PR #7405 - 01-12 10:30

Job: hypershift
FAILURE
← Back to Test Grid

Test Summary

359
Total Tests
311
Passed
10
Failed
38
Skipped

Failed Tests

TestCreateCluster
52m29.04s
hypershift_framework.go:430: Successfully created hostedcluster e2e-clusters-f7lxx/create-cluster-l8hhp in 2m32s hypershift_framework.go:119: Summarizing unexpected conditions for HostedCluster create-cluster-l8hhp util.go:2949: Failed to wait for HostedCluster e2e-clusters-f7lxx/create-cluster-l8hhp to have valid conditions in 2s: context deadline exceeded eventually.go:224: observed *v1beta1.HostedCluster e2e-clusters-f7lxx/create-cluster-l8hhp invalid at RV 75679 after 2s: incorrect condition: wanted ClusterVersionSucceeding=True, got ClusterVersionSucceeding=False: ClusterOperatorNotAvailable(Cluster operator ingress is not available) hypershift_framework.go:249: skipping postTeardown() hypershift_framework.go:230: skipping teardown, already called
TestCreateCluster/Main
25m35.59s
util.go:284: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-f7lxx/create-cluster-l8hhp in 25ms util.go:301: Successfully waited for kubeconfig secret to have data in 25ms util.go:363: Successfully waited for a successful connection to the guest API server in 25ms create_cluster_test.go:2532: fetching mgmt kubeconfig util.go:284: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-f7lxx/create-cluster-l8hhp in 25ms util.go:301: Successfully waited for kubeconfig secret to have data in 25ms util.go:284: Successfully waited for kubeconfig to be published for HostedCluster e2e-clusters-f7lxx/create-cluster-l8hhp in 75ms util.go:301: Successfully waited for kubeconfig secret to have data in 25ms util.go:363: Successfully waited for a successful connection to the guest API server in 25ms util.go:1928: NodePool replicas: 2, Available nodes: 2 util.go:2021: Deleting the additional-pull-secret secret in the DataPlane
TestCreateCluster/Main/break-glass-credentials
10m0.48s
TestCreateCluster/Main/break-glass-credentials/customer-break-glass
10m0.6s
TestCreateCluster/Main/break-glass-credentials/customer-break-glass/CSR_flow
10m0.41s
pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:204: creating CSR "2i02anwbv4jgagdolth00wzadgitjy57ob2qnhul9vjz" for signer "customer-break-glass", requesting client auth usages control_plane_pki_operator.go:214: creating CSRA e2e-clusters-f7lxx-create-cluster-l8hhp/2i02anwbv4jgagdolth00wzadgitjy57ob2qnhul9vjz to trigger automatic approval of the CSR control_plane_pki_operator.go:221: Successfully waited for CSR "2i02anwbv4jgagdolth00wzadgitjy57ob2qnhul9vjz" to be approved and signed in 25ms control_plane_pki_operator.go:133: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:119: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:136: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:156: ensuring that the SSR identifies the client certificate as having system:masters power and correct username
TestCreateCluster/Main/break-glass-credentials/customer-break-glass/CSR_flow/revocation
10m0.04s
pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:256: creating CRR e2e-clusters-f7lxx-create-cluster-l8hhp/2874e96tn0sovwugsf9o1nea033wa213ooaemezyvj1g to trigger signer certificate revocation eventually.go:104: Failed to get *v1alpha1.CertificateRevocationRequest: context deadline exceeded control_plane_pki_operator.go:263: Failed to wait for CRR e2e-clusters-f7lxx-create-cluster-l8hhp/2874e96tn0sovwugsf9o1nea033wa213ooaemezyvj1g to complete in 10m0s: context deadline exceeded eventually.go:224: observed *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/2874e96tn0sovwugsf9o1nea033wa213ooaemezyvj1g invalid at RV 55788 after 10m0s: missing condition: wanted PreviousCertificatesRevoked=True, did not find condition of this type control_plane_pki_operator.go:263: *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/2874e96tn0sovwugsf9o1nea033wa213ooaemezyvj1g conditions: control_plane_pki_operator.go:263: RootCertificatesRegenerated=True: AsExpected(Signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/customer-system-admin-signer regenerated.) control_plane_pki_operator.go:263: NewCertificatesTrusted=False: WaitingForAvailable(New signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/customer-system-admin-signer not yet trusted.) control_plane_pki_operator.go:263: SignerClassValid=True: AsExpected(Signer class "customer-break-glass" known.)
TestCreateCluster/Main/break-glass-credentials/independent_signers
10m0.48s
control_plane_pki_operator.go:95: generating new break-glass credentials for more than one signer pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:204: creating CSR "1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg" for signer "customer-break-glass", requesting client auth usages control_plane_pki_operator.go:214: creating CSRA e2e-clusters-f7lxx-create-cluster-l8hhp/1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg to trigger automatic approval of the CSR control_plane_pki_operator.go:221: Successfully waited for CSR "1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg" to be approved and signed in 25ms control_plane_pki_operator.go:133: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:119: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:136: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:156: ensuring that the SSR identifies the client certificate as having system:masters power and correct username pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:204: creating CSR "26oxwls7uclptv7l43qoqpfnsmbi53dxwkt0ob05n4pg" for signer "sre-break-glass", requesting client auth usages control_plane_pki_operator.go:214: creating CSRA e2e-clusters-f7lxx-create-cluster-l8hhp/26oxwls7uclptv7l43qoqpfnsmbi53dxwkt0ob05n4pg to trigger automatic approval of the CSR control_plane_pki_operator.go:221: Successfully waited for CSR "26oxwls7uclptv7l43qoqpfnsmbi53dxwkt0ob05n4pg" to be approved and signed in 25ms control_plane_pki_operator.go:133: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:119: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:136: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:156: ensuring that the SSR identifies the client certificate as having system:masters power and correct username control_plane_pki_operator.go:99: revoking the "customer-break-glass" signer pki.go:76: loading certificate/key pair from disk for signer customer-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:256: creating CRR e2e-clusters-f7lxx-create-cluster-l8hhp/1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg to trigger signer certificate revocation eventually.go:104: Failed to get *v1alpha1.CertificateRevocationRequest: context deadline exceeded control_plane_pki_operator.go:263: Failed to wait for CRR e2e-clusters-f7lxx-create-cluster-l8hhp/1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg to complete in 10m0s: context deadline exceeded eventually.go:224: observed *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg invalid at RV 41669 after 10m0s: missing condition: wanted PreviousCertificatesRevoked=True, did not find condition of this type control_plane_pki_operator.go:263: *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/1r1repdui6be5ag06rqd40bzp37lgk9r0xnnqc5a5jxg conditions: control_plane_pki_operator.go:263: RootCertificatesRegenerated=True: AsExpected(Signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/customer-system-admin-signer regenerated.) control_plane_pki_operator.go:263: NewCertificatesTrusted=False: WaitingForAvailable(New signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/customer-system-admin-signer not yet trusted.) control_plane_pki_operator.go:263: SignerClassValid=True: AsExpected(Signer class "customer-break-glass" known.)
TestCreateCluster/Main/break-glass-credentials/sre-break-glass
10m0.59s
TestCreateCluster/Main/break-glass-credentials/sre-break-glass/CSR_flow
10m0.39s
pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:204: creating CSR "348csu7sw9m1kismzns35cyegvhkyyk2vmg97bxp3in9" for signer "sre-break-glass", requesting client auth usages control_plane_pki_operator.go:214: creating CSRA e2e-clusters-f7lxx-create-cluster-l8hhp/348csu7sw9m1kismzns35cyegvhkyyk2vmg97bxp3in9 to trigger automatic approval of the CSR control_plane_pki_operator.go:221: Successfully waited for CSR "348csu7sw9m1kismzns35cyegvhkyyk2vmg97bxp3in9" to be approved and signed in 25ms control_plane_pki_operator.go:133: validating that the client certificate provides the appropriate access control_plane_pki_operator.go:119: amending the existing kubeconfig to use break-glass client certificate credentials control_plane_pki_operator.go:136: issuing SSR to identify the subject we are given using the client certificate control_plane_pki_operator.go:156: ensuring that the SSR identifies the client certificate as having system:masters power and correct username
TestCreateCluster/Main/break-glass-credentials/sre-break-glass/CSR_flow/revocation
10m0.04s
pki.go:76: loading certificate/key pair from disk for signer sre-break-glass, use $REGENERATE_PKI to generate new ones control_plane_pki_operator.go:256: creating CRR e2e-clusters-f7lxx-create-cluster-l8hhp/e4bevrxa7iyystv7c2f9lem4juqnl1c14ag3qkxi7s8 to trigger signer certificate revocation eventually.go:104: Failed to get *v1alpha1.CertificateRevocationRequest: context deadline exceeded control_plane_pki_operator.go:263: Failed to wait for CRR e2e-clusters-f7lxx-create-cluster-l8hhp/e4bevrxa7iyystv7c2f9lem4juqnl1c14ag3qkxi7s8 to complete in 10m0s: context deadline exceeded eventually.go:224: observed *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/e4bevrxa7iyystv7c2f9lem4juqnl1c14ag3qkxi7s8 invalid at RV 55797 after 10m0s: missing condition: wanted PreviousCertificatesRevoked=True, did not find condition of this type control_plane_pki_operator.go:263: *v1alpha1.CertificateRevocationRequest e2e-clusters-f7lxx-create-cluster-l8hhp/e4bevrxa7iyystv7c2f9lem4juqnl1c14ag3qkxi7s8 conditions: control_plane_pki_operator.go:263: RootCertificatesRegenerated=True: AsExpected(Signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/sre-system-admin-signer regenerated.) control_plane_pki_operator.go:263: NewCertificatesTrusted=False: WaitingForAvailable(New signer certificate e2e-clusters-f7lxx-create-cluster-l8hhp/sre-system-admin-signer not yet trusted.) control_plane_pki_operator.go:263: SignerClassValid=True: AsExpected(Signer class "sre-break-glass" known.)