This job view page is being replaced by Spyglass soon. Check out the new job view.
PRpacoxu: add --system-reserved support for swap
ResultABORTED
Tests 0 failed / 134 succeeded
Started2022-05-03 08:03
Elapsed19m35s
Revisionb606d225200dd6e550a121fcb6443d4e354b9b6c
Refs 105271

No Test Failures!


Show 134 Passed Tests

Error lines from build-log.txt

... skipping 75 lines ...
Recording: record_command_canary
Running command: record_command_canary

+++ Running case: test-cmd.record_command_canary 
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: record_command_canary
/home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh: line 163: bogus-expected-to-fail: command not found
!!! [0503 08:10:17] Call tree:
!!! [0503 08:10:17]  1: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:47 record_command_canary(...)
!!! [0503 08:10:17]  2: /home/prow/go/src/k8s.io/kubernetes/test/cmd/../../third_party/forked/shell2junit/sh2ju.sh:112 eVal(...)
!!! [0503 08:10:17]  3: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:139 juLog(...)
!!! [0503 08:10:17]  4: /home/prow/go/src/k8s.io/kubernetes/test/cmd/legacy-script.sh:167 record_command(...)
!!! [0503 08:10:17]  5: hack/make-rules/test-cmd.sh:35 source(...)
+++ exit code: 1
+++ error: 1
+++ [0503 08:10:17] Running kubeadm tests
+++ [0503 08:10:19] Building go targets for linux/amd64
    k8s.io/kubernetes/hack/make-rules/helpers/go2make (non-static)
+++ [0503 08:10:22] Building go targets for linux/amd64
    k8s.io/kubernetes/cmd/kubeadm (static)
+++ [0503 08:11:10] Building go targets for linux/amd64
... skipping 197 lines ...
I0503 08:14:18.526619   53141 cache.go:39] Caches are synced for APIServiceRegistrationController controller
I0503 08:14:18.526626   53141 apf_controller.go:322] Running API Priority and Fairness config worker
I0503 08:14:18.527966   53141 shared_informer.go:262] Caches are synced for cluster_authentication_trust_controller
I0503 08:14:18.530296   53141 shared_informer.go:262] Caches are synced for crd-autoregister
I0503 08:14:19.100090   53141 controller.go:132] OpenAPI AggregationController: action for item : Nothing (removed from the queue).
I0503 08:14:19.100131   53141 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).
E0503 08:14:19.425762   53141 controller.go:113] loading OpenAPI spec for "" failed with: APIService  does not exist for update
I0503 08:14:19.425795   53141 controller.go:126] OpenAPI AggregationController: action for item : Rate Limited Requeue.
I0503 08:14:19.430969   53141 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000
I0503 08:14:19.450120   53141 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000
I0503 08:14:19.450258   53141 storage_scheduling.go:111] all system priority classes are created successfully or already exist.
I0503 08:14:20.987728   53141 controller.go:611] quota admission added evaluator for: roles.rbac.authorization.k8s.io
I0503 08:14:21.109122   53141 controller.go:611] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io
... skipping 7 lines ...
    k8s.io/kubernetes/hack/make-rules/helpers/go2make (non-static)
+++ [0503 08:14:27] Building go targets for linux/amd64
    k8s.io/kubernetes/cmd/kube-controller-manager (static)
+++ [0503 08:14:58] Generate kubeconfig for controller-manager
+++ [0503 08:14:58] Starting controller-manager
I0503 08:14:59.336294   56702 serving.go:348] Generated self-signed cert in-memory
W0503 08:15:00.011932   56702 authentication.go:423] failed to read in-cluster kubeconfig for delegated authentication: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0503 08:15:00.011969   56702 authentication.go:317] No authentication-kubeconfig provided in order to lookup client-ca-file in configmap/extension-apiserver-authentication in kube-system, so client certificate authentication won't work.
W0503 08:15:00.011977   56702 authentication.go:341] No authentication-kubeconfig provided in order to lookup requestheader-client-ca-file in configmap/extension-apiserver-authentication in kube-system, so request-header client certificate authentication won't work.
W0503 08:15:00.011993   56702 authorization.go:225] failed to read in-cluster kubeconfig for delegated authorization: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
W0503 08:15:00.012005   56702 authorization.go:193] No authorization-kubeconfig provided, so SubjectAccessReview of authorization tokens won't work.
I0503 08:15:00.012031   56702 controllermanager.go:180] Version: v1.25.0-alpha.0.22+15a416e996b91a
I0503 08:15:00.012046   56702 controllermanager.go:182] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
I0503 08:15:00.013344   56702 secure_serving.go:210] Serving securely on [::]:10257
I0503 08:15:00.013566   56702 tlsconfig.go:240] "Starting DynamicServingCertificateController"
I0503 08:15:00.013647   56702 leaderelection.go:248] attempting to acquire leader lease kube-system/kube-controller-manager...
... skipping 143 lines ...
I0503 08:15:00.180973   56702 shared_informer.go:255] Waiting for caches to sync for crt configmap
I0503 08:15:00.181283   56702 controllermanager.go:593] Started "daemonset"
I0503 08:15:00.181386   56702 daemon_controller.go:284] Starting daemon sets controller
I0503 08:15:00.181402   56702 shared_informer.go:255] Waiting for caches to sync for daemon sets
I0503 08:15:00.181441   56702 controllermanager.go:593] Started "csrcleaner"
I0503 08:15:00.181541   56702 cleaner.go:82] Starting CSR cleaner controller
E0503 08:15:00.181728   56702 core.go:91] Failed to start service controller: WARNING: no cloud provider provided, services of type LoadBalancer will fail
W0503 08:15:00.181753   56702 controllermanager.go:571] Skipping "service"
I0503 08:15:00.181985   56702 node_lifecycle_controller.go:77] Sending events to api server
E0503 08:15:00.182018   56702 core.go:211] failed to start cloud node lifecycle controller: no cloud provider provided
W0503 08:15:00.182031   56702 controllermanager.go:571] Skipping "cloud-node-lifecycle"
I0503 08:15:00.182409   56702 controllermanager.go:593] Started "endpointslicemirroring"
I0503 08:15:00.182541   56702 endpointslicemirroring_controller.go:212] Starting EndpointSliceMirroring controller
I0503 08:15:00.182566   56702 shared_informer.go:255] Waiting for caches to sync for endpoint_slice_mirroring
W0503 08:15:00.182879   56702 mutation_detector.go:53] Mutation detector is enabled, this will result in memory leakage.
I0503 08:15:00.182919   56702 controllermanager.go:593] Started "persistentvolume-binder"
... skipping 69 lines ...
I0503 08:15:00.576512   56702 shared_informer.go:262] Caches are synced for resource quota
I0503 08:15:00.602925   56702 shared_informer.go:262] Caches are synced for resource quota
I0503 08:15:01.014026   56702 shared_informer.go:262] Caches are synced for garbage collector
I0503 08:15:01.077446   56702 shared_informer.go:262] Caches are synced for garbage collector
I0503 08:15:01.077499   56702 garbagecollector.go:158] Garbage collector: all resource monitors have synced. Proceeding to collect garbage
node/127.0.0.1 created
W0503 08:15:01.520778   56702 actual_state_of_world.go:541] Failed to update statusUpdateNeeded field in actual state of world: Failed to set statusUpdateNeeded to needed true, because nodeName="127.0.0.1" does not exist
+++ [0503 08:15:01] Checking kubectl version
WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short.  Use --output=yaml|json to get the full version.
Client Version: version.Info{Major:"1", Minor:"25+", GitVersion:"v1.25.0-alpha.0.22+15a416e996b91a", GitCommit:"15a416e996b91a0f7cb13e75bcd1f22576cc93de", GitTreeState:"clean", BuildDate:"2022-04-29T13:41:15Z", GoVersion:"go1.18.1", Compiler:"gc", Platform:"linux/amd64"}
Kustomize Version: v4.5.4
Server Version: version.Info{Major:"1", Minor:"25+", GitVersion:"v1.25.0-alpha.0.22+15a416e996b91a", GitCommit:"15a416e996b91a0f7cb13e75bcd1f22576cc93de", GitTreeState:"clean", BuildDate:"2022-04-29T13:41:15Z", GoVersion:"go1.18.1", Compiler:"gc", Platform:"linux/amd64"}
The Service "kubernetes" is invalid: spec.clusterIPs: Invalid value: []string{"10.0.0.1"}: failed to allocate IP 10.0.0.1: provided IP is already allocated
NAME         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)   AGE
kubernetes   ClusterIP   10.0.0.1     <none>        443/TCP   41s
Recording: run_kubectl_version_tests
Running command: run_kubectl_version_tests

+++ Running case: test-cmd.run_kubectl_version_tests 
... skipping 194 lines ...
+++ working dir: /home/prow/go/src/k8s.io/kubernetes
+++ command: run_RESTMapper_evaluation_tests
+++ [0503 08:15:07] Creating namespace namespace-1651565707-5904
namespace/namespace-1651565707-5904 created
Context "test" modified.
+++ [0503 08:15:07] Testing RESTMapper
+++ [0503 08:15:07] "kubectl get unknownresourcetype" returns error as expected: error: the server doesn't have a resource type "unknownresourcetype"
+++ exit code: 0
NAME                              SHORTNAMES   APIVERSION                             NAMESPACED   KIND
bindings                                       v1                                     true         Binding
componentstatuses                 cs           v1                                     false        ComponentStatus
configmaps                        cm           v1                                     true         ConfigMap
endpoints                         ep           v1                                     true         Endpoints
... skipping 61 lines ...
namespace/namespace-1651565717-18371 created
Context "test" modified.
+++ [0503 08:15:17] Testing clusterroles
rbac.sh:29: Successful get clusterroles/cluster-admin {{.metadata.name}}: cluster-admin
(Brbac.sh:30: Successful get clusterrolebindings/cluster-admin {{.metadata.name}}: cluster-admin
(BSuccessful
(Bmessage:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created (dry run)
clusterrole.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
(Bmessage:Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "pod-admin" not found
has:clusterroles.rbac.authorization.k8s.io "pod-admin" not found
clusterrole.rbac.authorization.k8s.io/pod-admin created
rbac.sh:42: Successful get clusterrole/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(BSuccessful
(Bmessage:warning: deleting cluster-scoped resources, not scoped to the provided namespace
clusterrole.rbac.authorization.k8s.io "pod-admin" deleted
... skipping 11 lines ...
(Brbac.sh:53: Successful get clusterrole/resource-reader {{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}: pods:deployments:
(Brbac.sh:54: Successful get clusterrole/resource-reader {{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}: :apps:
(Bclusterrole.rbac.authorization.k8s.io/resourcename-reader created
rbac.sh:56: Successful get clusterrole/resourcename-reader {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: get:list:
(Brbac.sh:57: Successful get clusterrole/resourcename-reader {{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}: pods:
(Brbac.sh:58: Successful get clusterrole/resourcename-reader {{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}: :
(BE0503 08:15:19.425910   53141 controller.go:113] loading OpenAPI spec for "" failed with: APIService  does not exist for update
I0503 08:15:19.425937   53141 controller.go:126] OpenAPI AggregationController: action for item : Rate Limited Requeue.
rbac.sh:59: Successful get clusterrole/resourcename-reader {{range.rules}}{{range.resourceNames}}{{.}}:{{end}}{{end}}: foo:
(Bclusterrole.rbac.authorization.k8s.io/url-reader created
rbac.sh:61: Successful get clusterrole/url-reader {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: get:
(Brbac.sh:62: Successful get clusterrole/url-reader {{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}: /logs/*:/healthz/*:
(Bclusterrole.rbac.authorization.k8s.io/aggregation-reader created
rbac.sh:64: Successful get clusterrole/aggregation-reader {{.metadata.name}}: aggregation-reader
(BSuccessful
(Bmessage:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin created (server dry run)
Successful
(Bmessage:Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
has:clusterrolebindings.rbac.authorization.k8s.io "super-admin" not found
clusterrolebinding.rbac.authorization.k8s.io/super-admin created
rbac.sh:77: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
(Bclusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (dry run)
clusterrolebinding.rbac.authorization.k8s.io/super-admin subjects updated (server dry run)
rbac.sh:80: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:
... skipping 64 lines ...
rbac.sh:102: Successful get clusterrolebinding/super-admin {{range.subjects}}{{.name}}:{{end}}: super-admin:foo:test-all-user:
(Brbac.sh:103: Successful get clusterrolebinding/super-group {{range.subjects}}{{.name}}:{{end}}: the-group:foo:test-all-user:
(Brbac.sh:104: Successful get clusterrolebinding/super-sa {{range.subjects}}{{.name}}:{{end}}: sa-name:foo:test-all-user:
(Brolebinding.rbac.authorization.k8s.io/admin created (dry run)
rolebinding.rbac.authorization.k8s.io/admin created (server dry run)
Successful
(Bmessage:Error from server (NotFound): rolebindings.rbac.authorization.k8s.io "admin" not found
has: not found
rolebinding.rbac.authorization.k8s.io/admin created
rbac.sh:113: Successful get rolebinding/admin {{.roleRef.kind}}: ClusterRole
(Brbac.sh:114: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:
(Brolebinding.rbac.authorization.k8s.io/admin subjects updated
rbac.sh:116: Successful get rolebinding/admin {{range.subjects}}{{.name}}:{{end}}: default-admin:foo:
... skipping 152 lines ...
namespace/namespace-1651565726-13477 created
Context "test" modified.
+++ [0503 08:15:26] Testing role
role.rbac.authorization.k8s.io/pod-admin created (dry run)
role.rbac.authorization.k8s.io/pod-admin created (server dry run)
Successful
(Bmessage:Error from server (NotFound): roles.rbac.authorization.k8s.io "pod-admin" not found
has: not found
role.rbac.authorization.k8s.io/pod-admin created
rbac.sh:159: Successful get role/pod-admin {{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}: *:
(Brbac.sh:160: Successful get role/pod-admin {{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}: pods:
(Brbac.sh:161: Successful get role/pod-admin {{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}: :
(BSuccessful
... skipping 153 lines ...