PR #6016 - 04-15 15:00

Job: hypershift
FAILURE
← Back to Test Grid

Test Summary

182
Total Tests
146
Passed
8
Failed
28
Skipped

Failed Tests

TestCreateClusterV2
38m37.64s
hypershift_framework.go:316: Successfully created hostedcluster e2e-clusters-cfg59/create-cluster-v2-kntfg in 1m44s hypershift_framework.go:115: Summarizing unexpected conditions for HostedCluster create-cluster-v2-kntfg util.go:2123: Successfully waited for HostedCluster e2e-clusters-cfg59/create-cluster-v2-kntfg to have valid conditions in 25ms hypershift_framework.go:194: skipping postTeardown() hypershift_framework.go:175: skipping teardown, already called
TestCreateClusterV2/Main
4m21.88s
util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-cfg59/create-cluster-v2-kntfg in 25ms util.go:235: Successfully waited for kubeconfig secret to have data in 0s util.go:281: Successfully waited for a successful connection to the guest API server in 0s create_cluster_test.go:1265: fetching mgmt kubeconfig util.go:218: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-cfg59/create-cluster-v2-kntfg in 25ms util.go:235: Successfully waited for kubeconfig secret to have data in 0s
TestCreateClusterV2/Main/break-glass-credentials
2m10.34s
TestCreateClusterV2/Main/break-glass-credentials/customer-break-glass
2m7.27s
TestCreateClusterV2/Main/break-glass-credentials/customer-break-glass/direct_fetch
30ms
control_plane_pki_operator.go:63: Grabbing customer break-glass credentials from client certificate secret e2e-clusters-cfg59-create-cluster-v2-kntfg/customer-system-admin-client-cert-key control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-kntfg.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 132.196.242.184:443: connect: connection refused
TestCreateClusterV2/Main/break-glass-credentials/independent_signers
2m10.34s
control_plane_pki_operator.go:92: generating new break-glass credentials for more than one signer pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:201: creating CSR "24p92o1irgr8fodi3p9xyfae91634e0rw0ssug06dh9q" for signer "customer-break-glass", requesting client auth usages control_plane_pki_operator.go:211: creating CSRA e2e-clusters-cfg59-create-cluster-v2-kntfg/24p92o1irgr8fodi3p9xyfae91634e0rw0ssug06dh9q to trigger automatic approval of the CSR control_plane_pki_operator.go:218: Successfully waited for CSR "24p92o1irgr8fodi3p9xyfae91634e0rw0ssug06dh9q" to be approved and signed in 1.025s control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:153: ensuring that the SSR identifies the client certificate as having system:masters power and correct username pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:201: creating CSR "6te0ekqsgjrmov11gtob0atra00jqo8zk2xf3o13h14" for signer "sre-break-glass", requesting client auth usages control_plane_pki_operator.go:211: creating CSRA e2e-clusters-cfg59-create-cluster-v2-kntfg/6te0ekqsgjrmov11gtob0atra00jqo8zk2xf3o13h14 to trigger automatic approval of the CSR control_plane_pki_operator.go:218: Successfully waited for CSR "6te0ekqsgjrmov11gtob0atra00jqo8zk2xf3o13h14" to be approved and signed in 1s control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:153: ensuring that the SSR identifies the client certificate as having system:masters power and correct username control_plane_pki_operator.go:96: revoking the "customer-break-glass" signer pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:253: creating CRR e2e-clusters-cfg59-create-cluster-v2-kntfg/24p92o1irgr8fodi3p9xyfae91634e0rw0ssug06dh9q to trigger signer certificate revocation control_plane_pki_operator.go:260: Successfully waited for CRR e2e-clusters-cfg59-create-cluster-v2-kntfg/24p92o1irgr8fodi3p9xyfae91634e0rw0ssug06dh9q to complete in 2m8.025s control_plane_pki_operator.go:273: creating a client using the a certificate from the revoked signer control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:276: issuing SSR to confirm that we're not authorized to contact the server control_plane_pki_operator.go:99: ensuring the break-glass credentials from "sre-break-glass" signer still work pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-kntfg.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 132.196.242.184:443: connect: connection refused
TestCreateClusterV2/Main/break-glass-credentials/sre-break-glass
2m11.27s
TestCreateClusterV2/Main/break-glass-credentials/sre-break-glass/direct_fetch
40ms
control_plane_pki_operator.go:63: Grabbing customer break-glass credentials from client certificate secret e2e-clusters-cfg59-create-cluster-v2-kntfg/sre-system-admin-client-cert-key control_plane_pki_operator.go:130: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:116: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:133: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:150: could not send SSR: Post "https://api-create-cluster-v2-kntfg.aks-e2e.hypershift.azure.devcluster.openshift.com:443/apis/authentication.k8s.io/v1/selfsubjectreviews": dial tcp 132.196.242.184:443: connect: connection refused