PR #6016 - 04-14 19:06

Job: hypershift
FAILURE
← Back to Test Grid

Test Summary

182
Total Tests
148
Passed
6
Failed
28
Skipped

Failed Tests

TestCreateClusterV2
37m43.5s
hypershift_framework.go:316: Successfully created hostedcluster e2e-clusters-sgbfq/create-cluster-v2-qrjhr in 1m31s hypershift_framework.go:115: Summarizing unexpected conditions for HostedCluster create-cluster-v2-qrjhr util.go:2123: Successfully waited for HostedCluster e2e-clusters-sgbfq/create-cluster-v2-qrjhr to have valid conditions in 25ms hypershift_framework.go:194: skipping postTeardown() hypershift_framework.go:175: skipping teardown, already called
TestCreateClusterV2/Main
5m32.94s
util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-sgbfq/create-cluster-v2-qrjhr in 25ms util.go:235: Successfully waited for kubeconfig secret to have data in 0s util.go:281: Successfully waited for a successful connection to the guest API server in 0s create_cluster_test.go:1265: fetching mgmt kubeconfig util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-sgbfq/create-cluster-v2-qrjhr in 25ms util.go:235: Successfully waited for kubeconfig secret to have data in 25ms
TestCreateClusterV2/Main/break-glass-credentials
2m41.35s
TestCreateClusterV2/Main/break-glass-credentials/customer-break-glass
2m51.27s
TestCreateClusterV2/Main/break-glass-credentials/customer-break-glass/CSR_flow
2m51.2s
pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:201: creating CSR "33vlxwm2yoycxnyke2lrt81hrlzhmhkvmbywsejo11kb" for signer "customer-break-glass", requesting client auth usages control_plane_pki_operator.go:211: creating CSRA e2e-clusters-sgbfq-create-cluster-v2-qrjhr/33vlxwm2yoycxnyke2lrt81hrlzhmhkvmbywsejo11kb to trigger automatic approval of the CSR control_plane_pki_operator.go:218: Successfully waited for CSR "33vlxwm2yoycxnyke2lrt81hrlzhmhkvmbywsejo11kb" to be approved and signed in 1s control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:153: ensuring that the SSR identifies the client certificate as having system:masters power and correct username
TestCreateClusterV2/Main/break-glass-credentials/customer-break-glass/CSR_flow/revocation
2m49.05s
pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:253: creating CRR e2e-clusters-sgbfq-create-cluster-v2-qrjhr/2no9ex5nqqlds3rxgy4ko9wfriigd4414b86ss7syfsa to trigger signer certificate revocation control_plane_pki_operator.go:260: Successfully waited for CRR e2e-clusters-sgbfq-create-cluster-v2-qrjhr/2no9ex5nqqlds3rxgy4ko9wfriigd4414b86ss7syfsa to complete in 2m49.025s control_plane_pki_operator.go:273: creating a client using the a certificate from the revoked signer control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:276: issuing SSR to confirm that we're not authorized to contact the server control_plane_pki_operator.go:279: expected an unauthorized error, got Post "https://api-create-cluster-v2-qrjhr.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 128.85.241.148:443: connect: connection refused, response &v1.SelfSubjectReview{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"", GenerateName:"", Namespace:"", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Status:v1.SelfSubjectReviewStatus{UserInfo:v1.UserInfo{Username:"", UID:"", Groups:[]string(nil), Extra:map[string]v1.ExtraValue(nil)}}}