }
    Get https://api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com:6443/api/v1/nodes?fieldSelector=spec.unschedulable%3Dfalse&resourceVersion=0: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not api.ci-op-86kdzxgx-57474.origin-ci-int-aws.dev.rhcloud.com
occurred